EMS Summit – Network Remote Access William E. Ott Friday August 25, 2006 1300 – 1400 EDT VPN Solutions Voice over IP Secure e-mail.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Building a Wide Area Public Safety Network Technologies Used, Lessons Learned EMS Summit October 2, 2003 William E. Ott, MS, Paramedic.
Guide to Network Defense and Countermeasures Second Edition
Standards Certification Education & Training Publishing Conferences & Exhibits Using Outbound IP Connections for Remote Access EXPO 2005 Chicago, IL.
Mike Bayne 15 September 2011
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
SCSC 455 Computer Security Virtual Private Network (VPN)
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Columbus Convention Center - October 1, 2008 Meeting Room E171 James Matheke Greg Perkins.
Remote Networking Architectures
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Course 201 – Administration, Content Inspection and SSL VPN
Intranet, Extranet, Firewall. Intranet and Extranet.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Copyright ©Universalinet.Com, LLC 2009 Implementing Secure Converged Wide Area Networks ( ISCW) Take-Aways Course 1: Cable (HFC) Technologies.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Appendix A UM in Microsoft® Exchange Server 2010.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
VPN’s & Remote Access Issues David Trepp VP of Technology
Barracuda SSL VPN 2012.
Instructor Materials Chapter 1: WAN Concepts
Virtual Private Networks
Securing the Network Perimeter with ISA 2004
Chapter 1: WAN Concepts Connecting Networks
Check Point Connectra NGX R60
Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
AT&T Firewall Battlecard
Presentation transcript:

EMS Summit – Network Remote Access William E. Ott Friday August 25, – 1400 EDT VPN Solutions Voice over IP Secure

Secure Communications Secure Remote Access is essential if you have multiple sites or the need for external users to connect to internal resources Secure Remote Access is essential if you have multiple sites or the need for external users to connect to internal resources Voice traffic is starting to move to data circuits (VoIP) Not secure on its own Voice traffic is starting to move to data circuits (VoIP) Not secure on its own How do you secure traffic? How do you secure traffic?

Impediments to Remote Access Cost Cost Availability Availability Technical support Technical support Bandwidth Bandwidth Security Security

Traditional Remote Network Connectivity Options Network Connection Technologies Private circuits (i.e. frame relay) Expensive Dialup Slow Network Service Technologies telnet, ftp, ssh, http, https, proprietary Some are secure, some are not Architecture Remote circuits terminated directly into the core of the enterprise network Insecure

Classical Enterprise Connectivity

New Requirements / New Threats Internet Access For the enterprises From our homes The Web Sharp increase in Internet use Browsers become ubiquitous Broadband Fast Economical Internet Access Shared infrastructure Public exposure The Web Sharp increase in Internet use Access to content: useful and malicious Broadband Remote endpoints (i.e. home PCs) always on

Access Types Considered Dial-Up – Already in use Dial-Up – Already in use Dedicated Access (T1, Frame) – Already in use Dedicated Access (T1, Frame) – Already in use Network to Network IPSEC VPN Network to Network IPSEC VPN Client to Network IPSEC VPN Client to Network IPSEC VPN SSL VPN SSL VPN

Security Requirements Define the perimeter Define the perimeter A perimeter exists every place where there’s a differentiation in policy or responsibilityA perimeter exists every place where there’s a differentiation in policy or responsibility Identify and authenticate remote sites and users Identify and authenticate remote sites and users Consider “strong” and multi-factor authentication optionsConsider “strong” and multi-factor authentication options Provide privacy & integrity for communications Provide privacy & integrity for communications Business dataBusiness data Authentication credentialsAuthentication credentials Secure endpoints Secure endpoints Apply enterprise security policy to remote endpointsApply enterprise security policy to remote endpoints Limit exposure Limit exposure Remote users probably don’t need to access “everything.”Remote users probably don’t need to access “everything.”

Solutions? Virtual Private Networks Virtual Private Networks IP-SecIP-Sec Remote network access Remote network access SSLSSL Remote application access Remote application access SSHSSH Remote administration Remote administration

Remote Assess: the parts Assess Assess Diverse client baseDiverse client base Distributed client baseDistributed client base Access to applications and dataAccess to applications and data Minimize delivery timeMinimize delivery time Minimize agency support requirementsMinimize agency support requirements Conform to federal requirements including two factor authenticationConform to federal requirements including two factor authentication SecuritySecurity

Plan the solution

IP-Sec Types Types Site to SiteSite to Site Remote ClientRemote Client Security Considerations Security Considerations EncryptionEncryption AuthenticationAuthentication Split TunnelingSplit Tunneling Client Policy EnforcementClient Policy Enforcement Firewalls (inside and outside the VPN)Firewalls (inside and outside the VPN)

Site to Site IP-Sec

Client IP-Sec

IP-Sec VPN Pros and Cons Pros Pros Well suited to replace private circuitsWell suited to replace private circuits “On the network,” user experience“On the network,” user experience Extensive support for various encryption algorithms and authentication optionsExtensive support for various encryption algorithms and authentication options Mature technologyMature technology Cons Cons Quality of Service dependent on shared network (i.e. the Internet)Quality of Service dependent on shared network (i.e. the Internet) Client application requiredClient application required Limited cross-vendor interoperabilityLimited cross-vendor interoperability Some configurations are not compatible with NATSome configurations are not compatible with NAT

Remote Office VPN Targeted at sites with > 10 users Secure (IPSec) VPN Inter-agency Alliance managed end-to-end Connectivity to Legacy applications and new inter- agency alliance portal Client premise equipment Firewall/VPN Device /100 Ethernet port Objective Minimize impact of new solution on legacy networks while providing flexibility of deployment

Firewall PC Internet Alliance Client Network Local Integration Topology Inside, DMZ, Outside Addressing Client provides single IP address for VPN Address translation Routing Changes Client routes alliance applications to VPN Firewall PC Internet Alliance Firewall PC Internet Alliance

SSL VPN Types Remote Client Security Considerations Encryption Authentication Application publication HTTP Citrix / MS Terminal Services / Common Services SSL VPN client application may be used to proxy other application types or even establish a full PPP connection In which case, the IP-Sec security considerations apply

SSL VPN

SSL VPN Pros and Cons Pros Pros Super-easy access to enterprise application infrastructureSuper-easy access to enterprise application infrastructure Ability to “publish” non-web applicationsAbility to “publish” non-web applications Ability to use standard web browser to access published applicationAbility to use standard web browser to access published application Cons Cons Client VPN onlyClient VPN only Client application still required for “on the network” experienceClient application still required for “on the network” experience

SSL VPN Targeted at mobile or sites with < 10 users Targeted at mobile or sites with < 10 users Enrollment and Support for Multiple members Enrollment and Support for Multiple members Provides clientless access to alliance resources Provides clientless access to alliance resources Requires only a browser and internet connectivityRequires only a browser and internet connectivity 2-factor authentication 2-factor authentication One-Time password tokenOne-Time password token Token delivery efficiency Token delivery efficiency

SSH Primarily for remote administration Encrypted “telnet” and “ftp” Port forwarding Highly interoperable Supports nested tunnels Can be used in a bastion host architecture to provide secure remote access

Bastion Host

Architecture Best Practices Identity Management Identity Management Authentication Authentication Authorization Authorization Logging Logging Client system policy compliance Client system policy compliance Split tunneling (IP-Sec) Split tunneling (IP-Sec)

An Integrated Architecture

Remote Access Summary Begin by determining what portions of the environment must be accessed remotely Select the secure remote access solution that meets your needs Understand the security architecture of the solution you use Develop the appropriate architecture Integrate the solution with other security services as necessary

Remote Access Summary Have a broad view of how the solution will be used Have a broad view of how the solution will be used Placement of equipmentPlacement of equipment InfrastructureInfrastructure Applications being accessedApplications being accessed Clearly define the process for provisioning tokens and providing user access Clearly define the process for provisioning tokens and providing user access

Voice over Internet Protocol VoIP is growing rapidly VoIP is growing rapidly VoIP traffic should be secured site to site if used for sensitive information VoIP traffic should be secured site to site if used for sensitive information VoIP has excellent crisis communications capability VoIP has excellent crisis communications capability VoIP is often cheapest method of telephony from overseas VoIP is often cheapest method of telephony from overseas

Security HIPAA concerns with HIPAA concerns with to wireless devices to wireless devices from remote or home users from remote or home users with vendors and clients with vendors and clients Internal between sites Internal between sites If isn’t ‘managed’ you have no control once sent If isn’t ‘managed’ you have no control once sent Many options Many options

What technologies are emerging Faster wireless Faster wireless Real time video Real time video High resolution cameras in phones High resolution cameras in phones Convergence of data, voice, video into single devices Convergence of data, voice, video into single devices

Questions?