A big “Howdy” from SolarWinds®<br />	based in Austin, Texas<br />Josh Stephens- VP of Technology & Head Geek<br />Chris La...
Agenda<br /><ul><li>Introductions & Housekeeping
Network Management Protocols
Trivia and T-shirt Giveaways
Network Configuration Audits
Demonstration of ideas discussed using SolarWinds applications
Summary and Q&A</li></li></ul><li>A Few Notes about Today’s Session<br /><ul><li>Today’s content will be fairly high-level
We only have an hour
No attendee left behind…
Ask questions!!!
Don’t be afraid to ask deeper questions
Don’t wait ‘till the end – ask away
Today’s session is being recorded
Recorded session on SolarWinds.com
Slides available on slideshare</li></ul>J0sher2014<br />
Network Management Protocols<br /><ul><li>Understanding SNMP
How SNMPv3 is Different
Syslog
Upcoming SlideShare
Loading in...5
×

How to Build a Blueprint for Secure Network Management

1,331

Published on

For more information on Network Management , visit: http://www.solarwinds.com/network-management-software.aspx

Watch this webcast: http://www.solarwinds.com/search/how-to-build-a-blueprint-for-secure-network-management.aspx?prevPageName=

Join Josh Stephens, our Head Geek and Chris LaPoint, as they discuss how to build a blueprint and implement sound security as a part of your network management strategy. He tackles the question of why security doesn't come up earlier in most network management discussions, and finds that the culprit might be the relationship between the security and network management teams within many companies. The teams are often adversaries, which can have some very negative impacts on both areas. As a network professional, you should not be afraid to broach the topic of security. During this webcast, you'll hear us discuss how to build a blueprint and implement sound security as a part of your network management strategy. We'll cover:

• Securing management traffic
• Smart choices for management protocols
• Secure event management
• Security concerns with traffic analysis

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,331
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "How to Build a Blueprint for Secure Network Management"

  1. 1.
  2. 2. A big “Howdy” from SolarWinds®<br /> based in Austin, Texas<br />Josh Stephens- VP of Technology & Head Geek<br />Chris LaPoint – Product Manager - Orion<br />Today’s Topic: <br />Building a Blueprint for Secure<br />Network Management<br />Who is SolarWinds?<br />What we do…<br />Who are our customers?<br />The SolarWinds community…<br />Introduction<br />
  3. 3. Agenda<br /><ul><li>Introductions & Housekeeping
  4. 4. Network Management Protocols
  5. 5. Trivia and T-shirt Giveaways
  6. 6. Network Configuration Audits
  7. 7. Demonstration of ideas discussed using SolarWinds applications
  8. 8. Summary and Q&A</li></li></ul><li>A Few Notes about Today’s Session<br /><ul><li>Today’s content will be fairly high-level
  9. 9. We only have an hour
  10. 10. No attendee left behind…
  11. 11. Ask questions!!!
  12. 12. Don’t be afraid to ask deeper questions
  13. 13. Don’t wait ‘till the end – ask away
  14. 14. Today’s session is being recorded
  15. 15. Recorded session on SolarWinds.com
  16. 16. Slides available on slideshare</li></ul>J0sher2014<br />
  17. 17. Network Management Protocols<br /><ul><li>Understanding SNMP
  18. 18. How SNMPv3 is Different
  19. 19. Syslog
  20. 20. NetFlow and Traffic Analysis
  21. 21. Securing Network Management Traffic</li></ul>J0sher2014<br />
  22. 22. Simple Network Management Protocol<br /><ul><li>Fundamentals of SNMP include:
  23. 23. MIBs
  24. 24. OIDs
  25. 25. Community Strings
  26. 26. Traps</li></ul>J0sher2014<br />
  27. 27. SNMPv3<br /><ul><li>SNMPv3 is all about security…
  28. 28. Encryption
  29. 29. Authentication
  30. 30. Verification</li></li></ul><li>SNMPv3<br /><ul><li>Let’s go to the SNMPv3 Implementation Guide</li></li></ul><li>Trivia Question #1<br />The first 5 correct answers get a free SolarWinds t-shirt<br /><ul><li>Question – How old was Tony Stark when he graduated from MIT?</li></ul>Answer – 21<br />
  31. 31. Syslog<br /><ul><li>Syslog was developed to:
  32. 32. Replace logging to the local file system
  33. 33. Centralize log storage and reporting
  34. 34. Syslog is primarily leveraged by:
  35. 35. Routers and switches
  36. 36. Firewalls, IDS’s, and VPN concentrators
  37. 37. Unix Servers
  38. 38. Syslog as a protocol:
  39. 39. Defined by RFC 3164
  40. 40. Typically UDP port 514
  41. 41. Can be transported over TCP (RFC 3195)</li></li></ul><li>Network Management Systems and Syslog<br /><ul><li>Alerting
  42. 42. Most Syslog servers can alert on syslog messages
  43. 43. Alerts can be built on content, source, common fields, and more
  44. 44. Collection, Forwarding, and Aggregation
  45. 45. Routers and switches
  46. 46. Firewalls, IDS’s, and VPN concentrators
  47. 47. Unix Servers</li></li></ul><li>Windows Events<br /><ul><li>Windows Event Logs
  48. 48. Syslog for Windows
  49. 49. Extensible framework for application developers
  50. 50. Not as easily centralized</li></li></ul><li>General Discussion…<br />Gear & Software Selection Criteria…<br /><ul><li>Manageability
  51. 51. SNMPv3
  52. 52. Flow Analysis
  53. 53. IPv6
  54. 54. Virtualization friendly</li></ul>J0sher2014<br />
  55. 55. Configuration Management<br />Network Configuration Mgmt & Audits<br /><ul><li>Protocols
  56. 56. Processes
  57. 57. Automation</li></ul>J0sher2014<br />
  58. 58. Trivia Question #2<br />The first 5 correct answers get a free SolarWinds t-shirt<br /><ul><li>Question – What kind of power source powers the Iron Man suit?</li></ul>Answer – arc reactor<br />
  59. 59. Orion NCM + Athena FirePAC<br />Policy Optimization<br />Security and Compliance<br />Advanced Query<br /><ul><li>Perform cross inventory searches on rules and objects using names, IP address and service ranges
  60. 60. Understand how changes to ACL, NAT and route rules affect traffic flow
  61. 61. Use security checks to evaluate traffic-flow between zones
  62. 62. Harden firewalls against corporate policies, PCI and best practices
  63. 63. Reports in just 2 clicks
  64. 64. Remove the clutter from your security rulebases
  65. 65. Determine object usage per-rule and globally per object
  66. 66. Auto-Gen scripts to execute cleanup </li></ul>SolarWinds Orion NCM<br />
  67. 67. Firewall analytics for network and security engineers<br />Slice and dice firewall configs to improve network<br /><ul><li>Manageability
  68. 68. Service Delivery
  69. 69. Performance
  70. 70. Risk Profile</li></ul>Offline<br />Comprehensive<br />Easy<br />http://www.athenasecurity.net<br />
  71. 71. - Slide 18 -<br />SolarWinds Orion Demonstration<br />
  72. 72. Summary and Q&A<br />Thank you for attending!<br />To learn more or to download free 30-day trials of<br />SolarWinds products visit: www.SolarWinds.com<br />Contact information<br />Josh Stephens, Head Geek<br />headgeek@solarwinds.com<br />twitter: sw_headgeek<br />Blog: http://solarwinds.com/geek<br />p.s. Remember to renew your maintenance!!!<br />

×