30
Layer 2 Network Encryption where safety is not an optical illusion Marko Bobinac SafeNet PreSales Engineer

Layer 2 Network Encryption where safety is not an optical

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Layer 2 Network Encryption where safety is not an optical

Layer 2 Network Encryption

– where safety is not an optical illusion

Marko Bobinac SafeNet PreSales Engineer

Page 2: Layer 2 Network Encryption where safety is not an optical

Layer 2 Network Encryption

– where safety is not an optical illusion

Todays Agenda

• Fibre is safe – so why should I Encrypt?

• Corporate/Campus networks

Layer 2 or a Layer 3 implementation and why?

• What commercial certified solutions are available?

• What UK certified Government solutions are available?

Page 3: Layer 2 Network Encryption where safety is not an optical

Network Security Truth or Fiction

? Ethernet is inherently secure

? Fiber is not tap-able

? MPLS is protected and therefore secure

? Carriers are required to alert you in the event of a

network breach

? Humans are responsible for configuring your

network

Page 4: Layer 2 Network Encryption where safety is not an optical

Fibre is safe – so why should I Encrypt?

Corporate and government espionage is real and set to intensify, with high profile

fibre tapping cases, such as UK’s GCHQ extensive fibre tapping becoming public

news.

GCHQ …

….. ‘had tapped more than 200 fibre-optic cables and was able to process data from at

least 46 of them at a time….’

‘….. each of the cables carries data at a rate of 10 gigabits per second, so the tapped

cables had the capacity, in theory, to deliver more than 21 petabytes a day ….’

Source: Guardian Newspaper June 2013

Page 5: Layer 2 Network Encryption where safety is not an optical

Fibre is safe – so why should I Encrypt?

BBC security correspondent Gordon Corera says the Guardian is not accusing

GCHQ of breaking the law but it does suggest the existing legislation is being

very broadly applied to allow such a large volume of data to be collected.

OK, so Governments routinely ‘legally’ tap fibre – but surely only governments

are in a position to do this, no one else could, could they?

• Fibres emit light which can be detected

• Some small signal attenuation (insertion loss <= 3dB) but risk of detection is low

• Eavesdropping On Fibre Is Not Trivial

• - But it can be done!

Page 6: Layer 2 Network Encryption where safety is not an optical

Simple example of a tapping device

*Sandra Kay Millar Information Security Magazine

• Clip on clamping device

• Around £300

Page 7: Layer 2 Network Encryption where safety is not an optical

Layer 3 Enterprise Network Architecture

7

Layer 3

Transport

WAN Ethernet Router

Carrier NTU’s

Sub Netted LAN 1,2

Operations

Center

DR

Location

Headquaters

IPSec Encryptor Gateway

Sub Net 1,3 Sub Net 2,3

Traditional and Legacy

Campus/Enterprise networks

typically utilise layer 3 design,

with store and forward,

subnetted QoS traffic and

would use IPSec to encrypt

the sensative traffic.

Page 8: Layer 2 Network Encryption where safety is not an optical

Layer 3 Enterprise Network Architecture

8

Layer 3

Transport

Layer 2 Encryptor

Carrier Edge Switch

VLAN 1,2

Operations

Center

DR

Location

Headquaters

Network VLAN Switch

VLAN 1,3 VLAN 2,3

Modern Campus/Enterprise

networks typically utilise layer

2 design, with fast silicon

hardware based VLAN

switches used to separate

network paths, layer 2

encryptors are used to secure

sensitive data.

Page 9: Layer 2 Network Encryption where safety is not an optical

Securing a L3 verses L2 Network

• Requires extra memory/blades in

each router/VPN Gateway

• Causes loss of performance due to

extra CPU overhead.

• Loss of throughput

• Layer 3 IPSec reduces throughput by as

much as 40% for small packets (64

Bytes). Increased fragmentation on

large packets.

• Higher ongoing costs associated

with IPSec key management

• Locked into Network Vendor

Layer 3 Cost and Performance Layer 2 Cost and Performance

• Separation of duties

• Let the network VLANs Switches

do there job at wire speed

• Let the encryptors do their job at

wire speed

• ‘Bump in the wire’ cut through

device

• full bandwidth utilisation

• Dedicated device

• no CPU overhead counts required.

• No vendor ‘lock in’

• Zero packet expansion in CFB mode

• CTR mode adds1 byte shim/32frames

• GCM mode adds a 16 byte shim

• Very low latency – FPGA used to encrypt

frame.

Page 10: Layer 2 Network Encryption where safety is not an optical

Securing a Layer 2 Network

Security Layer 2 Cost and Performance

Separation of duties

• Let the network VLANs Switches do there job

at wire speed

• Let the encryptors do their job at wire speed

‘Bump in the wire’ cut through device –

full bandwidth utilisation

Dedicated device, therefore no CPU

overhead counts required.

Zero packet expansion in CFB mode

• CTR mode adds1 byte shim/32frames

• GCM mode adds a 16 byte shim

Very low latency – FPGA used to encrypt

frame.

Policy against MAC address or VLAN ID Encryptor is a ‘cut through’ design, encrypted

frame is transmitted even before whole frame received.

Dedicated inband Management . Tamper proof certified Cryptographic device.

Page 11: Layer 2 Network Encryption where safety is not an optical

Improved Performance

Source: Rochester Institute of Technology

0

50000

100000

150000

200000

250000

300000

350000

400000

64 128 256 512 1024 1280 1420

La

ten

cy (

µs

)

Frame Size (Bytes)

Latency: Ethernet Encryption vs IPSec

Typical Router with IPSec

Ethernet Encryption

300

400

500

600

700

800

900

1000

64 128 256 512 1024 1280 1420

Th

rou

gh

pu

t (M

bp

s)

Frame Size (Bytes)

Throughput: Ethernet Encryption vs IPSec

Ethernet Encryption

IPSec Encryption with GRE

Ethernet Encryption at Layer 2 offers in excess of 2x Better

Bandwidth Efficiency and 5x Better Speed…

Typical Network traffic Profile

Page 12: Layer 2 Network Encryption where safety is not an optical

Layer 2 Network Encryption

– where safety is not an optical illusion

With proven reliability, high throughput, and low latency, network encryption

security devices ensure safety is not an optical illusion.

CC and FIPS certifications

CN6040

Ethernet

Fibre Channel

CN6100

Ethernet

CAPS

CN1000

Ethernet

CN3000

Ethernet

Page 13: Layer 2 Network Encryption where safety is not an optical

A Quick Glance

SafeNet CC and FIPS certified Dedicated High Speed Encryption

Appliances

Model Speeds Scalable - From 100Mps to 10Gps

Protocols Ethernet; Fiber Channel; SONET/SDH; E1/T1

Size 19” 1U

Pricing Flexible – Pay as you grow

Page 14: Layer 2 Network Encryption where safety is not an optical

CN6000 Series

SafeNet CC and FIPS certified Dedicated High Speed Encryption

Appliances

Model CN6040 eth Scalable - From 250Mbps to 1Gbps

Certifications CC EAL2+ and FIPS 140-2 Level 3

Size 19” 1U

Central Management CM7 with integrated CA or external PKI certs

Dual PSU options AC or DC dual integrated PSU and Fan tray

Network Access Ports SFP or integrated Copper Local/Network ports

Management Connections 10/100Mbps Eth, CLI, USB and front panel

buttons

Page 15: Layer 2 Network Encryption where safety is not an optical

CN6000 Series

SafeNet CC and FIPS certified Dedicated High Speed Encryption

Appliances

Model CN6040 FC 1/2/4 Gbps

Certifications CC EAL2+ and FIPS 140-2 Level 3

Size 19” 1U

Central Management CM7 with integrated CA or external PKI certs

Dual PSU options AC or DC dual integrated PSU and Fan tray

Network Access Ports SFP or integrated Copper Local/Network ports

Management Connections 10/100Mbps Eth, CLI, USB and front panel

buttons

Page 16: Layer 2 Network Encryption where safety is not an optical

CN6000 Series

SafeNet CC and FIPS certified Dedicated High Speed Encryption

Appliances

Model CN6100 eth Scalable - From 1Gbps to 10Gbps

Certifications CC EAL2+ and FIPS 140-2 Level 3

Size 19” 1U

Central Management CM7 with integrated CA or external PKI certs

Dual PSU options AC or DC dual integrated PSU and Fan tray

Network Access Ports Front access XFP Local/Network ports

Management Connections 10/100Mbps Eth, CLI, USB and front panel

buttons

Page 17: Layer 2 Network Encryption where safety is not an optical

CN1000/3000 Series

SafeNet CAPS certified Dedicated High Speed Encryption Appliances

Model CN1000 eth Scalable - From 100Mbps to 1Gbps

Certifications CAPS Baseline IL3

Size 19” 1U

Central Management CM7 requires external entropy from UKKPA

PSU options AC

Network Access Ports Rear access SFP and Copper Local/Network

ports

Management Connections 10/100Mbps Eth, CLI, USB and front panel

buttons

Page 18: Layer 2 Network Encryption where safety is not an optical

CN1000/3000 Series

SafeNet CAPS certified Dedicated High Speed Encryption Appliances

Model CN3000 eth Scalable - From 1Gbps to 10Gbps

Certifications CAPS Baseline IL3

Size 19” 3U

Central Management CM7 requires external entropy from UKKPA

PSU options Dual AC redundant supplies

Network Access Ports Rear access XFP Local/Network ports

Management Connections 10/100Mbps Eth, CLI, USB and front panel

buttons

Page 19: Layer 2 Network Encryption where safety is not an optical

Have it all with SafeNet

SafeNet high speed Layer 2 encryption technology =

• Zero protocol overhead for maximum bandwidth

• Up to 50% more efficient than competing technologies

• Fastest network encryption available, operating at true line speed, full duplex.

• No impact on latency ensures the high quality of real-time applications such as VoIP and video

Page 20: Layer 2 Network Encryption where safety is not an optical

Strongest Security for Data in Transit

Strongest cryptographic algorithm AES-256

No Key Management Required

Audit and Event logs

X.509 Certificates for authentication

Certified:

• FIPS 140-2 level 3

• Common Criteria

• CAPS (UK)

20

Page 21: Layer 2 Network Encryption where safety is not an optical

Security Can be Simple

SafeNet high speed encryptors can be set up in minutes

• No need for network reconfiguration and no need for routing table updates.

• Routing updates are transparent to encryption.

• No need to manually build complex addressing tables and policies because SafeNet encryptors automatically discover network MAC addresses.

• It’s Layer 2 so it does not care about IP addresses

• Encryption based on VLAN tags or MAC address

• Can also just bulk encrypt

21

Page 22: Layer 2 Network Encryption where safety is not an optical

Reclaim Your Bandwidth & Save

Money

Simple network topology

• Bump in the Wire

• Decreased complexity of network infrastructure,

maintenance and admin

Low Latency (in the micro seconds)

Zero Overhead means you get the bandwidth you pay

for

Reclaiming your network bandwidth = $$$

Page 23: Layer 2 Network Encryption where safety is not an optical

Reclaim Your Bandwidth & Save

NY to LA 1gig connection is approx. $40,000/month

1Gbps Ethernet IPsec

Actual bandwidth ~1Gbps ~800Mbps*

Cost of lost

performance

0 $8K/month

Annual cost You get what you

paid for

$96K or more

*Conservative estimate of 20% loss (up to 50%)

Page 24: Layer 2 Network Encryption where safety is not an optical

Security Across Industry Verticals

SOFTWARE

EDUCATION

FEDERAL, STATE & LOCAL

RETAIL

FINANCIAL

HEALTHCARE

Page 25: Layer 2 Network Encryption where safety is not an optical

Case Study – Health Care

Customer has Compliancy issues. Deals with State

and Federal customers PII

Must encrypt WAN traffic that carries PII information

Tried Router based encryption (Layer 3)

Performance is too low, latency is too high

Switched to Layer 2 encryption

Observed immediate gain in bandwidth and decreased

latency

Page 26: Layer 2 Network Encryption where safety is not an optical

Case Study – Financial

Bank has multiple locations, some international

Does not trust their network providers

Has high speed links (10gig) internationally ($$$)

Wants to protect high value assets (customer info)

Wants to use all of the bandwidth they are paying for

Page 27: Layer 2 Network Encryption where safety is not an optical

Case Study – Education

College has lab that works on government projects

• Government mandates encryption on those links

Also needs to protect student data in transit between

campus buildings

Layer 3 solution not FIPS 140-2 Level 3 (required)

Page 28: Layer 2 Network Encryption where safety is not an optical

Case Study - Retail

Customer needed to secure link from data center to

backup data center (DR site)

Needed to secure links from Data center to branch

locations

Needed high performance and low latency

• VoIP

• Video conferencing

• Transactional data, real-time applications

Page 29: Layer 2 Network Encryption where safety is not an optical

SafeNet: There is no better option

SafeNet is a security company

SafeNet offers the world’s only complete suite of

dedicated high speed WAN encryption solutions

SafeNet devices are used by many government

agencies

SafeNet encryptors are designed and built from the

ground up as security appliances

29

Page 30: Layer 2 Network Encryption where safety is not an optical

Děkuji