Deploying iphone and ipad Virtual Private Networks



Similar documents
Deploying iphone and ipad Apple Configurator

iphone and ipad in Business Deployment Scenarios

Deploying iphone and ipad Security Overview

ipad in Business Security

iphone in Business Security Overview

iphone in Business How-To Setup Guide for Users

802.1X Authentication

iphone in Business How-To Setup Guide for Users

Ensuring the security of your mobile business intelligence

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

iphone OS Enterprise Deployment Guide First Edition, for Version 3.0 or later

Cisco Secure Access Control Server 4.2 for Windows

Access Your Cisco Smart Storage Remotely Via WebDAV

PMDP is simple to set up, start using, and maintain

Ensuring the security of your mobile business intelligence

Phone: Fax: Box: 230

Configuration Profiles Reference Guide

company policies are adhered to and all parties (traders,

BES10 Cloud architecture and data flows

Advanced Administration

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Mobile Configuration Profiles for ios Devices Technical Note

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Networking & Internet: Enterprise Deployment

ClickShare Network Integration

Design and Implementation Guide. Apple iphone Compatibility

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide

Wireless VPN White Paper. WIALAN Technologies, Inc.

SharePlus Enterprise: Security White Paper

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Product Summary RADIUS Servers

Security Guide. BES12 Cloud. for BlackBerry

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

ipad Classroom Installation & Deployment Important information

BlackBerry Business Cloud Services. Policy Reference Guide

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Keeping your VPN protected

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

Managing Wireless Clients with the Administrator Tool. Intel PROSet/Wireless Software 10.1

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Sophos Mobile Control Installation prerequisites form

Cisco Virtual Office Express

How To Use The Lutron Home Control+ App On An Ipad Or Ipod

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

Workspot, Inc. RSA SecurID Ready Implementation Guide. Partner Information. Last Modified: September 16, Product Information Partner Name

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Endpoint Security VPN for Mac

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Kaspersky Security for Mobile Administrator's Guide

Hosted Microsoft Exchange Client Setup & Guide Book

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

QuickStart Guide for Mobile Device Management

Technical Certificates Overview

ManageEngine Desktop Central. Mobile Device Management User Guide

An Overview of Samsung KNOX Active Directory and Group Policy Features

mobilecho: 5-Step Deployment Plan for Mobile File Management

AkrutoSync 4.0 User Guide

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Remote Access via VPN Configuration (May 2011)

Configuring GTA Firewalls for Remote Access

Deploying iphone and ipad Mobile Device Management

GlobalProtect Configuration for IPsec Client on Apple ios Devices

Systems Manager Cloud Based Mobile Device Management

Install and Configure Cyberoam iaccess for ios

Eduroam wireless network Windows Vista

QuickStart Guide for Mobile Device Management. Version 8.6

ipad in Business Mobile Device Management

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

Defender EAP Agent Installation and Configuration Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Mac OS X Secure Wireless Setup Guide

INTRODUCTION... 2 Windows Windows Mac OS X Ubuntu Advanced routing Windows Mac OS X Ubuntu...

QuickStart Guide for Managing Mobile Devices. Version 9.2

Systems Manager Cloud-Based Enterprise Mobility Management

Additional information >>> HERE <<<

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

iphone in Business Mobile Device Management

ios Enterprise Deployment Overview

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

802.1x in the Enterprise Network

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Transcription:

Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols. Users can easily connect to enterprise systems via the built-in VPN client in ios or through third-party applications from Juniper Networks, Cisco, SonicWALL, Check Point, Aruba Networks, and F5 Networks. Out of the box, ios supports Cisco IPSec, LTP over IPSec, and PPTP. If your organization supports one of these protocols, no additional network configuration or third-party applications are required to connect iphone and ipad to your VPN. Additionally, ios supports SSL VPN, enabling access to Juniper Networks, Cisco, SonicWALL, Check Point, Aruba Networks, and F5 Networks SSL VPN servers. Users simply download a VPN client application developed by one of these companies from the App Store to get started. Like other VPN protocols supported in ios, SSL VPN can be configured manually on the device or via Configuration Profile. ios supports industry-standard technologies such as IPv6, proxy servers, and splittunneling, providing a rich VPN experience when connecting to corporate networks. And ios works with a variety of authentication methods including password, twofactor token, and digital certificates. To streamline the connection in environments where certificate-based authentication is used, ios features VPN On Demand, which dynamically initiates a VPN session when connecting to specified domains. Supported Protocols and Authentication Methods SSL VPN Supports user authentication by password, two-factor token, and certificates. Cisco IPSec Supports user authentication by password, two-factor token, and machine authentication by shared secret and certificates. LTP over IPSec Supports user authentication by MS-CHAP v Password, two-factor token, and machine authentication by shared secret. PPTP Supports user authentication by MS-CHAP v Password and two-factor token.

VPN On Demand For configurations using certificate-based authentication, ios supports VPN On Demand. VPN On Demand will establish a connection automatically when accessing predefined domains, providing a seamless VPN connectivity experience for users. This is a feature of ios that does not require additional server configuration. The configuration of VPN On Demand takes place via a Configuration Profile or can be configured manually on the device. The VPN On Demand options are: Always Initiates a VPN connection for any address that matches the specified domain. Never Does not initiate a VPN connection for addresses that match the specified domain, but if VPN is already active, it may be used. Establish if needed Initiates a VPN connection for addresses that match the specified domain only after a DNS look-up has failed. VPN Setup ios integrates with many existing VPN networks, with minimal configuration necessary. The best way to prepare for deployment is to check whether ios supports your company s existing VPN protocols and authentication methods. It s recommended that you review the authentication path to your authentication server to make sure standards supported by ios are enabled within your implementation. If you plan to use certificate-based authentication, ensure you have your public key infrastructure configured to support device- and user-based certificates with the corresponding key distribution process. If you want to configure URL-specific proxy settings, place a PAC file on a web server that is accessible with the basic VPN settings and ensure that it is hosted with the application/x-ns-proxy-autoconfig MIME type. Proxy Setup For all configurations, you can also specify a VPN proxy. To configure a single proxy for all connections, use the Manual setting and provide the address, port, and authentication if necessary. To provide the device with an auto-proxy configuration file using PAC or WPAD, use the Auto setting. For PACS, specify the URL of the PACS file. For WPAD, iphone and ipad will query DHCP and DNS for the appropriate settings.

Deployment Scenario The example depicts a typical deployment with a VPN server/concentrator as well as an authentication server controlling access to enterprise network services. a b Authentication Certificate or Token VPN Authentication Server Token Generation or Certificate Authentication Directory Service VPN Server/Concentrator Private Network Public Internet Proxy Server 5 5 iphone and ipad request access to network services. The VPN server/concentrator receives the request and then passes it to the authentication server. In a two-factor token environment, the authentication server would then manage a time-synchronized token key generation with the key server. If a certificate authentication method is deployed, an identity certificate needs to be distributed prior to authentication. If a password method is deployed, the authentication process proceeds with user validation. Once a user is authenticated, the authentication server validates user and group policies. After user and group policies are validated, the VPN server provides tunneled and encrypted access to network services. If a proxy server is in use, iphone and ipad connect through the proxy server for access to information outside the firewall. 0 Apple Inc. All rights reserved. Apple, the Apple logo, iphone, ipad, and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc.. Other product and company names mentioned herein may be trademarks of their respective companies. Product specifications are subject to change without notice. This material is provided for information purposes only; Apple assumes no liability related to its use. September 0

Deploying iphone and ipad Wi-Fi Out of the box, iphone and ipad can securely connect to corporate or guest Wi-Fi networks, making it quick and simple to join available wireless networks whether you re on campus or on the road. ios supports industry-standard wireless network protocols, including WPA Enterprise, ensuring corporate wireless networks can be configured quickly and accessed securely. WPA Enterprise uses 8-bit AES encryption, a proven, block-based encryption method, providing users with the highest level of assurance that their data will remain protected. With support for 80.X, ios can be integrated into a broad range of RADIUS authentication environments. 80.X wireless authentication methods supported on iphone and ipad include EAP-TLS, EAP-TTLS, EAP-FAST, EAP-SIM, PEAPv0, PEAPv, and LEAP. Wireless security protocols WEP WPA Personal WPA Enterprise WPA Personal WPA Enterprise 80.X authentication methods EAP-TLS EAP-TTLS EAP-FAST EAP-SIM PEAPv0 (EAP-MS-CHAP v) PEAPv (EAP-GTC) LEAP Users can set iphone and ipad to join available Wi-Fi networks automatically. Wi-Fi networks that require login credentials or other information can be quickly accessed without opening a separate browser session, from Wi-Fi settings or within applications such as Mail. And low-power, persistent Wi-Fi connectivity allows applications to use Wi-Fi networks to deliver push notifications. For roaming on large enterprise Wi-Fi networks, iphone and ipad support 80.k and 80.r.* 80.k helps iphone and ipad transition between base stations by utilizing the reports from the base station, while 80.r streamlines 80.X authentication as a device moves from one access point to another. For quick setup and deployment, wireless network, security, proxy, and authentication settings can be configured using Configuration Profiles. WPA Enterprise Setup Verify network appliances for compatibility and select an authentication type (EAP type) supported by ios. Check that 80.X is enabled on the authentication server and, if necessary, install a server certificate and assign network access permissions to users and groups. Configure wireless access points for 80.X authentication and enter the corresponding RADIUS server information. If you plan to use certificate-based authentication, configure your public key infrastructure to support device- and user-based certificates with the corresponding key distribution process. Verify certificate format and authentication server compatibility. ios supports PKCS# (.cer,.crt,.der) and PKCS#. For additional documentation regarding wireless networking standards and Wi-Fi Protected Access (WPA), visit www.wi-fi.org.

5 WPA Enterprise/80.X Deployment Scenario This example depicts a typical secure wireless deployment that takes advantage of RADIUS-based authentication. Authentication Server with 80.X Support (RADIUS) Directory Services Certificate or Password Based on EAP Type Wireless Access Point with 80.X Support Network Services iphone and ipad request access to the network. The connection is initiated in response to a user selecting an available wireless network, or is automatically initiated after a previously configured network is detected. After the request is received by the access point, the request is passed to the RADIUS server for authentication. The RADIUS server validates the user account utilizing the directory service. Once the user is authenticated, the access point provides network access with policies and permissions as instructed by the RADIUS server. *iphone S, iphone 5, new ipad, and 5th-generation ipod touch support 80.k and 80.r. 0 Apple Inc. All rights reserved. Apple, the Apple logo, iphone, ipad, and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. Other product and company names mentioned herein may be trademarks of their respective companies. Product specifications are subject to change without notice. This material is provided for information purposes only; Apple assumes no liability related to its use. September 0