Type 1 IPSEC Encryptor - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Type 1 IPSEC Encryptor

Description:

Un-authorized network access. Identity theft, SSID and MAC ... Secures communications with IPSEC/HAIPIS, 3DES. Application Independent Data, Voice and Video ... – PowerPoint PPT presentation

Number of Views:58
Avg rating:3.0/5.0
Slides: 16
Provided by: jeffsw8
Category:

less

Transcript and Presenter's Notes

Title: Type 1 IPSEC Encryptor


1
Neah Bay Presentation
2
Introduction
  • Western DataCom has been in business for 20
    years providing data communications security
    solutions to the US Government, Commercial and
    Financial Institutions
  • IP Security
  • Wireless Security
  • Router Based Security
  • Remote Access Security

3
Security Issues
  • 802.11b WEP Is Not Effective
  • Flawed Encryption Scheme
  • Weak Authentication
  • Vulnerable to hacking
  • Eavesdropping, Anti-Replay attacks, DDOS and
    Man-in-the-middle attacks
  • Un-authorized network access
  • Identity theft, SSID and MAC

4
IPE-2M
  • IPSEC/HAIPIS encryptor
  • Tunnels
  • Encryption
  • Strong Authentication
  • 168-bit 3DES, SHA1
  • Miniature, Low Power PC/104 Design
  • FIPS PUB 140-1 pending

5
HAIPE
  • NSA Specification for IPSEC
  • Type 1 ESP Tunnel Mode
  • Data Integrity via SHA-1
  • Authentication with Firefly
  • Access Control
  • Dynamic Discovery
  • PPK and IKE

6
IPE-2M
  • Tactical and Strategic Operation
  • Compact Size, Light Weight, Low Power
  • HAIPIS
  • NSA Approved version of IPSEC
  • Type I Encryption
  • Type I Key Exchange
  • Compatible with Cisco 3200 Series

7
IPE-2M Operation
  • Secures communications with IPSEC/HAIPIS, 3DES
  • Application Independent Data, Voice and Video
  • Provides for many-to-many secure tunnels
  • Will operate in mobile or stationary environments

8
Mobile Network
Behind Router Strategic
IPE-2M
Mobile Router
HA-MR Tunnel
Roaming Interface
HA-FA Tunnel
Foreign Agent
Home Agent
IPE-IPE Secure Tunnel
IPE-2M
Home Network
9
In-Front of Router Tactical
Mobile Network
Mobile Router
IPE-2M
Roaming Interface
HA-MR Tunnel
IPE-IPE Secure Tunnel
IPE-2M
HA-FA Tunnel
Foreign Agent
Home Agent
Home Network
10
Secure Multicast
Multicast Source/Receiver
Mobile Router
IPE-2M
Roaming Interface
HA-MR Tunnel
IPE-IPE Secure Tunnel
IPE-2M
HA-FA Tunnel
Foreign Agent
Multicast Source/Receiver
Home Network
11
Multiple Devices
Mobile Router 1
IPE-2M
Roaming Interface
IPE-IPE Secure Tunnel
Secure WAN
HA-MR Tunnel
IPE-2M
Roaming Interface
HA-FA Tunnel
Mobile Router 2
IPE-IPE Secure Tunnel
Foreign Agent
Home Agent
Home Network
12
Environment Pros Cons
  • Behind Pros
  • Takes advantage of mobile IPs capabilities
  • Scalable
  • Behind Cons
  • Routers visible on secure network
  • In-Front Pros
  • Routers are on protected network
  • In-Front Cons
  • Scalability can be an issue in large scale
    deployment
  • Security Policies can become extensive

13
IPE System Solutions
  • Wide range of turnkey system solutions to meet
    numerous requirements
  • Complete end-systems
  • Commercial or COMSEC

14
IPE Future
  • 5 Mbps, Type II version
  • 1 Gbps, Type I version
  • TBD Encryption Algorithm
  • Firefly

15
Data Communications Security
Write a Comment
User Comments (0)
About PowerShow.com