1 Network-level Security at UVa Jim Jokl Common Solutions Group January 2006.

Slides:



Advertisements
Similar presentations
Clique/Trust Solution Suitable for Level 2 Grid. Trusted Host Database Remote database of IP addresses, port ranges etc. Accessible by firewall administrators.
Advertisements

Haga clic para modificar el estilo de subtítulo del patrón © 2012 – Teldat GmbH – All rights reserved „Port Based Security“ – „Drop-In-Mode“ The ideal.
Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
Guide to Network Defense and Countermeasures Second Edition
Campus LAN Overview. Objectives Identify the technical considerations in campus LAN design Identify the business considerations in campus LAN design Describe.
EthioTelecom IP NGN Network
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Chapter 8 Local Area Networks - Internetworking.
1 Chapter 8 Local Area Networks - Internetworking Data Communications and Computer Networks: A Business User’s Approach.
ACACIA Threaded Case Study Seamus Burns Ronan Conaghan Eugene Cullen.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
Campus Networking Best Practices Session 2: Layer 3 Dale Smith University of Oregon & NSRC
Static Route. Identify Default gateway What is the default gateway for PC1 PC2 r1 r2 PC1PC2.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Mr. Mark Welton.  Three-tiered Architecture  Collapsed core – no distribution  Collapsed core – no distribution or access.
January 2006Common Solutions Group1 Network Based Security Looking at the future of university networking…
TOSIBOX LOCK security options 1 1.
Networking Components Christopher Biles LTEC Assignment 3.
Barracuda Load Balancer Server Availability and Scalability.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
1 Prepared by: Les Cottrell SLAC, for SLAC Network & Telecommunications groups Presented to Kimberley Clarke March 8 th 2011 SLAC’s Networks.
Firewall Network Processor™: Technical Concept and Business Solutions FNP™ – is a trademark of Fractel Inc. December 2008 Columbus.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
1 Second ATLAS-South Caucasus Software / Computing Workshop & Tutorial October 24, 2012 Georgian Technical University PhD Zaza Tsiramua Head of computer.
Module 5: Configuring Access for Remote Clients and Networks.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Introduction & Vision. Introduction MANTICORE provides a software implementation and tools for providing and managing routers and IP networks as services.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Data Communications & Computer Networks, Second Edition1 Chapter 8 Local Area Networks: Internetworking.
Monticello and Video Conferencing How to make it work Shelley Rossitto Director of Instructional Technology Monticello Central School District
#InnovateIT. WEBROLE.0.CONTOSO.CLOUDAPP.NET
Quick Overview of VoIP Activity at Virginia Jim Jokl - UVa
ITEC 355 Chris. Scenario  Frostburg State University has chosen our team to check the current network configuration in the Compton Science Center. 10.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
If we don’t subnet and use as our subnet mask then we use all of our IP addresses on one network. This is not an efficient use of our Class.
Chapter 1 Introduction to Networking
By Ashar Anwar.
Switch Setup Connectivity to Other locations Via MPLS/LL etc
Planning and Troubleshooting Routing and Switching
Welcome! Thank you for joining us. We’ll get started in a few minutes.
CCNA 3 v3.1 Module 5 Switches.
Fix Windows 10 Error Code 0x80072ee7,Call Support Number
D-link Router tech support |Contact Experts now
D-link Router Support Website: support/index.htmlhttp://callpcexperts.com/d-link-router- support/index.html Contact.
Welcome To : Group 1 VC Presentation
IS3120 Network Communications Infrastructure
D-Link router tech support phone number provides the technical support for client issue concerning to d-link as there’s a team of specialist that are.
D-Link Router Customer Care Number. A D-link router is a basic necessity these days with so much technology around us in offices or homes. We can connect.
Facing issues in D-link router? No Need to get nervous, D-link Router Technical Support is available to provide the best assistance. Expert's help gives.
Facing issues in D- link router ? No Need to get nervous, D- link Router Technical Support is available to provide the best assistance. Expert's help.
D-Link Router Customer Care Number
Implement Inter-VLAN Routing
UNM Enterprise Firewall
Firewalls Routers, Switches, Hubs VPNs
VPN What, where, who, why when?.
Implement Inter-VLAN Routing
Implement Inter-VLAN Routing
Implement Inter-VLAN Routing
Networking and Telecommunications
Private Networks.
Global One Communications
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

1 Network-level Security at UVa Jim Jokl Common Solutions Group January 2006

UVaNet Security Logical View Level 3 Zone Level 1 Backbone Level 2 Backbone Fire Wall Level 3 Zone Level 3 Zone Users Clinical Network Users Internet VPN Joint VPN Fire Wall “existing U.Va. network” “more secure” VPN Fire Wall VPN Users

3 UVa Network Security Summary  Technical Operates at the network jack level VLAN-based in wiring closets Separate routed backbone links (~ building-level subnets) No inbound connections via firewall allowed to More Secure network (remote VPN access is available) Level-3 zones are customized based on user needs  Policy-basis Requirements for computers on More Secure network developed via a process with departmental technical contacts Management delegated to departmental staff who use web-based tools to manage ports (speed, duplex, VLAN, diagnostics, etc)

4 Some Reference URLs  Network-layer security  IP address space allocation