Cisco Secure Remote Architectures Bobby Acker – CCIE #19310 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Session Topics Client-Based Remote Access Using Anyconnect Clientless Access Using WebVPN Portals Endpoint Security Using Secure Desktop New ASA 8.0/ASDM 6.0 Features © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Remote Access Using the Cisco Anyconnect Client © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Secure Connectivity Everywhere Extending the Self-Defending Network Partners / Consultants Controlled access to specific resources and applications Client-based SSL or IPsec VPN Clientless SSL VPN Mobile Workers Easy access to corporate network resources Public Internet Clientless SSL VPN ASA 5500 Client-based SSL or IPsec VPN Roamers Day Extenders / Home Office Seamless access to applications from unmanaged endpoints Day extenders and mobile employees require consistent LAN-like, full-network access, to corporate resources and applications © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 For End-Users, Access for All Applications Cisco AnyConnect VPN Client for secure remote productivity Extends the in-office experience LAN-like full-network access, supports latency sensitive apps like voice (via DTLS transport) Access across platforms Windows 2K / XP (x86/x64) / Vista (x86/x64) Mac OS X 10.4 & 10.5, Linux Intel Windows Mobile 5 Pocket PC Edition (Coming soon) Always up to date Remotely installable and configurable to minimize user demands No-hassle Connections No reboots required Stand-alone, Web Launch, Portal Connection Start Before Login (2K/XP) MSI – Windows Pre-installation package © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 For End-Users, Access for All Applications Cisco AnyConnect VPN Client – GUI Details (Statistics) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 For End-Users, Access for All Applications Datagram Transport Layer Security (DTLS) Limitations of TLS (HTTPS/SSL) with SSL VPN tunnels TLS is used to tunnel TCP/IP over TCP/443 TCP requires retransmission of lost packets Both application and TLS wind up retransmitting when packet loss is detected. DTLS solves the TCP over TCP meltdown problem DTLS replaces underlying transport TCP/443 with UDP/443 DTLS uses TLS to negotiate and establish DTLS connection (control messages and key exchange) Datagrams only are transmitted over DTLS Other benefits Low latency for real time applications DTLS is optional and will automatically fallback to TLS (HTTPS) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 For End-Users, Access for All Applications Cisco AnyConnect VPN Client – XML Profile (Start Before Login) … <ClientInitialization> <UseStartBeforeLogon UserControllable="false">false</UseStartBeforeLogon> <BackupServerList> <HostAddress>cvc-asa-02.company.com</HostAddress> <HostAddress>10.94.146.172</HostAddress> </BackupServerList> </ClientInitialization> <ServerList> <HostEntry> <HostName>CVC-ASA-02</HostName> <HostAddress>cvc-asa-02.company.com</HostAddress> </HostEntry> The Client Initialization section represents global settings for the client. In some cases (e.g. BackupServerList) host specific overrides are possible. The Start Before Logon feature can be used to activate the VPN as part of the logon sequence. Collection of one or more backup servers to be used in case the user selected one fails. Can be a FQDN or IP address. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 For End-Users, Access for All Applications Cisco AnyConnect VPN Client – Troubleshooting Windows will utilize the Windows Event Viewer. Review the log messages in Cisco AnyConnect VPN Client. Logging on Mac and Linux will utilize their ‘syslogs’ Linux default location /var/log/messages Mac location /var/log/system.log Firewall port requirements – UDP Port 443 (DTLS) TCP Port 443 (HTTPS/SSL) TLS will always be negotiated first, then it will further negotiate DTLS so you will see these messages in the log. A SSL connection has been established using cipher xxxx. A DTLS connection has been established using cipher xxxx. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 For End-Users, Access for All Applications Cisco AnyConnect VPN Client – Troubleshooting (Windows Event Viewer) An example of how Windows Event Viewer will look. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 For End-Users, Access for All Applications Cisco VPN - Client comparison Cisco VPN Client Cisco SSL VPN Client Cisco AnyConnect VPN Client Approximate size 10 MB 400KB 1.5-2 MB** Initial install distribute auto download auto download distribute distribute Initial installation only Initial installation only (Stub installer available) (MSI available – Windows) Admin rights required yes Protocol IPsec TLS (HTTPS) DTLS, TLS (HTTPS) - Auto OS Support multiple* 2000/XP multiple** Head End ASA/PIX/3K/IOS ASA/3K/IOS ASA * Windows 2K / XP/ x86 / Vista x86, Mac OS X 10.4, Linux Intel 2.6.x, and Solaris ** Windows 2K/ X P x86 & x64 / Vista x86 & x64, Mac OS X 10.4 & 10.5, Linux Intel 2.6.x, and Windows Mobile 5&6 support planned (additive license) – Systems, Non Windows support alternate connection modes available, including DTLS for ASA 8.0+ only © 2007 Cisco Inc. All rights reserved. and Cisco Confidential 11 Clientless Access Using Cisco WebVPN Portals © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 For End-Users, Seamless Access Anywhere Personalized application and resource access Personalized homepage Localizable, RSS feeds, personal bookmarks, etc. Delivers web-based and traditional applications Sophisticated web and other applications delivered seamlessly to the browser SAML Single Sign-On (SSO) – verified with RSA Access Manager Intuitive user experience Drag and Drop file access and webified file transport Delivers key applications beyond the browser Smart Tunnels deliver more applications without admin privileges © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 For End-Users, Seamless Access Anywhere Enhanced clientless interface, highly customizable Customizable Banner Message Customizable Banner Graphic Customizable Access Methods Customizable Links, Network Resource Access © 2007 Cisco Systems, Inc. All rights reserved. Customizable Colors and Sections Cisco Confidential 14 For End-Users, Seamless Access Anywhere Clientless file access Access for FTP file shares in addition to CIFS (Common Internet File System) Webfolders for Internet Explorer (native Windows explorer file access) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 For End-Users, Seamless Access Anywhere Java Client/Server Plug-ins Support for number of common TCP applications via Java plugins such as Windows Terminal Server (RDP) TELNET & SSH VNC Citrix Java Presentation Server Client (plug-in loaded by administrator) Resource is defined as a URL with the appropriate protocol type, i.e. rdp://server:port Support for these third party applications exists in the form of packaged single archive files in the .jar file format. Extensible plugin mechanism may provide support for additional applications in the future © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 For End-Users, Seamless Access Anywhere Java Client/Server Plug-ins - Details When clicking on a resource link, a dynamic page is generated that hosts the Java applet(s). The Java applet(s) are rewritten, re-signed, and automatically wrapped with Cisco’s helper agent. The Java applet(s) are transparently cached in the ASA cache. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 For Administrators For Administrators, Visual Management ASDM – SSL & IPsec Wizards Separate wizards for SSL and IPsec VPN configuration © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 For Administrators For Administrators, Visual Management New SSL VPN Wizard - Details Specify authentication method Specify group policy to use or create a new one Specify a bookmark list for the Portal page Create or use an existing address pool and specify the AnyConnect image location © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 Endpoint Security Using Cisco Secure Desktop © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 Unique Security Challenges on the Endpoint SSL VPN Brings New Points of Attack Supply Partner Extranet Machine Employee at Home Unmanaged Machine Remote User Customer Managed Machine Before SSL VPN Session During SSL VPN Session Post SSL VPN Session Who owns the endpoint? Is session data protected? Browser cached intranet web pages? Are typed passwords protected? Browser stored passwords? Has malware launched? Downloaded files left behind? Endpoint security posture: AV, personal firewall? Is malware running? © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 Comprehensive EndPoint Security Cisco Secure Desktop (CSD) now supports checking for hundreds of pre-defined products, updated frequently Anti-virus, anti-spyware, personal firewall, and more Administrators can define custom checks including running processes Posture policy presented visually to simplify configuration and troubleshooting (Pre-login sequence and Dynamic Access Policies) Cisco Secure Desktop consists of four features: Host Scan (Windows) Advanced Endpoint Assessment provides remediation and periodic rechecking capabilities (licensed option) Secure Vault (Windows 2K/XP) Cache Cleaner (Windows, Mac OS X, and Linux) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 Cisco Secure Desktop Pre-login Decision Tree Supported Checks –Registry check –File check –Certificate check –Windows version check –IP address check Leaf Nodes –Login denied –Location –Subsequence Visual policy simplifies administrative configuration © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23 Comprehensive EndPoint Security Dynamic Access Policies (DAP) The Dynamic Access Policy (DAP) is defined as a collection of access control attributes associated with a specific tunnel or session. The DAP is dynamically generated by selecting and/or aggregating attributes from one or more DAP records. The DAP records are selected based on the endpoint security information of the remote device and/or the AAA authorization information of the authenticated user. DAP will be generated and then applied to the user’s tunnel or session. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 Comprehensive EndPoint Security Dynamic Access Policies (DAP) Add AAA attributes © 2007 Cisco Systems, Inc. All rights reserved. Add endpoint attributes Cisco Confidential 25 Comprehensive EndPoint Security Dynamic Access Policies (DAP) Specific endpoint attributes Note: These drop down menus will only show up after enabling CSD and enabling Host Scan Endpoint Assessment under CSD. You can disable CSD after enabling Host Scan and applying it. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26 Cisco Secure Desktop (Secure Vault) How it Works Step One: A user on the road connects with the concentrator and the Cisco Secure Desktop is pushed down to the endpoint automatically. Step Two: An encrypted sandbox or hard drive partition is created for the user to work in Step Three: The user logs in ASA 5500 Step Four: At Logout the Virtual Desktop that the user has been working in is eradicated and the user is notified Cisco Secure Clientless Desktop SSL VPN Note: CSD download and eradication is seamless to the user. If the user forgets to terminate the session autotimeout will close the session www… and erase session information © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential EmployeeOwned Desktop 27 Cisco Secure Desktop Machine Scan © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28 Cisco Secure Desktop Login Page (After Scan) © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29 Cisco Secure Desktop Access Restricted © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30 Cisco Secure Desktop Access Denied © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31 Onscreen (Virtual) Keyboard Helps reduce the risk associated with keystroke loggers. This can be applied to the password field on the clientless SSL VPN login page or on any page that requires username/password authentication. This only applies to the password entry field. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32 Cisco ASA 5500 Series Product Lineup Solutions Ranging from SMB to Large Enterprise Cisco ASA 5505 Network Location Max Connections Packets/Sec Teleworker / Branch Office / SMB Cisco ASA 5510 Cisco ASA 5520 Cisco ASA 5540 Internet Edge Internet Edge Internet Edge 25,000 85,000 130,000 190,000 280,000 320,000 400,000 500,000 150 Mbps Future 100 Mbps 25/25 300 Mbps 300 Mbps 170 Mbps 250/250 450 Mbps 375 Mbps 225 Mbps 750/750 5 FE 50/100 A/A and A/S (Sec Plus) Cisco ASA 5550 Internet Edge Campus Cisco Cisco ASA 5580/20 ASA 5580/40 Data Center Campus Data Center Campus 650,000 600,000 1,000,000 2,500,000 2,000,000 4,000,000 650 Mbps 450 Mbps 325 Mbps 5000/2500 1.2 Gbps N/A 425 Mbps 5000/5000 6.5 Gbps N/A 1 Gbps 10,000/10,000 14 Gbps N/A 1 Gbps 10,000/10,000 4 GE + 1 FE 150 A/A and A/S 4 GE + 1 FE 200 A/A and A/S 8 GE + 1 FE 250 A/A and A/S Yes Yes Yes Performance Max Firewall Max Firewall + IPS Max IPsec VPN Max IPsec/SSL Peers Platform Capabilities Base I/O VLANs Supported HA Supported 8-port FE switch 3/20 (trunk) Stateless A/S (Sec Plus) 10 GE + 2x10GE10 GE + 2x10G 250 250 A/A and A/S A/A and A/S (Sec Plus/8.0) VPN Load Balancing No © 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential Yes Yes 33