Architecture Overview

 


 

     
The CU is a secure overlay network (see Figure 1). That is, it is an independent, logical network that runs over existing physical network facilities between participating sites. It employs a number of security appliances (one at each participating site) that create and maintain the CU network. The appliance, termed the CyberWATCH Underground Tunnel Server (CUTS), is a modest computer. Each CUTS will be sent to the participating site preconfigured,fully ready to drop into the site's network. The CUTS runs the Linux operating system and creates the CU network through either a Layer 3 or Layer 4 secure tunnel. The CUTS also provides network health information via SNMP to a health monitoring server. The CU is a separate logical network, but uses the campus/ISP (physical) connection of the local site. Ideally, the CUTS will be placed in the lab of a CyberWATCH member.
 

Each site determines which of its resources, if any, it will connect to the CU, when they will connect and for how long. The CU requires no dedicated computing resources except for the CUTS and an ISP connection. The network behind the CUTS may be as simple or as complex as desired.While the CU runs over existing physical network connections at each site and through the Internet, it is designed to be a closed network. It does not and will not provide connectivity to the Internet and is not designed. Note that the CUTS does not coopt the Internet connection at its placement site. The CUTS operates in parallel with existing network connections.

The CyberWATCH Underground Tunnel Server (CUTS)

Operating System: Linux (RHEL 5), iptables (firewall), iproute2 (traffic shaping/policing)
Tunnel Software: IPSec (or OpenVPN, if necessary)
Health Monitoring Software: NetSNMP, Nagios. Cacti, RRDtool

 

For further details contact:
Dr. Mark Matties and Dr. Sharad Sharma
Department of Computer Science
Bowie State University, Bowie, MD 20715
Office Phone: (301) 860 - 3974