The Science DMZ and the CIO: Data Intensive Science and the Enterprise
|
|
|
- Sharon Wilkerson
- 10 years ago
- Views:
Transcription
1 The Science DMZ and the CIO: Data Intensive Science and the Enterprise Eli Dart & Jason Zurawski ESnet Science Engagement Lawrence Berkeley National Laboratory RMCMOA Westnet Conference Tempe, AZ January 13 th, 2014
2 Outline What is ESnet? Overview & Mission Scientific Drivers Science DMZ context Where we are Why would you build a Science DMZ? Success factors What makes a Science DMZ successful? Enterprise traffic vs. science traffic Differences Security implications 2 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
3 ESnet at a Glance High-speed national network, optimized for DOE science missions: connecting 40 labs, plants and facilities with >100 networks $32.6M in FY14, 42FTE older than commercial Internet, growing twice as fast $62M ARRA grant for 100G upgrade: transition to new era of optical networking world s first 100G network at continental scale Culture of urgency: 4 awards in past 3 years R&D100 Award in FY13 5 out of 5 for customer satisfaction in last review Dedicated staff to support the mission of science 3 ESnet Science Engagement ([email protected]) - 1/13/2015
4 Network as Infrastructure Instrument Vision: Scientific progress will be completely unconstrained by the physical location of instruments, people, computational resources, or data. 4 ESnet Science Engagement ([email protected]) - 1/13/2015
5 High Energy Physics Biological and Environmental Research Photo courtesy of LBL Nuclear Physics Photo courtesy of JGI Photo courtesy of NIST Advanced Scientific Computing Research Basic Energy Science Photo courtesy of LBL Fusion Energy Sciences Photo courtesy of SLAC Photo courtesy of PPPL 5 ESnet Science Engagement ([email protected]) - 1/13/2015
6 Traditional Big Science 6 ESnet Science Engagement ([email protected]) - 1/13/2015
7 Big Science Now Comes in Small Packages 7 ESnet Science Engagement ([email protected]) - 1/13/2015
8 Outline What is ESnet? Overview & Mission Scientific Drivers Science DMZ context Where we are Why would you build a Science DMZ? Success factors What makes a Science DMZ successful? Enterprise traffic vs. science traffic Differences Security implications 8 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
9 The Science DMZ in 1 Slide Friction free network path Highly capable network devices (wire-speed, deep queues) Virtual circuit connectivity option Security policy and enforcement specific to science workflows Located at or near site perimeter Dedicated, high-performance Data Transfer Nodes (DTNs) Hardware, operating system, config all optimized for data transfer High-performance data transfer tools such as Globus Performance test and measurement perfsonar 2013 Wikipedia 2015 Globus Science engagement Map experiments onto cyberinfrastructure Work with users to ensure they are successful Details at 9 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
10 Science DMZ Design Pattern (Abstract) 10 ESnet Science Engagement - 1/13/ , Energy Sciences Network
11 Context: Science DMZ Adoption DOE National Laboratories Both large and small sites HPC centers, LHC sites, experimental facilities NSF CC-NIE and CC*IIE programs leverage Science DMZ $40M and counting (third round awards coming soon, estimate additional $18M to $20M) Significant investments across the US university complex, ~130 awards Big shoutout to Kevin Thompson and the NSF these programs are critically important National Institutes of Health 100G network infrastructure refresh US Department of Agriculture Agricultural Research Service is building a new science network based on the Science DMZ model Other US agencies looking at Science DMZ model NASA NOAA Australian Research Data Storage Infrastructure (RDSI) Science DMZs at major sites, connected by a high speed network ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
12 Context: Community Capabilities Many Science DMZs directly support science applications LHC (Run 2 is coming soon) Experiment operation (Fusion, Light Sources, etc.) Data transfer into/out of HPC facilities Many Science DMZs are Software Defined Networking (SDN)-ready Openflow-capable gear SDN research ongoing High-performance components High-speed WAN connectivity perfsonar deployments DTN deployments Metcalfe s Law of Network Utility Value proportional to the square of the number of DMZs? n log(n)? Cyberinfrastructure value increases as we all upgrade 12 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
13 Strategic Impacts What does this mean? We are in the midst of a significant cyberinfrastructure upgrade Enterprise networks need not be unduly perturbed E.g. Remove the restrictions from scientific operation so they can run better, and the enterprise network will benefit as well. Significantly enhanced capabilities compared to 3 years ago Terabyte-scale data movement is much easier Petabyte-scale data movement possible outside the LHC experiments 3.1Gbps = 1PB/month (Try doing that through your enterprise firewall!) Widely-deployed tools are much better (e.g. Globus) Raised expectations for network infrastructures Scientists should be able to do better than residential broadband Many more sites can now achieve good performance Incumbent on science networks to meet the challenge Remember the TCP loss characteristics Use perfsonar Science experiments assume this stuff works we can now meet their needs 13 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
14 Why Build A Science DMZ? Data set scale Detector output increasing 1Hz 10Hz 100Hz 1kHz 1MHz HPC scale increasing Increased model resolution increased data size Increased HPC capability means additional problems can now be solved Sequencers, Mass Spectrometers, Data placement Move compute to the data? Sure, if you can otherwise you need to move it Who needs the raw data? Anyone working on processing algorithms for raw data Anyone aggregating/integrating data sets (absent perfect prior reduction) Anyone doing data analysis for which a canned service does not exist Without a Science DMZ, this stuff is hard Can you assume nobody at your institution will do this kind of work? If this kind of work can t be done, what does that mean in 5 years? 14 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
15 Outline What is ESnet? Overview & Mission Scientific Drivers Science DMZ context Where we are Why would you build a Science DMZ? Success factors What makes a Science DMZ successful? Enterprise traffic vs. science traffic Differences Security implications 15 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
16 What Makes A Science DMZ Successful? A Science DMZ is successful when it s useful Contribution to science outcomes Reduced cost for supporting science projects Enable research that could not otherwise be done Several different parts to this Networking organization must understand it Systems organization must understand it Security organization must understand it Scientists/researchers must understand it Once everyone understands it and agrees, then it s just implementation How do we bring this about? 16 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
17 Networking and Systems It s pretty easy for networking folks to understand this stuff It s networking stuff, after all Sometimes a bit trickier to explain it to senior leadership Roll up the technical detail Strategic implications rather than bits and bytes Systems folks are generally on board as well DTNs are straightforward Most systems folks tend to like performance anyway Systems people deal with users a lot they like to be able to make users happy 17 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
18 Security Security folks can be harder to convince Firewall people in particular can be a challenge We have seen some very steadfast firewall people They can kill a project if they aren t on board Depending on the personalities involved, data may not be enough In some cases, getting the security people on board means senior leadership giving them orders try to avoid that if possible Remember most of us work for science organizations If science is the primary mission, then everybody works for the scientists In a lot of cases security is reasonable they just need to be included rather than dictated to (Security people like performance too) E.g. if a 10G flow is going to hurt the way a firewall works, the risks are well known for this flow, then it makes sense to discuss ways to route the traffic in a manner that is not harmful for anyone. Start the conversation. 18 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
19 Science Engagement Scientists and researchers need to be able to use cyberinfrastructure If I can t use a tool, that tool doesn t exist for me There are already too many tools we can t expect folks to find the right ones at random Scientists don t have the cycles to be system integrators Science engagement bridges the gap Understand what the scientists need to do with their data Understand the capabilities of the cyberinfrastructure Map the science onto the infrastructure Understanding the infrastructure is straightforward for us We re infrastructure people, right? How do we understand the science? Requirements and Relationships 19 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
20 Requirements Requirements what does the science project need? Several different ways of getting to this We can be told late, or we can go find out (I prefer to be proactive) ESnet requirements process: Characterize science project from multiple angles Instruments and facilities Hardware of science Detectors, telescopes, tokamaks, HPC facilities Tells us about the data where, how fast, how much, etc. Process of science How do scientists use the data for discovery? Where does the data need to go? How is it analyzed? What time scale? Assessments done in formal reviews 20 ESnet Science Engagement - 1/13/ , Energy Sciences Network
21 Requirements Review Structure Several key elements Case studies provide a network-centric narrative of the science Requirements synthesized from science instruments, facilities, and science process in collaboration with science programs Process details are important Four actors have the same conversation at the same time ESnet, ESnet program management at DOE Senior science program members, science program management at DOE Open discussion about needs, issues, changes, best practice All parties have the same conversation in the same room at the same time Common understanding of program needs and the solutions ESnet undertakes to meet those needs Review reports are vetted by ESnet and by both programs 21 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
22 2013 BER Sample Findings: Environmental EMSL Molecular frequently needs to ship physical copies of media to users when data sizes Sciences exceed a few GB. More often than not, this is due to lack of bandwidth or Laboratory storage resources at the user's home institution. (EMSL)
23 Relationships Relationships familiarity, understanding, trust Work with science collaborations to understand their needs Make their lives better Fix problems Give them better tools and workflows Make sure you are accurate (expectations are important) Check in with people periodically I make it a practice to ask is there anything we need to talk about? Often people won t come to you first, but they will give you a chance to help if you check in Once you get a reputation for solving problems, it all gets easier People come to you first You get in early on the planning People are more willing to push the envelope 23 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
24 Outline What is ESnet? Overview & Mission Scientific Drivers Science DMZ context Where we are Why would you build a Science DMZ? Success factors What makes a Science DMZ successful? Enterprise traffic vs. science traffic Differences Security implications 24 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
25 Science Traffic What Makes It Special? Large scale data transfers are a hallmark of science traffic Yes, scientists use web browsers, , etc. However, moving the data is the differentiator Enterprise traffic is typically composed of a large number of small flows Web, , document sharing, IP phones, VPNs carrying all of the above We distinguish these in the following way: Large-scale science traffic: Elephant flows Enterprise traffic: Mouse flows 25 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
26 ESnet is not the Commercial Internet 26 ESnet Science Engagement - 1/13/ , Energy Sciences Network
27 Commodity Traffic: Peering Interface 27 ESnet Science Engagement - 1/13/ , Energy Sciences Network
28 Science Traffic: Peering Interface 28 ESnet Science Engagement - 1/13/ , Energy Sciences Network
29 Support For Science Traffic The Science DMZ is typically deployed to support science traffic Typically large data transfers over long distances In most cases, the data transfer applications use TCP The behavior of TCP is a legacy from the congestion collapse of the Internet in the 1980s Loss is interpreted as congestion TCP backs off to avoid congestion performance degrades Performance hit related to the square of the packet loss rate Addressing this problem is a dominant engineering consideration for science networks Lots of design effort Lots of engineering time Lots of troubleshooting effort 29 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
30 A small amount of packet loss makes a huge difference in TCP performance Local (LAN) With loss, high performance beyond metro distances is essentially impossible International Metro Area Regional Continental Measured (TCP Reno) Measured (HTCP) Theoretical (TCP Reno) Measured (no loss) 30 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
31 Security Implications For Traffic Types We have two distinct traffic profiles Commodity/enterprise traffic Many, many mouse flows High loss tolerance (they are low-bandwidth flows anyway) Science traffic Small number of elephant flows Very sensitive to loss Traditional security approaches (i.e. enterprise firewalls) cause performance problems If we look at the security implications for science and commodity traffic, what do we see? 31 ESnet Science Engagement - 1/13/ , Energy Sciences Network
32 Commodity Traffic Web Broswers What does a web browser do? Download a text file from a web server (may be dynamically generated) Render what we download Fetch and render a bunch of other stuff based on links When there is nothing left to fetch and render, the page is done What is all this stuff? HTML (fine it s a web browser, after all) Mobile code (sometimes useful, sometimes hostile) Images to display Rich media content (Flash and friends) Impossible to attribute content to people in practice 32 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
33 Science Traffic (DTN) A Data Transfer Node doesn t run commodity applications Or, at least, it shouldn t If people are running that goo on your DTN, shut it down What does a DTN do? Negotiate a transfer with remote DTN Open a few data connections Push a few TB over those connections Close the connections If data is being written, it s being written by someone with an account (presumably you ve already vetted that user if you gave them the account) 33 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
34 Commodity Traffic Attack Surface There is a large attack surface involved with commodity traffic Mobile code execution Media codecs Image rendering libraries Go look at what some common web pages do Say your users are into sports, or celebrity gossip, or news blogs *. Maybe even watching a self-help video on youtube ** Go look at some popular sites (your users do at lunch time!) You don t have to get fancy just turn on the javascript console Look at all the places content comes from, what gets executed Mobile code comes down as code, or maybe as text (but gets executed) Images come down as images, or maybe as encoded text (but rendered as images) Content comes from all over the place, depending on who bought what ad space All of this comes over port 80 or port 443 standard web stuff * ** 34 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
35 Science Traffic Attack Surface There is one listening service the data transfer tool (assume Globus) Port 2811: control Ports 443 and 7512: oauth (ports depend on config) Large data port range (1001 ports 50,000 to 51,000) Data ports are open during a transfer Closed otherwise Nice clean behavior just POSIX file operations (open, read, write, close) No image rendering No rich media No document rendering No mobile code 35 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
36 Attack Surface Which is Greater? A web browser typically uses just two ports 80 and 443 Most firewall people count that as two Web is a normal service, critical for business functions A Globus DTN uses over 1000 ports Many naïve security people count that as too many Weird service, they don t understand it, and too many ports A naïve security person will view the DTN as more dangerous because of the high port count This is not rational If you look at attack surfaces, the web browser is far more dangerous Web browsers render and execute whatever the net hands them Port count has little to do with an application s attack surface 36 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
37 To Each Its Own The preceding is another example of why science traffic and commodity traffic should be separated Enterprise traffic is enterprise traffic, and requires enterprise engineering solutions Sufficient aggregate bandwidth Inexpensive hardware Firewalls Proxies Virus scanners Science traffic is science traffic, and requires science engineering solutions Highly capable gear Loss-free IP layer for TCP performance High per-flow bandwidth, and tools that can use it High visibility (perfsonar) Specific security policy tailored to science applications 37 ESnet Science Engagement - 1/13/ , Energy Sciences Network
38 Science DMZ Moving Forward This is about the science Build it well, make sure they can use it Reminder of the ESnet vision: Scientific progress is completely unconstrained by the physical location of instruments, people, computational resources, or data Collaborations at every scale, in every domain, will have the information and tools they need to achieve maximum benefit from global networks We are here to help: Want to talk architecture? Want to ask about requirements for your own site? 38 ESnet Science Engagement - 1/13/ , Energy Sciences Network
39 Thanks! Eli Dart Jason Zurawski Energy Sciences Network (ESnet) Lawrence Berkeley National Laboratory
40 Extra Slides 40 1/13/2015
41 Science DMZ Security Goal disentangle security policy and enforcement for science flows from security for business systems Rationale Science data traffic is simple from a security perspective Narrow application set on Science DMZ Data transfer, data streaming packages No printers, document readers, web browsers, building control systems, financial databases, staff desktops, etc. Security controls that are typically implemented to protect business resources often cause performance problems Separation allows each to be optimized 41 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
42 Performance Is A Core Requirement Core information security principles Confidentiality, Integrity, Availability (CIA) Often, CIA and risk mitigation result in poor performance In data-intensive science, performance is an additional core mission requirement: CIA PICA CIA principles are important, but if performance is compromised the science mission fails Not about how much security you have, but how the security is implemented Need a way to appropriately secure systems without performance compromises 42 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
43 Placement Outside the Firewall The Science DMZ resources are placed outside the enterprise firewall for performance reasons The meaning of this is specific Science DMZ traffic does not traverse the firewall data plane Packet filtering is fine just don t do it with a firewall Lots of heartburn over this, especially from the perspective of a conventional firewall manager Lots of organizational policy directives mandating firewalls Firewalls are designed to protect converged enterprise networks Why would you put critical assets outside the firewall??? The answer is that firewalls are typically a poor fit for highperformance science applications 43 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
44 Firewall Internals Typical firewalls are composed of a set of processors which inspect traffic in parallel Traffic distributed among processors such that all traffic for a particular connection goes to the same processor Simplifies state management Parallelization scales deep analysis Excellent fit for enterprise traffic profile High connection count, low per-connection data rate Complex protocols with embedded threats Each processor is a fraction of firewall link speed Significant limitation for data-intensive science applications Overload causes packet loss performance crashes 44 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
45 Thought Experiment We re going to do a thought experiment Consider a network between three buildings A, B, and C This is supposedly a 10Gbps network end to end (look at the links on the buildings) Building A houses the border router not much goes on there except the external connectivity Lots of work happens in building B so much that the processing is done with multiple processors to spread the load in an affordable way, and results are aggregated after Building C is where we branch out to other buildings Every link between buildings is 10Gbps this is a 10Gbps network, right??? 45 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
46 Notional 10G Network Between Buildings 46 ESnet Science Engagement - 1/13/ , Energy Sciences Network
47 Clearly Not A 10Gbps Network If you look at the inside of Building B, it is obvious from a network engineering perspective that this is not a 10Gbps network Clearly the maximum per-flow data rate is 1Gbps, not 10Gbps However, if you convert the buildings into network elements while keeping their internals intact, you get routers and firewalls What firewall did the organization buy? What s inside it? Those little 1G switches are firewall processors This parallel firewall architecture has been in use for years Slower processors are cheaper Typically fine for a commodity traffic load Therefore, this design is cost competitive and common 47 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
48 Notional 10G Network Between Devices 48 ESnet Science Engagement - 1/13/ , Energy Sciences Network
49 Notional Network Logical Diagram 49 ESnet Science Engagement - 1/13/ , Energy Sciences Network
50 Firewall Performance Example Observed performance, via perfsonar, through a firewall: Almost 20 times slower through the firewall Observed performance, via perfsonar, bypassing firewall: Huge improvement without the firewall 50 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
51 What s Inside Your Firewall? Vendor: but wait we don t do this anymore! It is true that vendors are working toward line-rate 10G firewalls, and some may even have them now 10GE has been deployed in science environments for over 10 years Firewall internals have only recently started to catch up with the 10G world 100GE is being deployed now, 40Gbps host interfaces are available now Firewalls are behind again In general, IT shops want to get 5+ years out of a firewall purchase This often means that the firewall is years behind the technology curve Whatever you deploy now, that s the hardware feature set you get When a new science project tries to deploy data-intensive resources, they get whatever feature set was purchased several years ago 51 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
52 The Firewall State Table Many firewalls use a state table to improve performance State table lookup is fast No need to process entire ruleset for every packet Also allows session tracking (e.g. TCP sequence numbers) State table built dynamically Incoming packets are matched against the state table If no state table entry, go to the ruleset If permitted by ruleset, create state table entry Remove state table entry after observing connection teardown Semantically similar to punt-and-switch model of traffic forwarding used on many older routers 52 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
53 State Table Issues If the state table is not pruned, it will overflow Not all connections close cleanly I shut my laptop and go to a meeting Software crashes happen Some attacks try to fill state tables Solution: put a timer on state table entries When a packet matches the state table entry, update the timer If the timer expires, delete the state table entry What if I just pause for a few minutes? This turns out to be a problem state table timers are typically in the 5-15 minute range, while host keepalive timers are 2 hours If a connection pauses (e.g. control channel waits for a large transfer), the firewall will delete the state table entry from under it the control connection now hangs We have seen this in production environments 53 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
54 Firewall Capabilities and Science Traffic Firewalls have a lot of sophistication in an enterprise setting Application layer protocol analysis (HTTP, POP, MSRPC, etc.) Built-in VPN servers User awareness Data-intensive science flows typically don t match this profile Common case data on filesystem A needs to be on filesystem Z Data transfer tool verifies credentials over an encrypted channel Then open a socket or set of sockets, and send data until done (1TB, 10TB, 100TB, ) One workflow can use 10% to 50% or more of a 10G network link Do we have to use a firewall? 54 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
55 Firewalls As Access Lists When you ask a firewall administrator to allow data transfers through the firewall, what do they ask for? IP address of your host IP address of the remote host Port range That looks like an ACL to me! No special config for advanced protocol analysis just address/port Router ACLs are better than firewalls at address/port filtering ACL capabilities are typically built into the router Router ACLs typically do not drop traffic permitted by policy 55 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
56 Security Without Firewalls Data intensive science traffic interacts poorly with firewalls Does this mean we ignore security? NO! We must protect our systems We just need to find a way to do security that does not prevent us from getting the science done Key point security policies and mechanisms that protect the Science DMZ should be implemented so that they do not compromise performance Traffic permitted by policy should not experience performance impact as a result of the application of policy 56 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
57 If Not Firewalls, Then What? Remember the goal is to protect systems in a way that allows the science mission to succeed I like something I heard at NERSC paraphrasing: Security controls should enhance the utility of science infrastructure. There are multiple ways to solve this some are technical, and some are organizational/sociological I m not going to lie to you this is harder than just putting up a firewall and closing your eyes 57 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
58 Other Technical Capabilities Intrusion Detection Systems (IDS) One example is Bro Bro is high-performance and battle-tested Bro protects several high-performance national assets Bro can be scaled with clustering: Other IDS solutions are available also Netflow and IPFIX can provide intelligence, but not filtering Openflow and SDN Using Openflow to control access to a network-based service seems pretty obvious This could significantly reduce the attack surface for any authenticated network service This would only work if the Openflow device had a robust data plane 58 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
59 Other Technical Capabilities (2) Aggressive access lists More useful with project-specific DTNs If the purpose of the DTN is to exchange data with a small set of remote collaborators, the ACL is pretty easy to write Large-scale data distribution servers are hard to handle this way (but then, the firewall ruleset for such a service would be pretty open too) Limitation of the application set One of the reasons to limit the application set in the Science DMZ is to make it easier to protect Keep desktop applications off the DTN (and watch for them anyway using logging, netflow, etc take violations seriously) This requires collaboration between people networking, security, systems, and scientists 59 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
60 Collaboration Within The Organization All stakeholders should collaborate on Science DMZ design, policy, and enforcement The security people have to be on board Remember: security people already have political cover it s called the firewall If a host gets compromised, the security officer can say they did their due diligence because there was a firewall in place If the deployment of a Science DMZ is going to jeopardize the job of the security officer, expect pushback The Science DMZ is a strategic asset, and should be understood by the strategic thinkers in the organization Changes in security models Changes in operational models Enhanced ability to compete for funding Increased institutional capability greater science output 60 ESnet Science Engagement ([email protected]) - 1/13/ , Energy Sciences Network
61 Commodity vs. Science Traffic Stark difference in behavior Commodity traffic When there are eyeballs, there is traffic No eyeballs, no traffic Web, , etc. Many, many, many mouse flows Science traffic When there is data to move, there is traffic Science facilities run 24x7 Small number of elephant flows Individual workflows are sometimes visible in aggregate statistics 61 1/13/2015
62 Security Footprint of a Globus Transfer 62 1/13/2015
63 Security Footprint of a Globus DTN 63 1/13/2015
Campus Network Design Science DMZ
Campus Network Design Science DMZ Dale Smith Network Startup Resource Center [email protected] The information in this document comes largely from work done by ESnet, the USA Energy Sciences Network see
ESnet Support for WAN Data Movement
ESnet Support for WAN Data Movement Eli Dart, Network Engineer ESnet Science Engagement Group Joint Facilities User Forum on Data Intensive Computing Oakland, CA June 16, 2014 Outline ESnet overview Support
The Science DMZ. Eli Dart, Network Engineer Joe Metzger, Network Engineer ESnet Engineering Group. LHCOPN / LHCONE meeting. Internet2, Washington DC
The Science DMZ Eli Dart, Network Engineer Joe Metzger, Network Engineer ESnet Engineering Group LHCOPN / LHCONE meeting Internet2, Washington DC June 13 2011 Overview Science Needs Data Deluge, new science
Fundamentals of Data Movement Hardware
Fundamentals of Data Movement Hardware Jason Zurawski ESnet Science Engagement [email protected] CC-NIE PI Workshop April 30 th 2014 With contributions from S. Balasubramanian, G. Bell, E. Dart, M. Hester,
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Access control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
The Science DMZ: Introduction & Architecture
The Science DMZ: Introduction & Architecture Eli Dart, Lauren Rotman, Brian Tierney, Jason Zurawski,, Eric Pouyoul ESnet Science Engagement Operating Innovative Networks (OIN) Berkeley, CA Februrary 27
Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott
Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
Large Scale Science, The Science DMZ, SDN/OpenFlow, Security and Cyberinfrastructure Architectures
Large Scale Science, The Science DMZ, SDN/OpenFlow, Security and Cyberinfrastructure Architectures Joe St Sauver, Ph.D. ([email protected] or [email protected]) Internet2 Nationwide Security Programs Manager
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
LHCONE Site Connections
LHCONE Site Connections Michael O Connor [email protected] ESnet Network Engineering Asia Tier Center Forum on Networking Daejeon, South Korea September 23, 2015 Outline Introduction ESnet LHCONE Traffic Volumes
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
The Future Of The Firewall
SECURITY The Future Of The Firewall Jeff Wilson Jeff Wilson is principal analyst, VPNs and security with Infonetics Research (www.infonetics.com), specializing in firewalls, IDS/IPS, VPNs, integrated security
CS514: Intermediate Course in Computer Systems
: Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader
Network Monitoring and Security Measures in Campus Networks
Network Monitoring and Security Measures in Campus Networks Network Startup Resource Center These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Should the IETF do anything about DDoS attacks? Mark Handley
Should the IETF do anything about DDoS attacks? Mark Handley The Problem The Internet architecture was designed to delivery packets to the destination efficiently. Even if the destination does not want
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
2003, Rainbow Technologies, Inc.
Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Enterprise Broadband Access:
Enterprise Broadband Access: What s Your Choice? Executive Summary Today, broadband access isn t just about making a connection to the Internet; it s about running bandwidth-intensive business and multimedia
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
The Science DMZ: A network design pattern for data-intensive science 1
Scientific Programming 22 (2014) 173 185 173 DOI 10.3233/SPR-140382 IOS Press The Science DMZ: A network design pattern for data-intensive science 1 Eli Dart a,,laurenrotman a, Brian Tierney a, Mary Hester
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
The New Dynamism in Research and Education Networks
a s t r at egy paper fr om The New Dynamism in Research and Education Networks Software-defined networking technology delivers network capacity and flexibility for academic users brocade The New Dynamism
The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar [email protected] [email protected] Gothenburg, May
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?
MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect [email protected] Validating if the workload generated by the load generating tools is applied
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Firewall Architecture
NEXTEP Broadband White Paper Firewall Architecture Understanding the purpose of a firewall when connecting to ADSL network services. A Nextep Broadband White Paper June 2001 Firewall Architecture WHAT
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
Deploying VSaaS and Hosted Solutions Using CompleteView
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)
SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
How to make a VPN connection to our servers from Windows 8
How to make a VPN connection to our servers from Windows 8 Windows 8 is able to make a newer type of VPN connection called a Secure Socket Tunnelling Protocol (SSTP) connection. This works just like a
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
5Get rid of hackers and viruses for
Reprint from TechWorld /2007 TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS TEChWoRLd ISSuE 2007 ThEBIG: 5 FIREWaLLS # # # Load balancing is basically a simple task where
Cisco SR 520-T1 Secure Router
Secure, High-Bandwidth Connectivity for Your Small Business Part of the Cisco Small Business Pro Series Connections -- between employees, customers, partners, and suppliers -- are essential to the success
DVR Network Security
DVR Network Security Page 1 of 12 Table of Contents TABLE OF CONTENTS... 2 GETTING STARTED... 4 INTRODUCTION... 4 DISCLAIMER... 4 BACKGROUND INFORMATION... 4 GENERAL BEST PRACTICES... 4 USE THE EQUIPMENT
Barracuda Load Balancer Online Demo Guide
Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Optimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
Advantages of Managed Security Services
Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Part V Applications. What is cloud computing? SaaS has been around for awhile. Cloud Computing: General concepts
Part V Applications Cloud Computing: General concepts Copyright K.Goseva 2010 CS 736 Software Performance Engineering Slide 1 What is cloud computing? SaaS: Software as a Service Cloud: Datacenters hardware
Configuring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
Internet2 Network Services Community, Service and Business Overview
Internet2 Network Services Community, Service and Business Overview Executive Summary: For universities and colleges to succeed in the broader transformation of higher education, successful collaboration
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
BUSINESS IMPACT OF POOR WEB PERFORMANCE
WHITE PAPER: WEB PERFORMANCE TESTING Everyone wants more traffic to their web site, right? More web traffic surely means more revenue, more conversions and reduced costs. But what happens if your web site
1. Comments on reviews a. Need to avoid just summarizing web page asks you for:
1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of
