Internet Key Exchange Version 2 (IKEv2)

A recent CISCO study published in Feb 2016 says that mobile data traffic has grown 4,000-fold over the past 10 years and almost 400-million-fold over the past 15 years. It forecasts that global mobile data traffic will increase nearly eightfold between 2015 and 2020.
Privacy and security become important and complex with the growth in data traffic.
Several Virtual Private Network (VPN) protocols like PPTP, L2TP/VPN, OpenVPN and IKEv2, SSTP, supporting different encryption technologies have evolved over the years. A comparative study of each of them can be found here.

IKEv2 (Internet Key Exchange version 2), referred as VPN Connect by Microsoft, is an IPSec based tunneling protocol that was jointly developed by Microsoft and Cisco. It is one of the few VPN protocols supported by Blackberry devices. Various, largely compatible open source implementations of IKEv2 are available for Linux and other operating systems.

IKEv2 is good at automatically re-establishing a VPN connection when users temporarily lose their internet connections such as entering and leaving an elevator. It supports the Mobility and Multihoming(MOBIKE) protocol, making it highly resilient to changing networks, which is extremely helpful for mobile customers. MOBIKE allows a mobile node encrypting traffic through IKEv2 to change point of attachment while maintaining a VPN session. That is, by using an IKEv2 protocol the user can lose their connection and reconnect to another access point without losing the VPN session! This helps users who switch between WiFi nextwork, hotspots and mobile data.

IKEv2 uses the IPsec Tunnel Mode protocol over UDP port 500, allowing the support for strong authentication and encryption methods. It encapsulates datagrams by using IPsec ESP or AH headers for transmission over the network. The message is encrypted by using encryption keys generated from the IKEv2 negotiation process. It also supports integrity checking algorithms like HMAC. All these things make IKEv2 very highly secure.

IKEv2 is considered at least as good as L2TP/IPsec in terms of security, speed, stability and the ability to establish (and re-establish) a connection.

Draytek routers support LAN to LAN connection (like Microsoft Azure cloud operating system to your network) through a virtual private network (VPN). They also support Host (Windows/Android/iOS) to LAN connection via VPN.

Celebrating Internet Security Month – Here is what you can do to celebrate with us.

June is the Internet Security month and we would like to take this opportunity to make our business users and other users aware about the significance of internet security and how we can take small measure in our day to day life that can protect our personal and business information.

These days everything is going online, our computers, laptops and smartphone have become an essential part of our day to day life. Being connected with internet around the clock can compromise our personal data like passwords, documents and other confidential data about us. Being connected to the internet brings you in touch with people out there , who are waiting for a loop hole to steal your personal identity to a group of people who are out there ready to hack your systems and personal devices for the passwords, documents and other personal data. Most people take internet security very lightly thinking that computers are invisible, but soon as you start using your computer for anything that involves logging onto internet make you an easy prey. So what we can do to keep things safe? We can help you with few things that can help you to figure out things that will help you to be safe and secure.

Below are few tips that you can be followed to make yourself secure and safe online:

Here are few things that you can do to make internet based activates remain safe and secure.

Socializing in a smart way

Starting for sharing picture online to on social media to Snapchats, asking questions on online forms and using thousands of social apps, all are getting well connected and sharing information. Sharing things with care is important. It’s better to avoid sending sensitive and intimate personal information online or via email to anyone whom you consider as friends. Later point they may share your information online creating problems for you. Avoid sharing your information to people whom you don’t know in person. They might be people with fake identity trying to extract information from you, so beware. Interaction with an unknown individual or a group should be handled with at most care.

Gaming Safety for Parents and kids

Nowadays most of the people have gaming consoles in their homes. These consoles are connected with others gamers online. There is a chance that kids can share their personal information to other gamers online. All chat enabled games make other gamers connect with your kids. You should make your kids aware about the risk of sharing information online. Parents can activate parental controls on their consoles to ensure that kids don’t interact and share sensitive information to strangers.

Kids and their smartphone usage

Most of the kids carry smartphone to stay connected to their families at time of emergencies. But all these phones are loaded with apps and games that can knowingly or unknowingly track and read sensitive information like current user location. Parents should make sure that their kids download reputed apps and all sensitive and personal information should be locked by parents using pin or finger prints locks. Parents should frequently have check on contents and activates of the smartphones used by their kids. If possible also install locate and wipe your phone feature that will help to wipe the data on the phone, in case of losing the phone.

Some care for your personal devices and digital etiquettes

There are few things you should do on regular interval to keep your devices up to date and ready to comply with any security threats. Some of the best line of defense are using updated antivirus, updated software and firewalls. Turning on two step authentication for email and social and financial accounts which will provide extra layer of security. Here are some digital etiquettes that will give you some extra security. First step is to have a better password long, combining upper case, lower case and some special characters. Backup data over secure cloud or storage devices will help you to store safely.

We would like to make sure that all our customers and internet users are aware of these steps that will make them secure and safe over internet. Security should be taken as first priority by all the users to make usage of internet a happy experience. So let’s celebrate this internet security month and make everyone around us aware about the significance of security and its importance.

DVCOM is a value added distributor for DrayTek Routers and other DrayTek networking peripherals in Middle East. It has been there in the market providing all telecommunication solutions for Past 20 years. DVCOM has been networking consultants for many Government projects as well as for the Private Sector Business entities, providing 360 degree solutions and product portfolios. It itself has a range of professional products and services providing assessment, design and implementation of professional IP Communications solutions including Unified Communications (UC) and Converged Communications (CC) for ensuring high availability, reliability, performance, scalability, and manageability within their intranet environments. We at DVCOM understand our customer needs and provide the best solutions that will help them to run their business better. Their success is our success.

DrayTek- One Stop-Shop Solution for all your Networking Needs

To stay connected has become a part of our daily life. Same is the case for people, who want to run their businesses. Networking has now become the primary key for the success of every business. To start a business, it requires investments in networking infrastructure. ICT infrastructure primarily supports the businesses and acts like the backbone, which helps to run and manage the business better. Consistent internet connectivity and network security helps the businesses in all aspects of using business applications such as ERP, CRM, BPM, Warehousing, e-Commerce etc. and VoIP calls, emails and much more. To enable all these feature and to have a reliable infrastructure is where DrayTek plays a significant role.

Some of the Key Feature DrayTek
The features described below will enlighten your understanding and open up avenues for you to understand its effective usage from its technology, features & functions perspectives within your networking infrastructure to manage your business efficiently.

True Redundancy, Guaranteed Internet Access
Everyone wants to run uninterrupted business under any preventing circumstances by having a sustained business continuity and redundancy plan protecting their businesses from any eventualities. DrayTek helps to set up Business Continuity Planning (BCP) so that your business continues even at hard times. It also provides a guaranteed connectivity even at the time of network failures by routing the available network. Apart from BCP, companies must have alternative plans to ensure their business running under the critical times. Such critical situations are achieved in DrayTek by using Fail-Over feature that helps to provide continuous internet connectivity by switching to the available internet connection source at the time of outage. DrayTek also provide Load Balancing feature that helps to manage your network traffic. There is also a custom routing feature available that helps to define your own routing mechanism most suitable for your business.

Security on First Priority
DrayTek takes away all your concerns regarding security. It takes care of all your security needs. It has a comprehensive VPN architecture that deals with all the elements of security making your network very secure. It also has VPN Backup feature that helps to maintain a back-up for all your valuable data. Distributed Denial of Service (DDoS) attacks are becoming more common, this type of attack denies the access to a legitimate users to their respective online services. DrayTek helps you to deal with all these kinds of attack with its own built in mechanism. Web Content Filtering is another feature available that helps the network admin to have a firm grip on controlling the content of data that can be viewed or streamed over the network. DrayTek’s comprehensive Web Content Filtering features allows you to specify exactly what your users/staff can or can’t access. You can prevent all web surfing, allow access only to certain sites, or block specific categories of sites. Different users can have different levels of access and time-schedules can also be applied. Application Filtering is another feature that helps to block unwanted applications that can be used to hamper the security of the network.

Better Customer Experience
Quality of Service for Voice over IP gets improved with DrayTek routers. It gives the flexibility to configure as per the requirement. DrayTek routers comes with tools for easy router setup and network management. It comes with Wireless Access Point Controller and Central Switch Management(CSM). Central VPN Management (CVM) is an easier way to establish and manage VPN connections between several CPE (VPN clients). It allows Administrator on the CVM Router to Set up VPN connections with just one click, Backup and restore CPE configurations, Upgrade firmware for CPE, Manage multiple CPEs simultaneously. ACS-SI Edition is a Central Management System (CMS). It supports all current DrayTek routers and firewalls, providing System Integrators or system administration personnel a real-time integrated monitoring, configuration and management platform.

DrayTek is a perfect option for Small Market Business. This is mainly because of its rich features with outstanding price to performance ratio which makes it the best option to go with for people who are starting a business and also for those holding small business. Another key feature that makes the selling point for DrayTek routers is its easy configuration and management. The end users’ needs only basic computing knowledge to do initial setup and use this device. There is no specialization or certification required to handle the initial setup and configuration of DrayTek routes. The feature packed DrayTek router comes with single license for all the features. There is no per user/per feature licensing cost so its always a good news for small market business users.

DVCOM is a value added distributor for DrayTek routers and other DrayTek networking peripherals in Middle East. It has been there in the market providing all telecommunication solutions for Past 20 years. DVCOM has been networking consultants for many Government projects as well as for the Private Sector Business entities, providing 360 degree solutions and product portfolios. It itself has a range of professional products and services providing assessment, design and implementation of professional IP Communications solutions including Unified Communications (UC) and Converged Communications (CC) for ensuring high availability, reliability, performance, scalability, and manageability within their intranet environments. We at DVCOM understand our customer needs and provide the best solutions that will help them to run their business better. Their success is our success.