1 / 15

Neah Bay Presentation

Neah Bay Presentation. Introduction. Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government, Commercial and Financial Institutions IP Security Wireless Security Router Based Security Remote Access Security. Security Issues.

nami
Télécharger la présentation

Neah Bay Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Neah Bay Presentation

  2. Introduction • Western DataCom has been in business for 20+ years providing data communications security solutions to the US Government, Commercial and Financial Institutions • IP Security • Wireless Security • Router Based Security • Remote Access Security

  3. Security Issues • 802.11b WEP Is Not Effective • Flawed Encryption Scheme • Weak Authentication • Vulnerable to hacking • Eavesdropping, Anti-Replay attacks, DDOS and Man-in-the-middle attacks • Un-authorized network access • Identity theft, SSID and MAC

  4. IPE-2M • IPSEC/HAIPIS encryptor • Tunnels • Encryption • Strong Authentication • 168-bit 3DES, SHA1 • Miniature, Low Power PC/104 Design • FIPS PUB 140-1 pending

  5. HAIPE • NSA Specification for IPSEC • Type 1 ESP Tunnel Mode • Data Integrity via SHA-1 • Authentication with Firefly • Access Control • Dynamic Discovery • PPK and IKE

  6. IPE-2M • Tactical and Strategic Operation • Compact Size, Light Weight, Low Power • HAIPIS • NSA Approved version of IPSEC • Type I Encryption • Type I Key Exchange • Compatible with Cisco 3200 Series

  7. IPE-2M Operation • Secures communications with IPSEC/HAIPIS, 3DES • Application Independent – Data, Voice and Video • Provides for many-to-many secure tunnels • Will operate in mobile or stationary environments

  8. Internet Mobile Network Behind Router – Strategic IPE-2M Mobile Router HA-MR Tunnel Roaming Interface HA-FA Tunnel Foreign Agent Home Agent IPE-IPE Secure Tunnel IPE-2M Home Network

  9. Internet Secure WAN In-Front of Router – Tactical Mobile Network Mobile Router IPE-2M Roaming Interface HA-MR Tunnel IPE-IPE Secure Tunnel IPE-2M HA-FA Tunnel Foreign Agent Home Agent Home Network

  10. Internet Secure WAN Secure Multicast Multicast Source/Receiver Mobile Router IPE-2M Roaming Interface HA-MR Tunnel IPE-IPE Secure Tunnel IPE-2M HA-FA Tunnel Foreign Agent Multicast Source/Receiver Home Network

  11. Internet Multiple Devices Mobile Router 1 IPE-2M Roaming Interface IPE-IPE Secure Tunnel Secure WAN HA-MR Tunnel IPE-2M Roaming Interface HA-FA Tunnel Mobile Router 2 IPE-IPE Secure Tunnel Foreign Agent Home Agent Home Network

  12. Behind Pro’s Takes advantage of mobile IP’s capabilities Scalable Behind Con’s Routers visible on secure network In-Front Pro’s Routers are on protected network In-Front Con’s Scalability can be an issue in large scale deployment Security Policies can become extensive Environment Pro’s & Con’s

  13. IPE System Solutions • Wide range of turnkey system solutions to meet numerous requirements • Complete end-systems • Commercial or COMSEC

  14. IPE Future • 5 Mbps, Type II version • 1 Gbps, Type I version • TBD Encryption Algorithm • Firefly

  15. Data Communications Security

More Related