{"id":1656,"date":"2019-01-21T17:47:13","date_gmt":"2019-01-21T17:47:13","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1656"},"modified":"2020-12-16T17:23:32","modified_gmt":"2020-12-17T01:23:32","slug":"architecting-scalable-security-for-nren-national-research-and","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/","title":{"rendered":"Architecting Scalable Security for NREN (National Research and Education Networks)"},"content":{"rendered":"<p><strong>The Problem<\/strong><\/p>\n<p>Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education\u00a0Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.<\/p>\n<p>With traditional protection through DPI (Deep Packet Inspection) technology, scalability becomes an issue. DPI scales linearly with the data volume. Even if enough DPI capacity can be deployed to filter the traffic, budget constraints then often surface and become an obstacle for deployment.<\/p>\n<p><strong>Solution<\/strong><\/p>\n<p>NREN can deliver cost effective protection with Infoblox, that leverages the scalability and pervasiveness of DNS . DNS can be seen as the signaling path that is far less voluminous than the data path. Infoblox\u00a0solution is therefore more efficient than DPI while not reducing the effectiveness.<\/p>\n<p>Infoblox\u00a0offers DNS-based Security Services that include enhanced security and content filtering capabilities.\u00a0 Optionally, the solution includes a Multi Service Proxy (MSP) for URL inspection or content injection after verification in DNS. The solution is very efficient as the bulk of the inspection is done at DNS level. In general, only a small percentage of the traffic is sent to the MSP for further inspection or organizations could decide not to deploy an MSP at all.<\/p>\n<p><strong>Characteristics<\/strong><\/p>\n<p>Since the solution leverages existing network infrastructure, no software is required on the student equipment.<\/p>\n<p>Threat and content intelligence are provided by Infoblox\u00a0and delivered as a feed. The high quality feeds are fully supported by Infoblox\u00a0and updated regularly.<\/p>\n<p>Policies can be defined based on the categories. The selected policies will then be enforced at the Infoblox\u00a0caching DNS appliance. Policies can be enforced for the entire population. The population can also be divided into groups, where each group has a separate policy.<\/p>\n<p>The solution for the DNS-based Security services is supported by enabling Infoblox\u00a0VAS capabilities on top of the Infoblox\u00a0secure DNS platform. If, optionally, further inspection is required, the DNS can redirect to a Multi Service Proxy (MSP).<\/p>\n<p>Infoblox\u00a0solution uses reputational data feeds based on the industry standard RPZ to detect malicious behavior. Content categorization feeds can also be applied at DNS level and at MSP proxy level. Infoblox\u00a0also leverages unique behavioral analytics and machine learning to detect zero day threats like data exfiltration, DGA, fast flux and fileless malware.<\/p>\n<p>The solution can identify infected devices that are trying to connect to malicious domains and can enforce policies based on individual users and devices. The operator can take proper action because each violation is logged with subscriber\u2019s data received from subscriber edge devices via RADIUS Accounting messages (e.g. IMSI, IMEI, MSISDN, and other identifiers in the RADIUS record).\u00a0 That makes the logging actionable so that the operator can identify the specific device and take targeted action for remediation.<\/p>\n<p>The service is delivered from the network. On premises solution can be centrally managed or distributed.\u00a0 SAAS service delivery is also a possibility.<\/p>\n<p><strong>Service Delivery: SECURE Ubiquitous PLATFORM<\/strong><\/p>\n<p>Infoblox\u00a0brings a highly resilient, distributed approach to security. Infoblox\u00a0DNS servers are robust and secure, with highly automated and centralized management via the Infoblox Grid\u2122.\u00a0The Grid offers automated failover, eases upgrades, and avoids constant manual hands-on care needed to patch and upgrade DDI software and server hardware on a machine-by-machine basis.<\/p>\n<p>Infoblox Inc.\u2019 purpose-built DNS caching server offers the industry\u2019s highest DNS caching performance, while also conveying all of the associated management and resiliency benefits of the Infoblox Grid\u2122.<\/p>\n<p>&nbsp;<\/p>\n<p>Infoblox\u00a0has added protection against botnet, malware and other threats to the portfolio. The protection is delivered through dynamic and static whitelists and blacklists implemented on the caching DNS platform. The caching DNS then enforces the security policy defined by the ISP. Blacklists can be obtained from Infoblox\u00a0and can be blended with local black- and whitelists for comprehensive security.<\/p>\n<p>Infoblox\u00a0Advanced DNS Protection delivers a unique approach to protection against DNS-based attacks. Unlike approaches that rely on infrastructure over-provisioning or simple response rate limiting, Advanced DNS Protection intelligently detects DNS attacks and automatically drops malicious DNS traffic while continuing to respond to legitimate traffic. In addition, Advanced DNS Protection receives automatic updates, delivering ongoing protection against new and emerging attacks as they happen. Infoblox\u00a0is the first and only vendor to offer this unique solution for superior protection of your critical DNS services.<\/p>\n<p>The reference architecture is described <a href=\"https:\/\/community.infoblox.com\/t5\/Best-Practices\/Using-Anycast-in-Infoblox-DNS-Reference-Architecture\/ba-p\/14158\"><strong>here.<\/strong><\/a><\/p>\n<p><strong>Extension Content Protection to Secure Platform<\/strong><\/p>\n<p>The secure platform can be expanded with a Multi Service Proxy (MSP). When URL or content inspection is required, the DNS server can redirect to the MSP. The MSP can also be used to enforce time-based constraints and inject content.<\/p>\n<p><strong>Administration<\/strong><\/p>\n<p>The data model fits educational organizations very well. Students can be part of a group. A group can be applied a policy. A policy can cover the types of defense against malware and other network threats but also the allowed content (like alcohol, drugs, violence etc.). A group can be based on age or other properties (like type of study). The operator is free to use the group concept to fit the need.<\/p>\n<p>The simplest configuration is when a blanket configuration will be applied to everyone. This simulates the case where everyone is in fact in one group and no further distinction has to be made. The system is flexible enough to define a policy per student with RADIUS identity.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>National Research and Education Network should consider DNS as a line of defense to protect their users and sensitive academic data. The solution is efficient and effective.\u00a0<a href=\"https:\/\/www.infoblox.com\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Infoblox Inc.<\/a>can provide the reputational content feeds, real time analytics, DNS enforcement platform and the optional multi service proxy for content inspection. The end-to-end solution form content feeds to MSP can be delivered with fully supported Infoblox\u00a0products.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1658\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/NREN-image.jpg\" alt=\"National Research and Education Network Infoblox\" width=\"599\" height=\"342\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NREN-image.jpg 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NREN-image-300x171.jpg 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Problem Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education\u00a0Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant [&hellip;]<\/p>\n","protected":false},"author":153,"featured_media":1659,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[16,105,103,104,15,370,371],"class_list":{"0":"post-1656","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-infoblox","9":"tag-national-research-and-education-networks","10":"tag-nren","11":"tag-scalable-security","12":"tag-security","13":"tag-higher-education","14":"tag-education","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Architecting Scalable Security for NREN (National Research and Education Networks)<\/title>\n<meta name=\"description\" content=\"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Architecting Scalable Security for NREN (National Research and Education Networks)\" \/>\n<meta property=\"og:description\" content=\"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-21T17:47:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-17T01:23:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"446\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anton Holleman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anton Holleman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/\"},\"author\":{\"name\":\"Anton Holleman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c76b840227d4c48f77160de252522d8\"},\"headline\":\"Architecting Scalable Security for NREN (National Research and Education Networks)\",\"datePublished\":\"2019-01-21T17:47:13+00:00\",\"dateModified\":\"2020-12-17T01:23:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/\"},\"wordCount\":988,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg\",\"keywords\":[\"Infoblox\",\"National Research and Education Networks\",\"NREN\",\"Scalable Security\",\"Security\",\"Higher Education\",\"education\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/\",\"name\":\"Architecting Scalable Security for NREN (National Research and Education Networks)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg\",\"datePublished\":\"2019-01-21T17:47:13+00:00\",\"dateModified\":\"2020-12-17T01:23:32+00:00\",\"description\":\"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg\",\"width\":600,\"height\":446,\"caption\":\"Business Success Symbol\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/architecting-scalable-security-for-nren-national-research-and\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Architecting Scalable Security for NREN (National Research and Education Networks)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c76b840227d4c48f77160de252522d8\",\"name\":\"Anton Holleman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g\",\"caption\":\"Anton Holleman\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/anton-holleman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Architecting Scalable Security for NREN (National Research and Education Networks)","description":"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/","og_locale":"en_US","og_type":"article","og_title":"Architecting Scalable Security for NREN (National Research and Education Networks)","og_description":"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/","og_site_name":"Infoblox Blog","article_published_time":"2019-01-21T17:47:13+00:00","article_modified_time":"2020-12-17T01:23:32+00:00","og_image":[{"width":600,"height":446,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg","type":"image\/jpeg"}],"author":"Anton Holleman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Anton Holleman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/"},"author":{"name":"Anton Holleman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7c76b840227d4c48f77160de252522d8"},"headline":"Architecting Scalable Security for NREN (National Research and Education Networks)","datePublished":"2019-01-21T17:47:13+00:00","dateModified":"2020-12-17T01:23:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/"},"wordCount":988,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg","keywords":["Infoblox","National Research and Education Networks","NREN","Scalable Security","Security","Higher Education","education"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/","url":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/","name":"Architecting Scalable Security for NREN (National Research and Education Networks)","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg","datePublished":"2019-01-21T17:47:13+00:00","dateModified":"2020-12-17T01:23:32+00:00","description":"Internet connectivity facilitates the transfer of knowledge. Educational institutions therefore provide Internet access to scholars of all ages through National Research and Education Networks (NREN). Internet access not only provides access to a wealth of information and data but also exposes to risks. NREN have to protect the scholars while providing access to relevant Internet content and services.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ThinkstockPhotos-506758022_Blog_Ecosystem_Part2.jpg","width":600,"height":446,"caption":"Business Success Symbol"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/architecting-scalable-security-for-nren-national-research-and\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Architecting Scalable Security for NREN (National Research and Education Networks)"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/7c76b840227d4c48f77160de252522d8","name":"Anton Holleman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/91f7c2dbb55cc0a498ad1d11b3cd289f08af3b03dd6a72220e52c514a30d1a1c?s=96&d=blank&r=g","caption":"Anton Holleman"},"url":"https:\/\/www.infoblox.com\/blog\/author\/anton-holleman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1656"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1656\/revisions"}],"predecessor-version":[{"id":1662,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1656\/revisions\/1662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/1659"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}