Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer



Similar documents
High Speed Ethernet WAN: Is encryption compromising your network?

High speed Ethernet WAN: Is encryption compromising your network?

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

High Speed Encryption Made in Germany

Virtual Privacy vs. Real Security

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

GigaVUE-420. The Next Generation. Data Access Switch. Gigamon Systems. Intelligent Data Access Networking

Layer 3 Network + Dedicated Internet Connectivity

Carrier Ethernet: New Game Plan for Media Converters

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

network infrastructure: getting started with VoIP

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Net Optics Learning Center Presents The Fundamentals of Passive Monitoring Access

Region 10 Videoconference Network (R10VN)

Application Note Gigabit Ethernet Port Modes

Gigabit Multi-Homing VPN Security Router

VLANs. Application Note

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

Introduction. Technology background

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Table of Contents. Network Critical NA LLC Tel: Franklin Street, Suite

WAN Optimization. Riverbed Steelhead Appliances

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

Deploying Silver Peak VXOA with EMC Isilon SyncIQ. February

V310 Support Note Version 1.0 November, 2011

Smart Solutions for Network IP Migration

Please purchase PDF Split-Merge on to remove this watermark.

WAN Failover Scenarios Using Digi Wireless WAN Routers

SSVP SIP School VoIP Professional Certification

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

How To Secure My Data

Leased Line + Remote Dial-in connectivity

WAN and VPN Solutions:

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Affording the Upgrade to Higher Speed & Density

Central Office Testing of Network Services

Improving Quality of Service

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

Secure Network Access Solutions for Banks and Financial Institutions. Secure. Easy. Protected. Access.

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Networking Devices. Lesson 6

Understanding VLAN Translation/Rewrites using Switches and Routers

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Demonstrating the high performance and feature richness of the compact MX Series

Fail-Safe IPS Integration with Bypass Technology

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

ADVANCED NETWORK CONFIGURATION GUIDE

John Ragan Director of Product Management. Billy Wise Communications Specialist

NetTESTER Embedded 'Always-On' Network Testing & In-Service Performance Assurance

SSVVP SIP School VVoIP Professional Certification

Ethernet Link SGI-2424

TrustNet Group Encryption

How To Get More Bandwidth From Your Business Network

Computer Networks Vs. Distributed Systems

November Defining the Value of MPLS VPNs

IP Telephony Management

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET

White paper. Reliable and Scalable TETRA networks

Magnum Network Software DX

Cisco Bandwidth Quality Manager 3.1

APPENDIX 3 LOT 3: WIRELESS NETWORK

Portable Wireless Mesh Networks: Competitive Differentiation

How To Configure Voice Vlan On An Ip Phone

Cisco SLM Port Gigabit Smart Switch Cisco Small Business Smart Switches

Fundamentals of MPLS for Broadcast Applications

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

Security Design.

ALL-ZC-2140P-DVI PCoIP Zero Client Overview

Cisco SLM Port Gigabit Smart Switch Cisco Small Business Smart Switches

Elfiq Networks Vital for Hospitality

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

"Charting the Course...

Networking 4 Voice and Video over IP (VVoIP)

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Network Design. Yiannos Mylonas

PREPARED FOR ABC CORPORATION

Fibre Channel over Ethernet in the Data Center: An Introduction

Transcription:

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical illusion Todays Agenda Fibre is safe so why should I Encrypt? Corporate/Campus networks Layer 2 or a Layer 3 implementation and why? What commercial certified solutions are available? What UK certified Government solutions are available?

Network Security Truth or Fiction? Ethernet is inherently secure? Fiber is not tap-able? MPLS is protected and therefore secure? Carriers are required to alert you in the event of a network breach? Humans are responsible for configuring your network

Fibre is safe so why should I Encrypt? Corporate and government espionage is real and set to intensify, with high profile fibre tapping cases, such as UK s GCHQ extensive fibre tapping becoming public news. GCHQ.. had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time... each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day. Source: Guardian Newspaper June 2013

Fibre is safe so why should I Encrypt? BBC security correspondent Gordon Corera says the Guardian is not accusing GCHQ of breaking the law but it does suggest the existing legislation is being very broadly applied to allow such a large volume of data to be collected. OK, so Governments routinely legally tap fibre but surely only governments are in a position to do this, no one else could, could they? Eavesdropping On Fibre Is Not Trivial - But it can be done! Fibres emit light which can be detected Some small signal attenuation (insertion loss <= 3dB) but risk of detection is low

Simple example of a tapping device Clip on clamping device Around 300 *Sandra Kay Millar Information Security Magazine

Layer 3 Enterprise Network Architecture Operations Center DR Location Layer 3 Transport Sub Net 1,3 WAN Ethernet Router IPSec Encryptor Gateway Headquaters Sub Netted LAN 1,2 Carrier NTU s Sub Net 2,3 Traditional and Legacy Campus/Enterprise networks typically utilise layer 3 design, with store and forward, subnetted QoS traffic and would use IPSec to encrypt the sensative traffic. 7

Layer 3 Enterprise Network Architecture Operations Center DR Location Layer 3 Transport VLAN 1,3 Layer 2 Encryptor Network VLAN Switch Headquaters VLAN 1,2 Carrier Edge Switch VLAN 2,3 Modern Campus/Enterprise networks typically utilise layer 2 design, with fast silicon hardware based VLAN switches used to separate network paths, layer 2 encryptors are used to secure sensitive data. 8

Securing a L3 verses L2 Network Layer 3 Cost and Performance Requires extra memory/blades in each router/vpn Gateway Causes loss of performance due to extra CPU overhead. Loss of throughput Layer 3 IPSec reduces throughput by as much as 40% for small packets (64 Bytes). Increased fragmentation on large packets. Higher ongoing costs associated with IPSec key management Locked into Network Vendor Layer 2 Cost and Performance Separation of duties Let the network VLANs Switches do there job at wire speed Let the encryptors do their job at wire speed Bump in the wire cut through device full bandwidth utilisation Dedicated device no CPU overhead counts required. No vendor lock in Zero packet expansion in CFB mode CTR mode adds1 byte shim/32frames GCM mode adds a 16 byte shim Very low latency FPGA used to encrypt frame.

Securing a Layer 2 Network Layer 2 Cost and Performance Separation of duties Let the network VLANs Switches do there job at wire speed Let the encryptors do their job at wire speed Bump in the wire cut through device full bandwidth utilisation Dedicated device, therefore no CPU overhead counts required. Zero packet expansion in CFB mode CTR mode adds1 byte shim/32frames GCM mode adds a 16 byte shim Very low latency FPGA used to encrypt frame. Security Policy against MAC address or VLAN ID Encryptor is a cut through design, encrypted frame is transmitted even before whole frame received. Dedicated inband Management. Tamper proof certified Cryptographic device.

Throughput (Mbps) Latency (µs) Improved Performance Typical Network traffic Profile 1000 900 800 700 600 500 400 300 Throughput: Ethernet Encryption vs IPSec 64 128 256 512 1024 1280 1420 Frame Size (Bytes) Ethernet Encryption IPSec Encryption with GRE Latency: Ethernet Encryption vs IPSec 400000 350000 300000 250000 200000 150000 100000 50000 0 64 128 256 512 1024 1280 1420 Frame Size (Bytes) Typical Router with IPSec Ethernet Encryption Ethernet Encryption at Layer 2 offers in excess of 2x Better Bandwidth Efficiency and 5x Better Speed Source: Rochester Institute of Technology

Layer 2 Network Encryption where safety is not an optical illusion With proven reliability, high throughput, and low latency, network encryption security devices ensure safety is not an optical illusion. CC and FIPS certifications CN6040 Ethernet Fibre Channel CN6100 Ethernet CAPS CN1000 Ethernet CN3000 Ethernet

A Quick Glance SafeNet CC and FIPS certified Dedicated High Speed Encryption Appliances Model Speeds Protocols Size Pricing Scalable - From 100Mps to 10Gps Ethernet; Fiber Channel; SONET/SDH; E1/T1 19 1U Flexible Pay as you grow

CN6000 Series SafeNet CC and FIPS certified Dedicated High Speed Encryption Appliances Model CN6040 eth Scalable - From 250Mbps to 1Gbps Certifications CC EAL2+ and FIPS 140-2 Level 3 Size Central Management Dual PSU options Network Access Ports Management Connections 19 1U CM7 with integrated CA or external PKI certs AC or DC dual integrated PSU and Fan tray SFP or integrated Copper Local/Network ports 10/100Mbps Eth, CLI, USB and front panel buttons

CN6000 Series SafeNet CC and FIPS certified Dedicated High Speed Encryption Appliances Model CN6040 FC 1/2/4 Gbps Certifications CC EAL2+ and FIPS 140-2 Level 3 Size Central Management Dual PSU options Network Access Ports Management Connections 19 1U CM7 with integrated CA or external PKI certs AC or DC dual integrated PSU and Fan tray SFP or integrated Copper Local/Network ports 10/100Mbps Eth, CLI, USB and front panel buttons

CN6000 Series SafeNet CC and FIPS certified Dedicated High Speed Encryption Appliances Model CN6100 eth Scalable - From 1Gbps to 10Gbps Certifications CC EAL2+ and FIPS 140-2 Level 3 Size Central Management Dual PSU options Network Access Ports Management Connections 19 1U CM7 with integrated CA or external PKI certs AC or DC dual integrated PSU and Fan tray Front access XFP Local/Network ports 10/100Mbps Eth, CLI, USB and front panel buttons

CN1000/3000 Series SafeNet CAPS certified Dedicated High Speed Encryption Appliances Model CN1000 eth Certifications Size Central Management PSU options Network Access Ports Management Connections Scalable - From 100Mbps to 1Gbps CAPS Baseline IL3 19 1U CM7 requires external entropy from UKKPA AC Rear access SFP and Copper Local/Network ports 10/100Mbps Eth, CLI, USB and front panel buttons

CN1000/3000 Series SafeNet CAPS certified Dedicated High Speed Encryption Appliances Model CN3000 eth Certifications Size Central Management PSU options Network Access Ports Management Connections Scalable - From 1Gbps to 10Gbps CAPS Baseline IL3 19 3U CM7 requires external entropy from UKKPA Dual AC redundant supplies Rear access XFP Local/Network ports 10/100Mbps Eth, CLI, USB and front panel buttons

Have it all with SafeNet SafeNet high speed Layer 2 encryption technology = Zero protocol overhead for maximum bandwidth Up to 50% more efficient than competing technologies Fastest network encryption available, operating at true line speed, full duplex. No impact on latency ensures the high quality of real-time applications such as VoIP and video

Strongest Security for Data in Transit Strongest cryptographic algorithm AES-256 No Key Management Required Audit and Event logs X.509 Certificates for authentication Certified: FIPS 140-2 level 3 Common Criteria CAPS (UK) 20

Security Can be Simple SafeNet high speed encryptors can be set up in minutes No need for network reconfiguration and no need for routing table updates. Routing updates are transparent to encryption. No need to manually build complex addressing tables and policies because SafeNet encryptors automatically discover network MAC addresses. It s Layer 2 so it does not care about IP addresses Encryption based on VLAN tags or MAC address Can also just bulk encrypt 21

Reclaim Your Bandwidth & Save Money Simple network topology Bump in the Wire Decreased complexity of network infrastructure, maintenance and admin Low Latency (in the micro seconds) Zero Overhead means you get the bandwidth you pay for Reclaiming your network bandwidth = $$$

Reclaim Your Bandwidth & Save NY to LA 1gig connection is approx. $40,000/month 1Gbps Ethernet IPsec Actual bandwidth ~1Gbps ~800Mbps* Cost of lost performance Annual cost 0 $8K/month You get what you paid for $96K or more *Conservative estimate of 20% loss (up to 50%)

Security Across Industry Verticals FINANCIAL FEDERAL, STATE & LOCAL RETAIL EDUCATION SOFTWARE HEALTHCARE

Case Study Health Care Customer has Compliancy issues. Deals with State and Federal customers PII Must encrypt WAN traffic that carries PII information Tried Router based encryption (Layer 3) Performance is too low, latency is too high Switched to Layer 2 encryption Observed immediate gain in bandwidth and decreased latency

Case Study Financial Bank has multiple locations, some international Does not trust their network providers Has high speed links (10gig) internationally ($$$) Wants to protect high value assets (customer info) Wants to use all of the bandwidth they are paying for

Case Study Education College has lab that works on government projects Government mandates encryption on those links Also needs to protect student data in transit between campus buildings Layer 3 solution not FIPS 140-2 Level 3 (required)

Case Study - Retail Customer needed to secure link from data center to backup data center (DR site) Needed to secure links from Data center to branch locations Needed high performance and low latency VoIP Video conferencing Transactional data, real-time applications

SafeNet: There is no better option SafeNet is a security company SafeNet offers the world s only complete suite of dedicated high speed WAN encryption solutions SafeNet devices are used by many government agencies SafeNet encryptors are designed and built from the ground up as security appliances 29

Děkuji