Campus-wide Firewall Project. Anne Oribello, Brown University



Similar documents
Network Security Policy

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

The Evolution of Information Security at Wayne State University

How To Protect Your Network From Attack From A Hacker On A University Server

Firewall Strategies June 2003 (Updated May 2009)

Network Security Policy

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Network Monitoring and Security Measures in Campus Networks

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Data Security Incident Response Plan. [Insert Organization Name]

Patch Management Policy

co Characterizing and Tracing Packet Floods Using Cisco R

ΕΠΛ 674: Εργαστήριο 5 Firewalls

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

CMPT 471 Networking II

A Decision Maker s Guide to Securing an IT Infrastructure

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Chapter 8 Router and Network Management

Network Instruments white paper

California State University, Chico. Information Security Incident Management Plan

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Account Management Standards

Internet infrastructure. Prof. dr. ir. André Mariën

Log Management for the University of California: Issues and Recommendations

THE ROLE OF IDS & ADS IN NETWORK SECURITY

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

How To Use Egnyte

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

DEPLOYING VoIP SECURELY

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Cisco Wide Area Application Services (WAAS) Software Version 4.0

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Security and Access Control Lists (ACLs)

How To Protect Your Network From Attack From Outside From Inside And Outside

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Protect Web Sites from Cyber Attacks

Network Segmentation

PROFESSIONAL SECURITY SYSTEMS

Open Source Software for Cyber Operations:

Firewalls Overview and Best Practices. White Paper

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

INLINE INGUARD GUARDIAN

Information Technology Cyber Security Policy

SERVICE LEVEL AGREEMENT

USM IT Security Council Guide for Security Event Logging. Version 1.1

UBC Incident Response Plan

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Office of Inspector General

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Guideline on Firewall

Security Policy for External Customers

Deploying Firewalls Throughout Your Organization

University System of Maryland University of Maryland, College Park Division of Information Technology

Network Security Policy: Best Practices White Paper

Using Ranch Networks for Internal LAN Security

Sygate Secure Enterprise and Alcatel

WAN Traffic Management with PowerLink Pro100

Strategies to Keep Your VoIP Network Secure

Best Practices For Department Server and Enterprise System Checklist

Recommended IP Telephony Architecture

FIREWALLS & CBAC. philip.heimer@hh.se

Best Practices for Securing IP Telephony

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

FIREWALL POLICY November 2006 TNS POL - 008

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Lab Configuring Access Policies and DMZ Settings

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

Computers Basic Training recruits are provided access to a computer lab for completion of work assignments. Recruits may choose to bring a laptop or

allow all such packets? While outgoing communications request information from a

A Study of Network Security Systems

VoIP Survivor s s Guide

Overview. Firewall Security. Perimeter Security Devices. Routers

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Information Technology Services in UB Owned, Controlled and Managed Space

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Ovation Security Center Data Sheet

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Cisco Application Networking for BEA WebLogic

Specific observations and recommendations that were discussed with campus management are presented in detail below.

Transcription:

Campus-wide Firewall Project Anne Oribello, Brown University

What We Were Seeing Defacement of web servers Compromises to research machines Denial of Service attacks against central service and departmental machines Constant reports of student machine compromises

The Impact of these Attacks Misuse of systems Extensive unavailability of machines during clean-up Potential data corruption Exposure of private information Man months of effort to restore compromised machines Potential litigation

These Problems Were the Result of Many machines being taken from box to desk with no reconfiguring Turnkey systems delivered without hardened OSs Applications that were downloaded which automatically reconfigured machines These were problems that a firewall could help mitigate

What a Firewall Will Accomplish Provide additional security tool to areas that need protection Administrative computing Centralized services (post office, Kerberos, etc.) Network systems General campus protect the ignorant, require active act to open services

What a Firewall Won t Fix Viruses, worms and other infestations Determined hacker Users intentional stupidity!

Firewall Options Multiple Firewall-1 machines (too expensive) A CISCO PIX firewall And then along came NetScreen -

Capabilities of NetScreen 1000 Gigabite throughput with multiple gigabite ports Stateful inspection of packets Configurable for 5-100 vertual systems (vsys) Significant redundancy Compatible with smaller NetScreen firewalls (5,25,50,100, etc.) Delivered code protects against DOS attacks

Virtual System Usage (note that some departments have their own firewall) core campus services (e.g. post office, Kerberos) administrative systems (e.g. mainframe, admin servers) network systems (e.g. routers, switches) dorm subnets rest of the campus

Early Successes core campus services (e.g. post office, Kerberos) administrative systems (e.g. mainframe, admin servers) network systems (e.g. routers, switches) All in place with rule sets by early December

Determining the Campus-wide Policy Committee formed with the following representation: Central computing services (CIS) Universities Libraries Internal Audit General Counsel Faculty representative UG representative Grad representative

Firewall Policy separate VSYS for dorms from rest of campus both VSYSs will appear as a single firewall, initially all outgoing traffic allowed unless violates policy all incoming traffic in response to an outgoing request allowed Incoming traffic from a trusted VSYS no other incoming traffic allowed unless specifically opened by end users (no review of end user requests)

Automatic Ruleset Definition Web form to open specific services For students, allowed to register their own machine (renewed each semester) For departmental servers, only sysadmin can register (reviewed annually) For departmental workstations, depending on policy of department, may allow individual user or be managed by departmental computing coordinator For cluster machines, cluster administrators would configure rules (reviewed annually)

Initial Implementation Tasks install upgrade from vendor to allow OSPF produce Web interface software for automatic rule creation obtain policy approval PR with end users

Status of These Tasks OSPF delayed indefinitely consolidation router reseller delayed order so delivered in late January programmer for rule changing software moved to Minnesota CIS without permanent VP from 7/1/01-2/1/02 so no policy decisions made Things were not moving along well!

Current Status of Tasks New consolidation router installed in January Plan to put firewall inline by mid March but with no apparent rules in place (mostly logging) Plan to activate rules during the summer

Future Plans increase user awareness add VSYSs to offer to departments Periodic re-evaluation of policy, making changes where appropriate separate dorms from the rest of the campus