A Smart VPN - Infotecs GmbH

A Smart VPN
12 Insights into ViPNet Technology
Preface
When security issues arise, you search for a powerful and compatible security solution. Today
an entire range of advanced functional solutions singles out the ViPNet technology among
other tools for building virtual private networks (VPN).
A ViPNet VPN is a secure and reliable VPN solution with reasonable implementation cost. It’s
been designed for most convenient and effective usage and transparent centralized management. It can embrace thousands of hosts and yet be flexible and easy to manage.
Contens
Intro
■■ What is a ViPNet VPN?
■■ ViPNet VPN: Advantages at a Glance
Security
■■ 1. Strong Encryption
■■ 2. Local Traffic in a LAN is Protected
■■ 3. Cloud Data is Secure
Convenience
■■ 4. Centralized Management
■■ 5. Flexible Topology
■■ 6. A Scalable VPN
■■ 7. No IP Address Conflicts
■■ 8. Flexible Access Policies
Reliability
■■ 9. Easy and Stable Roaming
■■ 10. Automatic Routing
■■ 11. Reduced VPN Server Load
■■ 12. Safe Simultaneous Access to VPNs and the
Web for Remote Clients
Appendix
■■ ViPNet VPN Components
■■ Free Trial Version
2
Intro
What is a ViPNet VPN?
ViPNet VPN is a comprehensive software suite for
maintaining a secure and reliable VPN. It implements
strong symmetric encryption with pre-shared keys
and a safe automated system of encryption key distribution over protected VPN channels.
ViPNet VPN provides direct peer-to-peer (P2P)
connection of clients. Unlike other VPN solutions
supporting P2P, ViPNet offers all its benefits as readyto-operate implementations, which even a user with
basic-level computer experience can enable and
maintain:
ViPNet is a VPN with transparent and centralized management,
featuring seamless implementation and convenient usage.
ViPNet hosts address each other by special identifiers,
in an MPLS-like manner. This frees customers from
complicated routing configurations. A ViPNet VPN
can be deployed over networks including NAT devices
without any additional configurations.
ViPNet VPN components:
■■
■■
■■
protection of a LAN from insider threats,
reduced VPN server load,
support of services with direct communication of
clients (like Skype and live video).
■■
■■
Among other VPN solutions, ViPNet is especially
designed for customers’ convenience. VPN client
users are free from the need to have any experience
with VPN. After VPN deployment, users’ accustomed
workflow does not change. When accessing a VPN
from mobile devices, a user can forget about reconnection lags and reconfigurations associated with
roaming between web access points.
■■
■■
Administrators manage the VPN centrally, in an intuitive manner. With the robust service data distribution
system, administrators update VPN host configurations, software, and encryption keys remotely in
background mode.
VPN clients, which securely connect computers,
mobile, and other network devices to a VPN. VPN
clients are protected with an integrated firewall.
VPN servers (coordinators), which
■■ organize communication between VPN clients
(including remote clients),
■■ function as VPN gateways, protecting VPN
connections with tunneled resources (hosts
without VPN client software),
provide network services for your LAN, such as
NAT, proxy filtering, SIP server, wireless access
point, etc.
Tools for VPN management and monitoring.
Below, please explore why we call ViPNet a genuinely
secure, convenient, and reliable technology.
A SMART VPN: 12 insights into ViPNet technology
3
Intro
ViPNet VPN: Advantages at a Glance
Strong Protection
■■ Pre-shared symmetric keys provide reliable and
safe VPN connection.
■■ The unique P2P VPN is best for channel protection.
■■ VPN clients and servers are equipped with an integrated firewall.
Support for Heterogeneous Networks
■■ A ViPNet VPN can be deployed over any existing IP
networks without reconfiguration.
■■ The ViPNet technology does not interfere with
common network services
■■ (firewalls, DHCP, WINS, DNS, NAT, PAT, VoIP, and
live video).
■■ A ViPNet VPN can be securely connected to an
IPsec network via a ViPNet–IPsec gateway.
Convenient Security
■■ ViPNet clients stay connected and ensure permanent protection of user devices without the need
for any user actions.
■■ Users access the VPN from home, office, or airport
over any available connection (wired, Wi-Fi, 3G/
LTE, satellite) without reconfiguring their mobile
clients.
■■ Users do not perform any maintenance; this is
performed automatically or by the centralized
management.
4
Scalable Solution
■■ As your business grows, you scale your ViPNet
VPN to a large and versatile geographically distributed VPN with an elaborate logical structure and
easily establish VPN links with hosts in VPNs of
your partners.
■■ ViPNet VPN servers (gateways) support a network
structure of any level of complexity, including
cascade, full mesh, or custom links.
Security
With the ViPNet technology, you incorporate best practices of VPN security implemented in a
solution friendly with common office workflows.
1. Strong Encryption
ViPNet implements symmetric AES encryption.
Compared to asymmetric, equal-strength symmetric
encryption requires fewer computations.
■■
AES symmetric encryption
■■
No handshake, safe against MITM attacks
■■
Packet encapsulation masks the data structure
In ViPNet VPN, each pair of communicating hosts
share a unique symmetric data exchange key, not
used with any other hosts. If this key is stolen, this will
compromise the host’s communication with only one
other host. With the centralized VPN management
facilities, the administrator can immediately block the
communication encrypted with the compromised key
and promptly replace it with a new and valid encryption key.
ViPNet VPN uses pre-shared keys, so that the
protected communication is not preceded with
the keys exchange procedure (the handshake). This
prevents the VPN from man-in-the-middle (MITM)
attacks, which is a serious threat for VPNs with public
key distribution.
As long as VPN traffic passes over public networks, a
malicious party may intercept some packets for analysis. ViPNet implements special protection against
data analysis:
■■
■■
The network topology and the traffic structure is
masked by encapsulation of the encrypted traffic
in UDP packets.
A malicious party may want to calculate the
exchange key by analyzing a substantial sample
of IP packets. In a ViPNet VPN, each IP packet is
encrypted with another derivate of the symmetric
data exchange key; intercepting a packet sample
will not yield the key, because it is not constant.
A SMART VPN: 12 insights into ViPNet technology
5
Security
2. Local Traffic in a LAN is Protected
■■
P2P connection protects a LAN from the inside threat
■■
Clients can access VPN and public resources concurrently
Originally VPN technologies were designed for secure
data transfer between trusted areas over the Internet.
It was assumed that there is no risk of confidential
information being intercepted within a LAN. This
approach still persists in most VPN technologies, and
traffic between a VPN gateway and the endpoint in
a LAN is not encrypted. Data directed into the LAN
is decrypted on the VPN gateway and is potentially
available for interception from inside the LAN when
transferred to endpoints.
With ViPNet VPN client software installed, the clients
act as hosts in the LAN and encrypt/decrypt the
traffic themselves. The VPN server on the edge of the
LAN just forwards the encrypted traffic to these hosts.
At the same time clients can safely access the Internet
as usual without traffic encryption. This is because
clients are protected with an integrated firewall, which
analyzes the encrypted traffic and the public traffic
separately so that all VPN traffic remains secret.
ViPNet VPN ensures protection of local traffic for any
topology, including the connection of a remote VPN
client to resources on a corporate network. VPN traffic
will remain encrypted until it reaches its destination.
6
3. Cloud Data is Secure
Storing data in the cloud is handy, but this data is
vulnerable for access and modification because it is
uploaded and accessed over public channels and is
available to malicious parties.
VPN protection of connections to the cloud and cloud servers
secures cloud users’ data
More than that, the cloud itself is a spatially distributed media. The data in the cloud travels over public
channels too.
When cloud servers are protected with a ViPNet VPN,
the customer’s data exchange with the cloud as well
as the traffic inside the cloud over public channels is
encrypted. It cannot be intercepted either by any third
parties or by the cloud provider itself.
A SMART VPN: 12 insights into ViPNet technology
7
Convenience
What makes a VPN secure is not just strong cryptography. Complicated maintenance would
impose a threat of management misconfigurations and other errors, violating the VPN security.
ViPNet VPN is specially adapted for convenient usage and transparent centralized management.
4. Centralized Management
With common VPN solutions, each configuration of
network topology may require coordinated and elaborate actions on several hosts, in several programs.
■■
Automated routine operations
■■
Solutions are available that cover all VPN maintenance tasks
Unlike described above ViPNet is managed from
one center where as many features as possible are
automated; things that need to be done on several
hosts coherently are coordinated automatically. A
ViPNet VPN administrator is equipped with everything needed for VPN management from a single
workstation.
The VPN management consists of the following:
■■ VPN topology configuration (allowing VPN
connections between hosts),
■■ generation and secure distribution of encryption
keys through encrypted channels,
■■ remote host configuration and user support (by
remote desktop access),
■■ remote VPN software upgrade,
■■ management of VPN hosts’ access policies,
■■ host health monitoring (including hosts without
ViPNet software installed, e.g. data servers on a
corporate LAN).
VPN maintenance is built on solutions from a single
vendor, which are compatible and do not require any
integration efforts. Due to this, you do not need a
large VPN support team. A single administrator can
maintain and support a network of thousands of
hosts with elaborate topology.
8
Unlike other VPN solutions, ViPNet VPN does not
allow users to modify any security-relevant host
configurations, like encryption keys or allowed VPN
connections; so, there is no threat of a user violating
any security policies, either by chance or on purpose.
5. Flexible Topology
You can define network topology by linking hosts
individually or implement a common topology for all
hosts (for example, the full mesh). The connections
will automatically adapt to policies of networks that
underlie the VPN:
■■
■■
■■
■■
Custom topology
■■
Adapting to policies of the underlying network
For ViPNet VPN connections, NAT devices are
transparent. ViPNet clients connect to each other
without any additional configurations even if they
are located behind dynamic NAT devices. You
can easily build a VPN over channels like those of
non-corporate Internet access providers, which
frequently distribute dynamic IP addresses to their
clients.
Some web access providers severely restrict the
permitted traffic type. For example a wireless web
access point in a hotel may allow only TCP traffic
over ports 80 and 443. For common VPN solutions
this will require complicated configurations or even
restrict you from using a VPN.
With ViPNet your client will automatically establish
an open TCP connection (over one of permitted
ports) with its VPN server and will transmit UDP
packets over this connection. The server will
forward the packets further without decryption.
The other VPN hosts will be also able to initiate
connections with your client.
A SMART VPN: 12 insights into ViPNet technology
9
Convenience
6. A Scalable VPN
As your business grows, you can add new VPN clients
and servers to your network. This takes just a few
steps (refer to the diagram below):
■■ In ViPNet Network Manager:
■■ Add a new host and create a key set for it.
■■ With just one click, send key updates to other
VPN hosts. The updates are transferred securely
over the VPN and are accepted on hosts
automatically.
■■ On the new host, install ViPNet software and its
key set. Then start the ViPNet software.
Add new hosts from one workstation with just a few clicks
After that, the new host becomes accessible for other
VPN hosts.
7. No IP Address Conflicts
Common VPN solutions base their routing on IP
addresses. When you change a host’s IP address
you need to be sure that there will be no IP address
conflicts with hosts on other LANs connected to the
VPN. You may need to perform additional configuration on other VPN hosts. The more elaborate the VPN structure is, the more complicated the required
configurations will be.
In ViPNet VPN host users and applications are free to
change IP addresses on hosts (manually or automatically) without losing the VPN connectivity regardless
of possible IP address conflicts. This is because in
a ViPNet VPN hosts address each other by special
ViPNet identifiers, which are independent of IP addresses.
10
No IP address conflicts with other LANs
As long as applications on a VPN host use IP addresses and not ViPNet identifiers, each identifier has an IP
address-like alias called a virtual IP address. So, applications think that they are working with IP addresses while
they actually use ViPNet identifiers. You can put two computers with similar IP addresses in different LANs onto
a VPN (as VPN clients or tunneled computers) without reconfiguring their environment against the address
conflict.
8. Flexible Access Policies
VPN hosts’ access policies are managed centrally
Each ViPNet host has an integrated firewall that filters its traffic. The set of firewall rules determine host’s
allowed public and VPN connections and therefore regulates its access policies. The allowed VPN connections
are called VPN links. By specifying host’s links, you define its accessible VPN hosts.
If necessary, you can make a host inaccessible from public networks, allow it to be accessed only from a single
VPN host or IP address, split your VPN into separate logical segments, or implement any other elaborate
topology.
Examples of Security Policies
Type of Host
Policy Description
Actions Required
Remote general-use workstation
Can access the Internet
and corporate resources
in a VPN
On a ViPNet client:
■■ allow unencrypted data exchange with public IP addresses
■■ allow encrypted data exchange with remote VPN hosts and tunneled
hosts
Core team
collaboration data
storage
Accessible only for the
core team
On a ViPNet client:
■■ block any unencrypted connections
■■ allow encrypted connections only with core team members’ hosts
Hosts in a DMZ
A LAN is split into the
secure area and the DMZ
■■ Put a coordinator between two LAN segments (the secure area and the
DMZ) and the Internet
■■ On the coordinator, configure the firewall to allow Internet connections
from the DMZ segment and to block Internet connections for hosts in the
secure area
■■ Allow data traffic between the two LAN segments initiated from the
secure area
The host’s access policies are centrally managed with the ViPNet Policy Manager software. If needed, the VPN
administrator can configure access policies (firewall rules) on each VPN host manually (locally or over a remote
desktop connection).
A SMART VPN: 12 insights into ViPNet technology
11
Reliability
High-scale encryption technologies must provide strong encryption, but not at the cost of
customer’s time. ViPNet VPN implements a variety of approaches that save your time and
resources, making your work on the VPN reliable and fast.
9. Easy and Stable
Roaming
■■
No connection lags when roaming between access points
■■
No reconfiguration at reconnections
The parties on a VPN need to share keys prior to
starting their communication. Many other VPN solutions perform the procedures associated with key
sharing (the handshake) over the network channel
that will then be used for communication. To make
this procedure secure, the parties do some encryption/decryption, which takes time and results in a
connection lag. The user and the running applications
experience this lag at each reconnection, which occurs
whenever a VPN client travels from one wireless
access point to another.
In a ViPNet VPN, parties use pre-shared keys, which
are distributed to users only once at the VPN client
initialization. At each reconnection, VPN clients can
start secure data exchange immediately after they
connect to the Internet. This makes roaming between
wireless access points free of connection lags associated with the handshake.
When a user wishes to leave the office and continue
working at home or at the airport, he or she just
disconnects from the web at their office and then
reconnects at the other location. The client will
immediately be on the VPN without the need for any
additional configuration.
12
10. Automatic Routing
VPN traffic automatically finds the optimal route
ViPNet VPN is designed to free the customer from
complicated routing configurations.
Imagine that two clients communicate over a mazy
VPN, like the one you can view on the right. To
complicate matters, the coordinators that pass the
traffic are separated with each LAN having its own IP
address space.
With common VPN solutions, you would need to
introduce some complicated routing rules to resolve
this connection. But here there are not just two
but multiple clients on the VPN — just think of the
amount of required configurations!
In a ViPNet VPN, routing is performed automatically
in an MPLS-like fashion with the use of ViPNet identifiers. VPN users and administrators do not configure
any routing. VPN hosts have each other’s up-to-date
access parameters. When two hosts communicate, the
ViPNet technology automatically paves the optimal
way for the traffic.
Whatever your VPN topology is, the VPN traffic finds
the shortest way, reaching its destination directly and
never getting looped.
11. Reduced VPN
Server Load
The peer-to-peer VPN scheme distributes the traffic
processing load
Compared to client-to-site and site-to-site VPNs,
a P2P VPN reduces the traffic processing (encryption/decryption) load on a VPN server because the
processing is performed on clients. The main obstacle
to implementing P2P with common VPN solutions is
the NAT. If the clients communicate from different
address spaces, you need to implement and configure
additional solutions. All this is usually quite complicated.
Among other VPN solutions ViPNet provides convenient facilities for establishing a P2P VPN over any
IP infrastructures without their reconfiguration. The
P2P VPN can embrace thousands of hosts with the
most elaborate connection topology, and this will
not load the VPN servers with traffic processing and
forwarding because clients will communicate directly.
A SMART VPN: 12 insights into ViPNet technology
13
Reliability
12. Safe Simultaneous Access to VPNs
and the Web for Remote Clients
Remote clients access VPN and public resources directly
With common VPN solutions it is not safe for a
remote VPN client to have concurrent access to VPN
resources and the Internet because in this case the
client’s Internet access is not regulated by corporate
web access policies.
With ViPNet solution remote clients have a firewall.
It is configured centrally by the VPN administrator
so that the corporate policies can be implemented
locally. ViPNet client’s connectivity does not depend
on the state of the OS routing table.
■■
■■
Therefore a remote VPN client usually connects to the
Internet via its VPN server. The traffic directed to the
Internet passes through the VPN tunnel. The server
decrypts it and processes it as a corporate proxy
according to corporate policies. This means that both
the client and the server have to encrypt and decrypt
all the client’s data exchange with the Internet.
Moreover, for most VPN solutions this scheme
requires proper configuration of the OS routing table.
The routing table is not protected well from modification by third parties. A malicious user accessing
the host’s routing table may enable a client’s direct
connection to the Internet, which allows unwanted
access to VPN resources from the web.
14
■■
ViPNet VPN users safely establish direct connections to the Internet and VPN resources without
any threat to the VPN security.
Clients and servers encrypt only the VPN traffic
while public connections are direct and unencrypted. Due to this the traffic processing load on
VPN servers is decreased.
Clients may access more than one VPN resource
simultaneously without reconfiguring the OS
routing table. In the diagram a client is accessing a
cloud protected with a VPN and two other VPNs.
Appendix
ViPNet VPN Components
Type
Computer Experience
Required for Use
Software
Advanced
ViPNet Policy Manager
(VPN security policy management)
Software
Advanced
ViPNet StateWatcher
(network equipment health monitoring)
Software
Advanced
ViPNet Coordinator HW
Appliance
Advanced
ViPNet Coordinator VA
Virtual appliance
Advanced
ViPNet Coordinator for Windows
Software
Advanced
ViPNet Client for Windows
Software
Basic
ViPNet Client for Mac OS X
Software
Basic
ViPNet ThinClient
Appliance
Basic
Host Type
VPN management
ViPNet Network Manager
(general VPN management)
VPN servers
VPN clients
Free Trial Version
■■
■■
Have an overview of the ViPNet VPN and its components.
Try ViPNet VPN with a 60-day trial version.
Get a trial version
https://www.infotecs.biz/products/
User guides
https://www.infotecs.biz/doc_vipnet/ENU/index.htm
A SMART VPN: 12 insights into ViPNet technology
15
Infotecs GmbH
Oberwallstraße 24
D-10117 Berlin
Tel: +49 30 206 43 66-0
Fax: +49 30 206 43 66-66
Mail: [email protected]
Web: www.infotecs.biz