Perspective on secure network for control systems in SPring-8



Similar documents
CONSTRUCTION AND MANAGEMENT OF A SECURE NETWORK IN SPRING-8

RuggedCom Solutions for

Developing Network Security Strategies

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Security Awareness. Wireless Network Security

SonicWALL PCI 1.1 Implementation Guide

Fortigate Features & Demo

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network Immunity Solution. Technical White paper. ProCurve Networking

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

INTRUSION DETECTION SYSTEMS and Network Security

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Network Access Control ProCurve and Microsoft NAP Integration

VOICE OVER IP SECURITY

Securing Cisco Network Devices (SND)

Section 12 MUST BE COMPLETED BY: 4/22

Best Practices for Outdoor Wireless Security

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Network System Design Lesson Objectives

PART D NETWORK SERVICES

Gigabit SSL VPN Security Router

IP Telephony Management

CTS2134 Introduction to Networking. Module Network Security

CISCO IOS NETWORK SECURITY (IINS)

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

VIA COLLAGE Deployment Guide

Network Virtualization Network Admission Control Deployment Guide

NXC5200/ NWA5000-N Series Wireless LAN Controller/ a/b/g/n Managed Access Point

What would you like to protect?

ESR (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz b/g/n 300 Mbps

All You Wanted to Know About WiFi Rogue Access Points

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Chapter 4 Customizing Your Network Settings

Bandwidth Management and Optimization System Design (draft)

Cisco Virtual Office Express

Recommended IP Telephony Architecture

Network Security. Protective and Dependable. Pioneer of IP Innovation

Move over, TMG! Replacing TMG with Sophos UTM

DIG Quick Reference Guide 2016

Network Security Stripped. Trends for from layered technologies to bare essentials

Achieving PCI-Compliance through Cyberoam

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Securing end devices

Chapter 1 Network Security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Domain 3.0 Networking... 1

ECB1220R. Wireless SOHO Router/Client Bridge

United States Trustee Program s Wireless LAN Security Checklist

ESR b/g/n SOHO Router

Network Access Security. Lesson 10

2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ESR7550 KEY FEATURES PRODUCT DESCRIPTION

Lucent VPN Firewall Security in x Wireless Networks

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

ENHWI-N n Wireless Router

Cisco RV 120W Wireless-N VPN Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

RAP Installation - Updated

Network Instruments white paper

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

ESR b/g/n SOHO Router

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ


3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

Firewall and UTM Solutions Guide

Cisco Actualtests Exam Questions & Answers

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Lesson 5: Network perimeter security

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Network Security Administrator

WLAN Security is in the Architecture ICEFIN Workshop presentation Arch Red Oy, Karri Huhtanen, managing director

APPENDIX 3 LOT 3: WIRELESS NETWORK

VIA CONNECT PRO Deployment Guide

Designing a security policy to protect your automation solution

CCIE Security Written Exam ( ) version 4.0

Network Security Guidelines. e-governance

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Cisco Small Business ISA500 Series Integrated Security Appliances

802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router

Did you know your security solution can help with PCI compliance too?

Observer Analyzer Provides In-Depth Management

9 Simple steps to secure your Wi-Fi Network.

The All-in-One, Intelligent NXC Controller

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

VLANs. Application Note

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Transcription:

Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan

Contents Network architecture Requirement and design concept Firewalling and network segregation Logical network topology (Firewall, VLAN, NAT, etc.) Network segmentation VLAN and IPS Segmentation, Inspection and Quarantine Authentication gateway for Wireless network Private network segment Network monitor Node management by MIB Flow monitoring Patch management Windows update, Anti-virus software Mirror for packages and patches

Network architecture

Requirements SPring-8 is the largest third-generation synchrotron radiation facility. Since the completion of the facility, many users have come for scientific experiment. Functions required for network are - accelerator and beamline control - user s experiments and data acquisition - facility management

control network For facility management, isolation of control network is the most important No needs to control the accelerators from the Internet Except for recovery work at trouble (will be presented by A. Yamashita) Internet Control network

User s network User connects own PC to User s network for experiment and data analysis. User needs to connect with the Internet and other network resources from User s network User want to restrict arbitrary remote control from networks except for own User s network need tunable access control from/to network resources User s network other networks (include Internet)

office network Office network requires rich and secure information services for facility management various information services Name services Mail server with contents filter Virus, spam mail filters Wireless LAN service and Authentication system Shared high speed storage for experiments

Firewalling and network segregation

Network topology

Network topology (public) Office network Firewall is installed to protect attack from Internet We have network services, windows update push server Authentication system for wireless LAN service Shared storage pool for experimental users connected by 10GbE

Network topology Beamline user s network NAT is installed to block connection from external network also enables to connect to external network freely IPS is installed to inspect user s PCs Find worm, virus behavior. quarantines infected PCs to protect network VLAN keeps beamlines independent No routing between BLs Some BL directly connects to shared storage pool for high speed data acquisition (BL-DAQ-LAN) No bridge function between networks

Control network Network topology Two sets of firewalls are installed to separate from office network and user s network The firewall has demilitarized network segment for development and some network services windows update push server Mirror servers for patch Flat network topology to simplify network management Low latency switched network Network monitoring system by MIB and sflow

Network segmentation

Network segmentation VLAN: Each beamline has independent network segment User can access to external network User can not connect between beamlines Firewall: Control network is separated by others permits access between specific hosts

Network segmentation If a virus comes in a beamline, Stops the virus spreading between beamlines But Weak point of the attack from inside to outside

Security gateway (IPS) Intrusion Protection System monitor behavior and signature quarantine the virus inside the network Prevent from spreading virus

If without IPS 100% Before installing IPS, the network switch was overloaded by ping traffic of blaster.w32 worm. The CPU utilization of a network switch Because NAT perfomed on the CPU of switch

Statistics on IPS ~300 incidents/year We recommend IPS!! Fewer suspicious hosts, shutdown period in SPring-8 Most incidents had shown undesirable behavior such as sweep port scan When checked quarantine list and go to the host, we found Trojan Horse miss setting was caused by the wrong detection of pattern string. A pattern string for detection worm is simple. The detection strings of Sasser worm is \\sarpc$. Normal connections such as Active Directory of Microsoft uses this string.

Authentication gateway Wireless network of user service Performance Encryption Security Authentication Brief specifications 300Mbps DES, 3DES, AES IPSec, PPTP/L2TP LDAP, RADIUS, Active Directory, Local database, 802.1x Difficult to understand the state of the wireless network Rogue AP, No WEP, No WPA, No hide of SSID, We will install a monitoring system of wireless network

Authentication gateway Private IP segment assigned by DHCP Wireless network monitoring system Difficult to understand the state of the wireless network Rogue AP, No WEP, No WPA, No hide of SSID, We will install a monitoring system of wireless network

Network monitor

Network monitor(1) Network Node Manager (OpenView) SNMP, RMON based MIB* monitoring tool monitors node status statistics threshold *MIB (Management Information Base) Logical network topology of control network

Network monitor(2) Sometimes packet capturing tools are needed when falls into unknowable network problem But have to go to faraway switch, change configuration of switch for mirror port and setup capturing tool It is difficult. sflow MAC monitor flooding (ProCurve problem Manager in the control plus: PCM+) network Capture (sampling) network packets at switches Display details of traffic such as source, destination, application type and so on Detect problem such as worm attack, link layer trouble Analyze problems Making the network visible

Network monitor(2) Screenshot of PCM+ PMC+ makes visible the detail of MAC flooding problem in the control network <-- Rx Flooding <-- Tx

Patch management

Patch management Windows update, anti-virus software update server push patches into clients Target: daq front-end with LabVIEW, Oscilloscope, etc. Linux mirror servers YaST mirror of SuSE Linux Enterprise 10 apt mirror of Ubuntu and Debian Target: operator consoles, daq front-end, etc.

Conclusion The most important approach concerning the network security is a segmentation design of the network. but Network system has various kind of security threat Security cannot be kept by only single method Pay attention to the latest trend of attack and security