The Bomgar Appliance in the Network



Similar documents
Security Provider Integration Kerberos Authentication

Virtual Appliance Setup Guide

Configuring Failover

F-Secure Messaging Security Gateway. Deployment Guide

Privileged Access Management Upgrade Guide

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

SolarWinds Log & Event Manager

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Securing Networks with PIX and ASA

F-SECURE MESSAGING SECURITY GATEWAY

NEFSIS DEDICATED SERVER

Security Provider Integration RADIUS Server

Security Provider Integration LDAP Server

Firewall Environments. Name

Configuring Global Protect SSL VPN with a user-defined port

Configuration Guide BES12. Version 12.2

SSL-VPN 200 Getting Started Guide

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

msuite5 & mdesign Installation Prerequisites

MilsVPN VPN Tunnel Port Translation. Table of Contents Introduction VPN Tunnel Settings...2

IBM. Vulnerability scanning and best practices

Configuration Guide BES12. Version 12.1

NetSpective Global Proxy Configuration Guide

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

What is the Barracuda SSL VPN Server Agent?

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Chapter 8 Router and Network Management

VMware Identity Manager Connector Installation and Configuration

Barracuda IM Firewall Administrator s Guide

SonicWALL PCI 1.1 Implementation Guide

Security Provider Integration Kerberos Server

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Barracuda Web Filter Administrator s Guide

- Introduction to PIX/ASA Firewalls -

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

8. Firewall Design & Implementation

Borderware MXtreme. Secure Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

LifeSize Transit Deployment Guide June 2011

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.

Recommended IP Telephony Architecture

How To Configure SSL VPN in Cyberoam

Broadband Phone Gateway BPG510 Technical Users Guide

Barracuda Web Filter Administrator s Guide

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

Appliance Administration Guide Base 4.2.x

Salesforce Integration

Configuration Guide BES12. Version 12.3

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda SSL VPN Administrator s Guide

I N S T A L L A T I O N M A N U A L

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

1 You will need the following items to get started:

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Network Security Topologies. Chapter 11

Achieving PCI-Compliance through Cyberoam

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc.

Firewall and Router Policy

Course Outline: Designing a Windows Server 2008 Network Infrastructure

Fireware Essentials Exam Study Guide

Deploying the Barracuda Load Balancer with Office Communications Server 2007 R2. Office Communications Server Overview.

1Y0-250 Implementing Citrix NetScaler 10 for App and Desktop Solutions Practice Exam

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

emerge 50P emerge 5000P

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

Load Balance Router R258V

Manage Firewalls and Log Collection

Barracuda Link Balancer

The Ultra-Secure Network Architecture

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

A Guide to New Features in Propalms OneGate 4.0

Administrative Guide 14.1

Architecture Overview

Cornerstones of Security

UIP1868P User Interface Guide

ANS Monitoring as a Service. Customer requirements

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

Barracuda Link Balancer Administrator s Guide

QUICK START GUIDE. Cisco C170 Security Appliance

Designing a Windows Server 2008 Network Infrastructure

Securing the Service Desk in the Cloud

How To Set Up Foglight Nms For A Proof Of Concept

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Administrative Guide Enterprise Licensing

Next Generation Network Firewall

Configuration Guide. BES12 Cloud

SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION

- Introduction to Firewalls -

How To - Implement Clientless Single Sign On Authentication with Active Directory

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Transcription:

The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components. All Bomgar sessions between representatives and remote customers occur through the server components that run on the appliance. To protect the security of the application data in transit, Bomgar uses 256- bit Advanced Encryption Standard (AES) SSL to encrypt all application communications. The appliance architecture offers customers the ability to choose how and where the appliance is deployed. Additionally, customers may configure the security features such that it complies with applicable corporate policies or regulations. Security features include role-based access control, secure password requirements, and features to give remote support recipients the ability to resume control of their computers. The Bomgar Appliance enables remote control by creating a remote outbound connection from the customer's system to the Bomgar Appliance through firewalls. For Bomgar to provide remote control securely, the appliance is designed to use the most common network infrastructure or architecture that supports internet-accessible applications a demilitarized zone (DMZ) with firewall protection. In the context of computer networking, the DMZ is a buffer zone between two firewalls and thus separated from the internet and intranet(s). The firewalls block any traffic types known to be illegal and provide intrusion containment. The internet firewall allows only expected traffic using the correct ports. The Bomgar Appliance is designed and tested to ensure it works properly and securely in Internet environments. While the appliance can be deployed internal or external to your organization, to achieve optimal security Bomgar recommends that you place the Bomgar Appliance inside the DMZ, as illustrated. This diagram shows the recommended configuration for one Bomgar Appliance. By locating the appliance in the DMZ, the appliance is within the secure buffer zone. Since all Bomgar sessions are initiated via outbound connections from the client to the appliance, it is possible to remotely control computers using Bomgar through the firewalls. CONTACT BOMGAR info@bomgar.com 866.205.3650 (US) +44 (0) 1628 480 210 (UK/EMEA) BOMGAR.COM 1

Bomgar Appliance Network Infrastructure DNS: Each Bomgar Appliance needs a physical connection to the network and a separate IP address. Additionally, a Domain Name System (DNS) record for each appliance is recommended, along with the DNS A Record or a Canonical Name (CNAME) record pointing to the appliance. Since any customers you support using Bomgar use the public portal name you give them to request remote support, the simple yet descriptive name is the best approach. For instance, a company named 'Example' might use support.example.com for their DNS record. Some companies have network standards and guidelines for DNS names that may increase the complexity of the public portal name. For instance, the 'Example' company might require every DNS name to include the geographical region and department within the name, such as usa.hr.example.com. This name is difficult for customers to use and remember. In this instance, the best practice is to create a CNAME that ultimately points to the appliance and public site. The CNAME is usa.hr.example.com, as shown below: support.example.com CNAME usa.hr.example.com usa.hr.example.com A 192.0.2.23 Here is one more example, using the common foo bar terminology: foo.example.com CNAME bar.example.com bar.example.com A 192.0.2.23 Deployment Options DMZ Deployment (recommended): Deploying the appliance into a perimeter-based DMZ segment meets security best practice standards and is Bomgar's recommended location for the secure deployment of the device. A DMZ, or de-militarized zone, is a network that is protected by access control mechanisms. Access control may be provided by a firewall device, a router, or a switch that provides port and address filtering capabilities. The purpose of the DMZ is to limit access to systems that are deployed within it. In the case of the Bomgar Appliance, the DMZ will limit connectivity to the device and allow access only to the appropriate ports. For more information see"example Firewall Rules Based on Appliance Location" on page 4 CONTACT BOMGAR info@bomgar.com 866.205.3650 (US) +44 (0) 1628 480 210 (UK/EMEA) BOMGAR.COM 2

External Deployment: In situations where a DMZ does not exist and is not possible due to technical or business constraints, the Bomgar Appliance may be deployed external to the perimeter firewall. The appliance consists of a hardened operating system and applications that are designed to be directly accessible. Internal Deployment: Deploying the Bomgar Appliance on an internal network segment is ideal when the support base is completely internal or accessible through a VPN. No firewall changes are required because the device and all of the supported clients are internal to the firewall. In environments where the supported users or systems are external to the firewall, Bomgar recommends this deployment location only in the event that a DMZ does not exist or when the appliance cannot be deployed externally. An internal deployment of the appliance requires numerous changes to the environment and a solid understanding of perimeter firewall controls and Network Address Translation. CONTACT BOMGAR info@bomgar.com 866.205.3650 (US) +44 (0) 1628 480 210 (UK/EMEA) BOMGAR.COM 3

Example Firewall Rules Based on Appliance Location Below are example firewall rules for use with Bomgar, including port numbers, descriptions, and required rules. If an appliance has multiple IP addresses, outbound traffic for services such as LDAP can flow out of any configured address. Because of this, it is best practice to make firewall rules apply for all IP addresses configured on each Bomgar appliance. TCP Port 80 (optional) TCP Port 443 (required)* TCP Port 80 (optional) TCP Port 161/UDP TCP Port 443 (required)* TCP Port 22 (optional) TCP Port 443 to the specific host update.bomgar.com (optional) TCP Port 5832 (required for Passive) UDP Port 123 (optional) LDAP - TCP/UDP 389 (optional) LDAP - TCP/UDP 636 (optional) Syslog - UDP 514 (required for logging) DNS - UDP 53 (required if DNS server is outside the DMZ) TCP Port 25 (optional) TCP Port 443 (optional) TCP Port 5832 (required for Passive) Firewall Rules Internet to the DMZ Used to host the portal page without the user having to type HTTPS. The traffic can be automatically rolled over to port 443. Used for all session traffic. Internal Network to the DMZ Used to host the portal page without the user having to type HTTPS. The traffic can be automatically rolled over to port 443. Used for SNMP queries via IP configuration settings in the /appliance interface. Used for all session traffic. DMZ to the Internet Used to establish connections with Bomgar Support for advanced troubleshooting/repairs. You can optionally enable access from the appliance on port 443 to this host for automatic updates, or you can apply updates manually. Used as a listening port by Passive Jump Clients. Operating system firewalls should also be aware of this port. The port number is configurable by an administrator. This port is purely used for wakeup calls to the clients and is therefore not encrypted. After the client is woken, it launches the Bomgar session over an encrypted outbound TCP 443 connection. DMZ to the Internal Network Access NTP server and sync the time. Access LDAP server and authenticate users. Access LDAP server and authenticate users via SSL. Used to send syslog messages to a syslog server in the internal network. Alternatively, messages can be sent to a syslog server located within the DMZ. Access DNS server to verify that a DNS A record or CNAME record points to the appliance. Allows the appliance to send admin mail alerts. Appliance to web services (e.g., HP Service Manager, BMC Remedy) for outbound events. Used as a listening port by Passive Jump Clients. Operating system firewalls should also be aware of this port. The port number is configurable by an administrator. This port is purely used for wakeup calls to the clients and is therefore not encrypted. After the client is woken, it launches the Bomgar session over an encrypted outbound TCP 443 connection. *Each of the following Bomgar components can be configured to connect on a port other than 443: representative console, customer client, presentation attendee client, Jumpoint, connection agent. If the LDAP server is outside of the DMZ, the Bomgar Connection Agent is used to authenticate users via LDAP. CONTACT BOMGAR info@bomgar.com 866.205.3650 (US) +44 (0) 1628 480 210 (UK/EMEA) BOMGAR.COM 4

Network Considerations During Appliance Install The following questions should be considered when implementing your Bomgar Appliance in the network. 1. How are connections established to the appliance? The connection from each of the various clients is an outbound connection from the computer to the appliance, and the only required ports are 80 and 443. Therefore, the allowed ports would typically be 80 and 443 from the internet to the DMZ, and 80 and 443 from the internal network to the DMZ. 2. Is port 443 the only port that needs to stay open inbound to the appliance? The connection from each of the various clients is an outbound connection from the computer to the appliance, and the only required ports are 80 and 443. Therefore, the allowed ports would typically be 80 and 443 from the internet to the DMZ, and 80 and 443 from the internal network to the DMZ. Port 22 is an outbound port from the appliance to Bomgar. More ports may be available depending on your build. Optionally, the appliance can be configured to automatically check for updates from update.bomgar.com. This requires an outbound connection on port 443 from the appliance and the ability to connect to a DNS server to resolve this name. If the DNS Server is within the DMZ, no additional ports would be required, but if the DNS server is in a different zone, the necessary ports for this would need to be allowed as described in the Firewall Rules table below. This can be avoided by downloading updates for the appliance and applying them manually. Lastly, the server is configured with an NTP server to sync the time on the appliance. This can be supported by connecting to clock.bomgar.com, or it can be supported pointing to an internal NTP server using Port 123. 3. What other outbound connectivity does the appliance need? The appliance can be configured with an NTP server to sync the time on the appliance. This can be supported by connecting to clock.bomgar.com, or it can be supported pointing to an internal NTP server using Port 123. 4. Is the LDAP Server on the same LAN as your Bomgar Appliance? If not, you must install a Bomgar Connection Agent on the LDAP server to support communications between the Bomgar Appliance and the LDAP Server. 5. Will there be two appliances configured, one as a backup appliance to support automatic failover? If so, the appliances need to be on the same subnet, and they each need a DNS A Record for their individual IP Addresses. 6. Will you be utilizing a RADIUS Server with Bomgar? If so, this is typically port 1812. 7. Will you be utilizing a Kerberos Key Distribution Center (KDC) with Bomgar? If so, the representatives typically communicate with their KDC over port 88 UDP. 8. Is your support base completely internal or accessible through a VPN? If so, deploying the Bomgar Appliance on an internal network segment is ideal, and no firewall changes are required because both the appliance and all of the supported clients are internal to the firewall. 9. Are you supporting customers outside of your company's internal network? If so, best practices in network design discourage opening external access directly to your internal network. If you are providing external support via Bomgar, it is highly recommended that the appliance reside in a DMZ that segments the internal network from the internet. 10. How are updates to the appliance done? The appliance can be configured to automatically check for updates from update.bomgar.com. This requires an outbound connection on port 443 from the appliance and the ability to connect to a DNS server to resolve this name. If the DNS Server is within the DMZ, no additional ports would be required, but if the DNS server is in a different zone, the necessary ports for this would need to be allowed. This can be avoided by downloading updates for the appliance and applying them manually. CONTACT BOMGAR info@bomgar.com 866.205.3650 (US) +44 (0) 1628 480 210 (UK/EMEA) BOMGAR.COM 5