Comparing Mobile VPN Technologies WHITE PAPER
|
|
|
- Leo Victor Booth
- 10 years ago
- Views:
Transcription
1 Comparing Mobile VPN Technologies WHITE PAPER
2 Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable connections. In a mobile wireless WAN environment, where data transmission speeds are slower and connections are less reliable, traditional VPN performance suffers, frequently resulting in application failure, data loss, and reduced productivity. NetMotion Wireless offers a best in class mobile VPN built from the ground up for mobile, wireless environments. Characteristics of an Ideal Mobile VPN One of the weaknesses of the original Internet protocol (TCP/IP) is that it does not include a native means for ensuring the authenticity and privacy of data as it passes over a public network. To address this weakness, add on Virtual Private Network (VPN) technologies were developed that would validate the identity of and encrypt the data sent between two or more systems on the Internet. Conceptually, a VPN is simply a way for two computers or networks to exchange data under the following terms: Each computer must be able to verify the identity of the other The data that is exchanged must be kept confidential and unchanged in transit The exchange must be reliable computers exchanging data must detect when sent data is not received so that it can be sent again Mobile VPNs must also take the following into account: Mobile workers often move from the office to a customer site, changing their IP addresses and even the networks used to connect to the Internet. If the VPN doesn t accommodate these changes, a user must re establish the connection each time the IP address changes. Mobile workers often need to suspend or hibernate their devices to preserve battery life. The mobile VPN should automatically resume without user intervention, otherwise applications that require the VPN to function are likely to fail. Users will lose data and must manually restart both the tunnel and any applications that use it. Mobile workers use cellular data networks characterized by lower throughput, higher packet loss, and higher latency when compared to wired networks. The applications they use are typically written for stable, high speed, wired networks. Mobile VPNs must shelter those applications from the reality of mobile network performance or the application itself will become unstable, leading to data loss and/or productivity. In essence, a mobile VPN bridges the gap between what users and applications expect (and get) from a wired network, and the realities of mobile computing. While resetting user expectations and re writing applications for the mobile environment is possible, it s more cost effective to deploy a single solution that takes mobility into account. Comparing Mobile VPN Technologies White Paper 2
3 This paper discusses the strengths and weaknesses of several different approaches to meeting the connectivity needs of the mobile worker: IPSec client VPNs SSL client (browser based) VPNs MobIKE (IKEv2) and MobileIP Purpose built Mobile VPNs IPSec VPNs Internet Protocol Security (IPSec) is the most widely adopted solution for securing data in transit between two systems. It provides the following: Authentication so that the transmitting and receiving parties can trust each other A mechanism to negotiate the security algorithms and keys required to establish point topoint security either Internet Key Exchange (IKE) protocol or IKEv2 Integrity checking to ensure the data is not changed en route Encryption of data (privacy) Protection against certain types of security attacks, such as replay attacks IPSec was originally developed to link private networks together over the wired Internet. With the success of IPSec as a point to point protocol for securing data in transit between two wired networks, software clients were developed to connect single computers in the field to the corporate network. IPSec supports port/address level access controls for traffic within the tunnel, multiple encryption algorithms, and it enjoys broad support across platforms and vendors. IPSec is not, however, well suited for use in mobile and wireless environments because it requires that the IP addresses of the endpoints remain unchanged. IPSec disconnects the tunnel and requires users to reauthenticate when they encounter a coverage gap, move from one network to another or suspend/resume their laptops. It also does nothing to address the unique performance requirements of mobile networking. SSL VPNs Browser based SSL VPN solutions are designed to secure application streams between remote users and an SSL VPN gateway. In contrast to IPSec VPNs, which connect remote devices to trusted networks, SSL VPNs connect remote users to specific applications and network resources inside of trusted networks via a Web portal configured to proxy the traffic. They secure Web based traffic and are well suited for communicating to resources in a trusted network from non corporate devices (such as kiosks, Internet cafés, or home computers) using a standard Web browser. SSL VPNs require a client for anything but the most rudimentary connectivity. Before granting access, NAC security checks (frequently performed by ActiveX or Java applets) ensure that the remote device is running the proper security software (checking for the latest antivirus definition files, for example). Often, following necessary remediation steps is time consuming and even impossible over an unreliable or slow wireless network. Comparing Mobile VPN Technologies White Paper 3
4 Like IPSec VPNs, SSL VPN solutions do not meet all of the requirements for mobile and wireless use. They do not handle roaming between networks, crossing coverage gaps, or intermittent connectivity: applications crash or data is lost. Additionally, they are designed to use the SSL protocol operating at layer 7 (typically using TCP rather than the more efficient UDP protocol), which results in lower wireless network performance. Other Enabling Technologies IKEv2 An update to IPSec s IKE protocol is the IKEv2 Mobility and Multi homing protocol (MOBIKE). IKEv2 supports a mobile device with multiple IP addresses, or addresses that change over time. Since it s basically a key exchange protocol, IKEv2 does nothing to shield the applications on mobile devices from crashing when the device is unreachable (for example, out of range, or in hibernate mode). IKEv2 also can t do anything to enhance the performance of those applications over the network. Mobile IP VPNs Mobile IP solves the problems created when mobile devices change addresses as they roam, by hiding IP address changes from client applications. It has no native security functions and relies on another technology, such as IPSec, to keep data confidential and authenticate the identity of the systems participating in the VPN. Pairing Mobile IP with IPSec for basic security adds to the protocol overhead by requiring the following: IPSec encapsulation for protecting the end point data Mobile IP encapsulation to hide the address changes A second layer of IPSec encapsulation for Home Agent and other security associations This protocol overhead degrades throughput and adds configuration complexity. Like IKEv2, Mobile IP is not optimized for wireless networks, nor does it offer application persistence through wireless coverage gaps and the suspend/resume cycles typical of the mobile worker. Password Caching and Automatic Reconnect One of the problems that IKEv2 and Mobile IP leave unsolved is how to bring the tunnel back up after an interruption. One reasonable approach is to simply cache the credentials used to create the tunnel and immediately re submit them if the tunnel goes down. This approach is simple, effective, and easily understood by most users. Where it falls short, even when combined with technologies such as IKEv2 and Mobile IP, is that applications trying to use the tunnel when it is down will crash, taking valuable data with them, not to mention the time it takes to recover. Comparing Mobile VPN Technologies White Paper 4
5 Mobility XE: A Purpose-Built Mobile VPN Solution Mobility XE is a standards based mobile VPN that provides secure, continuous remote access to network resources and applications from mobile devices over any wired or wireless IP based network. Unlike traditional IPSec and SSL VPNs, which do not perform well in mobile and wireless environments, and point solutions that only solve part of the problem, Mobility XE was built from the ground up to address the unique challenges associated with mobile computing. These include wireless security, coverage gaps, and slow and unreliable networks. The Mobility XE mobile VPN enforces security from endpoint to endpoint, regardless of the combination of networks used. It is architected with an understanding of network types, providing a seamless solution for users transitioning from home networks to hotspots and to mixed vendor environments, be they WWANs or WLANs. Although optimized for wireless networks, it also supports any type of network that uses the IP network protocol, including Ethernet, DSL, and dialup. Persistence Mobility XE is a layer 4 VPN. This transport layer implementation allows Mobility XE to manage and protect the data flow between the application (layer 7) and the networks (layer 3) by remotely proxying application queries from mobile devices. The Mobility XE server provides highly available and stable TCP connections that shield remote host applications from coverage gaps, address changes, and network changes. The layer 4 design also allows Mobility XE to offer enhanced application based policy management and a secure end to end VPN for any application running on the mobile device. Roaming The location of Mobility XE above the network layer allows it to maintain a secure, stable VPN connection as devices roam from one network to another. The tunnel remains available and application sessions persist in many common scenarios, such as: Suspending operation on the mobile device and later resuming it Moving to a different location on the network Connecting a mobile device over slow, bandwidth challenged, or high latency networks Encountering interference from microwaves, stairwells, elevator shafts anything that interferes with radio signals Changing network interfaces (for example, from a WLAN to a WWAN card) Moving across gaps in coverage Performance Optimization Mobility XE is designed to provide optimum performance over intermittent and low bandwidth network links. Its architecture includes enhancements that allow network traffic over IP to more effectively deal with connectivity loss from a mobile device, whether due to coverage outages or Comparing Mobile VPN Technologies White Paper 5
6 external factors, such as power management or user intervention. It makes the most efficient use of the given bandwidth using advanced features that reduce the chattiness of transport protocols: Selective acknowledgments Data and acknowledgment bundling Message coalescing Reduced and synchronized retransmissions Fragmentation optimizations Data compression Error reduction algorithms Web acceleration Working in concert, these features provide for the efficient movement of data. In addition, Mobility XE is configured to automatically switch to the fastest bandwidth network connection when multiple connections are active. VPN Feature Comparison Security Mobility XE IPSec SSL Standards-based encryption Yes Yes Yes FIPS validated encryption libraries Yes Limited Limited Standards-based authentication Yes Yes Yes Integration with existing authentication schema Yes Yes Yes Support for CJIS-compliant smart cards and certificates Yes Yes Limited User-transparent multi-factor (user and device) authentication Yes No No Enforced reauthentication without disrupting applications Yes No No Network Access Control Yes Limited Yes Quarantine by device or user Yes Yes Yes Device-to-DMZ security Yes Yes Yes Productivity Application session persistence Yes No Very limited Seamless roaming (slow handoffs out-of-range conditions or suspend and resume operations) Yes No No Data compression Yes Limited Limited Link optimizations Yes No No QoS and traffic-shaping support Yes Limited Limited Web image acceleration Yes No No Real-time application optimizations Yes No No Transparency (ease of use) Yes No Web only Multi-platform support Microsoft OS only Yes Yes Comparing Mobile VPN Technologies White Paper 6
7 Mobility XE IPSec SSL Management Full support for laptops and Windows Mobile devices Yes Depends on vendor Limited on Windows Mobile Mobile-specific management information Yes No No Policy management Layers 2 through 7 Layer 3 Layer 7 Analytics on device / application / network use Yes No No NAT-friendly Yes Depends on vendor Yes Conclusion While IPSec and SSL based client VPN technologies have their place, neither is suitable for the mobile computing environment because they fail to address the needs for application performance, usability, and productivity. Organizations investing in mobile computing as a way to improve field worker productivity should deploy a purpose built mobile VPN solution to secure their remote data communications. The dominant Mobile VPN is Mobility XE the flagship solution from NetMotion Wireless that is built from the ground up for mobile and wireless environments. Mobility XE is a mobile VPN designed to deal with wireless security, coverage gaps, roaming, and performance. For More Information Visit or contact [email protected] NetMotion Wireless, Inc. All rights reserved. NetMotion and NetMotion Mobility are registered trademarks of NetMotion Wireless, Inc., and Mobility XE, Roamable IPSec, InterNetwork Roaming, Best-Bandwidth Routing and Analytics Module are trademarks of NetMotion Wireless, Inc. Microsoft, Microsoft Windows, Active Directory, ActiveSync, Internet Explorer, Windows Mobile, Windows Server, Windows XP, SQL Server, Windows XP Tablet PC Edition and Windows Vista are registered trademarks of Microsoft Corporation. All other trademarks, trade names or company names referenced herein are used for identification purposes only and are the property of their respective owners. NetMotion technology is protected by one or more of the following US Patents 6,198,920; 6,418,324; 6,546,425; 6,826,405; 6,981,047; 7,136,645; 7,293,107; 7,574,208; Cdn. Pat. 2,303,987. Other US and foreign patents pending. Comparing Mobile VPN Technologies White Paper 7
Mobile Session Persistence
I N D U S T R Y I N S I G H T Mobile Session Persistence What It Is, Why It Matters, How It Works Prepared by NetMotion Wireless w w w. N e t M o t i o n W i r e l e s s. c o m Executive Summary Mobile
POLICY MANAGEMENT MODULE
Granular Management of Wireless Bandwidth, Security and Mobile Productivity www.netmotionwireless.com Executive Summary Administering a mobile environment is challenging, and involves issues above and
Wireless Network Quality of Service WHITE PAPER
Wireless Network Quality of Service WHITE PAPER Executive Summary Most wireless deployments rely on cellular data networks for connectivity, which have bandwidth constraints. The quality of service (QoS)
MOBILITY AND MOBILE NETWORK OPTIMIZATION
MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn
Deploying Netmotion Mobility In The Utility Industry
Deploying Netmotion Mobility In The Utility Industry netmotionwireless.com Executive Summary This report summarizes results of a recent survey to senior IT directors and managers from 50 leading US utilities
MANAGING ENTERPRISE MOBILITY
MANAGING ENTERPRISE MOBILITY The Dozen Challenges to Successful Deployments www.netmotionwireless.com Executive Summary Users and IT departments are familiar with wired environments. Given that experience,
Mobility XE: Your Only Remote-Access VPN Seven Key Advantages to Consider
Mobility XE: Your Only Remote-Access VPN Seven Key Advantages to Consider Executive Summary Netmotion Wireless Mobility XE is used by over 2000 organizations around the world to enhance the productivity
Security for Wireless Networks A comparison among SSL, IPSec and Mobile VPNs
Security for Wireless Networks A comparison among SSL, IPSec and Mobile VPNs WHITE PAPER NetMotion Wireless 701 N 34th Street, Suite 250 Seattle, WA 98103 206.691.5555 www.netmotionwireless.com Security
Enterprise Mobility in the Telecommunications Industry
How a Mobile VPN Creates Better Service for Customers and Increased Productivity for Employees netmotionwireless.com Executive Summary Mobile-technology initiatives deliver tangible benefits in improved
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
Managing Mobile Devices Over Cellular Data Networks
Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR
HEALTHCARE MOBILITY BEST PRACTICES
HEALTHCARE MOBILITY BEST PRACTICES Secure, Reliable Connections for Better Patient Care www.netmotionwireless.com Overview Accessing patient data directly at the point-of-care via wireless technologies
Security for Wide Area Wireless Networks WHITE PAPER
Security for Wide Area Wireless Networks WHITE PAPER Executive Summary Security in a wireless deployment is a balancing act between protecting corporate data assets and ensuring that security measures
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Columbitech Mobile VPN
Columbitech Mobile VPN Technical Description Updated 2013-01-25 Copyright 2002-2013 Columbitech AB. All rights reserved Abstract Not too long ago the workplace was a place where business related communications
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access
MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe
Deploying F5 Application Ready Solutions with VMware View 4.5
F5 White Paper Deploying F5 Application Ready Solutions with VMware View 4.5 VMware View is the leading desktop virtualization solution built for delivering desktops as a managed service. F5 BIG IP devices
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
1.264 Lecture 37. Telecom: Enterprise networks, VPN
1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Joe Davies Principal Writer Windows Server Documentation
Joe Davies Principal Writer Windows Server Documentation Presented at Seattle Windows Networking User Group monthly meeting September 1, 2010 Agenda Brief VPN technology overview VPN features in Windows
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Licenses are not interchangeable between the ISRs and NGX Series ISRs.
Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
NETMOTION WIRELESS LOCALITY PRODUCT GUIDE
NETMOTION WIRELESS LOCALITY PRODUCT GUIDE Overview Business is run on top of complex corporate networks that have a sophisticated set of tools to provide visibility into those networks. But today, organizations
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Building Your Complete Remote Access Infrastructure on Windows Server 2012
Building Your Complete Remote Access nappliance White Paper August 2012 Introduction Remote access is a complex challenge for IT administrators. Providing system access to remote users involves a broad
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
AnyConnect VPN Client FAQ
AnyConnect VPN Client FAQ Document ID: 107391 Questions Introduction What level of rights is required for the AnyConnect client? Is a reboot required after AnyConnect is installed/upgraded? Is it possible
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
SECURITY FOR WIDE AREA WIRELESS NETWORKS
Creating a Secure Wireless Deployment Without Impacting Mobile Worker Productivity www.netmotionwireless.com Executive Summary Security in a mobile deployment is a balancing act between protecting corporate
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
SGUL VPN Connection Guide for Windows 10
SGUL VPN Connection Guide for Windows 10 2016-01-22 First draft 2016-01-29 Second draft 2016-04-01 First release v1.0 Regulations Before connecting to the network, you should familiarize yourself with
Integrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
CONTENTS. What s New In Mobility. Release Overview
Release Overview CONTENTS What s New In NetMotion Mobility 10.70...2 The only per-app VPN for ALL major enterprise and mobile platforms...2 Use multiple authentication types simultaneously...2 Tighter
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
TrustNet Group Encryption
TrustNet Group Encryption Executive Summary Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
High Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO
WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to
Creating a VPN Using Windows 2003 Server and XP Professional
Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN
It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration
It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
Mobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
Understanding VPN Technology Choices
Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
FatPipe Networks Network optimisation and link redundancy for satellite communications
FatPipe Networks Network optimisation and link redundancy for satellite communications Next generation WAN acceleration Version 01 rev 05 Gregory Fedyk Regional Director UK/IRE, France and Benelux Isik
TCP for Wireless Networks
TCP for Wireless Networks Outline Motivation TCP mechanisms Indirect TCP Snooping TCP Mobile TCP Fast retransmit/recovery Transmission freezing Selective retransmission Transaction oriented TCP Adapted
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Preparing Your IP Network for High Definition Video Conferencing
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:
Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a
