EDUCAUSE & Internet2 Security Professionals Conference The Challenge: Securing a Large Multicampus Network Kirk Kelly – Pima Community College Scott Ferguson.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Chapter 3: Planning a Network Upgrade
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
District Information Technology Update Report Late August 2014 Complied By: Stephen Torrey
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
Ch.6 - Switches CCNA 3 version 3.0.
SERVER LOAD BALANCING Presented By : Priya Palanivelu.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
COS 461: Computer Networks
Advanced Internet Bandwidth and Security Strategies Fred Miller Illinois Wesleyan University.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Appalachian State University. Middleware (Identity Mgmt., Netreg, Address Management) Storage and Backup SystemsServer SystemsSecurity SystemsData CenterNetwork.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
EDUCAUSE Security 2006 Internet John Brown University.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Large Enterprise with Multiple Locations Source: Avaya.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Routing and Switching in the Enterprise – Chapter 1 Networking.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Barracuda Load Balancer Server Availability and Scalability.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
CNIT101 Sedoris Ferguson Forrest Choy Aashis Karki Carlos Alcantar Jin Bin Sommarat Suwanpangpan Ming Yu Xu.
Common Devices Used In Computer Networks
Communications Pool FY ’06 Marla Meehl Friday, 10/21/05 NETS – Network Engineering & Telecommunications Section Enterprise Services Computer Security.
Exploring the Network.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
N ETWORKING C OMPONENTS A-3 LTEC 4550 by Joe Garcia.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
LAN Switching and Wireless – Chapter 1
1 1 Hosted Network Security EarthLink Complete™ Data.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Help Desk Working at a Small-to-Medium Business or ISP – Chapter 2.
Advanced Computer Networks Lecturer: E EE Eng. Ahmed Hemaid Office: I 114.
Network Equipment Assignment 3 LTEC 4550 Aaron Whitaker.
Ed Tech Audit Case Study Pete Reilly. Process Meetings with the Superintendent Extended meetings with the technology coordinator Meeting with each administrator.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Desktop Virtualization —An Elegant Solution Presented by Cloud Computing. Endless Possibilities. August 10, 2012.
Information Technology Support Services Focusing on our customers 1.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Select appropriate hardware for building networks. Objective Course Weight 2%
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Dr. Pipat Sookavatana. IT for Business Communication and Information Exchange Web access File and Printer Sharing Information Access Advertisement.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Unleashing Mobile Broadband WiPipe Central MANAGED SERVICES Secure, Manage, & Maintain the Edge of the 3G/4G Network.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Network Security Solution
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Module 2: Configure Network Intrusion Detection and Prevention
2018 Real CompTIA N Exam Questions Killtest
Presentation transcript:

EDUCAUSE & Internet2 Security Professionals Conference The Challenge: Securing a Large Multicampus Network Kirk Kelly – Pima Community College Scott Ferguson – Pima Community College April 11, :45pm – 3:45pm Denver Ballroom 2

Outline Who is Pima Community College (PCC) PCC technology infrastructure Specific incident Lessons learned New security devices New network architecture Questions

Pima Community College Located in Tucson, AZ 8 campuses 9 centers Enrollment 61,769 – Credit 13,639 – Noncredit 75,408 – Combined

Student Profile Average age: 27 41% ethnic minorities 56% female 69% part-time 68% daytime 25% evening 7% weekends

Current Data & Phone Network 15,000 data network connections across the college 7,000 devices connected to the 100/1000mbits Campuses, DO, and MS connected at 1 Gigabit speed via City I-Net Fiber ring Wireless at all locations 2,500+ phone lines across the college Over 70 (IDF/MDF) rooms

Wiring Closets, Before and After

W32/Blaster Announced August 2003 Blaster, Nachi, Welchia Blocked port 135, etc. at the edge Thought antivirus updates were in place No problems first day while others across the Internet are having major problems Day two an infected laptop plugs in Infection spreads quickly and network is shut down

The Awakening All services stopped All IT meeting with the Chancellor at 6:00pm 35+ employees worked all night All core systems back online by 1:00pm the following day Some remote sites offline for 2-3 days

What Did We Learn? Antivirus updates handled differently at every campus MS patches were way behind Firewalls & routers were underpowered and over tasked (new firewalls installed two months earlier) No way to control or secure campus links Network not segmented Poor communication between command center and staff No HVAC No keys

Desktop Antivirus and Updates All computers centralized into two domains McAfee ePolicy Orchestrator WSUS for MS security updates

Intrusion Detection? Demo of an Intrusion Detection System (IDS) Visited U of A Discovered an IDS needs constant babysitting Demo of an Intrusion Prevention System (IPS) No more staff on the horizon No central data security position or team

Purchase an IPS Decision to purchase IPS Updates Threat Management Center Inline on Internet connection Inline to all WAN links “Wire Speed” packet inspection at gigabit speeds

Firewall Needed more horsepower Needed firewall ports to support all WAN links Needed more DMZs Needed more advanced features Purchased new firewalls 24 gig ports Virtual firewalls Redundant boxes for redundant links Processor management

Changes to Network Needed multiple DMZs to support a centralized server approach Created a Frame Relay T1 Failover Network Switch to gigabit Network segmentation Redundant Internet connection (BGP with City) Created public access network Wireless rides on public network

Additional changes Established a disaster recovery site Payroll and native Banner only Redundant Internet link Re-architected college DNS/DHCP From 10 distributed servers to 4 centralized Chose an appliance solution HA pair for internal, 1 at disaster recovery site, 1 for external DNS

Future Clean access type things….. Patch, spyware and antivirus checking Quarantine Goal to provide students access and maintain security Portal, students in LDAP VoIP pilot and phased installation Wireless security Wireless with U of A and City of Tucson Inet tie in

Questions?