Master Show - To Parent Directory

Download Report

Transcript Master Show - To Parent Directory

ICT Technician’s Update
Conference
17 March 2008
Introduction
Penny Patterson
You Tube and Schools
Penny Patterson
Network Access Control
Steve Hanna
Juniper Networks
Network Access Control
for Education
By Steve Hanna, Distinguished Engineer, Juniper
Co-Chair, Trusted Network Connect WG, TCG
Co-Chair, Network Endpoint Assessment WG, IETF
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
Implications of Expanded Network Usage
Critical data at risk
As Access Increases
Mission-critical
network assets
Mobile and remote
devices transiting the
LAN perimeter
Broader variety of
network endpoints
Perimeter security
ineffective
Endpoint infections
may proliferate
Network control
can be lost
Network Security Decreases
Faculty, staff, parent,
and/or student access
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
Network Access Control Solutions
Features
 Control Access
• to critical resources
• to entire network
 Based on
• User identity and role
• Endpoint identity and health
• Other factors
 With
• Remediation
• Management
Benefits
 Consistent Access Controls
 Reduced Downtime
• Healthier endpoints
• Fewer outbreaks
 Safe Remote Access
 Safe Access for
• Faculty, Staff
• Students, Parents
• Guests
• Devices
Network access control must be a key component of every network!
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
What is Trusted Network Connect (TNC)?
 Open Architecture for Network Access Control
 Suite of Standards to Ensure Interoperability
 Work Group in Trusted Computing Group (TCG)
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
TCG: The Big Picture
Applications
Desktops &
Notebooks
•Software Stack
•Operating Systems
•Web Services
•Authentication
•Data Protection
Printers &
Hardcopy
Mobile
Phones
Storage
TCG
Standard
s
Servers
Networking
Copyright © 2008 Juniper Networks, Inc.
Security
Hardware
www.juniper.net
‹#›
TNC Architecture Overview
Access
Requester (AR)
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
Wireless
Wired
Network
Perimeter
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
Typical TNC Deployments
 Uniform Policy
 User-Specific Policies
 TPM Integrity Check
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
Uniform Policy
Access
Requester (AR)
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
Remediation
Network
Non-compliant System
Windows XP
 SP2
x OSHotFix 2499
x OSHotFix 9288
 AV - McAfee Virus Scan 8.0
 Firewall
Production
Network
Compliant System
Windows XP
 SP2
 OSHotFix 2499
 OSHotFix 9288
 AV – Symantec AV 10.1
 Firewall
Copyright © 2008 Juniper Networks, Inc.
Network
Perimeter
Client Rules
Windows XP
- SP2
- OSHotFix 2499
- OSHotFix 9288
- AV (one of)
- Symantec AV 10.1
- McAfee Virus Scan 8.0
- Firewall
www.juniper.net
‹#›
User-Specific Policies
Access
Requester (AR)
Guest
User
Ken –
Faculty
Linda –
Finance
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
Guest
Network
Internet Only
Classroom
Network
Access Policies
- Authorized Users
- Client Rules
Finance
Network
Windows XP
 OSHotFix 9345
 OSHotFix 8834
 AV – Symantec AV 10.1
 Firewall
Copyright © 2008 Juniper Networks, Inc.
Network
Perimeter
www.juniper.net
‹#›
TPM Integrity Check
Access
Requester (AR)
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
TPM – Trusted Platform Module
- Hardware module built into most
of today’s PCs
- Enables a hardware Root of Trust
- Measures critical components
during trusted boot
- PTS interface allows PDP to
verify configuration and remediate
as necessary
Production
Network
Compliant System
TPM Verified
 BIOS
 OS
 Drivers
 Anti-Virus Software
Copyright © 2008 Juniper Networks, Inc.
Client Rules
- BIOS
- OS
- Drivers
- Anti-Virus Software
Network
Perimeter
www.juniper.net
‹#›
TNC Architecture in Detail
Access
Requester (AR)
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
(IF-M)
t Collector
IntegrityCollector
Measurement
Collectors (IMC)
Verifers
Integrity Verifiers
Measurement
Verifiers (IMV)
(IF-IMC)
(IF-IMV)
(IF-TNCCS)
TNC Server
(TNCS)
TNC Client (TNCC)
(IF-PTS)
Platform Trust
Service (PTS)
TSS
(IF-T)
Network
Access
Requestor
(IF-PEP)
Policy
Enforcement
Point (PEP)
Network Access
Authority
TPM
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
TNC Status
 TNC Architecture and all specs released
• Available Since 2006 from TCG web site
 Rapid Specification Development Continues
• New Specifications, Enhancements
 Number of Members and Products
Growing Rapidly
 Compliance and Interoperability Testing and
Certification Efforts under way
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
TNC Vendor Support
Access
Requester (AR)
Policy Enforcement
Point (PEP)
Policy Decision Point
(PDP)
Endpoint
Supplicant/VPN Client, etc.
Network Device
FW, Switch, Router, Gateway
AAA Server, Radius,
Diameter, IIS, etc.
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
TNC/NAP/UAC Interoperability
 Announced May 21, 2007 by TCG, Microsoft, and
Juniper
 NAP products implement TNC specifications
• Included in Windows Vista, Windows XP SP 3, and
Windows Server 2008
 Juniper UAC and NAP can interoperate
• Demonstrated at Interop Las Vegas 2007
• UAC will support IF-TNCCS-SOH in 1H2008
 Customer Benefits
• Easier implementation – can use built-in Windows NAP client
• Choice and compatibility – through open standards
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
NAP Vendor Support
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
What About Open Source?
 Several open source implementations of TNC
• University of Applied Arts and Sciences in Hannover, Germany
(FHH)
http://tnc.inform.fh-hannover.de
• libtnc
https://sourceforge.net/projects/lib/tnc
• OpenSEA 802.1X supplicant
http://www.openseaalliance.org
• FreeRADIUS
http://www.freeradius.org
 TCG support for these efforts
• Liaison Memberships
• Open source licensing of TNC header files
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
Summary
 Network Access Control provides
• Strong Security and Safety
• Tight Control Over Network Access
• Reduced PC Administration Costs
 Open Standards Clearly Needed for NAC
• Many, Many Vendors Involved in a NAC System
• Some Key Benefits of Open Standards
• Ubiquity, Flexibility, Reduced Cost
 TNC = Open Standards for NAC
• Widely Supported – HP, IBM, Juniper, McAfee, Microsoft, Symantec, etc.
• Can Use TPM to Detect Root Kits
 TNC: Coming Soon to a Network Near You!
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
For More Information
 TCG Web Site
• https://www.trustedcomputinggroup.org
 Juniper UAC Web Site
• http://www.juniper.net/products_and_services/
unified_access_control
 Steve Hanna
•
•
•
•
•
Distinguished Engineer, Juniper Networks
Co-Chair, Trusted Network Connect Work Group, TCG
Co-Chair, Network Endpoint Assessment Working Group, IETF
email: [email protected]
Blog: http://www.gotthenac.com
Copyright © 2008 Juniper Networks, Inc.
www.juniper.net
‹#›
LGfL Network 2009 - 2012
Stuart Tilley
Synetrix
Technician Conference –
Network overview and proposed enhancement
2008 - 2012
17th March 2008
Presented by :Stuart Tilley - Network & Systems
Overview
• Introduction
• Current Network Overview
• Proposed Technology Refresh
–
–
–
–
–
Core Network
Access Network
Access bandwidth
URL filtering
Edge CPE
• Summary
Introduction
• Current Network Implemented in April 2002
• Designed and Built by Synetrix a key LGfL service
provider
• Emerging Technology (MPLS) and vendor choice has
provided a platform for;
–
–
–
–
Delivery of High availability and scalable Broadband services
Secure and safe educational environment
New service development and delivery
Shared community network (LPSN)
• Network Refresh - keeping pace with technology to and
beyond 2012
The London Network – Physical Topology
Enfield
Barnet
Haringey
Harrow
Waltham
Forest
Romford
Newham
Camden
Park
Royal
Tele
House
Hayes
Earls
Court
Welling
Lambeth
Bexley
Heath
Richmond
Lewisham
Core
Core Network Node
Merton
AP
Aggregation Point
Croydon
Core 10Gbps Links
Bromley
Nodal Loop 1Gbps
Nodal Loop 100Mbps
Purley
The London Network
Physical Network Topology
• 3 Core locations and 21 Aggregation Points serving 33
London Authorities
• Resilient dark fibre connecting core locations (10Gb/sec
– OC192 SDH)
• AP’s connected to core by resilient nodal loops currently
1Gb or 100Mb capacity
• Resilient Service Hosting – SLB
• Resilient Tier 1 ISP’s (Thus, Abovenet, UKERNA, BBC)
– Total Internet Capacity 6Gbps
• All Broadband services delivered over fibre (scalable
bandwidth)
The London Network – Logical
Waltham Forest
Camden
6Bone
VPN1
VPN1
Native IPv6 peering
VPN2
VPN2
BGP4
VPN3
AP
AP
Edge sites connected
at 2, 5, 10 & 100Mbps Ethernet
BBC
BGP4
Edge sites configured
Into appropriate VPN at
any AP
100Mb
160Gbps Router
1Gbps
UKERNA
2Gbps
BGP4
2Gbps
VPN
3
VPN
1
VPN
2
VPN1
Edge sites access core
services via resilient
MPLS core/access
network with QoS applied
dependant on application
VPN2
VPN3
Internet
or
BGP4
10
Gb
c
ps
e
MPLS VPN's
10
Gb
p
AP
sc
or
Newham
e
Telehouse
Participate in same L2
broadcast domains as Earls
Court
SLB
1Gbps
160Gbps Router
VPN
3
VPN
1
VPN
3
VPN
2
URL URL
Participate in same L2
broadcast domains as Park
Royal
160Gbps Router
VPN
1
Virus Virus
email email
&
&
Web Web
Virtual Firewalls
Dark Fibre - 0C192 MPLS (10Gbps)
SHDS or Dark Fibre - 100M-2.4Gbps MPLS
SHDS - WES 100Mbps
URL URL
Virus Virus
Gigabit
Firewall
SHDS - WES 1000 (1Gbps)
SLB
MPLS VPN's
10Gbps core
MPLS VPN's
VPN
2
Virtual Firewalls
Park Royal
Earls Court
MPLS IP VPN's
LEA1
LEA2
LEA3
vpn
1 vpn
2 vpn
3
Gigabit
Firewall
Author Stuart Tilley
Date
25/01/2006
email email
&
&
Web Web
The London Network
Logical Network
• MPLS core network
• Dedicated RFC2547bis Layer3 VPN’s
– Provides fully routed Virtual WANs per ‘customer’
(LEA or LA)
– Totally autonomous routing policy and access control
per Virtual WAN – WMSv1 & v2
– Virtual WANs distributed across complete physical
network
• QoS Support
Network Statistics
•
•
•
•
•
Total of edge bandwidth purchased 23Gbps
Total traffic transiting network 3Gbps (average)
Total capacity of Juniper access layer 228Gbps
Total Capacity of Juniper core 480Gbps
Total Internet Bandwidth - (Sept 2002) 30Mbps
today averaging over 2Gbps
• HTTP traffic via URL service 1.5GMbps
• Requests served from Cache 400Mbps
Proposed Core Technology upgrade
• Upgrade existing Juniper M160 with Next Generation
MX960
• Fully resilient chassis (redundant HW) such as;
–
–
–
–
Power Supplies
Cooling fans
Routing Engines (RE)
Switch Control Board
• Fully resilient design/configuration
– Dual Dense Port Concentrators (DPC’s) 10G + 1G
– Support resilient backbone and core switching
• JUNOS code – leading standards development
• Low risk migration
Proposed Core Technology Upgrade
Proposed MX960 core build
Telehouse Core
MX960
Juniper
1
PEM
0
1
2
3
YELLOW ALARM
MASTER
0
®
NETWO RKS
FAIL
OK
FAIL
OK
FAIL
OK
OK
FAIL
NC
C
NO
NC
C
MX960
NO
OFFLINE
OK
FAIL
RED ALARM
ACO/LT
ONLINE
FAN
RE 0
OK
OK
FAIL
RE 1
OK
FAIL
OK
FAIL
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
0
1
2
3
4
5
0
1
2 6
7
8
9
10
11
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
OK/FAIL
OK/FAIL
OK/FAIL
OK/FAIL
2/0 2/5
FABRIC
ONLY
FABRIC
ACTIVE
OK/FAIL
0/0 0/5
2/0 2/5
1/0 1/5
3/0 3/5
FABRIC
ONLY
FABRIC
ACTIVE
0/0
0/0
TUNNEL
TUNNEL
LINK
LINK
RE-S-1300
RE-S-2000
0/0
1/0 1/5
DPC 40xGE
DPC 4x10GE
DPC 40xGE
DPC 4x10GE
SCB
SCB
OK/FAIL
0/0 0/5
0/0
1/0
1/0
TUNNEL
TUNNEL
TUNNEL
LINK
LINK
LINK
TUNNEL
LINK
3/0 3/5
0/0
0/0
TUNNEL
TUNNEL
LINK
LINK
0/0
0/0
TUNNEL
TUNNEL
LINK
LINK
s
p
Gb
10
1G
bp
s
Earls Court Core
Park Royal Core
MX960
MX960
Juniper
®
NETWO RKS
PEM
0
1
2
3
0
MASTER
1
ONLINE
YELLOW ALARM
NC
FAN
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
C
NO
NC
C
OK
FAIL
Juniper
MX960
NO
OFFLINE
RE 0
OK
RED ALARM
ACO/LT
®
NETWO RKS
PEM
0
1
2
3
0
MASTER
1
ONLINE
NC
FAN
RE 0
OK
FAIL
FAIL
OK
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
RED ALARM
C
NO
NC
C
MX960
NO
OFFLINE
RE 1
OK
FAIL
YELLOW ALARM
ACO/LT
OK
FAIL
RE 1
OK
FAIL
OK
FAIL
FAIL
OK
OK
FAIL
OK
FAIL
OK
FAIL
OK
FAIL
FAIL
0
1
2
3
4
5
0
1
2 6
7
8
9
10
11
0
1
2
3
4
5
0
1
2 6
7
8
9
10
11
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
ONLINE
OK/FAIL
OK/FAIL
DPC 40xGE
DPC 4x10GE
0/0 0/5
SCB
OK/FAIL
2/0 2/5
OK/FAIL
FABRIC
ONLY
FABRIC
ACTIVE
FABRIC
ACTIVE
0/0
TUNNEL
TUNNEL
LINK
LINK
LINK
RE-S-1300
TUNNEL
TUNNEL
LINK
LINK
LINK
0/0
TUNNEL
LINK
1/0 1/5
3/0 3/5
1/0 1/5
3/0 3/5
0/0
1/0
1/0
TUNNEL
TUNNEL
TUNNEL
LINK
LINK
LINK
TUNNEL
LINK
3/0 3/5
0/0
1/0 1/5
RE-S-2000
RE-S-1300
RE-S-2000
0/0
1/0
1/0
TUNNEL
0/0
2/0 2/5
0/0
TUNNEL
LINK
0/0
0/0 0/5
FABRIC
ONLY
FABRIC
ACTIVE
0/0
TUNNEL
3/0 3/5
OK/FAIL
OK/FAIL
2/0 2/5
FABRIC
ONLY
FABRIC
ACTIVE
0/0
1/0 1/5
DPC 40xGE
OK/FAIL
OK/FAIL
0/0 0/5
FABRIC
ONLY
DPC 4x10GE
OK/FAIL
2/0 2/5
SCB
OK/FAIL
OK/FAIL
DPC 40xGE
DPC 4x10GE
DPC 40xGE
DPC 4x10GE
SCB
SCB
OK/FAIL
0/0 0/5
0/0
0/0
TUNNEL
TUNNEL
TUNNEL
LINK
LINK
LINK
TUNNEL
LINK
10Gbps
0/0
0/0
0/0
0/0
TUNNEL
TUNNEL
TUNNEL
TUNNEL
LINK
LINK
LINK
LINK
Aggregated 10Gbps
uplinks supporting L2
& L3 services
Stack 10G
1
1
2
MGMT
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
41
42
43
44
45
46
47
48
45x
46x
47x
48x
Solid ON = Link
Blinking = Activity
45x
46x
47x
48x
Solid ON = Link
Blinking = Activity
2
MGMT
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
41
42
43
44
45
46
47
48
45x
46x
47x
48x
Solid ON = Link
Blinking = Activity
45x
46x
47x
48x
Solid ON = Link
Blinking = Activity
2
STACK NO.
FAN
PSU-I
PSU-I
PSU-E
TM
2
36
37
38
39
40
CONSOLE
Shared Ports
Summit X450e-48p
Stack 10G
1
1
MGMT
Stack 10G
1
1
2
STACK NO.
FAN
PSU-E
48
TM
2
MGMT
36
37
38
39
40
CONSOLE
Shared Ports
Summit X450e-48p
Stack 10G
1
1
2
STACK NO.
FAN
48
2
STACK NO.
FAN
PSU-I
PSU-I
PSU-E
PSU-E
Summit X450e-48p
TM
Extreme Virtual Switch
providing server
aggregation
Shared Ports
CONSOLE
Summit X450e-48p
TM
Shared Ports
Extreme Virtual Switch
providing server
aggregation
CONSOLE
Proposed Access Technology Upgrade
• Replace Existing M10 with Juniper M10i
• Fully resilient chassis (redundant HW) such as;
–
–
–
–
Power Supplies
Cooling fans
Routing Engine (RE)
Forwarding Engine Board (FEB)
• Fully resilient Design/Configuration
– 2 x 1Gbps Nodal loop Interfaces
– 2 x 1Gbps Virtual switch uplinks (initial deployment)
Proposed Access Technology Upgrade
• Replace Existing Extreme S48i aggregation
switch with Juniper EX4200.
• Redundant Power supply
• Virtual Chassis Configuration (max 10)
• 48 port 10/100/1000 capability
• Architecture design based high end core routing
products
– Packet Forwarding Engine
– Routing Engine
Proposed Access Technology Upgrade
•
Fully resilient design\configuration
– Virtual chassis deployment
– Multiple 1Gbps uplinks (resilience)
Existing Design
Proposed Design
Aggregation Point (AP)
Aggregation Point (AP)
1Gbps Nodal Loops
1Gbps Nodal Loop
Fully resilient M10i
(redundant PSU, routing and
forwarding engines)
100Mbps Nodal Loop
Juniper
NETWORKS
3
2
1
0
Ethernet 1000BASE-X SFP
ETHERNET 1000 BASE LX/SX/LH
LINE
STATUS
RX ACTI V ITY
ACTIVITY
LINK
STATUS
0/
TX
RX
ETHERNET 100BASE-TX
Ethernet 1000BASE-X SFP
LINE
STATUS
RX ACTI V ITY
ACTIVITY
LINK
1/
LT
TX
RX
Internet
ETHERNET 1000 BASE LX/SX/LH
STATUS
STATUS
PORT 0
RX
LINK
STAT
US
M10
TM
PORT 1
RX
LINK
NETWORKS
PORT 2
RX
LINK
PORT 3
RX
LINK
Juniper
ETHERNET 1000
BASE-TX
R
P rocessor
ETHERNET 1000
BASE-TX
ETHERNET 100BASE-TX
3
STATUS
PORT 0
RX
LINK
PORT 1
RX
LINK
STAT
US
PORT 2
RX
LINK
PORT 3
RX
LINK
MGMT
LINK
ACT
LINK
ACT
LINK
PIC 0/3
PIC 0/2
PIC 0/1
PIC 0/0
PIC 1/3
PIC 1/2
PIC 1/1
PIC 1/0
2
PICS ON/OFF
0/2
0/1
1
PC CARD
0/0
0/1
AUX/MODEM
MGMT
AUX/MODEM
MGMT
HDD MASTER
RESET
MINOR ALARM
CONSOLE
OFFLINE
PC CARD
0/0
FAIL
JUNIPER NETWORKS LABEL THIS SIDE
PORT 0
CONSOLE
ONLINE
RE-400
MAJOR ALARM
0/2
FAIL
JUNIPER NETWORKS LABEL THIS SIDE
PICS ON/OFF
ACT
0/3
PORT 1
HDD MASTER
RESET
MINOR ALARM
PORT 0
1/
0
RE-400
MAJOR ALARM
0/3
PORT 1
LINK
AUX/MODEM
ACT
0/
CONSOLE
ONLINE
OFFLINE
Resilient 200Mbps Capacity Links
1
50
RT
49
RT
PO MT
MG
PO
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
41
40
42
43
44
45
46
47
48
2Gbps Aggregated
Uplink
CONSOLE
49
EX4200 48 port 10/100/1000
switches (max 10 per stack)
Extreme Networks Summit48si
50
R
1
50
RT
49
RT
PO MT
MG
PO
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
41
40
42
43
44
45
46
47
48
CONSOLE
49
Extreme Networks Summit48si
50
R
2, 5, 10, 100 Service delivery
BT LES service Active Equipment (A end)
Virtual Switch
Point to Point fibre delivered via ‘A’ end and ‘B’
end BT serving exchange
2, 5, 10, 100 & 1000Mbps Service delivery
Sample AP Configuration
BT LES service Active Equipment (A end)
BT LES service Active Equipment (B end)
BT LES service Active Equipment (B end)
Edge Site
Edge Site
1
50
RT
49
RT
PO MT
MG
PO
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
1
POR MT
MG
50
T
POR 49
T
CONSOLE
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
CONSOLE
49
50
Extreme Networks Summit48si
R
49
50
Extreme Networks Summit48si
R
Access Bandwidth Upgrade
• All current 100Mbps nodal loops upgraded to 1Gbps
–
–
–
–
–
–
–
–
–
–
–
–
Merton – Croydon
Merton – Earls Court
Bromley - Croydon
Bromley – Welling
Lewisham - Welling
Welling – Bexleyheath
Romford – Bexleyheath
Romford – Telehouse
Waltham Forest – Camden
Haringey – Camden
Haringey – Barnet
Hayes - Harrow
• Prevent degradation of service in the event of primary loop failure
• Enhanced Traffic Engineering capability
Access Bandwidth Upgrade
Enfield
Barnet
Haringey
Harrow
Waltham
Forest
Romford
Newham
Camden
Park Royal
Tele
House
Hayes
Earls
Court
Welling
Lambeth
Bexley
Heath
Richmond
Lewisham
Merton
Croydon
Core
AP
Bromley
Core Network Node
Aggregation Point
Core 10Gb Links
Nodal Loop 1Gbps
Purley
URL Filtering Platform Enhancements
• Evaluation exercise underway “Squid MkII” vs
Bluecoat 8100.
• Scaled to 2.5Gbps (N+1 resilience total 5Gbps)
• Additional Active/passive F5’s deployed to scale
beyond 2.5Gbps
• Current total filtered traffic 1.5Gbps
• Expect 500Mbps year on year increase
URL Filtering Platform Enhancements
32GB RAM for super fast access to the most frequently accessed cached-objects. Represents a 16x performance benefit over current hardware
2x 1Gbps copper ethernet interfaces.
One facing the internet, the other
facing the user, representing a 10x
performance improvement over
current hardware
2x 4-Core CPU allowing 8
concurrent execution threads/
process to handle users
requests, cache-lookups and
drive the high-performance
XFS file system
4-Core CPU
SQUID
Represents a minimum of 8x
performance benefit over
current hardware
XFS Allocation Groups allow
concurrent (multi-threaded) access to
stored objects.
4-Core CPU
XFS Filesystem
Supports stripe-aligned storage blocks for better RAID performance
Balanced-Trees for fast i-node lookups
Ideal for many small files (typically 25KB)
EXT3 Filesystem for operating
system
Disk 1
Disk 2
Operating System (RAID1)
Mirrrored Disks
Hot-Swappable
Disk 3
Disk 4
Disk 5
Disk 6
Disk 7
Cached Objects (RAID5)
Hot-Swappable
Represents a 4x performance benefit over current hardware
Disk 8
Replacement CPE
•
•
Extreme 24e3/S200 replaced with Juniper J2320
Features
–
–
–
–
•
Forwarding performance IMIX 400Mbps
3DES performance 170Mbps
4 onboard 10/100 ports
3 Physical Interface Card (PIM) slots
ES code
– Combines session state information/next hop forwarding
•
MPLS support fast reroute (resilient fibre services)
Summary
•
•
•
High availability, scalable future proof infrastructure
Low risk implementation/migration
Continued delivery of existing Network Centric services such as;
–
–
–
–
–
–
•
Securestore
Desktop Content Control (DCC)
Campus Monitoring Protection (CMP)
High Definition Video Conferencing (HDVC)
Secure Remote Access (SRA)
Broadband Resilience Service (BRS)
Enhanced distributed functionality – enabling new service developments
such as:
–
–
–
–
Virtual Private LAN Services (VPLS)
Broadcast video
High capacity Resilient Broadband Services
Security Services
Per-User URL Filtering
Stewart Duncan
Technical Manager
Current URL Filtering
• LGfL URL Filtering Service is based
around the NetSweeper Product
• Policies can currently be configured by IP
address and time of day
• Reporting features are available to report
on IP based sessions
What is required?
•Schools and LAs would like to identify end
users for reporting
•Have the ability to setup different policies for
individual users or groups of users
•IT Managers and Head Teachers need the
ability to track URL traffic for an individual
rather than a specific IP address
What are LGfL doing to help?
• LGfL working with Synetrix and Atomwide to
enable the platform to offer Per-User
/Group level Filtering
• Enabling the USO to link with the
NetSweeper Platform
• Allow local management of User Policies
through a web based front-end
Where we are so far
• A trial is currently taking place in various
locations across London
• So far the trial is going well and bugs are
being identified and cleared up
What does it Look like?
The new front end allows configuration of
multiple groups each with a separate policy.
What does it Look like?
Here you can configure which users belong
to which policy within the USO.
What does it Look like?
Users are then prompted to log in when they
run Internet Explorer and try and access the
web.
What does it Look like?
If users try and breach the policy they belong to, the standard
deny page is displayed with details of the Group Name they
belong to.
Summary
• Per User Level Filtering will be available
for Schools and LAs soon.
• It is available from Synetrix
• Support is available on 08700 636465
(option 1) or by email.
• The service will cost:
• £145 setup and £225 per year
SIF
The Schools Interoperability
Framework
Rupert Hay Campbell
Barking and Dagenham
SIF in Barking & Dagenham
Rupert Hay-Campbell
Contents
• What is SIF?
• About Barking & Dagenham
– MIS systems in use
– Data requirements & issues
• SIF in Barking & Dagenham
What is SIF?
• In the UK SIF has developed out of a number of
Government initiatives:
– Harnessing Technology
– School Management Information systems and value for
money
Recommendation 3
That Becta will establish a supplier-independent and open interoperability
architecture to create the opportunity for improved interoperability at the school level
and at the LEA or regional broadband consortium (RBC) level. Additionally Becta’s
interoperability arrangements will draw, to the maximum extent possible, on ongoing
work across Government on interoperability standards.
School Management Information Systems and Value for Money, Becta 2005, p. 4
What is SIF?
• An open standard, launched in the USA in 1997
– Over 300 software vendors, school districts and other
organisations are members
• A standard, not a product
• Standards are developed by the members, not imposed
by a central authority
• Clear governance model
• Certification of products
What is SIF?
• Hub and spoke model of data integration
• Zone Integration Server
– A software application that acts as the hub ensuring that
data is routed to the correct applications
• SIF agent
– A piece of software that connects an application to the ZIS
SIF – Publish/Subscribe model
2. The ZIS works
out which
applications
subscribe to the
data items
Data
SIF
Agent
LA Zone Integration Server
SIF
Agent
LA Main System
1. A change is made to
the data held in a
publishing application
3. The Data is then
sent to the subscribing
applications
SIF
Agent
School
Network
SIF
Agent
SIF
Agent
Catering
System
Data
School MIS
Library
System
SIF – Request/Response
model
1. An application
requests data relating
to an object
SIF
Agent
3. The provider
responds with the
requested data
LA Zone Integration Server
SIF
Agent
LA Main System
SIF
Agent
2. The ZIS identifies
the default provider for
the object and routes
the request
School
Network
SIF
Agent
SIF
Agent
Req.
Catering
System
Data
School MIS
Library
System
What is SIF?
What would a national SIF
infrastructure look like?
• Multiple zones
• Hierarchy of zones
• What happens to school census?
Data challenges
• Large number of data systems in schools and
Children’s Services
• Data systems do not share information
– Inefficient working with large scale re-entry of data, data
errors and inconsistencies
• ContactPoint and LDQT represent significant
challenges
• Learning Platform developments
Further information
Rupert Hay-Campbell
MIS Adviser
Tel: 020 8270 4880
Email: [email protected]
Web sites:
www.sifinfo.org/uk
http://localauthorities.becta.org.uk/index.php?section=ndi&catcod
e=la_ndi_02
The LGfL USO
Ian Lehmann
Operations Manager
What is USO?
Unified Sign On (USO)
A term used by LGfL to describe an authentication system
where the same username and password is used to gain
access to a wide variety of systems.
In this scenario it is necessary to enter the username and
password once for each service that is accessed.
However, a user can alter his/her password in one place and
have that change propagate to all systems
What is the LGfL USO?
• A database of users within London and the
UK
• A database of users which can be
maintained by nominated contacts in
schools and Local Authorities
• A system for authenticating against LGfL
protected resources both Web
(Shibboleth) and non-web based.
Service access illustration for LGfL USO
User Account holders:
All Users
USO Username
Single Username & Password

LGfL Podcast service
LGfL Weather Station monitoring system
LGfL Premium content
The Digitalbrain portal
Click to Meet video conferencing system
Sophos Anti-Virus update service
Windows Update Services (WSUS)
LGfL Support services and advisory web sites
PAN London Admissions System
Other VLE/MLEs, including:
It’s Learning,
Moodle,
First Class
Uniservity
Adobe Connect web collaboration suite
Atomwide WebScreen
Atomwide Shibboleth enabled Email Filtering
Atomwide VPN Remote Access Services
Synetrix USO Integrated Filtering (UIF)
Synetrix Email Systems’ Email Content Control
Synetrix Remote Secure Access Service
Synetrix E-Safety Service
LGfL MLE (Fronter)
LGfL StaffMail
LGfL LondonMail
LGfL MailProtect

With ADSync and/or LASync options
Access to School LAN ‘Home’ and
‘Shared’ areas, and to applications
authenticated via the local AD
Access to LA AD authenticated
applications inc.:
Capita SIMS Learning Gateway
Service access
illustration for Non
Full-USO User
Account holders:
Digitalbrain Username
For Digitalbrain Service, plus:

LGfL Podcast service
LGfL Weather Station monitoring system
LGfL Premium content
The Digitalbrain portal
LGfL MLE (Fronter)
Fronter Username
For Fronter Service, plus:
USO Username (Staff Only)
For USO/Shibboleth services,
inc.:



With ADSync and/or LASync
Access to School LAN ‘Home’ and
‘Shared’ areas, and to applications
authenticated via the local AD
Access to LA AD-applications inc.:
SIMS Learning Gateway
SharePoint
Corporate Services
Shibboleth-enabled services:
Atomwide/LGfL USO-only Services:
Click to Meet video conferencing system
Sophos Anti-Virus update service
Windows Update Services (WSUS)
LGfL Support services and advisory web sites
PAN London Admissions System
Other VLE/MLEs, including:
It’s Learning, Moodle, First Class, Uniservity
Adobe Connect web collaboration suite
Atomwide WebScreen
Atomwide Shibboleth-enabled Email Filtering
Atomwide VPN Remote Access Services
Synetrix USO Integrated Filtering (UIF)
Synetrix Email Systems’ Email Content Control
Synetrix Remote Secure Access Service
Synetrix E-Safety Service
LGfL StaffMail
LGfL LondonMail
LGfL MailProtect
What other advantages does the
LGfL USO provide?
• The USO provides a school or Local
Authority with one database of users for
authentication against any service.
• The LGfL USO can provide authentication
for the Per User Level Filtering service
offered by NetSweeper.
• The LGfL USO can also be used to
synchronize with the local school or LA
Active Directory system.
What does ADSync Look like?
The LGfL USO ADSync does provide one Username
and Password for all services
How can you get the LGfL USO for
your school or LA?
•Details of the LGfL USO are available from your LA or
LGfL representative
•Alternatively see www.uso.lgfl.net for further information
or contact [email protected]
LGfL Managed
Email Services
Brian Durrant
Chief Executive
London Grid for Learning
StaffMail
StaffMail
•
•
•
•
•
•
•
•
For Staff, Governors and Admin
Delivered in conjunction with Atomwide
Dual Hosted (Telehouse and Park Royal)
Fault Tolerant & Resilient
Full Exchange 2007 Functionality
5GB Mailbox Limit
Max 20MB Email Size inc. attachments
Provided ‘free’ to LGfL Schools
StaffMail Features
• Personal and shared calendaring
• Personal and shared address books
• Accessible via:
– MS Outlook
– MS Outlook Web Access
– Outlook Mobile Access (compatible PDA or
m’phone)
• POP3, SMTP, IMAP protocols supported,
and mail forwarding
StaffMail Login Screen
• Access to StaffMail is via LGfL USO
StaffMail Outlook Web Access
StaffMail & MailProtect
• All email scanned for viruses, spam and
inappropriate content by LGfL MailProtect.
• Staff can control spam including access to
spam release, email spam digest
reporting, and email in/out reporting.
StaffMail on-line identity & domains
• By default each user will receive an email
address based upon their USO account name
with a domain name of lgflmail.org
• For example, ‘John Smith’ may receive a USO
user name of jsmit001.318 and an email
address of [email protected]
• LAs may supply own domain (eg. lbwf.org) and
this may be applied to all users in the LA
• Schools may supply their own domain name
“schoolname.la.sch.uk” and to be applied to all
of the users in the USO in their school
StaffMail Address Books
• Each user may add and delete entries from their
own private address book
• a school staff member will see:
– all staff at their school - only
– all pupils at their school that are using LondonMail
– the LA shared list
• a LA staff member will see:
– school lists of staff
– the LA shared list
LondonMail
LondonMail
• A Microsoft Live@edu service, branded LGfL, offered as
a turn-key solution for use by pupils.
• highly availability web-mail service for curriculum use
• inbound and outbound mail filtering by MicroSoft
• protects against viruses, spam and inappropriate content
• all inbound email also scanned for viruses, spam and
inappropriate content by LGfL MailProtect.
• Exchange Functionality hosted by Microsoft in Dublin
• 5GB Mailbox Limit
• Max 20MB Email Size including Attachments
• Provided ‘free’ to LGfL Schools
LondonMail Features
• Personal and shared calendaring
• Personal address books
• Accounts will be accessible via:
– MS Outlook
– MS Outlook Web Access
– Outlook Mobile Access (compatible PDA or
m’phone)
• POP3, SMTP, IMAP protocols supported,
and mail forwarding
LondonMail Outlook Web Access
LondonMail - identities & domains
• each user is allocated an email address based upon
their existing USO or new USOlite account name
• ‘John Smith’ receives jsmit001.318 and an email address
of [email protected]
• As a Becta Accredited Internet Services Provider LGfL
supports email address anonymity. As a requirement of
accreditation, LGfL enables LAs and schools to reduce
the risk to pupils by providing by default email addresses
that protect pupils' anonymity
• An LA may choose to supply their own domain (lbwf.org)
and this may be applied to all users in the LA
MailProtect
MailProtect
• Used in conjunction with LGfL StaffMail
and LondonMail services
• MailProtect uses email filtering technology
provided by Email Systems
• Dual Hosted (Telehouse and Park Royal)
• Fault Tolerant & Resilient
Service Documentation
• The most current versions can be found on the
LGfL Support website (http://support.lgfl.net)
• LGfL Managed Microsoft Exchange Email
Service for Staff (StaffMail)
• LGfL Managed Microsoft Exchange Email
Service for Pupils (LondonMail)
• LGfL Email Content Control (MailProtect)
• USO Service Description
• USO Service Datasheet
• USO Service Pricing
Timelines
•
•
•
•
•
•
•
•
020 8255 5555 Support Number – Now!
StaffMail pilot users – 17 March 2008
StaffMail first LA – 31 March 2008
LondonMail test users – 21 April 2008
LondonMail pilot schools – 2 June 2008
LondonMail first LA – 24 July 2008
MailProtect – 17 March 2008
Full Production All Services – 3 September 2008
Migration from @mail
• LGfL @mail will cease service 31.10.08
• Contact lists will be migratable
• If full migration is required, use Synetrix
Email Hosting sync utility
Future
• StaffMail RIM (Blackberry) Access
• LondonMail Shared Contact Lists
Finally….
New
low-cost LGfL
support number
020 82 55 55 55
•
•
•
•
Local call on 020 82 55 55 55
Same as 08700 63 64 65 (but cheaper!)
08700 63 64 65 still operational
Help desk for StaffMail and LondonMail
Services are via Option 3
Microsoft Dublin Data Centre
LondonMail & USO-lite
• LGfL USOlite accounts may be provisioned for certain individual
services, such as LGfL LondonMail. Where these have been
provisioned, the account is restricted for use only with those
designated services
• In the event of non USO account holders subscribing to multiple
services that are supplied complete with a USOlite account, then the
user may be able to use the same credentials for each service.
USOlite accounts cannot access LGfL Shibboleth services such as
Premium Content
• Should a user’s account be upgraded from USOlite to a full USO
account as part of a school or LA USO purchase, the user will be
able to retain their ‘-lite’ on line identity, with its functionality simply
being upgraded automatically as part of the process
• USOlite accounts cannot be upgraded individually
Microsoft’s European Mega Data
Centre at Grange Castle, Dublin
• Previous slide -Rendering of the finished
data centre
• £250 million mostly automated plant
• Total building footprint - 570,000 square
feet
• 18.9 acre site
Similar Microsoft Data Centre
under Construction
Mobile Learning Devices
Paul Whiteman
Merton
Which Mobile
Device?
Paul Whiteman
LB Merton
Is it really mobile?
Who is going to carry it ?
Can we afford them?
Can we afford to
replace them?
Are they insured?
Value for money?
Buy or lease?
How long do the
batteries last?
How long to recharge?
Will it survive the odd knock?
Is it compatible with other
systems in the school?
How easy are they going to
be to support?
How desirable is it?
Will I find them on
sale at the local?
Who owns the
equipment?
Who pays for it?
Is your solution future proof?
The London MLE
(Fronter 81)
Antony Moore
Fronter
SRF and Technician’s
Richard Allen
Becta
SRF for Technicians
London Technicians Conference
17th March 2008
By Richard Allen
Consultant – Learning Services
How are you doing?
• You’ve reduced the number of printer errors by
upgrading printer drivers / replacing printers/
ensuring all same type of printers used / stopped
people printing huge graphics
• ……. And so on
• At which point does your audience stop listening
to you explaining all the great stuff you’ve done
with drivers, software, networks, computers?
• Why – because they don’t get excited about
computer stuff (no really they don’t!!!)
How to promote the good
work you do
• Tell your customers the impact it has on them
• Inform your school leaders about the benefits in the
classroom
• Show how improved ICT availability is increasing
user confidence
• Demonstrate how enthusiastic the students are to
learn when using ICT
• The best way to tell them – get them to tell you!
School staff understand
assessments
• Use an environment familiar to your customers
• Ask them to assess the use of ICT using the self
review framework to show how the school is doing
• Use the technical support assessment to check on
how you are doing with ICT support
• Together you could achieve ICT Mark
What is it all about?
“The self-review framework isn’t just
about ICT and, interestingly, that is a
key factor of its success. It focuses the
mind on the whole spectrum of school
development.”
Steve Gater – Headteacher, Walker Technology College, Newcastle
Self-review framework
A jointly developed framework of standards describing
progression through a model of institutional maturity in
the use of ICT.
ICT Mark
An agreed set of standards, within the selfreview framework, indicating that technology
is being harnessed effectively and efficiently.
A maturity model for developing good ICT……
Self-review
framework
Mature
Some schools
will be here
Where
are you?
Systematic
All good schools
should be here
The self-review
framework is a
maturity model. It
describes stages of
development across
8 elements.
15% - 20%
Strategic
Where
are you?
Implementing
Developing
……using self-review to track progress
The self-review elements working together
The curriculum
Impact on the
Learner
Learning and
teaching
Professional development
(People resource)
Assessment
Resources
Extending
opportunities for
learning
..rather than actions changing
the learning environment.
Schools tend to focus actions
on staff and resources….
Leadership and management
Actions supported by the leadership team determine improvement outcomes
Self-review - people planning
improvement
• Review practice not technology
• Focus on evaluating whole school
improvement not auditing technology
implementation
• Review your actions and progress as well as
practice
• Use review to establish a consensus involving:
–All staff
–Pupils' views and insights
–Other stakeholders
Element 7; Resources – the strands
• 7a. Provision
– 7a-1 Physical environments
– 7a-2 Sufficiency and suitability of resources
– 7a-3 Digital learning resources
• 7b. Access
– 7b-1 ICT supporting efficient working practices
– 7b-2 Technical support
• 7c. Management
– 7c-1 Procurement
– 7c-2 Evaluation of ICT resources
Commentary - improvement across all elements
Example - 7a-2
Element 7
Strand a)
Aspect 2
– Resources
– Provision
– Sufficiency of provision
L3
There are enough ICT
resources to make a
contribution to the current
practice in learning, teaching
and school organisation.
L3
Might link to learning and teaching
(element 3) commentary
L2
Commentary might also describe
improvement and link to impact on
pupil outcomes (element 8)
The school is well equipped
L2 with a good range of ICT
resources and these are
sufficient to make a
significant impact on learning,
teaching and school
organisation.
The self-review framework..
“…. has enabled all the staff, not just the
ICT specialists, to understand where we
are going strategically. It has brought us
together and consolidated the whole vision
for the school.”
Roger Whittall – Headteacher, Westwood School
Some Useful Becta Tools
• Self Review Framework
• Investment Planner (TCO)
• Functional and Technical Specs
• Framework Agreements
• FITS
• SIFA and UK Federation
Self-review benefits and outcomes
• Where are you in your whole school improvement
and ICT development
• How does your school compare with others
• What are your schools aspirations
• What does good look like in your school
• How will your school progress further
• What actions will prioritise
• Where might your school need support
Ofsted success for ICT Mark schools
Schools accredited with the ICT Mark are considerably more
likely to be rated ‘outstanding’ in all five measures.
More specifically, ICT Mark accredited schools are:
• Four times more likely to be rated as ‘outstanding’ in the
Overall effectiveness of the school category
(ICT Mark schools: 40%, national primary: 9%, national secondary: 10%)
• Three times more likely to be rated as ‘outstanding’ in the
Achievement and standards category
(ICT Mark schools: 31%, national primary: 8%, national secondary: 9%)
• Three times more likely to be rated as ‘outstanding’ in the
Leadership and management category
(ICT Mark schools: 42%, national primary: 11%, national secondary: 12%)
• Four times more likely to be rated as ‘outstanding’ in the
Teaching and learning category
(ICT Mark schools: 29%, national primary: 7%, national secondary: 5%)
Ofsted reports on ICT Mark schools
The large majority of Ofsted reports on ICT Mark schools
contain positive comments in relation to a number of ICT
areas, including:
• Use of interactive whiteboards;
• Development of pupils ICT skills;
• The use of ICT to raise attainment;
• Investment and level of ICT resources;
• Planning, assessment and pupil profiling using ICT;
• Teachers ICT skills;
• ICT raising pupil confidence; and
• ICT leading to involvement in community events.
Vision and aspirations
What are your aspirations for how technology
might be used to support wider school aims and
learning environment.
• Classroom and teaching strategies
• Curriculum development
• Assessment for learning
• Extending opportunities for learning
• Parental engagement
Celebrate success
Enables schools to recognise and celebrate
their successes.
When a school feels secure in its judgement that it has reached
the nationally agreed standards in all the aspects of the
framework, it may choose to apply for the ICT Mark.
To gain the ICT Mark the school requests a visit from an
accredited assessor, who will validate the school’s selfevaluation.
The ICT Excellence Awards offer further
recognition for schools that demonstrate evidence of
excellent practice above and beyond the levels of the ICT Mark.
Informs other schools and organisations that you are a potential
partner for extending opportunities for learning through
technology
Assessments, SRF and FITS links
• http://matrix.becta.org.uk
• http://schools.becta.org.uk/index.php?section=
srf
• http://www.becta.org.uk/fits
Register your results and be recognised
Thank you
[email protected]
BSF
Anne Casey
BSF ICT
Anne Casey
[email protected]
What we will cover in this session
• Fundamental facts of ICT in BSF
• What elements to consider as part of a managed
service
• How the ICT funding is allocated
• How much input the schools have
What we wont cover in this session
• The specific ICT elements for your school
• The procurement process
• The scope of your school/LA managed service
The Golden Thread
SfC
1
ICT Vision
& Strategy
SfC
ICT
Output
ICT Vision
2
ICT Vision
OBC
& Strategy
Spec
& Strategy
And the ICT?
What is a Managed Service?
At its simplest a Managed Service consists of a
single contract designed to deliver all ICT systems
and services.
This comprises provision of and support for:





Learning Platform including MIS, VLE and learning content
Wide area network – probably linking to the LA’s broadband service
Institutional infrastructure (School LAN)
All users’ equipment: access devices; peripherals, etc.
Network services: user account management; e-mail; back-up;
virus protection; Internet filtering and/or monitoring; curriculum
software servers; video-conferencing; etc
And…..
 Anywhere, anytime access for all users
 Integration of legacy hardware and software
 Change management: operational training; pedagogical
training
 ICT for school administration
 Helpdesk
 Technical support
 Refresh and sustainability
 Local choice
ICT Output Specification & OBC
•e.g. the facility for
visually impaired
students to be able to
access their personal,
adapted profile from
whatever user device
they may choose to
use at any location
Output specification.
• Design and Installation Requirements (Learning
platform, infrastructure and equipment)
• Transition and Implementation Requirements
• Operational Requirements
• Finance and Management Requirements
The ICT Supply Chain – how it works
ICT Output Specification
inc. Local Choice Fund
LEP Bidding Consortium inc. Construction, FM, F&E, ICT
ICT Partner / key supplier
Active network kit
Services – AV, email
VLE
MIS
central provision
Computer hardware
Peripheral devices
Specialist hardware
Curriculum software
Tech Support
Training
some school choice
full school choice
How is a Managed Service financed?
 BSF capital: £225 per pupil place for passive network
infrastructure
 BSF capital: £1450 per pupil place for equipment, software and
services
This is a way of describing the overall ICT funding envelope.
It is NOT an allocation formula for schools.
 School revenue: annual contribution for the 5-year life of the
ICT contract to fund on-going maintenance of the ICT managed
service: ‘extra’ elements of local choice funds; the refresh pot;
training.
What we advise LAs to do.
• Ensure schools understand scope of managed
services
• Ensure schools understand current TCO
• Engage all technical staff in discussions
• Engage all relevant staff in development of the output
specification
• Ensure current staffing position and levels of service
are understood
e-Safety
Helen Warner
Kensington and Chelsea
LGfL supporting e-safety
Helen Warner
Royal Borough of Kensington and Chelsea
ICT Support Service
• A class of 9 year olds are in the ICT suite.
The teacher gives them a research topic
‘Thailand’. Salil calls the teacher over to
tell her that the search results include a
link ‘adult sex’, he is told “Don’t click the
link” and the teacher then moves away to
talk to another group of children elsewhere
in the classroom.
• Darren, a young Australian teacher, has
his own MySpace area and has posted
pictures of himself, his friends and lots of
details of his life. There’s a video clip of
him in Lanzarotte, very drunk, having fun.
Some of his pupils have found it.
• A very high number of pupils have their
own MSN Messenger accounts and brag
about how many ‘friends’ they have. You
overhear one of the particularly brash Y9
girls bragging about her ‘older boyfriend’,
who she plans to meet.
http://www.esafety.lgfl.net/
Education Programme
• Penelope, Head of Maths, has emailed
some pupil reports to her hotmail account
so she can finish at home.
Alan, a science teacher, has been
using his open Blog to share his views
about education, his school and the
school’s leadership.
A teacher tells her technician she
is upset because a pupil has
posted a rude message on a
Forum in the London MLE and
asks him which child it was
because she doesn’t know.
Policy Resources
•Policy separated into sections and
includes specific references for child
protection and anti-bullying policies
Acceptable Use Policies
• Mr Jones reports that a student has a
pornographic image on his screen. The
student says the “image just appeared and
it’s the first time it’s happened”.
• A 14 year old boy has taken his own life.
There is an allegation of bullying and that
the pupil had used websites that openly
support suicide.
LGfL URL filtering
• Based around the NetSweeper filtering system
• Provides 4 levels of filtering
–
–
–
–
Blocks all illegal content on the
Internet Watch Foundation blacklist
Global Deny list - contains other URLs deemed to be
entirely unsuitable for access within LGfL network
Category database - categorises URLs and blocks by
category
Local Deny list - allows blocking of individual URLs
Local Allow list - allows access to an otherwise
blocked URL
LGfL monitoring reports
URL logging
• Every request made through the URL filtering service is
logged, including:
–
–
–
–
–
Date and time
IP address of the user
URL details
Category of the URL
Whether it was blocked or allowed
• All logs are kept for a minimum of 3 months and are
fully searchable
• Logs are stored unprocessed, for forensic purposes
• Forensic software also available – contact Synetrix
NetSweeper Reporter Wizard
• John, the technician finds evidence of a member
of support staff gaining access to some
pornographic videos. He tells the Deputy, Keith,
who says, which computer? “Lets have a look”.
Keith takes a look and agrees. They suspect its
Danny, who’s part-time and wait until he’s in to
challenge him. He denies all knowledge and
then accuses the Deputy of harassing him.
Danny has never signed an Acceptable Use
Policy form.
Possible incident procedure in case of
illegal content
1. Inform Head / senior leader and start an incident log.
All staff must report back to the member of SMT who
updates the incident log at each stage.
2. Don’t use the equipment. Photograph, bag and secure it –
witness by 2 people from SMT.
Suspend user’s network / computer access.
3. SMT decide if sufficient initial evidence / doubt to suspend
member of staff pending investigation.
Possible incident procedure in case of
illegal content cont:
4. Link computer name to IP address on LAN.
If auditing enabled on server, link username to computer.
Request Internet logs from Synetrix.
SMT inform LA – eSafety officer (Personnel) etc.
Gather evidence e.g. screen prints if have Forensic software,
AUP form, CCTV footage, timetable, etc.
5. SMT decide whether to involve a Third Party Forensic firm.
Start disciplinary action if necessary.
In case of Child Pornography – immediately inform Police.
0808 100 00 40 at:
http://www.met.police.uk/childpornography/index.htm
Useful Online Resources
Penny Patterson
and
Gary Jelks
Useful Online Resources
Penny Patterson
and
Gary Jelks
How would you use?
• School network
• Standalone in school
• At home only
http://www.tech.lgfl.net
http://audacity.sourceforge.net/
http://filehippo.com/download_hij
ackthis/
http://free.grisoft.com
http://housecall.trendmicro.com
http://www.edugeek.net/
http://www.intravnews.com/
http://www.lavasoft.com
http://www.microsoft.com/technet
/sysinternals/FileAndDisk/PsTool
s.mspx
http://www.netstumbler.com
http://www.roboform.com
http://www.safer-networking.org
Social networking
•
•
•
•
Facebook
MySpace
Bebo
Piczo
http://www.skype.com
http://www.thinkfree.com
http://www.youtube.com
http://www.lgfl.net/lgfl/accounts/te
chsupport/techconf/menu/
ICT Technician’s Update
Conference
17 March 2008