Chapter 10. Configuring Virtual Private Network Traffic Through the Intelligent Application Gateway

Introduction

As part of the Forefront infrastructure, virtual private network (VPN) traffic can be configured to pass through the Intelligent Application Gateway (IAG) using a Secure Sockets Layer (SSL) connection. VPNs allow remote users to securely connect to internal networks to gain access to resources. Previously, VPN traffic was encrypted using Layer 2 tunneling protocol (L2TP) or point-to-point tunneling protocols (PPTP), resulting in support problems such as problems with application compatibility, setup complications, and difficulty when being used over networks that use Network Address Translation (NAT).

Using encrypted VPN traffic to connect to the application gateway will help prevent data from being compromised. Using IAG 2007 Network Connector SSL VPN, this traffic is tunneled using a SSL connection. Company employees will establish connections from remote locations, such as their home or a branch office. Client computers will install a Network Connector Client application when they reach the Whale Communication IAG 2007 Portal, allowing them to connect to the internal network using SSL, and eliminate the usability problems that were previously caused by L2TP or PPTP connections.

A large number of companies are allowing employees to do work from home. Allowing employees to access the internal resources of the company’s infrastructure can benefit the productivity of a company. When users connect to the internal network using an insecure network (the Internet), there are security risks involved. In addition, the client’s computer may be in an unknown security state creating additional security risks. Using VPN, which encrypt the traffic, has helped to reduce the vulnerabilities associated with remote connection. Network administrators can use Microsoft Forefront to provide this functionality in environments and for applications for which it was previously unavailable using tunneling SSL connections through the Whale Communication IAG. Administrators can also require compliance with Windows updates, antivirus, anti-spyware, and/or other applications prior to allowing a client VPN access to the corporate network. Figure 10.1 shows the network path for a client connected using the IAG 2007 Network Connector SSL VPN.

Connecting a Client via the IAG 2007 Network Connector SSL VPN

Figure 10.1. Connecting a Client via the IAG 2007 Network Connector SSL VPN

Setting Up the Network Connection Server

The IAG Network Connector SSL VPN would be used for clients that you want to have full network-level access to the corporate network from remote clients. Similar to how LT2P and PPTP VPNs worked in the past but it will allow you to connect from network locations that were not previously possible. Some of these environments include connecting from a client that is behind a router using NAT or in environments with highly restrictive firewalls. The Network Connector also allows you to specify networking parameters including Domain Name System (DNS), WINS, Gateway, and Domain Name for clients after they connect.

Another benefit of the IAG Network Connector SSL VPN is that it supports IAG Access Policies prior to connection. This allows you to confirm compliance with important security measures, such as Windows updates, antivirus, or other software applications prior to the client being allowed to connect to the corporate network. This is a dramatic security improvement over L2TP and PPTP VPNs of the path. To begin configuring the IAG 2007 Network Connector SSL VPN, you would open the IAG Configuration Console and select Admin | Network Connector Server. The following tabs are displayed that allow you to configure the Network Connector to your specific needs.

Network Segment

The Network Segment tab is where you would go to define the network interface connector (NIC) for use by IAG. This dialog will display all of the server’s network interface connections and allows you to select the one that will be used to access the corporate network. This NIC should be the one that is connected to the internal corporate network and it will display the current networking parameters that are active for this NIC on the server. Figure 10.2 shows this configuration page and the different options.

The Network Segment Configuration Page

Figure 10.2. The Network Segment Configuration Page

This tab also included a Complementary Data area, which allows you to define networking parameters including DNS, WINS, and the network gateway. You can specify that these settings override the server’s own settings, or have them only apply to the server that doesn’t have these settings configured. These are the settings that will be provided to clients after they connect using the Network Connector. This might be needed if you want to provide your client different settings, such as a specialized WINS server or a special remote client DNS server that only includes name resolution for specific computers and applications.

IP Provisioning

The IP Provisioning tab is where you would go to define the different Internet Protocol (IP) ranges that will be given to clients when they connect using the Network Connector. All of the address ranges listed will need to be either corporate IP Addresses or private IP Addresses as a mixture of addresses is not supported. If your corporate network uses 10.1.0.0/255.255.0.0 as its corporate IP address space, you may decide to dedicate 10.1.254.2-10.1.254.254 as the corporate address pool for use by the Network Connector SSL VPN. For a private address pool, you may choose to use 192.168.254.2-192.168.254.254. If you specify corporate addresses, you will need to exclude these addresses from your corporate Dynamic Host Configuration Protocol (DHCP) server; otherwise, you could cause IP conflicts. If you select Private IP addresses you will also need to ensure that the address pools specified are properly routed through your network gateway to the IAG server and properly configured in your corporate firewalls. With both corporate and private addresses, the DHCP service needs to be installed and running on the IAG server in order to assign IP addresses to remote clients (see Figure 10.3).

Assigning Corporate and Private IP Addresses

Figure 10.3. Assigning Corporate and Private IP Addresses

Access Control

The Access Control tab allows you to set the access restrictions that will apply to the clients that are connected via the Network Connector. The Internet Access section allows you to define how a client will connect to the Internet. This can be either Split Tunneling Mode, where Internet Traffic bypasses the VPN, Non-Split Mode, where Internet traffic is routed through the corporate connection, or No Internet Access, where the client allows access to only resources defined on the Network Connector server (see Figure 10.4).

Access Control

Figure 10.4. Access Control

Additional Networks

The Additional Networks tab is where you would select any other networks that should be available to the Network Connector clients when they connect to the Network Connector SSL VPN. In addition, you will need to determine how client IP conflicts are handled. The choices are Fail, Prompt, and Skip. These options determine if a client is open on a Network Connector SSL VPN connection even if they are presently on one of the additional networks. The IP Pool does not need to be included, as that is done automatically. Take special care to include any addresses that your users may need to be able to contact, including infrastructure servers such as DCS, WINS, and DNS, in addition to any application server that they may need to access such as file, print, e-mail, and the location of their desktops for Remote Desktop Protocol (RDP) access. You should also take care to not be overly broad when you define your additional networks, since unmanaged clients may be able to access them and perhaps launch attacks against them. Only seven IP address ranges can be specified as additional networks (see Figure 10.5).

Defining Additional Networks

Figure 10.5. Defining Additional Networks

Advanced Tab

The Advanced tab allows you to set three groups of settings (see Figure 10.6). The first is the Network Connector Listener protocol and port. The default is Transmission Control Protocol (TCP) and Port 6003. The second group of settings is related to the log settings including the log level and location. The log levels range from 1 (minimal) to 5 (verbose). Be careful when increasing the log level as the logs can be extremely large when in verbose mode and affect system performance. The third group of settings allows you to modify the number of threads per central processing unit (CPU), buffer levels, and timeouts.

The Advanced Tab

Figure 10.6. The Advanced Tab

Adding the Application

After the Network Connector server has been configured and activated, you will need to add the application as an option in the IAG 2007 Portal. You can add the application by opening the IAG Configuration Console and running the Add Application Wizard, selecting Client/Server and Legacy Applications and the Network Connector. On the next screen you would give the Network Connector an application name in the portal, and define who is authorized to use the application and the access policy. The next screen displays the settings configured under the Network Connector server configuration and it also allows you to select Launch Automatically on Start, which launches the Network Connector Client upon login to the Portal. The final wizard screen allows you to organize the application in a folder and provide a short and full description for the application.

Connecting Through the Virtual Private Network

When clients first connect to the IAG 2007 Server Portal, they will be asked to download the Whale Communications’ Client Components v3.7 if they are on machines that support ActiveX (see Figure 10.7).

Whale Communications Client Components v3.7

Figure 10.7. Whale Communications Client Components v3.7

After installation of this ActiveX software package, the IAG portal will run a client compliance check against the connecting client. This compliance check will determine if your client has the software components required to access the portal. These components may include the presence of Windows updates, anti-spyware, antivirus software, and/or any other compliance requirement that is specified by the administrator of the IAG server. Once this compliance check has completed successfully, the logon screen will be displayed. If the client does not support ActiveX, the user will be taken directly to the login screen and no compliance check will be performed. After successfully logging into the server, you will be presented with a list of applications that are available for your use. One of these applications may be the Network Connector, which is the SSL VPN that operates at the network layer. Depending on the configuration, this Network Connector could also be automatically activated when you login to the portal. If the client supports ActiveX, a second installation will occur for the Network Connector client components. If the client does not support ActiveX but does support Java, a Java install of the Network Client will begin. You can determine the status of the Network Connector by selecting its icon in the system tray for the ActiveX version or a second Web page for the Java version. You can see the icon for the network connector and the status screen in Figure 10.8.

Portal Activity

Figure 10.8. Portal Activity

Once the Network Connector has successfully connected, you will be able to access your private corporate resources just as if you were located at the network. If you are using the ActiveX version, all internal and SSL wrapper-based applications will be tunneled through the network connector. If you are using the Java version, only Internet applications will be tunneled through the network connector. SSL Wrapper applications launched through the portal will use a separate SSL connection and not be tunneled over the Network Connector.

Summary

The Network Connection server provides your users with a new option for secure remote connectivity. The SSL VPN improves upon LT2P and PPTP by allowing connectivity in network environments where it was not previously possible, such as homes, hotels, or sites with highly restrictive firewalls. It will also allow you to access your clients as if it were on the local network, which can be useful for things such as software distribution and remote control. Unlike LT2P and PTPP connections, the SSL VPN can be configured to confirm client compliance prior to allowing a connection. This ensures that the client meets a minimum security standard prior to being allowed to connect to the corporate network. This is extremely important with the increased utilization of remote access on unknown computers of questionable security.

The following network diagrams will show how data is transmitted by the client, over the Internet, and into the corporate network when the network connector is connected.

Solutions Fast Track

Setting Up the Network Connector on a Corporate Network with Split Tunneling Internet

Setting Up the Network Connector on a Corporate Network with Split Tunneling Internet

The IAG Network Connector SSL VPN would be used for clients that you want to have full network-level access to the corporate network from remote clients.

Setting Up the Network Connector on a Corporate Network with Split Tunneling Internet

The Network Segment tab is where you would go to define the network interface connector for use by IAG.

Setting Up the Network Connector on a Corporate Network with Split Tunneling Internet

The IP Provisioning tab is where you would go to define the different IP ranges that will be given to clients when they connect using the Network Connector.

Connecting Through the Virtual Private Network

Connecting Through the Virtual Private Network

IAG 2007 supports the option of a Network Connector Java client in addition to the Network Connector ActiveX client.

Connecting Through the Virtual Private Network

If you are using the ActiveX version, all internal and SSL wrapper-based applications will be tunneled through the network connector.

Connecting Through the Virtual Private Network

SSL wrapper applications launched through the portal will use a separate SSL connection and not be tunneled over the Network Connector.

Frequently Asked Questions

Q:

What advantage does the IAG 2007 Network Connector SSL VPN have over PPTP and/or L2TP VPNs?

A:

The IAG 2007 Network Connector SSL VPN eliminates many of the problems with application and network compatibility that can occur with PPTP or L2TP VPNs. In addition, there is no configuration required to set up the VPN; the client just logs into the portal and launches the Network Connector application. An additional benefit of the IAG 2007 Network Connector SSL VPN is that it allows administrators to set up software compliance rules for clients that apply prior to the connecting to the VPN. This ensures that the connecting clients meet the security requirements, such as current antivirus and patches, to ensure that clients will not cause security issues on your corporate network.

Q:

Why would you choose to use the IAG 2007 Network Connector SSL VPN over the IAG 2007 SSL Application Wrapper?

A:

The Network Connector SSL VPN is a good choice when you are working with applications that are not directly supported by the IAG 2007 SSL Wrapper. These may include File Transfer Protocol (FTP), Voice over Internet Protocol (VOIP), and video conferencing. It is also useful for people who need access to a large variety of corporate applications and/or file shares that are not defining as applications in the IAG 2007 Portal. In addition, the Network Connector SSL VPN also allows administrators access to the remote machine just as if it were on the corporate network. This can be extremely useful for software or patch installation and troubleshooting.

Q:

Which IP provisioning pool method should you choose?

A:

The IP Provisioning Pool Method is a difficult decision that is highly dependant on your network configuration as well as your desire to separate internal corporate traffic from Internet traffic. If you select Corporate Network, the clients will appear to be the same as any other client on your internal corporate network. If you select Private Network, the clients will connect to a private IP segment and traffic is routed through the IAG server.

Q:

Which Internet Access method should you choose?

A:

There are three options for Internet Access Methods for Network Connector Clients. The first option is Split-Tunneling, which is generally the preferred option. This option allows clients to bypass the Network Connector when they access the Internet. This increases their speed, as they have a direct connection to the Internet that is not slowed down by encryption. This also removes the traffic from your corporate network. The second option is Non-Split Tunneling. In this option, all Internet access is routed through the corporate network. The advantage of this method is you can monitor and secure this access using your corporate firewall. The disadvantage is it will be a slower access method for your user and increase the traffic on your corporate network. The third option is No Internet Access, which removes a client access to any part of the Internet. This option increases security because it prevents a client from being connected to the Internet and your corporate network at the same time. The second and third options also have an additional selection for Disable Access to Local Network. This can increases security even more by preventing access between the local network of the client and your corporate network. This last option will also disable access to local network printers when a user is connected to the corporate network. This may be desired or undesired depending upon your security and usability requirements.

Q:

Is the IAG 2007 Network Connector SSL VPN compatibly limited to Windows and IE?

A:

The Network Connector is compatible with a number of operating systems and browsers. For Windows, using IE the Network Connector will use an ActiveX-based installation of the client components. For other browsers, the Java-based client will be installed. The Java Runtime Environment version 1.4 or higher is required for the installation of the client component. On Mac OSX, you will also need to install the Java Embedding Plug-In in order for the Network Connector to work. On any computer, only one version of the Network Connector can be running at any one time.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.222.47