General requirements:
Only ITSO approved, locked down, end user computers are allowed to connect to the RLAN
Separate VPN, from general university VPN, with a separate authorization process for RLAN access
Only use laptops sanctioned by ITSO
Laptops can only use VT certificates generated by ITSO
Laptops must be brought in on a regular, scheduled basis for updates
IPv6 compliant hardware. IPv4 still needed because users access IPv4 only services from the RLAN
RLAN phase 2 will continue to support open outbound traffic from the RLAN and collect traffic analytics towards development of a whitelist
Standard maintenance window of 3-7am Tuesday's and Thursday's, any maintenance outside this window must be announced using the VT-DNET LISTSERV
ITSO monitors inbound and outbound traffic SPAN on each side of the ASA
Create a DNS server, with blacklist, inside the RLAN
Test instance of RLAN uses formal test range (top 8 or 16 addresses) for each RLAN subnet/vlan for testing
Establish a LISTERV for general RLAN support
"Big Fix" software required for all hosts connected to the RLAN
Require 802.1x (Network access control protocol)
Using Host Based Enforcement to validate patch level and quarantine or sand-box the host until compliant
Enforce encryption at rest according to the "Standard for Storing and Transmitting Personally Identifying Information"
Secure mechanisms for data import and export on the RLAN
Possible Central IT Services to Include Inside the RLAN
DNS
One more thing to consider. Eric is working on what we are calling a Network Services Area VPN (in the MPLS sense) that will be directly reachable in all VPNs. DNS/NTP/DHCP will all be available there. I do not know if it would be appropriate for services like AD.
Another variable is if the DNS service in rLAN would be the same as our campus service or if it is going to do RPF or something different.
Once NAT moves to the edge of campus (I am assuming rLAN NAT will move there but there will still be a firewall between rLAN and campus) some config may be simplified.
NTP
DHCP (Only static IP configurations as of now inside RLAN)
Active Directory Services (Hokies ID)
Enterprise Directory Services (PID)
Network Directory Services (Network ID)
Banner (INB, others?)
Patching (BigFix relay is already inside RLAN)
- Consider moving the BigFIX box to a separate DMZ-like area. That area could reside in either the RLAN or the Central IT services area.
- Some areas may need or want very restrictive settings while others may only need a few. With that in mind, we could consider the RLAN the base restriction, define it in general and then step back and allow local departments to decide for themselves what restrictions to add on top of that. Steve Huff is a good example of this now.
Storage & Backup Services
Application Proxy (new additional service)
Email (Maybe reduced functionality email of some sort... text only, no attachments?)
Possible Approaches (see diagram):
Do nothing. If a service can be made to work inside the RLAN by adding firewall exceptions, then leave the service outside the RLAN and add exceptions on the network firewall and the host firewall. This is basically what we do now.
Pros Cons 1) Inexpensive 1) Added complexity 2) Simple and easy 2) Less functionality (no DHCP inside RLAN) 3) Requires no additional service instances inside the RLAN 3) Unintentional firewall blocks (Central Services Domain block) 4) Inability to tailor/customize services to RLAN hosts
Create service instances inside the RLAN.
Pros Cons 1) Parity with service offerings outside the RLAN (DHCP) 1) Increased workload and resources 2) Fewer firewall exceptions 2) May require more hardware and/or software (e.g., in some cases, services would have to be duplicated) 3) Less traffic crossing the RLAN edge 4) Better understanding of what things are inside the RLAN 5) Customized RLAN services (DNS with blacklisting) 6) More well-defined, tailored RLAN
A mixture of approach one and two.
Pros Cons 1) same as above 1) same as above 2) Reduces the administration overhead incurred by trying to meet every departments needs at the Firewall and possibly other RLAN protective measures. Pushing protective customizations down to the department level also allows them more flexibility within the larger constraints that central IT may choose to implement.