SpeedTouch & Alcatel OmniPCX

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Cisco Router as a VPN Server. Agenda VPN Categories of VPN – Secure VPNs – Trusted VPN Hardware / Software Requirement Network Diagram Basic Router Configuration.
Encrypting Wireless Data with VPN Techniques
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Internet Protocol Security (IP Sec)
DNA-A212 / DNA-A213 ADSL 2+ Modem/Router
NS-H /11041 IP Security. NS-H /11042 TCP/IP Example.
IP EDGE DEVICES A solution for the Internet Migration Patrick Cocquet, 6WIND CEO, IPv6 Forum VP Dubai IPv6 Forum Summit – February 2001.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
All Rights Reserved © Alcatel-Lucent 2009 Home Worker Solutions June, 2009.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
WAN Technologies Dial-up modem connections
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Agenda 1. QUIZ 2. HOMEWORK LAST CLASS 3. HOMEWORK NEXT CLASS 4. DATA LINK CONTROL 5. FIREWALLS 6. PRACTICE EXAM.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SG-VRT ppt Page 1 VPN Broadband Communication Risk-free networking connection via PLANET PLANET Technology Corp.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 4: Designing Routing and Switching Requirements.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Networking Irfan Khan Myo Thein Nick Merante.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Code : STM#530 Samsung Electronics Co., Ltd. OfficeServ7400 Security Introduction Distribution EnglishED01.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
4-Jun-164/598N: Computer Networks Differentiated Services Problem with IntServ: scalability Idea: segregate packets into a small number of classes –e.g.,
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
IPSec Detailed Description and VPN
IPSecurity.
Providing Teleworker Services
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Presentation transcript:

SpeedTouch & Alcatel OmniPCX The ideal companion for Alcatel OmniPCX Office VPN for small remote offices & teleworkers @Office @Home

OmniPCX add-ons Solution for small remote offices or teleworkers

Customers needs Customers needs Many companies have small home/remote offices and want to provide remote workers with a cost effective but powerful communication solution towards main office They have both voice & data needs in these small remote/home office

SpeedTouch answers You can combine Alcatel OmniPCX Office or Alcatel OmniPCX Enterprise communication servers to have a competitive, reliable and secured solution for these small remote offices By deploying our Business DSL routers with built-in VPN capabilities

Solution benefits VAR Competitive advantage End-User Integration of the small remote office in the global company communications Nice solution to sell to the customer Value proposition both for voice & data through the VPN End-User PBX features transparency over DSL The remote users have the same features than the main office users Secured solution with VPN and embedded firewall Data capabilities on top Access to email, internet, intranet Unified messaging

OmniPCX Office eBusiness How does it fit ? OmniPCX Office eBusiness PSTN OmniPCX Office eBusiness with VPN ST610 with VPN feature or ST608 VPN Internet IP Phone Full PBX features (ex: call forwarding, call monitoring …) OmniPCX Office ST600 IP softphone Main office Small remote office teleworkers

Quality of Service & Bandwidth How does it fit ? Quality of Service & Bandwidth Quality of service The SpeedTouch supports OmniPCX compatible advanced QoS features that enable voice packets to have high priority VLAN 802.1p User Priority Mapping IP, TCP, UDP, ICMP header based packet classification, prioritization and forwarding IP header TOS byte / DSCP field marking IP QoS queues instantiated per upstream interface (ATM VP/VC) IP QoS Scheduling : Queuing between 6 classes: Real-time queue with strict priority over all other queues 4 WFQ queues with strict priority over the best effort queue Best Effort queue. This class will use any bandwidth that is not used by the other classes, but does not have any bandwidth guarantees. Bandwidth Required bandwidth according to OmniPCX configurations (G711, G723, or G729)

What do you need ? Mandatory Optional Main Office Alcatel OmniPCX Office Business Alcatel OmniPCX Office eBusiness (with VPN software license) Internet connection Optional DSL router SpeedTouch 610 (or ST608) if the previous Internet connection is not present Small Remote Office/Teleworkers DSL router SpeedTouch 610 with the VPN software key (or ST608) DSL connection with any ISP Alcatel IP phones or Alcatel IP Softphones

Differences between ST608 & ST610 The 610 is useful if you want to do remote management of the branch-office, and/or if you would like to rollout later on SIP phones with local calls capabilities SpeedTouch 610 vs 608 : Main differences Remote management with SNMP MIBs Up to 16 VPN tunnels instead of 2 Local SIP communications in the remote office (built-in SIP proxy & registrar, call logs, call blocking) SNTP, RIP1 & RIP2 …

Quick products overview ST 608 ST 610

SpeedTouch 608(i) 608 (i) Key Differentiators Key Features Enhanced Security Features Reliability Advanced Quality of Service Embedded IP Sec (ICSA certified) Embedded Firewall WAN Interfaces : ADSL (POTS and ISDN) 4 Port Ethernet Switch and Ethernet 608 (i) Key Benefits Easy Installation :Set Up Wizard Security Positioning Optional Information High End Business Router Business Internet Access LAN to LAN Interconnection Secure Home and Teleworking Fastest Routing (15K Packets/Sec) Unique support AES Encryption and Public Key Infrastructure

SpeedTouch 610 (i,s) 610 (i,s) Key Features Key Differentiators Embedded IP Sec (ICSA certified) Embedded Firewall SIP Multimedia PBX WAN Interfaces : ADSL (POTS and ISDN) SHDSL Syslog, SNMP, SNTP, RIPv1, RIPv2 4 Port Ethernet Switch and Ethernet + ATMF Variants Enhanced Security Features Reliability Remotely Manageable: Full SLA SIP PBX (Sip Server & Registrar) Advanced Quality of Service 610 (i,s) Key Benefits Easy Installation :Set Up Wizard Upselling of IP Sec/SIP via Software Activation Remote Management Security Positioning Optional Information High End Business Router Business Internet Access LAN to LAN Interconnection Secure Home and Teleworking Fastest Routing (15K Packets/Sec) Unique support AES Encryption and Public Key Infrastructure 2 and 4 wire SHDSL

ST608/610: VPN features VPN Built-in VPN IPSEC ICSA certification Advanced features Key distribution Public key infrastructure (RFC 2459, ITU-T Q.817) with X.509 digital certificates; support for cross-certification and chain of trust On-line PKI enrollment: CEP (certificate enrollment protocol) interoperable with Entrust, VeriSign, Netscape and Baltimore CAs Off-line PKI enrollment: PKCS#10 "Certification Request Syntax Standard" (RFC 2314 / 2986) and PKCS#7 "Cryptographic Message Syntax Standard", compatible with Entrust, VeriSign, Netscape, RSA Security (RSAS) and Xcert Shared secrets Tunnel set-up ISAKMP, IKE / Oakley (RFC 2408 / 2409 / 2412), Main Mode and Aggressive Mode Diffie-Hellman group number 1, 2 and 5 Certificate Revocation List (CRL) – ITU-T X.509v2; offline import; online import via LDAP (RFC 1777) and HTTP interface Xauth authentication: PAP and CHAP

ST608/610: VPN features VPN Advanced features Tunnel mode Encryption IPsec authentication header (AH - RFC 2402) and encapsulating security payload header (ESP - RFC 2406) Support for NAT-T IPSec ESP on top of UDP IPsec IP payload compression (IPCOMP - RFC2393 / 3173): LZS (RFC 2395, ANSI X3.241-1994), deflate / zlib (RFC 2394) Bridge Emulation Mode (BEM) using proxy ARP Automatic and manual policy rules Encryption AES Rijndael, DES (RFC 2405, FIPS-46-2, FIPS-74, FIPS-81), 3DES, RC5 (RFC 2040), null encryption (RFC 2410), perfect forward secrecy (PFS), ESP CBC-mode cipher algorithms (RFC 2451) Hashing HMAC, MD5 (RFC 2403), SHA1 (FIPS-180-1, RFC 2404 / 3174)

Built for excellence