Accelerator Control-System Network Security @ Diamond Light Source. Mike Leech, Controls Group Computer Systems Manager



Similar documents
Lab Objectives & Turn In

Network Security CS 192

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

Chapter 7. Firewalls

Performance Evaluation of Linux Bridge

Load Balancing Trend Micro InterScan Web Gateway

CS Computer and Network Security: Firewalls

Part 4: Virtual Private Networks

Configuring Remote HANA System Connection for SAP Cloud for Analytics via Apache HTTP Server as Reverse Proxy

IP Address: the per-network unique identifier used to find you on a network

Guardian Digital WebTool Firewall HOWTO. by Pete O Hara

Load Balancing McAfee Web Gateway. Deployment Guide

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

HP Business Service Management

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

CS Computer and Network Security: Firewalls

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Linux Networking Basics

CentraSite SSO with Trusted Reverse Proxy

How-to-Guide: Apache as Reverse Proxy for Fiori Applications

Load Balancing Smoothwall Secure Web Gateway

From Network Security To Content Filtering

CSC574 - Computer and Network Security Module: Firewalls

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

High Availability Low Dollar Load Balancing

Smoothwall Web Filter Deployment Guide

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

12. Firewalls Content

How To Understand A Firewall

emerge 50P emerge 5000P

HP Business Service Management

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Pehr Söderman KTH-CSC

How to setup HTTP & HTTPS Load balancer for Mediator

Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

DMZ Network Visibility with Wireshark June 15, 2010

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Piercing. Alon Altman Haifa Linux Club

CIT 480: Securing Computer Systems. Firewalls

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Linux Routers and Community Networks

Assignment 3 Firewalls

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Bypassing firewalls Another hole in the wall ;-) Présentation pour «La nuit du hack» le 13 Juin 2009

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Load Balancing Sophos Web Gateway. Deployment Guide

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Focus on Security. Keeping the bad guys out

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewalls. Chien-Chung Shen

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Installing Apache as an HTTP Proxy to the local port of the Secure Agent s Process Server

Owner of the content within this article is Written by Marc Grote

Network Security and Firewall 1

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

LCLS Network & Support Planning. Terri Lahey

ΕΠΛ 674: Εργαστήριο 5 Firewalls

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

A New Approach to Developing High-Availability Server

Packet filtering with Linux

IPv6.marceln.org.

Bridgewalling - Using Netfilter in Bridge Mode

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

MITM Man in the Middle

Scalable Secure Remote Access Solutions

Computer Networks. Secure Systems

Netfilter / IPtables

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

Load Balancing Bloxx Web Filter. Deployment Guide

Firewalls (IPTABLES)

Protecting and controlling Virtual LANs by Linux router-firewall

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CMPT 471 Networking II

Basic Network Configuration

Internet Security Firewalls

Installing and Configuring Websense Content Gateway

Linux Firewall Wizardry. By Nemus

How to protect your home/office network?

Computer Firewalls. The term firewall was originally used with forest fires, as a means to describe the

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Manuale Turtle Firewall

LifeSize Video Communications Systems Administrator Guide

Definition of firewall

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Application Note. Onsight TeamLink And Firewall Detect v6.3

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables )

Transcription:

Accelerator Control-System Network Security @ Diamond Light Source Mike Leech, Controls Group Computer Systems Manager

Dream Accelerator Controls Network? ++ Isolated + No routing, Layer 2 only Easy configuration and hardware replacement + Simple Star network no daisy-chaining + Cheap - No diverse routes for fibres - No automatic hardware failover

Primary Network: All EPICS control traffic Only primary network needed to run machine. All services contained within DNS, NFS, NTP, IOC boot (FTP), Parameter archiving etc.

Devices on the Primary Network: 16 Linux Servers 11 Linux CA Gateways 45 Linux Workstations 298 VxWorks IOCs 222 Linux BPMs 4 Windows PCs 40 Linux/Windows Laptops 6 Other!!! (Atomic Clock, GPIB adapter, etc) 0 PLCs!!! (All PLCs hang off private networks on IOC second interface)

Secondary Network: All non EPICS traffic and traffic not essential to machine operation Video cameras, scopes, terminal servers, IP phones, pump carts, residual gas analysers, a s, printers etc. Nearly identical to primary network except, routed to allow access to dual homed servers and workstations.

Powerful security tools out-of-the-box : th Iptables stateful t firewall, tcpwrappers (hosts.allow), SSH encrypted login shell (copying, tunnelling and more). Open Source: Security flaws discovered and patched quickly. Secure services: VSFTP, Apache, SELinux Jail. Total control over system configuration rebuild your own kernel. Security through obscurity: Less of a target for viruses and worms. No Power Users unless you configure elevated rights

Dual Homed Servers: SSH Bastion: Allows remote access during shutdown and emergency remote access during operation to fix faults EPICS Channel Access archiver: Allows office access to archived data. Bootserver: Allows office read-only access to software (3.14). Relational Database: Allows access to ELog, cable schedules etc

Diamond Control Room

Physical Access: Network access points are restricted to the following locations: Control and instrumentation areas (CIAs). Linac, booster and storage ring tunnels. Computer room. Control room. Comms rooms. NO labs or offices. NO wireless. All these areas are under access control.

Bridging (Stealth) firewall: Close down both interfaces: > ifdown eth0; ifdown eth1 > ifconfig eth0 0.0.0.0 > ifconfig eth1 0.0.0.0 Create a bridge: > brctl addbr br0 Add both interfaces: > brctl addif br0 eth0 > brctl addif br0 eth1 Turn on IP forwarding: > echo 1 > /proc/sys/net/ipv4/ip_forward Configure management interface: > ifconfig br0 172.23.0.1 netmask 255.255.255.0 up

eth1 eth0 Iptables firewall: > iptables -F > iptables P FORWARD DROP > iptables P INPUT DROP; IPTABLES P OUTPUT DROP > iptables A INPUT i lo ACCEPT; iptables A OUTPUT o lo ACCEPT Restrict by interface: > iptables A FORWARD i eth1 o eth0 p tcp --dport 22 j ACCEPT Restrict by IP address range: > iptables -A FORWARD --destination 172.23.0.0/16 -p udp --dport 53 -j ACCEPT Stateful: > iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT

Epics Channel Access Gateways: Enable machine parameters to be read from isolated primary network One for office networks and one for each beamline network Application layer gateways. No direct routing of IP packets Unidirectional read-only gateway for office Bidirectional read-only gateway per beamline no default route CA monitor allows moving of ID gaps through read only gateway

Diamonds Public and Private Networks: Diamonds control, office, science and beamline networks are all NAT d private networks Some proxyed protocols eg. Real player, http, https A limited number of other protocols allowed out eg. ssh Diamond controls public network has a public address range and is directly routed to diamond private networks, but behind site firewall SSH bastion and reverse web proxy on public network No DMZ - yet!.

Apache Reverse Web Proxy: Enables one web server to provide content from another transparently. Gives encrypted and authenticated access to certain internal web pages. Such as, Elog, archiver, Machine status. http://internal.com -> https://external.com/internal

LoadModule proxy_module modules/mod_proxy.so LoadModule proxy_http_module modules/mod_proxy_http.so LoadModule headers_module modules/mod_headers.so LoadFile /usr/lib/libxml2.so LoadModule proxy_html_module modules/mod_proxy_html.so <VirtualHost 123.123.123.123:443> DocumentRoot /var/www/html/external ServerName external.com ProxyPass /internal/ http://www.internal.com/ <Location /internal/> ProxyPassReverse / SetOutputFilter proxy-html ProxyHTMLURLMap / /internal/ ProxyHTMLURLMap /internal /internal RequestHeader unset Accept-Encoding </Location> SSLProxyEngine on <Proxy *> AuthType Basic AuthName External Area" require valid-user Allow from all </Proxy> SSLEngine on SSLCertificateFile /etc/httpd/conf/ssl.crt/external.crt SSLCertificateKeyFile /etc/httpd/conf/ssl.key/external.key </VirtualHost>

Acknowledgements I would like to thank the following for their help: Tim Hayton Mark Heron Pete Leicester Peter Denison, James Rowland Frederik Ferner, Tina Friedrich Paul Amos, Simon Lay Chris Colbourne, Nico Rotolo Original Network Design and Tender Original Network Design / Contract Manager The LINUX and EPICS communities Channel Access Gateways LINUX / EPICS Gurus More LINUX Gurus Original Cable Installation Cabling Maintenance

Network security may seem like an impossible struggle! But don t give up hope ;-)