Secure Connectivity for Multi-Site Organisations

Similar documents
CN9000 Series 100Gbps Encryptors

Data Sheet AT&T VPN Gateway 8300

ENTERPRISE CONNECTIVITY

Alcatel OmniAccess 200 Series

Gigabit SSL VPN Security Router

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

ENTERPRISE CONNECTIVITY

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Understanding Layer 2 Encryption

Cisco RV180 VPN Router

White paper. Combatant command (COCOM) next-generation security architecture

SENETAS ENCRYPTION KEY MANAGEMENT STATE-OF-THE-ART KEY MANAGEMENT FOR ROBUST NETWORK SECURITY

Network Services Internet VPN

INNOVATIVE SD-WAN TECHNOLOGY

DATASHEET. Advanced 6-Port Gigabit VPN Network Router. Model: ER-6. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

Hillstone IPSec VPN Solution

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

rcell 100 Series MultiConnect Cellular Routers Features Benefits

NSG100 Nebula Cloud Managed Security Gateway

Remote Connectivity for SAP Solutions over the Internet Technical Specification

Meraki Z-Series Cloud Managed Teleworker Gateway

Cisco ASR 1000 Series Aggregation Services Routers: QoS Architecture and Solutions

NSG50/100/200 Nebula Cloud Managed Security Gateway

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Cisco 5921 Embedded Services Router

R&S SITLine ETH Ethernet Encryptor Secure data transmission via landline, radio relay and satellite links up to 40 Gbit/s

Unified Services Routers

INTERNATIONAL LAW ENFORCEMENT CCTV NETWORK SERVICES

VPN Cloud. Mako s SD-WAN Technology

INTERNATIONAL LAW ENFORCEMENT HD CCTV NETWORK

Deployment Scenarios

All you need for data communications. Turnkey Solutions

Corente Cloud Services Exchange

VM-SERIES FOR VMWARE VM VM

Cisco ME 6524 Ethernet Switch

Question No : 1 Which three options are basic design principles of the Cisco Nexus 7000 Series for data center virtualization? (Choose three.

Cisco RV110W Wireless-N VPN Firewall

IP VPn COMMITTED TO QUALITY

Feature Notes LCOS 9.20 RC2.

Cisco VPN Internal Service Module for Cisco ISR G2

Quidway NetEngine 20E/20 Series Router Product Specification

Cradlepoint COR IBR350 Specifications

ISG-600 Cloud Gateway

Security Quick Sales Guide

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

SECURITY FOR SMALL BUSINESSES

VERSATILE ENTRY-LEVEL

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

FAQ about Communication

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology

Huawei AR1000V Brochure

HP Instant Support Enterprise Edition (ISEE) Security overview

AC3000 Tri-Band Wireless Gigabit Dual-WAN VPN SMB Router TEW-829DRU (v1.0r)

SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open

FIBERLINK 2111 DESCRIPTION HIGHLIGHTS

Simplifying WAN Architecture

IPV6 THE NEXT GENERATION INTERNET PROTOCOL. Oulu, March 2006

Configuration of an IPSec VPN Server on RV130 and RV130W

Virtual Access GW7225AM-3G ADSL Router

HIGH-ASSURANCE FLEXIBLE 1-10GBPS ENCRYPTION CN6000 SERIES

Cisco Catalyst 6500 Series VPN Services Port Adapter

Cisco 5921 Embedded Services Router

Gigabit Content Security Router CS-5800

Truffle Broadband Bonding Network Appliance

Sun Mgt Bonus Lab 5: Application-Based Quality of Service on Palo Alto Networks Firewalls

Teldat Secure IPSec Client - for professional application Teldat IPSec Client

Virtual Access GW7010 ADSL Router

Top 30 AWS VPC Interview Questions and Answers Pdf

Apple Inc. Apple IOS 11 VPN Client on iphone and ipad Guidance Documentation

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

VPN Auto Provisioning

Cisco Exam Questions & Answers

MultiConnect rcell 100 Series Cellular Routers

ASACAMP - ASA Lab Camp (5316)

Sample excerpt. Virtual Private Networks. Contents

CCIE Routing & Switching

The administrators capability to shape these four aspects is enabled through the firewalls service quality measurements, such as:

Quick Sales Guide. Security

VPN Tracker for Mac OS X

QuickSpecs. Models. Features and Benefits Industry-leading warranty. HP ProCurve Threat Management Services zl Module

Router 6000 R17 Training Programs. Catalog of Course Descriptions

Features:- Multiservice Integration. Routing and switching integrated

Your wireless network

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

Cisco Cloud Services Router 1000V with Cisco IOS XE Software Release 3.13

vedge Cloud Datasheet PRODUCT OVERVIEW DEPLOYMENT USE CASES EXTEND VIPTELA OVERLAY INTO PUBLIC CLOUD ENVIRONMENTS

Secure Extension of L3 VPN s over IP-Based Wide Area Networks

NIST SP : Guidelines for the Secure Deployment of IPv6

Cisco RV 120W Wireless-N VPN Firewall

AIR-WLC K9 Datasheet. Overview. Check its price: Click Here. Quick Specs

Fundamentals and Deployment of Cisco SD-WAN Duration: 3 Days (24 hours) Prerequisites

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

Grandstream Networks, Inc. GWN7000 Command Line Guide

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Next-Generation Firewall Series Datasheet

NGF0401 Instructor Slides

Transcription:

Secure Connectivity for Multi-Site Organisations Solution for Critical Connections Flexible Solution for Diverse Environments Insta is a (Virtual Private Networking) solution enabling secure connectivity for multi-site organisations. Insta is suitable for several types of environments, ranging from interconnecting a few sites to the global networking of an organisation with hundreds of sites. The solution is targeted at environments with strict information security requirements. Typical users include governmental organisations and other authorities as well as companies with security critical network connections. The Finnish National Communications Security Authority (NCSA-FI) has granted Insta national approval for CONFIDENTIAL (III) and RESTRICTED (IV) levels. Insta is an all-in-one solution for high security. Besides an encryptor appliance, the system also includes integrated key, configuration and user management as well as full remote management for the encryptor network. A typical scenario is interconnecting sites of a geographically distributed organisation, providing secure communications among the sites. Another common application is an environment where sites access an organisation s centralised services containing classified information. An encryption system implemented with Insta can be extended and upgraded as needed, making it a cost effective solution with a long life cycle. The encryptor is available in 100Mbit/s and 1Gbit/s versions and 100Mbit/s appliances can be easily upgraded to 1Gbit/s speed as needed.

A Forerunner in Safe Networking Finnish Security Approved Product Insta has a long track record of developing encryption solutions for security-critical environments. As proof of our role as a forerunner, Insta is the first Finnish product to gain national approval up to level CONFIDENTIAL (III). System-Wide Security Concept Flexible and Cost-Effective Comprehensive routing protocol support enables connectivity without separate routers in most network environments. Additionally, a single appliance can be used for handling information with different security classifications, providing cost savings by reducing the number of appliances. Insta s unique security concept covers all aspects required by mission-critical systems. These include state-of-the-art encryption algorithms, secure key generation and transfer, strong user authentication and physical security of the Gateway appliance. Extensive Support Services High Performance and Reliable Long Life Cycle Guaranteed Insta s performance guarantees that encryption will not become a bottleneck, even in heavily loaded environments. Support for device redundancy and distributed management guarantee high availability, even in the most critical applications. Due to governmental customer needs, maintenance and support for the solution is guaranteed to last long into the future. Continuous product development ensures that the solution adapts to ever-changing security and networking requirements. Insta offers extensive life cycle support, including deployment and training services, technical support and maintenance. We also provide repair and maintenance services for the encryptor appliances.

Customer sites Customer Site 1 Service management Internet Insta Service Center service environment management and monitoring CA service (certificates and CRL) Log management service Other support services ISO 9001 ISO/IEC 27001 ITIL Also Available as a Service Implementing a high security encryption solution requires a lot more than a security-approved encryption product. Prerequisites for the electronic transfer of security-classified information include well implemented certificate and log management services as well as security-approved processes, premises and operating personnel. The Insta service provides all this effectively, being an easy and cost-effective way of achieving high security. The Insta service is based on the security-approved Insta solution. appliances are installed at customer sites, providing transparent protection for all customer payload, such as email, VoIP and documents. service management is provided from the security- and quality-certified Insta Service Center. Uncompromised confidentiality of customer data is guaranteed by fully separating service management traffic from the customer payload. Service deployment is implemented as a turnkey solution by Insta s experienced professionals, also covering the testing and documentation required for security approval. During the production phase, Insta is responsible for the monitoring, management and maintenance of the system. The Insta service includes all that is required: Security approved encryption system, Insta CA service for certificate management Log management service Monitoring, maintenance and reporting Documentation and service processes Security-approved premises and operating personnel Service pricing is based on a monthly fee, depending on the size of the network.

Technical Specifications IPsec Routing Firewall and QoS Stateful packet inspection (SPI) Differentiated Services with DSCP-based classification and shaping Guaranteed & maximum bandwidth per class Other protocols throughput (AES-256/SHA-256) Versions: 100 Mbps 1 Gbps LAN-to-LAN Multicast over IPsec 256-bit AES/Serpent encryption and SHA2 integrity protection authentication: X.509v3 RSA or ECC (Elliptic Curve Cryptography) certificate, IKE PSK (Pre Shared Keys) Automatic Tunnel Establishment Static OSPF, BGP PIM-SM, PIM-SSM IGMPv2/v3 VLAN (802.1Q) SNMPv2c Syslog DHCP server NTP

For futher information on Insta and our other information security solutions, please visit: Contact us: security@insta.fi Insta DefSec Oy Sarankulmankatu 20 P.O. Box 80 FI-33901 Tampere, Finland +358 20 771 7111 www.insta.fi Insta DefSec Oy, part of the Finnish familyowned Insta Group, serves its customers with solid professional knowhow and genuine commitment. We enhance security in society by developing innovative solutions in Information Security, Public Safety & Security and Defence fields. We are an independent product, service and solution provider, specialized in high security applications. Our customer base includes authorities and governmental organizations as well as enterprises from financial, telecom and energy sectors.