VPN Decision Guide. IPSec or SSL VPN Decision Criteria. Roslyn Rissler Director Product Marketing. Sarah Sorensen Product Marketing Manager



Similar documents
Juniper Networks VPN Decision Guide

Juniper Networks VPN Decision Guide

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

VPN. Date: 4/15/2004 By: Heena Patel

Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Virus Protection Across The Enterprise

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

COORDINATED THREAT CONTROL

SSL VPN vs. IPSec VPN

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

SSL VPN Technology White Paper

PRODUCT CATEGORY BROCHURE

SSL VPN Technical Primer

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Technical papers Virtual private networks

Building Trusted VPNs with Multi-VRF

VPN Technologies: Definitions and Requirements

NetScreen-5GT Announcement Frequently Asked Questions (FAQ)

How To Configure SSL VPN in Cyberoam

Best Practices for Secure Remote Access. Aventail Technical White Paper

IPSec vs. SSL: Why Choose?

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Integrated Services Router with the "AIM-VPN/SSL" Module

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Application Note <Publication Number> June VPN setup for the XV100

Virtual Private Networks Secured Connectivity for the Distributed Organization

Cisco Which VPN Solution is Right for You?

END-TO-END SECURITY WITH SA SERIES SSL VPN APPLIANCES

Secure Network Design: Designing a DMZ & VPN

White Paper: Managing Security on Mobile Phones

Reasons Enterprises. Prefer Juniper Wireless

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Virtual Private Networks: IPSec vs. SSL

Integrated Services Router with the "AIM-VPN/SSL" Module

Demonstrating the high performance and feature richness of the compact MX Series

Case Study for Layer 3 Authentication and Encryption

ProCurve Secure Access 700wl Series Wireless Data Privacy Technical Brief

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Intranet Security Solution

Configuring IPsec VPN with a FortiGate and a Cisco ASA

REPLACING THE SSL CERTIFICATE

ReadyNAS Remote White Paper. NETGEAR May 2010

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Integrating F5 Application Delivery Solutions with VMware View 4.5

Juniper Networks Solution Portfolio for Public Sector Network Security

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Site to Site Virtual Private Networks (VPNs):

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

SA Series SSL VPN Virtual Appliances

Building Remote Access VPNs

ISG50 Application Note Version 1.0 June, 2011

Novell Access Manager SSL Virtual Private Network

RSA Solution Brief. RSA & Juniper Networks Securing Remote Access with SSL VPNs and Strong Authentication. RSA Solution Brief

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Cornerstones of Security

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

SSL VPN Evaluation Guide. Criteria for Choosing the Right SSL VPN

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

SECURING TODAY S MOBILE WORKFORCE

End User Devices Security Guidance: Apple ios 8

GoToMyPC Corporate Advanced Firewall Support Features

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

November Defining the Value of MPLS VPNs

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

The term Virtual Private Networks comes with a simple three-letter acronym VPN

SSL VPN Client Installation Guide Version 9

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

SSL-Based Remote-Access VPN Solution

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

WHITEPAPER IPSEC VPN Vs. SSL VPN

Network Design Best Practices for Deploying WLAN Switches

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Application Note AP050001EN June VPN setup for the XV100

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Comparing Mobile VPN Technologies WHITE PAPER

DrayTek Vigor High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Ensuring the security of your mobile business intelligence

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Transcription:

White Paper VPN Decision Guide IPSec or SSL VPN Decision Criteria Roslyn Rissler Director Product Marketing Sarah Sorensen Product Marketing Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Part Number: 350037-001 Apr 2004

Contents Contents...2 The Secure Access Landscape...3 Network Layer VPNs...3 What Is An SSL VPN?...4 IPSec or SSL VPN?...5 Total Cost of Ownership...6 Security...7 Access to Network...7 Application Access...7 Access Management...8 Conclusions...8 Checklist Decision Criterion SSL Vs IPSec...9 IT environment:...9 User constituency:...9 Client-side network and device:...9 Applications and content:...10 Copyright 2004, Juniper Networks, Inc.

The Secure Access Landscape Providing secure access to corporate resources has grown into a critical requirement for the enterprise, often making the difference between those companies that are successful and those that are not. Whether the user is working in a remote office or their hotel room, they need easy access to corporate resources to accomplish their job and maintain their productivity. In addition, corporate business partners and customer increasingly need realtime access to corporate resources and applications. In the early 1990 s, there were only limited options to extend the availability of the enterprise s network beyond the boundaries of the corporate central site, comprised mainly of extremely costly and inflexible private networks and leased lines. As the Internet grew, however, it spawned the concept of virtual private networks, or VPNs, as an alternative. Most of these solutions leveraged the free/public long-haul IP transport service and the proven IPSec protocol to provide a more flexible, cost-effective solution for secure access. VPNs effectively addressed the requirements for fixed, site-to-site network connectivity; however, for mobile users, they were, in many ways, still too costly, while for business partners or customers, they were impossible to deploy. It is in this environment that SSL VPNs were introduced, providing remote/mobile users, business partners and customers the easy, secure access to corporate resources they needed. Together, IPSec and SSL VPNs enable enterprises to provide their offices and users secure, ubiquitous availability to the corporate network to support the overall success of the business. This paper will look at how IPSec and SSL VPNs differ, and will examine the criteria to be considered in deciding which technology best fits each business need. Network Layer IPSec VPNs IPSec or network-layer VPNs can offer enterprises an easy, cost-effective way to route communications between sites, delivering high performance connectivity and resiliency to match the needs of the most demanding network environments. They were created as a low-cost transport alternative to private or leased lines enabling enterprises to use the Internet infrastructure to quickly extend the private network across geographically distributed locations. Technically, network-layer VPNs address the challenge of how to use the Internet (which uses the IP protocol only, and usually transmits text in the clear) as a transport for sensitive, multi-protocol traffic. Network-layer VPNs provide a combination of encryption and tunneling functions to meet these challenges. They use peer negotiation protocols, like IPSec, to encapsulate the data being transferred within an IP wrapper that will go over the Internet. This encapsulated data is received by the network-layer VPN gateway, unwrapped, decrypted, and routed to the recipient. Traffic coming from the VPN gateway is handled as if it came from any user within the LAN itself. As a result, networklayer VPNs provide users the same, continuous access to the network that they would have if they were physically connected. This is ideal for facilitating regular communications and resource sharing among users at geographically separate offices to improve productivity Copyright 2004, Juniper Networks, Inc. 3

enterprise-wide. In certain instances, however, this level of access may be unnecessary. For example, mobile users that just need to check e-mail or retrieve certain documents from the Intranet don t need a dedicated pipeline to all the resources on the network. In addition, this level of access could introduce security risks if the end-point that the user is coming from is insecure or easily compromised. While it is possible to secure a PC that is actually within the LAN, such precautions are difficult and expensive to implement for remote PCs on unmanaged networks. As a result, connections that are not coming from a dedicated access point under the control of the organization should probably be limited in terms of the resources available to them and the permanence of the connection, to mitigate any security vulnerabilities. For example, remote users coming from an untrusted network to connect to an application or resource need a simple, cost-effective method to get to it, but should be restricted to just that application and resource, not granted access to the corporate LAN as a whole. Likewise business partners may be allowed access to certain resources from an unmanaged device, but should not be granted LAN-wide connectivity. Another factor to consider with IPSec VPNs is the level of management resources available for deployment and maintenance. All remote or mobile users not at an aggregation point must have client software on their remote PC. For organizations trying to provide remote access to hundreds or thousands of mobile users, deploying, updating and managing all of these clients can be very time consuming and costly. If remote partners or customers are considered, the difficulties are multiplied. While a necessary and appropriate investment for regional, branch and remote offices, where the enterprise needs reliable, highlyavailable connectivity and only has to manage a few network VPN devices, IPSec clients are, in many ways, an impractical investment to meet the needs of mobile/remote workers, business partners or customers. For example, because VPN client software is required to connect remote users, those users are restricted to devices where the software is installed; i.e., corporate laptops. This does not accommodate additional methods of access, such as Internet kiosks, PDA s, etc., that are often more convenient for the mobile user, nor does it include devices that the business partner or customer might use from within their own network. It is into this environment that SSL VPNs entered, providing a easy-to-use solution for the mobile user, business partner, or customer that compliments the reliable, powerful communication infrastructure that IPSec VPNs offer for site-to-site connections. What Is An SSL VPN? The term SSL VPN is used to refer to a new and fast-growing product category comprised of a variety of technologies. To broadly define what products and technologies are within this category, one can begin with the term VPN itself. VPN, or Virtual Private Network, refers to the practice of using a public network like the Internet to transmit private data. Up until 2001, most in IT did not add a descriptor to VPN because almost all VPNs available at that time used some type of network-layer transport. The early standard in the VPN space was the IP Security Protocol (IPSec), although some vendors use other methods, including Layer 2 Tunneling Protocol (L2TP), and Point-to-Point Tunneling Protocol (PPTP). 4 Copyright 2004, Juniper Networks, Inc.

SSL VPNs use a different methodology to transport private data across the public Internet. Instead of relying upon the end user to have a configured client on a company laptop, SSL VPNs use SSL /HTTPS which is available without additional software deployment on all standard Web browsers, as a secure transport mechanism. Using an SSL VPN, the connection between the mobile user and the internal resource happens via a Web connection at the application-layer, as opposed to IPSec VPNs open tunnel at the network-layer. The use of SSL is ideal for the mobile user because: SSL does not need to be downloaded onto the device being used to access corporate resources. SSL does not need to be configured by the end user. SSL is available wherever there is a standard Web browser, so users don t need a company laptop. SSL is familiar to most users, even those without a technical background. It is already installed on any Internet-enabled device that uses a standard Web browser, and no configuration is necessary. SSL operates at the application-layer, independent of any operating system, so changes to the OS do not require an update in the SSL implementation. And because SSL VPNs operate at the application-layer, it is possible to offer extremely granular access controls-to applications, making it ideal for mobile workers and those users coming from an insecure end-point. IPSec or SSL VPN? Many users are struggling to decide which technology should be deployed where. Where do IPSec and SSL VPNs fit into your network security policies, and which problems can each technology best address? What does it really take to deploy and administer an IPSec and SSL VPN? This confusion is not mitigated by the fact that most debates over IPSec and SSL have largely focused on the technical details of the protocols and not on what should be the most significant deciding factor between these methods the usage scenarios themselves. The fact is that IPSec and SSL are not mutually exclusive technologies. They can and in fact, often are deployed in the same enterprise. The deciding factor between them lies not in what each protocol can do, but in what each deployment is designed to accomplish. When one considers the cost/benefit of each type of deployment, as well as what problems each technology was designed to address, the deployment choices become clearer. For more information on IPSec VPNs Please refer to Juniper Networks White Paper Dynamic VPNs Achieving Scalable, Secure Site-to- Site Connectivity: How to replace WAN connections with a more reliable communication infrastructure, and Application Note How Different Approaches to Siteto-Site VPNs Affect Scalability and Connectivity. Copyright 2004, Juniper Networks, Inc. 5

Administrators that need to achieve high performance, redundant site-to-site connectivity will be well served by IPSec VPN offerings. They were created to meet the challenge of how to securely provide employees around the world with always on connectivity that will enable them to access the corporate resources they need to achieve optimal productivity. For years, IPSec VPNs have been delivering the resilient, reliable connectivity that is imperative for ongoing communications between coworkers at different offices. IPSec VPNs provide users at geographically distributed locations an experience akin to that which they would receive if they were logging in at the corporate headquarters, allowing them to easily access all network resources that they would be able to access if they actually were on the LAN. Administrators that need to allow mobile employees and other users that are not coming from trusted end points (under the control of the organization) access to certain corporate resources will be well served by SSL VPNs. They are designed to address the needs of remote/mobile employees, as well as partners or customers that need secure access to administrator-specified corporate resources from anywhere. SSL VPNs allow administrators to implement very granular access control, designating to the URL, file or server level the applications that users can access. This functionality mitigates the risks that access to corporate Leading analysts predict that SSL will become the dominate access method for remote and mobile employees within the next few years. resources from an unprotected endpoint, untrusted network, or unauthorized user could introduce. As a result, SSL VPNs offer users the convenience of being able to access corporate resources using any Web-enabled device from anywhere. Type of Application Type of PC Remote Network Security Remote Office/Branch Office Mobile Employee Partner/Customer Extranet Corporate Corporate or Non- Corporate Non- Corporate Managed, Trusted Unmanaged, Untrusted Unmanaged, Untrusted Type of Connection Fixed Mobile Mobile Type of VPN IPSec SSL VPN SSL VPN Total Cost of Ownership Total cost of ownership is a vital consideration when deciding which VPN technology to deploy. Once again, it is essential to look at the deployment, not at the technology, to make this decision. If the need is for site-to-site connectivity, such as seen in a remote or branch office, IPSec VPNs are the logical and most cost-effective choice. Users in these situations will get the on-the-lan experience that they require, without having to administer individual clients. If the need is for connectivity for remote/mobile users, business partners or customers, however, where the devices and networks from which access is desired will change, SSL VPNs are the most cost-effective choice. Administrators can leverage their existing investment in authentication stores, create granular role-/resource-based policies 6 Copyright 2004, Juniper Networks, Inc.

and deploy access to large diverse user populations in just hours, without having to deploy, configure, or manage individual software clients. Security Comparisons between IPSec and SSL often lead to a Which protocol is more secure? debate. In reality, these debates have little relevance to the choice between SSL and IPSec for remote access and site-to-site VPNs. These protocols achieve similar goals; they provide for secure key exchange and provide strong data protection during transport. Despite significant differences in the protocols, IPSec and SSL are actually quite similar at a high level. Both technologies effectively secure network traffic, and each has associated trade-offs, which make them appropriate for different applications. Though the protocol IPSec VPNs protect IP packets exchanged between remote networks or hosts and an IPSec gateway located at the edge of your private network. SSL VPN products protect application streams from remote users to an SSL gateway. In other words, IPSec connects hosts to entire private networks, while SSL VPNs connect users to services and applications inside those networks. implementations differ greatly the two systems share many similarities, including strong encryption and authentication, and protocol session keys that are specified in a conceptually similar manner. Each protocol offers support for leading encryption, data integrity and authentication technologies:3-des, 128 bit RC4, AES, MD5 or SHA-1. Access to Network IPSec VPNs have been designed to enable a virtual extension of the corporate LAN or VLANs within it. Such access is vital for remote offices, where employees require unfettered access to function effectively. Because users in site-to-site deployments are subject to the same security strictures as are employed on the corporate LAN, including corporate-owned and managed devices and a trusted network topography, this constitutes no greater security risk than the LAN deployment itself. These security strictures cannot, however, be effectively extended to mobile users, business partners, or customers, who may wish to access resources from a variety of devices and networks. For their use, an SSL VPN can mitigate access risks in a cost-effective fashion. SSL has, in fact, been criticized because it enables access through such a wide variety of devices, including those with no corporate management, and because it is easy to deploy to a broad range of end users. In practical terms, though, these are not fair criticisms. Many SSL VPN implementations now include methods to enforce endpoint security, as well as means to clean PCs of any information downloaded during a session. Application Access IPSec VPNs can support all IP-based applications--to an IPSec VPN product, all IP packets are the same. This makes them the logical choice for site-to-site deployments, where it would be unacceptable for a resource or application to be limited to the corporate LAN only. Copyright 2004, Juniper Networks, Inc. 7

SSL VPN application services vary, because each vendor/product has its own way of presenting client interfaces through browsers, relaying application streams through the gateway, and integrating with destination servers inside the private network. SSL has been criticized because, in the past, each application had to be Web-enabled, which required development of new functionality and distribution of new software. This problem has been eliminated by most leading SSL VPN vendors, which provide clientless Web access, as well as a client proxy for client/server applications or full network access. As a result, SSL VPNs can be used to secure access to almost all applications by different types of users. Again, if the desired result of the deployment is for all users to have complete network access from managed devices on trusted networks, an IPSec VPNs are ideal, but if the desired result of the deployment is to enable controlled access to specific corporate resources to mobile employees or users coming from uncontrollable endpoints, such as business partners or customers, SSL VPNs are ideal. Access Management Another consideration is access control. While IPSec standards do support packet filterbased selectors, in practice most organizations grant hosts access to entire subnets rather than go through the hassle of creating/modifying the selectors for each IP address change or new application. If you need to give trusted user groups access to private servers and subnets, IPSec VPNs are an excellent choice. On the other hand, if the deployment requires per-user/per-group, or per-resource access control, an SSL VPN is the best choice, because it operates at the application layer, making such controls easy to set up. New access management capabilities can enable dynamic authentication and role-mapping, as well as very flexible and expressive resource-based authorization, enabling adherence to corporate security policies in a very cost-effective way. Conclusions More important than the question of which transport encryption protocol is better is the question: Which security technology best fills the need for a remote access solution? Since IPSec can be used to secure any IP traffic and SSL is focused on application-layer traffic, IPSec is well suited for long-lived connections where broad and persistent, network-layer connections are required. SSL, on the other hand, is well suited for applications where the system needs to connect individuals to applications and resources. 8 Copyright 2004, Juniper Networks, Inc.

Checklist Decision Criterion SSL Vs IPSec IT environment: IPSec VPN SSL VPN Type of connection Fixed connection Transient connection Type of device Managed corporate device Varying devices Type of access Site-to-site Remote employee, business partner, customer Access Controls Enables access management policy enforcement User constituency: IPSec VPN SSL VPN Remote office employees IT staff Mobile employees Day extenders Consultants Customers Business partners Client-side network and device: IPSec VPN SSL VPN Type of device Enterprise owned and managed Unmanaged Type of network Trusted Untrusted Specific use cases Remote or branch office Hotel Internet access; public use terminal (such as kiosks or internet café); customer or business partner s PC; home network Copyright 2004, Juniper Networks, Inc. 9

Applications and content: IPSec VPN SSL VPN Voice Over IP Entire subnets with no application access control required Networks, including intranets and extranets, that require access control Web applications Client/server applications Intranet content Email File Servers Server socket dependent applications Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, Neoteris, Neoteris-Secure Access, Neoteris-Secure Meeting, NetScreen-SA 1000, NetScreen-SA 3000, NetScreen-SA 5000, IVE, GigaScreen, and the NetScreen logo are registered trademarks of Juniper Networks, Inc. NetScreen-5GT, NetScreen-5P, NetScreen-5T, NetScreen-25, NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400, NetScreen-Global PRO, NetScreen-Global PRO Express, NetScreen- Remote Security Client, NetScreen-Remote VPN Client, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, GigaScreen ASIC, GigaScreen-II ASIC, and NetScreen ScreenOS are trademarks of Juniper Networks, Inc. All other trademarks and registered trademarks are the property of their respective companies. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without receiving written permission from: 10 Juniper Networks, Inc. Copyright 2004, Juniper Networks, Inc. 1194 N. Mathilda Ave.Sunnyvale, CA 95014 ATTN: General Counsel