Wednesday, June 3, 2015

Virtual Private Network (VPN) Site-to-Site Security

Several of the problems outlined in this blog related to using remote access clients as endpoints are not problems for L2L VPNs. This is mainly because Software Development Companies typically owns and controls both ends of the tunnel for Site-to-Site connections, although Business-to-Business (B2B) deployments are widespread and common. Also, most branch offices are connected with routers or purposed appliances instead of client operating systems, but be aware that many network devices today are running some flavour of a commodity operating system (usually a Unix variant) under the hood, which requires patching and updates like any other system. Since users do not log in to routers and browse the Internet, install unknown applications, or double-click e-mail attachments, site-to-site connections tend to be more secure.

The B2B connections mentioned previously are site-to-site links where the corporation owns only one side of the connection. This is typically found in situations where the organization’s networks are linked with those of business partners. There is no quarantine type solution that will check this type of connection yet, so it is up to the remote access architect to define the minimum requirements for the partner tunnel endpoint, or to bring the connection in through a place in the network where it is isolated and there is visibility into what is taking place. It is important to monitor the link traffic and, if possible, restrict it to only the necessary internal destinations.

Site-to-site connections often allow multiple users to use the same connection, which means the remote access architect can afford to spend more money on the ends of the connection. Many organizations actually put in stateful firewalls at the branch offices with the corporate rules loaded on them. Having distributed firewall rules provides a very good security model because it guarantees the same rules are used regardless of the client location. It would be ideal to have stateful distributed firewalls at all remote locations—both at corporate endpoints and at home users’ endpoints—but this is typically too expensive. The remote access architect will need to evaluate the cost and security of this approach for the particular environment.

It is also important to ensure that branch offices are not simply using a Network Address Translation (NAT) device also as a VPN endpoint. This is sometimes done in small offices and organizations, but setting up a NAT device with no firewall features gives the users and administrators a false sense of security because the network is within a private network. NAT alone is not sufficient to protect a network, although it is helpful.


Another difficulty with distributed networks is continuing to update the devices that maintain the links. In today’s security-conscious world, it is critical to ensure that the routers and firewalls are always updated with security patches and operating system updates in Software Development Companies. This can be a stressful task. If a security patch or upgrade causes a system to go down, its location and that of the other tunnel endpoint might be anywhere in the world. When an endpoint goes down, critical systems cannot communicate and expert help may not locally be available. However, this is a very important task. The last thing your VPN-based network needs is infected or vulnerable endpoints.

7 comments:

  1. I recently came across your blog and have been reading along. I thought I would leave my first comment.

    ISO 27001 Certification

    ReplyDelete
  2. Its absolutely nice blog. I really like this, Thanks for sharing this.
    ISO 27001 Certification in Kuwait

    ReplyDelete
  3. It is really very helpful for us and I have gathered some important information from this blog.

    halal certification hong kong

    ReplyDelete
  4. Wow, the article is easy to read and understand to find important information

    ISO 27001 Certification

    ISO 27001 Requirements

    ReplyDelete
  5. Nice post, I bookmark your blog because I found very good information on your blog, Thanks for sharing more information

    ISO 27001 Certifying Body in Hong Kong

    ReplyDelete
  6. This post is really nice and informative. The explanation given is really comprehensive and informative..

    ISO Certification in india

    ReplyDelete
  7. Nice post, I bookmark your blog because I found very good information on your blog, Thanks for sharing more information

    ISO 27001 Consultant

    ReplyDelete