remote access vpn - juniper.net · remote access vpn helping enterprise businesses implement strong...

36
Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering, NCP Engineering Inc. Vaishali Ghiya | Senior Director, Global Security Sales & Solutions, Juniper Networks

Upload: nguyenthien

Post on 11-Apr-2018

224 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

Remote Access VPNHelping enterprise businesses implement strong

authentication for their remote workforce

Julian Weinberger | Director System Engineering, NCP Engineering Inc.

Vaishali Ghiya | Senior Director, Global Security Sales & Solutions, Juniper Networks

Page 2: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

This statement of direction sets forth Juniper

Networks’ current intention and is subject to

change at any time without notice. No purchases

are contingent upon Juniper Networks delivering

any feature or functionality depicted in this

presentation.

This presentation contains proprietary roadmap

information and should not be discussed or shared

without a signed non-disclosure agreement (NDA).

Page 3: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

Security Sessions at NXTWORK

3

Dec 12th

Mainstage

Dec 12th

Salon 10-11

• Remote Access VPN for Juniper SRX

• Zero Security Trust with SDSN Networks

• Securing Hybrid Cloud

• Deploying Enterprise Scale User Firewall

• Secure Enterprise Branch Solutions with NFX and Automation

• Contrail Security: Diminishing Risk to Applications in Any Cloud

• Deploying Enterprise Scale User Firewall and Device Identity

Dec 13th

Salon 10-11

• Extending Enterprise Security to Hybrid and Public Cloud• MX Edge Security Solution for Cloud, Mobility & Wireline Providers• Security NOW: Stop Threats Faster

• Make The Network Your New Security Platform | Kevin Hutchins, SVP, Strategy and Product Line Management, Juniper Networks

• Conversation: Bob Worrall, SVP, CIO, Juniper Networks and Ed Glover, Vice President, Stroz Friedberg• Panel Discussion | Anthony Belfiore SVP, CSO, Aon, John White, Vice President of Product Strategy, Expedient. Moderator:

Mike Marcellin, CMO, Juniper Networks• Conversation | Jeff Moss, President, DEF CON Communications and Mike Marcellin, Juniper Networks• Simulation of a Security Breach | Christopher Crummey, Executive Director - IBM Security X-Force Evangelism & Outreach

Page 4: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

Software Defined Secure Network

Network as a Security Enforcement System

EnforcementPerimeter Firewalls

Switches & Routers

SDN Platforms (Vmware NSX, Contrail)

Public Cloud (AWS etc)

PolicyUser intent based policy modelRobust visibility and management

DetectionMachine Learning & AI – Malware Detection

Intrusion Prevention, SIEM (JSA)

Threat Feeds: Command & Control, GeoIP etc

Page 5: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

SRX Product Line EvolutionNew hardware platforms & software innovations

8U, 960Gb/s

1U, 5 Gb/s

SRX5800

00

SRX5600

SRX1500SRX550

SRX5400

5U, 480 Gb/s

16U, 2Tbps

Compact

Campus

Mid-sized Data

Center

Large Data

Center

Very Large

Data Center

/SP

Branch

Refresh

MIDRANGE

HIGH END

SRX300/320/

340/345

LOW END

BRANCH &SECURE ROUTER

SMALL CAMPUS

ENTERPRISE EDGE/SMALL DATA CENTER DATA CENTER

vSRX – Virtual SRX

4 Gb/s (2 vCPU)

20 Gb/s (upto 10 vCPU)

Small Data

Center

NDA: Juniper Networks Company Confidential All performance estimates are IMIX

SRX4100

1U, 20 Gb/s

SRX4200

1U, 40 Gb/s

SRX4600

1U, 80 Gb/s

SRX4800

3U, 320 Gb/s

Page 6: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

Junos SRX Foundation

Firewall VPN NAT Routing

Security Services: Physical and Virtual SRX

Management Reporting Analytics

Unified Threat

Management

Anti-Malware

Web/Content Filtering

Anti-spam

Automation

Security Intelligence

Command & control

GeoIP feeds

Custom feeds

Next Generation Firewall

Services

Application Control

User-based firewall

Intrusion Prevention

SKY ATP

Anti Malware

SRX Integrated

Deception Techniques

Junip

er S

ecurity

Analy

tics &

Inte

gra

ted L

oggin

g a

nd re

portin

g

Page 7: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

Next Generation Firewall Services

Ingress Egress

App Tracking Understanding security risks

Address new user behavior

App Firewall Block access to risky apps

Allow user tailored policies

App QoS Prioritize important apps

Rate-limit less important apps

SSL Proxy SSL packet inspection

IPS• Prevent application borne security

threats

• Heuristics for evasive and tunneled apps

• More application signatures

• Open signature language

App Routing Define packet forwarding for Apps

Create custom app environment

Page 8: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

SRX Unified Threat Management (UTM)

• Sophos Live Protection against Trojans, Viruses, Phishing Attacks

• Reputation-enhanced capabilities

• Multilayered spam protection from security experts

• Protection against APTs

• Block malicious URLs

• Prevent lost productivity

• Websense TSC with more than 140 categories

• Filter out extraneous or malicious content

• Maintain bandwidth for essential traffic

Antivirus Content Filtering

Antispam Web Filtering

Subscription Based Software Services for a Turnkey Fully Integrated Offering

Page 9: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,
Page 10: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

COMMUNICATION& SECURITY

Page 11: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

Secure – Cost Efficient – Ease of use - Mobile

Strong authentication built in

Automated Media Detection

Always On

One solution for Juniper SRX/vSRX Series

Everything combined in one GUI

Automatic Network Detection

One interface across all devices

IPsec and SSL VPN in one VPN client

High scalable

Page 12: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,
Page 13: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJulian Weinberger

Page 14: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXUser passwords are not enough

Many recent breaches have one thing in common: compromised passwords

If your network security relies solely on user passwords for access, you’re putting your corporate data at risk

Two-factor authentication adds a layer of security for clear identification of every user

Added protection reduces the risk and enormous costs associatedwith a potential data breach

COMMUNICATION& SECURITY

Page 15: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXWhy Two- or Multi-Factor Authentication?

Many industries, network architectures and corporate policies demand thatremote access VPN infrastructures are protected with two-factor authentication

Higher level of security

Regulatory industry compliance

Enterprise information security policies

Other single factor authentication methods are

Don’t provide necessary level of security

Too complex for administrator compared to level of security

COMMUNICATION& SECURITY

Page 16: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXSession Agenda

Methods of user authentication

Putting two (or more) factors together

Barriers to adoption

Balancing security and simplicity

Challenges for strong authenticationin remote access environments

Solution for Juniper SRX

Q&A

COMMUNICATION& SECURITY

Page 17: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRX

Two-factor authentication makesuse of (at least) two types, and at least one from two different categories

Authenticating data types

Somethingyou KNOW

Somethingyou ARE

Somethingyou HAVE

Page 18: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXMethods of User Authentication

Something You KNOW

Password/PIN

OTP (one-time password)

User certificates

Something You Have

Token or calculator

Phone

Machine/Hardware certificate

Smartcard

TPM

Page 19: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXMethods of User Authentication

Something You ARE

Fingerprint

Face recognition

Iris recognition

Keystroke dynamics

Page 20: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXPutting two factors together

Common examples of combining “something you KNOW”and “something you HAVE/ARE” to clearly validate user identity include:

OTP + phone

Certificate + smartcard

Certificate + TPM (virtual smartcard)

Password + fingerprint

Certificate + fingerprint

OTP + token

OTP + calculator

COMMUNICATION& SECURITY

Page 21: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXGoing overboard

Combining a super-secure authentication solution that includes, for example, a token, OTP, smartcard, and certificate isn’t likely to be acceptable to an end user

Page 22: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXBarriers to adoption

If the need for two-factor authentication is understood,why is the adoption rate still low?

Another layer of security means another layer of work

Some VPN clients, operating systems, and application do not support it

An enterprise’s user directory – using single sign on – may not support it

Most second factors require hardware, adding rollout and maintenance costs

COMMUNICATION& SECURITY

Page 23: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXChallenges in a Remote Access VPN environment

Costs

Additional hardware

Tokens

Smartcards

Card reader

Fingerprint Scanner

Service/Software

Authentication Server

Service fee

...

COMMUNICATION& SECURITY

Page 24: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXChallenges in a Remote Access VPN environment

Rollout

How to get the second factor of authentication to the end user

Shipping

Administrative costs

COMMUNICATION& SECURITY

Page 25: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXChallenges in a Remote Access VPN environment

Overhead

For the user

Training

Actual usage of the second factor

For the Enterprise

Helpdesk calls

Shipping and return of hardware

Hardware damage

Administration

COMMUNICATION& SECURITY

Page 26: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXWhere should you start?

Choose a two- or multi-factor authentication solution that meets these criteria:

Feature Benefit

Fully integrated with VPN services Not having to deal with two different vendors speeds up implementation and reduces helpdesk support costs

Easy to implement Using existing hardware, such as phones, doesn’t introduce new admin challenges

Easy to maintain Cumbersome authentication steps or specialized hardware add support headaches

Scalable Central management, with automated updates, makes it easy to support your growing business needs

Page 27: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

COMMUNICATION& SECURITY

Page 28: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

Page 29: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRX

3G / 4G / LTE

PERSONAL FIREWALL

WiFi LOGIN

VPN CLIENT

ONE CLICK / ZERO CLICK

Joint Solution NCP & Juniper Networks

Page 30: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

NCP DEPLOYMENT

RADIUS SERVERCERTIFICATION

AUTHORITY (CA)

ACTIVE DIRECTORY(LDAP)

MOBILE USERS2 FACTOR

AUTHENTICATION

Page 31: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

Central Management System for VPN clients

Automated configuration and software update

Configuration and software update

Mass rollouts

Create, renew and revoke certificates

Multi-tenancy capability

Manageability of all VPN clients

Full control of VPN clients

Integration with any directory service (LDAP, AD, RADIUS, …)

Two- and multifactor authentication

Support of 3rd party solutions

Built-in two-factor authentication

Page 32: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

Built-in two-factor authentication

NCP & Juniper Networks provide a built-in two-factor authenticationfor Juniper SRX

Based on OTP

Uses text messages to deliver the OTP to user’s phone

Interface to text message provider

Interface to mobile broadband cards

Easy and scalable

COMMUNICATION& SECURITY

Page 33: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

1. CONNECTING

4. TRANSPARENT NETWORK ACCESS

2. SMS WITH OTP

3. ENTER OTP

HEADQUARTERS

MOBILE USER

NCP SECURE ENTERPRISE MANAGEMENT

INTERNET SRX

Page 34: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXSummary

Depending solely on user passwords for VPN access puts corporate secrets at risk

Two-factor authentication adds a layer of security to identify users clearly

Authenticating data is based on something you KNOW, HAVE and/or ARE

Overcome barriers to adoption with solutions that are:

Integrated with VPN services and user directory

Easy to implement and maintain

Scalable

NCP & Juniper Networks provide you with sophisticated two-factor authentication solutionsfor your Juniper SRX

COMMUNICATION& SECURITY

Page 35: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

REMOTE ACCESS VPN FOR JUNIPER SRXJoint Solution NCP & Juniper Networks

Sign up at www.ncp-e.com to get access to

Free 30 days trial versions of the software

Pricelist

Sales presentation

Data sheets

Step-by-step configuration guides

Visit our booth

Booth #7

Get a demo by a System Engineer

Receive further information about the solution

Or just say “Hi”

COMMUNICATION& SECURITY

Page 36: Remote Access VPN - juniper.net · Remote Access VPN Helping enterprise businesses implement strong authentication for their remote workforce Julian Weinberger | Director System Engineering,

<