Tod O'Dot:

 
  SECURIO Partners >>  DATEK >> Solutions - Data Security    

 

DATEK TELECOM S.A.

Data Security

Providing technologies and procedures that ensure secure transmissions

   » IP VPNs across private IP networks and the Internet:

A VPN is designed for a specific client to connect multiple sites. In an IP VPN, sites that can communicate with each other are defined in routing tables. This offers a high performance meshed IP network for any-to-any communications.

    
 Tunneling  -
allows IP to support non-IP protocols and allows the support of non-registered IP addresses
 IPsec          -
provides encryption of data for added security
 PKI            -
ensures authentication between originator and recipient
 
 
     
 
 
   
 
 Research

 &

    IP Security Protocol is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers. IPSec provides these security services at the IP layer.

 
 Development

 *

     Managed security services via
firewall, encryption and digital
 
 Advanced

 Engineering

 *

 Data

 Communication

 Networks

 *

    
  S.E.C.U.R.I.O.
   
 Contact      mobile:
     +31(0)6 25 375 242
     telephone:
     +31(0)2488508
     fax:
     +31(0)2488509
     e-mail:
info:      securio@tiscali.nl
     
  << back to the SECURIO site portal
 

 Security and

 Quality

 *

certificates provide secure data exchange and transaction execution. 
 
     Tunneling (as a transport model)
     

Tunnels are used to deliver data packets across networks. The tunnel is a virtual path that extends across the intermediate network.

     

GRE Tunneling: protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to routers at remote points over an IP inter network.

   

PPPoE (Point-to-Point Protocol over Ethernet) is a specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment.
L2TP (Layer 2 Tunnel Protocol) for virtual private networks in the dial access space.

   
     Firewall Service (FS)
   

A firewall is a combination of hardware and software implementing the client’s security policies. The purpose of the firewall is to prevent unwanted or unauthorized communication into or out of the secure Private Network. FS provides clients with a secure interconnection to the Internet.

     
Elements of Access Control:
     • Access lists to control IP access:
       The rule set controls network communication based on 4
       components:
                          1. Source IP Address 
                          2. Destination IP Address 
                          3. Application Protocol 
                          4. Access Port
      • Network address translation: Source address hiding
      • Content security:
                          1. URL filtering
                          2. Java/ActiveX screening
                          3. Intrusion and malicious activity detection
     

There are three ways firewalls have to function in order to be effective. They must examine:

                          1. Packet Information 
                          2. Communication-Derived State 
                          3. Application-Derived State
    
     Standard Authentication
    

RADIUS (Remote Authentication Dial-In User Service) is a distributed client/server system that secures networks against unauthorized access. 
A RADIUS server provides authentication and accounting services to one or more client NAS devices. RADIUS servers are responsible for receiving user connection requests, authenticating users, and then returning all configuration information necessary for the client to deliver service to the users. 

  
 
   Home    
redesign: Tod O'Dot Productions, 2005
   
Tod O'Dot: