SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Secure Transmission
      of Data
  Carrier Ethernet for Business
The Enviroment

Universal connectivity is essential in
today’s complex business
environments. Driven by the
convergence of data, voice and video
over sophisticated and expanding
networks, growth in demand for
bandwidth is outpacing Moore’s Law to
supply sufcient throughput
Benets of Layer 2 Carrier




• Scalability
• Predictability, Risk Reduction,
  Certication
• Control
Benets of Layer 2 Carrier




• Performance
• Key Carrier Ethernet attribute
 • Redundant equipment architectures and fast re-routing
    algorithms
Benets of Layer 2 Carrier




• Data Center & Server Consolidation
• Simplicity
The three main security risks within
     an Ethernet network are:

 • Data leakage - A sniffer could intercept data
   streams allowing access to private company
   data

 • Data loss - A misconfigured router/switch
   could send your unprotected data to an
   unintended destination

 • Data theft - An intruder can launch an
   attack from a connected Layer 2 WAN to get
   access to your data
Quick Facts

• At the average packet sizes typical in
  today’s converged networks at Layer
  3, IPsec overhead reaches 40-50
  percent of total bandwidth
• Ethernet encryption at Layer 2
  virtually eliminates overhead, and
  lowers total cost of ownership by
  streamlining security measures
Metro Ethernet Carrier Standards



• Traffic Separation and Isolation
• Authentication of interconnected
  equipment
• Encryption of data in transit
Trafc Separation and Isolation

• Ethernet Virtual Connection (EVC) is
   a standard Ethernet interface that is the point of demarcation
   between the customer equipment and the service provider's
   metro Ethernet network.


• EVC is a logical tunnel that connects two (P2P) or more
   (MP2MP) sites, enabling the transfer of Ethernet frames
   between them.
Authentication of interconnected
          equipment
• IEEE 802.1X to authenticate CE-1
  and establish trust relationship
  between PE-1 and CE-1
 • Controls what devices are permitted
    to access the network


• MACSec (IEEE 802.1AE) to
  authenticate packets exchanged
  between CE-1 and PE-1
Encryption of data in transit


• Encryption accomplished at
  different levels
 • Most commonly provided at IP Layer 3

    • IPSec/SSL for IP

• Layer 2 Ethernet and IP Encryption
  Standards
 • MACSec for Ethernet
Questions

Weitere ähnliche Inhalte

Was ist angesagt?

Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmHemalathaR31
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Jiunn-Jer Sun
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2HemalathaR31
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lanParthipan Parthi
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
Wireless security
Wireless securityWireless security
Wireless securitySalma Elhag
 
Job profile chart t2
Job profile chart t2Job profile chart t2
Job profile chart t2Azarudin Asrap
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 HemalathaR31
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present syedishaq
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Network switch
Network switchNetwork switch
Network switchRavinder Kaur
 
Modem technology
Modem technologyModem technology
Modem technologySelf-employed
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaborationtelemetria
 

Was ist angesagt? (20)

Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watmEc8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 1 watm
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
 
Wi-fi tecnology
Wi-fi tecnologyWi-fi tecnology
Wi-fi tecnology
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Job profile chart t2
Job profile chart t2Job profile chart t2
Job profile chart t2
 
EC8004 wireless networks unit 1
EC8004 wireless networks unit 1 EC8004 wireless networks unit 1
EC8004 wireless networks unit 1
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Network switch
Network switchNetwork switch
Network switch
 
zigbee full ppt
zigbee full pptzigbee full ppt
zigbee full ppt
 
Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)Wireless LAN Network Topologies (ENG)
Wireless LAN Network Topologies (ENG)
 
Modem technology
Modem technologyModem technology
Modem technology
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Siemens & TPP Collaboration
Siemens & TPP CollaborationSiemens & TPP Collaboration
Siemens & TPP Collaboration
 
CCNA Icnd110 s04l03
CCNA Icnd110 s04l03CCNA Icnd110 s04l03
CCNA Icnd110 s04l03
 
Firewalls
FirewallsFirewalls
Firewalls
 

Andere mochten auch

RPKI Deployment Panel
RPKI Deployment PanelRPKI Deployment Panel
RPKI Deployment PanelAPNIC
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange ProtocolPrateek Singh Bapna
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLSkeithrozario
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmissionbjp4642
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Sandeep Gupta
 
SSL, FFL, SFL Abbreviations
SSL, FFL, SFL AbbreviationsSSL, FFL, SFL Abbreviations
SSL, FFL, SFL AbbreviationsEhlelt Mancha
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Missile Technology
Missile TechnologyMissile Technology
Missile TechnologyAshwin Baindur
 
Plan symbols
Plan symbolsPlan symbols
Plan symbolsgopaltry
 

Andere mochten auch (14)

RPKI Deployment Panel
RPKI Deployment PanelRPKI Deployment Panel
RPKI Deployment Panel
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
SSL-image
SSL-imageSSL-image
SSL-image
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
SSL, FFL, SFL Abbreviations
SSL, FFL, SFL AbbreviationsSSL, FFL, SFL Abbreviations
SSL, FFL, SFL Abbreviations
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Missile Technology
Missile TechnologyMissile Technology
Missile Technology
 
Plan symbols
Plan symbolsPlan symbols
Plan symbols
 

Ähnlich wie Brett Lewis - Secure Transmission of Data on Metro Ethernet Networks

Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lanjency j
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-complianceNir Cohen
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
Data diode
Data diode Data diode
Data diode Aman Verma
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperNir Cohen
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperST Engineering iDirect
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
 
Cdma Security
Cdma SecurityCdma Security
Cdma Securityguestb2cc28
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENJuan Boggiano
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Secured Data Transmission
Secured Data Transmission Secured Data Transmission
Secured Data Transmission ROHAN HALDER
 
framing in computer network by tanuj jain
framing in computer network by tanuj jainframing in computer network by tanuj jain
framing in computer network by tanuj jainSRKkkr1
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
 
Accedian ETHERNID
Accedian ETHERNIDAccedian ETHERNID
Accedian ETHERNIDsavomir
 

Ähnlich wie Brett Lewis - Secure Transmission of Data on Metro Ethernet Networks (20)

Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lan
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Data diode
Data diode Data diode
Data diode
 
Carrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paperCarrier grade ethernet for power utilities - solution paper
Carrier grade ethernet for power utilities - solution paper
 
Transmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White PaperTransmission Security (TRANSEC) - White Paper
Transmission Security (TRANSEC) - White Paper
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Secured Data Transmission
Secured Data Transmission Secured Data Transmission
Secured Data Transmission
 
framing in computer network by tanuj jain
framing in computer network by tanuj jainframing in computer network by tanuj jain
framing in computer network by tanuj jain
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
Advanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet NetworksAdvanced Security Management in Metro Ethernet Networks
Advanced Security Management in Metro Ethernet Networks
 
Accedian ETHERNID
Accedian ETHERNIDAccedian ETHERNID
Accedian ETHERNID
 

KĂźrzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

KĂźrzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Brett Lewis - Secure Transmission of Data on Metro Ethernet Networks

  • 1. Secure Transmission of Data Carrier Ethernet for Business
  • 2. The Enviroment Universal connectivity is essential in today’s complex business environments. Driven by the convergence of data, voice and video over sophisticated and expanding networks, growth in demand for bandwidth is outpacing Moore’s Law to supply sufcient throughput
  • 3. Benets of Layer 2 Carrier • Scalability • Predictability, Risk Reduction, Certication • Control
  • 4. Benets of Layer 2 Carrier • Performance • Key Carrier Ethernet attribute • Redundant equipment architectures and fast re-routing algorithms
  • 5. Benets of Layer 2 Carrier • Data Center & Server Consolidation • Simplicity
  • 6. The three main security risks within an Ethernet network are: • Data leakage - A sniffer could intercept data streams allowing access to private company data • Data loss - A miscongured router/switch could send your unprotected data to an unintended destination • Data theft - An intruder can launch an attack from a connected Layer 2 WAN to get access to your data
  • 7. Quick Facts • At the average packet sizes typical in today’s converged networks at Layer 3, IPsec overhead reaches 40-50 percent of total bandwidth • Ethernet encryption at Layer 2 virtually eliminates overhead, and lowers total cost of ownership by streamlining security measures
  • 8. Metro Ethernet Carrier Standards • Trafc Separation and Isolation • Authentication of interconnected equipment • Encryption of data in transit
  • 9. Trafc Separation and Isolation • Ethernet Virtual Connection (EVC) is a standard Ethernet interface that is the point of demarcation between the customer equipment and the service provider's metro Ethernet network. • EVC is a logical tunnel that connects two (P2P) or more (MP2MP) sites, enabling the transfer of Ethernet frames between them.
  • 10. Authentication of interconnected equipment • IEEE 802.1X to authenticate CE-1 and establish trust relationship between PE-1 and CE-1 • Controls what devices are permitted to access the network • MACSec (IEEE 802.1AE) to authenticate packets exchanged between CE-1 and PE-1
  • 11. Encryption of data in transit • Encryption accomplished at different levels • Most commonly provided at IP Layer 3 • IPSec/SSL for IP • Layer 2 Ethernet and IP Encryption Standards • MACSec for Ethernet