SlideShare a Scribd company logo
1 of 4
Download to read offline
The Alcatel-Lucent OmniAccess™
8550 Web Services Gateway (WSG) protects sensitive information from misuse satisfying
regulatory compliance requirements and makes business process data available when and where it is needed. The
OmniAccess 8550 WSG provides a corporate wide compliance infrastructure for secure automated business processes
within a company and among its partner organizations. The OmniAccess 8550 WSG is a service oriented network
appliance that reduces the traditional complexity and cost of securing internal corporate and business-to-business
(B2B) automated business processes.
Alcatel-Lucent OmniAccess 8550 Web Services Gateway
The OmniAccess 8550 WSG, based on
the Alcatel-Lucent Web services run-time
message inspection technology, provides
a scalable and reliable service oriented
infrastructure for information system
in such areas as human resources,
enterprise resource planning (ERP),
customer relationship management
(CRM), and finance with security
and regulatory compliance (policy
enforcement and audit trail) that is
required for secure business process
automation. It is deployable within data
centers to secure business processes
within an organization and in the DMZ
for automating business processes
with partners. The OmniAccess 8550
WSG provides a significant competitive
advantage by reducing IT system total
cost of ownership (TCO).
Product Features
The deployment of an OmniAccess
8550 WSG provides corporate-wide
security and regulatory compliance so
organizations can secure automated
business processes to meet increased
government regulations and safely
automate business processes with
partners, creating a secure automated
partner ecosystem.With the OmniAccess
8550 WSG securing business processes,
highly skilled employees have access
to information whenever they require
it, even when at a partner site.
The OmniAccess 8550WSG also provides
unique, stateful (multi-transaction),
run-time policy enforcement and
consolidated audit trails to ensure
and demonstrate compliance with
government regulations (see Figure 1).
The OmniAccess 8550 WSG also has
the ability to mitigate risk through
consistent policy enforcement across
information systems with a user
contextual knowledge of system events.
To protect private data, the OmniAccess
8550 WSG provides information access
and change control as well as data
encryption with digital signatures.
This enables a single digital identity
within an organization that accepts
authentication from trusted partners—
the foundation for a consolidated
corporate-wide access policy.
Secure B2B processes are further
enhanced by the OmniAccess 8550
WSG through security features such
as the application firewall and auditing,
tracking and control functions that can
be used to monitor all partner activity,
including access to information by
partner employees when on-site.
2 Alcatel-Lucent 8550 Web Services Gateway
protect the internal domain and ensure
data security.
Alternatively, the OmniAccess 8550WSG
can be installed in the data center to
secure business processes within the
organization. It allows information
access policy to be consistently enforced
at run time across information systems
and can demonstrate regulatory
compliance through a user centric
consolidated audit trail. Risk is mitigated
with the proper controls and monitoring
points in place as well as through
consistent policy enforcement across
information systems with a user
contextual knowledge of system events.
Deployment architecture
The OmniAccess 8550 WSG is designed
to be deployed in the DMZ of an
organization to secure business process
automation with partners (see Figure
2). The OmniAccess 8550 WSG is
typically installed behind the IP firewall
and provides service virtualization as
well as key security functions to
HQ Office
Intranet
ExtranetIdentity Management
Business Applications
Datacenter
Strategic Partner
Customer
OA8550
WSG
OA8550
WSG
OA8550
WSG
OA8550
WSG
OA8550
WSG
OA8550 Web Services Gateway
Run time stateful
policy enforcement
Identity mapping
and federation
Consolidated
audit trail
Figure 1. Core OmniAccess OA8550 WSG features
Figure 2. Typical OmniAccess 8550 WSG network deployment
3Alcatel-Lucent 8550 Web Services Gateway
Threat protection
&
XML firewall
Protects from
deliberate attacks and
malicious XML messages
XML message validation Ensures all messages are well formed
XML message control
SQL Injection, Recursive Payload, Oversized Payload, Buffer Overflow,
External Entity Attacks, Oversize Attachments, Cross Site Scripting
Denial of service (DoS)
protection
Prevents DoS attacks focused at web services, replay attacks
Management
Easily managed appliance
integrating with existing
management
platforms
Fault management SNMP reporting to enterprise network management platforms
Configuration management Provides Web-based GUI interface with role based management control
Change management
Enforces policy and configuration privileges by role and provides audit of all
policy and configuration changes
Secure hardware
accelerated
appliance
Hardened appliance to
comply with
security standards
High availability Provides automatic stateful failover for paired nodes
Open standards compliant
Compliance with Web services standards W3C, SOAP, UDDI, WS-Policy,
WS-Trust, WS-Security, WS-Reliable Messaging, WS-Addressing
Secured appliance
No direct operating system access - encrypted hard drive - no internal
devices allow for alternate re-boot of system - all ports disabled -
configuration files digitally locked.
Dedicated Web services
infrastructure
Hardware accelerated XML parsing & encryption with digital signing & SSL
& HTTPS
Feature group Benefit Feature Feature description
Security
&
governance
Ensures compliance
with corporate
governance policy and
government legislation
Application sessions Stateful model for Web service run-time policy
Stateful run-time policy enforce-
ment
Run-time policy enforced across multiple transactions per credentialed user
User-centric audit trail
Consolidated audit trail capturing each information record viewed or modified
per credentialed user, encrypted and signed to survive legal audit
Application access control Stateful policy enforcement on access to individual Web services
Information access control Stateful policy enforcement on access to individual information records
Secure online
B2B
Enhanced security
through single point of
control to enable secure
automated workflow
among business partners
Partner authentication
Strong authentication for partner institutions (X509, XKMS, RSA, 3DES, DES,
AES, SHA, PKCS, CRLs, OCSP)
Service virtualization Map external URL used by partners to private internal URL
Secured proxy point
Stateful policy enforcement with cross-referenced audit on all partner activi-
ty
Data protection Data encryption and digital signing to survive legal audit
User mobility Enables end users to seamlessly connect to web services at any partner site
Multiple partner groups Allows web services to be offered to distinct partner groups
Identity
mapping
&
federation
Consistent enterprise-
wide enforcement
of policy per
credentialed user
Single identity
Dynamic identity translation allowing access to multiple IT
systems with single credential for corporate-wide consistent policy enforce-
ment
Identity interoperability
Enables acceptance of user validations from partners while meeting all
traceability and user privacy requirements (SAML, WS-Trust)
Integration with existing identity
infrastructure
Integrates with existing identity management infrastructure (LDAP, SAML,
WS-Trust)
Corporate
agility
Enables scaleable and
reliable re-use
of existing IT systems
Application interoperability
Provides mediation through message and content translations for applica-
tions (XSLT)
Web service load balancing
Provides round robin load balancing with session stickiness and automatic
failover
Reliable messaging Provides policy-controlled, guaranteed delivery of web service messages
www.alcatel-lucent.com
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other
trademarks are the property of their respective owners. Alcatel-Lucent assumes no responsibility for
the accuracy of the information presented, which is subject to change without notice.
© 2008 Alcatel-Lucent. All rights reserved. P/N 031953-00 Rev C 10/08
System configuration
The Alcatel-Lucent OmniAccess 8550 WSG is a
high–performance, 2U, rack-mountable network
element consisting of:
• Two Quad-Core Intel E5345 Xeon processors
(2.33 GHz, 80 watts, 1333 FSB), each with 8
MB of L2 cache
• 8 GB of CPU memory with advanced ECC
(multi-bit error) protection
• 146 GB hot-pluggable hard drives with RAID1
SAS disk array
• Fully redundant power supplies
• Fully redundant fans
• Six 10BaseT/100BaseTX/1000BaseTX network
interfaces that support bonding for redundancy
• Built-in high-performance SSL/TLS and crypto-
graphic hardware
• Built-in high-performance XML processing
hardware
• Front panel hardware alarm indicators
• Includes universal rail kit for 19-inch racks
Physical dimensions
• Height: 3.38 in. (8.59 cm.)
• Width: 17.54 in. (44.54 cm)
• Depth: 23.65 in. (60.07 cm)
• Weight: 60 lb (27.22 kg)
Power Specifications
• Input (per power supply)
¬ Line voltage: 100 VAC - 132 VAC
200 VAC - 240 VAC
¬ Input current: 3.3 A (at 120 VAC)
2.3 A (at 220 V AC)
¬ Input power: 370 W (at 120 VAC)
470 W (at 220 VAC)
• BTU rating max: 1272 (for 120 VAC)
1610 (for 220 VAC)
Standards compliance
• WSRM 1.1
• WSS 1.0
• WSS-Signature
• WSS-Encryption
• WS-Trust
• WSSE 1.0
• WSDL 1.1
• SOAP 1.1/1.2
• XSLT 1.0
• XPath 1.0
• UDDI 3.0
• HTTP 1.0/1.1
• TLSv1/SSLv3
• DES, 3DES, AES, RC4, SHA-1, MD5, PKCS #10,
X.509, RSA, DSA
• LDAP 3.0
• SAML 1.1
• SNMP
• SFTP
• IEEE 802.3, 802.3u, 802.3ab
Regulatory
EEMMCC
ICES-003 Interference causing equipment standard for digital apparatus
FCC Part 15 Class B FCC rules for radio frequency devices under FCC 15 of the rules of FCC
EN55022, Class A/B Information technology equipment (ITE) - Radio disturbance characteristics - Limits and methods of
measurement - Class A/B
EN55024 ITE - Immunity characteristics - Limits and methods of measurements
CISPR 24 ITE - Immunity characteristics - Limits and methods of measurements
AS/NZS CISPR22 Limits and methods of measurement of radio disturbance characteristics of information
technology equipment
SSaaffeettyy
CAN/CSA C22.2 No 60950-1-03 / UL 60950-1 ITE - Safety - Part 1: General Requirements
FDA 21 CFR 1040 Performance Standard for Light-Emitting Products
IEC 60825-1 (2001) Safety of laser products - Part 1: Equipment classification, requirements and user's guide.
IEC 60825-2 (2000-05) Safety of laser products - Part 2: Safety of optical fiber communication systems
EN60950-1 Safety of information technology equipment
IEC 60950-1 Information technology equipment - Safety - Part 1: General requirements
AS/NZS 60950-1:2001 Approval and test specification - Safety of information technology equipment including electrical
business equipment
TTeelleeccoomm
IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and
PHY Layer Specification
EECC DDiirreeccttiivveess
ROHS 2002/95/EC Directive 2002/95/EC of the European Parliament and of the Council of 27 January 2003 on the Restriction of the use
of certain Hazardous Substances in Electrical and Electronic Equipment (ROHS)
Technical specifications

More Related Content

What's hot

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISECisco Canada
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaperCMR WORLD TECH
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Danny Liu
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallTroy Kitch
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Cisco Russia
 
bcs_sb_TechPartner_SSL_SafeNet_EN_v1e
bcs_sb_TechPartner_SSL_SafeNet_EN_v1ebcs_sb_TechPartner_SSL_SafeNet_EN_v1e
bcs_sb_TechPartner_SSL_SafeNet_EN_v1eSam Kumarsamy
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemSymantec
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
Edge to Cloud Security
Edge to Cloud SecurityEdge to Cloud Security
Edge to Cloud SecurityTom Buckley
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-onCA Technologies
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewallxKinAnx
 

What's hot (20)

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
0011sas security whitepaper
0011sas security whitepaper0011sas security whitepaper
0011sas security whitepaper
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
SOA Security
SOA Security SOA Security
SOA Security
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
bcs_sb_TechPartner_SSL_SafeNet_EN_v1e
bcs_sb_TechPartner_SSL_SafeNet_EN_v1ebcs_sb_TechPartner_SSL_SafeNet_EN_v1e
bcs_sb_TechPartner_SSL_SafeNet_EN_v1e
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
Protect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating SystemProtect Your End-of-Life Windows Server 2003 Operating System
Protect Your End-of-Life Windows Server 2003 Operating System
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
Edge to Cloud Security
Edge to Cloud SecurityEdge to Cloud Security
Edge to Cloud Security
 
ISE_Pub
ISE_PubISE_Pub
ISE_Pub
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 Simplifying User Access with NetScaler SDX and CA Single Sign-on Simplifying User Access with NetScaler SDX and CA Single Sign-on
Simplifying User Access with NetScaler SDX and CA Single Sign-on
 
Presentation database security audit vault & database firewall
Presentation   database security audit vault & database firewallPresentation   database security audit vault & database firewall
Presentation database security audit vault & database firewall
 

Similar to OmniAccess_8550_Datasheet

Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
Array Networks AVX Multi-Tenant Application Delivery Controller Datasheet
Array Networks AVX Multi-Tenant Application Delivery Controller DatasheetArray Networks AVX Multi-Tenant Application Delivery Controller Datasheet
Array Networks AVX Multi-Tenant Application Delivery Controller Datasheet Array Networks
 
intel_soae-h_data_sheet
intel_soae-h_data_sheetintel_soae-h_data_sheet
intel_soae-h_data_sheetAlan Boucher
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectMichael J Geiser
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Data power use cases
Data power use casesData power use cases
Data power use casessflynn073
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheetAdvantec Distribution
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
 
Brochure of Yokogawa's Fast/Tools Supervisory Systems
Brochure of Yokogawa's Fast/Tools Supervisory SystemsBrochure of Yokogawa's Fast/Tools Supervisory Systems
Brochure of Yokogawa's Fast/Tools Supervisory SystemsYokogawa
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.sflynn073
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 

Similar to OmniAccess_8550_Datasheet (20)

Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Intorduction to Datapower
Intorduction to DatapowerIntorduction to Datapower
Intorduction to Datapower
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
Array Networks AVX Multi-Tenant Application Delivery Controller Datasheet
Array Networks AVX Multi-Tenant Application Delivery Controller DatasheetArray Networks AVX Multi-Tenant Application Delivery Controller Datasheet
Array Networks AVX Multi-Tenant Application Delivery Controller Datasheet
 
intel_soae-h_data_sheet
intel_soae-h_data_sheetintel_soae-h_data_sheet
intel_soae-h_data_sheet
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
FortiGate-80C
FortiGate-80CFortiGate-80C
FortiGate-80C
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Data power use cases
Data power use casesData power use cases
Data power use cases
 
Motorola Wing 5.6 specification sheet
Motorola  Wing 5.6 specification sheetMotorola  Wing 5.6 specification sheet
Motorola Wing 5.6 specification sheet
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Brochure of Yokogawa's Fast/Tools Supervisory Systems
Brochure of Yokogawa's Fast/Tools Supervisory SystemsBrochure of Yokogawa's Fast/Tools Supervisory Systems
Brochure of Yokogawa's Fast/Tools Supervisory Systems
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.Common DataPower use cases, incl Caching with XC-10 appliance.
Common DataPower use cases, incl Caching with XC-10 appliance.
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 

OmniAccess_8550_Datasheet

  • 1. The Alcatel-Lucent OmniAccess™ 8550 Web Services Gateway (WSG) protects sensitive information from misuse satisfying regulatory compliance requirements and makes business process data available when and where it is needed. The OmniAccess 8550 WSG provides a corporate wide compliance infrastructure for secure automated business processes within a company and among its partner organizations. The OmniAccess 8550 WSG is a service oriented network appliance that reduces the traditional complexity and cost of securing internal corporate and business-to-business (B2B) automated business processes. Alcatel-Lucent OmniAccess 8550 Web Services Gateway The OmniAccess 8550 WSG, based on the Alcatel-Lucent Web services run-time message inspection technology, provides a scalable and reliable service oriented infrastructure for information system in such areas as human resources, enterprise resource planning (ERP), customer relationship management (CRM), and finance with security and regulatory compliance (policy enforcement and audit trail) that is required for secure business process automation. It is deployable within data centers to secure business processes within an organization and in the DMZ for automating business processes with partners. The OmniAccess 8550 WSG provides a significant competitive advantage by reducing IT system total cost of ownership (TCO). Product Features The deployment of an OmniAccess 8550 WSG provides corporate-wide security and regulatory compliance so organizations can secure automated business processes to meet increased government regulations and safely automate business processes with partners, creating a secure automated partner ecosystem.With the OmniAccess 8550 WSG securing business processes, highly skilled employees have access to information whenever they require it, even when at a partner site. The OmniAccess 8550WSG also provides unique, stateful (multi-transaction), run-time policy enforcement and consolidated audit trails to ensure and demonstrate compliance with government regulations (see Figure 1). The OmniAccess 8550 WSG also has the ability to mitigate risk through consistent policy enforcement across information systems with a user contextual knowledge of system events. To protect private data, the OmniAccess 8550 WSG provides information access and change control as well as data encryption with digital signatures. This enables a single digital identity within an organization that accepts authentication from trusted partners— the foundation for a consolidated corporate-wide access policy. Secure B2B processes are further enhanced by the OmniAccess 8550 WSG through security features such as the application firewall and auditing, tracking and control functions that can be used to monitor all partner activity, including access to information by partner employees when on-site.
  • 2. 2 Alcatel-Lucent 8550 Web Services Gateway protect the internal domain and ensure data security. Alternatively, the OmniAccess 8550WSG can be installed in the data center to secure business processes within the organization. It allows information access policy to be consistently enforced at run time across information systems and can demonstrate regulatory compliance through a user centric consolidated audit trail. Risk is mitigated with the proper controls and monitoring points in place as well as through consistent policy enforcement across information systems with a user contextual knowledge of system events. Deployment architecture The OmniAccess 8550 WSG is designed to be deployed in the DMZ of an organization to secure business process automation with partners (see Figure 2). The OmniAccess 8550 WSG is typically installed behind the IP firewall and provides service virtualization as well as key security functions to HQ Office Intranet ExtranetIdentity Management Business Applications Datacenter Strategic Partner Customer OA8550 WSG OA8550 WSG OA8550 WSG OA8550 WSG OA8550 WSG OA8550 Web Services Gateway Run time stateful policy enforcement Identity mapping and federation Consolidated audit trail Figure 1. Core OmniAccess OA8550 WSG features Figure 2. Typical OmniAccess 8550 WSG network deployment
  • 3. 3Alcatel-Lucent 8550 Web Services Gateway Threat protection & XML firewall Protects from deliberate attacks and malicious XML messages XML message validation Ensures all messages are well formed XML message control SQL Injection, Recursive Payload, Oversized Payload, Buffer Overflow, External Entity Attacks, Oversize Attachments, Cross Site Scripting Denial of service (DoS) protection Prevents DoS attacks focused at web services, replay attacks Management Easily managed appliance integrating with existing management platforms Fault management SNMP reporting to enterprise network management platforms Configuration management Provides Web-based GUI interface with role based management control Change management Enforces policy and configuration privileges by role and provides audit of all policy and configuration changes Secure hardware accelerated appliance Hardened appliance to comply with security standards High availability Provides automatic stateful failover for paired nodes Open standards compliant Compliance with Web services standards W3C, SOAP, UDDI, WS-Policy, WS-Trust, WS-Security, WS-Reliable Messaging, WS-Addressing Secured appliance No direct operating system access - encrypted hard drive - no internal devices allow for alternate re-boot of system - all ports disabled - configuration files digitally locked. Dedicated Web services infrastructure Hardware accelerated XML parsing & encryption with digital signing & SSL & HTTPS Feature group Benefit Feature Feature description Security & governance Ensures compliance with corporate governance policy and government legislation Application sessions Stateful model for Web service run-time policy Stateful run-time policy enforce- ment Run-time policy enforced across multiple transactions per credentialed user User-centric audit trail Consolidated audit trail capturing each information record viewed or modified per credentialed user, encrypted and signed to survive legal audit Application access control Stateful policy enforcement on access to individual Web services Information access control Stateful policy enforcement on access to individual information records Secure online B2B Enhanced security through single point of control to enable secure automated workflow among business partners Partner authentication Strong authentication for partner institutions (X509, XKMS, RSA, 3DES, DES, AES, SHA, PKCS, CRLs, OCSP) Service virtualization Map external URL used by partners to private internal URL Secured proxy point Stateful policy enforcement with cross-referenced audit on all partner activi- ty Data protection Data encryption and digital signing to survive legal audit User mobility Enables end users to seamlessly connect to web services at any partner site Multiple partner groups Allows web services to be offered to distinct partner groups Identity mapping & federation Consistent enterprise- wide enforcement of policy per credentialed user Single identity Dynamic identity translation allowing access to multiple IT systems with single credential for corporate-wide consistent policy enforce- ment Identity interoperability Enables acceptance of user validations from partners while meeting all traceability and user privacy requirements (SAML, WS-Trust) Integration with existing identity infrastructure Integrates with existing identity management infrastructure (LDAP, SAML, WS-Trust) Corporate agility Enables scaleable and reliable re-use of existing IT systems Application interoperability Provides mediation through message and content translations for applica- tions (XSLT) Web service load balancing Provides round robin load balancing with session stickiness and automatic failover Reliable messaging Provides policy-controlled, guaranteed delivery of web service messages
  • 4. www.alcatel-lucent.com Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. Alcatel-Lucent assumes no responsibility for the accuracy of the information presented, which is subject to change without notice. © 2008 Alcatel-Lucent. All rights reserved. P/N 031953-00 Rev C 10/08 System configuration The Alcatel-Lucent OmniAccess 8550 WSG is a high–performance, 2U, rack-mountable network element consisting of: • Two Quad-Core Intel E5345 Xeon processors (2.33 GHz, 80 watts, 1333 FSB), each with 8 MB of L2 cache • 8 GB of CPU memory with advanced ECC (multi-bit error) protection • 146 GB hot-pluggable hard drives with RAID1 SAS disk array • Fully redundant power supplies • Fully redundant fans • Six 10BaseT/100BaseTX/1000BaseTX network interfaces that support bonding for redundancy • Built-in high-performance SSL/TLS and crypto- graphic hardware • Built-in high-performance XML processing hardware • Front panel hardware alarm indicators • Includes universal rail kit for 19-inch racks Physical dimensions • Height: 3.38 in. (8.59 cm.) • Width: 17.54 in. (44.54 cm) • Depth: 23.65 in. (60.07 cm) • Weight: 60 lb (27.22 kg) Power Specifications • Input (per power supply) ¬ Line voltage: 100 VAC - 132 VAC 200 VAC - 240 VAC ¬ Input current: 3.3 A (at 120 VAC) 2.3 A (at 220 V AC) ¬ Input power: 370 W (at 120 VAC) 470 W (at 220 VAC) • BTU rating max: 1272 (for 120 VAC) 1610 (for 220 VAC) Standards compliance • WSRM 1.1 • WSS 1.0 • WSS-Signature • WSS-Encryption • WS-Trust • WSSE 1.0 • WSDL 1.1 • SOAP 1.1/1.2 • XSLT 1.0 • XPath 1.0 • UDDI 3.0 • HTTP 1.0/1.1 • TLSv1/SSLv3 • DES, 3DES, AES, RC4, SHA-1, MD5, PKCS #10, X.509, RSA, DSA • LDAP 3.0 • SAML 1.1 • SNMP • SFTP • IEEE 802.3, 802.3u, 802.3ab Regulatory EEMMCC ICES-003 Interference causing equipment standard for digital apparatus FCC Part 15 Class B FCC rules for radio frequency devices under FCC 15 of the rules of FCC EN55022, Class A/B Information technology equipment (ITE) - Radio disturbance characteristics - Limits and methods of measurement - Class A/B EN55024 ITE - Immunity characteristics - Limits and methods of measurements CISPR 24 ITE - Immunity characteristics - Limits and methods of measurements AS/NZS CISPR22 Limits and methods of measurement of radio disturbance characteristics of information technology equipment SSaaffeettyy CAN/CSA C22.2 No 60950-1-03 / UL 60950-1 ITE - Safety - Part 1: General Requirements FDA 21 CFR 1040 Performance Standard for Light-Emitting Products IEC 60825-1 (2001) Safety of laser products - Part 1: Equipment classification, requirements and user's guide. IEC 60825-2 (2000-05) Safety of laser products - Part 2: Safety of optical fiber communication systems EN60950-1 Safety of information technology equipment IEC 60950-1 Information technology equipment - Safety - Part 1: General requirements AS/NZS 60950-1:2001 Approval and test specification - Safety of information technology equipment including electrical business equipment TTeelleeccoomm IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access method and PHY Layer Specification EECC DDiirreeccttiivveess ROHS 2002/95/EC Directive 2002/95/EC of the European Parliament and of the Council of 27 January 2003 on the Restriction of the use of certain Hazardous Substances in Electrical and Electronic Equipment (ROHS) Technical specifications