Why a Reverse Proxy with My Instant Communicator for mobiles??



Similar documents
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

Cornerstones of Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

OmniTouch 8400 Instant Communications Suite

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Cisco IOS Voice XML Browser

Interwise Connect. Working with Reverse Proxy Version 7.x

Recommended IP Telephony Architecture

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

Network Access Security. Lesson 10

Cisco IOS Voice XML Browser

A secure way to monitor your emergency lighting over the internet

Owner of the content within this article is Written by Marc Grote

Cisco WebEx Meetings Server

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Scalable Secure Remote Access Solutions

SIP Trunking Configuration with

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Cisco Virtual Office Express

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

DMZ Network Visibility with Wireshark June 15, 2010

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Introducing Cisco Unified Communications Express

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

How To Protect Your Network From Attack

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

R4: Configuring Windows Server 2008 Network Infrastructure

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Level 1 Technical Firewall Traversal & Security. Level 1 Technical. Firewall Traversal & Security. V3 Page 1 of 15

Introduction to Endpoint Security

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Firewall Environments. Name

Cisco QuickVPN Installation Tips for Windows Operating Systems

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Secure Web Appliance. Reverse Proxy

Fabrizio Volpe. MVP Directory Services MCITP Lync

Live Communications Server 2005 SP1 Office Communications Server Matt Newton Network Engineer MicroMenders, Inc

How To Deploy Cisco Jabber For Windows On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Access Your Cisco Smart Storage Remotely Via WebDAV

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

Enriching the Microsoft Office Suite with Alcatel-Lucent Unified Communications Solutions

Enterprise Security Interests Require SSL with telnet server from outside the LAN

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce

Cisco Unified MobilityManager Version 1.2

Agenda What can we do now? And 5 years from now we will still be current!

Load Balancing for Microsoft Office Communication Server 2007 Release 2

PRIVACY, SECURITY AND THE VOLLY SERVICE

Computer Networks. Secure Systems

SonicWALL PCI 1.1 Implementation Guide

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

CloudSync Mobile Device Management Technical Overview

Network Configuration Settings

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

redcoal SMS for MS Outlook and Lotus Notes

Implementing Core Cisco ASA Security (SASAC)

WHITE PAPER Citrix Secure Gateway Startup Guide

Configuring Windows Server 2008 Network Infrastructure

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Security Overview Introduction Application Firewall Compatibility

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP # Addendum 1.0

Steelcape Product Overview and Functional Description

CTS2134 Introduction to Networking. Module Network Security

(d-5273) CCIE Security v3.0 Written Exam Topics

Citrix Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information. Citrix Presentation Server 4.

OmniTouch 8600 My Instant Communicator Mobile Edition for BlackBerry Release 4.1. User guide. OpenTouch (OpenTouch User)

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

Desktop Central Managing Windows Computers in WAN

Whitepaper: Microsoft Office Communications Server 2007 R2 and Cisco Unified Communications Manager Integration Options

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Cisco TelePresence Manager

Securing SIP Trunks APPLICATION NOTE.

Secure Gateway for Windows Administrator s Guide. Secure Gateway for Windows

MetaFrame Presentation Server Security Standards and Deployment Scenarios Including Common Criteria Information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Alcatel-Lucent Technology Training

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Managing Ports and System Services using BT NetProtect Plus firewall

How should an enterprise move toward Unified Communications?

How To Understand And Understand The Security Of A Key Infrastructure

BlackBerry Enterprise Service 10. Version: Installation Guide

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Secure Gateway for Windows Administrator s Guide. Secure Gateway 3.1 for Windows

Avaya TM G700 Media Gateway Security. White Paper

Transcription:

Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010

What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all user communication tools Integrated (in depth) in devices respective ergonomics Is Coherent and has a very small footprint across devices (mobiles / desktop) Is unique on the market

Unified Communications Client access across devices OmniTouch 8600 My Instant Communicator Same consistent services and user experience whatever the device What kind of applications can I have on these mobiles?

What are the end-user services provided by My Instant Communicator? Automatic Reverse call / Call by name Enterprise directory look up with telephony presence Caller name display Unified Call log Visual Voice Mail Notification / Eventing Buddy list with riched presence, instant messaging & conferencing services Unified Communication services are provided by Web Services

The web services flows through a network architecture OXE Server WAN / Internet Firewall/VPN gateway LAN switch Web services MIC client for Multiple devices WEB SERVICES Telephony control for accessing RE services Phonebook & Enterprise directory Call log Visual Voicemail Telephony presence Instant Conferencing / Messaging Event notification Our Mobility solutions are focused on Unified Communications everywhere What s about the architecture & security for these web services? Application Servers

Just a reminder... SSL & TLS Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security for communications over networks such as the Internet. HTTPS HyperText Transfer Protocol over SSL (HTTPS) is a TCP/IP protocol used by Web servers to transfer and display Web content securely. The data transferred is authenticated and encrypted against eavesdropping and man-inthe middle attacks These standard protocols are used by our Web services What is the architecture recommended for our My Instant communicator?

Architecture recommended based on a Reverse Proxy Https MIC client for Multiple devices WAN / Internet External Firewall Demilitarized zone DMZ Reverse Proxy (Apache, Squid, Blue coat..) Internal Firewall LAN Http or Https Application Servers OXE Server switch Our web services secured by HTTPS can go through a Reverse Proxy What are the benefits to use a Reverse Proxy?

BENEFITS of a Reverse Proxy BENEFITS One secure access to internal servers from remote clients through authentication at the corporate network border Single point of control over who can access and to which HTTP servers you allow access to (Monitoring & Logging) Easy replacement of applications servers or host name changes. With a Reverse Proxy these types of changes will not affect the outside clients. Unique Access www.alcatel-lucent.com DMZ Local Area Network Users Internet Reverse proxy Servers Farm with n IP adr.

Blue Coat a partner recommended by ALU Why Blue coat? Set and forget appliance, quick to deploy and easy to manage Complete loggin and reporting Great flexibility for authentication methods allowing compliance with IT policies Solution validated & supported by ALCATEL-LUCENT & BLUE COAT And not Apache or Squid They are widely spread in the world and free of charges BUT Compatibility with My Instant Communicator requires the last version to benefit patches and finetuning (Linux geek needed) Restrictions regarding authentications possibilities NO official support by the BP s & ALU

Alternative Architecture with a Firewall/VPN Gateway OXE Server IPSEC/Https Firewall VPN IPSEC/SSL LAN switch MIC client for Multiple devices WAN / Internet Http or Https Application Servers The web services secured by IPSEC or HTTPS can go through a Firewall/VPN

Alternative Architecture with a Firewall/VPN Gateway PROS Technology already deployed in the customer infrastructure, there is no additional cost BUT an IPSEC client must be supported on the mobile devices. VPN IPSEC and SSL(TLS) are very well known by the administrators CONS No available IPSec clients for all the mobiles used except Nokia and IPHONE. On the Nokia web site there is a list of Firewall/VPN gateways supported. My IC applications has been tested with a Nokia mobile and the Brick solution. The Cisco IPSEC client is being tested with our Brick VPN gateway. Specific security configuration for each mobile. Today a Firewall is not able to detect web-based attacks (SQL Injections). It s a security issue for the Application servers.

www.alcatel-lucent.com 12 Presentation Title All Rights Reserved Alcatel-Lucent 2009 All Rights Reserved Alcatel-Lucent 2010