Network & Core System Configurations for APAN SG Medical Session Koji OKAMURA Kyushu University.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Advertisements

CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
What’s New in Fireware XTM v WatchGuard Training.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
How to setup VRT- 402N with MH-2001?. Outline  Connections Topology  VRT-402N setup  MH-2001 setup.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Information & Communication Technology
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Review. 2 Main Areas Client and Server / Active Directory.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
DIT314 ~ Client Operating System & Administration CHAPTER 9 SUPPORTING TCP/IP, DNS USING WINDOWS XP Prepared By : Suraya Alias.
Making connections Connecting a computer to a LAN donna Bair-Mundy.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking (Part 4 of 5)
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Report of Medical Video Conference between EUN and Asia Koji OKAMURA (Kyushu University, Japan), hisham ahmed. ibrahim (Egypt), Nasser El-Attar (EUN, Egypt)
Objectives Define IP Address To be able to assign an IP address with its Subnet Mask and Default Gateway to a PC that operates using Windows 7 or Fedora.
BASIC CONFIGURATION MODEM D-LINK
1 Introduction to Networking Dr. Mahdi Nasereddin PPU.
Implementing Network Access Protection
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Wireless Networks and the NetSentron By: Darren Critchley.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
CSE3153 Semester Case Study 2 V1.0 The Concept of IP Subnetting Tutor keeps this front sheet as record of completion Student Name: __________________________________________.
Proposed Network Configuration
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Wireless Network Design Principles Mobility Addressing Capacity Security.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Campus Wireless Network kitenet Koji OKAMURA Research Institute for Information Technology, Kyushu University.
FreeS/WAN & VPN Cory Petkovsek VPN: Virtual Private Network – a secure tunnel through untrusted networks. IP Security (IPSec): a standardized set of authentication.
Page 1 of 28 Group A (VLAN A) 1) VID: 2 2) IP Interface: a) IP Address: b) Subnet Mask: ) Ports: 1x to 8x PC10 IP Address:
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
WEEK 11 – TOPOLOGIES, TCP/IP, SHARING & SECURITY IT1001- Personal Computer Hardware System & Operations.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
Welcome to Early Bird Class
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
APAN 24 Medical Working Group Xi'an China Conference XP Andrew Howard Advanced Communications Research.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 9: Dynamic Host Configuration Protocol (DHCP)
Trimble TMR1 Data Radio Operational Overview.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CCNA.
Swinburne University of Technology Faculty of Information and Communication Technologies HIT2125 Data Communications and Computer Networks Network Case.
ITMT Windows 7 Configuration Chapter 5 – Connecting to a Network ITMT 1371 – Windows 7 Configuration 1.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
CompTIA Network+ Certification Exam
Module 8: Networking Services
Logo here Module 8 Implementing and managing Azure networking 1.
CompTIA Network+ Certification Exam
Welcome To : Group 1 VC Presentation
Networking for Home and Small Businesses – Chapter 2
Practical 2 Unit 26 Design a small or home office network
Networking for Home and Small Businesses – Chapter 2
How To Configure Hotspot in Virtual Mikrotik on VMware
Networking for Home and Small Businesses – Chapter 2
Presentation transcript:

Network & Core System Configurations for APAN SG Medical Session Koji OKAMURA Kyushu University

PC DVTS(S) Quatre NTSC Bi-Directional e3 e4 e1 e2 vlan /24 vlan /24 eth /29 eth /29 AR550S-A 1,2 3,4 0 1 vlan /24 vlan /24 eth /29 eth /29 AR550S-B 1,2 3,4 0 1 Reflector NTSC Uni-Directional e1 e2 vlan /24 vlan /24 eth /29 eth /29 AR550S-C 1,2 3,4 0 1 vlan /24 vlan /24 eth /24 eth /24 Kyushu Univ. Hospital / Japan 1,2 3,4 DV CAM. 0 1 PC DVTS(S) PC DVTS(S/R) DV CAM. MONITOR Tokyo Venue / Japan AR550S#13 vlan /24 vlan /24 eth /29 NCC / Korea 1,2 3,4 DV CAM. 0 1 PC DVTS(R) PC DVTS(S/R) MONITOR AR550S#14 SECURITY IPsec APAN Tokyo (25-Jan-2006) Last up date 23-Jan :45f vlan /24 vlan /24 eth /29 National Taiwan Univ. / Taiwan 1,2 3,4 DV CAM. 0 1 PC DVTS(R) PC DVTS(S/R) MONITOR AR550S#15 vlan /24 vlan /24 eth /29 eth /29 AKIHABARA Convention Center / Japan 1,2 3,4 DV CAM. 0 1 PC DVTS(S/R) DV CAM. MONITOR AR550S#16 Quatre DVCommCPY VPN Router Previous Tokyo Meeting

Allied Tetesis VPN Router AR550S Quatre DVCommCPY Previous Tokyo Meeting

VPN Router: allied-telesis(syn) New Model: AR570S 1G $20 available: 2006/06 Major Model: AR550S 100M $100 VPN Throughput 100Mbps VPN Throughput 900Mbps IP-Sec Throughput: very low than VPN 100Mbps VPN Throughput ???Mbps

Quatre for Demo-1 Xeon 3.0GHz x 2 Quatre for Demo-1 Xeon 3.0GHz x 2 Quatre for Demo-2 Xeon 2.8GHz x 2 Quatre for Demo-2 Xeon 2.8GHz x 2 VPN Router AR550S VPN Router AR550S Network room in Computer and Communications Center, Kyushu University (it is not my office :)

/ / / / / / / /24 Shanghai Hong Kong Taichung Internet SINET,APAN,TEIN2,J GN2,CERNET,CSTNE T,ASNET,HERNET,Si ngAREN,TWAREN,Q GPOP,KITE

VPN / / / / / / / /24

VPN / / / / / / / /24

Issues for Preparation Making perfect Configuration files for AR5xxS is a little bit difficult. Allied Telesis helps to make them with actual testing. –Allied Telesis sends the final version after local testing with actual environment to me. –I load the file to all router and install IP-SEC setting. IP address for each site is necessary to make configuration file and set-up.

# system Configuration set system name="KyuUniv#1" # USER Configuration set user securedelay=600 set user minpwdlen=3 add user=secoff password=secoff privilege=securityofficer enable user rso add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= add user rso ip= mask= # VLAN Defaine Configuration create vlan=vlan11 vid=11 create vlan=vlan12 vid=12 add vlan=vlan11 po=1-2 add vlan=vlan12 po=3-5 # IP Configuration enable ip add ip int=eth0 ip= mask= add ip int=vlan11 ip= mask= add ip int=vlan12 ip= mask= add ip rou= mask= int=eth0 next= set ping sipa= # SNMP Configuration ena snmp create snmp community=public open=yes # DHCP_SERVER Configration enable dhcp create dhcp policy=dhcp_pol1 lease=7200 add dhcp policy=dhcp_pol1 subnet= router= create dhcp range=dhcp_ran1 policy=dhcp_pol1 ip= num=10 create dhcp policy=dhcp_pol2 lease=7200 add dhcp policy=dhcp_pol2 subnet= router= create dhcp range=dhcp_ran2 policy=dhcp_pol2 ip= num=10 # ISAKMP Configration enable isakmp create isakmp pol=ISA_NUS pe= key=1 sendn=true sendd=true hear=BOTH create isakmp pol=ISA_VGHTC pe= key=1 sendn=true sendd=true hear=BOTH create isakmp pol=ISA_CHHK pe= key=1 sendn=true sendd=true hear=BOTH create isakmp pol=ISA_SJTU pe= key=1 sendn=true sendd=true hear=BOTH # IPSEC Configration enable ipsec create ipsec sas=1 key=isakmp prot=esp enc=des hasha=sha create ipsec bund=1 key=isakmp string=1 # IPsec Policy [ISAKMP_MESSAGE] create ipsec pol=isakmp_mes0 int=eth0 ac=permit lp=500 rp=500 tra=udp # IPsec Policy [IPSEC_NUS] create ipsec pol=IPSEC_NUS int=eth0 ac=ipsec key=isakmp bund=1 peer= set ipsec pol=IPSEC_NUS lad= lma= rad= rma= # IPsec Policy [IPSEC_VGHTC] create ipsec pol=IPSEC_VGHTC int=eth0 ac=ipsec key=isakmp bund=1 peer= set ipsec pol=IPSEC_VGHTC lad= lma= rad= rma= # IPsec Policy [IPSEC_CHHK] create ipsec pol=IPSEC_CHHK int=eth0 ac=ipsec key=isakmp bund=1 peer= set ipsec pol=IPSEC_CHHK lad= lma= rad= rma= # IPsec Policy [IPSEC_SJTU] create ipsec pol=IPSEC_SJTU int=eth0 ac=ipsec key=isakmp bund=1 peer= set ipsec pol=IPSEC_SJTU lad= lma= rad= rma= # IPsec Policy [INTERNET] create ipsec pol=internet1 int=eth0 ac=permit