The Fermilab Network, Computer Security, and you…. Phil DeMar / Donna Lamore Computer Security Awareness Day March 8, 2005.

Slides:



Advertisements
Similar presentations
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Advertisements

Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Wireless and Switch Security NETS David Mitchell.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
2005 FNAL Computer Security Peer Review and Self Assessment Networking – Current Status FNAL Computer Security Peer Review Phil DeMar March 22, 2005.
Firewall Configuration Strategies
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
DHCP and Network Settings What is DHCP and its function, what is a Gateway and why do we need one, what is DNS? Presentation written by Carol A. Hopkins.
Wi-Fi Structures.
Fermilab VPN Service What is a VPN ?.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Name Resolution Domain Name System.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Common Devices Used In Computer Networks
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Computer Concepts 2014 Chapter 5 Local Area Networks.
University of Montana - Missoula Adam Ormesher & Chase Maier.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
CIS 3360: Internet: Network Layer Introduction Cliff Zou Spring 2012.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5 Darren Shaver – Modified Fall.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Wireless Network Design Principles Mobility Addressing Capacity Security.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Run - II Networks Run-II Computing Review 9/13/04 Phil DeMar Networks Section Head.
Windows Vista Configuration MCTS : Advanced Networking.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 9: Testing and Troubleshooting
Virtual LANs.
AbbottLink™ - IP Address Overview
Presentation transcript:

The Fermilab Network, Computer Security, and you…. Phil DeMar / Donna Lamore Computer Security Awareness Day March 8, 2005

Fermilab Network Overview  ~10,000 systems  Organized on model of work group LANs  Organizational: AD, CD, PPD, TD, BSS, DIR, ESH, FESS, LSS  Experiment: CDF, D0, CMS, MINOS, mBoone, SDSS  Geographical: Fixed Target, Site 38, Village  Work groups supported on switches that connect to the core network

Core Network Facilities & Essential Network Services  Core network facilities:  FCC core router  WH core router  Border router  Essential network services:  Name service  Dynamic address allocation service  Time service

Off-site Network Access  Off-site traffic traverses border router:  Delineation point between onsite & offsite  Our 1 st line of defense against the Internet  Flow data collected on border router:  Logs all off-site network connections  Source/destination IP addresses & ports  Flow timestamp & duration, bytes/packets sent & received  Useful for detecting infected systems & investigating computer security incidents  We are also collecting flow data on internal routers

Off-site Network Access (II)  Current site perimeter access policy:  Open inbound access with a few protections  Open outbound access with minimal restrictions  Changes to default inbound openness under discussion:  Likely a multi-level security zone architecture  Green zone = default inbound allow  Yellow zone = default inbound deny  Openness for open science collaboration is recognized as a requirement

Off-site Network Access (III)  An alternate very high bandwidth offsite path now in place:  Via dark fiber connection to StarLight  Intended use – high impact scientific data movement

Restrictions on Network Facilities & Services at Fermilab  The network is a restricted central service  Per the Fermilab Policy on Computing   Prohibited activities include:  Routing & bridging (switching…) on systems attached to the campus network  Using IP addresses not assigned to you  Offering DNS, DHCP, or NTP services

Routing/Bridging Restrictions:  Applies to systems directly or indirectly attached to the facility network  Backend networks with dual-homed (gateway) systems are allowed, but  No forwarding of traffic through the gateway system  No use of Network Address translation (NAT)  Use Fermilab-assigned (RFC1918) address blocks  Private hardwire networks with no direct or indirect connection to the facility network is OK  Sorry, no private wireless networks…

Accessing the Fermilab Network  System registration is required to be granted a usable address on the facility network  Two types of network addresses are allocated:  DHCP – dynamic, but temporary IP address  Useful for mobile systems  Convenient for proper network configuration on a system  Static – fixed, but constant IP address  Immobile; address is bound to a specific subnet  Necessary for systems offering services

Static IP address registration  Static IP address :  Requested via MISCOMP   MAC address(es) required to receive an IP address  Additional necessary information:  Sysadmin  Location  Hardware information  Plan to require static IP renewal once a year

DHCP address registration  Two Types of DHCP address registration  Permanently registered DHCP (Normal)  Register via MISCOMP (  MAC address(es) must be registered  Same sysadmin, location, & hardware info as for static IP  Yearly renewal will become necessary soon  Temporary – Cinderella Registration  Initial browser access forces Web Registration page −Registration info: name, addr., contact info  IP address good till midnight; then you must re-register  Maximum 5 Cinderella leases per 30 days

Wired Connection to Site LAN  DHCP supported on most subnets:  Plug in & registered systems are on the network  Static IP address requires proper configuration for the local subnet  Contact local support person for assistance  Helpdesk – 2345 to report problems

Accessing the Wireless Network  DHCP support only  Wireless LAN support covers most of the site  B – 11 Mbs  Beginning to deploy G – 54 Mbs  Authentication:  Currently no authentication for wireless access  SSID is broadcast  Likely to change in the future

Wireless Network No-No’s  You can’t install your own Access Points (AP):  See Fermilab Policy on Computing – a restricted central service  Or enable any AP capability on your notebook  Developing automated rogue AP detection tool  Bridging must be turned OFF on user devices  A known problem with Windows XP  Switches set to shutdown ports on systems with bridging enabled

Remote Access – Dial-up  Dial-up:  Now uses Radius authentication  V.34 – typically 28.8kbps  No plans for further upgrades  If the obsolete, out of warranty modem pool dies, no replacement…  Limited to on-site access only  Last resort ?  Dial-up ISDN phased out completely

Remote Access – VPN  VPN  Provides encrypted tunnel through internet  Assigns virtual local Fermilab address  Allows access to Fermilab machines restricted from offsite  Allows access to protocols blocked at Border  Must use Cisco VPN client & FNAL-provided profile  Yearly renewal necessary:  Involves updating FNAL-provided VPN profile  Request account at:   Need ID number, Associated Workgroup

Appropriate Use  From the Fermilab Policy on Computing: “ Fermilab encourages effective use of computing technologies in all aspects of its activities. Fermilab maintains an open scientific environment where the free exchange of ideas is encouraged and protected. We permit a wide range of computer activities including incidental use for private purposes. We encourage use of the Web and other Internet communication channels. With this comes the responsibility for every Fermilab employee and user to exercise common sense and good judgment. “

Appropriate Use (cont.)  Network Appropriate Use primary concerns:  Potential public embarrassment to the Laboratory  Consuming Significant Resources (excessive use)  Examples of traffic where common sense and good judgment should come into play :  Acting as a server for P2P distributed file systems  Kazaa, eDonkey, Gnutella, NAPster, Skype, etc…  Game Sites  Auctions

Traffic monitoring thru the border router  Flow data generates daily & hourly Top 20 reports on:  Top talkers, top listeners, top conversations  Breakouts by number of flows, bytes, or packets  Primarily checking for:  Unusual consumption of network resources  Unusual traffic patterns  Large numbers of offsite hosts contacted  Large amounts of data transferred

Border Router Network Blocks  Border Router static blocks:  Exceptions to inbound default-allow  Netbios  IRC  Web Servers require exception  Autoblocker:  Based on quasi-realtime flow record analysis  Blocks “greedy” users (perceived as scanners…)  Automated unblocked after behavior stops  Occasionally blocks “greedy”, but real applications  New version should minimize those disruptions

Internal Network Blocks  DHCP service:  When requested by Computer Security Team (CST)  Typically to isolate a vulnerable or infected system  Unblocked only upon approval from CST  For network Infractions – excessive use, restricted central service  Unblocked when corrected  Static IP address internal block:  Normally at the request of CST  Unblocked only after approval from CST

 MAC address black-hole  Implemented on local switch  At request of FCIRT – during an incident  Unblocked at request of FCIRT  Network Infractions – illegal IP address use, excessive use, restricted central service  Unblocked when corrected  Switch port block  Occasionally used for expedient network disconnect  Too easy to get around  Can affect other users/systems on same switch port Internal Network Blocks (cont)

Helpful Links  Network info available on Data Comm web site   Network Stats:   Node Locator: to find point-of-attachment & associated switch traffic graphs  NDT Tester: useful in testing for connectivity/duplex problems  Trouble Reporting – x2345 – helpdesk

Questions… ?