HKOM+ Marko Erjavec. Goals for HKOM+ Lower the connection expensess (today:lease connections) Lower the maintenace and managing expensess (goal: With.

Slides:



Advertisements
Similar presentations
To ensure quality instruction and educational success, NVC Information Technology is committed to delivering high quality technical leadership, resources,
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Internet Access for Academic Networks in Lorraine TERENA Networking Conference - May 16, 2001 Antalya, Turkey Infrastructure and Services Alexandre SIMON.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
What is the Arkansas State Network? – Agencies, Boards, & Commissions by Arkansas code – K12 – Higher Education by Arkansas code – Others 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Firewall Configuration Strategies
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
Understanding Eligible Services I 2013 Schools and Libraries Fall Applicant Trainings 1 E-rate Program Understanding Eligible Services.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Table Of Contents Introduction What is WAN? Point to Point Links Circuit Switching Packet Switching WAN Virtual Circuits WAN Dialup Services WAN Devices.
EWAN Equipment Last Update Copyright 2010 Kenneth M. Chipps Ph.D. 1.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
HKOM+ Marko Erjavec. Goals for HKOM+ Lower the connection expensess (today:lease connections) Lower the maintenace and managing expensess (goal: With.
GOVERNMENT DATA NETWORK Central Informatics Organization GDN.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Chapter 5 Networks Communicating and Sharing Resources
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Auditing Information Systems (AIS)
The Technical Aspect of the Slovene eGovernment Solution: Information and Communication Infrastructure as a Precondition for a Successful eGovernment Marko.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
ISSS/LORIS 2003 Hradec Kralove, March 24, European Cross-border Cooperation in eGovernment: the Role of the IDA Programme Gzim Ocakoglu European.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 10 Securing the network perimeter.
Revised January 25, 2000 Diagram Icons. 2 ICON LIBRARY Diagram Icons – CoSine IPSX Unit and CoSine Software Icons CoSine Equipment CoSine IPSX.
Building Corporate Data Networks – A Case Study
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
DG CONNECT NIPS Study – CONSULTATION CONFERENCE 13 November 2013
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Central Anti Fraud and Law Enforcement Department The Central Anti Fraud and Law Enforcement Department was founded in 1995 with Austria´s accession to.
CompTIA Network+ Certification Exam Question Answer N
Amerissa Efstathiou Aikaterini Bouzounieraki Ministry of Economy and Finance, Greece Central Liaison Office 1 NEW MODELS OF VAT EVASION EXPERIENCED IN.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Cisco Discovery 3 Chapter 1 Networking in the Enterprise JEOPARDY.
CONNECTING TO THE INTERNET
IS4550 Security Policies and Implementation
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
IS4680 Security Auditing for Compliance
Instructor Materials Chapter 8: Applied Networking
Topic 12: Virtual Private Networks
AT&T Firewall Battlecard
Global One Communications
Presentation transcript:

HKOM+ Marko Erjavec

Goals for HKOM+ Lower the connection expensess (today:lease connections) Lower the maintenace and managing expensess (goal: With one man maintain whole network) –Lower the needed human resources for network maintanance –Lower the complexity of configurations on remote locations: configuration standardisation – simplification of maintenance and management of configurationj –Rule optimisation: Rules on whoo, what and when someone communicate are located in one central point Enabling new services: –VoIP –Multicast Quality supervising on ousourcers and outtaskers Connection to remote locations should be posssible on every known – possible connection independent of connection povider –Frame relay (todays connectios) –Internet –MPLS –Leased lines(copper, optics) –Providers: Telekom, Volja, Amis, Mobitel, Satelite, Vimax …. Bandwidth increase –Possibility of application centralisation (SPIS) –Possibility of introducing and centralisation of VoIP Traffic restriction inside the HKOM+ with MPLS technology Security: Availability, integrity, confidentiality Preparation to EU presidency – process audits an security reqirements in year 2007 Akreditation to security level - restraint Redefinition of procesesses for building, maintenance and manage of network in accordance to appropriate standards and best practices Virtualisation of devices and connections

Present production state 800 locations 80 pops Ljubljana users 1600 LANs

Future production state 800 end locations 1600 LANs users Ljubljana Internet Satelite Telekom Mobitel

Goals enabling Increasing altogether bandwidth from aprox. 1Gb/s to 8Gbit/s, by changing from leased lines to flat rate. Lower the connection expensess –Tender for Providers ability to provide different bandwidths on different locations(800) Informational request to all (15) providers gave us following results:

Informational request

Goals Enabling Security: –Availability: Every remote location is connected to two independent providers NIC Maribor – backup location with all functionality as Primary location in Ljubljana Every provider is connected to Ljubljana and Maribor –Integrity, Confidentiality: All traffic to remote locations is crypted (certificates SIGOV-CA) Preparation to EU presidency – preparation of security procesess according to standard ISO and special EU security standards Collaboration with security agency to get knowledge of special requirements and influence on creation of security requirements.

Goals enabling On all remote locations standardised interface is ethernet (UTP cable, RJ45 connector) Some remote locations have more than one LAN Every LAN has three ethernet connections: –Data –VoIP –DMZ – for larger agencies that have their own IT department and internet applications All configurations on remote locations have the same configuration except IP address and name

How we started Negotiating with Telekom –We got good negotiating position with results from Informational request Equipement purchase Designing and building LAB LAB connection to the production network – it is now part of production Making pilot instalations on existing leased lines and new flat rate connections Large deployment to existing leased lines and new flat rate lines –In two months all 600 routers will be placed on site

LAB design

Production state

Physical/Logical Topology MPLS VPN GRE over IPsec

Logical Topology

Detailed LAB picture

Configuration standardisation Every remote LAN has three ethernet connections –Data –VoIP –DMZ – just for some organisation If some exception exist, it must become standard configuration in at least two months. That implies that in two months we have to change “configurator” application Configurator will became center point of provisionng and maintenace of whole HKOM+ network We expect new revisions every two months. Now it covers five differrent Cisco routers and switches that we use in HKOM+ Daily configuration on firewall must be done through CSM – command line is not permited

Configurator

Other tools MARS –Analitical – corelation tool to predict possible problems in network - Netflow CSM –Cisco firewall GUI configuration tool Cisco works - configuration management on end routers Monitor –Custom designed HW and SW for larger (important) remote locations to measure availability of services and SLA OpenView Help desk software –Registering every incident –Making reports, knowledgebase IDS/IPS: ISS products (Proventia, Black ice…) Conclusion: –Everyday work on network is done by CSM and Help desk. Other tools are for alarming and observing network.

Services HKOM offer different services to its users HKOM need different services to function properly Services must never go down (24/7)

Services HKOM services: –DNS – inside and outside, registrar –Proxy –Remote access for outsourcers –Remote access for users –Authentication, authorisation, accounting –Video conferencing, Video streaming –Syslog –Radius –IPS for all agencies on central point –Firewalling for all traffic that comming or leaving HKOM (internet, ousourcers, some gov. Agencies, EU netw., Data center) –SecurID issue –Mail for some organisations –Access for concessionaires –Load balancing for different web applications (content manager) –Connection to EU networks –Voice (telephone)

EU networks Network H K O M Network C C N Network E X T R A N E T Network T E S T A I I

EU networks CCN – Common Communication Network  Network CCN is under the jurisdiction of EC, DG TAXUD (European Commission, Directorate General for Taxation and the Customs Union)  Network CCN has been established for interchange of regular customs and taxation data  Over network CCN also special data are interchanged - AFIS (Anti-Fraud Information Systems) under the jurisdiction of EC OLAF (European Commission, European Anti-Fraud Office)  Primary connection: leased line -> 256 kb/s  Secondary connection: ISDN  Data crypting: yes Network C C N

Network H K O M Network C C N EU networks CCN – Common Communication Network Ministry of Finance Customs Administration Ministry of Finance Tax Administration Ministry of Finance VIES (VAT Information Exchange System) – system for VAT number validation NCTS (New Computerised Transit System) CIS (Customs Information System) - TARIC (TARif Intégré Communautaire), QUOTA,… AFIS (Anti-Fraud Information Systems) – systems for detecting and preventing frauds, corruption and other illegal activities with financial consequences

EU networks TESTA – Trans-European Services for Telematics between Administrations  Network TESTA II is under the jurisdiction of EC, ENTERPRISE DG (European Commission, Enterprise Directorate-General)  Network TESTA II is one of the generic services of the Programme IDA (Interchange of Data between Administrations Programme: a European Community Programme)  Projects using network TESTA II: 14POINTS, AFIS, CARE, CIRCA, DUBLINET, ECB.NET, EUDRANET, EUPHIN, EURAMIS, EURODAC, EUROSTAT, FIDES, FIUNET, INTRACOM, PROCIV-NET, SAFESEANET, SFC, SIGL, TACHONET in TESS (most of them are projects of common interest) Network T E S T A I I

EU networks TESTA – Trans-European Services for Telematics between Administrations Network H K O M Network T E S T A I I Office for Money Laundering Prevention Ministry of Finance Ministry of the Interior Ministry of the Economy Administration for Civil Protection and Disaster Relief Ministry of Defense Ministry of Transport  Primary connection: leased line -> 256 kb/s  Secondary connection: leased line -> 256 kb/s  Data crypting: yes

 FIU.NET (Financial Intelligence Unit) – system for money laundering detection and prevention  EURODAC – system for fingerprints comparison (identification process of the asylum applicants)  DUBLINET – system for interchanging data about the asylum applicants (DUBLIN II regulation)  SIGL – system for textile and steel import quota checking (before issuing the import documentation)  PROCIV-NET (Civil Protection and Environmental Emergencies European Network) – system for interconnecting national civil protection institutions; essential information interchanging (CECIS - Common Emergency Communication and Information System)  TACHONET – system for interchanging data about professional truck drivers and truck journey (digital tachograph) Network T E S T A I I EU networks TESTA – Trans-European Services for Telematics between Administrations

I N T E R N E T (VPN, Crypto) EXCEPTION:  EUDRANET – system for interchanging data about pharmaceutical products (competence: Agency for Medicinal Products and Medicinal Devices of the Republic of Slovenia, Ministry of Health)

EU networks EXTRANET – Extranet Network  Network EXTRANET is under the jurisdiction of the General Secretariat of the Council of the European Union  Network EXTRANET has been established for interchanging documents in electronic form (sent from the GSC EU to the EU member states)  Primary connection: leased line -> 256 kb/s  Secondary connection: ISDN (4 channels)  Data crypting: yes Network E X T R A N E T

EU networks EXTRANET – Extranet Network Network H K O M Network E X T R A N E T EU-Portal  U32Mail - in Slovenia documents are available over dedicated EU-Portal application