SlideShare una empresa de Scribd logo
1 de 18
Connecting Syria’s
Refugees
Matt Altman, Rakesh Bharania
Cisco Tactical Operations
NetHope Global Summit 2016
7 November 2016
NetHope Emergency Response Working Group
Agenda:
Refugee Connectivity:
Design for Mass Communication
Network Architectures
Built in Security and Quality
3© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Principles of Mass
Communication
Cisco Public 44© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Historically, Hastily Formed Networks (HFNs) have
been deployed to support humanitarian workers only.
Relatively low number of users, small number of sites
On the refugee crisis, providing communications
to a mass population was the primary goal.
(similar to UN ETC 2020 CwC)
Tens/hundreds of thousands of users,
multiple sites, broad geography. Internet access
essential for asylum applications in Greece
This forced us to make several design assumptions…
Mass Communications: What Made This Different.
Cisco Public 55© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Our networks had to be …
Standardized: One design that could be replicated multiple times across dozens
of locations.
Portable: The smaller/lighter the hardware, the easier it was to transport and deploy.
Supportable: Ensure the networks could be supported and managed over the long-term
with few resources on the ground.
Equitable: Networks had to support the maximum number of users, prevent “super users”
from using too much bandwidth. Consider social dynamics (ensure gender equity, etc)
Designing Networks Differently
Cisco Public 66© 2013-2014 Cisco and/or its affiliates. All rights reserved.
To support large numbers of users over a long duration, we needed…
Advanced Cybersecurity – advanced threat protection for refugee and humanitarian worker
devices, even though we had no ability to enforce policy on any device.
Content Management – Block malware sites, peer-to-peer (network stability),
adult content (cultural/social)
Traffic Shaping / QoS - Prioritize voice/video traffic to ensure quality
Rate Limiting – Allow software updates to download w/o saturating network
Network management – networks continually managed for performance, break/fix
with little/no persistent on-site staff
We couldn’t use “dumb pipe” networks.
7© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Network Design
Cisco Public 88© 2013-2014 Cisco and/or its affiliates. All rights reserved.
INTERNET
DSL – 4Mbps x 1Mbps
TOOWAY VSAT – 10 Mbps x 1Mbps Groundstation
INTERNET
3GCradlepoint 2100
MX64 FW/
gateway
MR72-
GRE-007-AP1
Gateway
MR72-
GRE-007-AP2
Gateway
Ubiquiti M5
Ubiquiti M5
INTERNET
DSL – 4Mbps x 1Mbps
MX64 FW/
gateway
MR66-
KIT-013-AP1
Command Pole
GATEWAY
MR66-
KIT-013-AP5
Repeater
MR66-
KIT-013-AP2
Runway Pole
Repeater
MR66-
KIT-013-AP3
Wash Area
Repeater
MR66-
KIT-013-AP4
Repeater
MR66-
KIT-013-AP6
Repeater
Equipment :
Router – Meraki MX64
Cloud managed
Firewall, IPS, AMP
Content Filtering
Access Point – Meraki MR66/72
Cloud managed
Dual Band MESH
Identity based firewall
PtP Wireless – Ubiquiti M5
5GHz
BackHaul –
Cradlepoint AER 2100
Cloud-managed
Dual Modem — Multi-carrier
Eutelsat Tooway VSAT
Cisco Public 99© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Public 1010© 2013-2014 Cisco and/or its affiliates. All rights reserved.
First teams deployed:
November 2015
Nine Deployment Teams
(NH Teams A – I)
Total Meraki Sites Deployed
62 (14 decommissioned)
Number of users supported
since November 2015:
400,000+
11© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Security
Cisco Public 1212© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Protect the mission
Protect the vulnerable
Keep bad things out.
Keep critical services running
Know what’s happening
on the network and devices
Balance security and access
Get it right every time.
Security: What are We Really Trying to Do
Cisco Public 1313© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Humanitarian cybersecurity is different than the enterprise…
Cisco Public 1414© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Advanced refugee protection: Meraki MX + OpenDNS
INTERNET
MALWARE
C2/BOTNETS
PHISHING
AV
AV
AV AV
MERAKI MX
AV AV
MERAKI MX
SANDBOX
PROXY
NGFW
NETFLW
AV AV
AV AV
MID
LAYER
LAST
LAYER
MID
LAYER
LAST
LAYER
MID
LAYER
FIRST
LAYER
Perimeter
Perimeter Perimeter
Endpoint
Endpoint
MERAKI MX
Advanced security architecture
for humanitarian response.
Meraki MX Security Appliance:
• SourceFire AMP
stops malware on site –
220M known malicious files,
1.5M eval daily
• Snort based IPS/IDS
• Webroot BrightCloud content
filtering
OpenDNS Umbrella – DNS
security in the cloud, constantly
updated with botnet, malware
sites in real-time.
Cisco Public 1515© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Results – Automated, multi-layered threat defense
24/7 advanced security protection
at every location, w/real-time updates
(16,000 weekly clients, 18 TB/week)
320,000 IPS block events / month (all sites)
Stopping novel/new mobile malware/rootkits
without touching any client devices.
1.7-2.4 million DNS queries analyzed for threat
every 24 hours. Credible threats stopped in the cloud.
Cisco Public 1616© 2013-2014 Cisco and/or its affiliates. All rights reserved.
What does this mean for vulnerable refugees?
Android malware is the number one threat.
Example Android malware: Kemoge (android rootkit),
Triada (financial fraud malware)
We are protecting vulnerable refugees from theft of
sensitive information on their devices, keeping their
limited money out of the hands of organized crime.
We are protecting NetHope NGO & UN aid workers’
devices from these threats too!
17© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Thank you.

Más contenido relacionado

La actualidad más candente

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefCisco Crisis Response
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Cisco Crisis Response
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)Cisco Crisis Response
 
Working Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseWorking Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseCisco Crisis Response
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Filip Maertens
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1Irsandi Hasan
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network securityAhmed Habib
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...APNIC
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirtvngundi
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Cisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyCisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyMobeen Khan
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3Asher Sterkin
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursDavid Busby, CISSP
 
ADVA ConnectGuard™
ADVA ConnectGuard™ADVA ConnectGuard™
ADVA ConnectGuard™ADVA
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCisco Service Provider
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTWD Industries AG
 

La actualidad más candente (20)

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
Working Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseWorking Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian Response
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
Internet of Things... Let's Not Forget Security Please!, by Eric Vyncke [APNI...
 
Day 1 Enisa Setting Up A Csirt
Day 1   Enisa   Setting Up A CsirtDay 1   Enisa   Setting Up A Csirt
Day 1 Enisa Setting Up A Csirt
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Cisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching FamilyCisco Catalyst 9000 Switching Family
Cisco Catalyst 9000 Switching Family
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
 
Web application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yoursWeb application-security-and-why-you-should-review-yours
Web application-security-and-why-you-should-review-yours
 
ADVA ConnectGuard™
ADVA ConnectGuard™ADVA ConnectGuard™
ADVA ConnectGuard™
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
 
Trustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable SecurityTrustleap - Mathematically-Proven Unbreakable Security
Trustleap - Mathematically-Proven Unbreakable Security
 
Structural organization of LSA architecture
Structural organization of LSA architectureStructural organization of LSA architecture
Structural organization of LSA architecture
 

Similar a Connecting Syria's Refugees

During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Chp11 infrastructure for ec
Chp11 infrastructure for ecChp11 infrastructure for ec
Chp11 infrastructure for ecEngr Razaque
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Companydtimal
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Cisco Russia
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response TimeBoni Bruno
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkAntonio Di Cello
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
World of many (OpenStack) clouds - the Making of the Intercloud
World of many (OpenStack) clouds - the Making of the IntercloudWorld of many (OpenStack) clouds - the Making of the Intercloud
World of many (OpenStack) clouds - the Making of the IntercloudLew Tucker
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxannettsparrow
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and moreInternet Society
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 

Similar a Connecting Syria's Refugees (20)

During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Chp11 infrastructure for ec
Chp11 infrastructure for ecChp11 infrastructure for ec
Chp11 infrastructure for ec
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Palo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security CompanyPalo Alto Networks, The Networking Security Company
Palo Alto Networks, The Networking Security Company
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
 
Decreasing Incident Response Time
Decreasing Incident Response TimeDecreasing Incident Response Time
Decreasing Incident Response Time
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
OSNF - Open Sensor Network Framework
OSNF - Open Sensor Network FrameworkOSNF - Open Sensor Network Framework
OSNF - Open Sensor Network Framework
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
World of many (OpenStack) clouds - the Making of the Intercloud
World of many (OpenStack) clouds - the Making of the IntercloudWorld of many (OpenStack) clouds - the Making of the Intercloud
World of many (OpenStack) clouds - the Making of the Intercloud
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
IoT4Devs (1)
IoT4Devs (1)IoT4Devs (1)
IoT4Devs (1)
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Infrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docxInfrastructure SecurityChapter 10Principles of Compute.docx
Infrastructure SecurityChapter 10Principles of Compute.docx
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
DDos, Peering, Automation and more
DDos, Peering, Automation and moreDDos, Peering, Automation and more
DDos, Peering, Automation and more
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 

Último

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 

Último (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 

Connecting Syria's Refugees

  • 1. Connecting Syria’s Refugees Matt Altman, Rakesh Bharania Cisco Tactical Operations NetHope Global Summit 2016 7 November 2016 NetHope Emergency Response Working Group
  • 2. Agenda: Refugee Connectivity: Design for Mass Communication Network Architectures Built in Security and Quality
  • 3. 3© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Principles of Mass Communication
  • 4. Cisco Public 44© 2013-2014 Cisco and/or its affiliates. All rights reserved. Historically, Hastily Formed Networks (HFNs) have been deployed to support humanitarian workers only. Relatively low number of users, small number of sites On the refugee crisis, providing communications to a mass population was the primary goal. (similar to UN ETC 2020 CwC) Tens/hundreds of thousands of users, multiple sites, broad geography. Internet access essential for asylum applications in Greece This forced us to make several design assumptions… Mass Communications: What Made This Different.
  • 5. Cisco Public 55© 2013-2014 Cisco and/or its affiliates. All rights reserved. Our networks had to be … Standardized: One design that could be replicated multiple times across dozens of locations. Portable: The smaller/lighter the hardware, the easier it was to transport and deploy. Supportable: Ensure the networks could be supported and managed over the long-term with few resources on the ground. Equitable: Networks had to support the maximum number of users, prevent “super users” from using too much bandwidth. Consider social dynamics (ensure gender equity, etc) Designing Networks Differently
  • 6. Cisco Public 66© 2013-2014 Cisco and/or its affiliates. All rights reserved. To support large numbers of users over a long duration, we needed… Advanced Cybersecurity – advanced threat protection for refugee and humanitarian worker devices, even though we had no ability to enforce policy on any device. Content Management – Block malware sites, peer-to-peer (network stability), adult content (cultural/social) Traffic Shaping / QoS - Prioritize voice/video traffic to ensure quality Rate Limiting – Allow software updates to download w/o saturating network Network management – networks continually managed for performance, break/fix with little/no persistent on-site staff We couldn’t use “dumb pipe” networks.
  • 7. 7© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Network Design
  • 8. Cisco Public 88© 2013-2014 Cisco and/or its affiliates. All rights reserved. INTERNET DSL – 4Mbps x 1Mbps TOOWAY VSAT – 10 Mbps x 1Mbps Groundstation INTERNET 3GCradlepoint 2100 MX64 FW/ gateway MR72- GRE-007-AP1 Gateway MR72- GRE-007-AP2 Gateway Ubiquiti M5 Ubiquiti M5 INTERNET DSL – 4Mbps x 1Mbps MX64 FW/ gateway MR66- KIT-013-AP1 Command Pole GATEWAY MR66- KIT-013-AP5 Repeater MR66- KIT-013-AP2 Runway Pole Repeater MR66- KIT-013-AP3 Wash Area Repeater MR66- KIT-013-AP4 Repeater MR66- KIT-013-AP6 Repeater Equipment : Router – Meraki MX64 Cloud managed Firewall, IPS, AMP Content Filtering Access Point – Meraki MR66/72 Cloud managed Dual Band MESH Identity based firewall PtP Wireless – Ubiquiti M5 5GHz BackHaul – Cradlepoint AER 2100 Cloud-managed Dual Modem — Multi-carrier Eutelsat Tooway VSAT
  • 9. Cisco Public 99© 2013-2014 Cisco and/or its affiliates. All rights reserved.
  • 10. Cisco Public 1010© 2013-2014 Cisco and/or its affiliates. All rights reserved. First teams deployed: November 2015 Nine Deployment Teams (NH Teams A – I) Total Meraki Sites Deployed 62 (14 decommissioned) Number of users supported since November 2015: 400,000+
  • 11. 11© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Security
  • 12. Cisco Public 1212© 2013-2014 Cisco and/or its affiliates. All rights reserved. Protect the mission Protect the vulnerable Keep bad things out. Keep critical services running Know what’s happening on the network and devices Balance security and access Get it right every time. Security: What are We Really Trying to Do
  • 13. Cisco Public 1313© 2013-2014 Cisco and/or its affiliates. All rights reserved. Humanitarian cybersecurity is different than the enterprise…
  • 14. Cisco Public 1414© 2013-2014 Cisco and/or its affiliates. All rights reserved. Advanced refugee protection: Meraki MX + OpenDNS INTERNET MALWARE C2/BOTNETS PHISHING AV AV AV AV MERAKI MX AV AV MERAKI MX SANDBOX PROXY NGFW NETFLW AV AV AV AV MID LAYER LAST LAYER MID LAYER LAST LAYER MID LAYER FIRST LAYER Perimeter Perimeter Perimeter Endpoint Endpoint MERAKI MX Advanced security architecture for humanitarian response. Meraki MX Security Appliance: • SourceFire AMP stops malware on site – 220M known malicious files, 1.5M eval daily • Snort based IPS/IDS • Webroot BrightCloud content filtering OpenDNS Umbrella – DNS security in the cloud, constantly updated with botnet, malware sites in real-time.
  • 15. Cisco Public 1515© 2013-2014 Cisco and/or its affiliates. All rights reserved. Results – Automated, multi-layered threat defense 24/7 advanced security protection at every location, w/real-time updates (16,000 weekly clients, 18 TB/week) 320,000 IPS block events / month (all sites) Stopping novel/new mobile malware/rootkits without touching any client devices. 1.7-2.4 million DNS queries analyzed for threat every 24 hours. Credible threats stopped in the cloud.
  • 16. Cisco Public 1616© 2013-2014 Cisco and/or its affiliates. All rights reserved. What does this mean for vulnerable refugees? Android malware is the number one threat. Example Android malware: Kemoge (android rootkit), Triada (financial fraud malware) We are protecting vulnerable refugees from theft of sensitive information on their devices, keeping their limited money out of the hands of organized crime. We are protecting NetHope NGO & UN aid workers’ devices from these threats too!
  • 17. 17© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Public