How To Get A Computer With A Cell Phone And A Computer (For Free)



Similar documents
Understand Wide Area Networks (WANs)

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Technical papers Virtual private networks

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

VPN. Date: 4/15/2004 By: Heena Patel

Post-Class Quiz: Telecommunication & Network Security Domain

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Cisco Which VPN Solution is Right for You?

Secured Voice over VPN Tunnel and QoS. Feature Paper

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Cornerstones of Security

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Figure 41-1 IP Filter Rules

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Local Area Networks (LANs) Blueprint (May 2012 Release)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

How To Pass A Credit Course At Florida State College At Jacksonville

Overview. Protocols. VPN and Firewalls

Chapter 5. Data Communication And Internet Technology

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Firewalls and Virtual Private Networks

Mobility and cellular networks

How Virtual Private Networks Work

Small, Medium and Large Businesses

IBM enetwork VPN Solutions

WAN Failover Scenarios Using Digi Wireless WAN Routers

Chapter 32 Internet Security

GPRS / 3G Services: VPN solutions supported

Multiprotocol router with X.21 and ISDN bintec R4300

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Network Security Topologies. Chapter 11

Proxy Server, Network Address Translator, Firewall. Proxy Server

Fundamentals of Network Security Graphic Symbols

Introduction to Security and PIX Firewall

TK C -25 C 95% RH EMC TK701G TK701U TK704G TK704U TK704W. TK-Series Cellular Router

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Common Remote Service Platform (crsp) Security Concept

1.1. Abstract VPN Overview

Chapter 2 - The TCP/IP and OSI Networking Models

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Creating a VPN Using Windows 2003 Server and XP Professional

Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Multi-Homing Dual WAN Firewall Router

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Cisco Virtual Office Express

Raptor Firewall Products

Virtual Private Networks

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Understanding the Cisco VPN Client

Network Security. Protective and Dependable. Pioneer of IP Innovation

L2F Case Study Overview

Virtual Private Network and Remote Access

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Advanced Higher Computing. Computer Networks. Homework Sheets

Security Technology: Firewalls and VPNs

we secure YOUR network we secure network security English network security

Computer Networks and the Internet

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

About Firewall Protection

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Voice over IP: Issues and Challenges

Using a Firewall General Configuration Guide

White Paper. Telenor VPN

NAT (Network Address Translation)

Application Note. Connecting your LAN to a WAN using DSL or Cable Modems. Introduction. Basic Interface Elements

MANAGEMENT INFORMATION SYSTEMS 8/E

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Design of a Network Security Testing Environment

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

UTT Technologies offers an effective solution to protect the network against 80 percent of internal attacks:

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

WAN Data Link Protocols

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Technical Glossary from Frontier

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Why a Reverse Proxy with My Instant Communicator for mobiles??

Chapter 9 Monitoring System Performance

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

Gigabit Content Security Router

DSL-2600U. User Manual V 1.0

Chapter 12 Supporting Network Address Translation (NAT)

Transcription:

Remote Access & Security Technology Overview Medizinische Technik Erlangen Markus Feeß Netze / Sicherheit SGK 2 1

John and the broken leg - Part I Archiv A? B C 2

WAN Technologies GSM Global System for Mobile Communications POTS Plain Old Telephon Service ISDN Integrated Services Digital Network DDV Datendirektverbindung xdsl Digital Subcriber Line GAN ATM Global Area Network Asynchronous Transfer Mode 3

GSM Global System for Mobile Communications Irda GSM POTS Derzeit: max 9600 bits/sec Ende 99: HSCSD (HighSpeed Circuit Switched Data) mit 28,8kbps - eplus Mitte 00: GPRS mit 9,6... 115kbps variabel 02: UMTS (Universal Mobile Telecommunications System) bis zu 2 Mbps 4

Digitale Datenverbindung DDV Only one partner Deutsche Telekom: e.g. D64S, D64S2 6

DK Konfigurator 8

DK Konfigurator 9

10

Bandwidth hungry Online/ Internet and Business services Entertainment Movies Transaction Services Homebanking ShopStop Fast Internet LAN connection Games What you need... Interactive Learning... your existing telephone line and a PC. Teleworking e.g. Joint Editing News 11

14

Security Policy RFC 2196 http://ds.internic.net/rfc/rfc2196.txt Maintain a written Policy 16

Ausgewogenheit Connectivität Performance Transparenz Authentication Authorization Accounting Verfügbarkeit Vertraulichkeit Zugang Sicherheit 17

18

Router / Network Security Access Control Closed Usergroup (Germany: GBG) Calling Line Identifikation Callback CHAP / PAP Packet Filter Not released! Encryption Radius Server 19

20

Encryption Router / Network Security IOS (3620/40) - 56 Bit Key DES Babylon - 128 Bit Key DES Not released! Modem Encryption Not compatible because of missing standards 21

Kosten / Zeitaufwand zum Hacken der DES Schlüssel Type of Attacker Budget 40-Bit 56-Bit 168-Bit 3DES Individual Hacker $400 5 Hours 38 Year Too Long Dedicated Hacker $10,000 12 Minutes 556 Days 10 19 Years Intelligence Community $10m 0.02 Sec 21 Minutes 10 17 Years Source: Blaze et al, Scheiner 1996 22

Ebenen der Verschlüsselung Application- Layer Application Headers im Klartext Network-Layer Netzwerk- und Transport Header im Kartext Application-Layer Encryption Network-Layer Encryption SSL IOS Encryption Link-Layer Datalink Header im Klartext Link-Layer Encryption Link-Layer Encryption 24

25

Security Architecture - IPsec RFC 1825 beschreibt die Architektur Bietet sich an für: Authentifizierung Privacy unterstützt IP Version 4 und IP Version 6 herstellerunabhängige Verschlüsselung 26

27

Protokollstack Firewall (proxy) intern Application Presentation Session Transport Packetfilter Network Physical Data-Link IPFORWARDING = 0 extern 28

Zweistufiges Firewall Design extern Internet nur von innen nach außen intern kontrollierter Zugang über Screening Router (Access Control Lists) Public WWW Public FTP Server in DMZ DNS Mail Intranet 29

VPDN (Virtual Private Dialup Network) ATM Encrypted VPN Workgroup IBM Core Intranet Home Gateways ISP Virtual Private Dialup Network 31

John and the broken leg - Solution Video Live 200 Archiv Bingo A 4/8 S 0 S 0 ISDN 4/8 S 0 Cisco 3620/40 B Cisco 3620/40 Video Live 200 C 32