SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica



Similar documents
Data Center Architecture

Configuration of Cisco Routers. Mario Baldi

Multi-layer switch hardware commutation across various layers. Mario Baldi. Politecnico di Torino.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Novell Access Manager SSL Virtual Private Network

SSL VPN Technical Primer

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Virtual Private Networks

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Cisco Which VPN Solution is Right for You?

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Network Configuration Settings

Source-Connect Network Configuration Last updated May 2009

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

OS/390 Firewall Technology Overview

Application Note. Onsight Connect Network Requirements v6.3

Virtual Private Networks

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

z/os Firewall Technology Overview

Security Technology: Firewalls and VPNs

Internet Privacy Options

Network Access Security. Lesson 10

Chapter 4: Security of the architecture, and lower layer security (network security) 1

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

GPRS / 3G Services: VPN solutions supported

Galileo International. Firewall & Proxy Specifications

NETASQ MIGRATING FROM V8 TO V9

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

ewon-vpn - User Guide Virtual Private Network by ewons

Figure 41-1 IP Filter Rules

Virtual Private Networks Solutions for Secure Remote Access. White Paper

CCNA Security 1.1 Instructional Resource

Controlling Ashly Products From a Remote PC Location

21.4 Network Address Translation (NAT) NAT concept

7.1. Remote Access Connection

SSL VPNs: An IETF Perspective

White Paper. SSL vs. IPSec. Streamlining Site-to-Site VPN Deployments

Chapter 12 Supporting Network Address Translation (NAT)

Fireware Essentials Exam Study Guide

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Internet Security Firewalls

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Integrated Services Router with the "AIM-VPN/SSL" Module

SSL VPN Technology White Paper

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 6 Virtual Private Networking Using SSL Connections

VPN. Date: 4/15/2004 By: Heena Patel

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

CSCE 465 Computer & Network Security

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Kerio WinRoute Firewall Features Summary and Simple Setup Guide (for version 6.x)

LinkProof And VPN Load Balancing

Application Note. Onsight TeamLink And Firewall Detect v6.3

Recommended IP Telephony Architecture

Cisco AnyConnect Secure Mobility Solution Guide

Polycom. RealPresence Ready Firewall Traversal Tips

This chapter describes how to set up and manage VPN service in Mac OS X Server.

How To Configure Apple ipad for Cyberoam L2TP

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Networking for Caribbean Development

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

Introduction to Computer Security

Chapter 32 Internet Security

OS/390 Firewall Technology Overview

Table of Contents. Introduction

INTRODUCTION TO FIREWALL SECURITY

Joe Davies Principal Writer Windows Server Documentation

Advanced Higher Computing. Computer Networks. Homework Sheets

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Web Request Routing. Technical Brief. What s the best option for your web security deployment?

Secure VoIP for optimal business communication

Step-by-Step Configuration

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Executive Summary and Purpose

Securing Networks with PIX and ASA

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Deploying Secure Enterprise Wide IP Videoconferencing Across Virtual Private Networks

Integrated Services Router with the "AIM-VPN/SSL" Module

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Computer Networks. Secure Systems

Load Balancing for Microsoft Office Communication Server 2007 Release 2

ISG50 Application Note Version 1.0 June, 2011

ReadyNAS Remote White Paper. NETGEAR May 2010

Microsoft Azure Configuration

Case Study for Layer 3 Authentication and Encryption

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

Transcription:

SSL VPN Virtual Private Networks based on Secure Socket Layer Mario Baldi Politecnico di Torino Dipartimento di Automatica e Informatica mario.baldi[at]polito.it staff.polito.it/mario.baldi

Nota di Copyright This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties. The title and copyright regarding the slides (including, but not limited to, each and every image, photography, animation, video, audio, music and text) are property of the authors specified on page 1. The slides may be reproduced and used freely by research institutes, schools and Universities for non-profit, institutional purposes. In such cases, no authorization is requested. Any total or partial use or reproduction (including, but not limited to, reproduction on magnetic media, computer networks, and printed reproduction) is forbidden, unless explicitly authorized by the authors by means of written license. Information included in these slides is deemed as accurate at the date of publication. Such information is supplied for merely educational purposes and may not be used in designing systems, products, networks, etc. In any case, these slides are subject to changes without any previous notice. The authors do not assume any responsibility for the contents of these slides (including, but not limited to, accuracy, completeness, enforceability, updated-ness of information hereinafter provided). In any case, accordance with information hereinafter included must not be declared. In any case, this copyright notice must never be removed and must be reported even in partial uses. SSL-VPN - 2

SSL VPN: What is that? SSL as the central mechanism on which to base secure access Site-to-site VPN Remote access VPN Secure service access Loose interpretation of VPN SSL (pseudo)vpn Tunneling based on TCP or UDP SSL-VPN - 3

Why Not IPsec VPN? IPsec too difficult and/or too expensive to use securely Too many options to be configured and administered Operates in kernel space Failures potentially catastrophic Installation difficult and risky Concerns fade with maturity SSL-VPN - 4

Why SSL VPN Lower complexity Installation Configuration Management Non-interference with kernel Most widely used SSL-VPN - 5 Higher, more robust security

Compared to IPsec VPN No problem with NAT traversal No authentication of IP header ESP (encapsulation securty payload) IPsec to be used Packets dropped at a higher level Critical with DOS attacks SSL-VPN - 6

Compared to PPTP Initially proprietary (Microsoft) Initially weak security Fixed later Poor interoperability with non- Microsoft platforms GRE (generic routing encapsulation) tunneling Possibly blocked by routers SSL-VPN - 7

SSL (pseudo)vpn IPsec VPNs connect networks Or hosts to networks SSL VPNs connect Users to services Application clients to application servers SSL-VPN - 8

Why SSL (pseudo)vpn No client code is to be installed Usable anywhere (kyosk) Applications available through web browser Deploying HTTPS Not a general security solution Specific solutions suitable to selected applications SSL-VPN - 9

In Summary SSL VPNs have a good chance of working on any network scenario TCP or UDP tunneling enable NAT traversal Firewall traversal Router traversal SSL (pseudo)vpn enable universal client (web browser) SSL-VPN - 10

SSL VPN Flavors Web proxying Application translation Port forwarding SSL ed protocols Application proxying Pseudo VPN Network extension Site-to-site connectivity SSL-VPN - 11

Proxying VPN Gateway downloads web pages through HTTP Ship them through HTTPS Web server HTTPS HTTP Client VPN Gateway SSL-VPN - 12

Application Translation Native protocol between VPN server and application server E.g., FTP, STMP, POP Application user interface as a web page HTTP(S) between VPN server and client Not suitable for all applications Look&feel might be lost SSL-VPN - 13

Application Translation HTTPS POP3 Mail server SSL-VPN - 14

Port Forwarding Port forwarder on client Additional software Platform dependent Unless Java or ActiveX Application points to localhost To port X SSL-VPN - 15 Usual application port E.g., TCP port 110 (POP3)

Port Forwarding SSL/HTTPS POP3 POP3 (TCP port 110) Port Forwarder TCP port 443 HTTPS SSL-VPN - 16

Port Forwarding Port forwarder sends data stream to SSL connection to VPN gateway To port Y Usually port 443 (HTTPS) VPN gateway forwards data stream to application server To port X E.g., TCP port 110 (POP3) SSL-VPN - 17

Port Forwarding SSL/HTTPS POP3 TCP port 443 HTTPS TCP port 110 POP3 Port Forwarding SSL-VPN - 18

Port Forwarding Works only with fixed port protocols Problems with address and port in application layer protocol SSL-VPN gateway must know application protocol to translate Application layer gateway (ALG) SSL-VPN - 19

SSL ed Protocols Secure application protocols Protocol-over-SSL E.g., POP-over-SSL, IMAPover-SSL, SMTP-over-SSL Client and server support required POP-over-SSL TCP port 995 SSL-VPN - 20

Application Proxying Compatibility with older servers Client points at SSL-VPN gateway TCP port 995 TCP port 110 POP-o-SSL POP3 SSL-VPN - 21

Network Extension Tunnel over SSL POP3 Tunnel over SSL POP3 FTP FTP SSL-VPN - 22

Products and Vendors Open VPN (openvpn.net) AEP F5 Networks NetScreen Technologies Netilla Nokia Symantec SSL-VPN - 23 Whale Communications

Main Issues Interoperability Product specific features Implementation weaknesses Availability of client on specific platforms SSL-VPN - 24

Bibliography S. Brumbaugh, VPNs and Public Key Infrastructure, O'Reilly, Sep. 2004, http://www.onlamp.com/pub/a/security/ 2004/09/23/vpns_and_pki.html C. Hosner, OpenVPN and the SSL VPN Revolution, SANS Institute, Aug. 2004, http://www.sans.org/rr/whitepapers/vpns /1459.php J. Snyder, SSL VPN Gateways, NetworkWorldFusion, Dec. 2004, http://www.nwfusion.com/reviews/2004/ 0112revmain.html SSL-VPN - 25