IBM enetwork VPN Solutions



Similar documents
Virtual Private Networks

Cisco Which VPN Solution is Right for You?

VPN. Date: 4/15/2004 By: Heena Patel

How Virtual Private Networks Work

Firewalls and Virtual Private Networks

VIRTUAL PRIVATE NETWORKS SECURITY

Creating a VPN Using Windows 2003 Server and XP Professional

Secure Network Design: Designing a DMZ & VPN

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Technical papers Virtual private networks

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

OS/390 Firewall Technology Overview

z/os Firewall Technology Overview

Intranet Security Solution

L2F Case Study Overview

Connecting Remote Users to Your Network with Windows Server 2003

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

MPLS L2VPN (VLL) Technology White Paper

IP VPN Solutions Secure, flexible networking options from a leader in IP solutions

November Defining the Value of MPLS VPNs

VIRTUAL PRIVATE NETWORKS: SECURE REMOTE ACCESS OVER THE INTERNET

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Network Security Topologies. Chapter 11

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Frame Relay vs. IP VPNs

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Network Services Internet VPN

Chapter 12 Supporting Network Address Translation (NAT)

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

Optimizing Networks for NASPI

OS/390 Firewall Technology Overview

Configuring a VPN for Dynamic IP Address Connections

How To Configure Apple ipad for Cyberoam L2TP

TSC (Total Solution Communications Ltd)

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

Service Descriptions

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

MANAGEMENT INFORMATION SYSTEMS 8/E

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

How Virtual Private Networks Work

Gigabit SSL VPN Security Router

Chapter 2 Virtual Private Networking Basics

VPN. VPN For BIPAC 741/743GE

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

Local Area Networks (LANs) Blueprint (May 2012 Release)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

1.1. Abstract VPN Overview

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

The Evolution of Ethernet

Introduction to

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Multi-Homing Dual WAN Firewall Router

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

ERserver. iseries. Remote Access Services: PPP connections

Virtual Private Networks

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Galileo International. Firewall & Proxy Specifications

Building Remote Access VPNs

Network Access Security. Lesson 10

Case Study for Layer 3 Authentication and Encryption

Cisco 1600 Series Modular Desktop Access Routers

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Architectures of E-Commerce

Secured Voice over VPN Tunnel and QoS. Feature Paper

Introduction. Technology background

Virtual Private Networks

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Cornerstones of Security

Virtual Private Network and Remote Access

AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated

How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

Cisco IOS Firewall. Scenarios

GPRS / 3G Services: VPN solutions supported

MPLS/IP VPN Services Market Update, United States

Windows Server 2003 Remote Access Overview

Security Technology: Firewalls and VPNs

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

Understand Wide Area Networks (WANs)

Transcription:

IBM enetwork VPN Solutions the Reach of Your Network Extend

Agenda Description and Value of a VPN VPN Technology IBM's VPN Solutions and Future Enhancements Summary

What is a VPN? Remote Access Business Partner/ Supplier Branch Office A VPN (Virtual Private Network) is an extension of an enterprise's private intranet, across a public network (such as the ), through the creation of a secure, authenticated and encrypted "tunnel"

VPN Customer Value Remote Access Business Partner/ Supplier Branch Office Cost Savings: Cost effective access to the via a local call to an ISP, versus expensive leased lines, long-distance calls and toll-free telephone numbers Estimated 20%-47% savings in WAN costs and 60%-80% savings in remote access dial-up costs, per Infonetics Research, Inc Easy, secure access to enterprise networks and resources: Remote users and remote locations can access required information whenever they need to and from wherever they are Worldwide Access: access is available worldwide, where other forms of connectivity may be either not available or may be more expensive

The Dollars and Cents of it * Using the as your WAN Backbone has significant price advantages. Take a look at how the annual costs of private line, frame relay and the compare. 12 10 Dollars ($M) 8 6 4 T-1 Private Line T-1 Frame Relay T-1 2 0 5-Site Network 10-Site Network 15-Site Network * Information based on IDC, Network World Decision Support Series Report, Framingham, Mass as printed in Network World on 9/28/98

VPN Technology Point-to-Point Tunneling Protocol (PPTP) Microsoft's Proprietary Tunneling Technology Layer 2 Forwarding (L2F) Cisco's Proprietary Tunneling Technology Layer 2 Tunneling Protocol (L2TP) Open, Standards-Based Technology IP Security Protocol (IPSec) Open, Standards-Based, Network Layer Security Technology Enables Authentication, Integrity Checking and Encryption Can provide automated tunnel set-up, automated secure distribution and automated key refresh using Key Exchange protocol (IKE; previously called ISAKMP/Oakley) Is the IETF-chosen security framework for both IPv4 and IPv6 Environments Is recommended as the security for PPTP, L2F, and L2TP tunnels All of the Above Technologies can transport Multiprotocol Data over the, however they all lack inherent Authentication and Encryption.

IBM enetwork VPN Solutions Available Today

VPN Business Opportunities Remote Access Branch Office Connection Business Partner/Supplier Network Remote User Remote Access Scenario Problems: High administrative workload cost, expensive 800 or long distance costs Solutions: VPNs exploit world-wide ISP reach and lower connectivity and administrative costs Branch Office Connection Scenario Problems: Expensive Leased Line connections or part-time dial connections to home office Solutions: VPNs provide 24-hour ease-of-use connectivity via inexpensive links Business Partner/Supplier Network Scenario Problems: Set-up/operational cost prohibitively high for smaller business partners; geographic limitations Solutions: VPNs provide global, secure, cost-effective, end-to-end inter-company communication via Branch Office Business Partner/Supplier s

IBM Remote Access Solutions S/390 Data and Web Server ACE Server Customer Example 239843 SecurID IBM enetwork Firewall for AIX Win/95 Dial-up Client Service Provider (ISP) Dial-up Lines At a medical company in Florida, medical sales reps check on customer orders, record sales transactions, and check email from any location. They use a Remote Access VPN over the, with Win/95 Dial-up clients, which are sold as part of the AIX Firewall. This solution provide sales reps secure remote access to the information they need to do their job effectively. Remote users can securely access applications and data in the corporate intranet.

IBM Remote Access Solutions Service Provider (ISP) IBM enetwork Firewall for AIX Dial-up Lines CIBC Customer Canadian Imperial Bank of Commerce On-line Banking Success CIBC offers online PC Banking for their customers. PC Banking lets customers use their home computers and a dial or connection to securely bank online. They can: Check account balances Review recent transactions Pay bills Transfer money between accounts Buy CIBC Travel Medical Insurance Buy/sell stocks and mutual funds A year ago, CIBC partnered with IBM for the overall e-business solution, and went from zero to 20,000 online customers in less than a year. They use the IBM enetwork Firewall for AIX as part of a complete and scalable IBM e-business solution.

IBM Branch Office Connection Solutions Customer Example Branch A's AIX Firewall or 2210/2216 Router AIX Firewall or 2210/2216 Router AIX Firewall or 2210/2216 Router An airline company established a VPN between 3 sites (New York, Miami, and Colorado), allowing airline employees to exchange files, view flight schedules, and communicate financial information. They implemented this using an AIX Firewall in each of their locations. Branch B's Ability to securely and cost-effectively communicate amongst "trusted" geographically dispersed branches, over the

IBM Remote Access/Branch Office Solutions Branch A's AIX Firewall Dial-up Lines Win/95 Dial-Up Client AIX Firewall AIX Firewall IOC leverages IBM Firewall to keep its customers securely connected Branch B's Operations Center (IOC) IOC is a leading technology company that provides a broad base of products and services to a wide variety of corporate customers. To meet these needs, IOC uses the IBM enetwork Firewall for AIX. They will either train the customers to maintai the Firewall or depending on the customer, wi continue monitoring the implementation in case of emergency situations. Today, IOC implements Firewall-to-Firewall Branch Office Solutions and Client-to-Firewal Remote Access Solutions. One of the reasons IOC chose the IBM Firewall is that IBM can support its firewall products and VPN technology on a worldwide basis much more effectively than any other vendor.

Supplier Network Solutions Branch Business Partner's or Supplier's AIX Firewall 2216 Connector AIX Firewall 2210 Router AIX Server OS/390 Server Remote User Business Partner's or Supplier's Supplier Network Implementation Automotive Exchange Initiative (ANX) links their automotive trading partners using Virtual Private Networks (VPNs). Using VPN connections, more than 10,000 automotive businesses can exchange critical information securely and cost-effectively. The automotive industry is estimating this to be an industrywide savings of $1 billion a year.

IBM enetwork VPN Solutions Future Enhancements

IBM enetwork VPN Directions Remote Access Cost Savings Improved Business Processes Easy, Secure, Worldwide Access Today Remote Site Business Partner VPN Products & Services: Firewall (AIX, OS/400) Clients with User Authentication via SecurID tokens (Win/95, AIX, OS/2) Servers including Firewall Functionality: OS/390, AIX (also with IKE) 2210/2212/2216 Routers Consulting, Design and Implementation Services Next Steps Expanded coverage of VPN offerings: Key and Certificate Management NT & AIX Firewalls; OS/400, OS/390 and AIX Servers; Win/95, Win/98, and Win/NT Clients 2210, 2212, 2216 and 3746 Routers/Ctlrs Centralized Management VPN Policy Configuration & Administration Integration into Overall IBM Systems and Network Management Offerings Open, Standards-Based Quality of Service Enhancements Bandwidth Management, Priority Queueing Expanded Services Offerings: Managed VPN Extranet Service Offerings Extended Consulting, Design, and Implementation Services

IBM enetwork Firewall IBM's enetwork Firewall is your first line of defense for Security Three Firewalls for the Price of One Packet Filtering and Network Address Translation Proxies (HTTP, FTP, Telnet, TN3270, WAIS, Gopher, DNS, SafeMail) Circuit Level Proxy (SOCKS Version 5 on NT) Easy to Use Java GUI Enterprise Firewall Management Centeralized, Remote Configuration Virtual Private Network (IPSEC) (AIX) Firewall to Firewall (using IPSec or IBM Tunnel with Key Refresh) Firewall to Client (FREE Win/95 IPSec Client) User Authentication using SecurID card and tokens Hardened, Secured Platform Network Security Auditing Tool Log Monitoring and Alerts PLUS - Solutions Partners

IBM Router Products IPSec combined with: Data Link Switching for SNA Traffic Enterprise Extender for Subarea APPN/HPR Traffic Layer 2 Tunneling Protocol for Bridging LAN (Netbios, IPX, etc.) Traffic Traditional IP Traffic Supported over a Multitude of Links Types: FR, PPP, ISDN, X.25, ATM, EN, FastEN, TR, FDDI Value Proposition: IBM routers supply the industry's best multiprotocol support for secure connectivity over the internet.

CS OS/390 VPN Support IPSec (Msg source authentication & integrity, confidentiality support in a variety of configurations) IPSec delivery: In OS/390 V2R4 shipped as part of Toolkit (Firewall Technologies) based on RFC1825-1829 In OS/390 V2R5 integrated into CS OS/390 In OS/390 V2R6 transport mode added In OS/390 V2R7 upgraded to 1998-RFC draft level Configurations supported S/390 as a gateway (separate CEC or LPAR) - Tunnel mode Host-to-Host for end-to-end protection - Tunnel mode or Transport mode IP Packet Filtering Stack access control Future Direction - IKE support (Targetted for OS/390 V2R8) Dynamic key distribution, session key refresh

IBM enetwork VPN Key Strategic Messages and Differentiators Comprehensive, "One-Stop Shopping" VPN Solutions Widest Range of scalable, VPN-enabled products (Firewalls, Servers, Clients, Routers/Controllers) and services (Consulting, Maintenance, Installation, and ISP Services) in the industry. Ability to make VPN technology a part of overall IT Solution, instead of an island of functionality End-to-End VPNs for security across the and within your intranets Secure IPSec encrypted tunnels from the clients, through the Firewalls and/or Routers, to IBM Servers Multiprotocol Support (via L2TP and/or Enterprise Extender) IBM's World-Class Security Expertise Committed to leadership/development of open, IETF-based technology Interoperable with other vendors' standards compliant products Centralized Management VPN Policy-Based Configuration and Administration Integration into overall IBM Systems and Network Management Offerings Managed VPN Extranet Services Offerings through IGS

IBM enetwork Virtual Private Networks Remote Access Business Partner/ Supplier Branch Office IBM enetwork VPNs......Extend the Reach of Your Network, Applications & Data...Enable Secure e-business Communications IBM Virtual Private Network Information: enetwork VPN Solutions: www.software.ibm.com/enetwork/technology/vpn IBM Routers: www.networking.ibm.com IBM Firewall: www.software.ibm.com/enetwork/firewall IBM S/390: www.s390.ibm.com/marketing/g3263036.html IBM AS400: www.as400.ibm.com/usa/trends/html AIX Server: www.rs6000.ibm.com/resource/features/1998/aixrite/choose_aix431.html SecureWay: www.ibm.com/security