implementing secure and flexible remote access …...routing: address assignment proxy-arp ip...

21
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Implementing Secure and Flexible Remote Access using SSL VPN Ricky Elias Security Architect Advanced Technology (Security) [email protected]

Upload: others

Post on 24-Mar-2020

9 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1

Implementing Secure and Flexible Remote Access using SSL VPN

Ricky EliasSecurity Architect

Advanced Technology (Security)

[email protected]

Page 2: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2

Agenda

� The Need for Remote Access

� Deployment Considerations

� Endpoint Security

� Demo

� Q&A

Page 3: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3

Convergence

Today

IPSec?IPSec?

SSL?SSL?

Client?Client? Clientless?Clientless?

Mobile Platforms?Mobile Platforms?Fixed Platforms?Fixed Platforms?

Voice Apps?Voice Apps?

Tomorrow

Video Apps?Video Apps?Data Apps?Data Apps?

Mobile Security?Mobile Security?

Single Platform

Remote Access Market Evolution

Page 4: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4

Ca

pa

city

ASA 5510Up to 250 VPN Sessions

170Mb/s Max VPN

ASA 5520Up to 750 VPN Sessions

225Mb/s Max VPNASA 5505Up to 25 VPN Sessions100Mb/s Max VPN

ASA 5540Up to 5000 IPsec Sessions

Up to 2500 SSL VPN Sessions325Mb/s Max VPN

ASA 5550Up to 5000 VPN Sessions

425Mb/s Max VPN

ASA 5580Up to 10000 VPN Sessions

1GB/s Max VPN

SOHO ROBO SMB ENTERPRISE

Market Segment

Cisco ASA VPN Remote AccessHardware Platforms

� Extensible across a broad range of enterprise

networks

� Remote access and site-to-site VPN support

� Simple network integration

� Integrated load balancing (5510+) & HA

� Common criteria (EAL4) and FIPS certified

� Extensible across a broad range of enterprise

networks

� Remote access and site-to-site VPN support

� Simple network integration

� Integrated load balancing (5510+) & HA

� Common criteria (EAL4) and FIPS certified

Page 5: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5

SSL VPN is Different from eCommerce

� Must fit into existing networks and application environments

� Must support the same authentication mechanisms and often extensive application list as supported by IPSec

� SSL VPN has multiple application support mechanisms

Content rewriting and application translation (clientless/L7)

Port forwarding (thin client)

SmartTunnel (thin client)

Dynamic VPN client (full network access/L3)

Page 6: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6

Handling Complex Content

� Port Forwarding

Local “thin” client acts as proxy

Tunnels and forwards application traffic

� Smart Tunnels

Allows Winsock v2 TCP applications to use the VPN security appliance as a proxy gateway to the private side of a network

� Plug-ins

Cirtix ICA, RDP, SSH/TELNET, VNC provided by Cisco

Extensible framework for other popular protocols

� Application Profile Customization Framework (Application Helper)

Page 7: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7

SSL VPN Tunneling: AnyConnect Client

� Traditional-style client delivered via automatic download

� Access all applications

� Supports 2K/XP/Vista (x86 & x64), Mac OS X 10.4 & 10.5, Linux x86, Windows Mobile 6

� Can use TLS or DTLS as transport

� Always up to dateAutomatic updates

No admin privileges required for updates

Persistent “Thick”, “Full Tunneling”, or “Tunnel” Client

Page 8: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8

Deployment Considerations

Page 9: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9

Deployment Considerations

� Firewall placement and configuration

� Routing

� Address assignment

� Client authentication

� Resiliency

Page 10: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10

Firewall Placement and Configuration

� Limit incoming traffic to IPsec and/or SSL for FW policy

� Use firewall to inspect IP traffic after decryption

Controlling Access to/from Public/Private Interfaces

Parallel Inline DMZ

Access Rule

Access Rule

Page 11: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11

Routing - Interfaces/VLANs

� Map users to group based on role

� Use group policy to restrict egress VLAN

User/Group Based Policies

Internal Resources Shared Resources

vlan 10

Potential VRF Integration

Page 12: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12

Routing: Address Assignment

� Proxy-ARP

IP pool/DHCP scope/static included within range of private interface subnet

No changes required to router, no routing protocol required

Transit network must have enough available IP space

� Configured/Learned Routes

IP pools are unique

More scalable and can use unique per group IP pools

Use static route(s) on downstream router pointing to private interface

Use Reverse Route Injection (RRI), note IPsec only

Use static route and route redistribution

VPN Security Appliance Uses Proxy-ARP Downstream Router Requires a Specific Route

192.168.1.0/24

IP pool:192.168.2.0/24

192.168.1.0/24

IP pool:192.168.1.128/26

Page 13: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13

Split Tunneling

Central Site

VPN Appliance

Central Site

Without Split Tunneling With Split Tunneling

http://www.cisco.com/http://www.cisco.com/

VPN Appliance

VPN Client VPN Client

Maximum Security Maximum Performance

Page 14: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

Client Authentication Design

� VPNs can utilize many types of databases for centralized authentication

Username and password

Tokens

Digital certificate/smartcards

� Authenticated against:

RADIUS

Active Directory (AD)/Kerberos

NT Domain

RSA SecurID

LDAP

Other One-Time Password server (OTP) via RADIUS

Single Sign-On (SSO)

Page 15: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15

10.10.1.X

.1

.2

.3

.4

124.118.24.X

.31

.32

.33

.34

Virtual Cluster IP Address =

124.118.24.50

Virtual Cluster Master

Client Request Connection to 124.118.24.50

Virtual Cluster Master Responds with 124.118.24.33 (Least Loaded VPN Appliance)

Client Requests VPN Tunnel to 124.118.24.33

Local/Geographical Failover/Load Balancing

Master Selected Dynamically Based on:

� First to power up

� Priority (1–10)

� Lowest IP address

Page 16: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16

Endpoint Security

Page 17: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17

Security Concerns for SSL VPN

Remote UserCustomer Managed Machine

Employee at HomeUnmanaged Machine

Supply PartnerExtranet Machine

During SSL VPN Session

• Is session data protected?

• Are typed passwords protected?

• Has malware launched?

After SSL VPN Session

• Browser cached intranet Web pages?

• Browser stored passwords?

• Downloaded files left behind?

Before SSL VPN Session

• Who owns the endpoint?

• Endpoint security posture: AV, personal firewall?

• Is malware running?

Page 18: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18

Cisco Secure Desktop

� Works with desktop guest permissions

No admin privileges required

� Complete pre-connect assessment:Location assessment—managed or

unmanaged desktop?

Gathers data for Dynamic Access Policy

Specific applications running—defined by admin

� Comprehensive session protection:Malware detection

Data sandbox and encryption protects every aspect of session

� Post-session clean-up:Encrypted partition overwrite (not just

deletion) using DoD algorithm

Cache, history and cookie overwrite

File download and email attachment overwrite

Auto-complete password overwrite

Cisco Secure DesktopWindows 2000 or XP

Original User Desktop Temporary CSD Desktop

Comprehensive Endpoint Security for SSL VPN

Page 19: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19

� Rulesets based on attributes

� Can terminate connection based on any match

� Can continue to evaluate against multiple rules

� Access Policy Attributes

Network ACL and Web ACL Filters

Portal Function Restrictions

Port Forwarding and URL Lists

Access Methods

Dynamic Access Policy (DAP)

Page 20: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20

Key Takeaways

� If your users carry their devices and installing a client is notan issues then focus on AnyConnect

AnyConnect is the client for the future

� If your users access corporate resources sporadically or you require access from non-employees then clientless SSL is best

Good for partner and occasional guest access

Good for employees that need basic services

� If your users are telecommuters that work from home then a hardware based solution is ideal

Integrates a wireless and IP hard phone solution

Can accommodate spouse and child access

What Solution Fits Your Situation Best?

Page 21: Implementing Secure and Flexible Remote Access …...Routing: Address Assignment Proxy-ARP IP pool/DHCP scope/static included within range of private interface subnet No changes required

© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21