Secure FTP implementation on DATMS-U Walter L. Coley, Jr JAG/CCM.

Slides:



Advertisements
Similar presentations
Presenter: Mark Elkins Topic: Things not getting done.
Advertisements

ICAO Aviation Considerations for Internet Mobility Services ICAO WG N-1 Meeting #5 Montreal, Canada November 7-10, 2005 ACP/SWGN1-5 th meeting FL 502.
Working with the Internet
NAVY FTP POLICY September 06 CDR Dave Pashkevich CNMOC N64.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
Copyright © 1999 Telcordia Technologies All Rights Reserved Christian Huitema An SAIC Company IPv6: Connecting 6 billion.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Working Group for Consolidated Communications Management (JAG-CCM) Update Spring CSAB 2008 Mr. Charles Abel AFWA JAG Representative.
Effects of restricting ports 20/21 on DoD Networks and Information Transfer Operations Fall COPC 2007 Mr. Walter L. Coley, Jr. JAG/CCM Chair.
Password?. Project CLASP: Common Login and Access rights across Services Plan
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 COPC Shared-Network Infrastructure Brief Prepared for: COPC Working Group for Cooperative Support and Backup (WG/CSAB) October 21 and 22, 2008 Meetings.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Client Solution Secure collaboration with partners on customer initiatives and transactions Internal users push content to site without multiple authentication.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Southeast Alaska Network Inventory & Monitoring Program March 16, 2011 Southeast Alaska Network Inventory & Monitoring Program March 16, 2011 Bill Johnson.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Telnet/SSH: Connecting to Hosts Internet Technology1.
Course 201 – Administration, Content Inspection and SSL VPN
Lecture 5 Title: Networks and Businesses
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
IT Infrastructure Transformation – VPN Services 0 Enterprise VPN Don Kendrick, VITA Senior Manager, Security Operations August 25, 2009.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
UNITED STATES POSTAL INSPECTION SERVICE J. J. Rowan Acting Chief Postal Inspector MTAC May 16, 2002.
JAG/CCM Update COPC Spring 2006 Mr. Walter Coley JAG/CCM Chairman Distribution Authorized to U.S. Government Agencies and their Contractors only.
UNCLASSIFIED NGA NIPRNET Presentation to FLIP Coordinating Committee, Digital Working Group Larry Glick, (314) , Aeronautical.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
NAVY UTN-P & FTP POLICY UPDATE 16 April 07 CDR Dave Pashkevich CNMOC N64.
Module 9: Fundamentals of Securing Network Communication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Air Force Weather Agency FTP Replacement Briefing 08 Sep 06.
Module 5: Designing Security for Internal Networks.
Working Group for Consolidated Communications Management (JAG-CCM) Update Fall COPC 2007 Mr. Walter Coley JAG Chairman.
DoD Network Initiatives CEISC 13 Apr 2006 Mr. Walter Coley Ms. Kathy Cotton AFWA/SCM Distribution Authorized to U.S. Government Agencies and their Contractors.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Emerging Infectious Program (EIP) Web Service CHIIC Update May 12, 2015 Jason Hall – NCEZID, CDC Sreeni Kothagundu, Northrop Grumman – NCEZID, CDC National.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Introduction to Secure Shell Greg Porter Data Processing Manager USPFO For California.
Networking Network Classification, by there: 3 Security And Communications software.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
DoD Qualification Database DoD Standardization Conference March 18, 2004 Briefer: Donna McMurry, DSPO.
Uniform Resource Locator URL protocol URL host Path to file Every single website on the Internet has its own unique.
March 04 Slide 1 E-cert Overview T e P o u O r a n g a K a i O A o t e a r o a © Electronic Health Certification of New Zealand Agricultural Products.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Web Development Web Servers.
Implementing Network Access Protection
CJIS Security Policy Version 5.4, 10/06/2015
Introduction to Networking
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

Secure FTP implementation on DATMS-U Walter L. Coley, Jr JAG/CCM

Background Why Status (Air Force, Navy, NOAA) Summary

Why Internet communication uses IPv4 –System relies on ports to carry information –Current system has ports Ports are used to gain system access  DOD has decided to close or restrict the use all but 7 of these ports

Why (cont)  All DoD agencies using FTP for data transfer to any agency residing outside of the.mil domain (.com,.org,.gov,.edu, etc.) must transition to secure method of FTP prior to ports 20 and 21 being closed  JTF-GNO will issue Warning Order giving all agencies days to make transition prior to port closure  All solutions must be FIPS compliant IPv6 not addressed

Status - Navy Near Term –FNMOC is prepared to disable ports 20,21 (FTP) –All FTP customers or data providers have not converted to approved protocols –Major customers have been notified of the anticipated changes Far Term –Add PKI and Server Authentication

Status – Air Force Near Term –Use Commercial and Open Source Secure- FTP and HTTPS to transfer products –Convert some customers to retrieve products –Apply for exception as required Long Term –Use server certificates (PKI) to verify users

NOAA Near Term –Uses Secure FTP between centers –Easily add external SFTP capability –Will keep FTP capability for now Long Term –All plus server authentication (PKI)

Summary All sites are progressing Some issues with limited products New Protocols on horizon may require significant changes We have a safety net