Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network

Size: px
Start display at page:

Download "Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network"

Transcription

1 Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network INTRODUCTION AT&T s legacy and expertise lies in the creation and maintenance of secure, reliable networks that are always on and available when you need them. This goal is as valid today for our Internet Protocol (IP) and MPLS (Multi Protocol Label Switching) networks as it was for traditional circuit switching network. And now that IP /MPLS networks are embedded in the critical processing of our business and government customers applications, we are more committed than ever to ensuring superior levels of carrier grade security for our customers especially those using IP. More specifically, in support of AT&T s Global IP/MPLS network, AT&T s Chief Security Office has developed a set of seven basic security protection methods or pillars, as we refer to them. These firm pillars maintain a constant security focus in all of our design, deployment, and operational processes around our IP/MPLS core. This brief article explains these security building blocks and principles that are inherent in our IP/MPLS backbone network. In particular, we provide an introduction to our security methodology rooted in what we call the Seven Pillars of Carrier Grade Security in the AT&T IP/MPLS Network : Separation, Automation, Monitoring, Control, Testing, Response, and Innovation. Pillar 1: Separation Customer traffic is separated using MPLS and the concept of Virtual Private Networks AT&T s MPLS based VPN services AT&T s Virtual Private Network (AVPN) service and its legacy MPLS VPN products, IP Enabled Frame Relay Services, Enhanced VPN Service (evpn), and MPLS Private Network Transport (PNT) are all designed to take advantage of the inherent separation strength of MPLS and Multi Protocol BGP (MP BGP)

2 AT&T's standards based implementation assures that data packets and customer specific routing information cannot leak" out of, or into, one customer s VPN to another. Or, from a customer's VPN to AT&T control traffic on our backbone. What this means is that customers need not be concerned with unauthorized disclosure or modification of their sensitive VPN traffic (or routing information) by other IP/MPLS network users. Several MPLS standards have been specifically published to prevent any type of unauthorized or illegitimate cross VPN sharing of customer routing or data traffic. Independent tests performed by many companies including Cisco, Miercom and AT&T repeatedly have confirmed this important security requirement. 1 Sadly, many backbone network providers suggest that by simply not allowing Internet peering links to directly attach to their private IP networks, they can mix together customer IP traffic using different less secure methods. This naive approach conveniently ignores the fact that the major source of many Intranet security violations to date has come not from direct attacks on a carrier's backbone infrastructure, but rather from customer networks and/or network management systems that attach via "backdoor" connections to the Internet. Eight four percent of enterprises and government agencies reported some type of security breaches in the last year (2009), according to a new survey by Computer Associates International. The survey also found that security breaches have increased 17 percent in the last three years, according to the survey released by the Islandia, N.Y., IT management software company on July 5. Customers of AT&T s MPLS based VPN services can expect that their own VPN network will have the following basic security characteristics derived directly from the strengths of MPLS and MPLS VPN related standards (e.g., RFC 4364): - Containment: Traffic (and routing information) sent between customer edge (CE) routers on the same VPN will always stays within that specific VPN no spillover or "leakage" can occur. - Isolation: No customer s VPN can in any way materially affect or influence the content or privacy of another customer s VPN Availability: Aside from the basic security related attributes of MPLS and MPLS VPNs, AT&T carefully engineers shared resources to meet the highest levels of availability and mitigates potential denial of service activities through additional methods such as access control lists, route filters, turning off unnecessary services, and other infrastructure hardening techniques. 1 Note: MPLS security testing referenced here was performed in the early 2000s; AT&T and Cisco testing are proprietary. The Miercom paper is found here: 2

3 Simplicity: MPLS networks allow for simplified provisioning in both the customer and carrier domains (and hence can help to avoids security related configuration mistakes). First, MPLS VPNs are much simpler for customers to configure than legacy Layer 1 (e.g., private line), Layer 2 (e.g., Frame Relay or ATM) point to point solutions, or Layer 3 (e.g., IPSec VPNs). Second, MPLS VPNs allow for much more scalable service provider architectures, unlike some other VPN solutions (e.g., L2TP) based on ACLs and separating customer address space. A service provider network using access control lists or separate IP spaces as the primary method to create VPN separation has a very difficult task to manage. In this scenario, every new site or route that is added can potentially require a change on every other router in the network to ensure security. This is not a scalable solution and can lead to errors in configuration and potential security breaches. In summary, the most scalable MPLS based architectures allow the service provider to more cost effectively provide reliable, high performing services to a large number of enterprise customers without disrupting their existing customer base as organic growth occurs on the provider s network. The diagram below illustrates the AT&T Global MPLS Network Architecture.

4 This architecture incorporates several key components to ensure the security and reliability of the VPN customers. Security/Privacy In order to provide the highest level of security, separate "edge" routers are used in the AT&T network for VPN customers versus public Internet customers. The VPN edge routers are physically separate devices that only support private MPLS VPN customer connections. AT&T's MPLS VPN services are based on RFC 4364 (formerly RFC 2547) and provides privacy equivalent to Frame Relay or ATM Service according to most industry experts. AT&T's standards based MPLS network architecture provides: VPN route uniqueness and segregation using MP BGP attributes such as: Route Targets (RTs) which are used to control route distribution of customer specific VPN routes into their own dedicated route table or VRF. Customers are unaware of the RDs and RTs and VRFs associated with their VPN Route Distinguishers (RDs) which are appended to a customer's routes to help identify them as belonging to a specific VPN. Virtual Routing & Forwarding Tables (VRF) Each customer's VPN routes are stored in a separate and unique routing table. VPN membership and all network configurations are controlled by automated AT&T provisioning systems. Customer specific interfaces on each PE are automatically assigned to that particular customer s VPN. Several consistency checks are made in systems to ensure that any new connection or VPN is legitimate for that customer.

5 Reliability While the edges for VPN and Internet services are physically separate, the AT&T IP/MPLS core is shared across these services. To ensure security and reliability several architectural design steps have been taken: 1.Route Free Core: The core network only provides Label Transport over Label Switched Paths. The routers have no knowledge of any Internet or customer specific VPN routes and IP addresses. 2. Control Plane: No backbone routers are visible to the Internet or customer specific VPN and none can be reached from any external endpoint. 3. Data Plane: VPN and Internet traffic is carried across separate E LSPs so that different traffic or service types can be differentiated in the core. For example, if a large internet DOS type of event were to occur, VPN capacity is protected to ensure no adverse impact to a customer's private VPN traffic. Pillar 2: Automation Automated perimeter security tools protect AT&T s MPLS core Over the past several decades, AT&T has invented, patented, and perfected many automated tools and systems to manage and protect its telecommunications infrastructure and networks. AT&T has continued to invest in automated methods for provisioning and maintaining its global IP/MPLS network and services. This included the development of several patented IP and MPLS troubleshooting tools, and further automation surrounding detection of security anomalies. Seamless integration and automation has been one of our key strengths. AT&T also knows, however, that in the creation of any new network infrastructure or service, that some manual techniques must precede such automation. That is, before such critical tasks such as automated provisioning or change management can be integrated into a carrier backbone environment, manual processes must first be documented, tested and perfected. Then, and only then are the systems and tools developed to carry forward these proven methods and best practices. One of AT&T s key advantages in the inevitable convergence of global network telecommunications traffic to MPLS is that we have made significant progress in moving through the experience curve toward the use of automation. Stated more simply: We are way ahead of our competitors in the charge toward flawless use of automated management techniques.

6 AT&T has had many years of experience with MPLS, and was an early adopter, announcing its first MPLS based service in Since then, AT&T has continually rolled out new and enhanced MPLS based IP VPN services in support of enterprise customers. Today, AT&T is regarded by leading telecommunications analysts as having one of the most comprehensive VPN portfolios in the industry, including MPLS, IPSec and SSL based solutions. AT&T has put in place a number of specific security measures, supported by automation, to support its global IP/MPLS network infrastructure. These include: Filtering: AT&T uses standardized engineering rules and automated provisioning systems to manage infrastructure specific access control lists (ACLs) related to access to the network as well as control traffic across the network. Least Privilege: Infrastructure routers, and PE interfaces, are hardened by turningoff, or severely restricting, unnecessary protocols and ports. BGP Authentication: Border Gateway Protocol (BGP) authentication can be implemented on upon customer request for many services CE PE ebgp sessions. BGP authentication ensures that the BGP routes passed between two BGP speakers (routers running the BGP protocol) are authorized and have not been tampered with in any way Limits: per session and per VPN routing prefix limits, dampening, and other mechanisms are used on many services to limit either the rate, or total number of routing update transactions that can be processed by an AT&T edge router. Authentication: TACACS+, tokens, SSH and other mechanisms are used to control access for authorized AT&T employees to access infrastructure devices. Pillar 3: Monitoring IP traffic monitoring provides early warning of Internet worms, botnets, and denial-of-service. One critical component in the management of large scale network traffic is the generation and analysis of traffic flow data to detect trends and anomalies. Such exception based processing has become the basis for many new forms of intrusion detection. AT&T has been using this technique for a number of years to identify patterns of normal network behavior and to measure differences from observed patterns. AT&T has the most extensive commercially available infrastructure in the industry for detection of traffic anomalies that are indicative of denial of service attacks. As well, AT&T uses proprietary

7 technology to detect patterns that indicate worms, botnet command & control, and other anomalies. Since the late 1990 s, AT&T has used these technologies to identify clear network patterns of anomalous behavior leading up to the Slammer, Blaster, Nachi, and SoBig worms and viruses. This was accomplished through a proactive, 24/7 analysis of network flow data (data content is not necessary for such profile based security). In some cases, clearly recognizable spikes occurred days before large events. AT&T has continued to develop this technology that has helped detect alert customers promptly of changes in Conficker/Downadup worm behavior in late 2008 and into Detection of malicious botnet command and control as the botnets recruit new zombies allows AT&T to take a more preemptive approach to network security and attack prevention. This monitoring provides unique protection benefits for the MPLS network in two ways. First, it allows our security teams to take steps toward the appropriate filtering often well in advance of other providers. And second, by tasking the monitoring system to detect any probes aimed at the MPLS core address space, we ve invented a novel means for dramatically reducing risk in our core. Customers of AT&T s MPLS based services thus can enjoy the following benefits of our monitoring systems: Anomaly Detection: AT&T proactively monitors traffic for anomalies that provide evidence of worm and virus trends in real time. External Access: AT&T also alarms and monitors infrastructure elements for resource consumption and attacks. Analysis: The world class statisticians from AT&T Laboratories Research continue to make great strides in algorithms for security anomaly detection. By virtue of the MPLS network, AT&T has developed a suite of optional security services that complement and can be used in conjunction with MPLS based VPN services. Private Intranet Protect service is available to provide flow data analysis of an enterprise s own VPN environment. The service does not require any additional equipment to be deployed at your sites, which keeps costs down and reliability high. AT&T can provision systems in the core network to gather flow record data (no content), pass the flow data to analysis systems, and provide alerting and analysis through a web interface that is specific to an enterprise s network traffic. Network based Firewall is another service that can be used to safely access the Internet directly from an enterprise s MPLS VPN with packet inspection and IDS with options for, user authentication, IPS, web content filtering, scanning, multiple DMZs hosting, and DDoS Defense services. All of these services are facilitated through MPLS capabilities. Security Network and Operations Center (S/NOC, SOC) functions as well as premise based solutions can also be provided to provide a full

8 complement of security enforcement and monitoring capabilities throughout an enterprise s network. Advanced security analysis and threat management is available through AT&T Security Event & Threat Analysis (SETA) providing prioritized alerting based on correlated analysis of logs and alerting from multiple network devices, device types, and applications. Pillar 4: Control AT&T enforces strict operational security controls in its MPLS core. 24/7 network operations strike at the heart of the basic value proposition AT&T offers its customers. We ve been in the business for over a century and while technologies and customer needs have changed dramatically through these years, one thing has remained constant in our service provision: Operational Excellence. Our original experiences moving massive volumes of customer data over our first high speed packet networks for Frame Relay and Asynchronous Transfer Mode (ATM) networks exemplifies this operations focus. When these technologies became popular in the early nineties, one common criticism was that the reliability associated with these networks could never approach the excellence achieved in circuit switched environments. The good news is that after our initial period of growth (and yes there were occasional operational errors during this period), we managed to achieve levels of reliability and availability in these networks that exceed that of our circuit switched networks. Our MPLS core is no different. When we chose to build our first IP network and then enable it with MPLS technology, we applied the same relentless focus on reliability and resiliency to that network, both in the U.S. and globally. Today our IP/MPLS network consistently achieves higher reliability than traditional TDM voice, which used to be considered the gold standard for reliability. We have achieved this high reliability in a manner that is simpler to provision, easier to operate, and more difficult to attack than any network technology we ve ever operated. So the basic elements of our operational excellence in support of MPLS security are as follows: Administrative Separation All MPLS network management traffic is isolated on a separate MPLS VPN, using loopback addresses provisioned on a separate MPLS VPN, from protected address space which is not advertised; all traffic to this protected address space is blocked at the edges of the network and is not visible from the rest of the network.

9 Processes: AT&T s operations follow mature Methods and Procedures (M&Ps) that are derived from decades of best practices in operating carrier networks. Root Cause Analysis: All incidents are subject to comprehensive Root Cause Analysis steps a process used to ensure process improvements through any operational policy violations. Pillar 5: Testing AT&T uses testing, audits, and reviews to ensure security compliance. Our Information Security team employs some of the best ethical hackers on the planet. These engineers are tasked with the constant chore of probing, testing, and trying to find weaknesses in our MPLS network. Occasionally they find an area in which improvements are necessary and steps are taken immediately to address their findings. In addition, our Information Security team works with both internal and external auditors to ensure that all operations and infrastructure teams follow the industry s best security requirements. This is an on going task that sweeps through all aspects of our infrastructure including the MPLS network. The mature AT&T Security Policy Requirements (ASPR) 3 stands as the basic guide for all these activities. Our processes also include the use of expert reviews and organizational approvals as socalled Security Gates in almost everything we do. Our design and development efforts, for instance, follow a corporate wide standard and documented methodology. The ASPR process mandates an expert security review such that newly developed processes will not even pass the first conceptualization step without approval from designated teams of security experts. The result of this discipline is the following for our MPLS customers: - Testing: AT&T conducts ongoing intrusion detection, audits and penetration testing against server complexes for network management, customer care and service support. Customer MPLS VPN s are created and configured by an automated provisioning system, and any changes or discrepancies in router configuration, from that in the backend provisioning database, will be detected by regular discords detection/reports. - Auditing: On going independent audits by independent, internal security teams are used to confirm compliance with the AT&T Security Policy Requirements. - Reviews: All processes have embedded controls that require expert security reviews. 3 AT&T Security Policy and Requirements establish the security controls necessary to protect computing and networking environments across all AT&T working environments.

10 Pillar 6: Response AT&T deploys proactive response teams trained in the details of MPLS. Security incident response at AT&T is performed using a tiered operations structure. AT&T utilizes a mature, global three tiered 24/7 security operations team that is centrally coordinated in the Global Network Operations Center in Bedminster, NJ. Expert Tier 3 security analysts support this structure as incidents are escalated using well defined security methods and procedures. At Tier 1, trained operations managers use mature monitoring tools to proactively identify conditions that might warrant response. A Tier 2 management interface oversees this activity and is used to tie together conditions that might be brewing in disparate locations. When the appropriate condition has been identified perhaps a spike or anomaly in traffic Tier 3 activity is initiated. From a security perspective, Tier 3 analysts are among the most senior and trained security engineers in the company. They make the real time determination as to whether our AT&T Computer Security Incident Response Team (CSIRT) must be initiated. The AT&T CSIRT is a mature 24/7 operational structures and set of processes in which experts from the AT&T Network Security team coordinate real time response activities with operations staff from the various parts of AT&T's business. The ACSIRT centrally manages and coordinates all response activities related to proactive mediation based on early indicators, as well as mitigation of any detected security problems We re proud that the current state of the practice for our ACSIRT involves proactive response to conditions often long before customer impacts can ever become visible. In fact, for several years AT&T has extended this proactive response to our customers through a service called AT&T Internet Protect. Thus, customers who subscribe to this service can rely on incident response protection from AT&T as follows: - Tiered Response: Incidents are dealt with via a mature tiered response infrastructure that includes senior security and operations experts. - Proactive Indicators: The AT&T Computer Security Incident Response Team acts routinely in a proactive manner on indicators that typically precede any customer visible problems. - Innovative Customer Notification Service: AT&T has extended this capability to customers through an innovative notification service that provides real time indicators of anomalous behavior or detected security incidents to clients on a 24/7 basis. - WAN Analysis: Private Intranet Protect (PiP) option allows, with permission, AT&T

11 the ability to perform analysis across customer MPLS VPNs and notify administrators when potentially harmful traffic patterns are detected. Pillar 7: Innovation AT&T funds the most extensive MPLS security research in the world. AT&T s research laboratory has evolved over the past two decades from a Bell Laboratories that was involved in a broad range of technologies to a more focused AT&T Laboratories. One of the most important issues of concern for this organization continues to be network operations. In fact, AT&T s laboratory is the only organization of its kind rooted in the excellence and tradition of Bell Laboratories, but guided by the day to day needs of our operations teams. And security is one of our research laboratory s key focus areas. MPLS, in particular, provides a landscape on which our researchers have tried to find new techniques for protecting our customer traffic and systems. Creative means for analyzing anomalies, algorithms for integrating control and data plane information, and new means for MPLS management and monitoring are among the many areas in which our researchers are actively working, publishing, and sharing in the community. As such, this research laboratory complements our development, engineering, and operations teams in a way that remains unique in our industry. No other service provider on the globe maintains the type of research commitment to networking and more specifically to MPLS than AT&T. This serves to underscore our commitment to excellence in this area and will ensure that the best available innovations are always embedded into the MPLS infrastructure we use to support customers. Conclusion Our Seven Pillars of Carrier Grade Security for MPLS result in a set of conclusions that we view as critical to our value proposition for our customers: - Security Equivalence: We are proud to report that AT&T s MPLS security is currently equivalent to the type of security provided on other technologies such as layer 2 services. This does not mean things are perfect but it does point to great advances made in the past few years. - Continued Improvement: AT&T has always dedicated itself to programs of continued improvements to security and will continue coming down the experience curve for

12 MPLS just as we did for Circuit Switched, Frame Relay, ATM, and Managed IP Networks. Appendix A includes some common security/reliability questions and the mitigation processes.

13 APPENDIX A Common Reliability Security Concerns Concern Privacy/Intrusion: Can someone break into my VPN? Denial of Service: Can an Internet Traffic Storm, such as a DDOS attack affect my network or performance? Intrusion/Reliability: Can bogus routes bring down an edge? Core Protection: Can the backbone network be compromised? Mitigation 1. MPLS VPN endpoints are provisioned with same privacy level as Frame Relay/ATM. 2. VPN Edges are separate from Internet Edges 3.No Customer routes are visible on the backbone, only labels on the backbone 4.Rigorous Security Procedures in place for Provisioning and Maintenance VPNs and router configurations are auto provisioned avoiding human touch error. Operational Support Systems Firewalled All access/changes are logged Automated Discord Checks Established incident response procedures Documented Deploying active intrusion detection 1. VPN Edges are separate from Internet Edges 2. Backbone is segmented so Internet and VPN traffic are in separate E LSPs. An Internet storm only impacts the Internet. 3. DDOS detection and pro active filtering even on Internet 1.VPN Edges are separate from Internet Edges 2.Each VPN is route limited (<20K routes) 3.Route filtering is done on Internet endpoints and peering points to filter out bogus routes 1. Routing elements in the core are not visible or reachable. Backbone is Internet and VPN route free. 2. ACLs used at edges to protect core elements 3. Route filtering (Anti spoofing) applied on all inbound access points 4. Limited management access to specific ports (Telnet, SNMP), all others turned off. Require encrypted authentication and auditing. 5. Management access to equipment uses a separate network. 6. Internal servers are firewall protected.

14 Core Protection: Can a POP be compromised? Monitoring: Is Security Monitored? Increasing Privacy: Can I increase my security/privacy level? 1.Guarded and hardened AT&T facilities 2.Access requires authentication through advanced security systems 3. All hardware is redundant 4. All POPs equipped with dual commercial power supplies with generator and battery backup 5. Protected by AT&T s Network Disaster Recovery Program 1.Elements monitored 7x24x365 by multiple NOCs 2.On site vendor support 3.All access monitored and logged 4.Customer alerts and notification 1. Customers can optionally add encryption services (e.g., IPSEC based) to compliment the MPLS VPN to further increase privacy out to the edge. 2. Enhanced Security Services offered: Firewall Services (Network and CPE based) Intrusion Detection Network Scanning services Private Intranet Protect Authentication and Directory Services Security Event & Threat Analysis Professional Services

NETWORK TO NETWORK INTERFACE PLAN

NETWORK TO NETWORK INTERFACE PLAN AT&T will provide interconnect points at both the Network Security Operations Center (NSOC) and the Sam Houston Building (SHB), the prescribed DIR locations via AT&T s VPN (AVPN) service. The standards-based

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Internet Content Provider Safeguards Customer Networks and Services

Internet Content Provider Safeguards Customer Networks and Services Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Report of Independent Auditors

Report of Independent Auditors Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

PART D NETWORK SERVICES

PART D NETWORK SERVICES CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Building Trusted VPNs with Multi-VRF

Building Trusted VPNs with Multi-VRF Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

How To Pass A Credit Course At Florida State College At Jacksonville

How To Pass A Credit Course At Florida State College At Jacksonville Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

Campus LAN at NKN Member Institutions

Campus LAN at NKN Member Institutions Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and

More information

The Cisco ASA 5500 as a Superior Firewall Solution

The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls

More information

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta. Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Security of the MPLS Architecture

Security of the MPLS Architecture WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

DDoS Overview and Incident Response Guide. July 2014

DDoS Overview and Incident Response Guide. July 2014 DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

At dincloud, Cloud Security is Job #1

At dincloud, Cloud Security is Job #1 At dincloud, Cloud Security is Job #1 A set of surveys by the international IT services company, the BT Group revealed a major dilemma facing the IT community concerning cloud and cloud deployments. 79

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Sprint Global MPLS VPN IP Whitepaper

Sprint Global MPLS VPN IP Whitepaper Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

Cisco IOS Advanced Firewall

Cisco IOS Advanced Firewall Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security

More information

Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors

Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com. Report of Independent Auditors Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 123 456 7890 Fax: +1 123 456 7890 ey.com To the Management of NTT America, Inc.: Report of Independent Auditors We have

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Unifying the Distributed Enterprise with MPLS Mesh

Unifying the Distributed Enterprise with MPLS Mesh Unifying the Distributed Enterprise with MPLS Mesh Technical Whitepaper June 2011 Copyright 2011 AireSpring Introduction Today s modern enterprise employs IT technologies that deliver higher value, resiliency,

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP belka@att.net Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Network Security Policy: Best Practices White Paper

Network Security Policy: Best Practices White Paper Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security

More information

HEC Security & Compliance

HEC Security & Compliance HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information

More information

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013 CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

Security Toolsets for ISP Defense

Security Toolsets for ISP Defense Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

SECURE DATA CENTER DESIGN. Piotr Wojciechowski (CCIE #25543)

SECURE DATA CENTER DESIGN. Piotr Wojciechowski (CCIE #25543) SECURE DATA CENTER DESIGN Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE #25543

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

8. Firewall Design & Implementation

8. Firewall Design & Implementation DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

MPLS Security Considerations

MPLS Security Considerations MPLS Security Considerations Monique J. Morrow, Cisco Systems mmorrow@cisco.com November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Empowering the Enterprise Through Unified Communications & Managed Services Solutions

Empowering the Enterprise Through Unified Communications & Managed Services Solutions Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can

More information