Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA
|
|
|
- Percival Joseph
- 10 years ago
- Views:
Transcription
1 White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel: Fax:
2 Table of Contents 1 Introduction Scope Application Areas Enterprise deployment Public deployment Mobility vs. Security Mobile IP and Security Proprietary Solutions vs. Open Standards Mobility requirements Mobile alternatives Basic models Seamless models Deployment and configuration Automatic client configuration Conclusion/Summary Seamless secure mobility across all networks Page 2 of 19
3 1 Introduction With Mobile IP, the enterprise and public operator can provide seamless always-on network access to the mobile professional. For the enterprise user, this means hassle-free connectivity both inside and outside the office environment. It also means the ability to control cost of network charges by always choosing the best available connection. For the operator, Mobile IP enforces the operatorcustomer relation, and enables the operator to provide a mobility service for the user not only on the operator s own network but also when the user is connected to the enterprise network, or even to the access network of a different network operator. The common theme for both enterprise and operator deployment, is the need for security. Virtual Private Network () technologies protect the integrity of communication for the mobile user when outside the office environment. Enterprises that already rely on market leading solutions for external access of the corporate information, and want to provide seamless mobility find it crucial to mobilize the existing in order to protect existing investment and to leverage the security and functionality of the market leading solutions. The Birdstep Intelligent Mobile IP client has followed an open and standards-based approach to provide seamless roaming for operators and enterprises. Experience gathered through work with various customers has provided us with the know-how to improve this standard-based, independent roaming model. With the next generation of our Mobile IP client, based on a ground breaking best-of-breed design approach, we have been able to maintain our tradition of supporting the existing standards and existing network infrastructure. In addition we have solved key issues for offering mobility support of 3 rd party solutions. The most important features requested from both network operators and enterprises have been the following: 1. Ability to turn off when the user is connected using a secure connection to his or her intranet (such as Ethernet or corporate Wireless LAN with dynamic WEP key) and ability to turn on the when the user is connected using an external network such as a private WLAN or public Wireless LAN hotspot or using a public cellular service such as GSM or GPRS. 2. Automatic configuration of the client to simplify large-scale deployment of mobility service for non-technical users. This has been supported until now with distribution of XML configuration files to the terminal at installation time. Now, parameter management is directly supported by the client itself. Standard, secure, web-based parameter download is now the simplest way to manage a large number of Mobile clients using the existing enterprise or operator web server backend infrastructure. The new Birdstep Intelligent Mobile IP client, v2.0 Universal Edition solves both these requirements, and caters to both operator and enterprise deployments. A corresponding v2.0 Standard Edition will replace the exiting v1.4 of the Birdstep Intelligent Mobile IP client. Since the latter edition does not include the on/off feature, it is a simpler and cheaper deployment alternative for users who spend most of their working day outside the enterprise. Seamless secure mobility across all networks Page 3 of 19
4 2 Scope This whitepaper starts by outlining application areas (this includes requirements for enterprises and operators), then it describes some of the existing approaches to solve such requirements, it then explains how the Birdstep Mobile IP client is designed to solve the requirement of seamless and finally it explains the automatic configuration features of the Mobile IP client. This paper focuses exclusively on the Universal Edition of the new Mobile IP client from Birdstep. This whitepaper does not describe the basic concepts back Mobile IP; there is a wide range of articles on the subject. If you need to refresh your knowledge, you should read some of the documentation available at the web site from the Engineering Task Force ( 3 Application Areas In the last years major technology developments have directly changed our way of working. The increased reliance on the as a business tool and the development of sophisticated wireless communications systems have freed employees from the need to remain at their desk when doing productive work. Mobility and productivity are the current trends in all business practices. Enterprise users are spending more time traveling and on meetings at other places than in their own offices. More than ever they want to be able to connect from any location to their corporate network. 3.1 Enterprise deployment We assume that enterprises want their users to roam internally (between any combinations of LAN and/or WLAN subnets, where the WLAN subnets can be secured using for example WEP/LEAP or other security mechanisms), and externally to public networks such as public WLAN hotspots, public locations with Ethernet/ISDN or analog line connections such as hotel rooms, and home users with an ISDN/ADSL or analog line connection. Two important application areas for Mobile IP inside the enterprise is (1) when the enterprise WLAN is deployed as an unsecured network outside the company firewall and (2) when the enterprise WLAN due to its size needs to be segmented in separate subnets. In both cases Mobile IP cater for the need to move seamlessly between any enterprise networks. For enterprise users, we assume that communication is encrypted with market leading clients, with concentrators placed in the enterprise. We also assume that the enterprise wants to enable when the user is roaming on public or unsecured networks as listed above to maintain security, while they want to disable when users are connected to their secured intranet to avoid unnecessary load on the concentrator and corporate firewall. (However, for small enterprises with a small number of users, the load on concentrator may be regarded as acceptable since the concentrator is not a bottleneck.) We further assume that the enterprise IT management wants to control all Mobile IP parameters from a central location controlled by the IT management. Seamless secure mobility across all networks Page 4 of 19
5 3.2 Public deployment Mobile operators We assume that mobile operators have deployed a 2.5G cellular network, such as GPRS or IS95B networks, and may have licenses for 3G (UMTS/CDMA2000) networks. We also assume that the operators operate a switched cellular network (such as GSM or CDMA) and that the operator is in the process of deploying WLAN zones, or go in alliance with Wireless ISPs. Some of these operators might also either be ISPs or have alliances with ISPs. Most of the mobile operators fall today under this category ISPs ISPs that currently serve dial-in ISDN/POTS pools and operate xdsl/catv/lmds broadband networks may be interested in offering their customers mobility to wireless technologies. The ISPs may become Wireless ISPs by providing public or enterprise WLAN hotspots, but the ISPs may also partner with existing WISPs or mobile operators with WLAN plans. Trends in the market to offer wholesale of local WLAN access zones to existing ISPs confirm this category Operators catering enterprise customers We further assume that the operators want to target not only to the individual user, but they also want to cater their enterprise customers. Such target market has two requirements in the arena. The first requirement is the need to provide seamless roaming to their users to keep them loyal and increase their use of the operator s offerings, the second requirement is to cater to the enterprises that require access to the network for their employees while these are on the road. In this case, the operator provides a public mobility service, independent of the enterprise IT infrastructure. In this case, the enterprise handles its own infrastructure and out-sources mobility to the operator, which becomes a public network mobility provider Configuration We assume that the enterprise want to control all parameters of their own enterprise users from a central location and that service registration shall be as simple as possible. We also assume that operators want to offer the parameters to the enterprises, which can then supply to their users for roaming in the public space. We also assume that the operators want to control centrally all the parameters offered to their private clients. 4 Mobility vs. Security 4.1 Mobile IP and Security The need to protect the integrity of communication for the mobile user introduces the requirement for a seamless mobile solution. It is important to note that Mobile IP is secure but does not protect your data. Mobile IP includes protection of mobility handling with the following key mechanisms: Seamless secure mobility across all networks Page 5 of 19
6 Authentication of registration messages Prevents hi-jacking of traffic Ensures integrity of binding list Accommodates any authentication algorithm Data security is not part of Mobile IP, and security can be handled either by running traffic over a secure link (such as a wired Ethernet or a Wireless connection with layer2 encryption), or security can be overlaid using technology. The use of is enabled by placing a concentrator in the of an enterprise network and a client installed in the terminal. When is used together with Mobile IP, Mobile IP can be used inside the tunnel, or can be overlaid the Mobile IP connection. What is important on both cases is that the is in control of security. 4.2 Proprietary Solutions vs. Open Standards When it comes to providing mobility there are two completely different implementation approaches in the market. The first approach is a proprietary bundle with Mobile IP and client from the same vendor with vendor-specific signaling between the two clients. The second alternative, pioneered by Birdstep has been to interoperate with product offerings from major vendors. The figure below outlines both alternatives. Since there is no bundle between Mobile IP and on the client side of open design approach, there is no need for bundle between the and on the agent/server side either. The closed design normally requires a bundle on the agent/server side also. Closed design Open design Proprietary Home Agent and concentrator Standard Mobile IP Home Agent Public Public Mobility Access Server Standard Firewall / concentrator c Mobile IP Client SW bundled with proprietary SW Standard client Figure 1: Closed vs. open mobility design Seamless secure mobility across all networks Page 6 of 19
7 The proprietary bundled implementation alternative often requires investment in new server side components, introduction of new elements in the network topology that either can compromise the established security rules of the enterprise or compromises the scalability and redundancy already implemented at the network. This approach can be justified at small-scale installations where such requirements are not a real concern. The open standards implementation alternative requires interoperability with existing software and hardware components. The Birdstep message has always been to develop a Mobile IP client that can coexist with any Mobile IP Home Agent (such as a Cisco router, Solaris Server, Linux server, etc) and mobilize the existing market leader solutions (such as Checkpoint, Nortel, Cisco and Microsoft). This approach leverages on existing investments, provides a scalable solution to the market and does not force the user to replace existing and proven infrastructure. 4.3 Mobility requirements Before going into a detailed description of different solutions that combine Mobile IP and security, it is important to understand the mobility requirements arising from enterprise users. There are three different areas of concern regarding network handover and seamless operation: Between subnets internally Between subnets externally Across the security boundary (2)External Public (1) Internal Tunnel (3) Seamless Figure 2: What are your mobility requirements? Since external access to internal resources is always via a secure tunnel solution it is in fact the that must be made mobile when moving between subnets externally as pointed in the second bullet above. The challenge to meet the requirement described in the third bullet is to turn the on or off as required. Seamless secure mobility across all networks Page 7 of 19
8 5 Mobile alternatives Secure mobility using can be handled in various ways as discussed in the next four subsections. The two first models are classified as basic since they do not support seamless operation across a security boundary. In contrast, the last two models manage to solve the seamless operation across a security boundary. The approach taken by Birdstep is to use a best-of-breed approach combining the best from the two basic models and turn the combination into a seamless solution that works across a security boundary. 5.1 Basic models Mobile IP inside If Mobile IP is placed inside of the, this is called the Mobile IP in approach. It leverages a solution to reach the enterprise intranet, and has the advantage that is only used when the user terminal is connected to an external network. Mobile IP works fine for handovers between different access networks within the intranet (e.g. WLAN and Ethernet), but the session is lost when the client wants to roam from an intranet connection to a public network connection. The solution does not provide mobility between different access networks, since the session is broken for every network change. Figure 3: Mobile IP in To be able to access the enterprise intranet from outside, figure 4 shows how the client is placed below the Mobile IP client. The terminate the IPSEC tunnel from the client, and pass packets onto the intranet through the enterprise firewall. Packets from the Mobile node can now reach the Mobile IP Home Agent on the intranet. Seamless secure mobility across all networks Page 8 of 19
9 Mobile Node Gateway Home Agent App. TCP/IP Payload IP Figure 4: Outside (e.g. internet) access using the Mobile IP in model For internal access within the intranet, the client becomes inactive, and the overhead is not incurred for internal communication (see figure 5.) Note that seamless handover can now be achieved across heterogeneous internal access networks in the enterprise intranet. Home Agent Mobile Node App. TCP/IP IP Payload Figure 5: Inside (intranet) access using the Mobile IP in model The solution provides the following advantages: The Mobile IP Home address is internal, and the Mobile Node is part of the intranet The is only used when the client connects from public networks, and no overhead is incurred when the user is connected to the intranet. The solution has the following disadvantages: The tunnel breaks at every handoff, and the session must be re-established (this is normally a manual process due to security policies). Tunnel re-establishment incurs performance penalty Enterprises must deploy mobile IP service, and cannot rely on an operator managed mobility service. Seamless secure mobility across all networks Page 9 of 19
10 5.1.2 overlaid Mobile IP If is placed on top of Mobile IP, we call this solution the overlaid approach. Until now, this approach has been the preferred way to mobilize a solution. This is the model supported by Birdstep as well in the version 1.4 of the Mobile IP client. The strength of the Birdstep solution, compared to other such solutions, has been to interoperate with products from major vendors instead of pushing a proprietary solution. When the client software is overlaid a Mobile IP system, the Mobile IP is an external system with the Mobile IP Home Agent placed outside the intranet, usually on the enterprise. In this way, Mobile IP mobilizes the existing solution, and any application can now run securely over and the session will not be altered as access networks are changed. Figure 6: overlaid Mobile IP To be able to access the enterprise intranet from outside, figure 7 shows how the client is placed overlaid to the Mobile IP client. The Mobile IP client must be able to reach the Home Agent that must be placed in the in the same way as the concentrator. Mobile Node Home Agent gateway App. TCP/IP Payload IP Figure 7: Overlaid outside access Seamless secure mobility across all networks Page 10 of 19
11 For internal access within the intranet, (see figure 8.) the Mobile IP client is still forced to reach the Mobile IP Home Agent placed in the. It is also forced to reach the concentrator. Home Agent gateway Mobile Node App. TCP/IP IP Payload Figure 8: Overlaid inside access The solution provides the following advantages: tunnel survives handoff, bound to address Enterprises can rely on a public mobile IP service The solution has the following disadvantages: Home address is external, not part of intranet Must always use, also when on intranet Traffic loops via outside when on intranet 5.2 Seamless models The Mobile IP Proxy Using this model, the Mobile IP system will allow seamless mobility across security boundaries of the enterprise. Until recently, the standardization efforts in IETF has focused on introducing a new component called the proxy-home Agent which is deployed on the external and synchronized with the real Home Agent which is placed securely on the enterprise intranet. However, the proxy Home Agent and the Home Agent must use a signaling scheme that may or may not be proprietary depending on who implements such solution. Seamless secure mobility across all networks Page 11 of 19
12 At this time the proxy Home Agent is not yet standardized. Proxy Figure 9: Mobile IP with the proxy agent model Figure 10 shows the sequence needed for your client to connect from the outisde to the enterprise network when using the Mobile IP Proxy implementation. As shown in the figure there is an increased complexity of the communication that needs to take place between all the components involved to be able to reach the enterprise from the outside. Figure 10: Proxy Mobile IP solution access from the outside Seamless secure mobility across all networks Page 12 of 19
13 Figure 11 shows the sequence needed for your client to connect to the enterprise network when using the Mobile IP Proxy implementation and the client is on the inside. This case is a simpler case compared to reaching the enterprise network from the outside. The client becomes inactive and the overhead is not incurred for internal communication. Figure 11: Proxy Mobile IP solution access from the inside The solution provides the following advantages: Solves the seamless problem Little extra overhead The solution has the following disadvantages: Requires a new type of component (the proxy) Not yet standardized, probably implemented using proprietary protocols between proxy and Home Agent. Several components share control over same address range Requires careful design-in to maintain security Restricted deployment flexibility Seamless using existing, standard components Instead of introducing a new, not-yet-standardized network component that is likely to be implemented by various vendors with proprietary signaling protocols, Birdstep has developed and submitted a patent for a new generation Mobile IP client that can utilize legacy Mobile IP Home Agent components and eliminate the need for proprietary protocols. This solution is the foundation for Birdstep s mobility offering which solves the requirements described in the initial sections. To understand the new mobility solution from Birdstep, it is important to understand how the mobility solution solves the seamless mobile problem. This problem is simply how can a 3 rd party be turned on and off when the mobile unit moves between insecure internet connections and secure intranet connections without interrupting the connec ion. t The key to this solution is to establish two separate Mobile IP systems. Both mobility systems can be handled from a single client, and standard Mobile IP Home Agent components can be used on the Seamless secure mobility across all networks Page 13 of 19
14 server side. Note that there is no need for new network components such as the proxy Mobile IP Home Agent. The two mobility systems are isolated by the, ensuring security using the existing enterprise solutions. This solution represents a best-of-breed approach, where the two mobility systems take care of the following tasks: The internal ( on intranet) Mobile IP system mobilizes your application (using the advantages of the method described in Mobile IP inside model). The external ( on ) Mobile IP system mobilizes your (using the advantages of the method described in the overlaid Mobile IP model) Figure 12: Mobile IP using standard components Note that this solution requires a Mobile IP client software with dual system capabilities, which is the key feature of the Birdstep Universal mobility solution described below. For access to the enterprise intranet from the outside, figure 13 shows how the client and the two instances of the Mobile IP client operate. When the is in use, the external instance of the client communicates to the outside the intranet, while the internal instance of the client communicates through the to the internal. Mobile Node App. External Home Agent gateway Internal Home Agent TCP/IP Payload IP Figure 13: Protocol flow, outside access to enterprise intranet ( in use) For internal access within the intranet, the client becomes inactive, and the overhead is not incurred for internal communication (see figure 14.) Note that seamless handover can now be Seamless secure mobility across all networks Page 14 of 19
15 achieved across heterogeneous internal access networks in the enterprise intranet and the internal instance of the client is the only active element, the external instance of the client and the client are completely transparent. Internal Home Agent Mobile Node App. TCP/IP IP Payload Figure 14: Protocol flow, inside access to enterprise intranet ( not used) The most important characteristic of the dual- approach is that the two systems are completely isolated by the solution. Moreover, the solution is still in full control of all access to the. No changes are required to any infrastructure components such as agents, firewall rules or gateways. The solution provides the following advantages: Solves the seamless problem No specific design requirements Your solution is (still) in control of all external access High deployment flexibility The solution has the following disadvantages: Incurs minimum of extra overhead 5.3 Deployment and configuration In the following sections, we will discuss deployment alternatives for the new Mobile IP client, focusing on the configuration aspects of the client software such that enterprises or operators can enable mobility for their users without manual configuration steps required by such users. Seamless secure mobility across all networks Page 15 of 19
16 The Birdstep Intelligent Mobile IP version 2.0, Universal Edition focuses both on enterprise, and operators who want to provide a total mobility and security solution to enterprises. In the following sections, enterprise-controlled and operator-controlled universal mobility solutions are presented. These solutions differ in which entity provides the management of the Mobile IP Home Agent and the automatic Mobile IP client configuration Enterprise-controlled universal mobility solution In the enterprise-controlled universal mobility model, two Mobile IP Home Agents are used as shown in Figure 15. Note that one Home Agent () is placed on the where it can be reached from public networks, while another is placed on the enterprise. The enterprise controller is placed on the or integrated in the firewall. Enterprise Public Enterprise Config Handover Figure 15: Universal mobility model requires two Mobile IP Home Agents and is focused towards enterprise deployment. Enterprises want to offer their employees seamless roaming inside the premises to increase productivity. In addition, they want their employees to use the best and preferably lowest cost access when outside the enterprise. When the client terminal is attached to an intranet access network (e.g. wired LAN or LEAP-based WLAN), it registers itself with the intranet. When the client terminal is attached to an external access network (such as insecure or public WLAN, ADSL at home, GPRS or other public networks) it registers with the external. In this case, traffic generated within the enterprise network does not use and does not go through any concentrator. On the other hand, traffic generated from terminals connected to public networks goes through a tunnel to secure such traffic. Note that traffic is always tunneled through the Home Agents, be it the external or the internal. It is important that the Mobile IP is dimensioned according to the projected traffic volume. Seamless secure mobility across all networks Page 16 of 19
17 The typical user case for this package is an enterprise that wants to provide seamless mobility to its users when roaming seamlessly between GPRS, public WLAN and wired LAN. The following components are required in the central enterprise infrastructure: Two Mobile IP Home Agent s, a concentrator and a web server to provide configuration information to the clients (see configuration chapter), and the enterprise firewall. On the terminals, a client and the Birdstep Mobile IP Client, Universal Edition (version 2.0) is used Operator-controlled universal mobility solution Operators interested in providing a total solution to enterprises that do not have the internal staff/infrastructure/focus to do it themselves, but that require roaming as described above, can offer a universal mobility solution based on this package. In this case the operator assists the enterprise to setup the internal infrastructure and provides the profile information to be installed at the employee s workstations to allow roaming in the inside (on the enterprise network,) as well as on the outside (on the operator s owned public network.) The operator, in this case, provides the client configuration information to the enterprise. An example configuration of this scenario is shown in Figure 16. Enterprise Public Enterprise Config Handover Figure 16: Operator providing a managed mobility service for enterprises using the Mobile IP client, Universal edition A typical operator user-case for the Universal mobility package is an operator who provides a managed mobility service for enterprise customers. Seamless secure mobility across all networks Page 17 of 19
18 The operator may manage the enterprise intranet (if the enterprise chooses to allow such management). The operator manages the public and provide configuration for both s. (The operator may also manage the enterprise solution, but this is not required). The operator can now offer a managed mobility service providing seamless mobility between the enterprise LAN, operator GPRS/GSM and operator public WLAN hotspots. The following components are required in the central operator infrastructure: One Mobile IP Home Agent and a web server to provide configuration information to the clients (see configuration chapter). The following components are required in the enterprise infrastructure: One Mobile IP Home Agent, a firewall and a concentrator. On the terminals, a client and the Birdstep Mobile IP Client, Universal Edition (version 2.0) is needed. Note that this configuration can also be used for enterprises that subscribe to a public mobility from an operator, but want to configure the terminals themselves. In this case, the client configuration information is maintained by the enterprise. service 5.4 Automatic client configuration An important new feature of the Mobile IP client is automatic client configuration. Figure 17 outlines how the configuration server is used to remote configure the Mobile IP client. Configuration request Configuration reply Terminal with Birdstep Mobile IP client installed Config Mobile IP Web server Home Agent Config. file Mobile IP registration Figure 17: Automatic Mobile IP client configuration Note that the configuration server is a standard web server, where configuration files can be stored. The minimal requirement to this configuration server is that it provides HTTPS using Secure Socket Layers (SSL) or even plain HTTP. Configuration files can be stored in this web server. Seamless secure mobility across all networks Page 18 of 19
19 T he client downloads the configuration file specified in the configuration URL. Construction of the URL is implementation specific, but it should be possible to support a large number of configuration files base on one or more of the following parameters: Command line parameter User-specified URL path extension Username / password 6 Conclusion/Summary The new Universal Mobility solution from Birdstep solves the key issue of mobilizing your standard solution while turning it on only when the user is connecting from an external insecure network. In this way, the load on the concentrators and the Firewall network components are kept as low as possible. Since the existing solution can be utilized also for highly mobile workers, the investment in is protected, and existing security policies can be enforced. The enterprise can now use the best available solutions knowing that the Universal mobility solution can mobilize the of your choice. The Birdstep Intelligent Mobile IP Client, Universal Edition (version 2.0) represents a break trough in the development of a standard-based seamless solution. With the Birdstep Universal mobility solution, users are able to move seamlessly both between different internal networks, between different external access networks, and across the security boundary protected by and Firewall technologies. The is turned on or off as required. is turned on when public networks are used, and is turned off when the terminal is connected to the intranet. Very importantly, on/off feature depends only on existing standard-based components such as industry standard components, industry standard Mobile IP Home Agents together with the Birdstep IETF-standard based Mobile IP client. Using this architecture, you can rely on well-proven network components, and do not need any proprietary signaling between any of the components in the solution. Further more, large-scale deployment of Mobile IP is now possible using the standard-based web infrastructure of the operator or enterprise to automatically configure the client with no manual configuration steps needed by the end user. This feature enables the organization to quickly introduce seamless and secure mobility for their existing user base, without extra technical requirements to the end user. Please refer to our web pages for more detailed product information and fact sheets. Seamless secure mobility across all networks Page 19 of 19
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
WHITE PAPER. Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers)
WHITE PAPER Mobility Services Platform (MSP) Using MSP in Wide Area Networks (Carriers) Table of Contents About This Document... 1 Chapter 1 Wireless Data Technologies... 2 Wireless Data Technology Overview...
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
ewon-vpn - User Guide Virtual Private Network by ewons
VPN : what is it? A virtual private network (VPN) is a private communications network usually used within a company, or by several different companies or organizations, to communicate over a public network
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
White Paper. Telenor VPN
White Paper Telenor VPN Versjon 2.2 September 2006 Side 1 av 5 Table of contents 1 Short introduction... 3 2 Product information... 3 2.1 Mobile Data Access... 3 2.2 SMS Acess and SMS Bedrift... 4 2.3
Seamless Mobility over Broadband Wireless Networks
Seamless Mobility over Broadband Wireless Networks F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, T. Lunde Abstract A broadband wireless architecture with 802.11 (/WiFi) as a core coverage technology supported
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Secure Network Design: Designing a DMZ & VPN
Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Network Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
REMOTE ACCESS VPN NETWORK DIAGRAM
REMOTE ACCESS VPN NETWORK DIAGRAM HQ ASA Firewall As Remote Access VPN Server Workgroup Switch HQ-ASA Fa0/1 111.111.111.111 Fa0/0 172.16.50.1 172.16.50.10 IPSEC Tunnel Unsecured Network ADSL Router Dynamic
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
The term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
RAD-Series RADIUS Server Version 7.1
RAD-Series RADIUS Server Version 7.1 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication Authorization, and Accounting
Routing Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
Introduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Cisco AON Secure File Transfer Extension Module
Cisco AON Secure File Transfer Extension Module Product Overview Cisco Application-Oriented Networking (AON) products look simple a small hardware blade on a Catalyst switch, or a router, or a standalone
Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions
Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50
Question: 1 Which network security strategy element refers to the deployment of products that identify a potential intruder who makes several failed logon attempts? A. test the system B. secure the network
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks
An Experimental Study of Cross-Layer Security Protocols in Public Access Wireless Networks Avesh K. Agarwal Wenye Wang Department of Electrical and Computer Engineering North Carolina State University,
Opengear Technical Note
- Solutions for Avaya Installations Opengear Technical Note Jared Mallett - Product Marketing Manager Opengear solutions deliver cost-effective universal access to Avaya equipment and converged devices
Pre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
HMS Industrial Networks. Putting industrial applications on the cloud
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Steelcape Product Overview and Functional Description
Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session
Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering
Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute
Network Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Cisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Integrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
GPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
Device Provisioning in Cable Environments
A white paper by Incognito Software March, 2009 2009 Incognito Software Inc. All rights reserved. Page 1 of 8 Introduction... 2 Auto-Provisioning and Pre-Provisioning... 2 Components Involved in Device
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
Krishan Sabnani Bell Labs. Converged Networks of the Future
Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Configuring High Availability for Embedded NGX Gateways in SmartCenter
Configuring High Availability for Embedded NGX Gateways in SmartCenter February 2008 Active and Passive Gateway States Contents Introduction...1 High Availability Basics and Terminology...2 Active and
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
