The role of ISP - VDC in promoting a culture of cybersecurity
|
|
- Meghan Phillips
- 8 years ago
- Views:
Transcription
1 The role of ISP - VDC in promoting a culture of cybersecurity Presented by: Mr. Nguyen Chi Cong Information Security Department - VDC
2 Contents VDC Company Profile VDC and Information Security The role of VDC in promoting a culture of cybersecurity
3 VDC Company Profile
4 Introduction Vietnam Datacommunication Company A member of VNPT Group Largest Internet Exchange Provider (IXP) SI and application solution provider 50%+ Internet market share Unique service in 64/64 provinces Best Internet Services Provider since 2001 (award by PC World Vietnam Magazine) Partner with almost famous national & international corporations
5 A leading company 59,3% market share of Internet services 400K ADSL subscribers (50%+ market share) 450K Dial-up subscribers (50% market share) 3M VNN newsletter subscribers 16K icafe nationalwide under VDC licensing 90% market share of data communication 87.2% international Internet bandwidth 5Gbps International links Source: Business Department 5/2007
6 VDC positioning Ministry of Post and Telematics (MPT) Facility based operators VNPT group Viettel (Army) Saigon Postel (joint-stock) VP Telecom Hanoi Telecom Co. (under Power Co.) (under HANEL) Mobile operators MobiFone GSM 2.5G VinaPhone GSM 2.5G Viettel Mobile GSM 2.5G Sphone CDMA X Hanoi Telecom Co. CDMA 3G Internet Exchange Providers VDC FPT Communications Viettel Internet SaigonNet SPT Hanoi Telecom Co. Online Service, content Providers (About 12) VDC FPT Communications SaigonNet SPT NetNam
7 Where we are? VDC1- Hanoi VDC3 - Da Nang The largest Internet Exchange Provider VDC2 - Ho Chi Minh
8 Facts & figures 10 Mbps Taiwan International Gateway : 5 Gbps Domestic backbone : 3x 2,5 Gbps Hà Nội 2,5Gbps Đà Nẵng 665 Mbps 620 Mbps 8 Mbps 400 Mbps 1240 Mbps Japan China Malaysia USA Singapore Hong kong 620 Mbps TP HCM 155 Mps Korea
9 International links NTTCom Chunghwa Telecom Dacom KORNET ChinaNet Malaysia Telecom Intelsat PCCW FUSION SingTel KDDI T-systems SPT FPT VDC Vietel ETC STM4 STM1 xds3 E1 and below
10 VNN Network 64 POPs in Vietnam with dedicated and dial in access, almost with broadband Internet access
11 VDC Service provision App. Customer focused Managed IT Game, Video, Music, Finance, B2C, B2B, G2B , WWW, DNS, Netnews, FTP, Colocation, Hosting, Master Content Data voice VoIP Netfax Billing, Accounting, CRM, CSS, Payment, Post Solution, Security Managed network Frame Relay, VNN/Internet, VPN/VNN Network based Components Services IT & Digital content
12 VDC Service provision VNN/Internet Service Direct VNN/Internet Service Dial-up Access VNN/Internet Broadband Internet Service Service VPN/VNN Service VoIP 1717 Fone VNN Web Services Web Hosting Services Telehosting, Telehousing and IDC Service Online Advertisement Web Server ID E-learning Services Datacommunication Services Data Transfer Services VietPac Frame Relay Service
13 VDC Service provision E-Commerce VDC Super Market E-shop Service Mail Offline Mail Plus Web Mail IT Services Consultant for solution Solution Design Frame Relay, VNN/Internet, VPN/VNN Software Development Integration and Deployment Training and Support Security Services
14 Focused business Network services Basic services Security Digital content IDC (Internet Data Center) E- commerce IT & Integrated services Frame Relay, VNN/Internet, VPN/VNN WWW DNS Netnews FTP For ISP For Subcribers For Customers FOCUSED! Colocation Hosting Game Video Music Fortunetelling Finance B2C B2B G2B Billing Accounting CRM CSS Payment
15 A winning team Labor Sk il l st r uct ur e Percentage employees 80% university degree 3% Post-Graduated Young and skillful staffs with Microsoft, Oracle, Cisco, Nortel certificates 80.00% 70.00% 60.00% 50.00% 40.00% 30.00% 20.00% 10.00% 0.00% Level of education Post Graduated University degree Colleage Degree Intermediate level Vocational training Secondary level
16 VDC Partners TRANSIT Partner CUSTOMERS SOLUTION Partner
17 VDC and Information Security
18 Challenges Protection against attacks Secret Information Customer Information Accounts, Bill Business & Technical secret Keeping trust information Bill, network configuration Others business data Availability of system VDC always has to ensure
19 Damages Direct losses to economy Bill lost, Bill value changed Services Interrupted Indirect losses to economy Lose prestige Brand name
20 Risks VDC is attractive target Bigest ISP in Viet Nam Possibility of making benefit Cause of scandal Issues
21 Attackers Professional crime Seeking for economical benefit Other benefit Non-professional crime Almost is pupils, students, Curiousness, discovery Self-assertion Immediate benefit
22 Protection Methods Management methods Bulding up security staff In cooperation with appropriate authorities Policies, rules, processes Prevent from stealing 1260 account Technical methods Design Secure System Authentication Access control Multi-layer protection (Physical Access, Network Protect, App Protect, ) Supporting tools (Firewall, IPS, Web Filtering, ) Backup Carrying out by experts Monitoring, supervising and maintaining frequently (Firewall s warning, IPS, Logfile, network monitoring devices, other unexpected problems)
23 Protection Methods VDC s Firewalls Using multi-layer firewalls for protecting VNN network layers Firewall technologies: Cisco PIX Firewall for Internet gateways Cisco Firewall Service Modules on Catalyst 6500 for Data Centers Checkpoint Firewall for backend segments
24 Integrated Security Strategy: Protecting VDC Networks BUILD SECURE Networks with security fully integrated throughout the infrastructure cloud to strengthen the SP s ability to deliver all network services efficiently and safely DataProtection Clean Pipes NetFlow Filtering of packets and routes Rate limiting and other QoS enforcement techniques Classification and reclassification of traffic Redirection of traffic Traffic transit policies Intrusion detection and protection Analysis, profiling and monitoring of traffic Secure Connectivity Encryption Authentication System Protection Image and configuration archiving Selective management and configuration views Stack protection Thresholding Image verification Password access Control plane policing CPU/Memory Thresholding Routing Protocol validation Trust & Identity Address, source and route validation Secure address allocation Reporting & Remediation
25 Integrated Security Strategy: Protecting VDC Networks BUILD SECURE Networks with security fully integrated throughout the infrastructure cloud to strengthen the SP s ability to deliver all network services efficiently and safely Benefits: Network Reliability Securing network infrastructure for stable network operations Network Efficiency Removing improper traffic from flow to provide greater capacity and availability to legitimate traffic Cost Savings Ability to quickly respond to evolving security threats will minimize network disruption costs Service Assurance Increasing provider s ability to meet SLA requirements Customer Trust Through network reliability and service assurance, service providers can earn customer loyalty and decrease churn
26 VDC Infrastructure Security framework Endpt / CPE CPE(s) Broadband, Wireless (3G, ), Ethernet, FTTH, Leased Line, ATM, Frame- Relay ACCESS/AGGREGATION PE(s) PE L2 Agg. CORE P P P P DATA/SVC Center P P PEERING Peering: Policing Core Security Control Plane ISP / Alt. Carrier CPE: Firewall IDS IPSEC Control Plane Security Forwarding Plane Security Re-DHCP subscriber Diversion Access and aggregation: Basic infrastructure security role Control Plane Security Data Plane Security Firewall IDS IPSEC DHCP subscriber (dial) Diversion (quarantine, clean pipes) SSL Trust and Identity Data/Service Center Service Center: Remediation (quarantine) Intrusion Detection/Prevention Anomaly detection (Netflow+Arbor Peakflow DOS) Scrubbing Firewall Security Monitoring Core: Data Plane Mgmt/Access Plane Control Plane Core Security
27 Three VDC Security Directions Infrastructure Security Up to now, security on edge devices has focused on protection from reconnaissance, access, DDoS, etc. Infrastructure security is a mandatory requirement for service survival Security should be pervasive and consistent throughout every device - integral to every port, every interface, every medium, every switch, every router, every protocol, every service.. Clean Pipes Service Providers introducing infrastructure protection services SPs provide scrubbed traffic to users Managed Security Services (network and customer premise) Increases in service outsourcing (VPNs, firewalling, IDS, content hosting) drive security services into PE Devices MPLS VPNs driving other virtualised services Residential/SMB markets require network-based content and functionality
28 VDC Network Security Features Infrastructure Security Netflow QoS ACLs urpf Lawful Intercept Routing High Availability Authentication Content Networking Clean Pipes (DoS Scrubbing) Network Admission Control Dynamic Attack Mitigation IDS/FW NBAR Security Services Virtual Services VPN Firewalling IDS/ IPS Antivirus Web Filtering MANDATORY OPTIONAL + CUSTOMER CHOICES
29 Customers feedback Various services meeting requirements from subscribers Stable, reliable QoS Subscribers information secured
30 The role of VDC in promoting a culture of cybersecurity
31 Activities ISP s responsibilities Providing best services for customers Supporting 24/7 PR activities Provding Internet for Remote areas Project Providing Internet for Schools Project Vietnamese Talents Contest Many others sponsoring activities Reponsibilities for appropriate authorities Implementing Government s assignment Supporting (internet connection, investigation, ) In cooperation with VNCERT
32 Thank you!
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
More informationIPv6 Migration Challenges for Large Service Providers
IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationTELECOM TARIFF REGULATION IN VIETNAM
MINISTRY OF INFORMATION AND COMMUNICATIONS-MIC TELECOM TARIFF REGULATION IN VIETNAM Department of Telecommunications, MIC 1 Hanoi, 4 th March, 2009 TELECOM TARIFF REGULATION IN VIETNAM Content: Environment,
More informationCisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
More informationDDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
More informationManaged Services The. The Road to Revenue. Pravin Mahajan pmahajan@cisco.com. Session Number Presentation_ID
Managed Services The The Road to Revenue Pravin Mahajan pmahajan@cisco.com Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest
More informationHow Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
More informationInternet Content Provider Safeguards Customer Networks and Services
Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor
More informationHow Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
More informationWAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
More informationImplementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service May 2012 Table of Contents EdgeMarc 250w Router Overview.... 3 EdgeMarc 4550-15 Router Overview... 4 Basic Setup of the 250w, 200AE1 and 4550... 5
More informationColt IP Access Colt Technology Services
IP Access Technology Services 2010 Technology Services Group Limited. All rights reserved. Agenda The business Internet IP Backbone IP Access Features, Options and Add-ons Why choose? 2 Internet growth
More informationCampus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI rsm@nkn.in 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
More informationSEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
More informationEdgewater Routers User Guide
Edgewater Routers User Guide For use with 8x8 Service Version 1.0, March 2011 Table of Contents EdgeMarc 200AE1-10 Router Overview...3 EdgeMarc 4550-15 Router Overview...4 Basic Setup of the 200AE1 and
More informationColt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
More informationMPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
More informationIP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
More informationIP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
More informationDraft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
More informationDDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
More informationHughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
More informationSprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
More informationIINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationData Sheet. V-Net Link 700 C Series Link Load Balancer. V-NetLink:Link Load Balancing Solution from VIAEDGE
Data Sheet V-Net Link 700 C Series Link Load Balancer V-NetLink:Link Load Balancing Solution from VIAEDGE V-NetLink : Link Load Balancer As the use of the Internet to deliver organizations applications
More informationAvaya IP Office. Converged Communications. Contact Centres Unified Communication Services
Avaya IP Office Converged Communications Streamlining and simplifying communications by bringing your voice, data and Internet all together IP Telephony Contact Centres Unified Communication Services Simplicity
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationEnterprise Network Solution
Enterprise Network Solution CONTENT p Enterprise Evolution p DCN Solutions p Case Studies Business Driven More Productivity More profitability Business Driven Challenge Productivity Improve Efficiency
More informationPART D NETWORK SERVICES
CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC
More informationFundamentals of Network Security Graphic Symbols
Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network
More informationHow To Understand The Market For Telecommunications In Vietnam
Vietnam Market for Telecommunications Equipment and Services By U.S. Commercial Service Vietnam June 2014 Overview 2012 2013 2014 2015 (estimated) (estimated) Total Market Size 4,600 5,000 5,750 6,600
More informationManaged Services: Taking Advantage of Managed Services in the High-End Enterprise
Managed Services: Taking Advantage of Managed Services in the High-End Enterprise What You Will Learn This document explores the challenges and solutions for high-end enterprises using managed services.
More informationManaged 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service
Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless
More informationTDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
More informationInternet Router. Enhance your Internet surfing experience with various connection types
Router Enhance your surfing experience with various connection types Bene ted by the growth of technology, combining cutting-edge router with switch technology, PLANET broadband router series (XRT, VRT),
More informationTSC (Total Solution Communications Ltd)
TSC (Total Solution Communications Ltd) 1 Parkway Drive, Mairangi Bay, North Harbour Phone: 09 477 2888 Fax: 09 477 2889 E-Mail: info@tsc.co.nz Web: www.tsc.co.nz A vaya IP Office Converged Communications
More informationPacnet MPLS-Based IP VPN Keeping pace with your growth
Products and Services PRIVATE NETWORKS Pacnet MPLS-Based IP VPN Keeping pace with your growth SCALABLE, FLEXIBLE, EXPANDING WITH YOUR BUSINESS Pacnet s IP VPN offers a unique proposition. With our own
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationRA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com
RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical
More informationSession Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
More informationState of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
More informationIntroduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
More informationAssociate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
More informationVitalPBX. Hosted Voice That Works. For You
VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next
More informationCISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationThis chapter covers the following topics:
This chapter covers the following topics: Components of SAFE Small Network Design Corporate Internet Module Campus Module Branch Versus Headend/Standalone Considerations for Small Networks C H A P T E
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationImplementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.
COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R F l e x i b l e N e t w o r k - B a s e d, E n t e r p r i s e - C l a s s I P
More informationBusiness Planning - A Guide to Greek Public Administration and Grants
Greek National Network SYZEFXIS Aggregation of Demand Information Society S.A. Christos Moschonas Technical Coordinator Project s object The creation of an access and core network for Greek Public Administration,
More informationPREPARED FOR ABC CORPORATION
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
More informationIPv6, Perspective from small to medium ISP
IPv6, Perspective from small to medium ISP April 13 th, 2010 INET Conference, Hong Kong Christian Dwinantyo Overview Some myths and facts about IPv6 Implementation Strategy Before you begin Case study:
More informationX.25 over IP. The Challenge. How it Works. Solution
over IP The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers have made significant investments in equipment and processes that depend
More informationVirtual Private Networks. Juha Heinänen jh@song.fi Song Networks
Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
More informationNetwork Management for Common Topologies How best to use LiveAction for managing WAN and campus networks
Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks April 2014 www.liveaction.com Contents 1. Introduction... 1 2. WAN Networks... 2 3. Using LiveAction
More informationDEFENSE NETWORK FAQS DATA SHEET
DATA SHEET VERISIGN INTERNET DEFENSE NETWORK FAQS WHAT IS A DOS OR DDOS ATTACK? A Denial of Service attack or Distributed Denial of Service attack occurs when a single host (DoS), or multiple hosts (DDoS),
More informationLucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
More informationHow To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
More informationZyXEL offer more than just a product, we offer a solution. The Prestige DSL router family benefits providers and resellers enabling them to offer:
DSL Access Guide DSL Access Routers ZyXEL is a leading manufacturer and supplier of DSL and Voice over IP routers. ZyXEL offer a complete portfolio of routers suited for Telecoms providers, Internet Service
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationRolling Out New SSL VPN Service
Rolling Out New SSL VPN Service Introduction Typically, service providers offer infrastructure services, such as site-to-site connectivity and data center hosting. In addition to this, they are always
More informationJUNOS DDoS SECURE. Advanced DDoS Mitigation Technology
JUNOS DDoS SECURE Advanced DDoS Mitigation Technology Biography Nguyen Tien Duc ntduc@juniper.net, +84 903344505 Consulting Engineer- Viet Nam CISSP # 346725 CISA # 623462 2 Copyright 2013 Juniper Networks,
More informationPacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises
Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationThe term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
More informationIntroduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
More informationGlasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
More informationA Network Design Primer
Network Design Recommendations Recommendations for s to take into account when doing network design to help create a more easily defendable and manageable network K-20 Network Engineering 6/30/15 Network
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationReaping the Full Benefits of a Hybrid Network
Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationAppendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
More informationProfessional Profile Company Experience & Biography SixNet Consulting Group .SixNetConsulting
Professional Profile Company Experience & Biography SixNet Consulting Group SixNet Consulting Group, LLC Michel Thomatis, CCIE #6778 March 12, 2007 Overview 10 Years of Networking & System Experience Cisco
More informationSecuring Networks with Cisco Routers and Switches 1.0 (SECURE)
Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network
More informationArbor s Solution for ISP
Arbor s Solution for ISP Recent Attack Cases DDoS is an Exploding & Evolving Trend More Attack Motivations Geopolitical Burma taken offline by DDOS attack Protests Extortion Visa, PayPal, and MasterCard
More informationCisco ASA 5500 Series Firewall Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series Firewall Edition for the Enterprise Threats to today s networks continue to grow, with attacks coming from both outside and within corporate networks. These threats
More informationDeveloping Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
More informationIP Quality of Service (QoS) Applications and Service Examples. Andrew Coward Technical Director, Asia Pacific Unisphere Networks
IP Quality of Service (QoS) Applications and Service Examples Andrew Coward Technical Director, Asia Pacific Unisphere s Introduction Applications should drive the demands of our IP networks. Delivering
More informationSecurity in Global IP Networks
Security Technology for the Internet Security in Global IP Networks Tatu Ylönen SSH Communications Security Corp What are global IP networks? The Internet The consumer internet Global uncontrolled
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationBroadband Network Architecture
Broadband Network Architecture Jan Martijn Metselaar May 24, 2012 Winitu Consulting Klipperaak 2d 2411 ND Bodegraven The Netherlands slide Broadband Services! Dual play, Triple play, Multi play! But what
More informationydlin@cis.nctu.edu.tw www.cis.nctu.edu.tw/~ydlin May 2001 NCTU Highspeed Networks Lab 1
ydlin@cis.nctu.edu.tw www.cis.nctu.edu.tw/~ydlin May 2001 NCTU Highspeed Networks Lab 1 Outline NCTU Highspeed Networks Lab 2 Network Equipment Providers Access Core Service LAN Adapter HUB Layer 2 switch
More informationRemote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
More informationCisco IOS Advanced Firewall
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
More informationMPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
More informationCCNP: Implementing Secure Converged Wide-area Networks
CCNP: Implementing Secure Converged Wide-area Networks Cisco Networking Academy Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
More informationSecuring data centres: How we are positioned as your ISP provider to prevent online attacks.
Securing data centres: How we are positioned as your ISP provider to prevent online attacks. Executive Summary In today s technologically-demanding world, an organisation that experiences any internet
More informationDeploying IP-based Virtual Private Network Across the Global Corporation
Deploying IP-based Virtual Private Network Across the Global Corporation STANISLAV MILANOVIC Serco Group plc Via Sciadonna 24/26, 00044 Frascati (RM) ITALY ZORAN PETROVIC Faculty of Electrical Engineering
More informationMANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION
AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION Overview Distributed Denial of Service (DDoS) attacks saturate target networks with service requests that consume the capacity
More informationService Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities
Service Provider Solutions Enabling Clean Pipes Capabilities June 2005 1 Service Provider Security Highlights Security is the heart of internetworking s future A secure infrastructure forms the foundation
More informationTotal solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack
Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive
More informationBest Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
More information