The Secure Web Access Solution Includes:



Similar documents
Configuring Security for FTP Traffic

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Introduction to Mobile Access Gateway Installation

How To Configure SSL VPN in Cyberoam

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

MultiSite Manager. Setup Guide

BYOD Guidance: BlackBerry Secure Work Space

MultiSite Manager. Setup Guide

MaaS360 Mobile Enterprise Gateway

Configuring Global Protect SSL VPN with a user-defined port

MaaS360 Mobile Enterprise Gateway

Prerequisites. Creating Profiles

SSL Inspection Step-by-Step Guide. June 6, 2016

Securing Office 365 with MobileIron

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Fortinet Certified Network Security Administrator

Enterprise Security Interests Require SSL with telnet server from outside the LAN

Introduction to the EIS Guide

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Deploying F5 with Microsoft Active Directory Federation Services

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Sophos Mobile Control SaaS startup guide. Product version: 6

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Central Administration User Guide

Introduction to the Mobile Access Gateway

Central Administration QuickStart Guide

Introduction to the Secure Gateway (SEG)

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Secure Web Appliance. SSL Intercept

Sophos UTM. Remote Access via SSL Configuring Remote Client

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

Introduction to the AirWatch Browser Guide

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

MTP. MTP AirWatch Integration Guide. Release 1.0

NetSpective Global Proxy Configuration Guide

WHITE PAPER Citrix Secure Gateway Startup Guide

Configuring Security for SMTP Traffic

Mobile Access Software Blade

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

Deploying the BIG-IP LTM with Microsoft Skype for Business

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Cornerstones of Security

msuite5 & mdesign Installation Prerequisites

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

Implementing Core Cisco ASA Security (SASAC)

Configuring the BIG-IP system for FirePass controllers

Deploying F5 for Microsoft Office Web Apps Server 2013

VMware Identity Manager Connector Installation and Configuration

Installing and Configuring vcloud Connector

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

ReadyNAS Remote White Paper. NETGEAR May 2010

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

EMR Link Server Interface Installation

How To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Secure iphone Access to Corporate Web Applications

NEFSIS DEDICATED SERVER

Deploying F5 to Replace Microsoft TMG or ISA Server

Connecting an Android to a FortiGate with SSL VPN

Zscaler Internet Security Frequently Asked Questions

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

How to Configure a BYOD Environment with the DWS-4026

What is the Barracuda SSL VPN Server Agent?

Virtual Appliance Setup Guide

Sophos Mobile Control Installation guide. Product version: 3

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

Workday Mobile Security FAQ

Polycom. RealPresence Ready Firewall Traversal Tips

The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

Configuration Guide BES12. Version 12.1

DEPLOYMENT GUIDE CONFIGURING THE BIG-IP LTM SYSTEM WITH FIREPASS CONTROLLERS FOR LOAD BALANCING AND SSL OFFLOAD

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

Dell One Identity Cloud Access Manager Installation Guide

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Mobile Device Management Version 8. Last updated:

Owner of the content within this article is Written by Marc Grote

Installing and Configuring vcenter Support Assistant


BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Deployment Guide Microsoft IIS 7.0

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

A Guide to New Features in Propalms OneGate 4.0

Setup Guide Access Manager Appliance 3.2 SP3

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

Configuring Trend Micro Content Security

7.1. Remote Access Connection

Security Technology: Firewalls and VPNs

DEPLOYMENT GUIDE DEPLOYING F5 WITH SAP NETWEAVER AND ENTERPRISE SOA

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Transcription:

F5 - AppDome Partnership F5 and AppDome share a vision that BYOD users should benefit from secure access to enterprise internal portals for increased productivity. With the exponential growth of mobile devices and the adoption of BYOD program, users are more productive and have access to enterprise data at any time and from any device. Although increased productivity is desirable for any organization allowing users to access backend web applications and internal portals poses a significant potential security threat that cannot be overlooked by IT departments that are responsible for data and infrastructure integrity, security and compliance. The joint F5 and AppDome Secure Web Access interoperability benefits enterprise IT Managers, the BYOD and COPE mobile workforce and the enterprise at large with access to a native browser that securely accesses corporate portals. With the interoperability, enterprise IT Managers can conveniently manage policies based on business needs, define blacklist and whitelist sites and gain a two sided security validation that protects data-in-transit and at-rest on the mobile device. Users gain a seamless user experience when accessing the enterprise intranet portal as no VPN or special configuration is required. The Secure Web Access Solution Includes: A truly native user experience with a native browser such as Google Chrome Enhanced productivity Backend access from managed & unmanaged devices Seamless connection to the enterprise with Certificate Base Authentication Complete access control to internal portals and documents Whitelist & blacklist for URLs Extension of enterprise compliance to mobile Enterprise grade encryption for data-at-rest and in-motion

Secure Web Access with AppDome & F5 BIG-IP : How it works The joint solution consolidates AppDome s Secure Web Access to an enterprise internal portal through F5 BIG- IP via a native browser such as Google Chrome, for both Android and ios users. F5 BIG-IP s technology seamlessly delivers secure access to the enterprise via SSL traffic, firewalls, credentials and policy management. With the F5 BIG-IP interoperability, the AppDome Secure Web Access technology provides a bidirectional security inspection that enables mobile corporate data protection and prevents man-in-themiddle attacks, malware and data leakage. With the F5 BIG-IP and AppDome Secure Web Access solution, enterprise users can seamlessly and securely connect to intranet portals and access files, corporate data and enterprise applications such as ERP systems, CRM systems and payment solutions with zero overhead and without compromising IT infrastructure. Users are automatically authenticated upon accessing corporate internal portal resources located behind the F5 BIG-IP via a AppDome issued security certificate. Only AppDome protected applications contain the AppDome certificate and allow enterprise users to view or download enterprise data. Any other applications on the device cannot gain access to the AppDome certificate and are blocked by F5 BIG-IP. The AppDome protected browser is also capable of restricting access to a closed set of URLs so that users can access secured corporate websites only. IT is able to determine access policies based on business needs without blocking devices. This AppDome capability further protects enterprise data by preventing malware from untrusted websites from infiltrating into the corporate network. Prerequisite Hardware and Software Connectivity A basic configuration includes: F5 BIG-IP version 11.3.0 or higher AppDome Solution version 1.7 or higher -Web server/service the organization prefers to enable mobile access (any type supported by F5 BIG-IP). - Android or ios mobile device In order to configure the complete setup, three interfaces connected to F5 BIG-IP are required: Management, Internal Network (LAN), and External Network (DMZ). 2

F5 BIG-IP Configuration 1. You must obtain a license for on your F5 BIG-IP 2. Log in to the F5 BIG-IP web UI console 3. Create VLANs by clicking Network VLANs Create then fill the details below: Create two VLANs: Name VLAN For HOST VLAN For Server External Interface Internal Interface Untagged Interface 1.2 1.3 The external interface associated with the VLAN should be the same interface associated with the web client. The internal interface associated with the VLAN should be connected to the same interface associated with the web server. Set IP addresses on the F5 BIG-IP box. Click Network Self IP Create: Client Interface Server Interface IP Address 192.168.2.1 192.168.3.1 Netmask 255.255.255.0 255.255.255.0 VLAN/Tunnel External Internal 3

Proxy server for F5 BIG-IP In order to allow HTTP traffic from client to server, a proxy is required. Create a Server pool 1. Click Local TrafficàPools 2. Click Create. 3. Give the pool a name, for instance "portal_server_pool", and add a description. 4. Configure health monitoring on F5 BIG-IP and select http. 5. In the Resources list add nodes. Fill in the Address (the server's internal IP) and Port (80 if this is a HTTP server). Finally, click Add. Create a Virtual Server A virtual server is an entity that represents a real web server facing towards the external network. When the Virtual server receives a request it directs it to one of the servers in the pool that is associated with it 1. Click Local TrafficàVirtual Servers 2. Click Create. 3. Give the server a name and a description. 4. Source - this is the subnet of addresses that can access this server, you can specify 0.0.0.0/0 to allow anyone to access it. 5. Destination this is the address on which the server listens, it should be on external network subnet in this case we will specify 192.168.2.100 6. For Service Port specify HTTP (80). This is only for testing; later will be changed to HTTPS (443). 7. Scroll down until you see "Default Pool", select the pool you have defined. 8. Choose "Advanced" under Configuration section and move Source Address Translation to Auto Map. 4

9. Click Finish. 5

SSL Certificate Enforcement SSL Certificate is required in order for the server to certify that only approved clients can pass through the box SSL Configuration 1. Add the certificates and keys to the F5 BIG-IP : 1. Go to SystemàFile ManagementàSSL Certificate ListàImport 2. Import the server's certificate, private key and the CA certificate. 2. Create an SSL profile 1. Go to Local TrafficàSSLà Client. 2. Click Create. 3. Specify a name for the client profile. 4. Check the Custom check box after the Parent Profile line. 5. In the Certificate specify the Server Certificate previously imported. 6. In the Key specify the Server Private Key previously imported. 7. Click Add. 3. Apply the SSL profile to the virtual server: 1. Go to the virtual server you have created (Local TrafficàVirtual Serversàselect your server). 2. Change the Service Port to HTTPS (443) 3. In SSL Profile (client) move the profile you created to the "selected" column. 4. Click Update. Configure SSL Client Authentication 1. Open SSL Profile that was created (Local TrafficàProfilesàSSLàClient) 2. Click Custom on Client Authentication. 3. Change "Client Certificate"àRequired. 4. Change FrequencyàOnce. 5. Change "Certificate Chain Traversal Depth" to 2 (certificate for the client and CA). 6. Change "Trusted Certificate Authorities" to the CA certificate you imported earlier. 7. Click Finish. 6