Spatial Location Protocol Location Server Authentication draft-polk-slp-loc-auth-server-00.txt James M. Polk (Co-Chair) March 30th, 2000.

Slides:



Advertisements
Similar presentations
Protocol carrying Authentication for Network Access (PANA) Subir Das/Basavaraj Patil Telcordia Technologies Inc./Nokia 12/14/2001.
Advertisements

1 Configuring Virtual Private Networks for Remote Clients and Networks.
VoIP – Security Considerations An Examination Ricardo Estevez CS 522 / Computer Communication Fall 2003.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
11 October HTML: Links and Forms. Agenda News: William Knight Review of HTML Pages Meeting sheet passed HTML Links Networking and the Internet HTML Forms.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
ESRS - EMC Secure Remote Support ( Dial-IN & Dial-Home) Sunil Joshi
Data Model Examples USER SPECIFICATIONS.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Virtual Private Network
{ Networking High School Computer Application. What is a network? A system containing any combination of computers, computer terminals, printers, audio.
Chapter 10: Authentication Guide to Computer Network Security.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Chapter Overview Network Communications.
Chapter 4 Networking and the Internet Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Mohammed Mohsen Links Links are what make the World Wide Web web-like one document on the Web can link to several other documents, and those.
1 Client Server Architecture over the Internet Week - 2.
15 Semester 1 JEOPARDY IndirectnetworksupportDNSDNSNetworkApps.NetworkApps.MoreNetworkApps.Misc.Misc
IETF82, TAIWAN Meilian LU, Xiangyang GONG, Wendong WANG
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Module 11: Remote Access Fundamentals
Module 5: Designing a Terminal Services Infrastructure.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 8: Virtual LAN (VLAN)
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Module 9: Fundamentals of Securing Network Communication.
Communication, Networks, The internet and the Worldwide Web.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Session Peering Protocol over SOAP I-D ( draft-ietf-drinks-spp-over-soap-01) draft-ietf-drinks-spp-over-soap-01 0 Presenter: Vikas Bhatia (On behalf of.
Translate tech terms into plain English. ?
Module 5: Designing Security for Internal Networks.
International Telecommunication Union The Fully Networked Car Geneva, 4-5 March 2009 Safety & Security Bernard Dugerdil Freescale Semiconductor.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Smart Objects and the Internet Architecture Fred Baker.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
Module 6: Network Policies and Access Protection.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
©Richard L. Goldman Public Key Policies for Windows 2000 ©Richard Goldman December 5, 2001.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
P2P Streaming Protocol (PPSP) Requirements draft-zong-ppsp-reqs-02 Ning Zong Yunfei Zhang Victor Pascual Carl Williams.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
DHCPv4 option for PANA Authentication Agents draft-suraj-dhcpv4-paa-option-00.txt DHC/PANA WG IETF-63 France, Paris.
Securing Access to Data Using IPsec Josh Jones Cosc352.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Virtual Private Networks
Palo Alto Networks Certified Network Security Engineer
Virtual Private Networks
Virtual Private Networks
SECURING NETWORK TRAFFIC WITH IPSEC
IS4550 Security Policies and Implementation
ICT Computing Lesson 4: Computing Network.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [MAC address assignment in IEEE
Cengage Learning: Computer Networking from LANs to WANs
SALES RECEIPT Downloaded from
Read this to find out how the internet works!
Q1/13 - NGN Initial Considerations
Presentation transcript:

Spatial Location Protocol Location Server Authentication draft-polk-slp-loc-auth-server-00.txt James M. Polk (Co-Chair) March 30th, 2000

Basic premise of I-D Early considerations for a Spatial Location Server and issues that will need to be addressed when an IP Device that has determined its location requests, or is requested, to provide that information to a Spatial Location Server (SLS)

Mechanisms of the Spatial Location Server First - Spatial Location Server (SLS) MUST determine its own location based on the SLOP Protocol Need for Authentication Server, similar to a Security Server, should be within the Network Domain of an SLS Server in order to authenticate to that Domain SLS infrastructure could become a combination of Hierarchical and Peering in communications to other SLS Server (similar to a Certificate Authority Network) IPsec likely should become the communications method between SLS Servers regardless of Hierarchical or Peering in relationship within the Network

Location Possibilities The following is an early potential list, in no particular order and easily a subset of the possibilities, of coordinate mechanisms/values: –X, Y, Z –Long., Lat., Alt. –Planet, Country, State/Province, City/town, street, building, zip code, floor, quadrant of floor, office/cube number –To geographic area like a floor, part of a floor, a building a city ()

Additional Considerations for SLP Location representation Known additional or replacement identification information could include: Relation to directly attached L2 Switch/Router Relative or absolute location to any of the above items Perhaps a remote site relative to a Corporate site Residence or Company name