Religion & Spirituality

Optimizing Networks for NASPI

Published
of 21
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Description
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
Transcript
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Agenda Introduction & Definition OSI Model Point to Point vs. Any to Any Public vs. Private AT&T Engineered Networks Core Backbone Description Security, Integrity, Reliability, Availability Virtual Private Networks (VPN) Public: SSL, IPSec, and others Private: MPLS Options and Connectivity Page 2 Introduction & Definition 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. OSI Model Data unit Layer Function Host layers Data 7. Application Network process to application 6. Presentation Data representation and encryption 5. Session Interhost communication Segment 4. Transport End-to-end connections and reliability (TCP) Media layers Packet/Datagram 3. Network Path determination and logical addressing (IP) Frame 2. Data link Physical addressing (MAC & LLC) Bit 1. Physical Media, signal and binary transmission OSI Model courtesy of Wikipedia Page 4 Characteristics of Networks Layer 2 Network OSI Data Link Layer Point to Point; Circuit Based Secure Mesh becomes expensive and difficult n(n-1) Dial, X.25, SNA, Frame Relay, ATM, etc. Hub and Spoke most common MAC & LLC Addressing (Hardware) 2 Layer 3 Network OSI Network Layer Any to Any data paths Private is secure; Public is not Packet Switched pre-defined routes Mesh is inherent Internet, MPLS Networks Private defined networks common; yet public Internet most ubiquitous IP Routing (Packet Header) Page 5 Point to Point vs. MPLS Network View A B Simple Point to Point F E MPLS D H1 A B A Core B C H2 D Typical Point to Point Hub and Spoke (with second hub and partial MESH) C MPLS Customer Defined Network (Any to Any) Built in Disaster Recovery Page 6 MPLS Basics Any to Any connectivity within customer defined network MultiProtocol Label Switching is a hybrid L2 and L3 protocol Independent customer networks predefined via Virtual Routing and Forwarding (VRF) tables Uses MPLS labels to traverse authorized path (VRF) Actual path can be dynamically determined depending upon network and traffic conditions (within the VRF) AT&T uses MPLS within our Core Backbone AT&T is a world-leader in providing private customer MPLS networks MPLS offers Class of Service (assigning priorities to traffic types) Private MPLS networks have same security characteristics as L2 networks Page 7 Public vs. Private PUBLIC (UNTrusted) Internet is a Public Network Publicly Accessible Network of Networks Inherently INSECURE No universal safeguards in place Variable and Unknown data path Packet Headers can be spoofed and re-directed PRIVATE (Trusted) Private Networks do not allow external access except through controlled measures Access Control and Authentication: Token, SSL, IPSec, etc. Point to Point (L2 Networks) are inherently secure MPLS Networks using VRF are inherently PRIVATE Page 8 Value of MPLS Any to any connectivity within a VPN, allowing enterprise level security. Highly scalable. Level of security equivalent to Frame Relay or ATM through logical partitioning of traffic and routing information. Standards compliant, RFC Transition from frame-relay network technologies. Failure recovery is simple, leading to increased network stability Quality of service mechanisms allow one solution for voice, video and data Easy to manage, no virtual circuit provisioning required Can use private addresses within VPN Scaleable full mesh connectivity with single connection per location, leading to lower costs and more flexibility Page 9 AT&T Engineered Networks 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. OC768 Capable MPLS Core Network OC 768 MPLS BB 40 Gb/sec AT&T POP Distribution Not Represented on Map: OC192, OC48, OC12, OC3 T1, T3/DS3 There are many kinds of POPs (AT&T Point of Presence offices) For T1 service, there are greater than 600 POPs nationwide (CONUS) Page 11 AT&T Global Network Leadership Today, the network comprises: 523,000 fiber route miles 30 Internet data centers on 4 continents Dedicated MPLS access from over 1,550 nodes serving 127 countries Wired Ethernet from over 1,600 access points in 17 countries 5.4 petabytes of traffic on an average business day Customer care 24/7 service Petabyte = one Quadrillion Bytes (10 15 ) Page 12 How AT&T Secures its MPLS Network and Global Network Backbone Block access to infrastructure addresses Anti-Spoofing for NOC addresses Source address assurance Routing stability filters Flow monitors & reactive DoS tools Customer Customer Customer Internet AT&T IP Backbone Block access to infrastructure addresses Anti-Spoofing for NOC addresses Maximum AS limit checks Route dampening Router Filtering (eg RFC1918) TACAS+ Authentication Turn-off unnecessary services Automated configuration & exception reports AT&T Work Center Ingress/egress packet filters Firewalls Route advertise. suppression Token based authentication IDS Sensors Encrypted remote access Remote Sniffers AT&T Service VoIP ICDS WorldNet Ingress/egress packet filters Firewalls Route advertise. suppression Token based authentication IDS Sensors Encrypted remote access Page 13 AT&T VPN Service Customer Network AT&T VPN Network-Based IP VPN Service enabled by Multiprotocol Label Switching (MPLS) ATM Customer Access FR Ethernet The Internet Firewall Application awareness supported by Class of Service (CoS) IP DSL AT&T POP AT&T MPLS Network Features MPLS inherent security Variety of access options Global availability Diversity Options -FR & ATM MPLS ports (US availability) Unilink Multicast U.S. availability; MOW Controlled Introduction Multi-link Point-to-Point Protocol (MLPPP) (US availability) Service Level Agreements Award-winning AT&T BusinessDirect portal Client Benefits Application awareness Scalability Agile, reliable, flexible any-to-any connectivity Easy access to reporting / tools Industry-leading Service Level Agreements Investment Protection Meshed network with Class of Service Built-in Disaster Recovery Security, Integrity, Reliability, Availability Page 14 Virtual Private Networks 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. VPN over Internet Architecture Premise Based VPN Technologies Employed at Remote Locations and Head Office Tunneling, Encryption, Authentication SSL IPSec PPTP Tokens Corporate Office Tunnel Termination and Authentication Dial/Broadband Internet Secure Tunnel Remote Users WiFi /Mobile DSL Cable Remote Offices Internet (Untrusted, Public) + VPN Technologies = Secure Network Typically Point to Point Tunnel Page 16 AT&T MPLS VPN Network Based VPN AT&T VPN Multiprotocol Label Switching (MPLS) Any to Any Connectivity Application awareness supported by Class of Service (CoS) Features MPLS inherent security capabilities Variety of access options Domestic and Global availability Feature rich services Service Level Agreements Integration of wireline and wireless Award-winning AT&T BusinessDirect portal Remote Location Customer Location Mobile Worker Mobile Worker Client Benefits Cellular Wi-Fi IPSec IPSEC/SSL Application awareness Scalability Internet Dial/DSL VPN GW Agile, reliable, flexible, any-to-any connectivity Easy to access reporting / tools Industry-leading Service Level Agreements Investment Protection Meshed network with Class of Service Built-in Disaster Recovery AT&T Network MPLS VPN IPSec Customer Location (ATT mg d CPE) Customer Location Page 17 AT&T Integrated Remote Access to Private Network (ANIRA) Remote Offices Regional Office Remote Users Dial/Broadband AT&T DSL Private Line WiFi /Mobile AT&T IP network VIG VIG MPLS VPN Private VPN Dial/Broadband Remote Users WiFi /Mobile Secure Tunnel Internet DSL Cable Remote Offices Service Manager (authentication, device configuration) Regional Office Page 18 AT&T VPN The Added Value Designing Complete Solutions VPN Remote Access Branch Managed Router VoIP Supplier AT&T Global Network Ultra-Available Ring Managed Firewall Data Center VPN Remote Access Intrusion Detection MPLS VPN Internet Storage AT&T Internet Data Center Network Based Firewall Customer Web / App Server Web Site Application Value Adds Voice over IP / LAN Telephony Content Hosting Storage Management Remote Access AT&T VPN Tunneling Service (AVTS) Network Based Video Bridging WAN Optimization 1Q08 Security Value Adds Managed Firewall Managed Authentication Anti-Virus Scanning InterNet Protect (Intrusion Detection) Private Intranet Protect Transport / Access Value Adds Private Line Frame Relay / ATM AT&T Network-based IPVPN Remote Access (ANIRA) Page 19 Delivering Differentiated Networking Value Enterprise Networking Solutions Performance Agility Control Security Consistent global architecture, seamlessly integrated Unsurpassed application performance around the world Industry leading Service Level Agreements for VPN s Site Availability / TTR Latency/Packet Delivery/Jitter On-Time Provisioning Always-on infrastructure and recovery capabilities In-country / inlanguage end-user support Integrate wireline and wireless solutions Any-to-any connectivity regardless of access type, location or speed Traffic prioritization with ability to set performance at transaction level AT&T Global Network Client enabling intelligent, integrated access selection Leading network convergence to IP VPN and IP applications Global Network Operations Center network monitoring 24/7 Industry leading, award winning AT&T BusinessDirect portal Global Network Client with end-user control Enterprise determines extent of access for endusers Manage costs as well as existing investments Service level preferences (congestion, latency, security); network manages administration Network-based, technology inherent protection Optional Personal Firewall Encrypted site to site connectivity Intrusion detection as network safeguard Dedicated connectivity between AT&T and customer data center Infrastructure helps ensure confidentiality and integrity of communications Device level, application and endto-end security service best practices Page 20 Thank You Questions? 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.
Search
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks