Columbitech Mobile VPN
|
|
|
- Alannah Flowers
- 10 years ago
- Views:
Transcription
1 Columbitech Mobile VPN Technical Description Updated
2 Copyright Columbitech AB. All rights reserved Abstract Not too long ago the workplace was a place where business related communications took place and where decisions were made. Enterprise Mobility has given today s workforce a new level of efficiency not only for telecommuters but also truly transforming areas such as production, logistics and customer relations. Wireless technologies are finally getting mature enough to be useful for typical mobile enterprise applications, public safety records access or areas such as mobile health. Information Technology in its form of wireless data communication is literally transforming our entire society. Driven by global standards such as GSM 4G LTE and high capacity smart-phones and tablets, we are now entering an hitherto unprecedented opportunity to rapidly scale up innovations, ideas and entire economies. However, large enterprises and service providers have until today been unable to successfully launch their corporate wireless services. One major showstopper has undoubtedly been the lack of security. Communicating sensitive data in a public wireless environment requires a security framework that is strong enough to resist any unauthorized access to the data or to the corporate network, while still being convenient for end users. The lack of convenience combined with relatively poor wireless performance is another issue that prevents a successful commercial rollout. As most enterprises or agencies today have a wide range of different devices including laptops and smart phones the wireless solution must offer security for all types of devices. There is clearly a demand for secure and robust software designed to deliver on any current and future software platform, flexible enough to fit into the advanced IT infrastructure (today fueled by cloud-based solutions) and optimized to let innovations in the form of mobile applications truly deliver as promised, and yet address important barriers of entry such as regulatory compliance and productivity for the worker. This white paper presents Columbitech s Mobile VPN solution, a system that enables secure and convenient remote access to the corporate network. The architecture is developed with the assumption that a wireless network environment will inheritably always suffer from limited bandwidth and unstable connections. This solution has been designed to overcome the four main obstacles in wireless communications, namely the lack of security, the poor wireless performance, the low level of transparency to the end user and support for all types of devices. 2
3 Contents COLUMBITECH MOBILE VPN... 1 ABSTRACT... 2 INTRODUCTION... 5 TECHNOLOGY OVERVIEW... 6 MOBILE VPN VS. OTHER VPN SOLUTIONS... 6 Internet Protocol Security (IPSec)... 6 SSL VPNs... 6 Mobile VPNs... 6 SECURITY PROTOCOLS... 7 DEVICE SUPPORT... 7 SECURING THE DEVICE... 7 INTEGRATION WITH OTHER SYSTEMS... 7 MOBILITY OPTIMIZATIONS... 7 SYSTEM OVERVIEW... 9 COLUMBITECH MOBILE VPN SERVER Columbitech Mobile VPN Server Administrative Tool Columbitech Certificate Manager COLUMBITECH GATEKEEPER Administrative Tool COLUMBITECH MOBILE VPN CLIENT ON WINDOWS Client Monitor mvpn Client Control Panel SSO Module Client API COLUMBITECH MOBILE VPN CLIENT ON ANDROID COLUMBITECH MOBILE VPN SECUREBROWSER ON IOS COLUMBITECH MOBILE VPN APP SDK FUNCTIONAL DESCRIPTION SECURITY Securing Traffic Securing Network Resources Securing Clients Wireless PKI CONVENIENCE Automatic Session Resume Data Transaction Recovery Seamless Network Roaming Single Sign-On PERFORMANCE Adaptive Data Compression Adaptive Encryption (Trusted Zones) Transmission Protocol Optimization Data Encapsulation Scalability TECHNICAL DATA AUTHENTICATION MECHANISMS ENCRYPTION ALGORITHMS
4 SOFTWARE REQUIREMENTS HARDWARE REQUIREMENTS CONCLUSIONS REFERENCES
5 Introduction Columbitech Mobile VPN is a client/server based software architecture for secure and remote access to designated corporate data. The architecture enables mobile users to be continuously and securely connected to their corporate intranet, using any public or private network available. The Mobile VPN lets the user work normally, as if connected directly to the office LAN. Data is transferred within an encrypted and authenticated WTLS or DTLS session, over a public network, to the VPN server residing on the corporate network. Columbitech Mobile VPN is network-agnostic and transparent to the applications. This means that a remote user can use any network provider to securely access any enterprise service or application. As the name suggests, Columbitech Mobile VPN is a VPN architecture developed for use in a wireless environment. Various mechanisms are used to create a high-quality wireline-like experience over unreliable, low-bandwidth wireless networks. Columbitech s solution protects the secure session in case the wireless network fails. Automatic connection re-establishment mechanisms make sure that the user automatically gets logged back on to the corporate network as soon as any access network is available. The VPN session may be established over one type of network and later resumed over another, depending on current network availability. Columbitech Mobile VPN is not just another VPN solution. By using standards and protocols especially adopted for wireless communication, Columbitech has been able to create a VPN with exceptional reliability. The VPN architecture is implemented as a middleware and can be seen as a wireless communications platform, not only providing a very high level of security, but also providing high performance through efficient adaptive compression and various protocol optimization techniques. Furthermore, the peculiarities of wireless data communication are made transparent by providing the end user with a robust, convenient and hassle-free single sign-on environment. Columbitech Mobile VPN is designed for seamless interoperability with existing corporate solutions. Columbitech Mobile VPN can make use of existing services for authentication, authorization and network management. A company that is already using another IP VPN solution may deploy Columbitech s Mobile VPN as a wireless extension and still benefit from their existing IP VPN for wireline services. If a company is not currently operating an IP VPN, the Columbitech Mobile VPN solution is able to provide traditional wireline VPN services in addition to the wireless functionality. Many of the wireless optimizations implemented in the Columbitech architecture are just as applicable to wireline environments. 5
6 Technology Overview A Mobile VPN can be defined by a number of characteristics. How they differ from other VPN architectures; How they handle being used on smart phones; How they handle limited bandwidth; What security protocols they use; How they integrate with other vital systems etc. Mobile VPN vs. other VPN solutions Virtual Private Networks (VPN) was originally developed because the there was no built- in way to secure data over a public network in TCP/IP. A VPN is basically a way of sending data between two computers that can authenticate each other; the data sent is confidential and reliable (not changed in transit). A mobile VPN furthermore has to take into account that a user will move from network to network and suspend their devices to preserve battery life. All this without requiring the users to restart their VPNs and devices. Internet Protocol Security (IPSec) IPSec is the most commonly used VPN technology today. It was mainly designed for wired networks. It is able to authenticate users, send data confidentially and reliably but suffers from a set of drawbacks in its design. It does not handle coverage gaps or device suspension at all. This is due to the fact that IPSec was designed with the assumption that the address of the device will remain unchanged. With MOBIKE (RFC 4555) the requirement for the address having to be unchanged has been addressed. MOBIKE does however not add any mobility optimisations to increase the speed and applications still have a hard time surviving coverage gaps and hibernation. SSL VPNs SSL VPNs are primarily browser based. This means that you are connecting to a web portal with the built-in security of the web browser. The web portal will then proxy the data traffic to internal web resources. This works for rudimentary access and will require a client to be installed on your device for more advanced applications. When a client has to be installed on the device the SSL VPN basically turns into a Mobile VPN and the benefits of the client-less VPN are long gone. The SSL VPNs are mainly good for public and kiosk computers. They do however not handle coverage gaps and suspension of devices well. Mobile VPNs Mobile VPNs are designed to handle coverage gaps, suspending devices with the same or a higher level of security. A Mobile VPN is also designed with smaller devices and limited bandwidth in mind. This means that a Mobile VPN works equally well on smart phones as laptops using wireless networks spanning from 2G up to 4G-LTE and WIFI or wired networks. Below a few other very important aspects of a mobile VPN are outlined. 6
7 Security Protocols A very important goal when designing a Mobile VPN is to not sacrifice security when trying to create a convenient security solution for the users. A Mobile VPN must be based on a standardized security protocol that can handle mobility. Examples of standardized security protocols that are designed for mobility are WTLS and DTLS. Both these security protocols contain all the security features that must be there as well as roaming features. The roaming features are used to handle the reestablishment of the secure session when moving from one network to the other; when resuming suspended devices or just recovering from network coverage gaps. Device support A Mobile VPN must be able to handle devices of very different characteristics. The different devices span from older handheld devices with limited memory and processing power to laptops and desktops with lots of memory and CPU. We have already touched on the battery aspect of a device when it comes to device suspension and it is also important to point out that Mobile VPN clients have to be implemented in such a way so they do not drain the battery while running. It is becoming more and more evident that corporations and agencies today have a hard time standardizing on a specific type of device. The pressure from the employees is that they want to use their own devices to access internal resources of their employer. Therefore it is becoming more and more of a challenge to find a single product that can handle all the aspects of wireless and have support for all different devices. A Mobile VPN really has to have a broad device support. Securing the device When it comes to securing the device there are a few things to you need to consider. The Mobile VPN will ensure the confidentiality and integrity of your data traffic. What happens if the device itself gets compromised? On a laptop you will have to complement the Mobile VPN client with a personal firewall as well as Anti-virus. You should also have the Mobile VPN server require the Mobile VPN client run an integrity check before being allowed access to the internal resources of the corporate network. This integrity check should check things like if the personal firewall is running; is the anti-virus running and is it up to date; are the latest OS patches installed? Well, all this sounds good, but what should you do with your smart phones? They have limited battery power so having an anti-virus client running all the time is not optimal. One solution that mitigates the need for anti-virus and personal firewalls is sandboxing. Sandboxing is the way that applications are run on devices running ios and Windows phone. Sandboxing means that the application runs in its own isolated space within the OS and cannot communicate with other applications within the smart phone. So, even of you do get a virus on your smart phone, the virus can never get access to your application. Integration with other systems A typical corporate network today already has a number of systems in place: an authentication server of sorts and a firewall etc. The last thing a systems administrator wants to do when installing a Mobile VPN is, for instance to setup a new user database. The Mobile VPN must be able to interact with the already existing systems. Mobility optimizations A Mobile VPN implements a number of optimizations. The most important ones are compression and multiplexing. The payload of every packet is compressed and also the headers 7
8 of the data packet are compressed using header compression (e.g. RObust Header Compression ROHC), which both saves bandwidth and increases transmission speed. This will also have a positive impact on the battery length as many CPU-cycles are saved when less data has to be encrypted. Every applications communication will go through the same TCP/IP connection. This saves a lot of bandwidth as a TCP/IP is quite chatty (TCP/IP control packets) and the fewer TCP/IP connection you have to have the fewer TCP/IP control packets will be transmitted. This technique is called Multiplexing. 8
9 System Overview Columbitech Mobile VPN architecture consists of a client software component, the Columbitech Mobile VPN Client, and one or more server components. Columbitech Mobile VPN Server is a server software component residing inside the corporate network. Columbitech Mobile VPN Server acts as the VPN terminator; it handles encryption, authentication, compression and session management. A second server component, Columbitech Gatekeeper, may be installed in the corporate demilitarized zone (DMZ) to further increase security, to simplify firewall configuration and to enable load balancing. The Gatekeeper is not a mandatory component in the Mobile VPN architecture. However, to meet strict corporate security policies, the Gatekeeper component may be required. Figure 1: Imagine a businessman at an airport, connected to his corporate LAN through a hot spot WLAN access point (1). When leaving the airport, the connection will be lost and the VPN client will switch over to a GPRS/3G/4G network (2), making it possible to remain connected, without any new logon procedures. When visiting the customer, the businessman could connect to his corporate server using the customer s Bluetooth network (3). Each network switch is performed automatically, totally transparent to the user. Columbitech s Mobile VPN solution is implemented at the session layer, totally transparent to the applications as well as to the underlying network infrastructure. Transparency to network operator or service provider is achieved since no software or hardware needs to be installed 9
10 outside the corporate domain. However, the mobile VPN architecture includes components that may be installed by an operator or service provider to enable outsourcing of the corporate wireless data services. Columbitech Mobile VPN Server Columbitech Mobile VPN Server consists of several software modules that can be installed either on the same machine or on separate machines. The modules are described below: Columbitech Mobile VPN Server Columbitech Mobile VPN Server is the core component responsible for handling the VPN connections. Columbitech Mobile VPN Server is installed on a server residing on the corporate network inside the firewall, as depicted in Figure 2. Mobile VPN Clients may connect directly to Columbitech Mobile VPN Server or via a Gatekeeper located outside the firewall, in the DMZ. Regardless of which, the secure tunnel is always terminated by Columbitech Mobile VPN Server. No data will ever be revealed outside the firewall. Figure 2: Columbitech Mobile VPN Server When a client initiates a VPN session, the user is required to authenticate to Columbitech Mobile VPN Server. Authentication can be done by using one or a combination of the following authentication mechanisms: Client certificate (X.509 and WTLS formats supported) Windows username/password. RADIUS (challenge/response or username/password) RSA SecurID one-time-password Smartcard / CAC card Biometrics Google authentication When the user has been properly authenticated, the mvpn Server enables the VPN session and assigns a corporate domain IP address to the client. Data to a Mobile VPN client is intercepted by Columbitech Mobile VPN Server for compression and encryption before it is sent to the client. For any corresponding host or node, the VPN client appears to be connected directly to the corporate network, the fact that the client may be remotely connected to the mvpn Server is totally transparent. Administrative Tool The Columbitech Mobile VPN Server Tool is implemented as an MMC (Microsoft Management Console) snap-in. The management console is using Com+ objects for 10
11 communication with the mvpn Server. This enables the system administrator to install the management console on a different machine for remotely managing the mvpn Server. It is possible to connect to multiple mvpn Servers from the same management console, a useful feature in large installations with distributed servers. As an option, the communication between the management console and the mvpn Server may be encrypted and authenticated. Figure 3: Columbitech Mobile VPN Server management console Columbitech Certificate Manager Included in Columbitech Mobile VPN Server is an application for creating and managing certificates. An enterprise is thus not dependent on an external PKI solution or provider for enforcing certificate authentication in Columbitech Mobile VPN with the Certificate Manager, a system administrator can easily create CA certificates, client certificates and server certificates according to the x.509 or the WTLS standard. Certificate revocation lists can be imported or created in order to revoke invalid certificates. For large installations, the Columbitech Wireless PKI Portal can be used to automatically create a large number of client certificates. The PKI portal connects to the corporate Windows domain controller and creates a client certificate for each domain user, or for a group of users, as configured in the Certificate Manager. Furthermore, the PKI portal supports automatic distribution and installation of client certificates on the client devices. Columbitech Gatekeeper Columbitech Gatekeeper is an additional server component designed to be installed in the corporate DMZ. The main purposes for deploying the Gatekeeper is to: Increase the security through strong authentication outside the firewall. Simplify firewall configuration. Prevent exposure of the mvpn Server on the Internet. 11
12 Enable load balancing and failover. If the system is configured to use a Gatekeeper, the mvpn Server connects to the Gatekeeper when the server starts. The connection is established from inside the corporate network to the DMZ, something most corporate security policies allow. The VPN clients connect to the Gatekeeper, they do not connect directly to the mvpn Server. The Gatekeeper connection is totally transparent: The VPN client does not explicitly have to be configured to use the Gatekeeper, this is taken care of by the mvpn protocol. Figure 4: Gatekeeper deployment When an mvpn Client initiates a handshake, the Gatekeeper authenticates the user before allowing the connecting client to continue the handshake with the mvpn Server. Data from mvpn Client is intercepted by the Gatekeeper and multiplexed over the TCP session that was initially created by the mvpn Server. Thus the firewall does not have to be opened for incoming TCP connections. The Gatekeeper supports the following authentication mechanisms: Client certificate (x.509 or WTLS format) RSA SecurID RADIUS (challenge/response or username/password) By deploying Columbitech Gatekeeper, strong user authentication can be enforced before any traffic is allowed inside the firewall, still without breaking the end-to-end encryption between the VPN client and the VPN server. Columbitech Gatekeeper can also be used to seamlessly and dynamically scale up the system, while at the same time providing the mvpn Server with load balancing and failover. Several mvpn Server can be grouped into one logical server by using a server group identifier. Large enterprises with different branch offices or isolated departments may deploy a Gatekeeper inside their corporate DMZ and have one mvpn Server group per branch office or department connecting to the same Gatekeeper. The Gatekeeper is responsible for distributing mvpn Clients evenly on the available mvpn Servers within one server group. If one mvpn Server is going down, only the users connected to that particular mvpn Server would be disconnected. When the mvpn Client reconnects, the Gatekeeper will allocate another mvpn Client from the server group to the client. 12
13 Administrative Tool Using the Gatekeeper Administrative Tool, a system administrator can configure the Gatekeeper service and monitor connected mvpn Servers and users. The functionality is very similar to the mvpn Server Administrative Tool. Columbitech Mobile VPN Client on Windows The Columbitech Mobile VPN Client is implemented as a virtual network interface. When the client connects to the mvpn Server, the virtual interface gets an IP address allocated from the corporate domain. The mvpn Client reconfigures the routing tables to force all applications to send data through the virtual interface. Functions at the session layer compress and encrypt the data before it is passed down to the virtual interface for address translation. The data is then multiplexed over one of the physical network connections for further transport to the mvpn Server. The mvpn Client runs as a Windows service and uses the following components to interface the user: Client Monitor The client monitor is an icon on the system tray menu. The monitor displays the current connection status, available connections, and the currently used bearer. In expanded mode, the mvpn Client Monitor can be used to change connection state, profile and bearer. Figure 5: Mobile VPN Client Monitor (expanded mode) mvpn Client Control Panel The control panel is used to change the settings of the mvpn Client, including connection settings, connection preferences and user profiles. Administrative privileges are required to change the mvpn Client settings or to allow for the personal firewall to be switched off. A normal user can thus not bypass the VPN by disabling the Wireless VPN client or by changing the security configuration. SSO Module The Columbitech SSO module is a module for integrating the mvpn Client login with the standard Windows login mechanism. When a VPN user logs on to the computer, the Columbitech SSO module intercepts the user s credentials and the user gets transparently logged on to the mvpn Server before the Windows login logs on to the windows domain. 13
14 Client API Columbitech Mobile VPN Client includes a software API with which an application developer can integrate the Mobile VPN functionality into a user application in order to make the Mobile VPN functionality transparent to the end user. By using the client API, an application can connect and disconnect to the mvpn Server, change profile and trigger network roaming. The application can also retrieve status information regarding data rate and the type of bearer through the API. This feature opens up new possibilities for creating adaptive applications where the behaviour and information is adapted according to the currently used bearer type. Columbitech Mobile VPN Client on Android The Columbitech Mobile VPN client for Android uses the Android VPN API that was introduced in 4.0 (Ice Cream Sandwich). The Android VPN API exposes interfaces to the built in virtual network interface (i.e. TUN adapter) in Android. The Columbitech Mobile VPN client for Android supports all functionality of the Columbitech Mobile VPN including DTLS. It uses the FIPS-validated cryptographic module from OpenSSL. Figure 6: The mvpn client on Android Columbitech Mobile VPN SecureBrowser on ios The mvpn client for ios is a little bit different from the other platforms. It is built-in to a Web browser which means that all HTTP/HTTPS requests and responses are tunnelled through the VPN tunnel instead of using its normal ports. The benefit from this is that no additional ports needs to be opened when allowing access to internal web servers. All applications on ios are sandboxed which means that the applications cannot communicate to each other. This mitigates the need for anti-virus as the viruses cannot high-jack other applications. The SecureBrowser does not listen for any incoming data traffic which in turn mitigates the need for a personal firewall. The Columbitech Mobile VPN SecureBrowser for ios supports all functionality of the Columbitech Mobile VPN including DTLS. It uses the FIPS-validated cryptographic module from OpenSSL. 14
15 Figure 7: The SecureBrowser for ios Columbitech Mobile VPN App SDK Both the SecureBrowser and the mvpn client for Android have been built using the App SDK. The App SDK consists of a number of libraries that are very easily integrated into any ios, Android or Windows Modern UI Apps (Windows 8 and Windows phone 8). By integrating the Columbitech Mobile VPN App SDK into an application, the application will be able to use an existing mvpn infrastructure and use all the mvpn functionality. The application will also be using a FIPS-certified cryptographic module. 15
16 Functional Description Security Many wireless network technologies are using various mechanisms to prevent third parties to eavesdrop and tamper with transmitted data. Examples of such mechanisms are frequency hopping and the WEP link layer encryption system. Although those techniques make eavesdropping more complicated, they are not to be seen as secure solutions. With the appropriate equipment and knowledge it is fully possible to listen in on traffic transmitted over e.g. GSM(2G), DECT, W-LAN and Bluetooth. Also, the data is protected only when transmitted over the wireless link. Most wireless network providers are using the Internet to transport data from its backbone to the end customers, thus the data will be transmitted in clear. There is obviously a need for end-to-end secure VPN solutions. Not only is it important to make the data transmissions impossible to eavesdrop on, it is equally important to protect the corporate network from unauthorized access and a good VPN must be able to handle both requirements. Transmitted data is effectively hidden by the use of encryption and the corporate network is protected by enforcing strong user authentication. Columbitech Mobile VPN implements the latest standards and algorithms for securing the transmitted data, the corporate network and the client device, as will be described in the following paragraphs. Columbitech Mobile VPN is FIPS certified and uses the FIPS-certified Cryptograhic module from OpenSLL on Android, IOS and applications created with the App SDK. Securing Traffic To secure the transmitted data, a virtual encrypted tunnel is created between the mvpn Client and the mvpn Server. Columbitech Mobile VPN is using the WTLS [5] or DTLS standard to encrypt, authenticate and validate the transmitted data. WTLS is a wireless implementation of TLS, which is an enhanced version of SSL 3.0. The reason for using WTLS instead of IPSec is mainly that IPSec suffers heavily from sub-optimized performance when applied over wireless, low-bandwidth networks. DTLS (rfc6347) is also a wireless implementation of TLS and uses UDP for its data transfer. The Columbitech Mobile VPN uses DTLS 1.2, which is based on TLS 1.2. The WTLS and DTLS framework defines a set of protocols and algorithms for encryption, signing and hashing; Columbitech Mobile VPN uses DES (56 bit), 3DES (112 bit) and AES (up to 256 bit) for the symmetric encryption of the payload data. RSA (up to bit) is used for asymmetric encryption during the initial handshake, and MD5 (128 bit) or SHA (up to 512 bit) is used for validating the data integrity. Columbitech Mobile VPN can be configured to use a combination of the algorithms mentioned above to achieve a desired level of security. Securing Network Resources To protect the corporate network from unauthorized access, Columbitech Mobile VPN enforces strong authentication mechanisms. User authentication may be performed by the 16
17 mvpn Server inside the corporate network, by the Gatekeeper residing outside the firewall, or by both the mvpn Server and the Gatekeeper. Typically, a corporate security policy might state that no unauthorized data is allowed inside the corporate network. In such a scenario, the Gatekeeper could be configured to enforce client certificate authentication or one-timepassword authentication before the VPN session is handed over to the mvpn Server. The VPN handshake will then be continued by the mvpn Server, possibly asking the user for a Windows NT or RADIUS password, a client certificate, or a one-time-password. Columbitech Mobile VPN has been designed to interoperate with the existing corporate authentication mechanisms. With the Columbitech SSO module, a user will be transparently logged on to the mvpn Server as soon as he or she logs on to the computer. Furthermore, a system administrator does not have to maintain two different sets of user accounts for each user; existing user databases may be used for Mobile VPN authentication. Columbitech Mobile VPN Server and Columbitech Gatekeeper can be configured to utilize any standard RADIUS server, Windows Active Directory server, or RSA ACE server. Columbitech Mobile VPN has full PKI support to ensure for maximum scalability and to provide for reliable authentication of servers and clients. Certificates are easily created, maintained and distributed with the included Wireless PKI Portal and the certificate management application. To further secure the network side, Columbitech Mobile VPN Server includes a firewall to enforce packet filtering and inspection. Enabling strong user authentication in combination with firewall protection at the network edge is the most effective defense against intrusion. In most organizations, access to network resources is based on user and group policies. To enforce group based access control, Columbitech Mobile VPN can be configured to allocate IP addresses that belong to different IP subnets, depending on which user groups the connecting user belongs to. Access can then be controlled by a firewall or policy router. The Enterprise Server can also be configured to allocate different IP addresses depending on if the user connects directly to the Enterprise Server or via a Columbitech Gatekeeper. This allows the system administrator to set up different access policies depending on whether the user connects remotely or directly from the office. Securing Clients Employees often bring their laptops home and connect them to the Internet through their home broadband connections. As soon as the computer is connected to the Internet it is exposed to attacks. The corporate firewall is no longer there to protect the computer from viruses, trojan horses and other exploits. Later, when the computer connects to the internal network, the malicious code could easily spread to the whole network and cause substantial damage. Columbitech Mobile VPN Client on Windows ensures that all data is processed by the virtual VPN interface. The mvpn Client software protects every network interface on the computer, including dial-up connections, by applying IP filters that only accept properly encrypted data that has been sent through the VPN tunnel. This functionality is part of Columbitechs personal firewall and the main goal is to protect the computer from malicious attacks when exposed to public networks as well as to prevent client applications from bypassing the VPN connection. Managing devices is perhaps one of the biggest challenges with a mobile workforce. It is important that the mobile devices run the latest security patches and other appropriate security software, as specified by the corporate IT policy. To make sure that the connecting device does not compose a security threat, Columbitech Mobile VPN contains built-in Network Admission Control (NAC). This means that the client can check the integrity of the client computer before allowing it to connect to the corporate network. When the Mobile VPN Client requests a connection, the Columbitech Mobile VPN Server sends an encrypted script, or program, that executes on the client computer. The script can verify that security patches, anti 17
18 virus programs, personal firewalls and other security software are running and up-to-date. Depending on the return value of the script, the client is accepted by the server, rejected by the server, or as a third option, placed in quarantine. When placed in quarantine, the client gets limited access to the network, just enough to download e.g. virus definition updates or OS patches. Securing the client when using the Mobile VPN Client on ios and Android the challenges are a bit different. On ios the need for anti-virus and a personal firewall is mitigated due to the architecture of ios. In ios every application runs in its own space and cannot communicate with other applications in the OS. This technology is called sandboxing. The need for a personal firewall is further decreased due to the fact that the Mobile VPN client on ios does not listen on any incoming ports. On Android the applications are not sandboxed. This means that you will probably need antivirus and some kind of firewalling. On both ios and Android the NAC functionality described above will further strengthen the security of the smart phone devices. Having the security policies checked every time a device connects ensures that the security of the devices does not degrade over time. Wireless PKI In order to establish an encrypted WTLS/DTLS tunnel, a shared secret key must be agreed upon by both communicating peers. To exchange the secret key, asymmetric encryption is used. In asymmetric encryption, each party has a key pair consisting of one public key and one private key. The public key is publicly available to anyone, while the private key remains private. A message encrypted with the public key can only be decrypted using the private key (and not using the key that encrypted the message, as is the case in symmetric cryptography). Asymmetric encryption is extremely processor heavy and thus not feasible for encrypting large amounts of data. Instead, symmetric encryption is used for the actual data transfer and asymmetrical encryption is only used to exchange the shared secret key used for the session. Public Key Infrastructure (PKI) is the infrastructure for managing a trusted matching between public keys and their owners. One of the fundamental components of PKI is the digital certificate. A digital certificate has many similarities with a passport. It contains information about its owner, or subject, and about the entity that issued it. The public key of the subject is also included, as well as a digital signature that proves the authenticity of the certificate. To handle certificates, Columbitech Mobile VPN includes a Certificate Manager with which a system administrator can create and manage digital certificates, i.e. it lets you operate a simple certificate authority. A wireless PKI portal included in Columbitech Mobile VPN Server allows easy certificate management in large installations. The PKI portal connects to the Windows user account database and automatically creates and distributes client certificates for all users in the corporate domain. Columbitech Mobile VPN is fully x.509 compliant, any public certificate authority can be used to create and manage certificates for the Columbitech Mobile VPN architecture. Convenience Automatic Session Resume Intermittent connectivity is unfortunately a characteristic closely related to wireless communication. Connections go up and down due to bad radio coverage, shortage of radio resources or due to interference. One of the design goals for the WTLS and the DTLS standard was to address these issues by implementing mechanisms for fast session re-establishment after a network failure. The result, called Session Resume, allows for a very fast VPN reconnection 18
19 without any user interaction. The user does not have to go through any extra logon or authentication procedures. As soon as the radio link is re-established, the client and the server are authenticated and the WTLS/DTLS session is resumed from where it was suspended. This technique of resuming an old session is sometimes referred to as a lightweight handshake. It is done in a background process very efficiently. The Session Resume functionality in Columbitech Mobile VPN also allows for a seamless and automatic activation of the VPN session when a device resumes from hibernation. This is a very important feature, especially when using mobile devices with limited battery power. If the device cannot enter hibernation, the battery power on a standard MOBILE DEVICE will not last longer than a couple of hours. With standard VPN solutions, resuming from hibernation often means that the VPN Session has to be re-established and the user has to log on again to the VPN server. Data Transaction Recovery Even though the secure session is re-established automatically, (this may also include automatic dial up of a dial-up connection), it is very frustrating to lose a network connection, especially if data was being transferred. In order to make life easy for the mobile user, Columbitech Mobile VPN implements a function called Transaction Recovery. Transaction Recovery allows a data transfer to pick up from where it was interrupted. The user does not have to restart the transfer, nor the application. All applications will survive a lost connection and all interrupted data transfers will automatically continue from where they were interrupted, as soon as data can be transferred again. Retransmission mechanisms at the session layer make sure that lost data segments get retransmitted before the data transfer resumes. In the eyes of an application, this short re-establishment period will just be viewed as a period of lower-thanusual bandwidth. Seamless Network Roaming Seamless network roaming is a delicate task and a great technical challenge. With seamless network roaming we mean the general concept of moving between different networks, possibly of different types, without loosing any open connections. Columbitech Mobile VPN uses the session resume functionality implemented in WTLS and DTLS to create a seamless, alwaysconnected experience for the mobile user. During network roaming, the secure session is instantly resumed over the new network and the flow control and transaction resume mechanisms guarantee that no data is lost in the process. The seamless network roaming functionality is totally transparent to the application layer, i.e., the applications believe they are still using the same connection. Since the roaming functionality is implemented at the session level, the client applications are not dependent on TCP for retransmissions and flow control during the handover. This is particularly important when roaming from a fast network, e.g. 3G/4G, wireless LAN or LAN, to a slow network, e.g. GPRS, GSM or CDPD, since TCP will most likely fail to adapt to the drastic change of bandwidth and delay. Single Sign-On The Mobile VPN logon can be made transparent to the user. By integrating the VPN logon into the standard Windows domain logon, the Mobile VPN user gets transparently logged on to the mvpn Server when he or she logs on to the computer. Standard Windows clients are supported as well as Novell Netware clients. Internet service providers and wireless hotspot providers often require the user to logon before gaining Internet access. The most common way to authenticate a user is to redirect the user s Internet browser to the ISP's authentication server. The users must then enter a username and password before they can be allowed to enter external networks. By defining a network access 19
20 policy in the Mobile VPN Client, the hotspot login can be performed entirely in the background by the mvpn Client, without any user interaction. A user is thus able to logon to the access network, the mvpn Server, and the corporate Windows domain with one single login. Performance Since radio frequencies are a limited natural resource, wireless capacity will always be limited. Therefore, wireless networks will always be significantly slower than wired networks. This motivates the efforts for implementing wireless optimizations. Adaptive Data Compression Compression is probably the most widely used optimization technique for data reduction. A characteristic that all types of compression algorithms have in common is that they take advantage of recurring structures or patterns in the data in order to compress it. In contrast, good encryption is designed to distort and remove patterns. Therefore, if both compression and encryption is applied to a data stream, it is vital to compress the data before encrypting it, in order for the compression to be efficient. Columbitech Mobile VPN implements data compression at the session layer, before the data is encrypted. This way, the compression algorithm may be applied on large blocks of data, ensuring very high compression ratios. IP level compression on the other hand is applied on individual IP datagrams. Therefore, the compression algorithm cannot exploit recurrences in the data flow, since the datagrams are compressed separately. When using thin clients, such as handheld devices, over fast networks such as wireless LAN or fixed networks, the device s memory and CPU load may be the critical bottleneck, not the bandwidth. Therefore, compression is applied on a per connection basis. When roaming between fast and slow bearers, the Mobile VPN Client can be configured to dynamically switch the compression on and off, according to the current user profile. Adaptive Encryption (Trusted Zones) Trusted Zone is the term used for any network where the client can access the mvpn Server directly without going through a Gatekeeper. This is typically the local wired network. It is possible to configure the mvpn Server to allow clients to bypass the VPN if connecting from a Trusted Zone to further increase performance. The user is still subject to full authentication and the client computer will be subject to integrity check prior to bypassing the VPN. The VPN client is still running to detect change of network, from a trusted to a non-trusted network. Transmission Protocol Optimization Other schemes for data reduction are also applied; Optimizations at the transport level, such as TCP connection multiplexing, prevent flooding the wireless link with redundant TCP retransmissions during handover. In short, the available bandwidth will be used to transport actual user data instead of redundant TCP retransmissions. If the entire link capacity is utilized for retransmissions, TCP will eventually break down due to lack of new user data on the link. However, if all data were multiplexed over one TCP Session, there would be plenty of room for new data to reach the receiver and the applications would be more likely to survive a bad connection. When communicating over networks with large delays, such as most cellular wireless networks, the standard TCP flow control mechanism leads to poor link utilization. A TCP sender will not be able to fully utilize the available link bandwidth. This is caused by a combination of a large delay-bandwidth product and a badly configured TCP transmission window size. The standard setting of the TCP buffers causes the TCP connection to stall because it takes to long for the receiver s acknowledgments to return to the sender. A TCP 20
21 sender is dependent on the returning acknowledgments as well as on the size of the sending window for increasing its sending rate. A small sending window and a long acknowledgment delay will undoubtedly prevent the connection from reaching the maximum link speed. To prevent this from happening, the Columbitech Mobile VPN Client continuously monitors the current round-trip time in order to dynamically configure the TCP buffers for optimal transmission performance. Data Encapsulation Columbitech Mobile VPN Client software uses OS routing mechanisms for capturing, encrypting and forwarding traffic. By creating a virtual network interface card (NIC) and forcing all application data to be routed through it, the VPN client is able to encrypt all outgoing traffic without requiring any changes to existing applications. The virtual NIC intercepts the data and sends it to the VPN client software for processing. After compression, encryption and address translation, the data is sent to the currently used physical interface. By using address translation mechanisms rather than standard tunnelling, Columbitech Mobile VPN is able to reduce the data overhead to less than 10%, as compared to over 25% for standard IPSec. Session based data compression and transport optimization reduces the overhead to a minimum. IP TCP WTLS mvpn Compressed data Figure 8: Data transport in Columbitech Mobile VPN The local termination of connection-oriented traffic makes the client resistant against temporary loss of network connections. Even though the real network connection may go up and down, the virtual NIC is always enabled and is always accepting traffic. The effect of the virtual NIC being constantly enabled is that if a network connection goes down, the locally terminated application connections will not be affected and the applications will still believe that they are online. A network failure immediately triggers the VPN client software to start reconnecting to the VPN server. The client software starts scanning for available networks and connects through the best available network, according to a defined user profile. When the client succeeds to connect to the VPN server, the WTLS/DTLS session is instantly resumed and all data transfers are synchronized and continued. Application Sockets API Session Layer Transport Layer Session mobility & WTLS TCP/UDP Network Layer IP W-LAN LAN 3G/4G Virtual NIC Figure 9: The mobile VPN client protocol stack When a VPN client connects to the corporate network, the mvpn Server allocates an IP address from the corporate domain to the virtual VPN interface. The mvpn Server allocates the IP address by making a DHCP request to an existing DHCP server on behalf of the client. If 21
22 there is no DHCP server on the network, the mvpn Server may be configured to allocate IP addresses from a specified IP address range. In practice this means that each VPN client actually has two IP addresses; one on the physical interface, allocated from the access network provider and one on the virtual interface, allocated by the corporate domain. The IP address on the physical interface will change when the client moves between different networks. The IP address on the virtual NIC will however remain constant during the whole session. The fact that the client keeps the same IP address on the virtual interface enables seamless roaming with continuation of services. All applications and communicating peers use the corporate IP address on the virtual interface when communicating with the client. The IP address on the physical interface is hidden from the applications and is only used for transporting the data between the client and the VPN server. Inside the corporate network, the mvpn Server translates all incoming and outgoing traffic to hide the physical interface s IP address from the applications. A connection between a VPN client and a server application is terminated locally inside the Mobile VPN client. In order to establish the connection all the way to the application server, the client requests the mvpn Server to establish a connection on its behalf. Once the connection has been properly established, the client and the server may start forwarding traffic between each other. The client application as well as the server application is totally unaware of the mvpn Server, they believe that they are connected directly to each other. A server application connects to a remote VPN client exactly the same way as if the client had actually been physically connected to the corporate network. The connection request is intercepted by the VPN Server and forwarded to the VPN client through the WTLS tunnel. If the client has an active application listening on the specified port, a connect message is reported back to the mvpn Server and the mvpn Server accepts the connection to the application server and data can be sent to the client. However, if the client was not listening on the specific port, the VPN client software sends a reject message to the mvpn Server, which in turn sends the appropriate ICMP message to the connecting application. Connectionless data is handled the same way; a UDP datagram sent from a corresponding node is intercepted, encrypted and re-encapsulated by the mvpn Server for further transport to the client. The use of split TCP connections adds robustness and flexibility to the system. If the TCP connection between the client and the mvpn Server would break down for any reason, the application connections will be maintained and the communication may continue as soon as a new physical connection is established. The split TCP connection approach also allows for further optimization of the communication between the VPN client and the mvpn Server, since the applications are actually unaware of this connection. TCP may be re-implemented or replaced by another protocol that is optimized for wireless communication. Applications TCP/UDP TCP/UDP TCP VPN Client VPN server App. server 22
23 Figure 10: Data transport overview. The application connections are terminated locally on the client and the data is tunneled to the mvpn Server over one single TCP connection. The mvpn Server performs address translation and forwards the data to the destination. However, since the TCP end-to-end semantic is violated, it is vital that the architecture implements mechanisms for end-to-end flow control and retransmission. To prevent data loss in case the connection between the VPN client and the mvpn Server would fail, the Columbitech architecture uses standard TCP mechanisms to stop the sending application from transmitting more data. In case of network failure, the mvpn Server will immediately send a TCP control message to the sender, stating that the mvpn Server has no more receiving buffers available. When the connection to the VPN client is re-established, the mvpn Server commands the TCP sender to continue transmitting. This approach is to be preferred before a solution where the VPN server buffers data in memory. Eventually the server will run out of memory and start dropping packets. The former of these two TCP flow control mechanisms is implemented in both the mvpn Server, the Gatekeeper and in the Mobile VPN client. To avoid loosing packets that were being transmitted when the connection broke down, the mvpn Server stores the few last transmitted packets for each client connection. When the VPN client reconnects, the mvpn Server and the VPN client synchronize their data flows and if any packets were lost in transit, they are retransmitted. Scalability Columbitech Mobile VPN includes support for server load balancing and fail over. Expensive third-party solutions are thus not required to provide server redundancy. By using Columbitech Gatekeeper, several mvpn Servers can be clustered into one mvpn Server group, as depicted in Figure 11. When a user connects to the corporate network, the Mobile VPN Client will establish a connection to the Gatekeeper. After initial user authentication, the Gatekeeper will hand over the client to one of the mvpn Servers belonging to the server group specified by the client. It is possible to cluster as many as 255 mvpn Servers in one server group and one Gatekeeper can handle a large number of server groups. A large enterprise with different branch offices or departments in separate administrative domains may deploy a Columbitech Gatekeeper in the corporate DMZ to centrally manage the remote access. When a client connects to the Gatekeeper, the Mobile VPN session will be handed over to one of the mvpn Servers belonging to the accessing user s administrative domain. Enterprise Server group Gatekeeper Accounting Corp. DMZ Enterprise Server group Manufacturing Figure 11: Example of mvpn Server clustering 23
24 If one mvpn Server within the server group were to fail, only the users connected to that particular server would be disconnected. In this case, the Mobile VPN Client will prompt the user to log in again and the Gatekeeper will now allocate another mvpn Server from the client s server group. A server failure will thus only cause a limited and temporary disruption of the Mobile VPN service. The server group functionality allows for seamless system up-scaling; mvpn Servers and server groups may be added without any interruption of the service. New mvpn Servers will automatically connect to a Gatekeeper and send information about the server group they belong to. The mvpn Server also sends information to the Gatekeeper regarding its processing capabilities to ensure for efficient load balancing 24
25 Technical Data Authentication Mechanisms Columbitech Mobile VPN solution can be configured to use one or more of the following authentication methods: Windows AD username/password Radius (username/password or challenge/response) X.509 certificates WTLS certificates RSA SecurID Smartcard Biometrics Google * Some authentication mechanisms are not supported by the embedded client. Encryption Algorithms Columbitech follows the WTLS and DTLS standard and supports the following algorithms: Encryption: DES (56 bit) Triple DES (112 bit) AES (up to 256 bit) Key exchange: RSA ( bit) Hashing and signing: MD5 ( bit) SHA-1 ( bit) Software Requirements Columbitech Mobile VPN Client Windows 2000 professional + SP4 Windows XP Windows Vista Windows 7 Windows 8 Pocket PC 2002 Windows Mobile 2003, Mobile 5, Mobile 6, Mobile 6.1, Mobile 6.5 Windows CE 3.0* Windows.Net* Windows CE 5.0/6.0 25
26 App SDK support for building apps with built-in mvpn functionality for Android, ios and Windows Modern UI apps. Android supported for Android 4.0 (Ice Cream Sandwich) ios implemented as a Web browser with a built-in mvpn client. Columbitech Mobile VPN Server Windows 2000 Professional + SP4 Windows 2000 Server + SP4 Windows 2003 Server Windows 2008 Server Windows 2012 Server Wireless Switch (customized installations) Linux (different distributions) Columbitech Gatekeeper Windows 2000 Professional + SP4 Windows 2000 Server + SP4 Windows 2003 Server Windows 2008 Server Windows 2012 Server * Special restrictions apply. Contact Columbitech for more information Hardware Requirements Columbitech Mobile VPN Client for Windows CPU Any CPU capable of running Windows 2000/XP/Vista/7/8 Memory 128 MB required Columbitech Mobile VPN Client for Windows Mobile CPU StrongARM Columbitech Mobile VPN Server for Windows and Columbitech Gatekeeper CPU Any CPU capable of running Windows 2000/2003/2008/2012 Memory 256 MB required, 512 MB recommended 26
27 Conclusions Columbitech Mobile VPN has been created with the mobile user in mind. By enabling secure data access over any wireless IP network, Columbitech s Mobile VPN solution brings remote access to a new level. With inherent support for seamless roaming between different networks and subnets, the mobile user gets the final say about when to disconnect. If networks go down or become unavailable, the software will automatically and smoothly re-establish live connections, without any need for cumbersome login procedures. In this white paper we have argued that wireless communication is so vastly different from wireline communication that VPN solutions built on wireline technology will fail to provide a seamless end user experience when used in a wireless environment. This we believe is mainly due to: Lack of mobility the traditional VPNs does not have the capability to survive the challenges of mobility. Battery preservation, coverage gaps and broad device support must be addressed in a mobility solution. Lack of performance - due to extensive protocol and processing overhead introduced by IPSec Lack of robustness - IPSec does not cope well with low-bandwidth, large-delay networks. Although some instability issues are not directly related to IPSec protocols, they make no effort to protect the user from these shortcomings. Columbitech Mobile VPN is developed especially for mobile devices and wireless networks. Large effort has been made to reduce the processing and data transport overhead to a minimum as well as to create a robust communications platform on which any wireless-unaware application can operate. By only using standards and protocols developed and optimized for wireless communication, Columbitech has been able to provide a VPN architecture with exceptional robustness, end user experience and the flexibility of building mvpn apps, still maintaining the highest possible level of security. Columbitech Mobile VPN is a trademark of Columbitech AB. All other trademarks are trademarks of respective owners. Patents are pending. 27
28 References [1] Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W. and G. Zorn, "Point-to-Point Tunneling Protocol (PPTP)", RFC 2637, July [2] Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G. and B. Palter, "Layer Two Tunneling Protocol "L2TP"", RFC 2661, August [3] Kent, S., and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, November [4] Perkins, C., IP Mobility Support, RFC 2002, October [5] Wireless Application Protocol Wireless Transport Layer Security Specification, February ( 28
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Secure remote access to your applications and data. Secure Application Access
Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Endpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security
Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
Remote Access VPN Solutions
Remote Access VPN Solutions P/N 500187 June 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 3 Remote Access VPN Defined Page 3 Business Case Page 4 Key Requirements Page
Remote Connectivity for mysap.com Solutions over the Internet Technical Specification
Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable
Firewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway
TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
