13
April 25, 2000 John Kristoff 1 DePaul University A Network Case Study John Kristoff <[email protected]> http://condor.depaul.edu/~jkristof/

April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 1

DePaul University

A Network Case StudyJohn Kristoff <[email protected]>http://condor.depaul.edu/~jkristof/

Page 2: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 2

Organizational Structure

Page 3: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 3

Another View

Page 4: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 4

Network OverviewSpring 1999

Page 5: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 5

Network OverviewSpring 2000

Page 6: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 6

Gigabit WAN

Page 7: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 7

Lincoln Park Infrastructure

Expansion and RenovationNetwork Connectivity CostsNetwork Connectivity Options

Approximately 30 buildings to connect!

Page 8: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 8

Network SecuritySpring 1999

DNS server compromised - GAME OVER!

Lack of awareness/expertiseNo computer security person/teamSecurity incidents were never

reported by an I.S. staff member

Page 9: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 9

Network SecurityFirst Steps

Compromised systems rebuiltRouters/Switches securedRouter filters appliedNetwork equipment logging enabledScare tactics used

Page 10: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 10

Computer SecurityToday

Incident response team formedDirective from VPUse of encryption increasingStaff participating in training and

industry eventsRegular network security auditsAwareness is built!

Page 11: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 11

Computer SecurityTomorrow

Sophisticated intrusion detection system

Firewalls in front of key resourcesMembership into FIRST.orgMore encryptionRevised and updated policiesMore secure systems and network!

Page 12: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 12

Bandwidth Management

Internet bandwidth is our last mileDifficult to provide fairnessResNet

many shared LANs many users suffer!

Throw bandwidth at the problem?No silver bullet today

Page 13: April 25, 2000John Kristoff1 DePaul University A Network Case Study John Kristoff jkristof

April 25, 2000 John Kristoff 13

Some of My Favorite Network Tools

MRTGNetflow datasyslogNTPnmappacket capture (Sniffer, tcpdump, etc.)documentation!