Virtual Private Networks (VPN) in Conjunction with DSL & ISDN New AVM Products for the Growing Remote LAN Access Market.

Slides:



Advertisements
Similar presentations
Cisco Router as a VPN Server. Agenda VPN Categories of VPN – Secure VPNs – Trusted VPN Hardware / Software Requirement Network Diagram Basic Router Configuration.
Advertisements

Encrypting Wireless Data with VPN Techniques
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
Added value with ADSL and ISDN. Access Europe Modem ISDN DSL Cable Access Europe 0,00 10,00 20,00 30,00 40,00 50,00 60,00 70,00 80,00 90,00 100,
Presented by: Eng. Karam Al-sofy
XOptions ® Flex Integrated Business- Class Voice and Internet Service.
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Remote Networking Architectures
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Chapter 1: Explore the Network
Virtual Private Networks
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
VPN: Virtual Private Network
Providing Teleworker Services
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Providing Teleworker Services
VPN: Virtual Private Network
Providing Teleworker Services
Cengage Learning: Computer Networking from LANs to WANs
Providing Teleworker Services
Presentation transcript:

Virtual Private Networks (VPN) in Conjunction with DSL & ISDN New AVM Products for the Growing Remote LAN Access Market

Source: Mummert + Partner 2002 Mobile and laptop Essential not just in business The Germans want to be available during their holidays for: 24% 60% 62% Colleagues Boss Friends Parents Which mobile devices Germans take on their holidays 3% 20% 24% 80% i-mode Mobile Handheld-PC Laptop Mobile Phone

PC drives business Source: Globus Infodienst, February 2002 Sweden Netherlands Denmark Finland Luxembourg United Kingdom Belgium Germany Austria Italy France Ireland Spain Portugal Greece Europe Work places equipped with PCs, 2002

PC & Internet drive business Source: Globus Infodienst, February 2002 Work places equipped with PC & Internet by occupational groups (EU) 0%20%40%60%80%100% Workers Self-employed Employees Manager Internet PC

KEN! drives Small Business ISDN & DSL mainstream access for private/SME KEN!/FRITZ!Card and KEN! DSL/FRITZ!Card DSL Secure connection of a small network (an isle) with –ISDN/DSL – –Internet

Access Server drives Small/Medium Business There are customers who want more: –Access for remote workstations to the central office –Access for remote networks to the central office –Specific Internet-Firewall/Routing-demands Seamless (and secure) connection from inside to outside These are –the Top 15% of the KEN! customers –new customers with no KEN! experience

Separation of target groups KEN! / Access Server Closed Single-isle KEN! Open Connecting isles Access Server

Teleworking Germany - Development Teleworker Population - Germany, Quelle: GfK, Statistisches Bundesamt Gartner Dataquest 09/2001 IDC

Source: Dataquest (Sept 2001) Teleworking Europe - Access Technology Access technology stationary PC

Teleworking Europe - Access Technology Access technology mobile PC (field employees) Source: Dataquest (Sept 2001) Analog ISDN GSM ISDN GSM

Remote LAN Access Using VPN

What Is a VPN? Definition:A VPN (virtual private network) is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.

What Is a VPN?

VPN Requirements Authenticity –No unauthorized access –User authentication Confidentiality –No electronic eavesdropping by third parties –Data encryption Integrity –Verification of data source –Security against data manipulation

Insecure Internet Connection

Secure Internet Connection

Tunnel Technology A logical network independent of physical conditions Dynamic set-up and clear-down Endpoints authenticated before the tunnel is set up Secure data communication through the tunnel Possible tunnel endpoints: –PCs –Networks

VPN vs. ISDN Where does remote access leads us?

VPN vs. ISDN Pro VPN: Based on Internet connection Internet availability worldwide Flexible, dynamic network scalability Economical Internet connectivity costs (call-by-call, flat-rate) Connection costs are independent of distance Remote access at DSL speeds

VPN vs. ISDN Pro ISDN Non-based Internet connection Always available Guaranteed bandwidth Dynamic channel management CLI, call-back, centralized costs Maximum reliability

VPN vs. ISDN The optimum solution supports both: VPN and Dial-up Connections

AVM Products for Remote LAN Access

Always a Good Connection with AVM Matching Hardware and software for maximum performance The server: –AVM Access Server –ISDN-Controller B1, C2, C4 or T1 for up to 120 B channels –FRITZ!Card DSL for DSL access The employee in the field or home-office: –NetWAYS/ISDN –FRITZ!Card family for ISDN –FRITZ!Card DSL for DSL and Fast Internet Access –FRITZ!GSM for the field work

AVM Access Server The all-around solution –Internet access –Remote LAN access –LAN-to-LAN links Support for –ISDN –GSM –ADSL VPN using IPsec

NetWAYS/ISDN 6.0 The universal remote access client Dialer and VPN client in one Support for: –ISDN –GSM –ADSL VPN using IPsec

Access with AVM Complete –DSL, ISDN, GSM and VPN in one product –Remote network, LAN-to-LAN and Internet access –Even tunnels between two dynamic IP addresses Variable –Seamless integration in the existing infrastructure –Usable immediately with existing AVM ISDN-Controllers –VPN using the LANs existing Internet connection Simple –Configuration interface –Automatic parameter adjustment

Access with AVM Secure Access for Your Network Internet access –Packet-filtering and masquerading VPN –Support for all common IPsec encryption techniques –Maximum security through AES with 256-bit keys Dial-up connections –Multi-layered security concept –Caller ID, security call-back,... –Data encryption –Packet filter

Access with AVM High-Performance Communication Internet access –Scalable access, including data compression –ADSL and other broadband access media VPN –IPsec data compression: IPcomp –Data rates > 30 Mbit/s Dial-up connections –PPP data compression –Dynamic channel management

Access with AVM Always a Good Connection

VPN Summary IPSec - the VPN-protocol Data compression for VPN-tunnels with IPComp Tunneling between two dynamic IP-addresses (DSL to DSL) Secure encryption with the new Advanced Encryption Standard (AES) with up to 256-bit keys Interoperable due to open standards (e.g. to Cisco, Watchguard, Linux...)

Access Server and NetWAYS/ISDN Summary ISDN and DSL for Internet access, remote access, network access Follow-on product for already existing KEN! Customers Flexible remote access solution for all costumers Scaleable: up to 30 VPN-connections (8 x ISDN) or unlimited VPN-technology IPSec (incl. IPComp) New market for AVM partners – profitable and fast growing

Access Server and NetWAYS/ISDN Support for our partners Public Relations Ads in trade magazines Fairs/road shows (lead tracking) Forwarding project requests Trainings Presales support Hotline support Your project in the AVM Solutions Guide

Access Server and NetWAYS/ISDN For a successful cooperation