430 likes | 724 Views
Introduction to JMU’s SSL VPN. Mike Bayne 15 September 2011 http:// www.jmu.edu/computing/security/sslvpn-intro.pptx. What is a VPN?. Virtual Private Network Provides an encrypted tunnel between a client computer and a remote network
E N D
Introduction to JMU’s SSL VPN Mike Bayne 15 September 2011 http://www.jmu.edu/computing/security/sslvpn-intro.pptx
What is a VPN? • Virtual Private Network • Provides an encrypted tunnel between a client computer and a remote network • Remote termination proxies the connection to other resources • All or some traffic routed to remote network
VPN terminal JMU Border VPN Operation
Why use the VPN? • Gain remote access to applications and data deemed too sensitive to expose directly to the Internet • Student Administration system • Gain remote access to resources licensed to JMU by IP address • Microsoft site license • Online library resources
Old VPN: Cisco VPN • Required a client • No support for new OSes • No support for mobile devices • Tunneled all traffic over UDP • All traffic had to go through JMU, even if not destined for JMU • Access required configuration on firewalls • Rapidly approaching end-of-life
New Hotness: Juniper SA6500 http://www.juniper.net/us/en/products-services/security/sa-series/sa6500/
Juniper SA6500 SSL VPN • Support for newer OSes • Support for mobile devices • Uses web browser for basic access • Java clients for advanced access • LDAP or Active Directory authentication • Access granted based upon roles
Compatible Mobile Devices(Web & File Browsing) • iPhone OS 3.0 and above with default Safari • Android 2.0 and above • SymbianOS 8.1 and above • Windows Mobile 6.0 Standard, Classic and Professional: Pocket IE 6.0 • Windows Mobile 6.1 Standard, Classic and Professional: Pocket IE 6.0 • Windows Mobile 6.5 Standard, Classic and Professional: Internet Explorer Mobile 6.0 • Windows Mobile 5.0 based Pocket PC devices: Pocket IE 4.0 • NTT I-mode phone • AU/KDDI phone : Open wave Mobile Browser • Vodafone phone : Open wave Mobile Browser
SSL VPN Connection Methods • Web Connect • WSAM/JSAM • Network Connect • Junos Pulse (Mobile clients)
Web Connect • Default connection • Provides access to: • Web resources • File Access • Remote desktop • SSH access • Solution for most connections at JMU
Windows Secure Application Manager (WSAM) • Windows only • Java program or Activex control • Inserts a shim into the network stack • Network access to preconfigured resources are directed through the VPN • Resources MUST be preconfigured on the VPN
Java Secure Access Manager(JSAM) • Java based proxy • Maps local port to remote destination through the SSL VPN • Example: hrweb.jmu.edu:443 is mapped to local port 8000 • Connections to https://127.0.0.1:8000 is forwarded to hrweb.jmu.edu:443 • Either WSAM or JSAM per role, not both • Not currently used at JMU
Network Connect • Most impact on JMU and client system • Java application • Behavior similar to existing Cisco VPN: all traffic is routed through the VPN to JMU’s network
Junos Pulse • Network Connect for mobile devices • All traffic tunneled through the VPN • Untested
Resources • Network resources that users are allowed or denied access to • Identified by host and port, subnet, URI, etc • Can be specific enough to allow access to parts of a website while denying access to others
Roles • Group of people that share similar access • Role membership can be identified by LDAP group membership or attribute • Role membership can be enumerated within the SSL VPN • Most roles are enumerated • Want to move to LDAP/AD as identity management matures • Users are often assigned multiple roles
Realms • Logical container containing authentication source and login pages • May be accessed either by a new domain name or by a new URL • https://student.sslvpn.jmu.edu • https://sslvpn.jmu.edu/student
How They Fit Together • Roles are added to a realm • Roles may be in more than one domain • Resources are added to roles • Both permit and deny resources are added • Default deny of access to unmentioned resource • Users accumulate resources from each role they’re assigned to
Challenges Ahead • Moving from enumerated roles to group/attributes in a directory • Identifying resources that don’t work with web connect and developing workarounds • Internal JMU applications • Externally licensed resources (750+ through the library alone)
Unused Features • Endpoint Security • Malware protection • Antivirus version monitoring • Patch management monitoring • Cache Cleaner • Two-factor authentication • One-time passwords • Certificates • Single Sign-on • Restrictions to access from certain subnets • Restrictions to browsers