SITLine-detailed - Gulf IT
Transcription
SITLine-detailed - Gulf IT
Separation between network and security functions External vs. built-in encryption ı Inside the network Attack Attacker often targets network nodes (e. g. router) hijacked router jeopardizes built-in security mechanisms ı Inside encryption device Network functions and security functions are (physically) separated inside the device Device can be managed by different user groups (e. g. service provider, security officer) Security settings Network settings 1 Private lines/connections Optical and electrical lines can be tapped easily ı Tapping the Network Promiscuous Ethernet probes Ethernet switch taps Passive optical splitters Mirror ports (available in many router/switches) ı Network Tap Copper: regeneration of signal Fiber: split of signal, e.g. 50:50, 70:30, 90:10 Completely passive Identical copy of traffic Network link will be interrupted once (for installation) 2 Secure landline, radio relay and satellite transmission R&S®SITLine ETH ı Ethernet encryptor family up to 40 Gbit/s ı Advanced cryptographic methods and standards (elliptic curves, AES, X.509) ı Tamper protection and random numbers 3 Designed with data center in mind R&S®SITLine ETH10G/40G ı ı ı ı ETH10G: 1× 10 GbE (10 Gbit/s) – optical and electrical ETH40G: 4× 10 GbE (40 Gbit/s ports) – optical or electrical BSI-certified for German “restricted” (VS-NfD) and NATO restricted Common Criteria EAL4+ certification* *pending 4 Protects against espionage and manipulated data R&S®SITLine ETH100/1G ı ETH1G: 1× 1 Gigabit Ethernet (1 Gbit/s) ı ETH100: 1×, 2× oder 4× Fast Ethernet (100 Mbit/s) ı BSI-certified for German “restricted” (VS-NfD) and NATO restricted 5 Ethernet encryptor for harsh environmental conditions R&S®SITLine ETH50 ı Ruggedized: Temperature range for operation -20°C to +70°C, fanless operation, MTBF > 300 000 h ı Flexible: Variants with 25, 50, 100 Mbit/s throughput ı Certified: BSI-certified for German “restricted” (VS-NfD) and NATO restricted 6 Easy configuration and monitoring R&S®SITScope ı Infrastructure as a Service: Separated security management allows outsourcing the network management ı Two-factor-authentication: Smartcard based authentication of devices and users ı Automatic configuration adaptation: Redundant, self-healing management connections 7 Low lifecycle costs thanks to online security management and separated network management Supervisor Manager Online security management Network management by service provider SNMP TLS Monitor ı 2 factor authentication ı Roles for users LAN ı Manage net plan ı Create and distribute device certificates ı Central point for log files and audits Carrier LAN ı SNMPv3 credentials ı Device and throughput tests ı Statistical data 8 Professional equipment for encryption True random numbers and tamper protection ı Session keys with high entropy Based on true random numbers Uses maximum key size For point-point or group connections ı Tamper protection Physical access to the device (e. g. opening) forces emergency clear 9 Professional equipment for encryption Strong authentication and red-black-separation ı Strong Authentication (Token) „Something I have, something I know“ (ownership and knowledge) Device against device, device against server, server against device, security officer against device, security officer against server ı Red-black-separation (No crypto bypass) Sensitive unencrypted traffic can not be mixed up with encrypted traffic Physical separation by different plugs/lines inside the device 10 Key Features and USPs R&S®SITLine product family 1. 2. 3. 4. • The only Ethernet encryptor with multiple crypto port devices • The only Ethernet encryptor with separation of security management (customer) from the network management (customer or network operator) • The only Ethernet encryptor with no need for central key servers (neither external or built-in) for multicast traffic/streams • Rohde & Schwarz is a long-term, reliable and renowned partner (ISO9001, AQAP) 11 R&S®SITLine Ethernet Encryptor Performance and security for all organizations R&S®SITLine ETH10G/ETH40G ETH100/ETH1G ETH50 Number of lines Fast Ethernet (100 Mbit/s) Number of lines 1 GbE - 1, 2 or 4 (ETH100) 1 - 1 (ETH1G) - Number of lines 10 GbE 1, 4 - - Connector, Transceiver Optical / electrical Optical / electrical Electrical, built-in Throughput per device 40 Gbit/s 1 Gbit/s Up to 100 Mbit/s Cryptography Operating temperature Elliptic curve cryptography with 257 bit key (equals 3 200 bit RSA key) AES with 256 bit key, X.509 certificates +5°C to +50°C -20°C to +70°C MTBF 68 000 h 47 000 h Power supply Redundant internal AC/DC, hot-swap (data center) Rack format (19’’, 1 HU) Redundant internal AC, hot-swap External redundant DC (data center) (truck, data center) Form factor 350 000 h ½ rack format (7,5’’, 1HU, top-hat rail) 12 Tap-proof communication through encryption Secure wired and wireless infrastructures ı ı ı ı Cryptographic authentication and encryption to protect signaling and traffic Central security and network management Session keys are negotiated between communication partners and changed regularly Possible network taps in between just receives encrypted traffic Authentication with Auth-Keys Auth 1 Auth 2 Session Data encryption with session key 13 R&S®SITLine ETH Competing encryption technologies Encryption Layer 1 (WDM, Link) Layer 2 (Ethernet) Layer 3 (IP) Pros No overhead Maximum privacy (encrypted bit stream) Low overhead Point-Multipoint and Full-mesh Low latency High privacy (encrypted IP packets) Flexible use cases Point-Multipoint and Full-mesh Mobile use cases Cross vendor operation (IPsec standard) Many access services are IP based Cons ― Point-Point only ― No integrity protection ― Unchanged pre-shared keys (No key negotiation between devices) ― Specific use cases ― IP routing inside transmission network impossible ― Overhead, especially in narrowband and broadband scenarios ― Latency ― Complexity (IPsec tunnels) Encryption for… Communication links Switched networks Routed networks 14 Communications security through encryption IP VPN and L2 VPN L2 VPN (Ethernet) IP VPN 3 Network Layer IP data 2 Data Link Layer Payload IP header Frame header 15 Encryption modes (1/2) „Transport“ provides network-transparent security + encrypted data has same size than unencrypted (without integrity protection) + nearly no impact on data transmission - Attackers can retrieve information about internal network structure (address information remains plain/unencrypted) Encrypted Original Frame/ Packet Footer Payload Header Tags 16 from: A to: B Encryption modes (2/2) „Tunnel“ provides higher privacy + Higher privacy due to encrypted address information - Encryption increases amount of data to be transmitted - Transmission network must be able to process larger packets Footer Header Tags Payload from: A to: B Encrypted Original Frame/ Packet Footer Payload Header Tags 17 from: A to: B Ethernet encryption provides higher privacy and saves bandwidth (in comparison to IPsec) IPsec (Layer 3) L2 Hdr IP Hdr Payload Data L2 Hdr New IP Hdr Encrypted Data (IP Tunnel Mode) IV Distribution IP packets according to size („IMIX Traffic“) Up to 44% Ethernet encryption (Layer 2) L2 Hdr IP Hdr Payload Data L2 Hdr Encrypted Data (L2 Transport Mode) Size 40 Byte 576 Byte 1500 Byte IV 18 Quantity 7 4 1 Benefit: Significant savings for network security 19 Encryption for wired and wireless environments R&S®SITLine ETH Private/public connections between and within sites • VoIP, VCF, database queries Data center interconnection • Carrier/Metro Ethernet, Fiber 1 GbE/10 GbE Confidentiality Radio relay and satellite links • Radio relay/ microwave transmission, satellite hops Rail control networks • Bank CCTV networks Barriers, interlockings, signals switches • Integrity 20 Video surveillance, access control Encryption for wired and wireless environments R&S®SITLine ETH Private/public connections between and within sites • VoIP, VCF, database queries Data center interconnection • Carrier/Metro Ethernet, Fiber 1 GbE/10 GbE Radio relay and satellite links • Radio relay/ microwave transmission, satellite hops Rail control networks • Bank CCTV networks Barriers, interlockings, signals switches 21 • Video surveillance, access control Confidential communications between sites and within a single site (L2VPN) ı Secures video conferences, VoIP calls, database queries, etc. ı Safeguards lines (point-to-point), star structures (point-to-multipoint) and fully meshed networks (multipoint-to-multipoint) ı Protects organizations against espionage and manipulated data ı Customers: Organizations with widely geographically distributed sites, e. g. Intelligence Services Embassy networks Official Government networks High Tech Enterprises with subsidiaries 22 One cable– two Carrier services Managed IP (MPLS IP VPN) Router, Services, Layer 3 Carrier Ethernet (ELAN, GigE) Switch, Bridge, Layer 2 Low to mid speeds Mid to high speeds Managed service Self-managed: total control High QoS High QoS Large number of sites Few sites but at high speed 23 Server Flat network structure reduces operational expenditures ı Ethernet Service ‘extends’ local area network to remote locations (L2 VPN) ı No dedicated IP subnet configuration required ı Change carrier without reconfiguration of IP settings Carrier Ethernet 24 Encryption for wired and wireless environments R&S®SITLine ETH Private/public connections between and within sites • VoIP, VCF, database queries Data center interconnection • Carrier/Metro Ethernet, Fiber 1 GbE/10 GbE Radio relay and satellite links • Radio relay/ microwave transmission, satellite hops Rail control networks • Bank CCTV networks Barriers, interlockings, signals switches 25 • Video surveillance, access control Secure data center interconnection, Secure storage area networks (SAN) ı Central data centers have a redundant design and therefore must be securely interconnected via highperformance lines SAN SAN Carrier Dark Fiber ı State-of-the-art technology for this application is Ethernet with transmission capacity of at least 1 Gbit/s ı Customers: Large enterprises Data center (e. g. Fujitsu), Trust Center Core network provider/carrier (e. g. Google) Cloud Computing Provider (e. g. Apple) Public connection R&S®SITLine ETH 26 Encryption for wired and wireless environments R&S®SITLine ETH Private/public connections between and within sites • VoIP, VCF, database queries Data center interconnection • Carrier/Metro Ethernet, Fiber 1 GbE/10 GbE Radio relay and satellite links • Radio relay/ microwave transmission, satellite hops Rail control networks • Bank CCTV networks Barriers, interlockings, signals switches 27 • Video surveillance, access control Safeguarding radio relay and satellite links (SatCom) R&S®SITLine ETH ı Ensures information superiority by encryption transmitted data must be completely free from manipulation and must not fall into the hands of third parties ı Security during the entire radio relay transmission or during satellite hops ı Customers Military Tasks Forces require fast and reliable status information Government networks (Ministry of Foreign Affairs) and critical infrastructures (Energy) need backup communication Oil and Gas exploration need strong protection of their test drilling data 28 Private satellite services Total control und closed user groups ı Nearly every public satellite service (Inmarsat, BGAN, etc) provides IP-based shared Internet access No use case for the SITLine ı But: Private satellite services allow protocol agnostic networks for generic data transmission Total control Flexible network planning / customized network structures Bandwidth Higher optimized usage security (closed user groups) ı Romantis UHP allows setup of private satellite networks 29 Every Network structure supported R&S SITLine ETH with Romantis UHP Satellite Modem Point-to-Point Point-to-Multipoint (Star) Hybrid Multipoint-to-Multipoint (fully meshed) 30 R&S®SITLine ETH secures Romantis UHP networks Application brochure available 31 Encryption for wired and wireless environments R&S®SITLine ETH Private/public connections between and within sites • VoIP, VCF, database queries Data center interconnection • Carrier/Metro Ethernet, Fiber 1 GbE/10 GbE Radio relay and satellite links • Radio relay/ microwave transmission, satellite hops Rail control networks • Bank CCTV networks Barriers, interlockings, signals switches 32 • Video surveillance, access control Integrity protection for railway monitoring and control networks ı Secures data transmission between transport hubs (e. g. railway stations) and central control centers ı Protects unattended transport hubs against manipulation ı Provides extended temperature range, installation with top-hat rail and emergency clear for challenging environments ı Customers Public Transport Integrators 33 Safety and security for railway monitoring and control networks ı Railway monitoring and control networks is designed to meet safety requirements Redundancy Avoiding mutual interference CRC checksums to deal with transmission errors ı Resilience to man-in-the-middle attacks requires security functions Integrity protection Encryption with strong authentication ı SITLine integrates security that supports safety 34 R&S®SITLine ETH50 secures railway networks Application brochure available R&S®SITLine ETH50 supports top-hat rail mounting according to DIN rail 35 Ethernet Encryption by Rohde & Schwarz because… 1. Lowest cost of ownership 2. Highest availability 3. Highest security • The only Ethernet Encryptor with no need for central key servers also for fully meshed networks • Competitive pricing (ETH40G ~50% list price vs. competitors) • Highest “meantime between failure” value (ETH50 > 10 years) • Small footprint (1HU devices with option for multiple crypto ports, up to 40Gbit/s in 1 HU) • • • • No single point of failure (autonomous device operation) Redundant design (power supplies, transceivers) Redundant management connections – via IP and Ethernet No downtime for battery exchanges (ETH 40G) • Development and Production in Germany • Full validation processing („Store, check and forward“) • The only Ethernet Encryptor based on hardware security platform (ETH 40G) • BSI VS-NfD approved (pending for 40G), CC EAL4+ / FIPS140-2 compliant 36 R&S®SITLine ETH40G Hardware differences front SITLine Generation SITLine ETH50 SITLine ETH100/1G SITLine ETH10G/40G Number of Ethernet data port pairs 1x Fast Ethernet (100 Mbit) 1x, 2x or 4x Fast Ethernet (100 Mbit) or 1x 1Gbit Ethernet 1x 10 Gbit Ethernet or 4x 10 Gbit Ethernet Display Status LEDs, Port LEDs Status LEDs, Port LEDs, LC Display Status LEDs, Port LEDs Emergency clear 2 buttons - 1 buried button, clip required Device token USB Smartcard USB Smartcard ID-1 Smartcard SITScope port (SMS) No, inband only SMS and inband SMS (local management) and inband SNMP port (NMS) No, inband only SMS, NMS and inband SMS (local management) and inband Local management port USB USB SMS (local management) Electrical contacts for local alerting - - Yes, inclusive alert reset button Place for customer annotations - - Pull-out plate 37 R&S®SITLine ETH40G Hardware differences inside and back SITLine Generation SITLine ETH50 SITLine ETH100/1G SITLine ETH10G/40G Tamper concept Tactile switch observes device opening Tactile switch with inner and outer security zone Platform, Tamper Token Ventilation passive air flow left to the right and to the back front to back, supports cold aisle environments Fans fan less operation, large cooling element on the bottom Built-in hot-swap Power supply DC, external, redundant AC, internal, redundant, hotswap AC, DC, internal, redundant, hot-swap Battery 2 built-in coin cells, exchange requires opening device and re-initialization 1 built-in coin cell, exchange requires opening device and re-initialization Lithium AA 3,6 V, Battery exchange during operation 38 20.10.2014 SITLine ETH Level 2 Sales Training (W2) 39