October 24, 2005 Network Firewall Configuration and Control Concerns Brent Hirschman

Slides:



Advertisements
Similar presentations
Integration of PAP site 17 th July 10. Requirements of PAP SITE  Bandwidth drop  Router  RJ45 cables  Switch  Gateway  Nodes  Ups  9urack.
Advertisements

Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
ITKS540 Fall 2008University of Jyväskylä ITKS540 Introduction to mobile technology and business Jani Kurhinen Fall 2008.
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Skype Connected to a SIP PBX
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Campus Networking Best Practices Session 2: Layer 3 Dale Smith University of Oregon & NSRC
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Lucent Technologies – Proprietary Use pursuant to company instruction 1 3GPP2 Workshop MMD IMS Architecture June 28, 2005 Anne Y. Lee IMS Systems Engineering.
Web-based E-commerce Architecture
x Evolution Architecture Functional Proposal Abstract: This contribution proposes a new architectural network element called an.
IPv6 and IPv4 Coexistence Wednesday, October 07, 2015 IPv6 and IPv4 Coexistence Motorola’s Views for Migration and Co-existence of 3GPP2 Networks to Support.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Operational Security Capabilities for IP Network Infrastructure
© 2006 Sprint Nextel. All rights reserved.Operator Discussion Issues0 Title:Evolution Architecture Reference Model Abstract:This contribution proposes.
QUALCOMM PROPRIETARY 3GPP2 Network Evolution Architecture Dec. 04, 2006 Lucent Technologies Nortel Networks Qualcomm Inc. Hitachi, Ltd Huawei Technologies.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop - draft - Jack Nasielski
VolNet2 Bill White Network Services. September 20, 2004OIT Fall Staff Meeting Why Volnet2? Based on the Security Assessment findings Insecure protocols.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
1 Policy-based architecture. 2 Policy management view of the architecture IP MMed domain is a converged services domain where voice, video, data are provided.
Terri Lahey Control System Cyber-Security Workshop October 14, SLAC Controls Security Overview Introduction SLAC has multiple.
1 A VPN based approach to secure WLAN access John Floroiu
Wireless Intrusion Prevention System
February 20, 2007 LBS Roaming Settlement Conference Call May 7th, 2007.
Introduction & Vision. Introduction MANTICORE provides a software implementation and tools for providing and managing routers and IP networks as services.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
A Network Security -Firewall Bruce Turin.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Example of use of a color-coded blueprint to assign work to TSGs.
© 2006 Sprint Nextel. All rights reserved.Operator Discussion Issues0 Title:Evolution Architecture Reference Model Abstract:This contribution proposes.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
0 Title:Evolution Architecture Functional Proposal Abstract: This contribution proposes a new RAN Architecture. Source: Brent Hirschman, Sprint Nextel.
x XXX Sprint_AG_proposal 0 Title:Evolution Architecture Functional Proposal Abstract: This contribution proposes a new architectural.
Access Control Chapter 3 Part 4 Pages 227 to 241.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
I2RS Overlay usecase 1 Fangwei hu Bhumip Khasnabish.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Integration of and Third-Generation Wireless Data Networks
Managing Secure Network Systems
TECHNOLOGY GUIDE THREE
High Performance Computing Lab.
Pertemuan 19 Introduction to TCP/IP
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
IS4550 Security Policies and Implementation
Computer Security Network Security
Gregory Morton COSC380 February 16, 2011
ISMS Information Security Management System
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Introduction to Network Security
Global One Communications
Presentation transcript:

October 24, 2005 Network Firewall Configuration and Control Concerns Brent Hirschman

1 Major Concerns for Security Greatest concern for security is impact on RF Resources Handset viruses becoming significant concern Intrusion Detection system needs to be included Need to “Shut Down” Rogues Security Architecture Concerns Parallel architectures for QoS, Security, AAA Introduction of new Protocols Intrusion Detection System Impact

2 Architecture Concerns Basic NFCC Architecture Session Mgr Profile Mgr Ntwk Pres. Agent Traffic Filters RAN IP Ntwk User Profile DB NNI NLSP or PFCP

3 Intrusion Detection and Prevention Systems VAAAHAAA HA Access Router PDSN RAN IP Ntwk RAD or DIA NNI IP Ntwk Intrusion Detection and Prevention System Intrusion Detection System

4 Architecture Concerns Additional Capability of Intrusion Detection Session Mgr Profile Mgr Ntwk Pres. Agent Traffic Filters RAN IP Ntwk User Profile DB NNI NLSP or PFCP Intrusion Detection System Change Filters and tell PM of change and cause.

5 Architecture Concerns - Basic AAA Picture VAAAHAAA HA Access Router PDSN RAN IP Ntwk User Profile DB RAD or DIA NNI

6 Architecture Concerns Basic NFCC Architecture Session Mgr Profile Mgr Ntwk Pres. Agent Traffic Filters RAN IP Ntwk User Profile DB NNI NLSP or PFCP

7 Architecture Concerns Basic QoS Architecture Visited PDP Home PDP PEP RAN IP Ntwk User Profile DB NNI COPS-PR

8 Architecture Concerns Overlay Architecture – Why so many protocols? AAA/SM/ PDP AAA/PM/ PDP HA/NPA/ PEP PDSN/TF/ PEP RAN IP Ntwk User Profile DB NNI RAD/DIA NSLP/PFCP COPS-PR

9 Protocol Changes needed RADIUS/DIAMETER – Need Peering and negotiation – only DIAMETER COPS-PR – Need Visited and Home PDP – needed in world of Remote HAs. NSLP/PFCP – Need for new protocol? Can we put it in another protocol? Can we design a single protocol to do all this?