Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
FIREWALLS Chapter 11.
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Remote Networking Architectures
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Virtual Private Network
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
 2013, Infotecs ViPNet Technology Advantages.  2013, Infotecs GmbH In today’s market, along with the ViPNet technology, there are many other technologies.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter 7: Using Windows Servers to Share Information.
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Virtual Connectivity Network Virtual Connectivity Networks – Improving Usability and Enhancing Security for Remote Access Jim Kokal Wavetrix President/CEO.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Wireless Networks and the NetSentron By: Darren Critchley.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Implementing ISA Server Caching
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
verifone HQtm Estate Management Solution
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Remote Access Using a Netgear DG834 Router 1http://
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Mobile equipment for vacuum control
Working at a Small-to-Medium Business or ISP – Chapter 8
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Working at a Small-to-Medium Business or ISP – Chapter 7
Welcome To : Group 1 VC Presentation
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
AbbottLink™ - IP Address Overview
Designing IIS Security (IIS – Internet Information Service)
Instructor Materials Chapter 8: Applied Networking
Presentation transcript:

Wavetrix Changing the Paradigm: Remote Access Using Outbound Connections Remote Monitoring, Control & Automation Orlando, FL October 6, 2005

Wavetrix l Agenda Goal Inbound Connection Oriented Architecture Outbound Connection Oriented Architecture Outbound Connection Systems Summary/Questions

Wavetrix l Goal Objective: –Enable remote access regardless of location Issues –Firewall(s)/Router(s) reconfiguration is very challenging when remote access is needed via the Internet Especially true for third party deployments –Centralized administration of user access and privileges –Security is of paramount importance

Wavetrix l Remote Access Applications Status and Maintenance Checks Diagnostics Configuration and Administration Software Upgrade Log File Retrieval All these applications are originated by the end user

Wavetrix l Remote Access Methodologies Inbound Connection via the Internet –Definition: Client originates a connection to the serial server –Requires Firewall(s)/Router(s) reconfiguration –Port Forwarding is the most common implementation Outbound Connection via the Internet –Definition: Serial server originates connection to a known point –Gateway provides connection point

Wavetrix l Inbound Connection Architecture Client (i.e. PC) originates connection to the serial server –Telnet or Virtual Serial Port Serial Server –Static IP address − –Authenticates user (username/password) Requires firewall to be configured to route connection to serial server –Port Forwarding is the most common technology

Wavetrix l Port Forwarding Illustration Web servers are the most common example

Wavetrix l Installation Issues Provisioning IP address routing is resource intensive –Static IP address for the serial server –They must be setup and tested –Maintained through upgrades/replacements –At a third party, time and politics drive the process Username/password is in serial server Must know IP address (and port number) of serial server –Multiple serial servers within a single facility require each to have their own port number

Wavetrix l Administrative Issues Serial servers are individually managed –To reduce complexity, a single username/password is often used for all users Serial server configuration information (IP address, port number) must be disseminated –Users must keep track of this information –Updates must sent whenever the information changes Complexity grows dramatically as the size of deployment grows

Wavetrix l Outbound Connection Motivation Outbound connections are generally permitted –Examples: Requesting a web page, retrieving e- mail Requires no changes to the firewall or router –Mimics existing network processes –Traverses the firewall like other processes Faster, simpler deployment Reduces technician skill level requirements –Requires minimal “Networking” training

Wavetrix l Architectural Changes Serial server needs a connection point –Client isn’t always there and is usually not visible from the Internet Solution: Add a connectivity gateway –Moves the client connection from locally at the serial server, to the gateway on the Internet –Provides a central point for access control and privilege administration

Wavetrix l Outbound Connection Architecture The gateway provides a central point for all connections –Serial server connects to the Gateway –Client Software connects to the Gateway –Gateway establishes a connection between them when instructed

Wavetrix l Outbound Connection Elements Connectivity Server –Originates and maintains a constant connection to the connectivity gateway –Serial server can have a DHCP or Static IP address Connectivity Gateway –Specific purpose appliance that resides on the Internet Connectivity Client –Creates a connection with connectivity gateway –Connectivity gateway authenticates and connects the client to the requested connectivity server

Wavetrix l Enhanced Security Bi-lateral Authentication –Connectivity Client Individual username/password –Connectivity Server Can use very strong machine-to-machine techniques Data Transfer –Encryption Pre-shared or dynamic key exchange Administration –Privileges/Access controlled individually –Centrally managed

Wavetrix l Centralized Administration Single point to control access to all connectivity servers User privileges are individually defined and controlled Enables a connectivity server to be shared across organizational boundaries Inherently disseminates any changes to a connectivity server’s configuration information

Wavetrix l Deployment Examples PBX –Remotely administer PBX Sensor Gateway –Connect a sensor network (deployed at a third party) to it application HVAC Management –Remotely manage/diagnose HVAC systems

Wavetrix l Summary Outbound connections simplify remote access especially at third party facilities –Firewall traversal eliminates the need for reconfiguration –Central administration improves security and control Enables large scale deployments

Wavetrix l Thank You Questions? Virtual Connectivity Network www,traversix.com