High Speed Encryption Made in Germany



Similar documents
L2 Box. Layer 2 Network encryption Verifiably secure, simple, fast.

High Speed Ethernet WAN: Is encryption compromising your network?

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

High speed Ethernet WAN: Is encryption compromising your network?

SECURE AVAYA FABRIC CONNECT SOLUTIONS WITH SENETAS ETHERNET ENCRYPTORS

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Enterprise Business Products 2014

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

Virtual Privacy vs. Real Security

Ethernet is service provider terms can be delivered from speeds starting from 1mb all the way up to 1Gb+.

WAN and VPN Solutions:

ethernet services for multi-site connectivity security, performance, ip transparency

November Defining the Value of MPLS VPNs

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

Evolving Your Network with Metro Ethernet and MPLS VPNs

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Simwood Carrier Ethernet

Securing VoIP Networks using graded Protection Levels

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

TrustNet Group Encryption

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Intelligent Solutions for the Highest IT Security Demands

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

VoIP Resilience and Security Jim Credland

SENETAS CERTIFIED NETWORK DATA ENCRYPTION FOR COMMERCIAL AND INDUSTRIAL

Application Note How To Determine Bandwidth Requirements

Intelligent Solutions for the Highest IT Security Requirements

White Paper. Complementing or Migrating MPLS Networks

WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?

Data Center Interconnect

Metro Ethernet Services

MPLS in Private Networks Is It a Good Idea?

Senetas CERTIFIED network data security - For commercial & industrial SENETAS CERTIFIED NETWORK DATA SECURITY - FOR COMMERCIAL & INDUSTRIAL

Voice over IP Networks: Ensuring quality through proactive link management

Innovation in Access and Metropolitan Area Networks -

The Role of Carrier Ethernet in Business Applications

Delivering Dedicated Internet Access (DIA) and IP Services with Converged L2 and L3 Access Device

IP/MPLS. Marios Parperis - Alcatel-Lucent Energy Systems Integration Division. October Alcatel-Lucent 2010 All Rights Reserved

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

EVALUATING NETWORKING TECHNOLOGIES

Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure

LAYER 1 & LAYER 2 ENCRYPTION WHY: ONE SIZE DOES NOT FIT ALL

Wireless Backhaul Solutions

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

convergence: preparing the enterprise network

Senetas CERTIFIED network data security - For Government SENETAS CERTIFIED NETWORK DATA SECURITY - FOR GOVERNMENT

Evaluating Carrier-Class Ethernet Services

AT&T Switched Ethernet Service SM

MPLS and IPSec A Misunderstood Relationship

IVCi s IntelliNet SM Network

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

ENTERPRISE CONNECTIVITY

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Demonstrating the high performance and feature richness of the compact MX Series

Understanding the Value of MPLS Ethernet Encryption

Using & Offering Wholesale Ethernet Network and Operational Considerations

The Business Case for Ethernet Services Whitepaper Sponsored by Time Warner Cable Business Class

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Fundamentals of MPLS for Broadcast Applications

White Paper. Data Security In The Converged Enterprise Network. Version 3.4

we secure YOUR network we secure network security English network security

Network virtualization

EDA Training Programs. Catalog of Course Descriptions

TraceSim 3.0: Advanced Measurement Functionality. of Video over IP Traffic

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

Product Presentation L2 MPLS Services. Aircel Business Solutions

Carrier Ethernet Defined

TDM services over IP networks

TC Infrastructure & Application Operations. Direct Network Links.

PREPARED FOR ABC CORPORATION

Cisco ASR 1000 Series Aggregation Services Routers Ordering Guide

ADTRAN NetVanta 5660

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Multi-Provider Ethernet Service Delivery

UNDERSTANDING BUSINESS ETHERNET SERVICES

UNDERSTANDING BUSINESS ETHERNET SERVICES

Towards an Open Data Center with an Interoperable Network Volume 5: WAN and Ultra Low Latency Applications Last update: May 2012

Site to Site Virtual Private Networks (VPNs):

Challenges in Future Wireless Broadband Access Networks

Ethernet/IP Test Solutions

The Evolution of Ethernet

Edgewater Routers User Guide

Sprint Global MPLS VPN IP Whitepaper

Network Simulation Traffic, Paths and Impairment

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

MPLS/IP VPN Services Market Update, United States

Guidebook to MEF Certification

Transcription:

High Speed Encryption Made in Germany

Today s Trends in Network Encryption 2

Today s Trends in Network Encryption Contents Background ATMedia GmbH Why Encryption? Which Encryption? How to deploy Encryption 3

ATMedia GmbH ATMedia GmbH founded in 1996 Privately owned and independent German company Development, production and distribution of high-speed network security products Encryption products up to 10G with a BSI/NATO/EU approvals Suisse Partner: DeltaNet AG 4

Security Risks of WAN-connections WAN connections are not secure if: - Value of the data is higher than the costs of getting the data - Risk of detection is low A short reminder. 5

Security Risks of WAN-connections WAN security categories real WAN network connections Dark Fiber WDM SONET/SDH virtual WAN networks MPLS Carrier Ethernet / VPLS IP Services 6

Security of Fiber WAN connections Low Tech risk analysis Physical access to Fibers easy Fibre emits light Light can be detected 7

Security of Fiber WAN connections WDM does not add security Coupling out Spectrum analysis Filter Detector Looks like a WDM system (analysis not really needed) Analysis of data content Detection of speed and type Capturing of needed data Hardware FPGA Filter disk storage Costs ~ 5 digits Patents e.g. from DTAG: EP 0915356A1 8

Security of real Fiber WAN connections Counteractions Fiber monitoring Good for debugging but no reliable detection of attacks False positive rate extremely high Fiber protection Extremely expensive and not reliable Encryption Only reliable measure, no economical worthwhile attacks possible 9

Security of virtual WAN connections virtual connections No physical access needed for eavesdropping Data can be rerouted or duplicated by a mouse click All members of the group known? Is it really Private `? VPN is misleading regarding security risks and resulting liabilities Encryption is essential 10

Selection of WAN Security Products Firewall, IDS (incl. DPI) Protection against unwanted connections No protection against manipulation and eavesdropping Challenge of defective protocols (VoIP, ) Additional application gateways needed Works for known protocols and applications only Encryption (VPN) Cryptographic access control Data protected against manipulation and eavesdropping Offers protection for all protocols and applications 11

Selection of WAN Security Products Firewall, IDS (incl. DPI) Extensive use of hardware and software Encryption (VPN) Dedicated hardware 12

Selection of Encryption Equipment integrated (add-on) Encryption Firewall, Router, Switch, Director, Multiplexor Minor security performance High Risk of Denial of Service Encryption easily to bypass Encryption often at IP level Key management? Combination of many different security functions in one device not optimal 13

Encryption Checklist Encryption main function of the device (no giveaway) One security level for the whole system No security by obscurity arguments Use of open and well known algorithms (AES, ECC, ) Perfect Forward Secrecy (long term security) Real security reviews by 3rd parties Transparency of the whole chain from manufacturer to the integrator 14

Layer 2 or Layer 3? Layer 3 Encryption = IPSec IP Universal, high complexity => high overhead Low speed IP networks (DSL, UMTS, LTE) Most implementations software only Impact on QoS, challenge of stream prioritization Multicast support difficult IP V6, MPLS, VLAN Separation? 15

Layer 2 or Layer 3? Layer 2 Encryption Network layer below IP and MPLS Less complexity => low overhead Hardware implementation: minimal Delay and Jitter Optimal for real-time communication (VoIP, Video, Terminal-Services) QoS and prioritization conserved Transparent to IP V4+V6, MPLS, VLAN, 16

Layer 2 or Layer 3 Marketing: 100 95 Throughput in % of link speed 90 85 80 75 70 65 60 55 TCP Ack VOIP/ Citrix Layer 2 Encryptor = link speed IPSec (theoretical maximum) TCP PDU 50 64 128 256 512 1024 1280 1518 9000 Ethernet frame size in bytes 17

Layer 2 or Layer 3 Fair comparison: 100 95 Throughput in % of link speed 90 85 80 75 70 65 60 55 TCP Ack VOIP/ Citrix Layer 2 Encryptor (auth replay) IPSec (auth replay) TCP PDU 50 64 128 256 512 1024 1280 1518 9000 Ethernet frame size in bytes 18

Point-to-Point: E-Line Real Layer 2 VPN: Carrier Ethernet Point-to-Multipoint: E-Tree 19

Full Multipoint: E-LAN Real Layer 2 VPN: Carrier Ethernet Offered as crypto service by some carriers (Inside-IT Ethernet Encryption market overview 2010) 20

Real MPLS VPN: MPLS Layer 2 WAN MPLS used as Layer 2 transport VPLS or Pseudo-Wires Works for Point-to-Point and Multipoint networks 21

Real MPLS VPN: MPLS over Layer 2 Local MPLS networks connected via Layer 2 WAN connections Point-to-Point Encryption of the WAN connection Special case: private MPLS where all P and PE Routers are interconnected by encrypted Layer 2 connections 22

Real MPLS VPN: Full MPLS Encryption MPLS services of WAN and LAN connected PE serves as service multiplexor ATM All MPLS data is encrypted Works for Point-to-Point and Multipoint scenarios 23

Important Layer 2 Scenario: Storage SAN Security often forgotten : Aggregation of Storage and Data services (1G-4G) TDM System multiplexes services into a 10G SDH link Encryption of the SDH link with a 10G SONET/SDH Encryptor Certified Secure Data Centre Interconnection 24

ATMedia Solutions 10M Ethernet 100M Ethernet 1G Ethernet 155M-2.4G SDH 19 chassis Redundant power supplies with dual inputs Approved by the BSI for VS-NfD, EU and NATO OEM versions certified for FIPS 140-2 L3 and CC EAL3 10G Ethernet 10G SONET/SDH 25

Summary Any network communication can be intercepted and manipulated Risk depends on the value of content and availability of the data Reliable Encryption is the only effective countermeasure Encryption solutions for most network scenarios available 26

Contact ATMedia GmbH Science Park 1 66123 Saarbruecken Germany phone: +49 681 842477 fax: +49 681 842481 DeltaNet AG Riedstrasse 8 8953 Dietikon Suisse phone: +41 43 322 40 50 fax: +41 43 322 40 51 crypt@atmedia.de www.atmedia.de info@deltanet.ch www.deltanet.ch 27