Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Encrypting Wireless Data with VPN Techniques
SLAC Remote Access and Citrix XPe Brian Scott SLAC May 2004.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
Enabling IPv6 in Corporate Intranet Networks
Citrix Secure Gateway Technical Training. 2 Agenda By the end of this session, you should be able to: n Explain the role CSG plays in a MetaFrame deployment.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Firewall Configuration Strategies
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Installing Citrix Secure Gateway Andrew Wilmot Citrix Technical Business Development Manager Abcd IT Citrix Technical Overview.
Virtual Private Network
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Smart Card Single Sign On with Access Gateway Enterprise Edition
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Barracuda Load Balancer Server Availability and Scalability.
© 2005,2006 NeoAccel Inc. Partners Presentation SSL VPN-Plus 2.0 Quick Start Guide.
Access Gateway Operation
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Sudarshan Yadav Sr. Program Manager, Microsoft
Designing Secure SharePoint External Access Ondrej Sevecek | MCM: Directory | MVP: Security |
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
G CITRIXHACKIN. Citrix Presentation Server 4.5 New version is called XenApp/Server Common Deployments Nfuse classic CSG – Citrix Secure Gateway Citrix.
Integrating and Troubleshooting Citrix Access Gateway.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Securing Access to Data Using IPsec Josh Jones Cosc352.
Secure Access Link (SAL): Supporting Cost Savings and Improving Secure Access.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
MetaFrame Secure Access Manager Overview Presented by Douglas A. Brown.
Contents Software components All users in one location:
Remote Access Lecture 2.
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Secure Gateway Today Internet Internet Explorer and ICA MetaFrame
Chapter 10: Advanced Cisco Adaptive Security Appliance
HACKIN G CITRIX.
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001

Learning Objectives In this session, you will: Get a preview of the new features and benefits of the Citrix Secure Gateway. Learn how Citrix Secure Gateway (CSG) can provide Internet-based access to applications for remote employees, customers, and partners.

Agenda Business Goals and Drivers Citrix Goals and Solution What is CSG? CSG Architecture CSG Technology Preview Citrix Security Solutions Demonstration Summary, Q&A

Business Goals Leverage Internet to deliver value outside of traditional models. Demonstrable ROI Do more with less Do it before the competition does

Business Drivers Remote access for employees, customers, and partners B2B and B2C customers displaced across many geographic locations Web Browser with highly limited Internet connection only assumption Access to key business applications Security Speed to market and development costs

Citrix Goals Build a solution to securely and simply deliver MetaFrame applications across the Internet, on demand, to any device.

Barriers to implementation ICA port 1494 not normally open on firewalls, difficult to open up Use standards based encryption, protect against “man-in-the-middle” attack (Secure ICA is vulnerable to such attacks) Large, difficult, intrusive, VPN client installs not suitable for many deployment types Cost of VPN solutions, especially to large customer base Hide MetaFrame servers from being seen or directly accessed from Internet

What is CSG? Gateway between an SSL enabled ICA client and one or more MetaFrame servers Tunnels ICA traffic inside SSL. Limited to ICA only – not a general purpose VPN. Runs independently from MetaFrame, links into NFuse for authorization Three components: CSG Server Secure Ticket Authority Modified NFuse Previously known as project “Snowy”

Solution Components Citrix Secure Gateway (CSG) Other components: Metaframe NFuse SSL enabled clients Optionally Secure web server and/or portal (e.G. Citrix XPS) Replaceable authentication (e.G. SecurID, smart card) ICA client object (ICO)

CSG components Client Workstation CSG Server NFuse/Web Server MetaFrame Server Farm Secure Ticketing Authority (STA)

CSG with NFuse HTTP/S Secure Web Server Web Browser MetaFrame Server Farm NFuse Citrix XML Service XML-HTTP/80 ICA/ ICA Client CSG Server DMZ Initial connection is always established with the web server. The user may not even have Citrix client installed. ICA/SSL 443

5. Ticket Verification 5. ICA/ ICA File 4. ICA/SSL CSG Ticketing 1.Standard NFuse ICA Name Resolution Production MetaFrame Farm Secure Web Server NFuse Secure Ticketing Authority ICA Client Web Browser 1. Standard NFuse XML CSG Server DMZ 3. ICA File XML Service 5. CSG server verifies ticket and opens ICA connection. 3.CSG ticket is delivered to ICA client as the part of ICA file. 4.CSG ticket is delivered to CSG server as the part of SOCKS inside SSL information. 2. Ticket Generation 2.Requested CSG ticket on application launch

CSG Architecture 1 Authorization based on ticketing, leverages NFuse for Authentication Compatible with wide range of authentication systems Replaceable Secure Ticketing Authority (STA) Works with replaceable auth – e.g. SecurID, Smartcard Operates in Gateway mode – installed in DMZ Highly scalable – by design Single CSG server can support 1000 to 2000 concurrent connections Highly reliable – fail-over support for STA, external Load Balancer for main CSG Server.

CSG Architecture 2 Uses XML for inter-component communication Components are easily replaceable by Citrix or 3-rd party SOAP is considered as the next step No changes necessary to MetaFrame servers Can be quickly installed into existing system

Packaging Provided at no additional cost to valid Subscription Advantage customers Download only Included in future MetaFrame release English and possibly Japanese (product is Internationalized) v1.0 Windows 2000 server platform

Technology Preview Private Preview, available from hidden URL Create CDN account and login before entering URL. Time-bombed to expire 1 st Feb 2002 Windows 2000 and IIS/NFuse only No support – feedback to Need at least 2 machines, one running CSG, the other NFuse/STA. 3 machines is recommended. Need server SSL certificate & High Encryption Pack

Things to come Q1/ –Solaris Q3/Q4 – v1.5 – Possible features: Improved Management (SNMP, WMI, MMC) TLS support Government certifications End to End SSL SDK We need your feedback on CSG directions!

Citrix Solutions ICASecure ICA SSL Relay CSG Server Citrix Extranet Lower security Highest Security SSL Solutions

Use what, when? Use SecureICA when: · Secure DOS or Win 16 access is necessary · Have old devices/ ICA clients that cannot be upgraded · Risk of “man-in-the-middle” attack is acceptable Use SSL Relay when: · Small number of MetaFrame servers to support (<5) · No need to secure access at DMZ · No need to hide server IP addresses, or NAT is used · Need end-to-end encryption of data between client and server

Use what, when? Use Citrix Secure Gateway when: Large number of servers to support Want to hide internal network addresses Want to secure from DMZ Need 2 factor authentication (in conjunction with NFuse) Need non-intrusive client install e.g. access from Internet cafes Use Citrix Extranet or another VPN when: Need 2 factor authentication Need to create a secure pipeline for full (beyond ICA) network access Need to create secure tunnels between sites Want to secure from within DMZ Access is normally via same workstation i.e. OK to install intrusive Client Want to use IPSEC

Key information sources CSG Tech Preview Feedback to Product Manager:

Demonstration Summary Q&A