Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
Advertisements

Unleashing the Power of IP Communications Calling Across The Boundaries Mike Burkett, VP Products April 25, 2002.
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Enabling IPv6 in Corporate Intranet Networks
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Guide to Network Defense and Countermeasures Second Edition
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
SCSC 455 Computer Security Virtual Private Network (VPN)
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
MSIT 458: Information Security & Assurance By Curtis Pethley.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Circuit & Application Level Gateways CS-431 Dick Steflik.
A Guide to major network components
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
POLYCOM CONFIDENTIAL Polycom enables Alcatel Instant Video Solution by combining the power Alcatel IP Telephony with Polycom Unified Collaboration Solutions.
Design Elements for Perimeter Security UNIT-10. Firewall and Router  The firewall and the router are two of the most common perimeter security components.
Telehealth Equipment Enabling Successful Telehealth Encounters Endpoints, Protocols, Networks, Peripherals.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
PROS & CONS of Proxy Firewall
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
SIP? NAT? NOT! Traversing the Firewall for SIP Call Completion Steven Johnson President, Ingate Systems Inc.
PART 2: Product Line. Tenor Switches & Gateways Tenor AX Series Solution For Medium to Large Enterprises  Available in 8, 16, 24 and 48 port Available.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
MIS Fall Conference October 16 th, 2007 Patrick Capozzi Systems Engineer.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
PVX Product Briefing July 2005 For more information, contact: 1 PC Network Inc. 1 PC Network Inc. Phone Fax
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Module 11: Remote Access Fundamentals
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
January 2008 TANDBERG Codian ISDN Gateway 3201 Series TANDBERG Codian 3241.
Sridhar Ramachandran Chief Technology Officer Core Session Controller.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
LTEC Assignment 3 Part 1 Shannon Smith /sls0571.
Virtual Private Networks (VPN)
CONNECTING TO THE INTERNET
Chapter 1: WAN Concepts Connecting Networks
11/12/2018.
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Polycom® DMA™ 7000 Positioning Statement Key Benefits
Multimedia Communications and Firewall/NAT
Presentation transcript:

Polycom Conference Firewall Solutions

2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and Video is improving drastically, making it easy to conference over the internet Increasing need to scale, manage, and deploy all while maintaining a secure environment The goal is to connect Anywhere, Anytime, without boundaries

3 Continued questions in conferencing today … Who can I call? How do I call? Is there a firewall involved? What kind of endpoints do I have?

4 Video over IP Deployment Challenges Existing networking infrastructure is not “media-aware” Firewalls block Media (Video/Audio) calls Network Address Translation (NAT) breaks addressing Video/Audio and data traffic on shared WAN pipes degrades voice and video quality User Concerns Dialing concerns How do I call them? What should I dial? –Do I have to register with them? –Why can’t they call me? Designing around the above problems is difficult and expensive with legacy CPE hardware

5 How do you fix the problem? NAT Avoidance Uses techniques to avoid a firewall / NAT May require additional CPE NAT Traversal Video calls traverse the firewall / NAT Multiple methods available

6 One approach – Avoid the NAT problem Public IP PROXY Public – Private IP TUNNELS Virtual Private Networks (VPN)

7 Firewall Traversal Solutions Firewall Traversal Solutions Application Layer Gateway (ALG) Enables a firewall to become media aware without compromising security H.460 Based Traversal ITU defined NAT/FW traversal method Works with legacy firewalls

8 Resolves Network Address Translations issues Media and protocol aware Preserves all features (Encryption/Content Sharing) Uses Stateful Packet Inspection Dynamically opens and closes ports Provides topology hiding to protect the H.323 Components (endpoints, bridges, gatekeepers) and data devices Application Layer Gateway (ALG)

9 ALG Pros Security (intrinsic Firewall) –Dynamic Port utilization for call duration Scalable - Enables Shortest Path Media Routing Less costly – no extra bandwidth Ideal for “fixed” video installations Video endpoint registration not mandatory Flexible dialing ALG Cons Not practical for mobile work force

10 H.460 – Traversal of H.323 across NATs and Firewalls H.460 ITU Standard Extension to H.323 Developed by Polycom, Radvision, Tandberg Approved August 2005 H.460 enables H.323 signalling and media to traverse NAT/FW installations Utilizes a Traversal Server (TS) at a central location Requires H.460 aware endpoints to register with Traversal Server All VSX systems are H.460 aware with VSX Release 8.5!

11 H.460 – Traversal Server H.460 Pros Allows for IP calling with legacy firewalls –IP and Port issues resolved at Traversal Server Simplistic for registered H.460 endpoints Ideal for mobile users (road warriors / hot spots / home users) H.460 Cons Extra bandwidth may be needed at Traversal Server location Requires endpoints to register with the Traversal Server Scalability - all traffic routed through the host location (signaling and media) Less Secure (Traversal Server may not be a Firewall)

12 Choosing The Right Solution ISDN gateway More expensive ISDN not available everywhere H.323 aware firewall Restricts the feature set – encryption Not ISP friendly VPN Exposure risk for Home Offices Not used for enterprise-to-enterprise communication Put all video systems on public IP addresses Vulnerable to attack Limited availability of public IP addresses Not scalable

13 Introducing the Polycom V2IU Simplifies - Inter-company video conferencing Resolves - NAT/Firewall traversal problems for Video over IP Protects - Video and Voice devices with an application aware firewall Flexible – Can be deployed as an ALG or Traversal Server (H.460) V 2 IU Product Family – “Voice and Video Interface Unit” 6400 Series 85 Meg Base MSRP - $42, Series 10 Meg or 25 Meg Base MSRP - $7, Meg Base MSRP - $1,999

14 V2IU Key Features And Benefits V 2 IU FeaturesBenefits V2IU offers multiple modes (ALG & Traversal Server (H.460) Flexibility to solve customer networking challenges Solution adapts to network requirements Flexible dialing optionsEase of use SecurityV2IU is a media aware firewall Cost efficient Lower Total Cost of Ownership – Equipment and Network charges Shortest path routing Improved Scalability, reduced latency (improved video quality) Flexible deployment optionsFamily of products to meet capacity needs With VSX Release 8.5, all VSX solutions are H.460 compliant!

15 Complete Polycom Solution

Thanks ! Questions?