S. No. Type of Information Document Data. Date Version Nature of Change Author. Referred Policies, Procedures & Forms



Similar documents
Integrated Network Operation Centre ( inoc) A-Block, CGO Complex, Lodhi Road, New Delhi. VPN application Form for Bulk Account

Connecting an Android to a FortiGate with SSL VPN

How To Configure SSL VPN in Cyberoam

Understanding VPN Technology Choices

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Using Entrust certificates with VPN

Secure remote access to your applications and data. Secure Application Access

Virtual Private Networks (VPN) Connectivity and Management Policy

Manual for configuring NIC VPN in Windows OS

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Accessing the Media General SSL VPN

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Chapter 7 Managing Users, Authentication, and Certificates

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

vcloud Director User's Guide

Remote Access Procedure. e-governance

Easy and Secure Remote Access with Cisco QuickVPN

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Easy and secure application access from anywhere

The BiGuard SSL VPN Appliances

Implementing Core Cisco ASA Security (SASAC)

Security Considerations for DirectAccess Deployments. Whitepaper

Security Policy Revision Date: 23 April 2009

What is the Barracuda SSL VPN Server Agent?

Endpoint Security VPN for Mac

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Network Security Guidelines. e-governance

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

A Guide to New Features in Propalms OneGate 4.0

Blue Ridge Community College Information Technology Remote Access Policy

Deploying Cisco ASA VPN Solutions Exam.

Does your Citrix or Terminal Server environment have an Achilles heel?

VPN Tracker for Mac OS X

CONTENTS. PCI DSS Compliance Guide

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs

NCP Secure Enterprise Management Next Generation Network Access Technology

Remote Access and Network Security Statement For Apple

A brief on Two-Factor Authentication

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Virtual Private Networks Secured Connectivity for the Distributed Organization

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

Family Datasheet AEP Series A

Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Payment Card Industry Self-Assessment Questionnaire

Manual for Installing CA Root Certificates and User Digital

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Case Study for Layer 3 Authentication and Encryption

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Strong Authentication for Secure VPN Access

DIGIPASS Authentication for Check Point Security Gateways

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

A secure way to monitor your emergency lighting over the internet

VPN L2TP Application. Installation Guide

Next Generation Network Firewall

PCI Requirements Coverage Summary Table

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Corporate and Payment Card Industry (PCI) compliance

DIRECTACCESS FEATURE IN WINDOWS 7

Remote Access via VPN Configuration (May 2011)

Network Security. Intertech Associates, Inc.

CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

MS Managing and Maintaining Windows 8

ICAB5238B Build a highly secure firewall

VPN PPTP Application. Installation Guide

Central Agency for Information Technology

Building Your Complete Remote Access Infrastructure on Windows Server 2012

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Get Success in Passing Your Certification Exam at first attempt!

Technical Brief: Virtualization

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

PortWise Access Management Suite

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS

Course 20688A: Managing and Maintaining Windows 8

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

HOTPin Integration Guide: DirectAccess

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

I d like our employees to be able to access all the files in our network that are important to them anywhere and anytime. Simply and securely.

User Authentication. FortiOS Handbook v3 for FortiOS 4.0 MR3

SSL VPN Client Installation Guide Version 9

Estate Agents Authority

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Cyber Self Assessment

Transcription:

Document Control S. No. Type of Information Document Data 1. Title NIC VPN Policy 2. Code NIC-INOC-VPN-PO-1 3. Date of Release July-10 4. Version No. 1 5. Owner Mr. R S Mani 6. Author(s) Mrs. Change History Date Version Nature of Change Author 1-Sept-2010 1.2 Insertion of point 3.1 1-Jan-2012 2 Major modification 1 Arp-2015 3 Major modification Control of Document Referred Policies, Procedures & Forms Policies Procedures Forms, Templates, Presentation NIC VPN Policy Manual for configuring IPSec VPN client for Windows platform Manual for configuring SSL VPN client Online VPN Registration form for new account, Renewal, change and Project Authorization Form. Cloud Sign up form DCS-Request form NIC VPN Policy Page 1 of 5

Purpose The purpose of this policy is to provide guidelines for connecting internal servers hosted in NIC to minimize potential exposure of unauthorized users. This policy defines the Remote Access policy to access Servers hosted in NICNET from Internet over IPSec or SSL. 1.0 Scope This policy applies to authorized users of NIC intending to access internal servers or applications hosted in NIC for remote administration, Site and database updation or secure access to Intranet applications. This policy applies to VPN connections provided through centralized VPN servers. 2.0 Policy Introduction A virtual private network (VPN) has being traditionally used to connect remote users and branch offices to the corporate office over Internet as an alternative to expensive WAN connections to access sensitive data. VPN creates a virtual tunnel connecting two endpoints by encrypting end to end communication and protecting the data from unauthorized access or interception. Telecommuters and mobile users, who require seamless access to corporate network for regular work, can use IPSec VPN or Client based SSL VPN from any Internet Service Provider and access internal applications, do remote administration, monitoring and management of resources which are otherwise not accessible from Internet. Apart from these Clientless SSL VPN can provide secure access to sensitive applications as email, intranet Web application from Internet. NIC VPN Policy Page 2 of 5

3.1. VPN connection is provided to user online registration available in link http://vpn.nic.in which has to be forwarded by HOD / Project Coordinator. VPN account is also provided for accessing cloud services on Signing up to http://clouds,gov.in. 3.2. VPN connection is provided to user for accessing the servers hosted in NICNET/ NKN for management, updation and monitoring. VPN connection is provided to access Intranet applications hosted in NIC IDCs. 3.3. VPN connection is provided to authorised users from Ministries/Departments/Statutory Bodies/ Autonomous bodies of both Central and State /UT Governments. 3.4. VPN connection is also provided to users from Departments as Banks/ PSUs who have hosted their servers in NIC / NICSI datacenters as paid service. 3.5. The Verification of the users shall be done by the authorised representative from the concerned department. 3.6. NIC coordinator is the authorised NIC employee to coordinate with concerned department/ sector/state/project. 3.7. VPN access will only be provided to servers hosted in NICNET/NKN and behind firewall. 3.8. Authentication of VPN user is primarily through Digital Certificate provided from NIC enterprise CA. 3.9. Authentication can also be done using Digital Certificate issued by CCA registered Sub CAs or NIC LDAP / OTP as per project requirement and the approval of competent authority. 3.10. All forms, procedures and documents related to VPN are available in http://vpn.nic.in. 3.11. NIC will not be responsible of any activities done in the server / site even if the connection is established through remote VPN. The server administrator should take necessary precaution to secure their application/ server. NIC VPN Policy Page 3 of 5

3.5. The Digital certificate and VPN account issued for two years and renewal can be done as per the norms of NICA. The user has to inform NICCA administration if Digital certificate is compromised or corrupted to revoke the digital certificate. 3.6. Revocation of VPN account and Digital certificate : The project coordinator has to inform INOC and NICCA divisions to disable/ suspend the vpn account and revoke the DC when the users leaves the organization before the term. 3.7. Once connected to NIC VPN, all traffic between the user s PC and NIC will be through VPN tunnel and user will have access to the servers listed in the application form. 3.8. In case of Project / specific requirements, simultaneous access to other sites if required can be provide on approval from competent authority. 3.9. Users has to make sure that the client system used for VPN connection is regularly scanned and updated with latest IOS patches and anti-virus software. 3.10. The VPN connection will be automatically disconnect after due to inactivity. The user has to login again. 3.12. The VPN client software will be provided by supplier of the VPN server and would be compatible for standard Operating systems. NIC would provide users with required manuals and procedures for standard deployments and off site support. 3.11. However the user can use their own VPN client software, but it should be compatible with NIC VPN servers. In case user uses proprietary VPN client software, configuration has to be done by them. The VPN client software or appliance used should comply with NIC VPN policy and compatible with NIC VPN Servers. Any customization required for the same shall be done by the user. 3.12 Any change in the Intranet Web Applications/ hostname which are to be accessed through SSL VPN, has to be intimated to the VPN administration. 3.0 Responsibility The user, site/server/ network administrator and NIC project coordinator shall follow the policy. 4.0 Enforcement The policy has to be enforced by VPN administrators, site/server/ network administrator and NIC coordinator. NIC VPN Policy Page 4 of 5

5.0 References http://security.nic.in http:// www.sans.org http://clouds.gov.in NIC VPN Policy Page 5 of 5