Virtual Privacy vs. Real Security



Similar documents
the about MPLS security

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

TrustNet Group Encryption

November Defining the Value of MPLS VPNs

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

BLACK BOX. EncrypTight

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

ENTERPRISE CONNECTIVITY

WAN Optimization. Riverbed Steelhead Appliances

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

SingTel MPLS. The Great Multi Protocol Label Switching (MPLS) Migration

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

CARRIER MPLS VPN September 2014

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WAN Optimization in MPLS Networks- the Transparency Challenge!

Reaping the Full Benefits of a Hybrid Network

Sprint Global MPLS VPN IP Whitepaper

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

High speed Ethernet WAN: Is encryption compromising your network?

Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

HIGH PERFORMANCE ENCRYPTION SOLUTIONS SECURING CRITICAL NATIONAL INFRASTRUCTURE

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

MPLS/IP VPN Services Market Update, United States

The Evolution of Ethernet

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

ethernet services for multi-site connectivity security, performance, ip transparency

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Multi Protocol Label Switching (MPLS) is a core networking technology that

Demonstrating the high performance and feature richness of the compact MX Series

State of Texas. TEX-AN Next Generation. NNI Plan

PREPARED FOR ABC CORPORATION

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

High Level Overview of IPSec and MPLS IPVPNs

Best practices for protecting network data

The term Virtual Private Networks comes with a simple three-letter acronym VPN

The Next Generation Network:

Virtualized Security: The Next Generation of Consolidation

Pacnet MPLS-Based IP VPN Keeping pace with your growth

Site2Site VPN Optimization Solutions

Evolving Your Network with Metro Ethernet and MPLS VPNs

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

MPLS provides multi-site solution

Session Border Controllers in Enterprise

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

High Speed Ethernet WAN: Is encryption compromising your network?

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Firewall Security. Presented by: Daminda Perera

WAN and VPN Solutions:

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Private Cloud Solutions Virtual Onsite Data Center

Using Carrier Ethernet to Create Cost Effective and Secure Wide Area Networks How Layer 2 Encryption Enables Better Use of Bandwidth.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Janko Jager. * MPLS Multi Protocol Label Switching ** NLBd.d. Nova Ljubljanska banka d.d.

Mesh VPN Link Sharing (MVLS) Solutions

MPLS in Private Networks Is It a Good Idea?

BT Connect Networks that think

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Enterprise Business Products 2014

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

1.264 Lecture 37. Telecom: Enterprise networks, VPN

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Cisco Which VPN Solution is Right for You?

How To Protect Your Network From Attack

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Virtual Private LAN Service (VPLS)

EVALUATING NETWORKING TECHNOLOGIES

Sourcing the WAN One or Many? (Enterprise Case Study)

Preparing Your IP Network for High Definition Video Conferencing

Secured Voice over VPN Tunnel and QoS. Feature Paper

How to cut communications costs by replacing leased lines and VPNs with MPLS

Securing SIP Trunks APPLICATION NOTE.

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

MPLS and IPSec A Misunderstood Relationship

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Preparing Your IP network for High Definition Video Conferencing

Fundamentals of MPLS for Broadcast Applications

Tunnel Routing. Preface. Challenge

Lecture 02b Cloud Computing II

Best Practices in Legal IT. How to share data and protect critical assets across the WAN

Level 3 Solutions for FCC Rural Telehealth

WAN Traffic Management with PowerLink Pro100

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

Design Your Network For Maximum Efficiency

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Lecture 17 - Network Security

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

An illustration of a company transforming to complete data security in 15 minutes

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Transcription:

Virtual Privacy vs. Real Security

Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing high performance security solutions for wide-area networks, data centers and public cloud CERTES 2011 2

Product Milestones and Industry Firsts First 1Gbps Ethernet Encryption Appliance - 2003 First Release of CipherEngine - 2006 First Multi-Layer Encryption Appliances - 2008 First Variable Speed Encryption Appliances -2010 First Multi-Layer 10Gbps Encryptor -2011 CERTES 2011 3

Customers and Partners CERTES 2011 4

Where is your data NOT protected What is your security solution for here? Perimeter Security Defense in Depth Your Carrier says the WAN is secure because it s Virtually Private This may have been true in 1998 - but today it s a dangerous & outdated concept CERTES 2011 5

Who is it we are defending against? 9600 Baud Baby! CERTES 2011 6

Does Privacy Equal Security? The SP says the network is secure A Product Director said security was built in to MPLS based on the following: Traffic streams are kept separate There are controls around provisioning and management There are gateways between the Public Internet and the MPLS Because they have tools to identify malicious activity CERTES 2011 7

What is MPLS? MPLS is primarily a packet forwarding technology Traffic forwarding is based on label A packet can have multiple labels Other services have been added over the years Layer 2 or 3 VPNs Traffic Shaping Monitoring Services 1. A label is added to the packet at the edge of the MPLS network MPLS backbone 3. The label is removed when reaching the customer network 8 2. Packets are moved across the backbone using labels. The labels are swapped out by backbone routers CERTES 2011 8

MPLS is not secure! MPLS Facts: MPLS does not provide Protection against mis-configurations Protection from attacks within the core Confidentiality, authentication or data integrity Customer Security TC TC = Traffic Class The MPLS header contains no security The IP Packet (Data Payload) is left in the clear CERTES 2011 9

Virtual Privacy is not Real Security VPN s segment data - Privacy and Virtual Privacy are not the same as Security! MPLS (VPLS) Data is sent in the clear Metro Ethernet - Data is sent in the clear Internet Internet VPN Threats to Data in Motion Human/Machine errors often result in your data being sent to other VPN customers Man in the middle, BotNets and DDoS attacks Undetectable Data Sniffing, and Theft Easily circumvented branch firewalls leave HQ and DCs vulnerable CERTES 2011 10

The trade off between performance and security Performance Security Modern Networks Require Any to Any Connectivity Scalability High Speed-Low Latency Performance High Availability Architectures (load balancing, DR) Layer 2-4 Services Traditional Network Encryption Limited to Point to Point connections Exponentially complex with scale Induces latency and chokes throughput Requires manual fail over procedures Masks Headers CERTES 2011 11

Group Encryption Provides Security and Performance Our Modern Approach to Encryption Define Polices based on you existing Network or Application Topologies Topologies Applications Mesh Voice Hub and Spoke Video Multicast Control Data Hybrids FTP or other protocols Create the Keys needed to support the Policies CipherEngine uses standards based security protocols AES 256 SHA-1 IPsec Performance Security Enforce the policies without creating tunnels Preserve native routing/switching protocols and paths Layer 2 - encrypt by VLAN Layer 3 - preserve IP routs and subnets Layer 4 - maintain traffic shaping and Netflow/Jflow while encrypting By designing encryption for modern networks, we made it easy to install, and transparent to paths and performance CERTES 2011 12

Transparent Network Security Back-up Data Center Primary Data Center Traffic If With encryption the CipherEngine Primary flows from is DC required, fails the both remote Nothing DCs a relationship (and office the to is created associated the Happens! primary between CEPs) data center. routers, are defined limiting Hubs load and balancing all of the Branches are defined as Packets Using spokesdead are peer load detection balanced at a new the head tunnel will endbe nailed up to the secondary after 90 seconds of lost packets. Because the headers remain in the clear, load balancing works with encryption. In the event of failure at the Primary In the event of a failover, traffic is rerouted with minimal packet loss because DC traffic fails over to the secondary site with minimal packet loss and no user there are no tunnels, and the Secondary intervention DC already had the correct key Remote Office Remote Office Remote Office Unencrypted traffic Encrypted traffic Remote Office CERTES 2011 13

Case Studies

Financial Services Compliance driven requirements for encryption over WAN Multiple Data Centers connecting to 155 Member Banks throughout world Required low latency performance with AES 256 encryption Must support DUAL CARRIERS (no IPsec tunnels) Data Center #3 Data Center #2 Data Center #4 Data Center #1 Provider B Member Bank 155 CipherEngine Provider A Redundancy designed into the network architecture Encrypted traffic load balanced across carries under single policy No SLAs reduced or violated Member Bank 1 CERTES 2011 15

Manufacturing and IP Protection Concerned about last mile security Policies defined and encryption keys generated and managed from Headquarter in the U.S. Multiple real-time application on an accelerated WAN Multiple China Locations China Telecom CipherEngine Hong Kong Location U.S. Headquarters Hong Kong Telecom KDDI Telecom Leased MPLS Service Tata Indiacom SingTel Deutsche Telekom Singapore R&D Germany Location Japan Location India Location 30 fully meshed sites - growing to 300 L4 encryption solution offers stealth encryption - not detectable by the carrier CERTES 2011 16

Metro Ethernet Encryption Phased roll-out from 4 meshed sites to 26 total locations Native Layer 2 encryption for new Metro Ethernet service Encryption is segmented by VLAN IDs Policies and key manages by CipherEngine located in Headquarters Simple expansion as new sites are added CipherEngine VLAN 5, 6 Metro Ethernet Network VLAN 7 VLAN 5 VLAN 6 CERTES 2011 17

Utilities, Smart Grid and SCADA Networks Delivers hydroelectric power to one of the largest grids in the country Solution secures Command and Control traffic as part of disaster recovery plan Required low-latency Layer 2 encryption Back Up Site Recovery Site Private Layer 2 Network Control Center Hydro Plant Critical Infrastructure includes all utility, communication and rail control grids Policy prevents the DOE from doing press releases, but they have provided direct references to other utilities CERTES CIPHEROPTICS 2011 18

Video Content and IPTV Providers Protection of easily replicated digital assets Low Latency AES 256 Performance Multicast Support Longer term migration to Cloud TV services IPTV Source 5 Local (City) Distribution sites Layer 3 Backbone NC CipherEngine FL LA Mo FL CERTES 2011 19

Government Customer required security for mission critical services Deployment to support 288 load balanced connections to WAN Required Low Latency performance using AES 256 Headquarters supported load balanced 1G interfaces w/ low latency 288 Embassies MoFA Headquarters Leased MPLS Service CipherEngine Redundant CEPs located at each site Full Mesh encrypted traffic between sites CERTES 2011 20

Managed Services Hub and Spoke topology More than 130 branches being served Each credit union has own VPN back to SP data center Concerned about protecting customer financial data between credit union locations and SP data center All branch locations configured in this manner Backup Internet Router Internet Internet to MPLS Gateway Leased MPLS Service Branch Location Headquarter Data Center Credit unions deployed CEP10s within their ATM machines Demanded encryption from AT&T as part of an MPLS migration CERTES 2011 21

Encrypted Voice Services 250 sites fully meshed on a MPLS backbone Each branch location has multiple users and VoIP One policy governs the encryption for the entire network The branch locations below is replicated at all 248 individual branches CipherEngine Data Center Headquarters Leased MPLS Service Branch Office Branch Office CERTES 2011 22

Products: Layer 2/3/4 3Mbps to 10Gbps Variable Speed Encryption Managed with CipherEngine Line Rate Performance Low Latency High Performance Standards Based CERTES 2011 23

CipherOptics Products HW: HW accelerated variable speed network encryption appliances with aggregate throughputs from 3Mbps - 10Gbps CEP 10 VSE Speeds 3 Mbps Encryptor 6 Mbps Encryptor 10 Mbps Encryptor 25 Mbps Encryptor 50 Mbps Encryptor CEP 100 VSE Speeds 100 Mbps Encryptor 155 Mbps Encryptor 250 Mbps Encryptor SW: Network transparent L2 Ethernet frame, L3 IPsec based encryption with IP header preservation, L4 UDP/TCP payload encryption and Virtual IP Tunnelling CEP 1000 VSE Speeds 500 Mbps Encryptor 650 Mbps Encryptor 1000 Mbps Encryptor CEP 10G VSE Speeds 2.5 Gbps Encryptor 5 gbps Encryptor 10 Gbps Encryptor CERTES 2011 24

IPSec VPN Tunnels Vs. Group Encryption Traditional IPsec Certes Networks Group Encryption Problem Point to Point - Tunnel Based Difficult to set up and manage Requires added personnel to maintain Slows network performance Doesn t support dual carrier environments Slows or breaks multicast No Layer 4 Network Services Solution No Tunnels! - Line rate performance Easy to setup, configure and manage Single location or person can administer Supports dual carrier networks VoIP and Video compatible Compatible with Multicast applications Preserves Layer 4 Services CipherEngine Policy & Key Manager IP (Public or Private), MPLS, or Ethernet Site D CERTES 2011 25

Thank You!