Unified Access Control Solution Javier López – jlopez@juniper.net Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 1 AGENDA SSL VPNs Review Unified Access Control Solution Unified Access Control Scenarios Live Demo Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 SSL VPNs vs. IPSec Employee remote access SSL VPN Home workers Intranet access SSL VPN Mobile Workers Extranet access SSL VPN Sales Business Partners HR Finance Internet Customers Department Servers DMZ Branch Offices Data Center Copyright © 2004 Juniper Networks, Inc. Site-to-Site IPSEC VPN Proprietary and Confidential www.juniper.net 3 Typical Custom Extranet Deployment SW Agent Web server SW Agent DMZ Web server SW Agent Web server SW Agent Policy Server SW Agent MRP/ERP Web server Web server SW Agent SW Web UNIFIED ACCESS ENFORCEMENT: Agent server Web Dynamic Authentication Policies server Expressive Role Definition & Mapping Rules Deployment Requirements: Extensive Dynamic Resource-based Authorization & Migration of Servers into DMZ Duplication Granular Auditing & Logging OS/Server Farms & Ongoing Patch Maintenance Harden Web Single Sign-On (SSO) of public facing infrastructure Maintenance Password Management Integration AAA Multiple Hostnames & Customizable UI resources Limitation to only those integrated Custom Endpoint Policy Enforcement API development for non-Web content Copyright © 2004 Juniper Networks, Inc. Internal Corporate LAN API SW Agent Web server SW Agent API Web server API API Proprietary and Confidential www.juniper.net 4 The Secure Access Platform in the Network Corporate LAN Telecommuters Sales & Service Mobile Employees Directory Store Partner A Extranet Partners Partner B = Encrypted External Session = Standard Internal Session Copyright © 2004 Juniper Networks, Inc. Intranet / Web Server E-mail Server Farms Unix/NFS MRP/ERP Proprietary and Confidential www.juniper.net 5 Three Access Methods for Granular Secure Access •Core •Client less access •Web content / links •Web based applications •XML, Flash, JAVA •Files (Webified) •Telnet (JSAM / SSH and WSAM) •Secure Application Manager •Terminal •TCP based Client / ServerEmulation application access •JSAM •JAVA applet •Cross platform •WSAM •Active-XCore control •Transparently Access redirects application requests •Per application (client process) •Per host (Hostname / IP:port range) •MD5 Checksum for application validation •Network Connect2K/XP/98 (NC) •Windows •Network Layer tunnel •Pocket PC (Win CE) •Virtual adapter •Static, DHCP and RADIUS based IP address assignment •TCP and UDP based Client / Server application access •Server Initiated applications such as VoIP, XWindows, NetMeeting Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 6 Step 3a: Control Access – 1 URL Same person access from 3 different locations Pre Authentication Gathers information from user, network, endpoint Dynamic Authentication Roles Assignment Authenticate user Map user to role Assign session properties for user role Digital Cert = NO Source IP = outside Host Check = failure Authentication = Strong Mapped to Field role Digital Cert = YES Source IP = outside Host Check = success Authentication = Strong From a Kiosk Mapped to Sales role From the field Digital Cert = YES; Source IP = LAN; Host Check = success Authentication = PW Mapped to Office role SAM = No File = No Web Download=Yes Web Upload=No Timeout = ½ hour Host Check = Recurring SAM = Yes File = Yes Web Download=Yes Web Upload = Yes Timeout = 2 hours Host Check = Recurring Network Connect = Yes Timeout = 12 hours Host Check = No Resource Policy Grant access to resource as specified by policy Resources = CRM Web-read only Outlook Web Access • • • Resources = CRM Client/Server • Exchange Resources = Full network access From the LAN Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 7 Juniper SSL VPN Product Family: Functionality and Scalability to Meet Customer Needs Options/upgrades: •10-25 conc. users •Core Clientless Access Options/upgrades: •25-100 conc. users •SAMNC Options/upgrades: •100-2500 conc. users •SAMNC •SAMNC •Secure Meeting •Secure Meeting •Advanced w/ CM •Cluster Pairs Breadth of Functionality Options/upgrades: •50-1000 conc. users •Secure Meeting •Advanced w/ CM •Instant Virtual System •SSL Acceleration •Advanced w/ CM •Instant Virtual System •GBIC •Cluster Pairs •Multi-Unit Clusters Secure Access 4000 Secure Access 6000 Secure Access 2000 Secure Access 700 Designed for: SMEs Secure remote access Includes: Network Connect Designed for: Medium enterprise Secure remote, intranet and extranet access Includes: Core Clientless Access Designed for: Medium to large enterprise Secure remote, intranet and extranet access Includes: Core Clientless Access Designed for: Large-global enterprise Secure remote, intranet and extranet access Includes: Core Clientless Access SSL acceleration Enterprise Size Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 8 Case #1: Remote Access for Students/Teachers Mobile User 1,000’s Teachers’ Home PCs Corporate Intranet 10,000’s Students’ Home PCs Intranet Web Farm Web Mail Farm Cost Scalability Increased Security Users access from home PCs No install, configuration or support Only variable cost is authentication Unified Security Layer Across Servers Known Hardened Security Posture Common Auth’n & Auth’z Policies Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 9 Case #2: Campus Services Access School C School B Corporate Intranet School A Unix/NFS Files Cost Scalability Increased Security Rapidly Add/Drop Partners No Timely Security Negotiations No Cap Ex per Additional Partner Group Based Auth’z Policies Strong Auth’n & PKI Resource-Based Logging Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidential ERP Application Server www.juniper.net 10 AGENDA SSL VPNs Review Unified Access Control Solution Unified Access Control Scenarios Live Demo Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 11 Trend and Business Problem WAN LAN Data Center Mission critical apps, File Servers, ERP, CRM etc 11% QoQ increase in new vulnerabilities – Q2,’05 SANS Remote Office Mobile User Zotob took 96 hours from patch to full outbreak Day Extenders LAN User Widely diverse users Unmanaged or ill managed endpoints Business Partners New threats exploit common TCP ports, “Deadly” network and application-layer threats requiring both host intelligence and network-based Business critical network assets enforcement Copyright © 2005 Juniper Networks, Inc. LAN User Proprietary and Confidential www.juniper.net 12 How the Enterprise Infranet works What Does it Do? • The Enterprise Infranet couples user identity, network identity, and endpoint status with network and endpoint policies. How Does it do it? • Using a centralized policy management to push policy based on user, endpoint, network, etc to enforcement points throughout the network. Policy management is done by leveraging Dynamic Access Privilege Management (proven by #1 SSL VPN - IVE) • Enforce the policies on different points throughout the network (proven by #1 FW/VPN – ScreenOS) Copyright 2005 Juniper Networks, Copyright ©©2004 Juniper Networks, Inc. Inc. Proprietary and Confidential Proprietary and Confidential www.juniper.net www.juniper.net 13 13 Unified Access Control Solution Infranet Controller (IC) How does it work? AAA Servers Identity Stores Infranet Agent (IA) Comprehensive enterprise integration • Host Checker (J.E.D.I) • Host Enforcer (with firewall policy or optional dynamic MS IPSec enforcement) • MS Windows Single SignOn • Agentless enforcement for Mac and Linux • IA protects authenticated endpoints from malicious/non-compliant endpoints Copyright © 2005 Juniper Networks, Inc. • Access control decision point • Automatically provisions Infranet Agent (if required) • Dynamically provisions enforcement policy • Integrated remediation support Unified policy enforcement based on identity, endpoint assessment, and network Phase 1 Enforcers • Enforcers – ScreenOS 5.3 capable • NetScreen 5GT – NetScreen 5000 • From 90 Mbps to 30 Gbps Proprietary and Confidential www.juniper.net 14 Juniper Networks Infranet Controllers IC 6000 •Supports up to 25,000 concurrent endpoints per appliance •High Availability/Scalability •Multi-unit clusters •Unique hardware features • Hot swappable, field upgradeable power supply • Field upgradeable hard disk • Hot swappable fans IC 4000 •Supports up to 3000 concurrent endpoints per appliance •High Availability/Scalability •Cluster pairs Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 15 Infranet Agent • Dynamically provisioned endpoint assessment and policy enforcement agent • No pre-installed client software • Lightweight (<1Mb) • Host Checker (J.E.D.I) for endpoint assessment • Native Functionality • APIs for leveraging third party endpoint solutions • Pre login and post login endpoint assessment for compliance enforcement during entire duration of user session • Host Enforcer • Dynamic role based firewall policy • Optional dynamic MS IPSec enforcement • MS Windows Single SignOn • Agentless enforcement for Mac and Linux • Endpoint Assessment but no IPsec Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 16 Phase One Infranet Enforcers • Phase 1 incorporates Juniper FW/VPN platforms NetScreen 25 & 50 NetScreen 500 • Screen OS 5.3 Software upgrade required • 75Mbps to 30Gbps for wire speed policy enforcement in LAN HSC NetScreen ISG Series • Network security policy enforcement • DOS Protection 5 Series • Deep Packet Inspection • Anti Virus Capabilities • Content Management • Logging and Auditing • SEM, NSM Integration NetScreen 204 & 208 NetScreen 5200 & 5400 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 17 Enterprise Infranet Service Control Layer Deployment Scenarios Enterprise Infranet Controller (IC) Mobile Worker Bus. Partner AAA Servers Identity Stores Infranet Enforcer (IE) Mission critical apps, File Servers, ERP, CRM etc 3. Authorize, Authorize, 3. Enforce Log Enforce && Log J.E.D.I. APIs Native or 3rd Party Host Compliance 1.Endpoint: Assess, Authenticate,Remediate, Contain & Self-Protect Trusted Xport (IE) Data Center (IE) 2. Trusted XPort (IE) Self-Defense Enterprise Infranet Agent (IA) Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 18 AGENDA SSL VPNs Review Unified Access Control Solution Unified Access Control Scenarios Live Demo Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 19 Server Front End Deployment Scenario Data Center AAA Servers Identity Stores Network Services (DNS, DHCP) Mission critical apps, File Servers, ERP, CRM etc Infranet Enforcer (IE) Users Enterprise Infranet Controller (IC6000) Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 20 WAN Gateway Deployment Scenario AAA Servers Identity Stores Network Services (DNS, DHCP) Infranet Enforcer (IE) Users Data Center Enterprise Infranet Controller (IC4000) Copyright © 2005 Juniper Networks, Inc. Mission critical apps, File Servers, ERP, CRM etc Proprietary and Confidential www.juniper.net 21 Distributed Enterprise Branch Office Corporate Office AAA Servers Identity Stores Network Services (DNS, DHCP) Site to Site VPN Infranet Enforcer (IE) Infranet Enforcer (IE) AAA Servers Identity Stores Network Services (DNS, DHCP) Data Center Users Copyright © 2005 Juniper Networks, Inc. Users Enterprise Infranet Controller (IC6000) Mission critical apps, File Servers, ERP, CRM etc Proprietary and Confidential www.juniper.net 22 Campus – Wired Deployment Scenario Enterprise Infranet Controller (IC6000) AAA Servers Identity Stores GigE Infranet Enforcer Data Center Mission critical apps, File Servers, ERP, CRM etc Users Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 23 Campus – Wireless Deployment Scenario Enterprise Infranet Controller (IC4000) AAA Servers Identity Stores GigE Data Center Mission critical apps, File Servers, ERP, CRM etc Infranet Enforcer (IE) Generic AP Infranet Enforcer (IE) Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 24 AGENDA SSL VPNs Review Unified Access Control Solution Unified Access Control Scenarios Live Demo Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 25 Demo Network architecture Local Auth Server 172.26.60.0/24 Infranet Controller (IC-4000) Enforcer 5GT .100 .1 .101 Infranet Agent (IA) Enforcer NS-25 2.2.2.2 Untrust Zone 1.0.0.10 Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 26 Thank You Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 27