Your SlideShare is downloading. ×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Security in Optical Networks - Useless or Necessary?

332

Published on

Check out Stephan Neidlinger's slides tha

Check out Stephan Neidlinger's slides tha

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
332
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
20
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BEL 2 Spezial, Unterschleißheim, Germany 03.07.2014 Stephan Neidlinger Security in Optical Networks – Useless or Necessary?
  • 2. © 2014 ADVA Optical Networking. All rights reserved. Confidential.22 Broadband Access Network Market Trends • Service data rates keep on increasing • NG video: 3D, UHDTV, on-line streaming services, … • Several markets need to be addressed in order to decrease return of investment time in FTTH infrastructure projects (according to the FTTH business guide published by FTTH Council Europe) • Residential • Business • Carrier • Public sector • These applications call for • Equal down/upstream bandwidth (e g business, carrier services) • Scalable architecture (e g user individual bandwidth upgrade) • Simple systems for low cost potential (especially for residential market) • Secure architecture (e g business services)
  • 3. © 2014 ADVA Optical Networking. All rights reserved. Confidential.33 FTTH Business Guide
  • 4. © 2014 ADVA Optical Networking. All rights reserved. Confidential.44 FTTH Business Guide
  • 5. © 2014 ADVA Optical Networking. All rights reserved. Confidential.55 Example: Data Center Environment & Security APPS APPS
  • 6. © 2014 ADVA Optical Networking. All rights reserved. Confidential.66 Data Center Environment & Security Physical Access to the Data Center APPS APPS
  • 7. © 2014 ADVA Optical Networking. All rights reserved. Confidential.77 Data Center Environment & Security Hardware Security APPS APPS
  • 8. © 2014 ADVA Optical Networking. All rights reserved. Confidential.88 Data Center Environment & Security Software Security APPS APPS
  • 9. © 2014 ADVA Optical Networking. All rights reserved. Confidential.99 Data Center Environment & Security …and what about the Fiber Connection? APPS APPS
  • 10. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1010 Fiber Optic Networks Tapping Possibilities Y-Bridge for service activities Fiber Coupling device Street cabinet How to get access? Where to get access? Splice boxes / cassettes (Outdoor / Inhouse) There are multiple ways to access fiber
  • 11. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1111 Fiber Optic Networks Optical Tapping Method Cladding: 125 µm Core: 9 µm Lost Light “For both public and private networks, optical taps and analytic devices are required and inexpensive maintenance equipment in common use worldwide today. Various types of optical taps […] are also used for corporate espionage…” „Clearly, physical protection of optical transmission media and junction boxes is essential; in addition, data encryption plays a role in protecting sensitive data.” [5] [5] Security Strategies Alert, M.E. Kabay, March 2003
  • 12. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1212 Fiber Optical Networks Security Options Encryption Security-Hardened Software Physical Layer Monitoring Power Tracking Intrusion Detection Optical Time-Domain Reflectometer (OTDR) RADIUS Secure Shell SNMPv3 AES-256 Authentication Diffie-Hellman Optical Networks Security Tools are necessary and available 122842636
  • 13. © 2014 ADVA Optical Networking. All rights reserved. Confidential.1313 WAN Ipsec / MacSec Encryption WDM-transport WDM-transport Site BSite A WAN Appliance based Encryption WDM-transport Site B WDM-transport Site A Optical Transmission Security Speed of Encryption WAN Router Site A Site B xWDM based Encryption Speed,throughputandsimplicity TDM TDM FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch Router FC Switch
  • 14. sneidlinger@advaoptical.com Thank You IMPORTANT NOTICE The content of this presentation is strictly confidential. ADVA Optical Networking is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, publication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or representations of any kind, either express or implied. ADVA Optical Networking shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using and/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA Optical Networking.

×