Network Connectivity Options Currently offered by Wyless.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
1 Enabling Secure Internet Access with ISA Server.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
TOSIBOX LOCK security options 1 1.
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
4: Addressing Working At A Small-to-Medium Business or ISP.
Module 3: Planning and Troubleshooting Routing and Switching.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
PSeries Technical Conference L19 Brian Dolan-Goecke Atlanta, GeorgiaOctober 8-12, 2001 Linux VPN.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
CustomerSegment and workloads Your Datacenter Active Directory SharePoint SQL Server.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
 An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network.
Virtual Private Networks Warren Toomey. Available WAN Links.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Module 5: Designing Security for Internal Networks.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Security fundamentals Topic 10 Securing the network perimeter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
 Router Configurations part2 2 nd semester
Windows Vista Configuration MCTS : Advanced Networking.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Defining Network Infrastructure and Network Security Lesson 8.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
MTA Network Fundamental Cram Sesion
Network Security Solution
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
CIT 276Competitive Success/snaptutorial.com
CIT 276 Education for Service-- snaptutorial.com
* Essential Network Security Book Slides.
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Network Connectivity Options Currently offered by Wyless

Option 1: Standard, no VPN Mobile-originate traffic only Outbound traffic can be filtered by white listing IP addresses or ports (such as blocking all traffic except for customer's public-facing server) Useful when there is no requirement to initiate a session to the cellular device

Option 1: Standard, no VPN

Option 2: PPTP VPN Requires PPTP client on every host initiating session to the cellular device Slightly less secure than IPsec VPN Outbound traffic to internet can be filtered by white listing IP addresses or ports Typically used for development or testing purposes PPTP in Porthos account has access to all cellular connections in that account

Option 2: PPTP VPN

Option 3a: Standard IPsec VPN Only traffic intended directly for customer's LAN goes over the IPsec tunnel Outbound traffic to internet can be filtered by whitelisting IP addresses or ports Most popular and easiest type of IPsec to set up

Option 3a: Standard IPsec VPN

Detailed View, Option 3a

Option 3b: Default-Gateway IPsec All traffic goes through the tunnel to customer LAN Customer can directly monitor/control cellular traffic out to internet themselves Avoids customer IP addressing conflicts with Wyless network

Option 3b: Default-Gateway IPsec

Detailed View, Option 3b

Option 3c: GRE over IPsec VPN Alternative to default-gateway IPsec GRE allows use of dynamic routing protocols “Split GRE” configuration can still allow cellular traffic directly to internet

Option 3c: GRE over IPsec VPN

Option 4: MPLS connectivity alternative to GRE-IPSec Requires customer provided router(s) and circuit(s) into our datacenter

Option 4: MPLS Connectivity

Option 5: Public Static Addressing Requires use of very limited public IP addresses Allows mobile-terminate traffic without VPN Least secure of any connectivity option Outbound or inbound traffic can be filtered by whitelisting internet IP addresses or ports Device is vulnerable to unsolicited bandwidth usage by random internet sources

Option 5: Public Static Addressing