Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs



Similar documents
Remote Access VPN Solutions

Cert Pro 4/17/01 2:05 AM Page 1 T HE C HECK P OINT. Certified Professional Program SECURE.

Stateful Inspection Technology

How To Set Up Checkpoint Vpn For A Home Office Worker

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

The Seven Key Factors for Internet Security TCO

A Getting Started Guide: What Every Small Business Needs To Know About Internet Security

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

- Introduction to PIX/ASA Firewalls -

Security Considerations for DirectAccess Deployments. Whitepaper

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Information Security as a Business Enabler

Cisco Integrated Services Routers Performance Overview

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Stateful Inspection Technology

Neutralizing Spyware in the Enterprise Environment

VMware vcloud Networking and Security Overview

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Firewall Architecture

Securing SIP Trunks APPLICATION NOTE.

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Recommended IP Telephony Architecture

VPN. Date: 4/15/2004 By: Heena Patel

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Best Practices for Secure Remote Access. Aventail Technical White Paper

Chapter 7. Firewalls

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Virus Protection Across The Enterprise

Content-ID. Content-ID URLS THREATS DATA

Security Technology: Firewalls and VPNs

Voice Over IP and Firewalls

SIP Security Controllers. Product Overview

Using Palo Alto Networks to Protect the Datacenter

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

8. Firewall Design & Implementation

HANDBOOK 8 NETWORK SECURITY Version 1.0

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Firewall Environments. Name

Whitepaper. Controlling the Network Edge to Accommodate Increasing Demand

BlackRidge Technology Transport Access Control: Overview

Technical papers Virtual private networks

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Introduction of Intrusion Detection Systems

Technical Note. ForeScout CounterACT: Virtual Firewall

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

Next-Generation Firewalls: Critical to SMB Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

SIP Trunking Configuration with

Polycom. RealPresence Ready Firewall Traversal Tips

Information Technology Security Guideline. Network Security Zoning

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Configuration Example

Top 10 Reasons Enterprises are Moving Security to the Cloud

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Check Point taps the power of virtualization to simplify security for private clouds

Network Security Topologies. Chapter 11

Achieving PCI-Compliance through Cyberoam

Customer Service Description Next Generation Network Firewall

Solution Brief. Secure and Assured Networking for Financial Services

Filling the Threat Management Gateway Void with F5

Cisco Which VPN Solution is Right for You?

Virtual Private Networks (VPN) Connectivity and Management Policy

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

LinkProof And VPN Load Balancing

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

How To Protect Your Network From Attack

SonicWALL Check Point Firewall-1 VPN Interoperability

Enterprise Data Protection

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Firewall Feature Overview

IMPLEMENTING AND SUPPORTING EXTRANETS

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

COORDINATED THREAT CONTROL

Secure Remote Access for the Distributed Business. Challenges, trends, and considerations

About Firewall Protection

Architecture Overview

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

Guideline on Firewall

CMPT 471 Networking II

SonicWALL Advantages Over WatchGuard

White Paper. avaya.com 1. Table of Contents. Starting Points

Next Generation Network Firewall

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Virtual Private Networks Secured Connectivity for the Distributed Organization

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

This chapter covers the following topics:

ITL BULLETIN FOR JANUARY 2011

Cisco PIX vs. Checkpoint Firewall

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Transcription:

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs P/N 500205 July 2000 Check Point Software Technologies Ltd. In this Document: Introduction Page 1 Integrated VPN/firewall Page 2 placed in front of firewall Page 4 placed behind firewall Page 5 placed in parallel with the firewall Page 6 placed on the firewall side or in the DMZ Page 7 Summary Page 9

2000 Check Point Software Technologies Ltd. All rights reserved. Check Point, the Check Point logo, FireWall-1, FloodGate-1, INSPECT, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SVN, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Appliance, VPN-1 Certificate Manager, VPN-1 Gateway, VPN-1 SecuRemote, VPN-1 SecureServer, and ConnectControl are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668 and 5,835,726 and may be protected by other U.S. Patents, foreign patents, or pending applications.

Introduction Secure Internet communications have become critical to the success of today s businesses. Organizations recognize that any plan to successfully leverage the Internet for business must include Virtual Private Networks (VPNs). A VPN is a network which dynamically links the sites and employees of an enterprise and allows them to privately share information over a public infrastructure, like the Internet. Deciding which VPN technology to implement can be confusing and intimidating; given what seems like a myriad of choices within a burgeoning VPN vendor landscape. Today s VPN product solutions generally fall into two main categories: 1) stand-alone VPN gateways and 2) integrated VPN/firewall solutions. Of these two, only integrated VPN/firewall solutions are designed to deliver complete Internet security. By contrast, s deployed separately from the firewall burden network administrators with many needless complexities of security and management. In addition, with stand-alone VPNs, the placement of the with respect to the firewall becomes critical since firewalls cannot enforce access control of encrypted traffic. This paper contrasts the advantages of integrated VPN/firewalls over stand-alone s. Stand-alone VPNs necessitate the careful consideration of the placement of the with respect to the firewall since firewalls cannot enforce access control of encrypted traffic. For this reason, the discussion on stand-alone solutions and their architectural shortcomings is presented in the context of the various network placement options which security administrators must consider before implementing non-integrated approaches. Check Point Software Technologies Ltd. 1

integrated with the firewall Figure 1: integrated with the firewall Virtual Private Networks provide a means for using a shared infrastructure like the Internet to establish secure information sharing among enterprise sites, business partners, and employees. A secure and effective VPN deployment should: 1. Enforce overall network security policy 2. Ensure that VPN traffic is subject to network access control 3. Protect the from security threats 4. Provide an overall architecture that optimizes VPN and firewall performance 5. Accommodate highly dynamic and growing network environments 6. Simplify network administration and management Integrated VPN/firewall solutions meet all of the critical requirements for a sound VPN deployment by delivering: Protection from Internet Threats. With integrated VPN/firewall solutions, the VPN gateway, and therefore VPN connectivity, receives protection from the firewall. Common denial of service attacks that could compromise a stand-alone are detected and dealt with by the integrated firewall. Access Control for all Traffic. Placement of the within the access control device allows more granular security to be applied to VPN traffic. Since the firewall and VPN gateway share user information, individuals and pre-defined groups can use the resources and services to which they are entitled access and all VPN traffic is decrypted and inspected to ensure that only appropriate content is allowed through the firewall. Centralized Management. Integrated VPN implementations greatly simplify the administration of a security policy, particularly in environments where multiple firewalls and s are required. Database updates and security policy changes can be simultaneously applied to all VPN/firewalls, minimizing the possibility of configuration errors. In addition, integrated VPN solutions allow critical user information to be shared among multiple network applications, including firewalls and s, throughout the enterprise. In this way network managers do not have to maintain redundant user information across multiple proprietary user data stores. Consolidated Logging. It is only with integrated solutions that network, object, user, service and administrator data shared by the and firewall can be leveraged. This way, all of the auditing information, which is critical to network administrators, is available in unified log files. Scaleable Architecture. In order to extend the geography of networks to branch offices and customers, enterprises require VPN solutions that will scale. VPN/firewall solutions can be introduced into VPN networks seamlessly with virtually no disruption to network operations. This benefit becomes particularly compelling when considering environments with high availability requirements where the number of enforcement points to be deployed is doubled. 2 Check Point Software Technologies Ltd.

Simplified Routing. As data travels through network devices, each possible path is reflected as a routing table entry. When resources are added to a network, routing tables must be augmented to direct traffic to the firewall and. Integrating the VPN and the firewall greatly simplifies this task by eliminating the need to maintain separate routes to these devices. Performance. Some critics of integrated VPN/firewall solutions maintain that stand-alone VPN devices deliver faster performance of VPN functions. This is simply not the case. Integrated VPN/firewalls can offer equivalent if not superior VPN performance including throughput, concurrent connections support and quality of service. Integrated VPN/firewalls can optimize performance through: 1. cryptographic acceleration 2. integrated bandwidth management. Cryptographic acceleration - many integrated VPN/firewall solutions support cryptographic accelerator cards, which offload processor intensive cryptographic operations from the host CPU to a dedicated processor on the card. Hardware-based VPN acceleration enables integrated VPN/firewall solutions to scale from T1 to T3 links while freeing gateway resources for other security tasks. Integrated Bandwidth Management these solutions address network congestion issues by allowing enterprises to prioritize business critical traffic over discretionary traffic and thereby optimize use of available WAN links. Some integrated VPN solutions combine bandwidth management, VPN, firewall and Network Address Translation (NAT) policy editors into a single integrated application. As a result, network administrators can quickly and simply extend a firewall or VPN policy to include bandwidth management. The table below summarizes the advantages of integrated VPN/firewall solutions. The pages that follow elaborate on this information by examining each of the possible implementations with stand-alone s. Critical VPN Solution Requirements Protection from internet security threats Access control of VPN traffic Centralized management Low latency Simplified routing Consolidated logging Scalable architecture Integrated user authentication Integrated VPN/firewall in front of the firewall behind the firewall in parallel with the firewall on the side of the firewall Limited Limited Check Point Software Technologies, Ltd. 3

placed in front of firewall Figure 2: VPN Gateway placed in front of the firewall A placed in front of the firewall may seem like a good idea at first. This configuration allows VPN traffic to be inspected by the firewall before it is forwarded to the trusted network. However, there are several problems with this layout. Internet Security Threats. Since stand-alone s have limited or simplistic means (i.e. packet filtering) of enforcing access control, VPN devices placed in front of the firewall are vulnerable to Internet threats. With this configuration, if a is compromised by such an attack, all VPN communications will cease, or worse yet, may be transmitted in the clear. This is a potentially disastrous scenario for customers and business partners relying on a corporation s VPN technology for confidential communication. Multiple Authentication Challenges. In the example above, remote access VPN users connect to the, which decrypts their traffic but does not provide access control. The decrypted connections instead, go back through the firewall where more granular security can be applied. As a result, a user may be forced to authenticate multiple times (once at the and once for every firewall rule requiring authentication). The reason this unnecessary burden is placed on remote access VPN users is that unlike integrated solutions, the firewall and stand-alone VPN device cannot share user information. Unwieldy management. Second only to security, perhaps the most difficult aspect of implementing a firewall and a VPN separately is the cumbersome management architecture required to support them. Since there are two distinct devices, most often from different vendors (the majority of vendors that offer both solutions integrate firewall and VPN), the architecture requires separate: Security policies Management stations Logging facilities User databases (unless both solutions support industry standard directories) Object or resource databases Routing table entries The topology shown in Figure 2 requires separate administration and management facilities for each device. Consequently, the amount of effort required to make updates to user databases, or add network resources is doubled. In addition to being more labor intensive, this approach is particularly error prone with security policy inconsistencies and routing table misconfigurations becoming much more likely. The complexity increases severely as VPN devices and firewalls are added to support high availability and site to site VPN connectivity. Critical VPN Solution Requirements Protection from internet security threats Access control of VPN traffic Centralized management Low latency Simplified routing Consolidated logging Scalable architecture Integrated user authentication Integrated VPN/firewall in front of the firewall 4 Check Point Software Technologies Ltd.

placed behind the firewall Figure 3: placed behind the firewall Placing the stand-alone behind the firewall is one alternative that mitigates the exposure to Internet security threats by allowing the firewall to protect the gateway. Although, this premise is reasonable, the fact remains that this configuration has serious security shortcomings. Limited Access Control. In this configuration, the firewall must pass VPN traffic through to the gateway without conducting granular access control on that traffic. Since IPSec IKE VPN communications are encrypted, IP packets of type 50 and 51 (AH and ESP) must be allowed through the firewall. UDP packets on port 500 for IKE must also be allowed in. This type of configuration is not in keeping with the best practices for security. Access control ensures that VPN users including partners, employees and mobile workers have appropriate access to specific resources within a network. A VPN without sufficient access control only protects the security of the data in transit but cannot enforce secure access to resources on the network Unwieldy management. As with the placed in front of the firewall (Figure 2), the topology shown here in Figure 3 specifies distinct VPN and firewall system administration. This means that separate management stations are required as well as sufficient IT staff so that configuration updates, network upgrades and security policy edits can be supported within both architectures. Specifically, this network placement option requires separate: Security policies Management stations Logging facilities User databases (unless both solutions support industry standard directories) Object or resource databases Routing table entries Although this configuration is particularly unwieldy with one set of devices, management of the firewalls and VPNs for multiple sites with this topology is nearly impossible. The most challenging administrative task within such a network is consistent security policy enforcement. Misconfiguration of VPN security here can be particularly disastrous since there is no access control applied to VPN data after decryption. Critical VPN Solution Requirements Protection from internet security threats Access control of VPN traffic Centralized management Low latency Simplified routing Consolidated logging Scalable architecture Integrated user authentication Integrated VPN/firewall behind the firewall Limited Check Point Software Technologies Ltd. 5

placed in parallel with the firewall Figure 4: placed in parallel with the firewall Many VPN vendors promote separate VPN and firewall connections to the Internet. In this setup the VPN device is configured to accept only encrypted traffic. The proposition here is that the dedicated VPN device can perform optimally while reducing disruption to network operation during installation and setup. Of all network placement options for a stand-alone, this configuration is perhaps the least sound in terms of security. There are several reasons for this: Internet Security Threats. Since the has a direct connection to the Internet, it represents a visible target for malicious activity. The stand-alone is not equipped to adequately defend itself against sophisticated Internet-based attacks. A compromised in this scenario translates to a single point of failure for all VPN traffic or in more severe cases, an open doorway for unauthorized access to corporate resources. Limited Access Control. A in parallel with the firewall has no direct connection to a device that is able to enforce granular access control. Such a configuration makes no distinction among mobile employees of the enterprise or business partners and customers. For instance, once remote VPN users are authenticated by the gateway, they have free access to any of the resources behind that gateway. Similarly, Critical VPN Solution Requirements Protection from internet security threats Access control of VPN traffic Centralized management Low latency Simplified routing Consolidated logging Scalable architecture Integrated user authentication Integrated VPN/firewall in parallel with the firewall in the event that the becomes compromised, attackers will be able to reach all of the resources available to legitimate VPN users. Some stand-alone VPN implementations may incorporate rudimentary filtering. This functionality is not equivalent to granular access control. Since there is no application awareness, the stand-alone solution merely allows or denies access to a service by using IP header information. Content security services like URL filtering and virus scanning cannot be deployed using these stand-alone VPN devices. Complex Routing Schemes Required. Placement of a stand-alone in parallel with the firewall is more complex than Figure 4 suggests. In order to make the configuration possible, the must provide integrated network address translation (NAT) as well as support for a pool of IP addresses that can be assigned dynamically to remote access VPN users. If the gateway does not support NAT then the scenario shown in Figure 4a takes place. In step one, a remote access VPN user has received a dynamically assigned IP address from the ISP, has been authenticated by the gateway and allowed to access the requested resource (step 2). The resource now needs to communicate with the remote access user through the VPN tunnel. Since the internal network does not recognize the source IP address of the Figure 4a: Without NAT remote VPN user, the device sends the response to its default gateway, which is the firewall (step 3). The firewall in turn has no knowledge of the initial communication request so the outbound connection with the client can never be established since the destination is unknown. Limited 6 Check Point Software Technologies Ltd.

Figure 4b shows how this VPN communication is made possible through a feature called IP pools. Once a remote access VPN user has been authenticated, the translates the ISP assigned address to one that is recognizable by the internal network (step 1). The newly assigned address is selected from a predefined pool or range. Figure 4b: IP Pools Separate routing table entries for each network resource are required to ensure that responses destined for that pool of addresses are sent through the VPN gateway (steps 3,4). While IP pools make this configuration viable, the disparate solutions make it an error prone and labor-intensive way to provide VPN connectivity. Substantial administrative overhead will be incurred to ensure that routing tables are kept current with network updates. placed on the firewall side or in the DMZ Figure 5: VPN Gateway placed on the firewall side or in the DMZ One way to avoid the pitfalls of the in parallel configuration is to place the stand-alone VPN gateway on the firewall side. The is connected via a dedicated interface on the firewall or placed within the demilitarized zone (DMZ). In this way, VPN traffic can be forwarded to the firewall after decryption so that access control determinations can be made. The merits of this configuration are that it provides access control of VPN traffic while protecting the VPN gateway from Internet threats. These benefits are quickly diminished however, by network complexity. Unwieldy management. As with any of the non-integrated solutions, the topology shown in Figure 5 requires separate VPN and firewall administration. Deploying two distinct management architectures poses many administrative challenges which affect scalability and network auditing. Specifically, the burden of maintaining and upgrading discrete VPN and firewall devices doubles once high availability is deployed. Potentially four or more devices will require multiple interconnections to ensure that VPN traffic is always properly forwarded to the firewall. Efficient network auditing and logging is also made difficult in this architecture. Since the firewall and VPN logs are not consolidated, administrators cannot track network access by user without manually merging and parsing through copious data. Latency. With the configuration shown in Figure 5, the VPN gateway is placed within the firewall DMZ and given a routable IP address. All inbound VPN traffic destined for the gateway connects first through the firewall where the destination address is identified and then routed appropriately. Once the gateway has decrypted the traffic, it routes the data to the firewall for access control before being forwarded to the network resource for which it is destined. Outbound traffic (data which originates on the intranet and is bound for the Internet) gets processed by Critical VPN Solution Requirements Protection from internet security threats Access control of VPN traffic Centralized management Low latency Simplified routing Consolidated logging Scalable architecture Integrated user authentication Integrated VPN/firewall on the side of the firewall Check Point Software Technologies Ltd. 7

the firewall and in a similar fashion. Effectively, this means that every VPN communication request requires two connections to the firewall. This needless overhead not only affects access control efficiency for the entire network, but also limits the performance of the VPN device to the throughput of the overburdened firewall. Multiple Authentication Challenges. Just as in the configuration where the is placed in front of the firewall, both management and usability become more complex with the configuration shown in figure 5. Remote access VPN users connect to the by responding to an authentication challenge. The gateway decrypts the traffic but does not provide access control. For this functionality, the decrypted traffic must traverse back through the firewall where in order to provide user-based access into the network, the firewall will require each user to reauthenticate. This additional burden on remote access users exists because unlike integrated solutions, the stand-alone VPN device and the firewall do not share information. Complex networking. As with the example in the previous page, the only way that this configuration is even possible is if the stand-alone gateway supports Network Address Translation (NAT). Even with this feature in place there is no guarantee that all applications to which VPN users will require access will be supported. Some interactive applications like NetMeeting and CUCME rely on the true IP address (rather than the translated one) in order to send responses to the requester. Since the stand-alone has no application awareness, there is no way to account for these specific cases in the gateway s NAT processes. A possible scenario is that a VPN user requiring access to NetMeeting connects to the ISP and receives a dynamically assigned IP address. The user is routed to the where the true IP address is translated to one that is recognizable by internal network resources. The Netmeeting application, which requires the true IP, tries to return communication to this VPN user by sending packets whose destination is the user s ISP assigned address. The default gateway, in this case the firewall, recognizes the destination as an Internet IP address and forwards it to the cloud without sending the data to the first for encryption. 8 Check Point Software Technologies Ltd.

Summary This paper has outlined the unparalleled merit of integrated VPN/firewall solutions. It should be noted however, that some customers may need to maintain the VPN and firewall functions as separate implementations. For those customers, there is one main point to be garnered from this discussion; centralized management of the and the firewall is an absolute requirement in building architecturally sound network security. Whether a particular deployment involves an integrated VPN/firewall or separate devices placed according to the configurations shown above, the two functions must be unified by a single management architecture. In this way, network administrators can enforce security policies consistently across all network enforcement points while minimizing networking complexity and error-prone security configuration practices. Deploying the soundest Internet security architecture is only possible with solutions that integrate the VPN and firewall functionality within a single management paradigm. About Check Point Software Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. SVN secures business-to-business (B2B) communications between networks, systems, applications and users across the Internet, intranets and extranets. Check Point's Open Platform for Security (OPSEC) provides the framework for integration and interoperability with "best-of-breed" solutions from over 200 leading industry partners. For more information, please call us at (800) 429-4391 or (650) 628-2000 or visit us on the Web at http://www.checkpoint.com or at http://www.opsec.com. Check Point Software Technologies Ltd. 9

Check Point Software Technologies Ltd. International Headquarters: 3A Jabotinsky Street Ramat Gan 52520, Israel Tel: 972-3-753 4555 Fax: 972-3-575 9256 U.S. Headquarters: Three Lagoon Drive, Suite 400 Redwood City, CA 94065 Tel: 800-429-4391 ; (650) 628-2000 Fax: (650) 654-4233 e-mail: info@checkpoint.com http://www.checkpoint.com 10 Check Point Software Technologies Ltd.