Security by Design and Scalability Using DPI Technologies in IoT Context. Dirk Czepluch Managing Director IPOQUE, a Rohde Schwarz company

Size: px
Start display at page:

Download "Security by Design and Scalability Using DPI Technologies in IoT Context. Dirk Czepluch Managing Director IPOQUE, a Rohde Schwarz company"

Transcription

1 Security by Design and Scalability Using DPI Technologies in IoT Context Dirk Czepluch Managing Director IPOQUE, a Rohde Schwarz company

2 TECHNICAL MOTIVATION FOR DPI ı Problem: Network convergence The Internet (IP Layer) is practically a single service network Different applications have the different requirements ı Solution: Identify applications to manage them Differentiated application/protocol handling requires reliable identification 2/29/2016 company confidential 2

3 APPLICATION IDENTIFICATION? ı TCP/UDP ports Communication endpoints for programs (L7 Applications) Encoded in L4 header --> efficient lookup possible ı Port assignment by IANA Well known ports Best effort/ rely on cooperation Potential abuse 2/29/2016 company confidential 3

4 DPI SOLVES THE PROBLEM ı Use case: IP packet processing Pros: Reliable application identification on Network Layer (IP) Cons: Breaks encapsulation and layer isolation paradigm of ISO/OSI model Protocol detection usually not in first packet 2/29/2016 company confidential 4

5 System details Protocol application detection capability Tunnels support ComodoUnite, CyberGhost, GRE, GTP, HTTPTunnel, HamachiVPN, IP in IP, IPSEC, ISAKMP, JAP, L2TP, MPLS, NetMotion, OpenVPN, PDProxy, PPP, PPTP, SSL, SSTP, Socks, SoftEthernet, TOR, Teredo, UltraSurf, VPN- X, VTUN, YourFreedom 29. Okt Vom Start-up zur Konzerntocher

6 DPI APPLICATIONS ı Traffic Management/Policy Enforcement Bandwidth Optimization QoS and QoE assurance Data Plan Enforcement ı Security/ NG Firewalls: Allow/Block Applications and Protocols Virus scan in sensitive traffic only ı Network Probing Statistics & Reporting Traffic Forwarding Test and Measurement 2/29/2016 company confidential 6

7 Net Sensor hardware platforms FP30 best suited for: Small installations, low throughput, 1Gbps lines FP60 best suited for: Medium installations, low to medium throughput, 1Gbps and 10 Gbps lines FP61 best suited for: Larger installations, medium to high throughput, 1Gbps, 10 Gbps and 40 Gbps lines R&S Traffic Analytics Solution and Net Reporter 2.0 7

8 Net Reporter capabilities Leverages ipoque s core technology, PACE (Protocol & Application Classification Engine) Turns protocol and application classification into valuable information Ties protocol and application information to subscriber groups, devices, data plans and more Provides APIs for integration with 3 rd party systems (Big Data, CRM) Powerful operations on data Easy-to-use UI or direct access to analytics DB 2/29/ R&S Traffic Analytics Solution and Net Reporter 2.0 8

9 Net Reporter UI R&S Traffic Analytics Solution and Net Reporter 2.0 9

10 Net Reporter UI R&S Traffic Analytics Solution and Net Reporter

11 Net Reporter UI R&S Traffic Analytics Solution and Net Reporter

12 Net Reporter UI R&S Traffic Analytics Solution and Net Reporter

13 R&S Industrie 4.0 and IoT concept be aware ı Rohde & Schwarz Net Sensor / Net Reporter Detect and alert anomalies in the IP traffice Detect protocols with parameter settings (e.g. avoid a reset in a power plant) Analyzing platform for a lot of applications Inteligence and extenable IP Probe Net Sensor by using the R&S DPI Engine PACE Industrie 4.0 Sicherheitsaspekte 13

14 R&S Industrie 4.0 and IoT concept make secure ı R&S Gateprotect Firewall includigng Rohde & Schwarz PACE Software 1. Active protection with protocol validation only approved protocols and parameter will pass 2. First deployments of IEC 104 at the German powert stations (Stadtwerken) ı Rohde & Schwarz PACE 1. Own DPI (Deep Packet Inspection) Engine, fast changes of protocols possible Industrie 4.0 Sicherheitsaspekte 14

15 Thank you! 29. Okt Vom Start-up zur Konzerntocher

Mobil Core Monitoring Session aware load balancing of GTPv1 and GTPv2 traffic to multiple probes

Mobil Core Monitoring Session aware load balancing of GTPv1 and GTPv2 traffic to multiple probes Sessionmaster EXA Series Version 1.1 Okt. 2015 Technical Features & Models : Sessionmaster EXA 28 Ports 28 x 10 Gbit SFP+ Throughput 280 Gbps Application Presentation Session Transport Network Application

More information

NGF0401 Instructor Slides

NGF0401 Instructor Slides Advanced Site to Site VPN Barracuda NextGen Firewall F VPN Tunnel Routing Separate routing table Default behavior Uses source based routing Creates separate premain routing tables for every VPN tunnel

More information

Solution Guide Version R&S INTRA Traffic analytics for communication service providers

Solution Guide Version R&S INTRA Traffic analytics for communication service providers Solution Guide Version 01.00 R&S INTRA Traffic analytics for communication service providers Table of contents 1 Introduction... 3 1.1 Key benefits... 3 1.2 Key features... 3 2 Solution Architecture...

More information

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER CHAPTER 27 This chapter describes IP tunneling features implemented on the Cisco 10000 series routers and includes the following topics: GRE Tunnel IP Source and Destination VRF Membership, page 27-1 Restrictions

More information

Implementation Guide - VPN Network with Static Routing

Implementation Guide - VPN Network with Static Routing Implementation Guide - VPN Network with Static Routing This guide contains advanced topics and concepts. Follow the links in each section for step-by-step instructions on how to configure the following

More information

Analysis of VPN Protocols

Analysis of VPN Protocols Analysis of VPN Protocols ECE 646 Final Project Presentation Tamer Mabrouk Touhidur Satiar Overview VPN Definitions Emergence of VPN Concept of Tunneling VPN Classification Comparison of Protocols Customer

More information

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu

Smart Home Network Management with Dynamic Traffic Distribution. Chenguang Zhu Xiang Ren Tianran Xu Smart Home Network Management with Dynamic Traffic Distribution Chenguang Zhu Xiang Ren Tianran Xu Motivation Motivation Per Application QoS In small home / office networks, applications compete for limited

More information

White Paper Version DPI for vepc vendors: Real-time analytics, QoE and security

White Paper Version DPI for vepc vendors: Real-time analytics, QoE and security White Paper Version 01.00 DPI for vepc vendors: Real-time analytics, QoE and security Table of contents Acronyms and abbreviations... 2 1. Introduction... 3 2. Defining vepc... 4 3. vepc challenges and

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET2896BU Expanding Protection Across the Software Defined Data Center with Encryption VMworld 2017 Chris Corde Senior Director, Security Product Management Content: Not for publication #VMworld #NET2896BU

More information

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved. Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,

More information

P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks

P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks P2P Optimized Traffic Control Riad Hartani & Joe Neil Caspian Networks 2004 Caspian Networks, Inc. P2P Applications WINNY 2 Rapid evolution of P2P applications, significant impact on network architectures

More information

R&S PACE 2 Solution Guide

R&S PACE 2 Solution Guide R&S PACE 2 Solution Guide Contents 1. Introduction... 3 Key Benefits of R&S PACE 2... 3 2. R&S PACE 2 as an OEM solution... 4 2.1 Integration... 4 2.2 Performance... 4 3. Architecture overview... 5 3.1

More information

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel PPP Tunneling Step by step explanation and configuration for creating PPP Tunnel 1 Point-to-Point Protocol Point-to-Point Protocol (PPP) is used to establish a tunnel (direct connection) between two nodes.

More information

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef Outline Introduction Approach Research Results Conclusion

More information

Improving Visibility and Monitoring with SDN for Carrier Networks

Improving Visibility and Monitoring with SDN for Carrier Networks SOLUTION GUIDE Improving Visibility and Monitoring with SDN for Carrier Networks Building a Visibility Fabric with Luxar, Pica8, and Rohde & Schwarz Cybersecurity Network Traffic Visibility The network

More information

Defence, Intelligence and Secure Communications Solutions

Defence, Intelligence and Secure Communications Solutions Defence, Intelligence and Secure Communications Solutions Ensuring mission critical application performance Allot XXXXXXXXX Date Copyright 2013 Allot Communications Ltd. All rights reserved. Allot Communications,

More information

1. Ultimate Powerful VPN Connectivity

1. Ultimate Powerful VPN Connectivity 1.1. Firewall, Proxy and NAT Transparency One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

A Unified Threat Defense: The Need for Security Convergence

A Unified Threat Defense: The Need for Security Convergence A Unified Threat Defense: The Need for Security Convergence Udom Limmeechokchai, Senior system Engineer Cisco Systems November, 2005 1 Agenda Evolving Network Security Challenges META Group White Paper

More information

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN Data Sheet SteelConnect The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any

More information

Datasheet. Gigabit Router with SFP. Models: ER-4. Sophisticated Routing Features. Next-Generation Price/Performance Value. SFP Port for Fiber Uplink

Datasheet. Gigabit Router with SFP. Models: ER-4. Sophisticated Routing Features. Next-Generation Price/Performance Value. SFP Port for Fiber Uplink Gigabit Router with SFP Models: ER-4 Sophisticated Routing Features Next-Generation Price/Performance Value SFP Port for Fiber Uplink Overview Advanced Routing Technology for the Masses Internet Ubiquiti

More information

Virtual Private Networks.

Virtual Private Networks. Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies

More information

VPNS BY RICK FREY.

VPNS BY RICK FREY. VPNS BY RICK FREY www.rickfreyconsulting.com WHAT IS A VPN? A Virtual Private Network is a means by which two or more normally non-adjacent networks are connected through virtual wires. www.rickfreyconsulting.com

More information

1V0-642.exam.30q.

1V0-642.exam.30q. 1V0-642.exam.30q Number: 1V0-642 Passing Score: 800 Time Limit: 120 min 1V0-642 VMware Certified Associate 6 Network Visualization Fundamentals Exam Exam A QUESTION 1 Which is NOT a benefit of virtualized

More information

CSE509: (Intro to) Systems Security

CSE509: (Intro to) Systems Security CSE509: (Intro to) Systems Security Fall 2012 Invited Lecture by Vyas Sekar IPSec 2005-12 parts by Matt Bishop, used with permission Security in Real Life: Motivation Site SF Company X $$$ Site NY Site

More information

Datasheet. Gigabit Routers with SFP. Models: ER-4, ER-6P. Sophisticated Routing Features. Next-Generation Price/Performance Value

Datasheet. Gigabit Routers with SFP. Models: ER-4, ER-6P. Sophisticated Routing Features. Next-Generation Price/Performance Value Datasheet Gigabit Routers with SFP Models: ER-4, ER-6P Sophisticated Routing Features Next-Generation Price/Performance Value SFP Port for Fiber Uplink Datasheet Overview Advanced Routing Technology for

More information

CLIENT SERVER SYNERGY USING VPN

CLIENT SERVER SYNERGY USING VPN CLIENT SERVER SYNERGY USING VPN 1 CHETAN S MORE, 2 AMAN ANNAD, 3 KUSHAGRA RAIZADA, 4 MANUJ SRIVASTAVA 1,2,3,4 Department of Electronics and Telecommunication Engineering, Bharati Vidyapeeth (Deemed To

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

Datasheet. 8-Port 10G SFP+ Router. Model: ER-8-XG. 80 Gbps Aggregate Throughput. 10G Ethernet SFP+ Ports. Hot-Swappable Modular Power Supplies

Datasheet. 8-Port 10G SFP+ Router. Model: ER-8-XG. 80 Gbps Aggregate Throughput. 10G Ethernet SFP+ Ports. Hot-Swappable Modular Power Supplies 8-Port 10G SFP+ Router Model: ER-8-XG 80 Gbps Aggregate Throughput 10G Ethernet SFP+ Ports Hot-Swappable Modular Power Supplies Example of Enterprise Deployment 10G Routing Technology for the Masses Ubiquiti

More information

SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc.

SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc. SFC in the DOCSIS Network James Kim Cable Television Laboratories, Inc. Abstract Service Function Chaining (SFC) is a concept that has been around for a while. Newer technology advancements in the SDN

More information

The Internet of Things Meets Big Data Is Your Network Prepared?

The Internet of Things Meets Big Data Is Your Network Prepared? Moxa s Webinar The Internet of Things Meets Big Data Is Your Network Prepared? Nick Sandoval Field Application Engineer Agenda Converged Networks Internet of Things Big Data Trends in Industrial Networks

More information

Configuring GPRS Tunneling Protocol Support

Configuring GPRS Tunneling Protocol Support The GPRS Tunneling Protocol Support feature provides firewall support for General Packet Radio Switching (GPRS) Tunneling Protocol (GTP). GPRS is a data network architecture, which integrates with existing

More information

HC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee

HC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee HC-711 Q&As HCNA-CBSN (Constructing Basic Security Network) - CHS Pass Huawei HC-711 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

MPLS, THE BASICS CSE 6067, UIU. Multiprotocol Label Switching

MPLS, THE BASICS CSE 6067, UIU. Multiprotocol Label Switching MPLS, THE BASICS CSE 6067, UIU Multiprotocol Label Switching Basic Concepts of MPLS 2 Contents Drawbacks of Traditional IP Forwarding Basic MPLS Concepts MPLS versus IP over ATM Traffic Engineering with

More information

Cisco SCE 2020 Service Control Engine

Cisco SCE 2020 Service Control Engine Data Sheet Cisco SCE 2000 Series Service Control Engine The Cisco SCE 2000 Series Service Control Engine is a network element specifically designed for carrier-grade deployments requiring high-capacity

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

Configuring IP Tunnels

Configuring IP Tunnels Version: 3334 Copyright 2007-2010 ImageStream Internet Solutions, Inc., All rights Reserved. Table of Contents Router Installation and Configuration Manual/Configuring IP Tunnels...1 Understanding Tunnel

More information

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe

ICN & 5G. Dr.-Ing. Dirk Kutscher Chief Researcher Networking. NEC Laboratories Europe ICN & 5G Dr.-Ing. Dirk Kutscher Chief Researcher Networking NEC Laboratories Europe Performance and Security Today User Equipment Access Network Core/Service Network Application Servers 2 NEC Corporation

More information

Alten Calsoft Labs Virtual B-RAS Solution

Alten Calsoft Labs Virtual B-RAS Solution Alten Calsoft Labs Virtual B-RAS Solution Overview Surging broadband subscriber base and the advent of more bandwidth-hungry network services have clearly started highlighting issues with the traditional

More information

Deployment Scenarios

Deployment Scenarios This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page

More information

GPRS security. Helsinki University of Technology S Security of Communication Protocols

GPRS security. Helsinki University of Technology S Security of Communication Protocols GPRS security Helsinki University of Technology S-38.153 Security of Communication Protocols vrantala@cc.hut.fi 15.4.2003 Structure of the GPRS Network BSS GTP PLMN BSS-Base Station sub-system VLR - Visiting

More information

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN

More information

R&S GP-U gateprotect Firewall How-to

R&S GP-U gateprotect Firewall How-to gateprotect Firewall How-to Configuring NAT rules using NETMAP (T^Wæ2) 3646.3988.02 01 Cybersecurity How-to 2017 Rohde & Schwarz Cybersecurity GmbH Muehldorfstr. 15, 81671 Munich, Germany Phone: +49 (0)

More information

Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used?

Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used? Volume: 418 Questions Question: 1 An engineer is using the policy trace tool to troubleshoot a WSA. Which behavior is used? A. External DLP policies are evaluated by tool B. Socks policies are evaluated

More information

Design and Deployment of SourceFire NGIPS and NGFWL

Design and Deployment of SourceFire NGIPS and NGFWL Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the

More information

Application Awareness: The Critical Enabler in Virtualized Networks

Application Awareness: The Critical Enabler in Virtualized Networks Application Awareness: The Critical Enabler in Virtualized Networks Contents Introduction... 3 Application Awareness Plays a Central NFV/SDN Role... 4 Handling Encryption... 5 Application Metadata... 6

More information

Hermes: An Integrated CPU/GPU Microarchitecture for IP Routing

Hermes: An Integrated CPU/GPU Microarchitecture for IP Routing Hermes: An Integrated CPU/GPU Microarchitecture for IP Routing Yuhao Zhu * Yangdong Deng Yubei Chen * Electrical and Computer Engineering University of Texas at Austin Institute of Microelectronics Tsinghua

More information

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 DPX8000 Series Deep Service Switching Gateway User Configuration Guide Probe Service Board Module v1.0 i Hangzhou DPtech Technologies Co., Ltd. provides full- range technical support. If you need any help,

More information

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. 1 Agenda 1. Overview and company presentation 2. Solution presentation 3. Main benefits to show to customers 4. Deployment models 2 VeloCloud Company

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Deploying Scalable Services on an MX Series Router Acting as a Broadband Network Gateway Release NCE0062 Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale,

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Converged World. Martin Capurro

Converged World. Martin Capurro Information Management in a Converged World Martin Capurro Qwest Product Management Agenda I. Changes In Information Technology II. III. IV. Exploring Technology Trends vs. Needs What is the Buying Opportunity

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

ISG-600 Cloud Gateway

ISG-600 Cloud Gateway ISG-600 Cloud Gateway Cumilon ISG Integrated Security Gateway Integrated Security Gateway Cumilon ISG-600C cloud gateway is the security product developed by Systrome for the distributed access network

More information

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Data Sheet. DPtech Anti-DDoS Series. Overview. Series Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to

More information

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking : Computer Networks Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking Remember this picture? How did the switch know to forward some packets to B and some to D? From the address in the packet

More information

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN Issue 1.1 Date 2014-03-14 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or

More information

NETWORK TECHNOLOGIES, WHOLESALE ACCESS PRODUCTS AND INVESTMENT

NETWORK TECHNOLOGIES, WHOLESALE ACCESS PRODUCTS AND INVESTMENT NETWORK TECHNOLOGIES, WHOLESALE ACCESS PRODUCTS AND INVESTMENT Florian DAMAS Director, Public Affairs & Government Relations 8 July 2015 1 Questions 1. How network technologies will evolve? 2. How this

More information

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application

More information

How to Create a TINA VPN Tunnel between F- Series Firewalls

How to Create a TINA VPN Tunnel between F- Series Firewalls How to Create a TINA VPN Tunnel between F- Series Firewalls As the TINA protocol offers significant advantages over IPsec, it is the main protocol that is used for VPN connections between F-Series Firewalls.

More information

Scalability Considerations

Scalability Considerations CHAPTER 3 This chapter presents the steps to selecting products for a VPN solution, starting with sizing the headend, and then choosing products that can be deployed for headend devices. This chapter concludes

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010

VPNs. Communication Technologies Last Points (briefly) VPNs Technologies. Satellite Networks. Telemedicina e e-saúde 2009/2010 Communication Technologies Last Points (briefly) VPNs Virtual Private Networks Main objective o Enable communication between two LANs as if they were together and separated. Telemedicina e e-saúde 2009/10

More information

DATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management

DATA SHEET MODEL AXC1000 HIGHLIGHTS OVERVIEW. Redefining Enterprise Wireless Management DATA SHEET Redefining Enterprise Wireless MODEL AXC1000 HIGHLIGHTS OVERVIEW TurboRF maximizes WLAN performance VisualSec - a comprehensive and visible security protection mechanism FlowPath - 1-7 layer

More information

Meraki Z-Series Cloud Managed Teleworker Gateway

Meraki Z-Series Cloud Managed Teleworker Gateway Datasheet Z Series Meraki Z-Series Cloud Managed Teleworker Gateway Fast, Reliable Connectivity for the Modern Teleworker The Cisco Meraki Z-Series teleworker gateway is an enterprise class firewall, VPN

More information

Dynamic WAN Selection

Dynamic WAN Selection KNOW YOUR NETWORK DATA SHEET Dynamic WAN Selection Overview Ipanema s Dynamic WAN Selection (DWS) is a core component of Ipanema SD-WAN and provides user-centric, dynamic path selection. It automatically

More information

Mobile IP. Mobile IP 1

Mobile IP. Mobile IP 1 Mobile IP Mobile IP 1 Motivation for Mobile IP Routing based on IP destination address, network prefix (e.g. 129.13.42) determines physical subnet change of physical subnet implies change of IP address

More information

WHITE PAPER ARUBA SD-BRANCH OVERVIEW

WHITE PAPER ARUBA SD-BRANCH OVERVIEW WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

PassTorrent.   Pass your actual test with our latest and valid practice torrent at once PassTorrent http://www.passtorrent.com Pass your actual test with our latest and valid practice torrent at once Exam : 352-011 Title : Cisco Certified Design Expert Practical Exam Vendor : Cisco Version

More information

COLLABORATIVE SECURITY. Network Security Endpoint Security Data Security

COLLABORATIVE SECURITY. Network Security Endpoint Security Data Security COLLABORATIVE SECURITY Network Security Endpoint Security Data Security 40+ countries 35% industrial ac4vi4es 20+ Years of Experience 15 000+ customers 900+ partners Key Customers A Global Solution for

More information

Cubro Sessionmaster EXA40 series

Cubro Sessionmaster EXA40 series Cubro Sessionmaster EXA40 series PRODUCT REVIEW Network Packet Broker (NPB) At a glance Definition A network packet broker (NPB) is a tool that receives data from number of network links, duplicates, aggregates

More information

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe

Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe Virtualizing Managed Business Services for SoHo/SME Leveraging SDN/NFV and vcpe A Technical Paper prepared for SCTE/ISBE by Ajay Manuga VP Engineering Benu Networks amanuja@benunets.com 2017 SCTE-ISBE

More information

Tunneling Configuration Guide for Enterprise

Tunneling Configuration Guide for Enterprise Tunneling Configuration Guide for Enterprise Tech Note Version 1.0 Table of Contents Introduction... 3 Tunneling Options... 4 Why use tunneling... 4 Tunnel types... 4 Ruckus GRE... 4 Soft-GRE... 5 Tunneling

More information

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions Introduction Much more bandwidth is available now than during the times of 300-bps modems, but the same business principles

More information

Hillstone IPSec VPN Solution

Hillstone IPSec VPN Solution 1. Introduction With the explosion of Internet, more and more companies move their network infrastructure from private lease line to internet. Internet provides a significant cost advantage over private

More information

Medium / Large Enterprises Next-Generation UTM NU-850C

Medium / Large Enterprises Next-Generation UTM NU-850C Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive ShareTech NU-850C is the next phase of technology change which will help service provider Protection to launch the services in single

More information

Utimaco Safeware AG. What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30!

Utimaco Safeware AG. What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30! Utimaco Safeware AG What LI can learn from Anti-SPAM, Anti-Virus, IDS/IPS, and DPI technologies Dirk Schrader 4 June 2009, ISS Track 2, 13:30! 14:00 2 Contents! Introductions! Anti-SPAM and LI! Anti-Virus

More information

Virtual Private Network

Virtual Private Network VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure

More information

Mobile Communications Chapter 9: Network Protocols/Mobile IP

Mobile Communications Chapter 9: Network Protocols/Mobile IP Mobile Communications Chapter 9: Network Protocols/Mobile IP Motivation Data transfer Encapsulation Security IPv6 Problems DHCP Ad-hoc s Routing protocols 9.0.1 Motivation for Mobile IP Routing based on

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Transformation through Innovation

Transformation through Innovation INSSPG-2921 Transformation through Innovation Sumeet Arora Senior Vice President/GM, SP Network Systems Service Providers Biggest Challenges Web scale breaks our current cost and design models. l don t

More information

Medium / Large Enterprises Next-Generation UTM NU-850C

Medium / Large Enterprises Next-Generation UTM NU-850C Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive Protection UR-980 Overall Integration Cloud-based Management ShareTech NU-850C is the next phase of technology change which will help

More information

Deep Packet Inspection of Next Generation Network Devices

Deep Packet Inspection of Next Generation Network Devices Deep Packet Inspection of Next Generation Network Devices Prof. Anat Bremler-Barr IDC Herzliya, Israel www.deepness-lab.org This work was supported by European Research Council (ERC) Starting Grant no.

More information

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN Data Sheet SteelConnect The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming more

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video

Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

How To Forward GRE Traffic over IPSec VPN Tunnel

How To Forward GRE Traffic over IPSec VPN Tunnel How To Forward GRE Traffic over IPSec VPN Tunnel Applicable Version: 10.00 onwards Overview Generic Routing Encapsulation (GRE) is a simple IP packet encapsulation protocol, GRE tunnels are mainly used

More information

GGSN Pooling Support for Firewalls

GGSN Pooling Support for Firewalls The feature enhances the General Packet Radio Switching (GPRS) Tunneling Protocol (GTP) feature by adding load balancing support. GTP supports the inspection of control traffic that is designated to a

More information

Managed IP Services from Dial Access to Gigabit Routers

Managed IP Services from Dial Access to Gigabit Routers Managed IP Services from Dial Access to Gigabit Routers Technical barriers and Future trends for IP Differentiated Services Grenville Armitage, PhD Member of Technical Staff High Speed Networks Research,

More information

Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)

Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) JP Vasseur, PhD - Cisco Fellow jpv@cisco.com Maik G. Seewald, CISSP Sr. Technical Lead maseewal@cisco.com June 2016 Cyber

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information