SlideShare ist ein Scribd-Unternehmen logo
1 von 14
BEL 2 Spezial, Unterschleißheim, Germany
03.07.2014
Stephan Neidlinger
Security in Optical Networks –
Useless or Necessary?
© 2014 ADVA Optical Networking. All rights reserved. Confidential.22
Broadband Access Network Market Trends
• Service data rates keep on increasing
• NG video: 3D, UHDTV, on-line streaming services, …
• Several markets need to be addressed in order to decrease return of
investment time in FTTH infrastructure projects (according to the
FTTH business guide published by FTTH Council Europe)
• Residential
• Business
• Carrier
• Public sector
• These applications call for
• Equal down/upstream bandwidth (e g business, carrier services)
• Scalable architecture (e g user individual bandwidth upgrade)
• Simple systems for low cost potential (especially for residential market)
• Secure architecture (e g business services)
© 2014 ADVA Optical Networking. All rights reserved. Confidential.33
FTTH Business Guide
© 2014 ADVA Optical Networking. All rights reserved. Confidential.44
FTTH Business Guide
© 2014 ADVA Optical Networking. All rights reserved. Confidential.55
Example:
Data Center Environment & Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.66
Data Center Environment & Security
Physical Access to the Data Center
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.77
Data Center Environment & Security
Hardware Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.88
Data Center Environment & Security
Software Security
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.99
Data Center Environment & Security
…and what about the Fiber Connection?
APPS APPS
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1010
Fiber Optic Networks
Tapping Possibilities
Y-Bridge for
service activities
Fiber Coupling device
Street cabinet
How
to get access?
Where
to get access?
Splice boxes / cassettes
(Outdoor / Inhouse)
There are multiple ways to access fiber
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1111
Fiber Optic Networks
Optical Tapping Method
Cladding: 125 µm
Core: 9 µm
Lost Light
“For both public and private networks,
optical taps and analytic devices are
required and inexpensive maintenance
equipment in common use worldwide
today. Various types of optical taps
[…] are also used for corporate
espionage…”
„Clearly, physical protection of optical
transmission media and junction boxes
is essential; in addition, data
encryption plays a role in protecting
sensitive data.” [5]
[5] Security Strategies Alert, M.E. Kabay, March 2003
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1212
Fiber Optical Networks Security Options
Encryption
Security-Hardened Software
Physical Layer Monitoring
Power Tracking
Intrusion Detection
Optical Time-Domain Reflectometer (OTDR)
RADIUS
Secure Shell
SNMPv3
AES-256
Authentication
Diffie-Hellman
Optical Networks Security Tools are necessary and available
122842636
© 2014 ADVA Optical Networking. All rights reserved. Confidential.1313
WAN
Ipsec /
MacSec
Encryption
WDM-transport WDM-transport
Site BSite A
WAN
Appliance
based
Encryption
WDM-transport
Site B
WDM-transport
Site A
Optical Transmission Security
Speed of Encryption
WAN
Router Site A Site B
xWDM based
Encryption
Speed,throughputandsimplicity
TDM TDM
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
Router
FC Switch
sneidlinger@advaoptical.com
Thank You
IMPORTANT NOTICE
The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this
presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited.
The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or
implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental,
consequential and special damages,
alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation.
Copyright © for the entire content of this presentation: ADVA Optical Networking.

Weitere ähnliche Inhalte

Was ist angesagt?

Application Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul EvolutionApplication Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul Evolution
ADVA
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
ADVA
 

Was ist angesagt? (20)

Application Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul EvolutionApplication Note: Mobile Backhaul Evolution
Application Note: Mobile Backhaul Evolution
 
What is a Network Hypervisor?
What is a Network Hypervisor?What is a Network Hypervisor?
What is a Network Hypervisor?
 
Phase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware NetworksPhase Delivery Over PTP Unaware Networks
Phase Delivery Over PTP Unaware Networks
 
AnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile NetworksAnyCell Connectivity - A New Era for Mobile Networks
AnyCell Connectivity - A New Era for Mobile Networks
 
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect FunctionalityADVA Optical Networking Introduces New Data Center Interconnect Functionality
ADVA Optical Networking Introduces New Data Center Interconnect Functionality
 
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
First Field Demonstration of Cloud Datacenter Workflow Automation Employing D...
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Introducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect NetworksIntroducing the Future of Data Center Interconnect Networks
Introducing the Future of Data Center Interconnect Networks
 
Tunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum WorkshopTunable DWDM PON at WDM PON Forum Workshop
Tunable DWDM PON at WDM PON Forum Workshop
 
Flexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data CentersFlexible and Secure Connectivity for Cloud Data Centers
Flexible and Secure Connectivity for Cloud Data Centers
 
Sharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experienceSharing is caring: Real-life shared infrastructure experience
Sharing is caring: Real-life shared infrastructure experience
 
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
Introducing the ADVA FSP 150 ProVM – Assured Virtual Network Functions at the...
 
Secure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM TechnologySecure, High Performance Transport Networks Based on WDM Technology
Secure, High Performance Transport Networks Based on WDM Technology
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance Connectivity
 
The New NFV Powerhouse
The New NFV Powerhouse The New NFV Powerhouse
The New NFV Powerhouse
 
High Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam ClockHigh Performance Optically Pumped Cesium Beam Clock
High Performance Optically Pumped Cesium Beam Clock
 
WDM PON Forum Workshop
WDM PON Forum WorkshopWDM PON Forum Workshop
WDM PON Forum Workshop
 
Introducing Ethernet Services Suite
Introducing Ethernet Services SuiteIntroducing Ethernet Services Suite
Introducing Ethernet Services Suite
 
Connecting End Customer Devices Without Limits
Connecting End Customer Devices Without LimitsConnecting End Customer Devices Without Limits
Connecting End Customer Devices Without Limits
 
The Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDNThe Impact of Advanced Optical Technologies on Transport SDN
The Impact of Advanced Optical Technologies on Transport SDN
 

Andere mochten auch (10)

Why optical networks ?
Why optical networks ?Why optical networks ?
Why optical networks ?
 
Nanorobot using in medical field
Nanorobot using in medical fieldNanorobot using in medical field
Nanorobot using in medical field
 
Bbm Guvenlik Semineri
Bbm Guvenlik SemineriBbm Guvenlik Semineri
Bbm Guvenlik Semineri
 
PACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable NetworksPACE-IT: Troubleshooting Fiber Cable Networks
PACE-IT: Troubleshooting Fiber Cable Networks
 
Bluetooth Guvenligi Sunum
Bluetooth Guvenligi SunumBluetooth Guvenligi Sunum
Bluetooth Guvenligi Sunum
 
Optik Aglarin Guvenligi
Optik Aglarin GuvenligiOptik Aglarin Guvenligi
Optik Aglarin Guvenligi
 
Fiber Teori
Fiber TeoriFiber Teori
Fiber Teori
 
Senetas fibre optic connections are secure - right
Senetas   fibre optic connections are secure - rightSenetas   fibre optic connections are secure - right
Senetas fibre optic connections are secure - right
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Secure communication over fiber optic networks
Secure communication over fiber optic networksSecure communication over fiber optic networks
Secure communication over fiber optic networks
 

Ähnlich wie Security in Optical Networks - Useless or Necessary?

Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013
Raja Gopal
 

Ähnlich wie Security in Optical Networks - Useless or Necessary? (20)

Scalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the FutureScalable, Secure, Programmable – Cloud Connectivity for the Future
Scalable, Secure, Programmable – Cloud Connectivity for the Future
 
CDE Marketplace: SQR Systems
CDE Marketplace: SQR SystemsCDE Marketplace: SQR Systems
CDE Marketplace: SQR Systems
 
Secure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth ApplicationsSecure WDM Connectivity for High-Bandwidth Applications
Secure WDM Connectivity for High-Bandwidth Applications
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 
Next Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical NetworkingNext Generation Optical Networking: Software-Defined Optical Networking
Next Generation Optical Networking: Software-Defined Optical Networking
 
Layer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport SystemsLayer 1 Encryption in WDM Transport Systems
Layer 1 Encryption in WDM Transport Systems
 
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Security and services drive data north
Security and services drive data northSecurity and services drive data north
Security and services drive data north
 
Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013Proxim 4G Public safety wireless solutions 2013
Proxim 4G Public safety wireless solutions 2013
 
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
THE US’s NATIONWIDE PUBLIC SAFETY LTE NETWORK THE GLOBAL ADOPTION OF LTE FOR ...
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
 
Presentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdfPresentation - 5G Private & Dedicated Networks.pdf
Presentation - 5G Private & Dedicated Networks.pdf
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20Druid - Latest Case Studies & Use Cases_08.07.20
Druid - Latest Case Studies & Use Cases_08.07.20
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
5G: A 2020 Vision
5G: A 2020 Vision5G: A 2020 Vision
5G: A 2020 Vision
 

Mehr von ADVA

Mehr von ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Security in Optical Networks - Useless or Necessary?

  • 1. BEL 2 Spezial, Unterschleißheim, Germany 03.07.2014 Stephan Neidlinger Security in Optical Networks – Useless or Necessary?
  • 2. © 2014 ADVA Optical Networking. All rights reserved. Confidential.22 Broadband Access Network Market Trends • Service data rates keep on increasing • NG video: 3D, UHDTV, on-line streaming services, … • Several markets need to be addressed in order to decrease return of investment time in FTTH infrastructure projects (according to the FTTH business guide published by FTTH Council Europe) • Residential • Business • Carrier • Public sector • These applications call for • Equal down/upstream bandwidth (e g business, carrier services) • Scalable architecture (e g user individual bandwidth upgrade) • Simple systems for low cost potential (especially for residential market) • Secure architecture (e g business services)
  • 3. © 2014 ADVA Optical Networking. All rights reserved. Confidential.33 FTTH Business Guide
  • 4. © 2014 ADVA Optical Networking. All rights reserved. Confidential.44 FTTH Business Guide
  • 5. © 2014 ADVA Optical Networking. All rights reserved. Confidential.55 Example: Data Center Environment & Security APPS APPS
  • 6. © 2014 ADVA Optical Networking. All rights reserved. Confidential.66 Data Center Environment & Security Physical Access to the Data Center APPS APPS
  • 7. © 2014 ADVA Optical Networking. All rights reserved. Confidential.77 Data Center Environment & Security Hardware Security APPS APPS
  • 8. © 2014 ADVA Optical Networking. All rights reserved. Confidential.88 Data Center Environment & Security Software Security APPS APPS
  • 9. © 2014 ADVA Optical Networking. All rights reserved. Confidential.99 Data Center Environment & Security …and what about the Fiber Connection? APPS APPS
  • 10. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1010 Fiber Optic Networks Tapping Possibilities Y-Bridge for service activities Fiber Coupling device Street cabinet How to get access? Where to get access? Splice boxes / cassettes (Outdoor / Inhouse) There are multiple ways to access fiber
  • 11. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1111 Fiber Optic Networks Optical Tapping Method Cladding: 125 µm Core: 9 µm Lost Light “For both public and private networks, optical taps and analytic devices are required and inexpensive maintenance equipment in common use worldwide today. Various types of optical taps […] are also used for corporate espionage…” „Clearly, physical protection of optical transmission media and junction boxes is essential; in addition, data encryption plays a role in protecting sensitive data.” [5] [5] Security Strategies Alert, M.E. Kabay, March 2003
  • 12. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1212 Fiber Optical Networks Security Options Encryption Security-Hardened Software Physical Layer Monitoring Power Tracking Intrusion Detection Optical Time-Domain Reflectometer (OTDR) RADIUS Secure Shell SNMPv3 AES-256 Authentication Diffie-Hellman Optical Networks Security Tools are necessary and available 122842636
  • 13. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1313 WAN Ipsec / MacSec Encryption WDM-transport WDM-transport Site BSite A WAN Appliance based Encryption WDM-transport Site B WDM-transport Site A Optical Transmission Security Speed of Encryption WAN Router Site A Site B xWDM based Encryption Speed,throughputandsimplicity TDM TDM FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch
  • 14. sneidlinger@advaoptical.com Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.