ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.

Slides:



Advertisements
Similar presentations
AI3 Contact Server Takeshi Usui
Advertisements

The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
How to INSTALL THE CERTIFICATE
Visibility. Then Control. Keep good employees from doing bad things on the Internet.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
Module 5: Configuring Access to Internal Resources.
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
MS Proxy Internet Microsoft Proxy Server Secure Network LAN.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
0-1 Team 1 Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auto-Owners.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Proxy servers By Akshit, Jay and Bhum Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Ing. Ondřej Ševeček | GOPAS a.s. | MCM: Directory Services | MVP: Enterprise Security | | |
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
MD703 Class 9 Agenda Computer Security SSL encryption and Internet security Network Security Chapter 3 Review Chapter 8 Review.
Wireless and Security CSCI 5857: Encoding and Encryption.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Web Design Vocab 12 The Last one! Applet, HTTPS, RGB Color, Rollover, Server.
Chapter 4: Core Web Technologies
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
Data Sources Back End Systems Enterprise Application Integration Data Aggregation Multi- Channel Access Gateway Mobile Middleware EAI Adapters.
System Administration and Maintenance. Proxy Server 1 Purpose – – To separate internal network from internet (NAT) To cache often used content User control:
FTP Web SQL Web failover SQL backup backup Active Directory Active Directory Failover Cluster.
IBM OmniFind Enterprise Edition V9.1 – July 2010 Data Source – FileNet P8 crawler overview  Key features: –Access to FileNet P8 Content Engine by using.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Interactive TV Team. Parts of software  Admin control panel (UI) Any control panel designed for a specific use, our target basketball game.  Restful.
Class 6 Agenda Midterm Review Midterm Review –Questions –Toyota Case Computer Security Basics Computer Security Basics –Identification & Authentication.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
FTP Web SQL Web failover SQL backup backup Active Directory Active Directory Failover Cluster.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Agenda Midterm Notes Taco Bell Case Chapter 5 Computer Security.
LockoutGuard Protect AD accounts from Extranet attacks Copyright ©2008 Collective Software, LLC.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
James Robnett EVLA M&C Software PDR May EVLA Monitor & Control Software PDR Monitor & Control Network Security.
Shell Interface Shell Interface Functions Data. Graphical Interface Graphical Interface Command-line Interface Command-line Interface Experiments Private.
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Client Access – Published applications Control through TEMPLATE.ICA Use SSL Authentication level –Remove: EncRc5-0 EncRc5-40 EncRc5-56.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
1 Microsoft Outlook Web Access Outlook Web Access Overview Outlook Web Access Environments.
Designing a Secure Extranet with Sharepoint Russ Basiura Principal Consultant RJB Technical Consulting
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Chapter 5 Electronic Commerce | Security Threats - Solution
Module 3: Enabling Access to Internet Resources
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
Introduction to Computers
Implementing TMG Server Publishing
Install DoD CA Certificate Instructions for IE
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Secure Gateway Today Internet Internet Explorer and ICA MetaFrame
TLS and DLP Behind the green lock.
SSL Decryption Explained
File Operations Access Permissions.
Communications & Computer Networks Resource Notes - Introduction
8.1 Active Directory Rights Management Services (AD RMS)
Decrypted Encrypted Web Server Client-side Secure Tunnel
Presentation transcript:

ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC

ISA Proxy: HTTP ISA Server and Web Filters Anti- Virus Content Filters Data Loss Prevention Web client Internet -- LAN -- ??? OK??? OK HTTP Top Secret !!

ISA Proxy: SSL ISA Server and Web Filters Web client Internet -- LAN -- ??? HTTPS ??? Blind SSL Tunnel Top Secret No filtering possible! !!

ISA Proxy with ClearTunnel ISA Server and Web Filters Web Filters Web client Internet -- LAN -- ??? OK??? OK HTTP Top Secret !! SSL Server SSL Client ??? OK HTTPS ??? OK HTTPS

ClearTunnel Architecture ISA Server and Web Filters Web Filters SSL Client SSL Web Servers server2 ??? OK HTTPS server1 server3 Plain HTTP

ClearTunnel Architecture ISA Server and Web Filters Web Filters Delegate SSL Server server3 server2 Root server1 Plain HTTP Active Directory Certificate Services

ClearTunnel Architecture ISA Server and Web Filters Trust SSL Server ??? OK HTTPS Web client Root server3 server2 server1 Active Directory Certificate Services

ClearTunnel Architecture ISA Server and Web Filters Web Filters Delegate SSL Server server3 server2 SSL Client SSL Web Servers Root server2 server1 ??? OK HTTPS ??? OK HTTPS server1 server3 Web client Trust Root Active Directory Certificate Services