Enhancing your security management
|
|
|
- Melina Sullivan
- 10 years ago
- Views:
Transcription
1 Technical WhitePaper Enhancing your security management Compumatica secure networks 2014 Compumatica secure networks
2 OVERVIEW NETWORK SECURITY plays an important role for any company s IT management. For a better protected environment, security components have to be integrated into the firm network. A central security management station that is both effective and simple in use can fulfill these security demands. Network Security today ranks high on the list of any company s concerns. Almost all of a firm s relevant information is exchanged in electronic form via networks. Since the network technology employed by a company may assist attackers in many ways, these networks do not generally guarantee security or confidentiality for a company. For this reason, security has to be added to the firm networks. The corporate security manager can fulfill the pure security requirement by integrating additional security devices into the existing network, whereby the management of these devices is an important consideration. A central, easy-to-handle management station is a main prerequisite to fulfill the security requirements. Concerning the management of security components the corporate security manager generally has the choice between two different approaches. The first one is the local management approach. The idea behind local management is that the corporate security manager can manage each component individually, thus he has the highest flexibility with control over each flag in the components. The second approach is the security management approach, in which the idea is that the corporate security manager has a higher-level overview of the whole system and does not have to spend too much time with component details. Both approaches have their pros and cons. The security management approach, however, offers the following advantages: - in general, a company wants or has to use a VPN system as an additional mechanism, - the handling of the mechanism will be as easy as possible, - the results are secure and understandable for the company staff. Page 2 of 25
3 THE COMPUMATICA SECURE NETWORKS SOLUTION: THE SECURITY MANAGEMENT STATION (SMS) The Security Management Station (SMS) developed by Compumatica secure networks is such a tool to realize central and connection-oriented security management. It follows the centralized management approach and gives a high-level overview of the entire security system within a company. It handles all details automatically in the background. However, the corporate security manager can still examine and analyze details of the security devices. This is also possible for each security device of the CryptoGuard VPN system. THE CRYPTOGUARD VPN PRODUCT LINE NOTE: KryptoGuard LAN (KGLAN) is the older name for the identical product CryptoGuard VPN Security Management Station Ver still uses the older name KryptoGuard LAN (KGLAN) in a few cases. The SMS is part of the CryptoGuard VPN and CryptoWall security system, which additionally contains the CryptoGuard VPN device and the CryptoGuard VPN Client. Furthermore, the SMS can also manage the CryptoBastion, an application level gateway. All information about a company s VPN system (e.g., the specific security devices and security policies) and about the network in general (e.g. network nodes, gateways and connections) is stored in the database of the SMS. The security-relevant information (e.g., master or system keys) is stored encrypted, making it impossible to extract them from the database in a readable form. If the corporate security manager combines the two security systems CryptoGuard VPN and CryptoBastion under one management system he will be able to create powerful network security solutions for his company. Page 3 of 25
4 Figure 1 and Figure 2 show examples for the security devices CryptoGuard VPN and CryptoBastion, respectively. Figure 1 Page 4 of 25
5 Figure 2 KEY FEATURES AND BENEFITS OF THE SECURITY MANAGEMENT STATION The network information stored within the SMS is used to display the network topology in a graphical form. This display immediately gives an overview of the network topology and the corporate security manager can use it as a powerful tool for the security administration. He can define secure connections independently of the network environment, using only the endto-end communication devices. SECURITY MANAGEMENT STATION: GRAPHICAL PRESENTATION ROLE MANAGEMENT ORGANIZATIONAL UNITS INTEGRATION To expand the security philosophy of the SMS to the users, the concept of a user role is integrated. The security administrator can define different roles for the SMS users, e.g., editor or auditor. Each role is allowed to carry out a defined set of functions. These functional groups also have to be defined by the corporate security manager. Using the role mechanism, he can define, e.g., an editor role which is allowed to enter and store the new network components, their parameters and nothing more. The auditing of these new network components and the definition of their connections can be carried out by a user in a different role, e.g. the security supervisor. CONNECTIONS NODES AND NETWORKS PROTOCOL PROFILES KEY MANAGEMENT LOGBOOKS Page 5 of 25
6 In connection with the security alerts generated by the CryptoGuard VPN devices, the security administrator is informed in real time about violations of his security policy. Companies should always see their security management systems in combination with a network management system; in the last instance such security devices are simply another kind of network device. The SMS, e.g., has the ability to forward security alerts as SNMP traps to a network management station. If the corporate security manager wants to perform a later offline analysis, he can have a look at the security alerts, received from the CryptoGuard VPN devices, which are collected by the SMS and stored in the security alert logbook database. The corporate security manager can set up a logbook database according to his preferences and requirements. The SMS supports different kinds of logbook databases. There are logbook databases for the CryptoGuard VPN security alerts, for the CryptoGuard VPN security records and for all user activities at the SMS. If the corporate security manager wants to analyze these logbook databases, a detailed history of all activities and security-relevant events in the CryptoGuard VPN security system is possible. Page 6 of 25
7 Below, the features and benefits that the SMS offers are listed: Easy integration into existing network topology CG VPN black box principle SMS integration as a single network component Backup/Restore mechanism The Backup includes the configuration data of the whole security system Secured communication between SMS and security components Compumatica proprietary authentication protocol based on ITSEC/E3 high certified method Customer specific S-Boxes are loadable Downward compatible to the beginning Reliable compatibility to CryptoGuards and CryptoBastions of the first generation with a history of about 10 years Easy definition of secured connections After creation of topology no knowledge of security components necessary Just connection endpoints and security policy necessary Support of templates by using service/protocol/time profiles to simplify the creation of the security policy Simple method of enabling/disabling of connections and protocol profiles As connection mode the proprietary CG VPN mode and IPsec are available Inter-domain communication by using shared key material Automatic generation of configuration files for CryptoGuards and CryptoBastions According to the Compumatica VPN security policy: All is forbidden except for the explicitly allowed connections Logging functionality Logging of tasks performed at SMS (functions, errors, login/logout) as preservation of evidence Excellent key management Automatic generation of connection key files used by CryptoGuards Exchange of connection keys: Beside the key management mode IKEv1 also IKEv2 is supported within IPsec Beside the authentication method RSA also ECDSA (Elliptic Curve Digital Signature Algorithm) is supported within IPsec and IKEv2 Generation of CG VPN Mode keys ((A)DES, 3DES, AES) Generation of IPsec keys (MD5, SHA-1, DES, 3DES, BLOWFISH, CAST-128, AES,...) Page 7 of 25
8 RA/CA/PKI included to generate X509v3 certificates e.g. for using in IPsec connections with RSA signatures as authentication method PKI: o Beside RSA also ECDSA certificates are supported o Support of proprietary elliptical curves (EC) o Distribution of the CRL to several LDAP servers o Mark CA certificates as "Trusted", "Not trusted" and "OCSP" o Mark certificates near the expiration date o Import of PKCS#12 (Certificate and Private Key container) Smartcard functionality Centralized security management Centralized point of security management and single point of trust Automatically and centralized configuration of CryptoGuards and CryptoBastions According to the Compumatica VPN security policy: Managing CryptoGuards and CryptoWalls are managed by the push method GUI based security management User-friendly design Visualization of network topology Visualization of connections and all the security devices involved Powerful search functionality by user defined criteria Multi language support: Currently English and German are available Print functionality HTML based Online Help SMS owned user access control and role administration Application based user access control Administration of organizational units User roles to split responsibilities Centralized and user-friendly management of CryptoGuards Configuration by means of dividing generation, transmission and activation of configuration files Certificate Signing Request (CSR) CRL (Certificate Revocation List) and OCSP (Online Certificate Status Protocol) support concerning certificate validation within IPsec Perform Integrity check Retrieving and visualization of statistic information View SA list in case of IPsec Perform Selftest Get Log book Exchange of connection keys: Beside the key management mode IKEv1 also IKEv2 is supported within IPsec Page 8 of 25
9 Software upload White list of version check concerning software upload Import/Export of certificates Centralized and user-friendly management of CryptoBastions Configuration (General, Proxies,...) by means of dividing generation and transmission of configuration files Perform Integrity check Select operation mode (Runlevel) Get Log book Retrieving and visualization of statistic information Centralized and user-friendly administration of network components Alert functionality SNMP interface Single network component, Server, IPsec Client, network Import/Export of network components Reception of spontaneous messages of CryptoGuards and CryptoWalls and storage in database Forwarding of spontaneous messages of CryptoGuards and CryptoWalls as SNMP-Trap, or GSM-SMS SMS acts as SNMP proxy agent Support of SNMPv3 SNMP-Trap SNMP-Get (Status, Selftest, Statistic, Ping (Echo Request), Version, ) MIB available Administration of batch orders CryptoGuard: o Exchange of connection keys : Beside the key management mode IKEv1 also IKEv2 is supported within IPsec o Time synchronization between SMS and CryptoGuard o Software upload o Get Log book CryptoBastion: o Get Log book o Integrity check o System: Backup Redundancy mechanism Active redundancy system of CryptoGuards by using the Spanning Tree Protocol (STP) Passive redundancy system of CryptoGuards Geo-Redundancy Unix based security management SUN SunOS (e.g. Solaris 10 up to SMS version 5.00.xx) PC Linux (e.g. SuSE 9.3) Possibility of secured remote administration Page 9 of 25
10 Database Management System (DBMS) GRAPHICAL PRESENTATION Access of Perl scripts to DBMS via ODBC Job Scheduler ASE XP Server Virtual DBA: The virtual DBA includes database maintenance tasks that are essential concerning database performance and data security. Using ASE Job Scheduler and ASE XP Server (extended procedures) the virtual DBA supports amongst others the feature Geo-redundancy: If one or more slave SMS exist, the dumps are replicated and loaded onto the slave SMS; this is one more step to improve database security. NETWORK OVERVIEW MOVEABLE REFERENCE POINT The graphical presentation of a network topology is the heart of the SMS. All relevant network and security components are displayed. This allows obtaining a quick overview of the network and security topology. The reference point of the topology is moveable and can be set at any point in the network. The network topology can therefore be seen from different points of view, depending on which security structure the corporate security manager needs. Figure 3 is an example for a graphical presentation of a headquarters with two branch offices, all communicating via the internet. The reference point of the topology is the Internet. The headquarters is connected to the Internet via the CryptoGuard VPN device Internet-Gateway. The two branch offices are connected to the Internet via the CryptoGuard VPN devices Site-A-Gateway and Site-B-Gateway. Page 10 of 25
11 Figure 3 ROLE MANAGEMENT USER ROLE RESTRICTIONS ADMINISTRATOR ROLE FOUR EYES PRINCIPLE As mentioned earlier, the corporate security manager is able to define different users at the SMS. For each SMS user he has to define a role. When installing the SMS five roles already have been predefined: SMS Administrator SMS Auditor SMS Editor SMS Observer SMS Operator Page 11 of 25
12 The corporate security manager can extend these roles or develop new roles according to his requirements. The role definition consists of a name and an assigned set of functions permitted the role. There is one SMS user, however, who needs no role definition: the SMS system administrator. He is comparable to a UNIX root account. The system administrator must define the roles and is able to assign any functionality to a role. It is also possible for him to define a role equal to his own, i.e., to define an additional system administrator role. Since this role is very powerful it should be protected by a password. Figure 4 shows the definition of a new role. Figure 4 This mechanism offers many possibilities. One example of what can be realized with the role mechanism is the four eyes principle. Two roles are defined. The first is allowed to define the data, e.g. the security policy, the second is allowed to activate this data. Thus both roles (four eyes) are needed to define and activate a new security policy for the company s communication. Page 12 of 25
13 Enhancing your security management ORGANIZATIONAL UNITS Organizational units will help to define the independent logical security units within the SMS and are a main part of the central, structured security approach. They can be defined for all types of organizational units, e.g. headquarters, financial departments or branch offices. All components of a defined area will be assigned to a well-defined branch. Organizational units appear to the user as independent security areas. Different units are only connected to each other if the administrator defines interfaces between them. Thus each unit can be seen as an individual and independent logical security system. EASY INTEGRATION EASY INTEGRATION INTO EXISTING NETWORK Independent of the already existing hardware the corporate security manager can integrate the SMS into a network as easily as any other workstation. The installation location is independent of the other security components, e.g., CryptoGuard VPN devices. Figure 5 shows a network after integration of the SMS and several CryptoGuard VPN devices. SMS Client DMZ Client Server Server Server Client Head Quarter Server CompuWall Crypto CryptoGuard VPN 5000 Gigabit Bastion WAN CryptoGuard VPN 5000 Gigabit Internet [intranet - extranet] CryptoGuard VPN 5000 Server Client Server Client Client Cli ent Main Branch Server Branch CryptoGuard VPN 5000 CompuWall Cli ent Crypto Crypto Guard Guard PC VPN Mobile User Client Server Branch Client Client Small Office Home Office Client Client Client Server Server Figure 5 Page 13 of 25
14 The communication between the SMS and the CryptoGuard VPN devices (and also, if installed in the network, the CryptoBastion) is secured by strong authentication and encryption, and is independent of the secure communication between the CryptoGuard VPN devices. Page 14 of 25
15 CONNECTIONS INDEPENDENT OF SECURITY COMPONENTS The definition of the security policy entity for the communication between insecure network components (e.g., workstations, hosts or networks) is independent of the network security components involved (e.g., CryptoGuard VPN devices). The SMS automatically checks the security policy and discovers possible inconsistencies. The corporate security manager only has to define the end points of the communication (e.g., Clients from France and Important DB Server ) and the security policy for the communication between these points (e.g., only allow encrypted HTTP and SQL traffic). The SMS generates from this information the security policy rules for all involved security components (e.g. CryptoGuard VPN devices). Figure 6 shows an example for the definition of such a security policy entity. Figure 6 Page 15 of 25
16 NODES AND NETWORKS AS OBJECTS Consistent with the high-level approach to central security management, one thing that must be done is to define a model of the network components (nodes and networks) within the SMS. The SMS handles these network components as objects with attributes. Later, only these objects will be used to define the security policy (e.g., an encrypted connection between net x and node a). Node objects can as well represent individual devices as entire networks. Using the object mechanism, the corporate security manager can integrate large numbers of nodes into one network object to simplify the security structure. Figure 7 shows a list of network and node objects with definitions and notes. Figure 7 PROTOCOL PROFILES The corporate security manager can define the security policy (involving, e.g., the allowed protocols and a specification of encrypted or plain connections) with Protocol Profiles as shown in Figure 6. Protocol profiles are an additional mechanism to assist in the high-level view approach. With protocol profiles the corporate security manager is able to see more at the application than at the protocol level (e.g., the profile Config Bastion in Figure 8 collects each protocol needed to configure a CryptoBastion). The security policy definition can use these profiles to set up all needed communications between the SMS and a CryptoBastion. Page 16 of 25
17 Figure 8 KEY MANAGEMENT SECURE KEY GENERATOR AND KEY STORAGE AUTOMATIC OR MANUAL KEY DISTRIBUTION SMARTCARD FUNCTIONALITY Key management is highly important within a security system. A strong key management represents a major aspect for each security system. This was kept in mind during the design of the key management for the CryptoGuard VPN system. A PKI (Public Key Infrastructure) represents the whole of all components that are necessary to generate, manage, distribute and revoke digital certificates. Keys for the entire system are generated and stored on the SMS. The pseudo-random number generator used for key generation and the key storage fulfill high security requirements. The primary CryptoGuard VPN device keys (the CryptoGuard VPN master keys), which will be used for the later encrypted communication between the SMS and the CryptoGuard VPN device, are transferred during the first contact between the SMS and the CryptoGuard VPN device. This key transfer is done per smartcard in a very flexible way. For CryptoGuard VPN devices without smartcard functionality the key transfer has to be done in a secure environment, using a serial link between the SMS and the CryptoGuard VPN device. After this step, which is called personalization of the CryptoGuard VPN, the SMS and the CryptoGuard VPN device are able to establish a secure session via the network (e.g., Internet). Page 17 of 25
18 The corporate security manager can manage the distribution of new keys by the SMS during normal daily business automatically or manually. Automatically means that the SMS changes the keys in a CryptoGuard VPN device at a defined date and time independently of any instructions. The corporate security manager only needs to specify the date, time and CryptoGuard VPN devices. Manually means that he has to start the key change for each CryptoGuard VPN device on his own. The newest version of the SMS supports as well smartcard functionality. This means an easy and comfortable way for the user to personalize on the SMS. LOGBOOKS HISTORY FOR LATER ANALYSIS SECURITY ALERTS The SMS supports a management activity logbook and two security device logbooks. Each function activated at the SMS generates a logbook entry at the management activity logbook. The management activity logbook shows which user activated which functionality, and when. It logs the history of the entire security system for the later analysis. The corporate security manager can configure the CryptoGuard VPN devices to send security alerts in real time to the SMS, which receives them, displays a message on the screen, and stores the security alert in the security alert logbook for later analysis. He can also configure the SMS to additionally send an SNMP trap to a defined network management system. Individual security alerts are stored for each CryptoGuard VPN device. The second security device logbook is the security record logbook. Each CryptoGuard VPN device has its own logbook, storing security records defined by the SMS. As the logbook size in the CryptoGuard VPN devices is limited, the corporate security manager should save the security records periodically to external media. This is done by transferring the security records from the CryptoGuard VPN to the SMS. On the SMS, the received security records are stored in the security record logbook. The security records are stored individually for each CryptoGuard VPN device. The corporate security manager can export all logbook entries in standard export format for use with third party analysis tools and is thus able to keep the whole offline analysis as flexible as possible. Page 18 of 25
19 BATCH JOBS PERIODIC READING OF LOGBOOKS PERIODIC BACKUP OF SMS DATABASE AUTOMATIC UPDATE DISTRIBUTION If the corporate security manager has a great work load and e.g. wants to start many activities at a defined date and time, batch jobs are an instrument to distribute the work load, distributing new connection keys to all CryptoGuard VPN devices on Friday at 10:00 PM and activating these keys on Saturday at 1:00 A.M. The corporate security manager can automate such activities using batch jobs. He only has to define them once and they will be carried out at the defined date/time. Additional examples for batch jobs are: - periodic reading of the CryptoGuard VPN logbooks - periodic backups of the SMS database - automatic distribution of software updates. REDUNDANCY INCLUDED REDUNDANCY MECHANISMS Since the SMS itself is the central possibility to manage the CryptoGuard VPN security system it is advisable to have a redundant SMS for large networks requiring high availability. CryptoGuard VPN, CryptoGuard VPN Client and CryptoBastion have redundancy mechanisms with support of third party components independent of that of the SMS. It is possible to integrate two ore more devices in parallel into one system to increase the availability of the network. The route is checked regularly; this allows to recognize if an active CryptoGuard VPN device (called 'Master') failed and if so, to remove it from the system. In that case, a second by then passive CryptoGuard VPN of the redundancy system (called 'Slave') becomes the active one. New feature: Geo-Redundancy to support the configuration of the security system from different SMS locations and to manage the Backup and Restore mechanism from the master to the slave SMS (the replication of the databases will be done by several DBMS mechanisms like Virtual DBA). REMOTE ADMINISTRATION INCLUDED REMOTE FUNCTIONALITY The corporate security manager may have a need for managing the SMS remotely; for this remote management functionality is included. Page 19 of 25
20 Remote management is realized using the standard X-Window system of the SMS operating system by tunneling it in an encrypted Secure Shell (SSH) session to a remote client. Page 20 of 25
21 CONCLUSION In times of more and more severe attacks on computers and computer networks managers should especially keep in mind the damages emerging from these attacks and consequently attach great importance to network security. In order to protect their confidential data many organizations are seeking for a comprehensive, reliable and easy to handle opportunity. For companies that have a great need for a security management enabling a centralized and comfortable administration the Security Management Station solution provided by Compumatica secure networks turns out to be an ideal way to manage their security concerns. Its uncomplicated integration as well as its numerous functionalities offer a perfect base for the setup of a stable and reliable corporate safety policy. For information concerning the further parts of the CryptoGuard VPN security system and the system in general we refer to our other White Papers. Page 21 of 25
22 TECHNICAL DATA SECURITY MANAGEMENT STATION 5.40.XX Operating Systems Database Platforms SLES 11 SP1 or higher (32 bit) Linux: Sybase Database Version EBF ESD#4 Linux: Intel hardware (64 bit) CPU: Quad Core ABBREVIATIONS CG VPN IETF IKE IPsec KGL KGLAN LAN SLES SMS VPN CryptoGuard VPN: product to secure network communication. Internet Engineering Task Force: Organization, which defines the standards, used in the Internet. Internet Key Exchange: A protocol defining how to exchange keys for IPsec communications. Defined in RFC IP security: A standard which defines various security services for traffic at the IP layer. Defined in RFC same as KGLAN KryptoGuard LAN: former name of the CryptoGuard VPN product. Local Area Network: Any physical network technology that spans short distances (up to a few thousand meters). SuSE Linux Enterprise Server Security Management Station: former name of the CryptoGuard Security Management CGCM. Virtual Private Network: Synonym for doing network communication over a public network in an encrypted way, so that only participants that share the necessary keys are able to communicate. Page 22 of 25
23 WAN Wide Area Network: Any physical network technology that spans large geometric distance. Page 23 of 25
24 FURTHER INFORMATION SHORT PROFILE Compumatica secure networks based in Germany and the Netherlands is a fully independent private company with main task securing IP traffic of its customers. Compumatica develops, produces and implements high level security solutions for all types of IP networks and all types of customers. Customers can be small organizations with just a few countrywide connections up to international enterprises with world-wide networks. Compumatica staff and products meet high standards of reliability and quality. The products are based on systems that are approved, or even certified, according to the strict regulations of the BSI (in Germany) and the NLNCSA (in the Netherlands). Every single product goes through a quality assurance phase in which it is subject to a long-term test. All Compumatica products are backward compatible for more than ten years. Herewith we guarantee our customers investment protection. Our product range also includes devices from our daughter.vantronix secure systems which contain a unique combination of IPv4-IPv6 gateway, router, firewall, network based anti-spam as well as Load Balancer based on OpenBSD..vantronix is a HP AllianceOne partner. The whole software range is therefore available on HP systems. In the area of mobile communication our range is completed by a comprehensive Secure Mobile Concept that secures voice and SMS and which may be adapted to the individual requirements and needs of the customers. Our customers are well-known top 500 enterprises as well as government agencies and public organizations in different countries which protect their critical data with the aid of Compumatica systems. As world-wide approved producer and system integrator Compumatica secure networks provides complete IT security solutions for networks of each size. The security of your data is our mission Cybersecurity with a. Page 24 of 25
25 CONTACT DATA The Netherlands: Compumatica secure networks BV Oude Udenseweg PD Uden Phone +31 (0) Fax +31 (0) Germany: Compumatica secure networks GmbH Monnetstraße Würselen Phone +49 (0) Fax +49 (0) Page 25 of 25
Security Management Station
Security Management Station Technical whitepaper 2015 Network Encryption English Network security today ranks high on the list of any // Network security Network Security today ranks high on the list s
we secure YOUR network we secure network security English network security
we secure YOUR network English network security network security CryptoGuard VPN family The CryptoGuard VPN 5000 family is a flexible (cost-)effective security system, completely developed by Compumatica.
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved
NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback
NCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Chapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
VPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with Check Point VPN-1 Gateway Rev. 3.0 Copyright 2003-2004 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document describes
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates
Dlink DFL 800/1600 series: Using the built-in MS L2TP/IPSEC VPN client with certificates In this guide we have used Microsoft CA (Certification Authority) to generate client and gateway certificates. Certification
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
ISG50 Application Note Version 1.0 June, 2011
ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,
RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE
STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE V IRTUAL PRIVATE NETWORKS C ONTENTS Introduction to the Scenarios... 3 Scenario 1: Gateway-to-Gateway With Pre-Shared Secrets... 3 Configuring
D.N.A. 5.6 MANAGEMENT APPLICATIONS
D.N.A. 5.6 MANAGEMENT APPLICATIONS The D.N.A. suite of is composed of management specific and end user. The management allow administrators to maintain, monitor, and adjust configurations and data to maximize
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Print Audit Facilities Manager Technical Overview
Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
LCOS 9.10 Feature Notes
Feature Notes Page 1 www.lancom.de The LANCOM firmware LCOS and the respective managements tools (LCMS) regularly provide new functionalities for current LANCOM routers, access points, and gateways free
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
This section provides a summary of using network location profiles to identify network connection types. Details include:
Module 7 Network Access and Security In Module 7 students will learn several strategies for controlling network access and enhancing network security. These will include: controlling network location profiles,
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Pre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
ActiveXperts Network Monitor. White Paper
ActiveXperts Network Monitor Centralized monitoring of Windows, Novell, Linux and Unix servers White Paper 2008, ActiveXperts Software B.V. This document is written by ActiveXperts Software B.V. and represents
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
EncrypTight User Guide
ET0010A ET0100A ET1000A EncrypTight User Guide EncrypTight acts as a transparent overlay that integrates easily into any existing BLACK network BOX architecture, providing encryption rules and keys to
Maintaining Non-Stop Services with Multi Layer Monitoring
Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems [email protected] www.emindsys.com The approach Non-stop applications can t leave on their
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network
DS SERIES SOLUTIONS ALL AT ONCE
DS SERIES SOLUTIONS ALL AT ONCE All At Once. Your IT infrastructure is expanding. Your servers are cities apart. Data comes in and goes out at light speed. And you ve got to keep it all together. Life
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers
Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
Implementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...
Page 1 of 10 Question/Topic UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) in SonicOS Enhanced Answer/Article Article Applies To: SonicWALL Security
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented
NCP Secure Client Juniper Edition Service Release: 9.30 Build 186 Date: July 2012 1. New Features and Enhancements The following describes the new feature introduced in this release: Configurable Service
DJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
The All-in-One Support Solution. Easy & Secure. Secure Advisor
The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
Configuring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router This chapter describes how to configure TheGreenBow VPN Client with a TP-LINK router. This chapter includes the following sections: Example
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
Introduction of Quidway SecPath 1000 Security Gateway
Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
axsguard Gatekeeper IPsec XAUTH How To v1.6
axsguard Gatekeeper IPsec XAUTH How To v1.6 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
Introduction to Network Management
Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
Corente Cloud Services Exchange
Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based software-defined networking (SDN) solution that enables distributed enterprises to deliver trusted
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Architecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
Quidway SVN3000 Security Access Gateway
Quidway SVN3000 Security Access Gateway SSL/IPSec VPN Access Gateway HUAWEI TECHNOLOGIES CO., LTD. Product Overview With the rapid development and popularization of the Internet, informatization of enterprise
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Figure 4-5: VPN Consortium Scenario
1. New Features and Enhancements in Service Release 9.31 Build 104
NCP Secure Client Juniper Edition Service Release: 9.31 Build 104 Date: January 2013 1. New Features and Enhancements in Service Release 9.31 Build 104 Support of NCP Secure Client software on MS Windows
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets
VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets The following is a typical gateway-to-gateway VPN that uses a preshared secret for authentication. Figure 4-5: VPN Consortium Scenario
Edgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
Managed Security Services (MSS) based on Provisioned Security Services (PSS)
Managed Security Services (MSS) based on Provisioned Security Services (PSS) Eyal Adar und Dan Sarel IP VALUE Abstract The paper discusses the reality of Managed Security Services today and their drawbacks.
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Windows in a Browser Secure Remote Access with HOB RD VPN
Windows in a Browser Secure Remote Access with HOB RD VPN by Patrick Oliver Graf HOB March 2006/ Rev. 3 February 2010 1 of 5 Introduction This white paper describes the possibilities of Secure Remote Access
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
