Networks and Security in ArcGIS Enterprise

When working in an organization with access to mission-critical and / or sensitive data, the personal security choices that you make can have ramifications for the organization as a whole. Organizations are actively targeted by sophisticated cybercriminals, making vigilance even more challenging. Understanding the threats and how to defend against those threats requires some basic understanding of the computer networks that cybercriminals target.

This tutorial covers basic enterprise network and security principles with a specific orientation toward ESRI's ArcGIS Enterprise.

This tutorial is loosely organized around the OSI networking model.

Introductions

Risk

A common heuristic for assessing risk is:

Risk = Threat * Vulnerability

Vulnerability and threat must both be high to have high risk. Understanding risk can be useful for managers when making decisions about allocating scarce organizational resources to address the security vulnerabilities that present the highest risk(s) to an organization.

For example, buildings in the Midwest are commonly not built with high tolerance for earthquakes (high vulnerability), but because earthquakes are rare in the Midwest (low threat), the risk of earthquake damage to a building is low, albiet still present.

In contrast, within an enterprise comprised of large numbers of individuals (high vulnerability) who control information or resources that are highly valued by nefarious actors (high threat), the risk is high. Individual and collective vulnerability requires significant attention and resources to reduce risk to levels that are tolerable for smooth operation.

Security

Computer security has three aspects:

There are a wide variety of security threats.

Security is fundamentally social, and there are a number of different actors that can present security threats.

The OSI Model

The Open Systems Interconnection (OSI) model is a hierarchical taxonomy for organizing network components into interconnected conceptual layers. The OSI model was initially developed by Charles Bachman and published in 1984 as ISO standard 7498 (IEEE 2023).

A network protocol is the set of rules that defines how software and hardware communicate across a network.

The OSI model

Console

The console will be used for some commands in this tutorial.

Operating systems provide a console where you can type commands for diagnosing problems and configuring capabilities. These are also sometimes called terminals because historically they were terminal displays and keyboards physically attached to mainframe computers.

On Windows, you can get a console by searching for cmd. You can also type commands in the newer PowerShell.

Two commands you will find useful for navigating around your storage are dir (list directory contents) and cd (change current directory).

The Windows PowerShell console

Physical Layer

The physical layer of the OSI model includes the hardware connections between machines.

Ethernet

Ethernet (IEEE 802.3) is a ubiquitous physical networking technique used to connect computers to a network. Contemporary server, desktop, and (some) laptop computers have Ethernet ports, usually with rectangular eight-wire RJ-45 connectors that can be used with CAT 5 / 5e / 6 cables.

While wired connectivity provides some measure of physical network security compared to shared media like WiFi or cellular networks, other computers on your network can often see network traffic going to your interface, and wired connectivity should not be assumed to be completely secure.

RJ-45 connector and CAT 5e Ethernet cable

WiFi Hotspots

Wi-Fi is a networking technology that uses radio signals to provide wireless high-speed Internet access through a variety of IEEE 802.11x standards.

All contemporary laptop computers and mobile devices contain Wi-Fi transceivers that connect to Wi-Fi access points (hotspots) which are physically connected to the internet.

Public Wi-Fi hotspots are common and convenient ways of connecting to the internet, but they present multiple security issues.

Steps you can take to avoid security risks when using public Wi-Fi hotspots include (Equifax 2024):

  1. Verify the name of a business's official Wi-Fi network from public signage or a staff member before connecting.
  2. Disconnect immediately if a hotspot redirects you to a suspicious web page that asks for personal information or refuses to close.
  3. Use a VPN when performing any kind of authenticated work on organizational systems while connected via a public Wi-Fi hotspot.
Wi-Fi access point

Cellular Network

Mobile devices can connect to the internet through radio connections to cellular network antennas mounted on towers and buildings.

While the cells around towers vary in radius from one to thirty km, grids of overlapping cells provide seamless coverage in most populated or heavily trafficked areas in the developed world. The cellular network is operated by private companies and paid subscriptions are required for access.

The first generation (1G) network launched in Tokyo in 1979. 4G networks with 150 Mbit/s download capability debuted in the late 2000s, and 5G networks debuted 2019, although deployment was hampered by geopolitical and health concerns.

Cellular network antennas on buildings

Bluetooth

Bluetooth is a short-range wireless standard used for exchanging data over short distances up to 10 meters. Bluetooth supports a variety of profiles that are commonly used for connecting peripherals to computers or cellular phones.

Bluetooth is subject to a variety of security vulnerabilities that permit crackers to access sensitive personal information or eavesdrop on written and oral communications. Some common security suggestions include (Norton 2024):

Bluetooth wireless headphones (Wikimedia 2020).

Flash Drives

While not a formal physical networking medium, flash drives are a common, convenient physical medium for moving data between machines.

Flash drives are also a very dangerous vector for moving viruses and malware between machines. Compromised machines can infect other machines on a network, resulting in operational and legal chaos within an organization.

Figure
Flash drives

USB Charging Ports

Public transportation facilities and vehicles commonly offer USB charging ports that customers can use to charge cellphones. While most are benign, USB connections provide access to the data on your phone, and nefarious actors can exploit security vulnerabilities to harvest your personal data and implant malware.

Figure
USB charging ports

Data Link Layer

The data link layer of the OSI model includes the protocols used for sending data as electrical signals through cables and radio signals in the physical layer.

The data link layer primarily focuses on network interfaces, which are the software and hardware through which computers are connected to networks.

MAC addresses

Medium access control (MAC) numbers are unique, 48-bit (six byte) addresses that identify the network interface hardware.

The MAC address is the Physical Address in the output of the ipconfig /all command.

Finding a MAC address with ipconfig

You can Google a MAC addresses to find the manufacturer.

Search for the manufacturer associated with a MAC address

Switches

Office Ethernet cables are usually connected to switches, which connect multiple clients to a single organizational network.

Ethernet switch (J. Smith via Wikimedia)

Network Layer

The devices and software in the network layer of the OSI model determine which routes the data will take to move from the client to the server and back.

IP addresses

Internet Protocol (IP) addresses are four-byte (32-bit) numbers that are used to uniquely identify devices on a network.

There are three ranges of private IP addresses reserved for private internal use. You will commonly see these addresses when looking at the IP addresses of machines on enterprise networks. These addresses are never used for public websites.

Although there are 4.294 billion possible IP addresses, there are now far more internet connected devices on the planet than available IP addresses. Network address translation (NAT) is the use of private internal IP addresses for devices on an internal network with routers that translate messages to a smaller number of recycled public IP addresses for communicating outside the organizational network.

Network address translation

Another way of working around the limited number of available IP addresses is the use of extended 16-byte (128-bit) addresses referred to as IPv6 addresses. This is in contrast to four-byte IP addresses referred to as IPv4.

You can find the IPv4 and IPv6 addresses for your computer's network interface with the ipconfig command.

Finding a network interface IP address with ipconfig

If you are on a machine on an enterprise network using NAT, you can find your current public IPv4 address by searching for my IP address in Google.

Finding your public IPv4 address

DHCP

While servers commonly have fixed IP addresses so that clients know where to find them, client machines like desktops, laptops, and cellphones only need IP addresses when they are connected to the network.

Dynamic Host Configuration Protocol (DHCP) servers dynamically allocate IP addresses from a pool of available addresses to machines when they connect to a network.

You can find your DHCP server with the ipconfig /all command.

Finding a DHCP server with ipconfig

Routing

A computer network allows devices on that network to exchange data and share resources with each other.

Interconnection of networks with routers

Connectivity Tools

The ping tool sends a test ICMP command every second to the IP address specified and is used to verify connectivity with another computer on the internet. You can also specify the address with a domain, such as in this example using illinois.edu. Press ctrl-C to stop the tool.

Checking connectivity with ping

You can pass a domain name to the tracert command to identify router nodes between your machine and a server.

Listing routers with tracert

Virtual Private Networks

To enhance security, access to services at specific IP addresses on a network can be restricted to other machines on that network. However, workers often need to access network restricted services when working at home or when traveling.

Virtual private networks (VPNs) provide remote access to network restricted services by creating a tunnel (encrypted connection) between a remote machine and a VPN server on the private network, and then providing the remote machine with an IP address that virtually connects the remote machine to the private network.

Aside from common use by businesses to allow remote workers access to secure enterprise networks, VPNs can also be used to circumvent internet restrictions and surveillance by authoritarian governments, and to get around regional restrictions on access to commercial services.

Virtual private networks

There are a variety of vendors that provide VPN software. Products from the networking company Cisco are commonly used.

Cisco secure client

When you run ipconfig with a VPN active, you will see two network interfaces with separate IP addresses, one for the physical interface (Wi-Fi 172.16.190.174) and one for the virtual network (Ethernet 3 10.251.129.204).

ipconfig when connected in a virtual private network

VPN software provides different modes for how traffic is divided between the different network interfaces.

VPN modes

Network Layer Security

Routers contain complex, mission-critical software that must be carefully configured and regularly patched to address newly discovered vulnerabilities and assure network performance and security.

As critical nodes in organizational operations, routers are potential targets for malicious actors (AVG 2024).

Because of the complexity and unpredictability of networks, router software updates commonly result in network degradation or failure, which requires time to diagnose and repair, and which can be highly disruptive to organizations that are dependent on their networks.

Security advisories from Cisco, the dominant vendor for enterprise routers

Transport Layer

The transport layer in a network handles the exchange of data between nodes on a network defined with IP addresses using transmission control protocol (TCP). Because IP and TCP work together, networking using this combination is commonly referred to as TCP/IP.

Ports

TCP ports are numbered connection points within an IP address that allow access to different services at the same IP address.

Services on a single server listen for requests sent to specific ports. Port numbers are 16-bit numbers that range from 0 to 65532. Some commonly used ports in an ArcGIS Enterprise environment include:

Ports in the range of 48,152 to 65,535 are ephemeral ports that are temporarily opened by clients to receive requested data packets back from servers.

Connection between an open server port and a client ephemeral port

Netstat

The netstat -aon command shows connections between machines and can be used to show open ports on a machine.

Servers commonly have multiple ports open for the various hosted servers. For example:

netstat on a server

Clients have fewer open ports, although in this case there are a number of ports open to facilitate remote administration of this virtual desktop client. For example:

netstat on a virtual client

Web Adaptor

In an ArcGIS Enterprise installation:

Web Adaptor is a component of an ArcGIS Enterprise installation that routes HTTPS requests on port 443 to Portal for ArcGIS and ArcGIS Server.

Figure
Single server ArcGIS Enterprise architecture with Web Adaptor

Port Security

A common security best practice is to shut down all services that are not needed. Examples include:

Services on a Windows server are started and stopped using the Services app.

Managing services on a Windows Server

Packets

Messages between clients and servers are of varying length. URL requests to a search engine may be only a few hundred bytes, while images or documents returned from servers can be millions of bytes in length.

TCP breaks messages into sequences of one or more packets that are sent separately sent through the internet and then reassembled on the receiving machine.

Figure
TCP packet header (Wikipedia 2024)

DDOS Attacks

Distributed denial of service (DDOS) attacks involve overwhelming a server or network with a flood of internet traffic from a botnet of client computers infected with malware.

Defenses against DDOS attacks include:

DDOS attack

Firewalls

Firewalls are security services and/or hardware that block the passage of information through a network connection based on firewall rules defined by the systems administrator. These rules can restrict access based on IP addresses, TCP ports, and/or packet content.

Servers and clients both have firewalls. Contemporary Windows machines come with the Windows Defender Firewall.

Figure
Windows Defender Firewall administrator screen in Windows Server 2022

Presentation Layer

Software in the presentation layer of the OSI model handle encryption of data before it is transported across the network.

Applications (like web browser or ArcGIS Pro) open sockets when they want to communicate with servers on a network, and the software and hardware in the lower layers of the OSI model handle the details of making the connection and passing the data.

Secure Certificates

Encryption is a mathematical technique for converting data to ciphertext that can only be understood after it is decrypted.

The TLS handshake is an exchange of information between a client and server to create a master key that is then used to encrypt subsequent messages.

TLS handshake

A security certificate contains a public/private key pair that is allocated by a certificate authority (CA) that can be trusted by both the sender and receiver of the information.

Let's Encrypt CA

The name of the certificate authority for a website and information on the public key can be found by clicking on the lock icon in the browser location bar. Common encryption algorithms include RSA and Elliptic-curve.

Viewing information on a secure certificate in Firefox

Security Certificate Problems

Numerous problems can arise with security certificates.

Browser warning about an invalid security certificate

A common problem is an expired certificate. Certificates are issued for limited periods of time (usually 90 days max). Servers often have automated renewal capabilities, but if there is a server change or misconfiguration, a certificate may expire, resulting in browser warnings that can impair organizational operations.

Servers can issue self-signed certificates, and these are often used when developing new web apps or testing new services. However, self-signed certificates cause browser warnings and should not be used on production sites.

Application Layer

Software at the application layer of the OSI model is the end-user software that utilizes network services.

Domain Names

A fully-qualified domain name (FQDN) identifies a server.

In URLs, FQDNs follow the protocol name (usually https://) and consist of three parts:

Domains are purchased from domain registrars who coordinate to assure that ownership of specific domain names is unique. Domain registrars are commonly large web hosting providers like GoDaddy, Amazon Web Services, DreamHost, HostGator, and Bluehost.

The whois database lists ownership and contact information for domain owners. While details are often masked for privacy, some domain owners (like the University of Illinois) still make whois data available.

Viewing whois information on domains

As a security measure, domain registers will often serve as whois proxy contacts so that the contact details of the actual registrants are protected from companies that harvest whois information for marketing or big data analysis. Common whois proxies include GoDadday, Domains By Proxy, MarkMonitor, and Perfect Privacy.

Whois proxy registration for michaelminn.net

Domain Name Servers

Because TCP/IP only works with IP addresses, a protocol is needed for converting domain names into IP addresses that can be used to communicate with servers.

A domain name service (DNS) nameserver receives queries about domain names and returns IP addresses that can be used by browsers and other applications.

For home networks, a nameserver is usually assigned by your ISP when you connect to the network. The nameserver is often the same as the DHCP server (see above).

Larger organization that run their own DHCP servers will also have their own nameservers.

There is a hierarchy of DNS nameservers that work together to find the IP address associated with a domain name. This hierarchy is needed to handle the load of billions of domain name queries per second for the millions of different domain names.

DNS

You can use the ipconfig /all command to find the DNS resolver currently used by your machine.

Viewing DNS information with ipconfig

Domain Name Security

Domain names are a potential security vulnerability that need attention from organizations.

Domain name squatters are organizations that purchase domain names for resale.

Misspelled domain for gogle.com (google.com)

Domain names are registered for fixed periods of time.

Domain squatter page for illinois.org

Cookies

When accessing resources across a network, TCP/IP is stateless in that it maintains no information between transactions.

Cookies are small bits information kept in browser storage that can be set and read by pages from a specific domain to remember information (like logins) from prior visits to that domain.

Cookies can be viewed in browser Settings under Privacy and security.

Viewing browser cookies in Chrome

One technique to preserve privacy is to regularly clear your cookies and browsing history, which erases cookies from browser storage.

Clearing browser cookies in Chrome

Authentication

Authentication is the process of determining whether a user is who they say they are.

Credentials are usernames, passwords, and other identifying information needed to authenticate that someone trying to access system resources is indeed the user that they claim to be.

Passwords

A combination of a user name and a password is a very common set of credentials used for application authentication.

A strong password is a password that cannot be easily guessed using common hacking techniques:

Common poor short passwords subject to dictionary attacks include (Drapkin 2024):

Password Entropy

Password entropy is a quantitative metric for assessing password vulnerability to brute force attacks (Šlekytė 2023):

E = log2 (R^L)

E of 64 bits or more (2^64 or 18 quintillion possibilities) is considered strong.

A common strategy for getting high entropy includes:

Note that because the length is the exponent in the entropy formula, increased length adds more entropy than increasing the range of characters, while adding additional characters decreases memorability and increases that likelihood that users will store passwords in an insecure manner. Accordingly, more recent recommendations include (NIST 2023, Raphelson 2017):

Two-factor Authentication

Authentication uses one or more of the following factors:

Two-factor authentication (2FA) is the addition of a second authentication factor to mitigate the vulnerability of reliance on passwords as a single factor for authentication.

A common two-factor authentication technique is the use of one-time codes sent as cellphone messages or e-mails to non-institutional accounts (something you have) that are then entered along with the username and password.

A cellphone one-time code prompt for two-factor authentication

Single Sign On

Password fatigue is the stress experienced by users when required to memorize multiple passwords as part of their organizational duties and / or personal online activity. Password fatigue is especially problematic for IT workers who have to regularly access multiple computer systems.

Personal strategies for addressing password fatigue can introduce organizational vulnerabilities because of the central role played by IT employees in organizations.

Single sign-on (SSO) is "an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials" (One Identity 2024). SSO combined with 2FA is a common organizational technique for mitigating password fatigue.

SSO with using systems like Shibboleth based on Security Assertion Markup Language (SAML) utilize digitally signed tokens from an identity provider to authenticate identity across multiple systems.

Single sign-on

Backup and Restore

Backups are copies of data that can be used to restore computer systems in the event of a hardware or security failure. Regular backups of mission-critical data and testing of restores are essential to assure data availability and business continuity in the face of security threats.

To preserve storage space and reduce backup time, backups are commonly performed incrementally.

Periodic testing of restores is also essential to assure that backup procedures and systems are producing backups that can can actually be restored. Organizations generally do not care much about backups, but they do care very deeply about restores. Test restoration on parallel offline systems are a common technique for validating backup procedures.

A common rule for backup is the 3-2-1 rule: Three copies of everything, on two different types of media with one offsite copy for disaster recovery ( Ruggiero and Heckathorn 2020, Campbell 2024).

Backup plans need to consider the relationships between different systems that are backed up separately. In the ArcGIS Enterprise installation, databases and data stores require separate backups, but backups need to be compatible assure consistency of references between the two separate systems.

PostgreSQL and ArcGIS Enterprise have tools like

the Web GIS Disaster Recovery (WebGISDR) that can be used for backup and restore.