Remote hijacking access behind the help of SSL VPN

Three days and three nights I've been trying out SSL VPN with silly software clientless options. I learn to know what a great option Hypersocket, which position itself.

Ale, when reading the annotation on Sourceforge, click on the proposition, so that the FOUNDER does not get into the account when access is accessed from the browser. So tse SSL VPN works on a equal supplement, but, unfortunately, on the basis of its client, which uses the Java engine for the robot and loads with a smart widget, the day was initiated. But with apparent simplicity, the wine does not work by clicking and to set up the connection, you have to tinker, because the main problem of the client is that the wine breaks on port 443 of the VPN server, because it can be tricky in the middle of the infrastructure, de administrators are paranoid to cut off all the weekends.

Wine in the current free version 1.1 that will be promoted on Sourceforge and commercial version 2.0.5 will be given from the off site in a fully functional trial for 30 days. The first axis of the supply chain is not absolutely clear to me, I don’t know the scales of prices on the site. So the stench can її wiggle if you already have everything fixed and plugged in, so that you are not immediately impressed with your product.

Before the beginning of the installation, you need to become a sideboard, because I could not know, but version 1.1 is in the default installation of about 450Mb, so I couldn’t figure out why on the Deshman’s vpsk for 200 rubles I’m constantly changing the servers, come on. With a memory of 1Gb, everything already lived in the region stably and without a single expansion. Another version has 600Mb of RAM.

To be put in elementary way, so do not respect the standard dances from Oracle Java. , We will prescribe all the necessary ways, if anything else, a free server in the 2015 year:
# Wget https://sourceforge.net/projects/hypersocket-vpn/files/1.1.0-2269/hypersocket-vpn-gpl-linux-1.1.0-2269.rpm/download

or Regal on the off site and get hypersocket-one-linux-2.0.5-3110.rpm from them

Why do we install the package
# Rpm -i hypersocket-one-linux-2.0.5-3110.rpm

If anything, we start the next version of the package
service hypersocket start
and connect to https: // IP: 443 with login admin: admin

for a friend
hypersocket-one-console
or for the address https: // IP: 443 I will complete the web installation, set the system passwords and feed the license file before downloading

If you can go inside and get access to something else. Another version, in my opinion, spritnish and foreign is thought out first.

Denmark VPN Server, as I already said, I don’t particularly fit, because transferring the presence of the client on the side of the distant coristuvach, but if you can buy all sorts of add-on features, you can access files in the virtual file system through yaku vngom , ftp together, NFS volumes, HTTP files and others; web page publisher for remote web server; I buy all kinds of security features from PIN codes to one-time passwords; management of koristuvachami through m'yazi, AS400, Google Business, LDAP.

In Denmark, there are two types of Koristuvalnicky VPNs:
SSL VPNі IPSec VPN and skin from them may have their own advantages and disadvantages.

The main benefit of SSL VPN is its ease of implementation: all browsers support SSL, all ISPs pass through and do not interleave SSL.
Any kind of access via SSL VPN can be done literally on any browser and on any platform.

IPSec VPN is considered more of a secure protocol.

SSL and TLS

Even more often in the technical literature you can understand SSL and TLS.

Offending the protocol cryptographic protocols To ensure the secure transmission of data over the Internet (e-mail, web browsing, instant messaging).
Protocols provide confidentiality, integrity, authentication services.
SSL and TLS work on equal terms session layer OSI models or more.
Protocols can be victorious public key infrastructure (PKI) as well as certificates for authentication and transmission of one to one symmetric keys.
Likewise, IPSec for encrypting data stench victorious symmetric keys.

Most secure transfers to browsers are made via SSL or TLS.
On the back of SSL, it was developed by Netscape.
TLS is a further development of SSL, as well as a standard Internet Engineering Task Force (IETF).
For example, TLS 1.0 bases on SSL3.0.
How specifically to beat SSL or TLS is broken by browsers themselves: short TLS can also be switched to SSL.

In this rank, it is important to understand that the term SSL can be used for SSL or TLS.
For example, Cisco SSL VPN really beats TLS.

SSL operations

Also, SSL wins in most online services that require security.
Let's take a closer look at what happens when the client connects to the bank server, which uses SSL:

  • The client initializes the connection to the server on the th IP address and port 443. As a rule, the client's IP and port are lower than 1023.
  • There is a standard TCP connection process, which is a victorious three way handshake
  • The client requests an SSL connection and the server responds with its digital certificate, which is to be revenged public key which server.
  • Having withdrawn the certificate, the client is guilty of virishity: trust no other certificate.
    This is where the PKI mechanisms begin to work.
    If a digital certificate is signed by CA, which client trusts + the certificate is valid for the date + the serial number of the certificate is not listed in certificate revocation list (CRL)- the client can trust the certificate and win public key which certificate.
  • Client generates symmetric key shared secret, which will be victorious for data encryption between the client and the server. Let the client encrypt shared secret from victories public key and transfer the server.
  • Server private key, Deciphering the symmetric key shared secret.
  • Offended parties now know shared secret and can encrypt the SSL Session.

Tipi SSL VPN

SSL VPN can be divided into two types:

  • Clientless SSL VPN- also called Web VPN. Doesn't care about client installation. Opportunity is shackled.
  • Full Cisco AnyConnect Secure Mobility Client SSL VPN Client- full SSL client, which allows installation of software on the client, which ensures full access to the corporate network

Set up SSL VPN

  1. Copy the Anyconnect PKG file.
    Our mind is anyconnect-win-3.1.08009-k9.pkg
  2. Refers to the pkg file, and includes the Webvpn Anyconnect service.
    webvpn anyconnect image disk0: /anyconnect-win-3.1.08009-k9.pkg 1 enable outside2 anyconnect enable
  3. Disable (exempt) SSL WebVPN traffic on outside interface ACL. We need to either add the permit rule to the ACL, or use the command:
    msk-asa-01 (config) # sysopt connection permit-vpn
  4. For clarity, we can redirect from 80 to 443:
    http redirect outside2 80
  5. soluble IP address pool. Tsi addresses will be visible to distant coristuvachas.
    ip local pool vpnpool_pool 192.168.93.10-192.168.93.254 mask 255.255.255.0
  6. created NAT exemption for traffic between LAN network i merge vpnpool. By the way, shards of encrypted links are not guilty of passing through NAT. Danish crochet is necessary in times of ASA for setting up NAT.
    object network vpnpool_obj
    object network vpnpool_obj subnet 192.168.92.0 255.255.255.0 object-group network RFC1918_objg network-object 192.168.0.0 255.255.0.0 RFC1918_objg RFC1918_objg destination static vpnpool_obj vpnpool_obj no-proxy-arp route-lookup
  7. We create Split-Tunnel ACL, the setting is given to allow corystuvacs, when connected via VPN, to be able to surf the Internet one hour. Without this configuration, all traffic will be wrapped in the tunnel.
    access-list split-tunnel_acl standard permit 192.168.10.0 255.255.255.0

    This installation will only tunnel traffic in the same area as RFC1918.

  8. created group policy.
    We can create a Group Policy shard, and in the skin, set attributes like DNS server addresses, split-tunneling settings, default domain, protocol (SSL or IPSec) and so on.
    group-policy anyconnect_gp internal group-policy anyconnect_gp attributes dns-server value 192.168.10.5 vpn-tunnel-protocol ssl-client ssl-clientless split-tunnel-policy tunnelspecified split-tunnel-network-list value split-tunnel_acl webvpn anyconnect keep-installer installed anyconnect dpd-interval client 20 anyconnect ask none default anyconnect
  9. soluble Tunnel Group.
    Tunnel Group in ASDM interface is called Connection Profile.
    Tunnel Group is only responsible for including what we have established Group Policy and shared with the IP address pool.
    We can create a few such groups, and when logging in, we can choose for ourselves the Tunnel Group with the necessary characteristics: drop parameters for Group Policy + address-pool
    tunnel-group vpn-users_tg type remote-access tunnel-group vpn-users_tg general-attributes address-pool vpnpool_pool default-group-policy anyconnect_gp tunnel-group vpn-users_tg webvpn-attributes group-alias vpn_users-alias enable webvpn tunnel-group- list enable

    The rest of the command allows coroners to select the tunnel-group for themselves.
    For koristuvachiv, a group will be given to look at the names "vpn_users-alias"

Anyconnect can already be ordered, - you can log in with an admin account.

SSL VPN Monitoring

  • ASDM: Monitoring > VPN > VPN Statistics > Sessions
  • 3 CLI:
    vpn# show uauth Current Most Seen Authenticated Users 1 + 1 Authen In Progress 0 0 remote access VPN user "vpn_video_user1" at 192.168.92.25, authenticated access-list # ACSACL # -IP-video_dacl-54ddc357 (*)
    vpn# show access-list access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096) alert-interval 300 access-list split-tunnel_acl; 1 elements; name hash: 0xb6fb0e access-list split-tunnel_acl line 1 standard permit 192.168.10.0 255.255.255.0 (hitcnt = 0) 0x13482529 access-list # ACSACL # -IP-video_dacl-54ddc357; 1 elements; name hash: 0x6c7d7b7f (dynamic) access-list # ACSACL # -IP-video_dacl-54ddc357 line 1 extended permit ip any4 host 192.168.10.45 (hitcnt = 0) 0x4ce5deb8

    We wonder who is slandering

    show vpn-sessiond summary
    show vpn-sessiond anyconnect

    Wikinuti user with VPN:

    vpn-sessiondb logoff name langemakj

VPNs have entered our lives seriously, and I think for a long time. This technology is victorious as in organizations for the unification of offices into a single enterprise, or for providing access to internal information of mobile employees, as well as at home when accessing the Internet through a provider. It can be said with confidence that the skin for the administrators of the obov'yazkovo was engaged in the installation of VPN, like the skin of the computer's computer with access to the Internet vicoristovuvav this technology.

In fact, at the same time, IPSec VPN technology has been greatly expanded. A lot of different articles have been written about her, both technical and analytical. Alas, the technology of SSL VPN has recently appeared, as it is already popular in foreign companies, but in Russia it has not received much respect yet. In this article, I will try to describe what makes IPSec VPN different from SSL VPN and what are the advantages of SSL VPN in the organization.

IPSecVPN

First of all We would like to pay attention to the purpose of VPN, the most widely - “VPN is a technology that combines trusted links, nodes and coristuvachiv through open networks that cannot be trusted” (© Check Point Software Technologies).

First of all, in the context of trusted hubs, IPsec VPN is the most economical way. For example, for the merging of distant offices into a single corporate line, it is not necessary to lay or rent video lines, but to win over the Internet. As a result, tunnels are being stolen between systems, which are trusted to establish a single IP space.

And the axis, when organizing remote access to spivrobitniki IPsec-solutions, is chosen for a limited number of trusted outbuildings, for example, for laptops in corporate coristuvachiv. To stop the IPsec VPN, the IT service is responsible for installing and patching on the skin a trusted attachment (for any need to secure remote access) VPN client, and supporting the work of that addendum. When installing an IPsec-solution, it is necessary to secure its “attached” variability, to connect it with a support and a conduit, so for the skin type of a mobile client (laptop, PDA and in.) companies-clients, access to different address translation stations) requires original IPsec-client configuration.

Krim pidtrimki є kіlka even more important problems:

  • Chi is not for all trusted mobile devices that win in the company and VPN clients;
  • In different subnets, where access is possible (for example, a corporate partner's or partner's network), the necessary ports can be closed and you need additional services for their permission.

Such problems are not caused by using SSL VPN.

SSLVPN - Robotic Koristuvach Algorithm

Let's say you rebuy at the repair shop, your company could not give you a laptop for an hour. Ale you need:

  • Under the hour of your workday in the office, you do not miss the working process;
  • Send and receive electronic mail;
  • Conquer data from any business systems that are functional in your company.

You have a computer at your fingertips in the shortest possible time, where you arrived at the repair, with access to the Internet only via the http / https protocol, in the worst case - the Internet cafe at your hotel.

SSL VPN successfully defeats all tasks, moreover, the level of security will be sufficient for working with critical information from Internet cafes ...
In fact, you win the next steps:

  • You will need only Internet Explorer (Internet Explorer, FireFox, etc.);
  • In the Internet browser, type the address of the SSL VPN add;
  • It will automatically download and run a Java applet or an ActiveX component that prompts you to authenticate;
  • After authentication, the following security policies are automatically set:
    • vykonuetsya reverb on shkіdlivy code (for once it appears, it is blocked);
    • the middle of processing information is closed - all data (including time files) transferred from the internal media, after the session is completed, will be deleted from the computer, for which access is denied;
    • Also, in the process of the session, the victories are supplemented with additional protection and control;
  • After the successful completion of the security procedures, you will have access to all the necessary messages “in one click with a bear”:
    • Access to file servers with the possibility of transferring files to the server;
    • Access to the company's Web add-ons (for example, an internal portal, Outlook Web Access, etc.);
    • Terminal access (MS, Citrix);
    • Tools for administrators (for example, ssh console);
    • І, obviously, the possibility of a full VPN over the https protocol (without the need for forward installation and settings of the VPN client) - the configuration is transferred without intermediary from the office, only before the authentication data.

In this way, the SSL VPN stoppage is breaking the law:

  • Significantly simplifying the process of administration and support of koristuvachivs;
  • Organization of protected access to critical information from untrusted nodes;
  • Possibility of stosuvannya on any mobile outbuildings, as well as on any computers (including Internet kiosks) with access to the Internet (without forward installations and customization of special software).

SSLVPN - hacks and opportunities

Hardware solutions dominate the SSL VPN market. Among post-installation solutions for SSL VPN - all types of active fencing solutions:

  • Cisco
  • Huawei
  • Juniper
  • Nokia
  • І etc.

Among the software implementations of fakhivtsy of the company "Alatus" see solutions on the basis of SSL Explorer companies 3SP Ltd, Yake most definitely supports the help of the deputy.

So I would like to give a table of the equivalence of IPSec VPN and SSL VPN capabilities:

characteristic

IPSec VPN

support

Support business dodatkiv

Support for HTTP add-ons

Support for access to file servers

Support for terminal access

merezhev architecture

Corporate PC

mobile PC

Work from a third-party barrier (behind a firewall)

-
(Vymagaє vіdkrittya portіv)

+
(Robot via https)

Public computer (internet cafe)

-
(Vymagaє client settings)

PDA, communicator

-+
(For the attachment, the VPN client is to blame)

safe zahistu

Possibility of strong authentication

+ (In most cases)

Web single sign-on

-

Automatic setting of security policies in the fallow period depending on the type of object and coristuvacha

-
(Vymagaє additional solutions)

dodatkovo

Clientless technology

+
(Dosit Internet Explorer)

ease of use

Deposit as a solution

ease of configuration

Deposit as a solution

ease of support

Deposit as a solution

SSL VPN in Russia

Today in Russia, a large number of projects have already been implemented to promote remote access in companies based on SSL VPN technology. But as it has already been said before, until this technology in Russia has gained its popularity, at that hour, as the growers of these decisions tell about the high water on them among Western companies.

In the first part of a series of articles dedicated to the establishment of Windows Server 2008 as an SSL VPN server, I have described facts about the facts of the history of Microsoft VPN and VPN servers. We have finished the previous article with a description of the butt of the measures, so we will win in this and the next parts of the series on the VPN gateway, supporting SSTP connection with Vista SP1 clients.

First of all, I'm sorry, I'm sorry to know that I know about the presence of cracking on the creation of SSTP z'ednan for Windows Server 2008, as it is on the www.microsoft.com website. It happened to me that this article does not represent a really well-trained, as it is victorious in organizations for the recognition of certificates. In addition, and because of some problematic moments, which were not broken in the Microsoft core, I decided to write this article. I respect that you know a little of the new, so that you will follow me in this article.

I do not dare to look at all the details, starting from the very foundations. Consider that you installed a domain controller and activated DHCP, DNS and Certificate Services roles on this server. The type of server certification is the responsibility of the Enterprise, and you may have a CA in your company. The VPN server is responsible for connecting to the domain, first of all, continuing to follow the steps. First, you need to install the SP1 update package for the Vista client.

We need to follow the next procedures in order for our solution to work:

  • Install IIS on VPN Server
  • Request a machine certificate for the VPN server using the IIS Certificate Request Wizard
  • Install the RRAS role on the VPN server
  • Activate RRAS Server and set yoga to work as a VPN and NAT server
  • Set up NAT server for CRL publishing
  • Set up a User Account on the dial-up link
  • Configure IIS on the Certificate Server to allow HTTP signing for the CRL directory
  • Set HOSTS file for VPN client
  • Enable PPTP to communicate with VPN server
  • Obtain CA Certificate from Enterprise CA
  • Set the client to use SSTP and connect to the VPN server for SSTP help

Installing IIS on a VPN Server

You may be wondering what we can do by ourselves with this procedure, so I recommend that you never install a web server on a security device. Garna novelty is in the fact that we do not happen to save a web server on a VPN server, we only need it for a day. The reason for this is that the registration site included in the Windows Server 2008 Certificate Server is no longer suitable for requesting computer certificates. Actually wine is not needed. If you still fail to win a registration site to revoke a computer certificate, everything will look like this, the certificate has been removed and installed, it’s not really true, the certificate has not been installed.

To overcome these problems, we are speeding up the victory of what is victorious enterprise CA. When using Enterprise CA, you can apply for an interactive certificate server. Interactively requesting a computer certificate is possible if you win the IIS Certificate Request Wizard and request what is now called a 'Domain Certificate' domain certificate. It is only possible in the same way that a Party that asks a machine to belong to the same domain as an Enterprise CA.
To install the IIS Web server role on the VPN server, follow the steps:

  1. Open Windows 2008 server manager.
  2. In the left panel of the console, click on the tabs roles.
  1. Tisnemo on the menu Add a role from the right side of the right panel.
  2. tisnemo far on the side First of all.
  3. Put a tick next to the row Web Server (IIS) on the side Select server roles. tisnemo far.

  1. You can read the information on the side Web Server (IIS), You're getting confused. It's worth sharing basic information about the IIS 7 hack as a web server, but we don't choose to hack the IIS web server on a VPN server, which information is not stale in our situation. tisnemo far.
  2. On the side Select Role Services a few options have already been selected. However, even if you win the options for the lock, you will not be able to speed up the Certificate Request Wizard. At least that's how it was when I tested the system. There is no service role for the Certificate Request Wizard, so I tried to put a tick next to the skin option Bezpeka, I, daєtsya, spratsyuvalo. Zrobit those same in itself and press far.

  1. Look at the information on the side Confirm your choice of settings and press insert.
  2. press close on the side installation results.

Requesting a Machine Certificate for a VPN server using the IIS Certificate Request Wizard

The next step is to request a machine certificate for the VPN server. The VPN server needs a machine certificate to create an SSL VPN connection with the SSL VPN client computer. The title name of the certificate is responsible for specifying the name that the VPN client will use to communicate with the computer to the SSL VPN gateway. This means that you will need to create a public DNS record for the name on the certificate, which will allow the outside IP address of the VPN server, or I will add NAT IP addresses in front of the VPN server, so that you will forward the call to the SSL VPN server.

To request a machine certificate to an SSL VPN server, follow the steps:

  1. AT server manager, Fire tab roles in the left panel, and then expand the tab Web Server (IIS). Click on .

  1. in console Internet Information Services (IIS) Manager, How to appear right-handed in the left panel, click on the server name. Whose application will have a server W2008RC0-VPNGW. Click on the icon server certificate in the right pane of the IIS console.

  1. At the right panel of the console, it is embossed on the side Create a certificate for a domain.

  1. Enter information on the side Songs of the power of the name. The most important object here will be Zagalna im'ya. For the sake of it, as VPN clients will win to connect with a VPN server. You also need a public DNS record for this name so that you can recognize the VPN server's proper interface, or I'll add a public NAT address in front of the VPN server. At whom butt mi vikoristovuemo zagale im'ya sstp.msfirewall.org. We will later create a HOSTS file entry on the VPN client's computer, so that we can recognize the name in a moment. tisnemo far.

  1. The button is embossed on the side vibrati. At the dialogue window Select old certificates, Tisnemo on behalf of Enterprise CA OK. We introduce friendly names in a row friendly name. At whose butt we victoriously im'ya SSTP Certificate, Schob nobility, scho vykoristovuetsya for the SSTP VPN gateway.

  1. tisnemo finish on the side Interactive dzherelo certificates.

  1. The master will launch, and then we will know. If you please tell me how the certificate will appear in the IIS console. Click on the name on the certificate and look at the name in the section recognized for, And now we have a private key, valid for the certificate. tisnemo OK, Close the dialogue window certificate.

Now that we have the certificate, we can install the RRAS Server Role. Give respect to those who are already important insert certificate before installing the RRAS Server Role. If you don't do anything, you'll earn your own big headaches, and you'll have to beat up the folded routine of command rows in order to link the certificate with the SSL VPN client.

Installing the RRAS Server Role on the VPN server

To install the RRAS Server Role, you need the following steps:

  1. AT server manager, Click on tab roles in the left panel of the console.
  2. Section Global roles press on the force Add a role.
  3. press far on the side First of all.
  4. On the side Select server roles tick the box next to the row. press far.

  1. Read the information on the side Access policies and services. Most of the time, the Network Policy Server (which used to be called the Internet Authentication Server and was essentially a RADIUS server) and NAP is included, but elements are not customizable in our case. onslaught far.
  2. On the side Select service roles put a tick next to the row Routing and remote access services. As a result, points will be selected Remote access servicesі routing. tisnemo far.

  1. tisnemo insert at the vikni Confirm selected installations.
  2. tisnemo close on the side installation results.

Activation of RRAS Server and yogo setup in the capacity of VPN and NAT server

Now that the RRAS role is installed, we need to enable the RRAS services, just as we did in older versions of Windows. We need to activate the VPN server function and the NAT service. With the activation of the VPN server component, everything was clear, but you can tell, it is necessary to activate the NAT server. The reason for activating the NAT server is that the calling clients can deny access to the Certificate Server in order to retrieve the CRL. If an SSTP VPN client cannot capture the CRL, SSTP VPN will not capture it.

In order to allow access to the CRL, we need to configure the VPN server as a NAT server and publish the CRL that reverses the NAT. At the edged company, you, better for everything, will have firewalls, for example ISA Firewall, in front of the certificate server, so you can publish CRLs behind firewalls. However, in this case, a single firewall, which will be the same as the Windows Firewall firewall on the VPN server, in which case we need to set up a VPN server as a NAT server.

To activate the RRAS services, click on the following steps:

  1. AT server manager open tab roles in the left panel of the console. open tab Merge Policy and Access Services and click on the tab. Right-click on the deposit and press Set up and activate routing and remote access.

  1. press far at the vikni Welcome to the Routing and Remote Access Server Setup Wizard.
  2. On the side configuration choose an option Access to virtual private networks and NAT and press far.

  1. On the side VPN connection select NIC in section interfaces, I represent the current interface of the VPN server. let's press far.

  1. On the side Assigned IP address choose an option automatically. We can choose this option so that we have a DHCP server installed on the domain controller behind the VPN server. If you do not have a DHCP server, then you will need to select the option From the list of addresses, And then add a list of addresses that VPN clients can win when connected to a network through a VPN gateway. tisnemo far.

  1. On the side Remote access management for dekilkoh servers selectable Hі, vikoristovuvaty routing and remote access for authentication requests. This option is vikoristovuєmo, if NPS or RADIUS servers are not available. Oscillki VPN server is a member of the domain, you can authenticate the corresponding records for the domain. If the VPN server does not belong to a domain, then only the local cloud records of the VPN server can be beaten, so only you can't beat the NPS server. I'll write an article about the NPS server win in the future. tisnemo far.

  1. Read the main information on the side Completion of the robotic master of setting up routing and remote access and press finish.
  2. press OK in the dialogue window Routing and remote access, Yake to tell you about those that rozpodіl DHCP vіdomlen vymagaє agent rozpodіlu DHCP.
  3. Open the tab in the left panel of the console Routing and remote access and then click on the tabs spoil. At the middle panel, you can see that WAN Miniport enabled for SSTP is now available.

Setting up a NAT server for publishing CRLs

As I said earlier, it is the SSL VPN client's fault to be able to capture the CRL to verify that the server's certificate on the VPN server is not spoofed or clicked. For which purpose it is necessary to fix attachments in front of the certificate server for sending HTTP requests about CRL distribution to the Certification Server.

How do I know which URL the SSL VPN client needs to connect to in order to capture the CRL? This information is located in the certificate itself. If you go to the VPN server again and double-click on the certificate in the IIS console, as you did earlier, you can find out this information.

Tisnemo on the button details on the certificate and re-burnt down before recording Points to match CRL, Potim tisnemo on qiu record. The lower panel shows the different points of roznіlu, based on the protocol, victorious for access to these specks. The certificate shown in the small box below shows that we need to give the SSL VPN client access to the CRL via the URL:

http://win2008rc0-dc.msfirewall.org/CertEnroll/WIN2008RC0-DC.msfirewall.org.crl

It is also necessary to create public DNS records for this name, so that the calling VPN clients could bring this name to the IP address or add it, which will remove the reverse NAT or reverse proxy to gain access to the website of the certificate server. At whose butt we need to call win2008rc0-dc.msfirewall.org with an IP address on the original interface of the VPN server. When the connection reaches the outside interface of the VPN server, the VPN server forwards the NAT request to the certificate server.

If you use firewall extensions, for example ISA Firewall, you can publish CRL sites in a secure, open access only to the CRL, not to the entire site. However, in this article, I can add a simple NAT to myself, such as RRAS NAT.

It should be noted that using the name of the CRL site for locking can be a less safe option, or the shards of a private computer on the Internet. You can create a CDP (CRL Distribution Point) for a coryistuvacha so that it can be unique, but you also care that revealing your CA's private name in a public DNS record can lead to unsafe consequences.

To configure RRAS NAT to direct HTTP requests to the certificate server, follow the steps:

  1. At the left panel server manager open tab Routing and remote access, And then open the tab IPv4. Click on the tab NAT.
  2. at the contributor NAT right-click on the calling interface in the middle panel of the console. In this application, the name of the modern interface was Local Area Connection. Click on authority.

  1. At the dialogue window, check the box next to it Web Server (HTTP). Tse vikliche dialogue vikno editing service. In text line private addresses enter the IP address of the certification server for the internal measure. press OK.

  1. press OK in the dialogue window Power Local Area Connection.

Now that the NAT server is up and running, we can shift our focus to setting up the CA server and SSTP VPN client.

visnovok

In these articles, we continued to talk about setting up an SSL VPN server, tweaking Windows Server 2008. We looked at installing IIS on a VPN server, installing and installing a server certificate, installing and setting up RRAS and NAT services on a VPN server. In the next article, we will finally look at the CA server and SSTP VPN client settings. To hell! Volume.

| To the list of publications

Remote hijacking access behind the help of SSL VPN

Boris Borisenko, expert

TECHNOLOGY VPN has gained a wide breadth as a zasib, which ensures safe access of a spyware to a local enterprise from a physically remote point. SSL-based VPN solutions were developed as a complementary and alternative technology for remote access behind the help of IPsec VPN. However, the versatility and versatility of the organization of secure channels made the connection broken by SSL VPN with a great technology. SSL VPN concentrators may have their own advanced capabilities (compared to traditional VPN appliances). Larger intermediary screens will secure the publication of Web add-ons on the Internet through ports, network address translation (NAT) and intermediary routing, but not the cryptographic protection of data over time, so secure add-ons. IPsec VPN Correspondents can establish links to a corporate network similar to direct connections to a local network. With this, all data that is transmitted between the VPN server and the client is encrypted. However, for large VPN extensions, a special client program is required. In an SSL VPN concentrator, the browser is used to access remote browsers not only to internal websites, but also to add-ons and file servers. Let's take a look at the best solutions for organizing remote access to SSL VPN servers.

ZyWALL SSL 10

This is a virtual private gateway with SSL encryption support, which allows you to organize secure remote access to a measure and add-ons through a VPN connection without installing the client part in front. Attachment is promoted for small and medium businesses.

For connecting to the Internet or DMZ transfers WAN-interface, a switch to a LAN port, an RS 232 DB9 port - for control via the console (in this add-on, there are fewer possibilities, lower in the same ZyWALL 1050). ZyWALL SSL 10 supports not only direct access to internal firewall databases, but also works with Microsoft Active Directory, LDAP and RADIUS. In addition, it is possible to use two-factor authentication (with the help of ZyWALL OTP).

Direct access to the resources of the corporate network is secured by logging on the computer from a remote source using the SecuExtender client. With the permission of the administrators, it will be possible to easily organize network tunnels for the help of IPsec. Also, administrators can configure security policies for groups of correspondents, a range of addresses, or other addenda.

ZyWALL SSL 10 supports 10 one-hour hijacking sessions with the possibility of increasing up to 25 SSL sessions. At the edge of the annexes, it is possible to vicorist either behind the existing gateway (Fig. 2), or as a new gateway (Fig. 3). For the first type of ZyWALL SSL 10, for advanced security, you can connect to the DMZ port. The other is up to the modem, and the Web server is up to ZyWALL. The traffic from the Web server to the distant coristuvachev pass through the VPN tunnel.

Among the options, you can choose the TLS protocol, encryption, certificates - 256-bit AES, IDEA, RSA, hashing - MD5, SHA-1. It is a special feature to make a great choice of nozzles for the power plug (for any sockets and merez).

Netgear ProSafe SSL VPN Concentrator SSL312

The attachment allows you to process up to 25 remote clients at the same time with a corporate account. We rely on the help of ActiveX-components, which can be taken advantage of and installed directly in the outbuilding.

However, the client is responsible for accessing the system with administrator privileges to install other ActiveX components. In addition, the settings in the browser are due to the settings that allow the use of ActiveX components. You may also need to install a Windows update. Hardware security includes two LAN ports and one serial port. When logging in, the authentication option is selected: the database of corristers, Windows NT domain, LDAP, Microsoft Active Directory, RADIUS (PAP, CHAP, MSCHAP, MSCHAPv2). When accessed via remote access, the server is still at fault, but it is still available and the traffic routing is still at fault.

Although the DRAM memory is still available in both Netgear SSL312 and ZyWALL SSL 10, Netgear's flash memory is clearly compromised (16 versus 128 MB). The Net-gear SSL312 processor is also a ZyWALL program (200 versus 266 with a cryptographic accelerator). On the Netgear SSL312, ZyWALL supports version 2.0 of the SSL protocol.

I can add two variants of the vikoristannya. The first one out of two Netgear SSL312 Ethernet ports wins only one. The gateway is responsible for enabling access to Netgear SSL312 over HTTPS. Another option is to override the Netgear SSL312 Ethernet port so that SSL traffic does not pass through the interfacing screen. One Ethernet port of the add-on is assigned a closed IP address, and the other is assigned a closed IP address of the internal network. Please note that Netgear SSL312 does not defeat or replace NAT and MCE functions.

For work with fencing services in the remote local fringe, two options are provided: a VPN tunnel, which is installed between the backdoor and the extension, or port forwarding (Port Forwarding). Being offended is a way to make gains and shortcomings. The VPN tunnel allows you to organize a full call from a remote local network, but with it, it does not allow you to make a call for a skin service. Port forwarding allows only TCP connections (UDP and other IP protocols are not supported), rules for skin programs are set okremo.
Dynamic DNS in Netgear SSL312 is not supported, which is also short.

SSL VPN Juniper Networks Secure Access 700

The solution for remote access behind the help of SSL VPN is also broken down for small and medium companies. The interface is like a koristuvach, as well as an administrator of organizations at the Web browser. Installing a VPN client on a remote computer is not necessary. Two RJ-45 Ethernet ports and one serial port are provided. Juniper SA 700 automatically checks the remoteness of the computer and, depending on the results of the installed software, applies different access rights.

Building support is not more than 25 one-hour working coristuvachiv. The following options are available for authentication and authorization: Microsoft Active Directory / Windows NT, LDAP, NIS, RADIUS, RSA, SAML, certificate server. Attachment provides access to file resources Win-dows / SMB, Unix / NFS, Web add-ons, including JavaScript, XML, Flash; supported by Telnet and SSH protocols. Access to corporate e-mail is organized on the basis of a standard mail client, which can be securely connected via the SSL protocol to Juniper SA 700. However, for this you need a "Core Clientless Web Access" license.

Juniper SA 700 transmits an automatic scan of a remote computer, as the new one has installed anti-virus software, personal MCE, and other programs that provide security. All proxy server and time files required for the session are deleted after the session ends.