Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

InteropNet's Colossal Task: Page 3 of 4

Security, however, is less straightforward, and Evans explains that there are typically "numerous" hacking attempts during the show, ranging from port scans to ping attacks when servers are bombarded with a large amount of packets.

In response, InteropNet takes a layered approach to security, using M7i routers loaned from Juniper to filter traffic at the edge of the network. Evans also liaises closely with the conference's Internet Service Providers for additional security.

Inside the network, InteropNet is using Juniper ISG 2000 devices to provide firewalls and intrusion protection and detection, as well as an Extreme Networks security device for "another layer of protection," according to Evans.

The exec would not reveal any more specific details about the show's security infrastructure, although he confirmed that the conference network deploys a "honeypot-style arrangement" to trap scams. Typically, a honeypot involves setting up deliberate vulnerable systems to capture attacks. Evans adds that he is not aware of any successful hacking attempts during his time working with InteropNet.

The engineer, however, was also cagey on the conference's disaster recovery strategy, although he confirmed that kit is split between the Mandalay Bay NOC, a co-location site in Vegas, and a third somewhere in Utah. "This means that if something goes wrong, we have always got a presence," he says.