SlideShare a Scribd company logo
World
Connect
ServiceTRAINING FOR WTD TEAM
BY SHRIKANT BHAVSAR
What is World Connect
Service?
 The world connect is a solution to provide services
on public IP’s (Internet AS-6453)
 To overcome the discrepancies of VPN where we
use MPLS backbone with private IP’s.
IP SECURITY
 IPSec technology has served the needs of global
enterprises well, it has become very complex to
deploy, manage and reaches its scalability limits
when deployed in a generic router / firewall
based CPE equipment.
IPSEC modes of operation
 Transport mode: Only the payload of the IP
packet is usually encrypted and/or
authenticated.
 Tunnel mode: The entire IP packet is encrypted
and/or authenticated. It is then encapsulated into
a new IP packet with a new IP header. Tunnel
mode is used to create VPN for network-to-
network communications
Benefits of IPSEC
 Data Confidentiality
 Encryption & Decryption
 Key Management
 IKE: Session management & establishment in both
PE &CE
 Sessions are rekeyed & deleted automatically.
Introduction to Certes
Boxes
 Certes Boxes are used for Encryption & decryption of Data.
 Certes Networks enables us to encrypt data transmissions over
any type of network without compromising application or
network performance
 Certes Networks introduces three areas of improvement over
traditional IPsec for network-wide encryption deployments:
group policy definition, dynamic traffic flow and encryption
without tunnels
 We need copper for CEP5,10,100 & Fiber for CEP1G
Customer network
Connectivity
 Certes Enforcement Points (CEP)
 CEP Boxes are placed or installed between PE
device and the CPE device
 CEP boxes will have 4 interfaces remote interface,
local interface, management interface and
console.
Topology
 All three topologies are supported in Certes Full
Mesh, Hub & Spoke and Peer to Peer. Our
deployment will be mainly focusing on Full mesh
and Hub & Spoke.
 Layer 3 tunnel Mode will be used for IP Sec
encryption and decryption for TCL deployment
 Internet break out will be through the CEP, clear
policy will be configured with low priority for
internet access.
Layer 3 Tunnel Mode
 In Layer 3 Tunnel Mode we have two types of
deployment depending upon the redundancy
requirement
 a. Case 1: No redundant CEP available on
customer end. Remote IP will be used for
encrypting and decrypting the traffic.
 b. Case 2: redundant CEP available on customer
end. Virtual IP will be used for encrypting and
decrypting the traffic.
Types of scenarios in which certes
deployment is targeted
1) Single Router Single CEP Single WAN
2) Single Router Dual CEP Dual WAN
3) Dual Router Dual CEP Dual WAN
WTD Role in World
Connect Circuits
1) First we have to understand the topology.
2) LM will terminate on which Certes Box
3) So basic Speed & Duplex settings we have to
take from LM provider.
4) During turn up, NEECO has to do basic
configuration on Certes Box.
5) Certes & CE router configuration will be done by
IPP.

More Related Content

What's hot

Vpn ppt
Vpn pptVpn ppt
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 
CCNA Icnd110 s05l04
CCNA Icnd110 s05l04CCNA Icnd110 s05l04
CCNA Icnd110 s05l04
computerlenguyen
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
AIRTEL
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
Peter R. Egli
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
Irsandi Hasan
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
guestbeb9a5
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
Nil Menon
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
CCNA
CCNACCNA
CCNA
niict
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
Chaing Ravuth
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
Nil Menon
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Rambus
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
Muhammad Qasim
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
Chaing Ravuth
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
parthasn83
 
VPN
VPNVPN

What's hot (18)

Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
CCNA Icnd110 s05l04
CCNA Icnd110 s05l04CCNA Icnd110 s05l04
CCNA Icnd110 s05l04
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)Proxy Mobile IPv6 (PMIPv6)
Proxy Mobile IPv6 (PMIPv6)
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 10
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 
CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7CCNA 1 Routing and Switching v5.0 Chapter 7
CCNA 1 Routing and Switching v5.0 Chapter 7
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
CCNA
CCNACCNA
CCNA
 
CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8CCNA3 Verson6 Chapter8
CCNA3 Verson6 Chapter8
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
CCNA Routing and Switching IT Certifications
CCNA Routing and Switching  IT CertificationsCCNA Routing and Switching  IT Certifications
CCNA Routing and Switching IT Certifications
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
VPN
VPNVPN
VPN
 

Viewers also liked

How much-protein-in-the-critical-illness
How much-protein-in-the-critical-illnessHow much-protein-in-the-critical-illness
How much-protein-in-the-critical-illness
Apollo Dietitians Forum
 
WN14-15WFFS Profile
WN14-15WFFS ProfileWN14-15WFFS Profile
WN14-15WFFS Profile
Santosh mishra
 
Thoái hóa sụn khớp - nguyên nhân ít ngờ đến
Thoái hóa sụn khớp - nguyên nhân ít ngờ đếnThoái hóa sụn khớp - nguyên nhân ít ngờ đến
Thoái hóa sụn khớp - nguyên nhân ít ngờ đếnjule885
 
resume 2013[1][1]
resume 2013[1][1]resume 2013[1][1]
resume 2013[1][1]
Bridget Keyes
 
m-updated resume 2015
m-updated resume 2015m-updated resume 2015
m-updated resume 2015
Bridget Keyes
 
Bradycakes
BradycakesBradycakes
Bradycakes
True.ink
 
D&O Insurance
D&O InsuranceD&O Insurance
TWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERSTWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERS
Cheeco11
 
barrick
barrickbarrick
Nouns
NounsNouns
Nouns
andresrbxw
 
NONOPIOID ANALGESICS
NONOPIOID ANALGESICSNONOPIOID ANALGESICS
NONOPIOID ANALGESICS
Dhvani Mehta
 
environmental factors kidney
environmental factors kidneyenvironmental factors kidney
environmental factors kidney
Dhvani Mehta
 
main environmental factors
main environmental factorsmain environmental factors
main environmental factors
Dhvani Mehta
 
Gastroscopy
GastroscopyGastroscopy
Gastroscopy
Dhvani Mehta
 
Asepsis
AsepsisAsepsis
Asepsis
Dhvani Mehta
 

Viewers also liked (15)

How much-protein-in-the-critical-illness
How much-protein-in-the-critical-illnessHow much-protein-in-the-critical-illness
How much-protein-in-the-critical-illness
 
WN14-15WFFS Profile
WN14-15WFFS ProfileWN14-15WFFS Profile
WN14-15WFFS Profile
 
Thoái hóa sụn khớp - nguyên nhân ít ngờ đến
Thoái hóa sụn khớp - nguyên nhân ít ngờ đếnThoái hóa sụn khớp - nguyên nhân ít ngờ đến
Thoái hóa sụn khớp - nguyên nhân ít ngờ đến
 
resume 2013[1][1]
resume 2013[1][1]resume 2013[1][1]
resume 2013[1][1]
 
m-updated resume 2015
m-updated resume 2015m-updated resume 2015
m-updated resume 2015
 
Bradycakes
BradycakesBradycakes
Bradycakes
 
D&O Insurance
D&O InsuranceD&O Insurance
D&O Insurance
 
TWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERSTWO EXTRAORDINARY TIME KEEPERS
TWO EXTRAORDINARY TIME KEEPERS
 
barrick
barrickbarrick
barrick
 
Nouns
NounsNouns
Nouns
 
NONOPIOID ANALGESICS
NONOPIOID ANALGESICSNONOPIOID ANALGESICS
NONOPIOID ANALGESICS
 
environmental factors kidney
environmental factors kidneyenvironmental factors kidney
environmental factors kidney
 
main environmental factors
main environmental factorsmain environmental factors
main environmental factors
 
Gastroscopy
GastroscopyGastroscopy
Gastroscopy
 
Asepsis
AsepsisAsepsis
Asepsis
 

Similar to World Connect Training

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
V P N
V P NV P N
V P N
bhathiji
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Vanitha Joshi
 
L2 tp., ip sec
L2 tp., ip secL2 tp., ip sec
L2 tp., ip sec
ZekriaMuzafar
 
Branching out with SDN
Branching out with SDNBranching out with SDN
Branching out with SDN
APNIC
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
Senetas
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
KishoreTs3
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
Sione Taukinukufili
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
Ameen Wayok
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
RahafKhalid14
 
Phifer 3 30_04
Phifer 3 30_04Phifer 3 30_04
Phifer 3 30_04
Ayano Midakso
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
n|u - The Open Security Community
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
Shareeka Corporation with Packet Tracer Simulation
Shareeka Corporation with Packet Tracer SimulationShareeka Corporation with Packet Tracer Simulation
Shareeka Corporation with Packet Tracer Simulation
Rami Bahram
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET Journal
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
Jatin Singh
 

Similar to World Connect Training (20)

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
V P N
V P NV P N
V P N
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
L2 tp., ip sec
L2 tp., ip secL2 tp., ip sec
L2 tp., ip sec
 
Branching out with SDN
Branching out with SDNBranching out with SDN
Branching out with SDN
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 
Phifer 3 30_04
Phifer 3 30_04Phifer 3 30_04
Phifer 3 30_04
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Shareeka Corporation with Packet Tracer Simulation
Shareeka Corporation with Packet Tracer SimulationShareeka Corporation with Packet Tracer Simulation
Shareeka Corporation with Packet Tracer Simulation
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 

World Connect Training

  • 1. World Connect ServiceTRAINING FOR WTD TEAM BY SHRIKANT BHAVSAR
  • 2. What is World Connect Service?  The world connect is a solution to provide services on public IP’s (Internet AS-6453)  To overcome the discrepancies of VPN where we use MPLS backbone with private IP’s.
  • 3. IP SECURITY  IPSec technology has served the needs of global enterprises well, it has become very complex to deploy, manage and reaches its scalability limits when deployed in a generic router / firewall based CPE equipment.
  • 4. IPSEC modes of operation  Transport mode: Only the payload of the IP packet is usually encrypted and/or authenticated.  Tunnel mode: The entire IP packet is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create VPN for network-to- network communications
  • 5. Benefits of IPSEC  Data Confidentiality  Encryption & Decryption  Key Management  IKE: Session management & establishment in both PE &CE  Sessions are rekeyed & deleted automatically.
  • 6. Introduction to Certes Boxes  Certes Boxes are used for Encryption & decryption of Data.  Certes Networks enables us to encrypt data transmissions over any type of network without compromising application or network performance  Certes Networks introduces three areas of improvement over traditional IPsec for network-wide encryption deployments: group policy definition, dynamic traffic flow and encryption without tunnels  We need copper for CEP5,10,100 & Fiber for CEP1G
  • 7. Customer network Connectivity  Certes Enforcement Points (CEP)  CEP Boxes are placed or installed between PE device and the CPE device  CEP boxes will have 4 interfaces remote interface, local interface, management interface and console.
  • 8. Topology  All three topologies are supported in Certes Full Mesh, Hub & Spoke and Peer to Peer. Our deployment will be mainly focusing on Full mesh and Hub & Spoke.  Layer 3 tunnel Mode will be used for IP Sec encryption and decryption for TCL deployment  Internet break out will be through the CEP, clear policy will be configured with low priority for internet access.
  • 9. Layer 3 Tunnel Mode  In Layer 3 Tunnel Mode we have two types of deployment depending upon the redundancy requirement  a. Case 1: No redundant CEP available on customer end. Remote IP will be used for encrypting and decrypting the traffic.  b. Case 2: redundant CEP available on customer end. Virtual IP will be used for encrypting and decrypting the traffic.
  • 10. Types of scenarios in which certes deployment is targeted
  • 11. 1) Single Router Single CEP Single WAN
  • 12. 2) Single Router Dual CEP Dual WAN
  • 13. 3) Dual Router Dual CEP Dual WAN
  • 14. WTD Role in World Connect Circuits 1) First we have to understand the topology. 2) LM will terminate on which Certes Box 3) So basic Speed & Duplex settings we have to take from LM provider. 4) During turn up, NEECO has to do basic configuration on Certes Box. 5) Certes & CE router configuration will be done by IPP.