• Like
  • Save
How to Build a Blueprint for Secure Network Management
 

How to Build a Blueprint for Secure Network Management

on

  • 1,809 views

For more information on Network Management , visit: http://www.solarwinds.com/network-management-software.aspx ...

For more information on Network Management , visit: http://www.solarwinds.com/network-management-software.aspx

Watch this webcast: http://www.solarwinds.com/search/how-to-build-a-blueprint-for-secure-network-management.aspx?prevPageName=

Join Josh Stephens, our Head Geek and Chris LaPoint, as they discuss how to build a blueprint and implement sound security as a part of your network management strategy. He tackles the question of why security doesn't come up earlier in most network management discussions, and finds that the culprit might be the relationship between the security and network management teams within many companies. The teams are often adversaries, which can have some very negative impacts on both areas. As a network professional, you should not be afraid to broach the topic of security. During this webcast, you'll hear us discuss how to build a blueprint and implement sound security as a part of your network management strategy. We'll cover:

• Securing management traffic
• Smart choices for management protocols
• Secure event management
• Security concerns with traffic analysis

Statistics

Views

Total Views
1,809
Views on SlideShare
1,777
Embed Views
32

Actions

Likes
0
Downloads
18
Comments
0

1 Embed 32

http://www.slideshare.net 32

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    How to Build a Blueprint for Secure Network Management How to Build a Blueprint for Secure Network Management Presentation Transcript

    • A big “Howdy” from SolarWinds®
      based in Austin, Texas
      Josh Stephens- VP of Technology & Head Geek
      Chris LaPoint – Product Manager - Orion
      Today’s Topic:
      Building a Blueprint for Secure
      Network Management
      Who is SolarWinds?
      What we do…
      Who are our customers?
      The SolarWinds community…
      Introduction
    • Agenda
      • Introductions & Housekeeping
      • Network Management Protocols
      • Trivia and T-shirt Giveaways
      • Network Configuration Audits
      • Demonstration of ideas discussed using SolarWinds applications
      • Summary and Q&A
    • A Few Notes about Today’s Session
      • Today’s content will be fairly high-level
      • We only have an hour
      • No attendee left behind…
      • Ask questions!!!
      • Don’t be afraid to ask deeper questions
      • Don’t wait ‘till the end – ask away
      • Today’s session is being recorded
      • Recorded session on SolarWinds.com
      • Slides available on slideshare
      J0sher2014
    • Network Management Protocols
      • Understanding SNMP
      • How SNMPv3 is Different
      • Syslog
      • NetFlow and Traffic Analysis
      • Securing Network Management Traffic
      J0sher2014
    • Simple Network Management Protocol
      • Fundamentals of SNMP include:
      • MIBs
      • OIDs
      • Community Strings
      • Traps
      J0sher2014
    • SNMPv3
      • SNMPv3 is all about security…
      • Encryption
      • Authentication
      • Verification
    • SNMPv3
      • Let’s go to the SNMPv3 Implementation Guide
    • Trivia Question #1
      The first 5 correct answers get a free SolarWinds t-shirt
      • Question – How old was Tony Stark when he graduated from MIT?
      Answer – 21
    • Syslog
      • Syslog was developed to:
      • Replace logging to the local file system
      • Centralize log storage and reporting
      • Syslog is primarily leveraged by:
      • Routers and switches
      • Firewalls, IDS’s, and VPN concentrators
      • Unix Servers
      • Syslog as a protocol:
      • Defined by RFC 3164
      • Typically UDP port 514
      • Can be transported over TCP (RFC 3195)
    • Network Management Systems and Syslog
      • Alerting
      • Most Syslog servers can alert on syslog messages
      • Alerts can be built on content, source, common fields, and more
      • Collection, Forwarding, and Aggregation
      • Routers and switches
      • Firewalls, IDS’s, and VPN concentrators
      • Unix Servers
    • Windows Events
      • Windows Event Logs
      • Syslog for Windows
      • Extensible framework for application developers
      • Not as easily centralized
    • General Discussion…
      Gear & Software Selection Criteria…
      • Manageability
      • SNMPv3
      • Flow Analysis
      • IPv6
      • Virtualization friendly
      J0sher2014
    • Configuration Management
      Network Configuration Mgmt & Audits
      • Protocols
      • Processes
      • Automation
      J0sher2014
    • Trivia Question #2
      The first 5 correct answers get a free SolarWinds t-shirt
      • Question – What kind of power source powers the Iron Man suit?
      Answer – arc reactor
    • Orion NCM + Athena FirePAC
      Policy Optimization
      Security and Compliance
      Advanced Query
      • Perform cross inventory searches on rules and objects using names, IP address and service ranges
      • Understand how changes to ACL, NAT and route rules affect traffic flow
      • Use security checks to evaluate traffic-flow between zones
      • Harden firewalls against corporate policies, PCI and best practices
      • Reports in just 2 clicks
      • Remove the clutter from your security rulebases
      • Determine object usage per-rule and globally per object
      • Auto-Gen scripts to execute cleanup
      SolarWinds Orion NCM
    • Firewall analytics for network and security engineers
      Slice and dice firewall configs to improve network
      • Manageability
      • Service Delivery
      • Performance
      • Risk Profile
      Offline
      Comprehensive
      Easy
      http://www.athenasecurity.net
    • - Slide 18 -
      SolarWinds Orion Demonstration
    • Summary and Q&A
      Thank you for attending!
      To learn more or to download free 30-day trials of
      SolarWinds products visit: www.SolarWinds.com
      Contact information
      Josh Stephens, Head Geek
      headgeek@solarwinds.com
      twitter: sw_headgeek
      Blog: http://solarwinds.com/geek
      p.s. Remember to renew your maintenance!!!