Neah Bay Presentation. Introduction Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government,

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Secure Mobile IP Communication
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Controlling Network Boundaries.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
By Rod Lykins.  Background  Benefits  Security Advantages ◦ Address Space ◦ IPSec  Remaining Security Issues  Conclusion.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Internet Protocol Security (IPSec)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Telecommunication Networks Group Technical University Berlin Secure WLAN Operation and Deployment in Home and Small to Medium Size Office Environments.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
ROUTER Routers have the following components: CPU NVRAM RAM ROM (FLASH) IOS Cisco 2800 Series Router.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Practical Considerations for Securely Deploying Mobility Will Ivancic NASA Glenn Research Center (216)
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
EPipe 2344 Product Introduction. Protocols and Bandwidth Control Protocols TCP/IP, RIP, DHCP, TFTP, PPP, PPPoE, IPoE Bandwidth control (site-site) Multilink.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 Mobile Router Technology Development David Stewart, Will Ivancic, Dan Shell, Kent Leung, Brian Kachmar and Terry Bell.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Unlicensed Mobile Access (UMA ) Introduction and Overview Andrew Santarelli David Schraitle Matt Eberts Miguel Ibarra Mohammed Shareef.
Confidential New OnCell Features VPN & GuaranLink.
Under the Guidance of: 1 Mr. R.TRINADH Presented By: J.KEDHARESWAR 09NH1A0422(III ECE-A) V.K.R,V.N.B & A.G.K COLLEGE OF ENGINEERING.
CSCI 465 Data Communications and Networks Lecture 26
Security Issues With Mobile IP
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Unlicensed Mobile Access (UMA )
Mobile Router Technology Development
Practical Considerations for Securely Deploying Mobility
Presentation transcript:

Neah Bay Presentation

Introduction Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government, Commercial and Financial Institutions – IP Security – Wireless Security – Router Based Security – Remote Access Security

Security Issues b WEP Is Not Effective – Flawed Encryption Scheme – Weak Authentication Vulnerable to hacking – Eavesdropping, Anti-Replay attacks, DDOS and Man-in-the-middle attacks – Un-authorized network access – Identity theft, SSID and MAC

IPE-2M IPSEC/HAIPIS encryptor – Tunnels – Encryption – Strong Authentication 168-bit 3DES, SHA1 Miniature, Low Power PC/104 Design FIPS PUB pending

HAIPE NSA Specification for IPSEC – Type 1 ESP Tunnel Mode – Data Integrity via SHA-1 – Authentication with Firefly – Access Control – Dynamic Discovery – PPK and IKE

IPE-2M Tactical and Strategic Operation Compact Size, Light Weight, Low Power HAIPIS – NSA Approved version of IPSEC – Type I Encryption – Type I Key Exchange Compatible with Cisco 3200 Series

IPE-2M Operation Secures communications with IPSEC/HAIPIS, 3DES Application Independent – Data, Voice and Video Provides for many-to-many secure tunnels Will operate in mobile or stationary environments

Mobile Router IPE-2M Foreign Agent IPE-2M Roaming Interface Behind Router – Strategic Home Agent HA-MR Tunnel Mobile Network HA-FA Tunnel IPE-IPE Secure Tunnel Home Network Internet

IPE-2M Foreign Agent IPE-2M Mobile Router Roaming Interface In-Front of Router – Tactical Home Agent HA-MR Tunnel Mobile Network HA-FA Tunnel IPE-IPE Secure Tunnel Home Network Secure WAN Internet

Secure Multicast IPE-2M Foreign Agent IPE-2M Mobile Router Roaming Interface HA-MR Tunnel Multicast Source/Receiver HA-FA Tunnel IPE-IPE Secure Tunnel Home Network Secure WAN Internet Multicast Source/Receiver

Multiple Devices IPE-2M Foreign Agent IPE-2M Mobile Router 1 Roaming Interface HA-MR Tunnel HA-FA Tunnel IPE-IPE Secure Tunnel Home Network Internet Mobile Router 2 Roaming Interface Home Agent Secure WAN IPE-IPE Secure Tunnel

Environment Pro’s & Con’s Behind Pro’s – Takes advantage of mobile IP’s capabilities – Scalable Behind Con’s – Routers visible on secure network In-Front Pro’s – Routers are on protected network In-Front Con’s – Scalability can be an issue in large scale deployment – Security Policies can become extensive

IPE System Solutions Wide range of turnkey system solutions to meet numerous requirements Complete end-systems Commercial or COMSEC

IPE Future 5 Mbps, Type II version 1 Gbps, Type I version – TBD Encryption Algorithm – Firefly

Data Communications Security