Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Network Security.
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Security and Organizational Governance Anand Lakshminarayanan Senior Product Manager Microsoft Corporation.
Unified. Simplified. Unified Communications Launch 2007.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Chapter 7 HARDENING SERVERS.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
A Survey on Interfaces to Network Security
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Securing Microsoft® Exchange Server 2010
BUSINESS B1 Information Security.
70-411: Administering Windows Server 2012
Module 6 Planning and Deploying Messaging Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
© Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved. Comprehensive Network Security Our Products Unified Threat ManagementCyberoam.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Secui.com Goh, Kyeongwon Secui.com Goh, Kyeongwon GRID Security Infrastructure
Chapter 2 Securing Network Server and User Workstations.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Vlad Mazek Own Web Now Corp CEO, MCSE, MCSA, CISSP (877) Portions reproduced with permission from Dean Calvert.
Unified. Simplified. Unified Communications Launch 2007.
Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.
A Network Security -Firewall Bruce Turin.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Working at a Small-to-Medium Business or ISP – Chapter 8
Network Security (the Internet Security)
Unit 3 Section 6.4: Internet Security
TECHNOLOGY GUIDE THREE
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
ISMS Information Security Management System
Identity & Access Management
Module 8: Securing Network Traffic by Using IPSec and Certificates
Session 1 – Introduction to Information Security
Presentation transcript:

draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang

Current Access Network Security Operator Network 3 rd Party Private Network Internet Devices for security function is fixed and limited. Security function is general and fixed in access procedure One-way authentication with pre-shared key Mutual authentication with pre-shared key Mutual authentication with certificate

Operator Network Virtualized Security Function Virtualized Security Function can provide more flexible and reliable protection 3 rd Party Private Network Internet

Use Case 1: security configuration Operator Network 1. Authentication Configuration: i.One-way authentication with pre-shared key; ii.Mutual authentication with pre-shared key iii.Certificate based authentication 2. Light control: choose 1 st. Authentication 1. Authentication Configuration: 2. Remote Monitor: choose 3 rd. Authentication Setup one-way authentication security function Setup certificate authentication security function Network can send configuration list to user side – Authentication – Encryption – etc.

Operator Network Use Case2: Optional security function Negotiation Network can send optional security function list to user side – Firewall – Antivirus software – Junk mail filter – Anti-spam message – etc. 1. Optional sec func:[FW][,Antivirus][,Junk mail filter][,Anti-spam message] 2. Required: Junk mail filter, Anti- spam message 3. Allocate Sec Funcs: Internet 1. Optional sec func:[FW][,Antivirus][,Junk mail filter][,Anti-spam message] 2. Required: Firewall, Antivirus 3. Allocate Sec Funcs:

Operator Network Use Case3: Security Request from user side User device sends specific security services request to operators. Operator Network increases, and/or updates security functions. Internet 1. Sec policy setting: [Source ID, Target ID, condition, auth_token] GW 2. Verify token 3. Transfer Policy -> Command 4. Send command to allocate, update sec funcs. 5. Notification.

Thank you!