Time | Item | Who | Notes |
---|
| Firewall On Demand (FoD) |
| - (info page for FoD development https://wiki.geant.org/pages/viewpage.action?pageId=63965046)
- FoD v1.5 = FoD with new functionalities: rule range specification, current rule behaviour statistic graphs, multi-tenant rule control REST-API
- FoD v1.6 = FoD with automated rule proposal from RepShield
- FoD v1.5 Pilot UAT testing
- Pilot evaluation survey which was of used for FoD v1.1 has to be reviewed and updated for v1.5
- Enhancements made based on UAT user feedback are packaged via a new rpm to be installed on UAT test machine so that pilot users can test them: updated on UAT machine so pilot users can test enhancements
- UAT phase ended 15.03.2018, evaluation survey sent to pilot users: got answers from all 3 pilot users
- pilot report draft is ready
- FoD v1.5 development/enhancement
- Tomáš' investigation about DatePicker for increased expiration limit and zooming in statistic graphs is in progress
- FoD v1.5 production service documents
- Existing user documentation (as presentation document, especially regarding rule control REST API) should be extended to a proper document, e.g. to be used in future user trainings
- Now for the future production phase of FoD v1.5 (and all further versions) all necessary PLM documents have to be prepared, e.g. CBA, service description, service design plan
- Especially for the operative documents this will be done in close cooperation of Evangelos
- For most PLM documents, this will be done by filling the FoD service template wiki pages (https://wiki.geant.org/display/gn42jra2/Firewall-On-Demand+%28FoD%29+Service) which David started to fill
- Evangelos will check the service template to get acquainted with it
|
| DDoS Detection/Mitigation (D/M) WG |
| GARR DDoS D/M PoCs/Testing Framework - ARBOR PoC will take place until end of April
- proper Radwarde PoC will be performed in May
- Nino will share examples of DDoS events from ARBOR as well as some documentation of types of attacks
A10 with FlowMon PoC in GÉANT - issue with testing the actual mitigation in progress for test-wise attacks generated from within GEANT/NREN network, as A10 can not divert traffic for this attack traffic (RE VRF)
- => need to attack test-wise attacks from outside of NRENs/GEANT, e.g. AMAZON VMs (which will end up on IAS VRF for which A10 can divert the traffic)
|
| GDPR Compliance |
| - Result from 1st VC with GDPR SA2 team
|
| Next VC |
| In 4 weeks: 02.05.2018, 14:15-15:15 CE(S)T
|