Face Off: IPSec vs. SSL VPNs

Size: px
Start display at page:

Download "Face Off: IPSec vs. SSL VPNs"

Transcription

1 Docid: Publication Date: 0311 Face Off: IPSec vs. SSL VPNs Publication Type: FACE-OFF Preview by: Nils Odhner Copyright 2003, Faulkner Information Services. All Rights Reserved. Internet Protocol security (IPSec) and secure sockets layer (SSL) are two competing technologies used in virtual private network (VPN) deployments today. These technologies are both designed to encrypt and authenticate data in transit from remote end-user locations to resources residing on the corporate network. VPNs based on IPSec and SSL each have a distinctive number of advantages and disadvantages, and are engineered for varying business and end-user needs. This report faces off the two competing technologies, and offers an overview of feature sets, strengths and limitations of each, cost issues, and recommendations for their usage in VPN deployment. Report Contents: Executive Summary Description Solution Set Face-Off Analysis: Strengths & Limitations Recommendation Web Links Executive Summary IPSec and SSL are two competing technologies used by IT managers for VPN deployments in today's small businesses, enterprises, healthcare institutions, and government agencies. SSL, or Secure Sockets Layer, is a protocol originally developed by Netscape Communications to secure Web-based transactions. SSL was developed to make e-commerce as we know it today possible, but is now being used in a much wider context, particularly in regard to accessing enterprise application-based resources. IPSec, or Internet Security Protocol, on the other hand, has been widely deployed in enterprise VPNs for years, but is no longer the dominant choice in VPN deployment that it once was. Both technologies are widely used to deploy VPNs, which provide remote connectivity to a host computer or network so that employees, partners, or customers can access corporate resources or conduct business transactions. Choosing between an IPSec- and SSL-based VPN is no simple matter of black

2 and white. Organizations, led by their IT managers and CIOs, must consider a complex of factors before embarking on deployment. For example, questions such as these must be asked: will the remote connection be used for only, or will it be used to access extensive enterprise resources? Will the remote user be accessing Web-based applications only, or non-web-based apps? What is the enterprise's IT budget, and are there limits on spending? These questions, as well as a basic review of the pros and cons of each technology, are vital in choosing whether an IPSec or SSL VPN is best for an organization. Description The two competing VPN options that businesses of today choose to implement are IPSec and SSL VPNs. Both VPN types deliver secure, enterprise-level remote access, but their architectural and operational approaches differ greatly. These varying approaches significantly influence application and security services, and will in the end determine which technology IT managers and CIOs should implement within the organization, and what circumstances are optimal for each. Essentially, IPSec and SSL are encryption and authentication technologies designed for data in transit, i.e., they serve as secure "tunnels" that protect data traffic and identify it at the receiving end. Both architectures, or methods, should be considered in the context of an organization's overall security architecture and network security policy. A careful examination of the data being transferred, its level of sensitivity to the enterprise, and the impact of unauthorized disclosure are key factors that should be considered when deciding between which architecture to use when implementing a VPN. An analysis of these factors will determine if data transmission channels are accessible and secure, and that the mechanisms in place adequately prevent unauthorized message and traffic flow disclosure. It will also ensure that messages sent and received are one in the same, that a valid source-destination message path has been established, and that security mechanisms are invisible to end-users. Both IPSec and SSL solve the problem of delivering secure remote access to end users, and both use the Internet as the means to provide connectivity. Certain types of businesses with specific goals for employees and customers, however, will find one more beneficial than the other. IPSec VPNs Internet Protocol Security (IPSec) is a series of protocols developed by the Internet Engineering Task Force (IETF) to deliver symmetric key encryption and authentication services at the IP layer. When IPSec is used to design a secure VPN, it operates at the network layer (layer three) of the Open System Interconnection (OSI) network architecture model. IPSec VPNs are extremely flexible in supporting network configurations and applications. They utilize a head-end device and an IPSec-based client that is downloaded and installed on the end-user's computer. IPSec VPNs secure all data between endpoints, "virtually" placing the remote client on the corporate network and allowing for the same level of access that an employee would have working in the office. Moreover, IPSec VPNs deliver two types of security services--authentication Header (AH), which allows for end-user authentication, and Encapsulating Security Payload (ESP), which supports end-user authentication and data encryption. What gives IPSec VPNs their strongest level of security is the TripleDES (3DES) encryption algorithm, which makes two-way authentication possible, while separate protocols such as ISAKMP/Oakley can also be selected as part of the IPSec VPN configuration. SSL VPNs

3 Originally developed by Netscape Communications to secure e-commerce transactions, Secure Sockets Layer (SSL) is an oft-used, open standard-based Web protocol that enables such key functions as server authentication, data encryption, and message integrity over TCP/IP sessions. SSL is also referred to as the IETF's Transport Layer Security (TLS) standard, and is used primarily to support private transactions that include bank, online stock trading, and credit card purchases. SSL enables "application layer" VPNs, which operate at layers four through seven of the OSI networking model, and can be used with or without a client. SSL-based VPNs initiate communication by utilizing the program layer between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. In addition, SSL VPNs rely upon reverse proxy technology for enterprise network access, which translates the request from the remote user's Web browser into a command that the corporate network can understand. It is typically required when users are on the road and need access to data located behind a firewall and residing in a non-routable internal IP address space. SSL VPNs typically use RSA's combination public/private key encryption system, which includes a digital certificate option. But because any Web-enabled machine can be used to access SSL-based VPNs, two-way authentication is not possible, but rather any valid username and password will get a user into the SSL VPN. Figure 1 shows the basic architectural differences between IPSec and SSL VPNs. Figure 1. Comparison of IPSec and SSL VPN Architectures Source: TechTarget

4 IPSec and SSL VPN Vendors There are a number of vendors that incorporate IPSec functionality into their network devices, many of which serve as the basis for their IPSec VPN suites. These vendors include Cisco Systems, Nortel Networks, Checkpoint, and SonicWALL. But because IPSec is an older VPN technology, and is more established in many vendors' product and service portfolios, there are more standalone IPSec VPN providers. SSL VPNs, because they are newer, are not offered standalone by as many vendors. There are a few VPN vendors, however, that offer both types, and they perhaps have the biggest edge, considering organizations often need both IPSec VPNs (for site-to-site connectivity) as well as SSL VPNs (for Web-based apps only). The following table lists leading SSL and IPSec VPN vendors. Table 1. IPSec and SSL VPN Vendors Vendor IPSec VPNs SSL VPNs Array Networks Aventail BorderWare Technologies Check Point Software Technologies Cisco Systems Citrix CyberGuard Enterasys Networks esoft Fortinet InfoExpress Microsoft Neoteris Netilla Networks NetScreen Technologies NetSilica Nokia Nortel Networks Novell Permeo Technologies Rainbow Technologies SafeWeb SonicWALL Stonesoft uroam

5 V-One WatchGuard Technologies Whale Communications Solution Set There are a number of key criteria IT managers and CIOs should consider when deciding between implementing an IPSec or SSL VPN. Many factors involve the use of security, which is contingent upon what an organization intends to use the VPN. Key criteria include: Authentication and Access Control--Each type of VPN presents varying user authentication options, which in turn determine the level of security. This determination for a particular VPN type is based on the level of access desired initially. Information Access Level--Related to access control, this determines which devices, locations, and individuals can access information. Attack Defenses--The level of confidentiality and data integrity required will determine the best VPN fit. Client Security--How well is the client secured, if a client is being used in the first place? The level of anti-virus and/or firewall protection will be another determining factor. Application Accessibility--Does the end-user need access to a wide variety of applications on the network, or just a niche or easy-to-use application, such as or collaboration tools? Required Software--Does the VPN implementation require software to get up and running? Scalability--Will the VPN offering be deployed for a whole branch office or a single end-user? This will also determine the type of VPN deployment. Overall Security Coverage--A VPN determination will also be based on how sensitive the information being tunneled from VPN to Web server or corporate network is. How far does the security infrastructure extend? Deployment Scenario--What is the VPN going to be used for, e-commerce or telecommuting from a remote home office? Face-Off Table 2 contrasts the criteria, based on the explanations in the previous section, that IT managers and CIOs should follow when deciding whether to implement an IPSec or SSL VPN. Table 2. IPSec vs. SSL VPN Implementation Criteria

6 Implementation Criteria Authentication and Access Control Access Control Information Access Location Attack Defenses Client Security Application Accessibility Required Software Scalability IPSec VPN Uses Internet Key Exchange (IKE) for authentication, through either digital certificates or two-way authentication; non-certificate authentication more vulnerable. Homogenous access granted to trusted user groups on entire private servers and subnets. Information accessed from designated groups of users or computers. Supports block encryption algorithms such as TripleDES Cipher Block Chaining; prevents man-in-the-middle attacks via packet modification; uses IP and UDP datagram floods to prevent DoS attacks. Session state to detect when secure tunnel has gone away; IPSec clients include integrated desktop security products. Accesses all IP apps, including Web, enterprise, , VoIP, and multimedia. IPSec client software. Highly scalable, up to tens of thousands of customer deployments. SSL VPN SSL Web servers use digital certificates for authentication; non-certificate authentication more secure. Granular-based, per-user, per-application access control. As a result, access determinations made according to ports, selected URLs, embedded objects, content, or application events. Information accessed from any location, including Internet kiosks. Information can be left behind intentionally or unintentionally. Supports block encryption algorithms such as TripleDES Cipher Block Chaining; supports stream encryption algorithms such as RC4; uses TCP and TLS to prevent packet injection. Provides secure browser/client logoff by wiping all traces of user activity; filters individual application commands; use of applets to secure open ports. Accesses mostly Web apps. Standard Web browser. Highly scalable and easy to implement.

7 Overall Security Coverage Deployment Scenario Extends security to the remote access level, and enhances end-point security with integrated methods such as personal firewalls. Secure employee and site-to-site access. Limited security measures dictating information access and client environment; better for less-sensitive information. External Web customer access. Analysis: Strengths & Limitations The Argument for and against IPSec VPNs IPSec VPNs offer several primary benefits that SSL either does not offer, or its functionality is lower. These include "always on" protection for all applications independent of user intervention; network layer implementation, which resides below the application layer; full remote end-user access to LAN applications; and most importantly, an IPSec VPN provides a higher level of security, which is consistent for each client or end user residing on each remote computer. Another "stronger security" plus is that IPSec prevents packet modification to stop man-in-the-middle attacks, and defends better against SSL in denial of service (DoS) attacks due to its sole use of datagrams, instead of TCP sessions, which SSL uses. Essentially, IPSec deflects IP and UDP datagram floods, which are easier to block, as opposed to TCP SYN floods, commonly used in SSL, which fill session tables and cripple off-the-shelf protocol stacks. Despite touting greater overall security than SSL, IPSec VPNs are prone to vulnerability when administrators choose a non-certificate options such as password or tokens. In addition, IPSec vendors tend to offer alternatives such as Extended Authentication (AUTH) and L2TP over IPSec. AUTH, however, is often deployed using pre-shared group secrets, which is vulnerable to several know attacks. Moreover, IPSec VPNs tend to be deployed with less granular access controls, making it a time-consuming chore for administrators to configure individual and group access rules. There are other limitations as well. While IPSec offers seamless remote access for end users, its configurations tend to be complicated, requiring (often costly) experts to navigate and troubleshoot complex key settings and encryption algorithms. Additionally, configurations must be performed manually; on this note, client software updates and installations tend to be cumbersome for large user populations. And finally, IPSec is behind the game in terms of supporting PDA and mobile phone clients, as they are just beginning to appear on the market. The Argument for and against SSL VPNs Despite many admonitions about being less secure than IPSec, SSL VPNs provide a secure, proxied connection to only those resources the user is authorized to access. This lack of a direct network connection, combined with split tunneling, in which users have access to the Internet and corporate resources at the same time--tend to be safer. In other words, SSL drills down better to specific applications and services. This is backed by the fact that SSL VPNs employ granular access control, in which varying access privileges are granted to different users. In addition, SSL VPNs extend remote access capabilities to a larger range of network resources and locations from a greater number of network devices. This is made possible because SSL VPNs reside on top of TCP/User Datagram Protocol (UDP) transports, allowing SSL VPNs to travel through network translation address (NAT) devices as well as stateful inspection and proxy-based firewalls. Also, SSL VPNs are engineered to connect to mobile clients such as PDAs and mobile phones, as many vendors

8 have taken advantage of SSL's easy wireless Web-enabled capabilities. In this way, they are better suited for public kiosk PCs, which are often wireless, as well as business partner desktops and personal home computers. One of the key selling points for SSL is that it does not require complex or intrusive clients, i.e., installation of software on end-user computers, which means easier installation, maintenance, and higher cost-savings. For this reason, SSL VPNs are better for smaller budgets. An SSL-connection, however, prevents VPN users from accessing non-web applications, and is limited to only applications such as Web-based business software. Additionally, SSL VPNs complicate functions such as file sharing, automated file transfers, and scheduled file backups. Administrators can add support for non-web based applications, but this requires custom development, including extensive upgrades, patches, SSL gateways, and other add-ons, which tend to be costly and difficult to implement. In addition, end-users are potentially restricted in terms of accessing enterprise resources on Windows, UNI, Linux, or mainframe systems. But by far SSL's greatest limitation is its lack of overall security compared to IPSec. It is less secure because it enables transparent negotiation of encryption algorithms and key materials, defaulting to smaller, weaker keys if a higher key security level cannot be supported in client/server communications. What Are the Costs Involved? When comparing the range of costs associated with IPSec and SSL VPNs, administrators should base their assessments on the costs at both the host and remote site. In general, there are three cost categories to consider for each respective VPN type: equipment costs, deployment costs, and ongoing support costs. Equipment Costs. At the host site, both SSL and IPSec VPNs require a head-end device for operation at the corporate data center to terminate all data tunnels. For IPSec VPNs, this requires a router/concentrator device, and for SSL, a server with proprietary software is required. At the remote site, IPSec VPNs will require a VPN client, either hardware or software, in order to establish a connection. Software clients are usually free when purchased with a head-end device, whereas hardware clients range from $ per device. SSL VPNs, on the other hand, require no client at the remote end and thus no related costs. Deployment Costs. In terms of deployment costs at the host site, IPSec tends to win out over SSL. For IPSec VPNs, host device configuration is much easier, considering the devices have built-in GUIs to bolster the process. Also, once the secure connection is established, all applications can be accessed from any point on the network. This is not true for SSL VPNs, as each application has to be configured to work with the host device. This usually requires a vendor support team, and can be quite costly and time-consuming. At the remote site, however, IPSec VPNs require and initial configuration at minimal costs, whereas SSL VPNs, because they do not require a client, have no associated costs. Ongoing Support Costs. Host site maintenance costs tend to be minimal, since both IPSec and SSL VPN head-end devices are usually stable. Hardware replacement contracts for each type are priced similarly, and include software/firmware upgrades. SSL VPNs, however, require an additional cost when new applications are being rolled out for configuration with the SSL server. IPSec VPNs, being application independent, do not incur such costs. At the remote site, IPSec VPNs must support remote site clients and users, translating to additional help desk training and support costs. SSL VPNs, because they do not have remote clients, incur no costs in this area.

9 Recommendation Some of the questions IT staff and executive officers should answer before making a decision upon an IPSec or SSL VPN include: How does the organization communicate, both internally with its employees, and externally with partners, suppliers, and customers? What are the requirements for IP and legacy applications? What protections do the data security policy determine? What applications require remote access, sensitive internal documents or casual use apps such as ? Are user-friendly interfaces required? Does the VPN need to support mobile devices? Are there bandwidth-intensive users that need 24x7, high-level performance? Answering these questions, as well as reviewing the competing architectures and their benefits and drawbacks, will help IT administrators to make the appropriate decision. For example, if an end-user just needs to access Web-based applications using a Web interface, such as and file access, an SSL VPN would be the best bet. This also applies to the filing of remote time and labor applications that can be easily sent at the click of a mouse. Given these requirements, most enterprise end-user needs can be met via SSL. In addition, if a small business systems administrator does not have adequate centralized management capabilities, SSL would also be more optimal, considering SSL VPNs are better at providing access from unmanaged devices, such as Internet kiosks. For end-users accessing non-web-based client/server IP applications, however, an IPSec VPN is the best bet. This is an optimal option for so-called "power users" that need a complete PC-to-gateway IPSec VPN, as well as access to the full gamut of enterprise network resources from home offices and remote sites. A more ideal application for IPSec is for connecting site-to-site VPNs, which is often required in the case of large enterprises that have acquired many smaller offices that are geographically dispersed and need to integrate corporate resources into one model. Also, because IPSec VPNs are inherently more secure than SSL VPNs, they can be easily combined with 802.1x authentication technology and firewalls. The former leverages key authentication protocols such as LEAP to secure not only wired VPN tunnels, but wireless LAN security as well. If an organization is looking to save money, SSL VPNs will accomplish this goal. Because they are typically clientless, SSL VPNs do not require the implementation and maintenance costs associated with configuring an upgrading a VPN client. SSL VPNs, however, are limited in their capabilities. They are ideal if, for example, an organization is looking to provide connectivity, and maybe availability of marketing materials to salespeople. On the other hand, if an entire branch office needs connectivity to the corporate headquarters, and all the materials from human resources, legal, sales and marketing, and financial departments, IPSec VPNs are a must. Choosing between an IPSec and SSL VPN is not a matter of one being better than the other, as each has myriad benefits and drawbacks depending on an organization's needs. A careful evaluation, based on the factors mentioned previously, is a necessity for any organization looking to bolster secure, remote connectivity through the use of a VPN. About the Author Nils Odhner is Senior Editor of Data Networking at Faulkner Information Services. His coverage includes biometric technologies, network and Internet security, VPNs, Wi-Fi, and convergence and data networking

10 issues. Web Links Array Networks: Aventail: BorderWare Technologies: Check Point Software Technologies: Cisco Systems: Citrix Systems: CyberGuard: Enterasys Networks: esoft: Fortinet: InfoExpress: Microsoft: Neoteris: Netilla Networks: NetScreen Technologies: NetSilica: Nokia: Nortel Networks: Novell: Permeo Technologies: Rainbow Technologies: SafeWeb: SonicWALL: Stonesoft: uroam: V-One: Watchguard Technologies: Whale Communications:

IPSec vs. SSL: Why Choose?

IPSec vs. SSL: Why Choose? Remote VPN Access from Anywhere An OpenReach Backgrounder Comparing VPN Technologies 660 Main Street Woburn, MA 01801 888.783.0383 www.openreach.com Copyright 2002,, which is solely responsible for its

More information

SSL VPN Technical Primer

SSL VPN Technical Primer 4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses

More information

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Why SSL is better than IPsec for Fully Transparent Mobile Network Access Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de What are we all trying to achieve? Fully transparent network access

More information

Virtual Private Networks: IPSec vs. SSL

Virtual Private Networks: IPSec vs. SSL Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

SSL-Based Remote-Access VPN Solution

SSL-Based Remote-Access VPN Solution Cisco IOS SSL VPN SSL-Based Remote-Access VPN Solution Product Overview Cisco IOS SSL VPN is the first router-based solution offering Secure Sockets Layer (SSL) VPN remote-access connectivity integrated

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition Why Switch from IPSec to SSL VPN And Four Steps to Ease Transition Table of Contents The case for IPSec VPNs 1 The case for SSL VPNs 2 What s driving the move to SSL VPNs? 3 IPSec VPN management concerns

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs Introduction Connecting remote users to corporate resources securely is not a new problem for IT. But today s end users with changing work

More information

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Virtual Private Networks Solutions for Secure Remote Access. White Paper Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information

More information

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN

10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN 10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw

More information

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Security Review: SSL VPNs

Security Review: SSL VPNs Executive Summary Today s enterprises use the Internet to meet a variety of communication needs among employees, business partners, suppliers, customers, and potential customers. These users communicate

More information

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino Dipartimento di Automatica e Informatica mario.baldi[at]polito.it staff.polito.it/mario.baldi Nota di Copyright

More information

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

2003, Rainbow Technologies, Inc.

2003, Rainbow Technologies, Inc. Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

Microsoft Azure Configuration

Microsoft Azure Configuration Microsoft Azure Configuration Azure Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 VNS3 Configuration Document

More information

FEATURE. THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group. Summary of feature. 1300 words. * Recent growth of SSL VPNs

FEATURE. THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group. Summary of feature. 1300 words. * Recent growth of SSL VPNs FEATURE THE RISE OF SSL VPNS by Ian Kilpatrick, chairman Wick Hill Group 1300 words Summary of feature * Recent growth of SSL VPNs * Aim of VPN technology - controlled, secure and managed access to any

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations Choosing Remote-Access VPN Technologies, Securing the VPN Deployment Defining Remote-Access VPNs Remote-access VPNs allow

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Secure your Informations efficiently. SECURITY: FIREWALL & VPN CLIENTS Trends Features Products and Solutions jfrancis@dlink.de

Secure your Informations efficiently. SECURITY: FIREWALL & VPN CLIENTS Trends Features Products and Solutions jfrancis@dlink.de Secure your Informations efficiently SECURITY: FIREWALL & VPN CLIENTS Trends Features Products and Solutions jfrancis@dlink.de The driving force for information security Highly computerization. Heterogeneous

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Remote Vendor Monitoring

Remote Vendor Monitoring ` Remote Vendor Monitoring How to Record All Remote Access (via SSL VPN Gateway Sessions) An ObserveIT Whitepaper Daniel Petri March 2008 Copyright 2008 ObserveIT Ltd. 2 Table of Contents Executive Summary...

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Lecture 17 - Network Security

Lecture 17 - Network Security Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Cisco Easy VPN on Cisco IOS Software-Based Routers

Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

WHITEPAPER IPSEC VPN Vs. SSL VPN

WHITEPAPER IPSEC VPN Vs. SSL VPN WHITEPAPER IPSEC VPN Vs. SSL VPN Introduction Whether a result of tele-working initiatives, contingencies for events such as 9/11, SARS, and the East Coast Blackout, or just addressing the need to balance

More information

Scenario: Remote-Access VPN Configuration

Scenario: Remote-Access VPN Configuration CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Security for Application Service Providers

Security for Application Service Providers Security for Application Service Providers Overview Outsourcing is nothing new. Time sharing services for data processing have been around for some time. EDI applications have been at least partially outsourced

More information

Site to Site Virtual Private Networks (VPNs):

Site to Site Virtual Private Networks (VPNs): Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Securing an IP SAN. Application Brief

Securing an IP SAN. Application Brief Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Implementing and Managing Security for Network Communications

Implementing and Managing Security for Network Communications 3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Link Layer and Network Layer Security for Wireless Networks

Link Layer and Network Layer Security for Wireless Networks Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack

Total solution for your network security. Provide policy-based firewall on scheduled time. Prevent many known DoS and DDoS attack Network Security Total solution for your network security With the growth of the Internet, malicious attacks are happening every minute, and intruders are trying to access your network, using expensive

More information

GPRS / 3G Services: VPN solutions supported

GPRS / 3G Services: VPN solutions supported GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive

More information

Scenario: IPsec Remote-Access VPN Configuration

Scenario: IPsec Remote-Access VPN Configuration CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

NETWORK SECURITY (W/LAB) Course Syllabus

NETWORK SECURITY (W/LAB) Course Syllabus 6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation

More information

What we hired the network to do in the

What we hired the network to do in the Networks Need A New Application Delivery Architecture Robin Layland Building a more responsive, secure infrastructure will result in higher user satisfaction. What we hired the network to do in the past

More information

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Configuring Windows 2000/XP IPsec for Site-to-Site VPN IPsec for Site-to-Site VPN November 2002 Copyright 2002 SofaWare Technologies Inc, All Rights Reserved. Reproduction, adaptation, or translation with prior written permission is prohibited except as allowed

More information

Virtual Private Networks Secured Connectivity for the Distributed Organization

Virtual Private Networks Secured Connectivity for the Distributed Organization Virtual Private Networks Secured Connectivity for the Distributed Organization FORTINET VIRTUAL PRIVATE NETWORKS PAGE 2 Introduction A Virtual Private Network (VPN) allows organizations to securely connect

More information

The Advantages of Using Aventail VPN

The Advantages of Using Aventail VPN SECURE MOBILE ACCESS USING SSL VPNS September 2005 Prepared by Peter Rysavy http://www.rysavy.com 1-541-386-7475 Executive Summary Remote access has become increasingly complex. It s no longer about traveling

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Understanding VPN Technology Choices

Understanding VPN Technology Choices Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt

More information

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by

More information

DEPLOYING VoIP SECURELY

DEPLOYING VoIP SECURELY DEPLOYING VoIP SECURELY Everyone knows that Voice-over-IP (VoIP) has been experiencing rapid growth. Even still, you might be surprised to learn that: 10% of all voice traffic is now transmitted with VoIP

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Security Engineering Part III Network Security. Security Protocols (II): IPsec Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,

More information

ISG50 Application Note Version 1.0 June, 2011

ISG50 Application Note Version 1.0 June, 2011 ISG50 Application Note Version 1.0 June, 2011 Scenario 1 - ISG50 is placed behind an existing ZyWALL 1.1 Application Scenario For companies with existing network infrastructures and demanding VoIP requirements,

More information