Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
FIREWALLS Chapter 11.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Remote Desktop Connection Techniques Wireless Communication Networks.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Proxy Servers CS-480b Dick Steflik Proxy Servers Part of an overall Firewall strategy Sits between the local network and the external network Originally.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Remote Networking Architectures
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Virtual Private Network
1 Enabling Secure Internet Access with ISA Server.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Chapter 6: Packet Filtering
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Wireless Networks and the NetSentron By: Darren Critchley.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Firewall Security.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
verifone HQtm Estate Management Solution
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Networks and Security Great Demo
Mobile equipment for vacuum control
Chapter 1 Introduction to Networking
Virtual Private Network
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
AbbottLink™ - IP Address Overview
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO National Manufacturing Week 2006 Chicago, IL

Agenda Trends and Applications Inbound Connection Oriented Architecture Outbound Connection Oriented Architecture Virtual Connectivity Networks Summary/Questions

Networking Trends Network complexity is growing –Security requirements are increasing –System integration is increasing within an organization, to customers, and to suppliers Regulatory Issues –HIPAA, Sarbanes-Oxley, etc., add additional requirements LAN –Old Paradigm: Inherently trusted user –New Paradigm: Inherently untrusted user Treat an internal and external user identically

M2M Remote Access Applications Status and Maintenance Checks Diagnostics Configuration and Administration Software Upgrade Log File Retrieval

Remote Access Methodologies Inbound Connection via the Internet –Definition: Client originates a connection to the serial server –Requires Firewall(s)/Router(s) reconfiguration –Port Forwarding is the most common implementation Outbound Connection via the Internet –Definition: Serial server originates connection to a known point –Gateway provides connection point –Creates a Virtual Connectivity Network

Inbound Connection Systems Client (i.e. PC) originates connection to the serial server –Telnet or Virtual Serial Port –Requires advance provisioning Serial Server –Static IP address –Authenticates user (username/password)

Inbound Connection Architecture User connects remotely using the Internet to serial server inside the firewall of an organization –Requires advance provisioning –Port Forwarding is the most common technology

Port Forwarding Illustration Web servers are the most common example

Installation Issues Provisioning IP address routing is resource intensive –They must be setup and tested –Maintained through upgrades/replacements –At a third party, time and politics drive the process Username/password is in serial server Must know IP address (and port number) of serial server –Multiple serial servers within a single facility require each to have their own port number

Administrative Issues Serial servers are individually managed –To reduce complexity, a single username/password is often used for all users Serial server configuration information (IP address, port number) must be disseminated –Users must keep track of this information –Updates must sent whenever the information changes Complexity grows dramatically as the size of deployment grows

Virtual Connectivity Network Motivation Outbound connections are generally permitted –Examples: Requesting a web page, retrieving e- mail Requires no changes to the firewall or router –Mimics existing network processes –Traverses the firewall like other processes Faster, simpler deployment Reduces technician skill level requirements –Requires minimal “Networking” training

VCN Architectural Changes Serial server needs a connection point –Client isn’t always there and is usually not visible from the Internet Solution: Add a connectivity gateway –Moves the client connection from locally at the serial server, to the gateway on the Internet –Provides a central point for access control and privilege administration

VCN Architecture The gateway provides a central point for all connections –Serial server connects to the Gateway –Client Software connects to the Gateway –Gateway establishes a connection between them when instructed

VCN Elements Serial Server –Originates and maintains a constant connection to the connectivity gateway –Serial server can have a DHCP or Static IP address Connectivity Gateway –Specific purpose appliance that resides on the Internet Client –Creates a connection with connectivity gateway –Connectivity gateway authenticates and then connects the client to the requested serial server

Enhanced Security Bi-lateral Authentication –User Individual username/password –Device Can use very strong machine-to-machine techniques Data Transfer –Encryption Administration –Individually controlled privileges/access

Centralized Administration Single point to control access to all serial servers User privileges are individually defined and controlled Enables a serial server to be shared across organizational boundaries Inherently disseminates any changes to a serial servers configuration information

Gateway Considerations High reliability/availability –Mission criticality Subscription or Hosted –Deployment size Internal Operated vs. Host Facility –Facility capability Power, Internet feed redundancy –Human resource requirements

Summary Outbound connections simplify remote access especially at third party facilities –Firewall traversal eliminates the need for reconfiguration –Central administration improves security and control

Thank You Questions? Virtual Connectivity Network www,traversix.com

Presenter Jim Kokal is President/CEO and Co-Founder of Wavetrix, a leading product development company. He has over 18 years experience in developing, marketing, and selling communication and networking systems At Wavetrix, he has led the creation of Traversix Virtual Connectivity Network product to address the needs of customers in remote access market.. Prior to Wavetrix, he was the Director of Marketing at Broadband Gateways and at Blue Wave Systems (now Motorola) he successfully created and launched the Softband™ software radio product line. He holds an MBA from the University of California at Los Angeles, and a MSEE/BSEE from the University of Illinois. Virtual Connectivity Network

LAN Based Access Client (i.e. PC) originates connection to the serial server –Telnet or Virtual Serial Port Serial Server –Static IP address − Authenticates user (username/password)

LAN Based Issues Security –Usually not encrypted Encryption often based on pre-shared key –Username/Password Located in the serial server IP administration –Static IP address for the serial server –Within the same subnet, no additional configuration required Outside the subnet requires routers/firewalls be reconfigured to establish a connection between the PC and the serial server