Given by Roman Markowski at Lectures at Xi'an Jaotong University on Sept 1998. Foils prepared Dec. 6 98
Outside Index
Summary of Material
Network management |
SNMP - Simple Network Management Protocol |
Network security |
Unix / PC integration |
Virtual Private Network |
Internet 2 |
Outside Index Summary of Material
Roman Markowski |
IS Manager |
Northeast Parallel Architectures Center |
Syracuse University |
September 1998 |
http://www.npac.syr.edu/users/roman/ |
Network management |
SNMP - Simple Network Management Protocol |
Network security |
Unix / PC integration |
Virtual Private Network |
Internet 2 |
Distributed network management consists of:
|
Network management and monitoring standards:
|
RMON - Remote Monitoring RMON ver 1,2 (RFC 1271, 1757, 1513)
|
CMIP - OSI Common Management Information Protocol; less popular than SNMP |
MIB - Management Information Base - holds information about resources; network resources are represented by managed objects within the MIB;an object has a name, attributes and properties; MIBs come in 2 basic forms: the Standard MIB (MIB I and MIB II) and Proprietary MIBs (RFC 1213) |
Software management and monitoring systems:
|
Other software tools:
|
Hardware monitoring tools allow for traffic measurements, protocol analysis, nodes activity monitoring (examples: Fluke, Microtest) |
SNMP - Simple Network Management Protocol
|
Two types of devices on a network:
|
Five types of protocol Data Units
|
MIB - Management Information Base
|
SNMPv1, SNMPv2, SNMPv3 (standarization pending)
|
SNMPv1 (RFC 1157) - time frame: 1988-present
|
SNMPv1 cont.
|
SNMPv2 (RFC 1902) - time frame: 1993 - present
|
Security
|
RMONv1, RMONv2 - set of extensions to the SNMP specification that lets a network monitoring device report to the management console in real time about traffic, error conditions, .. |
Security - protection of information as it traverses the network. Security becomes one of the primary concerns when an organization connects its private intranet to the Internet. "Stay home behind locked doors and you'll be far safer than if you travel to the far reaches of the globe". Safe network: internal network with no outside links. |
The internet is open and public by design. There is no guarantee against information ending-up in the wrong hands. |
Protection components:
|
There is no such thing as a 100% secure computer system. We can think of security as a triangle with "security", "performance" and "usability" at corners. We cannot be at all corners at the same time |
Security specifications:
|
Firewalls - guardians for areas of the network. The firewall must permit only authorized traffic. The firewall itself must be immune to penetration. Setting up an Internet Firewall without a comprehensive security policy is like placing a steel door on a tent. |
Architecture of firewalls is based on : packet filtering, proxies, state inspection, or network address hiding and translation |
Computer crimes
|
Attacks
|
Attacks
|
Attacks
|
Only 5% of crackers write their own code; most cracker tools is publicly available |
Typical scenario:
|
Typical scenario:
|
Security Policy - I
|
Security Policy - II
|
Security Information on the Web:
|
Security Information on the Web:
|
You cannot simply plug a NT system into your Unix network and have it run seamlessly. Creating a transparent Unix/NT computing environment is difficult. |
NT installation within traditional Unix environment requires:
|
Namespace communication: Unix uses DNS, WindowNT uses WINS. To have both operating systems on your network, you need to get the namespaces communicating |
Namespace protocols (DHCP, WINS)
|
Namespace protocols:
|
Almost all Unix workstations have static entries in DNS tables |
Microsoft's Socket Library (Winsock)
|
Sharing Files |
Windows NT and Windows 95 desktops must run NFS client software for accessing UNIX files. |
Unix machines also need to share files available on Windows NT/95 machines. It requires NFS server running on Widows NT. Of course, it is possible to reverse sharing scheme by installing software on the Unix system to support the NetBIOS and SMB networking native for Windows. |
Sharing Files Problems - I |
Windows 95 and Windows NT have a different architecture for the kernel device drivers which are required for NFS server and client. |
Windows 95 supports the DOS File Allocation Table (FAT) file system which lacks access control. Many companies offer PC-NFS software for Widows 95 |
Widows NT supports both DOS FAT file system and its native NTFS file system. NTFS has access controls on directories and files. |
Sharing Files Problems - II |
Sharing file systems requires mapping of
|
WindowsNT can already share file systems with other Windows for Workgroups, Widows 95 and Windows NT machines using NetBEUI/NetBIOS mechanisms |
File sharing depends on several associated protocols including
|
SMB - Server Message Block |
the protocol developed in NetBIOS to provide file and print sharing |
netBIOS and SMB are core networking components of Microsoft network |
a freeware SMB software for Unix (Samba) |
Samba provides: SMB server, NetBIOS name server, SMB client, Utilities |
requires SMB daemon (Samba or LAN Manager for Unix) |
Printing |
Microsoft already included a Unix compatible TCP/IP LPD line printer daemon with Windows NT. This service, used for printer sharing, is not installed by default. |
We can allow Unix systems to use and NT printer
|
We can allow NT systems to use Unix printers |
The VPN market is on the verge of explosive growth. A virtual private network (VPN) broadly defined, is a temporary, secure connection over a public network, usually the Internet. Though the term is relatively new, everyone from the telcos, to operating system vendors, to firewall suppliers and router companies has rushed to offer some type of VPN capability. |
A VPN gives users a secure way to access corporate network resources over the Internet or other public or private networks. |
VPN is a private network that uses PDN (Public Data Network) services for internal communication |
VPN is not truly private because an organization shares the PDN infrastructure with others. It is virtually private because all users enjoy reliable and secure communications at desired levels of performance |
VPN is cost effective, flexible and affordable. VPNs offer a savings of up to 60% over equivalent private networks. Renting data bandwidth in a data-optimized PDN is more flexible and cost-effective than building it in the voice-oriented PSTN (Public Switched Telephone Network) |
VPNs typically include a number of security features including encryption, authentication, and tunneling. |
Internet is the most widely accessible high-speed PDN suitable for enterprise VPNs. Currently, access to the Internet is available via the PSTN (ISDN, T1, T3). Over time there will be less dependence on the PSTN and more PDN options like Frame Relay and ATM will become available worldwide |
Once the PSTN also converts to ATM in its backbone, voice and data may once again share the same public network infrastructure. VOA standard (Voice over ATM) is under development |
Currently Corporate private data communication networks are based on T1 leased lines or Frame Relay PVCs. The new architecture arises but is not available yet (expected by Y2K): Internet-VPN. In I-VPN the secure traffic can flow not within one enterprise, but among many enterprises and their customers. |
Requirements for VPN:
|
Secure tunneling over public PDN:
|
Security is based on encryption and authentication
|
A VPN can be used in place of traditional dial-up connections to provide access to remote users and telecommuters; can be used to connect LANs in different sites instead of using the public switched telephone network or dedicated leased lines; and can be used to give customers, clients and consultants access to corporate resources. |
Most VPNs can be designed to work as an extranet. But not all extranets are VPNs. A VPN can be used in a similar manner, but typically a VPN has much higher security associated with it. Specifically, a VPN typically requires the establishment of a tunnel into the corporate network and the encryption of data passed between the user's PC and corporate servers. |
I recommend to read: |
Everyone claims VPN capabilities, but not everyone provides adequate security for business-to-business virtual private networks. |
The Internet 2 initiative is a collaborative effort by the nation's leading research universities, teamed with government and industry partners, to accelerate the next stage of Internet development in support of higher education. The Internet 2 project has three basic goals:
|
More information about Internet2: |