13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 9GPRS VPN scenarios.Figure 10The Ericsson WLAN security solution.protocol. IKE is not supported in the currentrelease but will be supported in the nearfuture. The flexible design of the GGSN allowsfor various VPN tunnel options betweenthe GGSN and a corporate network.RADIUS authentication can be handled atthe corporate site. As shown in Figure 9, astatic IPsec connection is set up between theGGSN and a gateway in the corporate network.Alternative locations of RADIUS anddynamic host configuration protocol(DHCP) servers within the external networksare indicated in the figure. Corporatenetwork no. 1 uses RADIUS for authenticatingclients and assigning addresses. Corporatenetwork no. 2 relies on the GSM attachauthentication mechanism and utilizesDHCP to assign client IP addresses. Finally,corporate network no. 3 uses a hybrid approach,in which DHCP manages client IPaddresses, and RADIUS authenticatesclients.The WLAN security productEricsson's WLAN solution provides transparentmobility and security for mobileusers who want to access their <strong>com</strong>pany networks.WLAN Guard provides firewall protection,preventing unauthorized access tothe wireless LAN. WLAN Guard also servesas the security link in a wireless network,safeguarding user information over thewireless network and ensuring that unauthorizedmonitoring of the network or intrusiondoes not occur. The WLAN Guardsecurity solution is based on IPsec. Encryption/decryptionand authorization keys arealso employed to provide authentication,automatic security association management,and to protect wireless traffic. The authorizationkeys are <strong>com</strong>pliant with the IKEstandard. The WLAN Guard control databaseretains records of all authorized usersand their required keys (Figure 10).Secure corporate e-mail on the InternetThe Internet standard S/MIME was developedto provide authentication, integrityand confidential services for Internet e-mail.It is also attractive for corporate use, nowthat more and more mobile users need to<strong>com</strong>municate securely with colleagues oncorporate intranets. S/MIME relies on theexistence of a PKI under the control of atrusted CA.S/MIME is fundamentally used for pointto-pointsecurity. Thus, for secure e-mail betweenparties, each party must obtain a digitalcertificate. This requires full PKI de-104 Ericsson Review No. 2, 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!