AURA MOWG EMOS & IST Re-Engineering 2 October 2007 Pat Johnson.

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Roles Based Network Access Controls James R. Clifford Los Alamos.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Technology Coordinators Training. Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All rights.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Chapter 7: Using Windows Servers to Share Information.
Computation for Physics 計算物理概論 Introduction to Linux.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Introduction to our On-Line Self Service Center at
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Enforcing Concurrent Logon Policies with UserLock.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Cap 333 Network Administration. Solution Rules  Your solution must be typed by computer. Otherwise, it will not be accepted.  If the question is a project.
Vantage Report 3.0 Product Sales Guide
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Wireless Networks and the NetSentron By: Darren Critchley.
Paul Scherrer Institut 5232 Villigen PSI HEPIX_AMST / / BJ95 PAUL SCHERRER INSTITUT THE PAUL SCHERRER INSTITUTE Swiss Light Source (SLS) Particle accelerator.
Page 1 of 9 NFS Vendors Conference October 25, 2000 PC Solutions to Network File Systems.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Yokogawa Electric Corporation ISD-MASP-S05010 Copyright © Yokogawa Electric Corporation February 16, 2005 Solution Marketing Group Industrial Automation.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Part 1: How to use EasyAccess 2.0 Similar to your social network software, such as Skype, WhatsApp. One license for each HMI No license is needed for.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Chapter 7: Using Windows Servers
Hosted Services Led by Jason Gross, Terrice McClain, & Jen Paulin
Port Knocking Benjamin DiYanni.
Configuring ALSMS Remote Navigation
Computer Networking Devices
Welcome To : Group 1 VC Presentation
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
An Introduction to Computer Networking
Professional Network Services
Tonight – Finishing off workshop
STATEL an easy way to transfer data
Presentation transcript:

AURA MOWG EMOS & IST Re-Engineering 2 October 2007 Pat Johnson

Page 2  IST Online 2-factor Re-engineering Status  IST Online schedule  IST ONLINE Current Design Architecture  IST ONLINE Redesign Architecture  NASA Provided COTS to IOT  IOT IST Opscon Impacts  IST issues  IST DMZ Future Plans  EMOS Status  Q&A Agenda

Page 3 IST Online Re-engineering Status Testing replacement of RSA KeyFOB license server Current server has a limited user license (up to 50 users) and was an interim solution to get MMS IST re-engineering implemented New server will accommodate 75+ IST users between Terra, Aqua, Aura that includes IOTs, FOT engineers, System Administrators and Engineers, and Developers The server replacement will be performed after the Online 2-factor implementation

Page 4 Schedule Activities prior to Parallel Ops IOT Review(s) & discussions – Aug/Sept –AMSR-E session with MOWG on Aug. 16th –Aug. 22 session with MOPITT, CERES, HIRDLS/UK, OMIS Dutchspace –Aug. 23 session with AIRS –Aug. 27 session with MISR –Sept. 24 session with ASTER –Oct. 2 session planned during AURA MOWG Pre Ship Review – Oct Remote site IPSec Client installation – Oct/Nov –IOTs using separate PCs for Online and MMS will need to coordinate with EOC on firewall rules for Online PC as was done with the MMS effort recently Parallel Ops start – Nov/Dec ORR – Dec

Page 5 ONLINE IST Current Design Architecture EOC IST DMZ EOC Terra ONLINE hosts ONLINE server EOC Aqua ONLINE hosts ONLINE server EOC Aura ONLINE hosts ONLINE server Terra Online IST Aqua Online IST Aura Online IST closed-EBNET Firewall EBNet Firewall Remote User N TS Remote User 4 TS Remote User 3 TS Remote User 2 TS Remote User 1 Terminal Services Internet Remote User firewalls are not shown Encrypted Traffic Terra Online IST Aqua Online IST Aura Online IST DMZ Firewall

Page 6 ONLINE IST Redesign Architecture EOC IST DMZ EOC Terra ONLINE hosts ONLINE server EOC Aqua ONLINE hosts ONLINE server EOC Aura ONLINE hosts ONLINE server Terra Online IST Aqua Online IST Aura Online IST closed-EBNET Firewall Open EBNet Firewall Remote User N IPSec VPN client &TS Remote User 4 IPSec VPN client & TS Remote User 3 IPSec VPN client & TS Remote User 2 IPSec VPN client & TS Remote User 1 IPSec VPN client & Terminal Services Internet Remote User firewalls are not shown Encrypted Traffic IPSec VPN & KeyFOB Servers Terra Online IST Aqua Online IST Aura Online IST DMZ Firewall

Page 7 NASA Provided COTS COTS IOTs already have the Terminal Services client software, provided by NASA VPN client software will be provided by NASA with install instructions and user guide –For those IST users who have separate Online PCs from MMS –User PCs being used for both MMS and Online have the VPN client installed already (no changes are needed) Hardware IOTs have Online PC at their location now NASA will provide KeyFOBs, if needed, and user instructions –Current design will allow an IST user to use the KeyFOB assigned to them for both MMS and Online and FTP server DMZ access –KeyFOBs are not to be shared among users

Page 8 IOT Opscon Impacts New layered architecture requires multiple logins by the user For Online: VPN/KeyFOB login, Terminal Services Online IST DMZ login The IPSec client software prevents other logins to the remote user terminal machine Prevents back-door hacker attacks When connected to the IST DMZ, cannot connect to any other machine –NFS mounts to other IOT machines are ‘turned off’ only during Online session Remote User printing impacts Printing features allow for locally printing files from the IST’s DMZ file system –Cannot print to IOT network printer while connected to IPSec VPN Improve security with Online IST interface to meet NASA standards Adding 2-factor login authentication (KeyFOB) for remote access to EOC DMZ ISTs Adding IPSec VPN client to restrict access to the IOT PC while IOT logged into the DMZ IST

Page 9 IST Related Issues Secure copy of planning products to HIRDLS UK and MISR Linux box EOS Engineer working with the IOTs on this issue MMS error message on secure copy of planning products to ASTER EOS Engineer investigating issue MISR intermittent time outs - MIITS DR EMOS00013 (was EMOS_R0631) NASA awaiting firewall rule update to allow more testing to identify problem MISR IST data not updating when logoff VPN connection but IST session left up MIITS DR EMOS00012 (was EMOS_R0632) IST Save file from Online IST DMZ to local user PC IST is slow Known problem with using Terminal Services Recommend using the FTP DMZ file server for file transfers

Page 10 IST DMZ Future Plans Future Plans for IST DMZ Provide MMS reports and FDS planning products to FTP DMZ Server Replace the RSA server with RADIUS RSA server - to add more internal security checking capability (possibly mid to late 2008) to meet new NASA security standards Will coordinate any IST outages with the users Devise an Analysis (trending system) IST solution (year 2009) This will occur along with the Analysis system upgrade - trade study and design analysis is planned for mid 2008 Design and Implement a ‘Remote IST Interface from anywhere’ The design and prototyping work is planned to occur in early to mid 2008

Page 11 EMOS Status Completed: Promotion of Terra MMS delivery to Operations on 8/3/07 Aura Online build to Operations in July 2007 In Progress: Designing and testing the replacement of old Cabletron switches to newer CISCO 6509 switches Transition planned to occur between mid October 2007 to December 2007 Could be a major impact to Operations Aqua Build Online & Analysis delivery is no-earlier-than January 2008 Terra Analysis & Online build update planned for mid 2008 Updating the Backup EOC at Goddard with MMS & Analysis subsystems in 2008 Looking at consolidating MMS servers and upgrading to Sun Ultra 60s (from old Ultra 1s, 2s, 5s)

Page 12 Q & A 