MV90 IP Data Transport ERCOT Recommendation John Fisher & Jeff Maddox.

Slides:



Advertisements
Similar presentations
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Advertisements

Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
SCSC 455 Computer Security Virtual Private Network (VPN)
WS-Denial_of_Service Dariusz Grabka M.Sc. Candidate University of Guelph February 13 th 2007.
Network Security Overview Tales from the trenches.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
Internet Protocol Security (IPSec)
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Using LISP for Secure Hybrid Cloud Extension draft-freitasbellagamba-lisp-hybrid-cloud-use-case-00 Santiago Freitas Patrice Bellagamba Yves Hertoghs IETF.
Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
ERCOT Wide Area Network Overview & EDS Communication Standard John Fisher ERCOT Network Manager.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Virtual Private Networks Warren Toomey. Available WAN Links.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
TCP/IP Protocols Contains Five Layers
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
MP Failover DNS Option 1 for API Failover The same DNS structure that allows ERCOT to fail over services between sites can also be used to allow MPs to.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
Module 10: Providing Secure Access to Remote Offices.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
FORESEC Academy FORESEC Academy Security Essentials (III)
NAT & PAT Network Address Translation Port Address Translation.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
Chapter 12: Secure Communications and Network Attacks.
Securing Access to Data Using IPsec Josh Jones Cosc352.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
CSCI 465 Data Communications and Networks Lecture 26
Lab #2 NET332 By Asma AlOsaimi.
Virtual Private Network
Virtual Private Networks,
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Remote Access Lecture 2.
IPSec IPSec is communication security provided at the network layer.
Providing Teleworker Services
* Essential Network Security Book Slides.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Virtual Private Networks
تنظیم مودم D-Link به حالت NAT
NAT Configuration For ZyXEL ADSL Wireless Router
Networks and the Internet
Cengage Learning: Computer Networking from LANs to WANs
Internet protocol stack
OCI – VPN Connect Internet Customer Premises
Presentation transcript:

MV90 IP Data Transport ERCOT Recommendation John Fisher & Jeff Maddox

2 Option 1 – ERCOT WAN MP IP meters are located on MP’s private network MP NAT translates the IP Meters to an ERCOT WAN IP Address ERCOT polls meters over the ERCOT WAN

3 Option 2 - Internet MP IP meters connect to MP network MP presents IP meters to ERCOT through an Internet routable IP address ERCOT polls meters over the secure encrypted IPSEC tunnel

4 Notes Permitting IP meters access to the Internet increases risk –Man-in-the-middle attacks –IP spoofing –Exposing meters to SCADA based attacks (vulnerabilities are an unknown at present) Private networks are more secure and more reliable –Private networks are isolated by the Service Provider from unauthorized users