[OPLINTECH] Office of Information Technology Customer Update - January 26, 2007

Corroto, Vince vince.corroto at ohio.gov
Fri Jan 26 13:41:01 EST 2007


Office of Information Technology Customer Update - January 26, 2007

 
Network Maintenance:

When: Every Tuesday

Time: 3:00 AM to 6:00 AM

January 30 - Prepare and upgrade ISPSOC processors.   We will be
upgrading the route processors on ISPSOC, our primary connection to the
Internet and OARnet.     In this process we will also be testing fail
over to ISPRHO our backup connection to the Internet and OARnet.  If
possible, this work will be completed on 1/30.  We will first fail over
the Internet and OARnet connections to ISPRHO, which should be a short
outage in the couple of minutes range. This will allow us to test fail
over also.  ISPSOC will be upgraded.   Once we are comfortable with the
stability of ISPSOC we will shift the Internet and OARnet connections to
ISPSOC.

Cisco Systems, Inc, Announcement of Software Vulnerabilities:

Cisco Systems, Inc announced three software vulnerabilities on January
24th.  Most of OIT's routers and switches are running software versions
that have one or two of these vulnerabilities.  No OIT routers and
switches are running IPv6, so the third vulnerably does not apply.

While there have not been any cases of these vulnerabilities being
exploited, OIT is responding to these announcements by aggressively
upgrading software on devices and implementing mitigating filters on
various parts of the network.  As long as there are not reports of
exploitation of these vulnerabilities and the mitigation filters appear
to be working, we will be aggressive, but work with due care, on our
router and switch upgrades.    

This allows OIT to balance the risk of quick major changes to the
network with the risks of having vulnerable software on routers and
switches.  Many times overreacting to vulnerabilities can be more
damaging than the vulnerabilities themselves.   

As with good network security response practice OIT is working from the
outside in on upgrading the network.

We will first upgrade and mitigate the Internet Connection Layer.  This
will protect the Internet Perimeter.   We have loaded upgraded software
on the SOCC Internet connection router, but have not reloaded it with
this new code.  Later today we will load upgrade software on the Rhodes
Internet Connection router.  By doing this OIT could quickly respond in
an emergency manner if it becomes required.  

The current plan for the Internet connection and ohio.gov core are as
follows:

January 30 - OIT engineers will upgrade software on our Internet router
(which is the redundant Internet connection) at the Rhodes State Office
Tower.

January 30 - OIT engineers will upgrade software on BBSOC6 (redundant
backbone router) at the State of Ohio Computer Center.

February 6 - OIT engineers will upgrade software on our Internet and
core routers and switches located at the State of Ohio Computer Center.

February 13 - OIT engineers will upgrade software on our core routers
and switches at the Rhodes State Office Tower.


Customer Upgrades:

We will be prioritizing OIT customer's based on the impact to the State
of Ohio and determine the order in which customer's routers will be
upgraded and/or mitigated.  This will be based on the criticality of
customer and the risk of a customer being impacted by this
vulnerability.  For example, if you are behind a firewall with a
reasonable secure rule set, it would be very difficult to exploit this
vulnerability from outside your network.

For more information on the announcements see Cisco's web site:  

http://www.Cisco.com/en/US/products/products_security_advisories_listing
.html

Specifically:

Cisco Security Advisory: Crafted TCP Packet Can Cause Denial of Service
New: 

http://www.cisco.com/en/US/products/products_security_advisory09186a0080
7cb0e4.shtml

Cisco Security Advisory: Crafted IP Option Vulnerability New:

http://www.cisco.com/en/US/products/products_security_advisory09186a0080
7cb157.shtml 


Firewall Maintenance:

Next Scheduled Maintenance: February 20, 2007

Time: 3:00 AM to 6:00 AM.


Ohio Customer Service & Security Center - After Hour Service Escalation
Procedure

Effective immediately, the following after hour (Monday through Friday,
5:00pm - 7:00am and Weekends) escalation list should be utilized when
service related matters need to be brought to the attention of UNS-NA
management.

Customers should wait a minimum of 30 minutes before attempts are made
to contact the next level of support

Ohio Customer Service & Security Center 

Voice: 644-0701 (Columbus Calling Area) or 800-644-0701 (Outside of the
Columbus Calling Area)

After Hour Service Escalation

1.  UNS-NA Service Manager             (614) 216-1621
2.  UNS-NA Program Manager           (614) 466-6516
3.  UNS-NA Program Administrator    (740) 398-1333

________________________________________________


Customer Suggestions:

Please send your suggestions for improving our network services to:
E-mail: OCSSC at ohio.gov

Ohio Customer Service & Security Center (OCSSC):

Voice: 644-0701 (Columbus Calling Area) or 800-644-0701 (Outside of the
Columbus Calling Area)

E-mail: OCSSC at ohio.gov



-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.oplin.org/mailman/private/oplintech/attachments/20070126/3025c2a8/attachment-0001.html


More information about the OPLINTECH mailing list