SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS
|
|
|
- Oswin Jenkins
- 10 years ago
- Views:
Transcription
1 SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS AUDIENCE Data networks consultants, Network architects, designers and administrators/ managers, Systems Integrators (SI) and networks integrators and implementers, Data networks service providers, Networks and data security personnel interested in highly secure network virtualization technologies for government and enterprise applications. CIOs, CTOs, CSOs and CFOs, IT personnel planning networks dependent solutions, such as Cloud Computing, data centers and Big Data. KEY WORDS AND TERMS Avaya, SPB, Fabric Connect, Network Virtualization, network data protection, network security, network data security, Senetas, Senetas security, Senetas encryption, encryption, Shortest Path Bridging, IEEE 802.1aq, Ethernet encryptor, Ethernet encryption. 1
2 Secure Avaya Fabric Connect Solutions with Senetas THIS DOCUMENT DESCRIBES GOVERNMENT CERTIFIED ETHERNET ENCRYPTION SOLUTIONS FOR DATA NETWORKS INCORPORATING AVAYA S SPB FABRIC CONNECT TECHNOLOGY (IEEE 802.1AQ)) AND SENETAS CERTIFIED HIGH-SPEED ENCRYPTORS. WITH THE ADVENT OF NETWORK VIRTUALIZATION FOR THE DATA CENTER, CAMPUS LANS AND NOW WIDE AREA NETWORKS, THE USE OF SENETAS CN ENCRYPTORS ADDRESSES SERIOUS DATA SECURITY CONCERNS FOR GOVERNMENT AGENCIES AND LARGER CORPORATE ENTERPRISES, ARE THE RISKS TO DATA BEING TRANSMITTED OVER PUBLIC NETWORKS. OVERVIEW Now that Ethernet is everywhere as an underlying data network infrastructure, it has also extended its reach to Wide Area Networks (WANs). This has seen a change from ATM and Frame Relay based services to Ethernet and IP based network services. Further, with the increased use of network virtualization technologies, and customers need for greater speed and flexibility, service providers now offer Layer 2 Ethernet services in the form of Pseudo-wires, E-Line and VPLS services. Regardless of the underlying network transport type, one issue that must be addressed for government, commercial, industrial, military and defence organisations alike is the robust protection of data while it is transmitted over public networks infrastructure. This may be either local shared media or through a service provider networks across a Metro area or WANs. Avaya has formed a technology alliance with Senetas developer and manufacturer of market-leading government certified Layer 2 Ethernet encryptors. Senetas multi-certified high-speed encryptors provide data transmitted over SPB Fabric Connect network solutions using public infrastructure in the MAN and WAN (or anywhere) with robust defence-grade encryption security Importantly, Senetas encryptors provide Fabric Connect network transmitted data maximum protection without compromising network performance. Senetas encryptors have no impact on other network assets; do not add data overheads; and are easily implemented through set-and-forget technology. 2
3 THIS DOCUMENT This joint Senetas and Avaya Technical-Paper provides details of the Secure Fabric Connect networks solution and successful lab testing completed using Senetas certified Ethernet encryptors with an Avaya Fabric Connect networks solution. The document will be of interest to those responsible for investigating new and updated data networks and the security of sensitive data being transmitted across these networks. ABOUT SENETAS Senetas is an Australian company with a rich history in the development of certified hardware encryption technologies from ATM and SONET/SDH encryptors, to current line-rate Ethernet encryptors. Senetas encryptors are the only products of their type certified by the four leading independent, international government testing authorities as suitable for government and defence use - FIPS140-2 level 3, Common Criteria (up to EAL4+), NATO and CAPS. Recognized as the leading encryptors of their type, Senetas encryptors are used by governments; defense, military, law enforcement and regulatory agencies; financial institutions; Cloud Computing and data center service providers; telecommunications carriers and a broad range of commercial and industrial organizations in more than 30 countries. Senetas certified encryptors protect data across a wide range of network topologies from complex meshed to simple point-to-point networks. Senetas Layer 2 encryptor technology ensures maximum data protection without compromising network performance through their designed-in ultra-low-latency and zero network impact. They are also set-and-forget simple to install and manage. 3
4 SENETAS ETHERNET ENCRYPTORS Senetas encryptors are purpose-built hardware accelerated appliances that provide data confidentiality and authentication at wire speed across local, metro or wide area Ethernet networks. Developed for network data transport at layer 2 there are no restrictions on the number of hops, intermediate nodes or service provider networks that may be protected. Senetas encryptors use of FPGA (Field Programmable Gate Array) technology enables maximum performance and operational flexibility. Network traffic may be secured at 100% line rate with no loss of performance; latency is near zero and deterministic due to the cutthrough processing architecture (approximately 9uS per device independent of frame size or traffic type). Ethernet traffic is protected using industry standard algorithms that include AES-GCM-256, RSA & ECC public key cryptography and X.509 certificates. Senetas encryptors may be implemented with customized, customer requested algorithms (Custom Algorithms). Selected Senetas encryptors also support Quantum Key Distribution. Configuration may be performed locally or remotely through the intuitive Senetas CM7 management software that acts as the Certificate Authority in a network of encryptors by signing and distributing X.509 certificates. The Senetas CN4000 and CN6000 encryptor series (examples shown below) support Ethernet interfaces from 1Gbps (RJ-45 & SFP) to 10Gbps (XFP) with flexible licensed options from 10Mbps to 10Gbps. All Senetas CN encryptors operate with near zero latency and cut-through forwarding whilst providing encryption policies to encrypt Unicast, Multicast and Broadcast traffic over Ethernet point-to-point, hub and spoke and full meshed network environments (refer to online data sheets for detailed product technical information). CN4010 1Gbps Certified encryptor CN Gbps Certified encryptor 4
5 A SECURE SPB FABRIC CONNECT SOLUTION Avaya s standards based SPB Fabric Connect solution (IEEE 802.1aq) is based on Layer 2 Ethernet technology as a foundation in building virtualized data networks for the Data-Centers, Campus LANs, MANs and WANs. To provide secure SPB-based Fabric solutions, Avaya has partnered with Senetas to address the protection of data over Ethernet Fabric node inter-connections without compromising networks performance and the end user experience. The solution is aimed at the needs of government and larger enterprise organizations requiring certified defencegrade encryption technology. Avaya has conducted its own rigorous testing using Senetas CN6000 series encryptors with an Avaya SPB Fabric Connect network to prove that layer 2 encryption solutions fully operate with Avaya s SPB-based network virtualization technology. Senetas encryptors performed seamlessly, as if transparent to the Fabric network. The following sections provide details of the lab setup and testing conducted to illustrate an encrypted SPB Fabric Connect solution with Senetas Ethernet encryptors. The Test Components The Avaya switches and Senetas encryptors used in the test scenarios: VSP7024XL Software version VSP4850GTS Software version ERS4850GTS Software version CN6010 (1Gbps) Software version SECURE SPB FABRIC CONNECT TEST DETAILS Avaya Fabric Connect: The Fabric Connect lab-test solutions were set up to validate the most common forms of WAN solutions in use today, such as point-to-point Ethernet services between two sites, point-to-point among multiple sites. Additionally, testing validated operation over a point-to-multipoint Ethernet WAN solution using an Ethernet VLAN based core to emulate a hub and spoke topology or Layer 2 Ethernet VPN/VPLS based service. These topologies were set up and tested to leverage the Senetas support of point-to-multipoint layer 2 encryption among simulated sites. The VSP7000 and VSP4000 series switches in all cases were used as Backbone Edge Bridges (BEBs) terminating Layer 2 Virtual Service Networks. ERS4800 switches frontending the VSP BEB switches were used to provide an SPB NNI hub and spoke function to present a single site interface to the Ethernet encryptor and Carrier interface. All Ethernet links in the lab test solutions were set to 1Gbps speed for ease of testing. 5
6 Senetas Ethernet encryptors: Senetas provided CN6010 Ethernet encryptors with Ethernet ports set to 1Gbps speed and in all tests were placed on the SPB fabric side of the BEB (inside) to simulate acting as vcustomer equipment. Senetas Ethernet encryptors are designed to seamlessly connect in-line in the physical communications path of an existing network (in-port and out-port). Encryption may be applied to all traffic or selected traffic types forming point-to-point encrypted connections over the physical infrastructure (such as public fiber or WAN). Several operating modes are configurable depending on the customer solution requirements driven by the infrastructure type or carriage being used to transport data between sites. These modes are: > > LINE mode encryption: ALL traffic is bulk encrypted regardless of Ethernet source or type (typically used in point to point dark fiber solutions where there is no active intermediate equipment in use). > > VLAN mode encryption: Encryption is based on selected VLAN ID s (after Q-Tag), ranges and Ether-Types etc. VLAN mode is the most common mode used. Avaya recommends using VLAN mode with its Fabric Connect solutions. > > MAC mode encryption: Source/Destination MAC Address based encryption. In all modes, encryption policy may also be set by Ethertype (protocol) and by traffic address class (unicast, multicast or broadcast). Traffic policy options are: discard, bypass or encrypt. LAB-TESTED SOLUTIONS Scenario 1: Point to Point links - Test 1A - VLAN mode (no VLACP) This first test scenario was performed to simulate two sites inter-connected with SPB over a point to point public infrastructure / Carrier Service incorporating Senetas Ethernet encryptors running in VLAN mode, located between the SPB nodes and the Layer 2 service. The intermediate service may be any of the following: Dark fiber, Optical channel, Pt-Pt Ethernet service; Pseudo wire, E-Line, E-VPLS or VLAN based. Backbone VLAN ID s 4051 & 4052 Encrypted and all other traffic blocked. No VLACP in this configuration. SPB adjacencies between BEBs form as expected. Single C-VLAN (VID 998) configured on each switch and mapped to a Layer 2 VSN (ISID ) between VSP7000 and VSP4000 BEB switches. Client PC s configured in one IP subnet communicating through BEB C-VLANs across Layer 2 VSN. Logical setup: Physical setup: Test 1A note: Continuous ping running between PC-A and PC-B across point to point SPB link. Removal of link 1/23 (link fail test) results in IS-IS timers detecting link failure at far/opposite side, after approximately 40 seconds (for BEB-AS001). 6
7 Test 1B VLAN mode with VLACP Similar to Test 1A, now with VLACP heartbeat configured between BEB switches. Backbone VLAN ID s 4051 & 4052 (tagged), and all untagged traffic in separate encrypted tunnels. SPB adjacencies between BEBs form as expected. VLACP heartbeat configured between BEB-DS002 interface 1/23 and BEB-AS001 interface 1/50. Senetas Ethernet encryptors configured to place untagged traffic in separate encrypted tunnel. Untagged VLACP heartbeat traffic between BEB s used for end to end fast link failure detection. Test 1B note: Continuous Ping running between PC-A and PC-B across point to point SPB link. Removal of link 1/23 (link fail test) results in VLACP timers detecting link failure within approximately 3 seconds. Test 1C MAC mode with VLACP With Senetas encryptors set to MAC mode, separate encrypted tunnels must be created for Multicast MACs, VLACP and Ether-Types to ensure SPB control plane protocols function correctly. SPB adjacencies between BEBs form as expected. Auto discovery was enabled on the encryptors to allow the multicast connections to be automatically learnt and established across the link, this removed the need to manually configure the encrypted connections for all multicast addresses. Test 1C note: As with Test 1B, continuous Ping running between PC-A and PC-B across point to point SPB link. Removal of link 1/23 (link fail test) results in VLACP timers detecting link failure within approximately 3 seconds. Scenario 2: Point to Multipoint links - Test 2A - VLAN mode (no VLACP) Scenario 2 tests were performed to simulate 3 sites with SPB links over a VLAN based carrier service incorporating Senetas Ethernet encryptors running in VLAN mode. ERS4800 s in front of each VSP4k/7k are used as switched UNI devices to combine the separate NNI interface B-VLANs from each BEB over a single physical interface presented to the carrier VLAN service. The Senetas encryptors are placed inline between the ERS4800 s and the carrier interface (NTU). ERS4800 s are used provide SPB NNI hub-and-spoke capability in front of each VSP4k/7k. The ERS4800 switched UNI capability translates each B-VLAN into a unique VLAN and combines the separate NNI interfaces from each BEB over a single physical tagged interface to be presented to the carrier VLAN service. The Senetas Ethernet encryptors are placed inline between the ERS4800 s and the carrier interface (NTU). 7
8 Physically, each site is connected to the carrier service in a point to multipoint configuration via the ERS4800 s. However, logically to the BEB nodes, the SPB adjacency connections are point to point as follows: > > BEB-DS002 to BEB-AS001 > > BEB-AS001 to BEB-AS002 > > BEB-AS002 to BEB-DS002 Backbone VLAN ID s 4051 & 4052 on each BEB node NNI interface are remapped through each ERS4800 to corresponding core VLANs emulating a VLAN based carrier service function. Refer to VLAN mapping tables for test configuration detail. Single C-VLAN (VID 998) is configured on each switch and mapped to a Layer 2 VSN (ISID ) between VSP7000 and VSP4000 BEB switches. Client PC s are configured in one IP subnet communicating through BEB C-VLANs across the Layer 2 VSN. Logical setup: Physical setup: VLAN mapping: 8
9 LAN operation: Test 2A note: Continuous ping running between PC-A and PC-B across point to point SPB link. Removal of link 1/23 on BEB-DS002 (link fail test) results in IS-IS timers detecting an adjacency failure at far/opposite side, after approximately 40 seconds (for BEB-AS001). This is just for the SPB adjacency leg between BEB-DS002 and BEB-AS001. Removing other links; such as interface link 1/19 on BEB-DS002; then fails the SPB adjacency leg to BEB-AS002. Similarly, removing interface link 1/48 on BEB-AS001 fails the SPB adjacency leg to BEB-AS002. Test 2B - VLAN mode with VLACP This test was performed to simulate 3 sites with SPB links over a VLAN based carrier service incorporating Senetas Ethernet encryptors in VLAN mode with VLACP configured between BEB switches for enhanced link monitoring and recovery. VLACP heartbeat is untagged on each separate NNI interface between each BEB node and is passed through the carrier VLAN service within a separate VLAN for each end-toend instance. This is achieved using the ERS4800 (performing the switched UNI function) to encapsulate all untagged traffic into a VLAN with the port connected the BEB node operating in UntagPvidOnly mode. Refer to VLAN mapping and BVLAN & VLACP operation diagrams. Similar to Test 2A, each tagged VLAN is in a separate encrypted tunnel and additionally now all untagged traffic (for VLACP) is contained within a separate encrypted tunnel. SPB node adjacencies between BEBs form as expected. Physical setup: 9
10 VLAN mapping: BVLAN & VLACP operation: Test 2B note: Continuous ping running between PC-A and PC-B across point to point SPB link. Removal of link 1/23 on BEB-DS002 (link fail test) results in VLACP timers detecting an adjacency failure at far/opposite side, after approximately 3 seconds (for BEB-AS001). This is just for the SPB adjacency leg between BEB-DS002 and BEB-AS001. Removing other links; such as interface link 1/19 on BEB-DS002; then fails the SPB adjacency leg to BEB-AS002. Similarly, removing interface link 1/48 on BEB-AS001 fails the SPB adjacency leg to BEB-AS002. TEST RESULTS AND SUMMARY In summary, the test results proved the secure SPB Fabric Connect solution security and network performance. The main purpose for conducting these tests was to validate the control and data plane operation of an SPB Fabric Connect environment with Senetas Layer 2 Ethernet encryptors for data protection over public network infrastructure. Data protection and encryption is critically important, as too is network performance and the user experience - to government agencies and large enterprises including financial institutions for their communication networks that span public infrastructure over a Metro and Wide Area Networks. The tested configurations were based on common data network deployments incorporating varying designs currently in use and Layer 2 Ethernet based carrier services available to customers for WANs. Other tests of additional SPB solutions and encryption configurations continue. 10
11 ADDITIONAL CONSIDERATIONS While not yet officially tested by Avaya, a number of other secure SPB configurations are supported provided that direct IP forwarding and routing are not required through the Senetas Layer 2 Ethernet encryptors between BEB/BCB nodes. For example: IP Shortcuts and Layer 3 VSN s may operate over an SPB fabric core with Senetas Layer 2 encryptors configured to look at VLAN Q-Tags (specifically the backbone- VLANs) and Ethertype of the frames. As SPB MAC-in-MAC encapsulation has been applied before traffic reaches the encryptor, any Layer 3 function using SPB will also traverse the Layer 2 encrypted link. This includes native IP routing over IS-IS (IP shortcuts) and Layer 3 VRF to I-SID mapping. SECURE SPB FABRIC CONNECT SOLUTION BENEFITS The benefits of deploying Senetas CN series Ethernet encryptors with Avaya s Fabric Connect solutions include: > > Government certified Ethernet encryption hardware over public and service provider network infrastructure. > > Seamless interoperability inside an IEEE 802.1aq Shortest Path Bridging, Fabric Connect network infrastructure. > > Line rate encryption performance from 10Mbps up to 10Gbps Ethernet speeds with near zero traffic latency and no impact on other network assets. > > Support for secure Layer 2 point-to-point (Ethernet Pseudo-Wire, E-LINE, E-VPLS) or pointto-multipoint Ethernet VPLS, VPN services using Senetas Ethernet encryptors. > > Scalable encryption solution to match large Fabric Connect network solutions across the WAN. > > Flexible group key management of via Senetas PKI interface. SOLUTIONS ROADMAP Avaya and Senetas are developing an enhancement for Senetas Ethernet encryptors to recognize SPB I-SIDs and to encrypt traffic based on I-SID number. This solution will be available Q INTEROPERABILITY Although Avaya VSP4000, VSP7000 and ERS4800 products were used in this initial testing, Senetas encryptors will work equally with other Avaya data networking products that support SPB Fabric Connect capability. CONCLUSION Senetas Layer 2 Ethernet encryptors provide a seamless operational synergy with Avaya s Fabric Connect, SPB-based network virtualization technology. When Senetas Ethernet encryptors are used to secure an Avaya Fabric Connect solution incorporating the use of public network infrastructure, they provide government certified protection of customer network transmitted data traffic while maintaining all the benefits of implementing a fabric network solution. Furthermore, there are no adverse impacts on network performance, other network assets or implementation and on-going network management. 11
ETHERNET ENCRYPTION MODES TECHNICAL-PAPER
1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL
Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED TO PROTECT
Shortest Path Bridging IEEE 802.1aq Overview
Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT
Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR SENETAS CERTIFIED HARDWARE ENCRYPTORS ARE TRUSTED BY S IN MORE THAN 20 COUNTRIES TO PROTECT SENSITIVE
How To Make A Network Cable Reliable And Secure
ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1
SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL
SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL Senetas certified hardware encryptors are trusted by market leading commercial and industrial organisations around the world to protect
VXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
TRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: [email protected] Tel: 0041-798658759 Agenda 1 TRILL Overview
Avaya VENA Fabric Connect
Avaya VENA Fabric Connect Executive Summary The Avaya VENA Fabric Connect solution is based on the IEEE 802.1aq Shortest Path Bridging (SPB) protocol in conjunction with Avaya extensions that add Layer
WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter
WHITEPAPER VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter The Holy Grail: Achieving Simplicity and Control in the IT Infrastructure Today s Information Technology decision-makers
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and
SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
Virtual Private LAN Service
Virtual Private LAN Service Authors Kireeti Kompella, Juniper Networks, 1194 N Mathilda Avenue, Sunnyvale, CA 94089, USA E-mail : [email protected] Jean-Marc Uzé, Juniper Networks, Espace 21, 31 Place
WAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
Metro Ethernet Services
CHAPTER 6 Metro Ethernet Service Framework This chapter describes the typical available from service providers (SPs). For the most part, these services are derived from and map to the following Metro Ethernet
The Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
High Speed Encryption Made in Germany
High Speed Encryption Made in Germany Today s Trends in Network Encryption 2 Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption
Overview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE
HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE CRITICAL NATIONAL INFRASTRUCTURE The UKs national infrastructure is defined by Government as those facilities, systems, sites
Vocus Layer 2 Ethernet Services
Vocus Layer 2 Ethernet Services Best in Class, Point to Point and Point to Multi Point Services Vocus Layer 2 Point-to-Point and Point-to-Multipoint Ethernet services are best in class carrier grade services.
Innovation in Access and Metropolitan Area Networks -
Innovation in Access and Metropolitan Area s - Combining Ethernet and MPLS By Jim Metzler SPONSORED BY: K ubernan Guiding Innovation Innovation in Access and Metropolitan Area s - Combining Ethernet and
UNDERSTANDING BUSINESS ETHERNET SERVICES
UNDERSTANDING BUSINESS ETHERNET SERVICES EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more
UNDERSTANDING BUSINESS ETHERNET SERVICES
EMPOWER YOUR BUSINESS TO MEET 21ST CENTURY DEMANDS INTRODUCTION The network is your business has been a mantra for many years indicating how businesses rely more heavily on being networked between their
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems
for Service Provider Data Center and IXP Francois Tallet, Cisco Systems 1 : Transparent Interconnection of Lots of Links overview How works designs Conclusion 2 IETF standard for Layer 2 multipathing Driven
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
ethernet services for multi-site connectivity security, performance, ip transparency
ethernet services for multi-site connectivity security, performance, ip transparency INTRODUCTION Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished
Next-Gen Securitized Network Virtualization
Next-Gen Securitized Network Virtualization Effective DR and Business Continuity Strategies Simplify when the lights go out www.ens-inc.com Your premiere California state government technology provider.
APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NETWORK SECURITY.
IN CONTROL AT LAYER 2: A TECTONIC SHIFT IN NWORK SECURITY. WHO SHOULD READ THIS WHITE-PAPER: NWORK ARCHITECTS / MANAGERS, DATA SECURITY MANAGERS, CIOs, CSOs. EXECUTIVE SUMMARY Network hacking and corporate
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
White Paper: Carrier Ethernet
White Paper: Carrier Ethernet Activity and Task: JRA1 T1 Target Audience: NREN technical networking specialists Document Code: Authors: J. Kloots (SURFnet), V. Olifer (JANET) Acknowledgement: The research
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
Carrier Class Transport Network Technologies: Summary of Initial Research
Carrier Class Transport Network Technologies: Summary of Initial Research This document is a summary of the JRA1 Task 1 Carrier Class Transport Network Technologies deliverable [DJ1.1.1], which presents
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
WHITE PAPER. Network Virtualization: A Data Plane Perspective
WHITE PAPER Network Virtualization: A Data Plane Perspective David Melman Uri Safrai Switching Architecture Marvell May 2015 Abstract Virtualization is the leading technology to provide agile and scalable
Provider Backbone Transport
Provider Backbone Transport David Allan Paul Bottorff Dinesh Mohan Alan McGuire [email protected] [email protected] [email protected] [email protected] Agenda > Motivation > Problem statement > What
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心
Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心 1 SDN Introduction Decoupling of control plane from data plane
Testing Edge Services: VPLS over MPLS
Testing Edge Services: VPLS over MPLS White Paper Introduction Virtual Private LAN Services (VPLS) is an emerging technology for transparently connecting corporate LANs over the Internet so they appear
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea ([email protected]) Senior Solutions Architect, Brocade Communications Inc. Jim Allen ([email protected]) Senior Architect, Limelight
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Extending Networking to Fit the Cloud
VXLAN Extending Networking to Fit the Cloud Kamau WangŨ H Ũ Kamau Wangũhgũ is a Consulting Architect at VMware and a member of the Global Technical Service, Center of Excellence group. Kamau s focus at
Cisco ASR 9000 Series: Carrier Ethernet Architectures
Cisco ASR 9000 Series: Carrier Ethernet Architectures The initial phase of network migrations in the past several years was based on the consolidation of networks over the IP/Multiprotocol Label Switching
Network Virtualization
Network Virtualization Using Shortest Path Bridging and IP/SPB Table of Contents Section 1: Introduction...1 Section 2: Benefits of Shortest Path Bridging...3 2.1 Network Service Enablement...3 2.2 Time
How To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
Resilient Metropolitan Area Networks
Resilient Metropolitan Area Networks t. 902.442.1540 f. 902.442.1559 w. www.internetworking-atlantic.com 1 Resilient Metropolitan Area Networks Technologies for wide area network (WAN) and metropolitan
Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail [email protected] Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
Product Presentation L2 MPLS Services. Aircel Business Solutions
Product Presentation L2 MPLS Services Aircel Business Solutions Aircel Business Solutions o GSM Service provider with license to operate in 23 telecom circles of India o 20Million+ subscribers in India
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
VMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking
TECHNOLOGY WHITE PAPER Enhancing Converged Data Networks with, Frame Relay and Ethernet Interworking Virtual Private Networks (VPN) are a popular way for enterprises to interconnect remote sites. Traditionally,
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
TrustNet Group Encryption
TrustNet Group Encryption Executive Summary Protecting data in motion has become a high priority for a growing number of companies. As more companies face the real and growing threat of data theft, along
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
LoopStar 700. Next Generation Ethernet Access and Transport Solutions
LoopStar 700 Next Generation Ethernet Access and Transport Solutions The LoopStar 700 Product Family The LoopStar 700 product family delivers all efficiently consolidate all services onto a the features
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Resiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen [email protected] Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
CORPORATE NETWORKING
CORPORATE NETWORKING C. Pham Université de Pau et des Pays de l Adour Département Informatique http://www.univ-pau.fr/~cpham [email protected] Typical example of Ethernet local networks Mostly based
Layer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study
Driving Ethernet Deeper Ethernet Business Services over DOCSIS COX New Orleans (NOLA) Case Study Kashif Islam, Technical Leader Cisco Carlos Sanchez, Systems Engineer Cisco Edward Kerner, Network Engineering
Data Center Networking Designing Today s Data Center
Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability
MPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
The Role of Carrier Ethernet in Business Applications
The Role of Carrier Ethernet in Business Applications Examining the Choices for your Business Applications February 2012 Positioning Paper Page 1 of 11 Table of Contents 1 Introduction... 3 2 Characteristics
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies
Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies Reaching a Balance Between Communications and Security
