Several of the problems outlined in this blog related to using remote access clients as endpoints are not problems for L2L
VPNs. This is mainly because Software Development Companies typically owns and controls both
ends of the tunnel for Site-to-Site
connections, although Business-to-Business
(B2B) deployments are widespread and common. Also, most branch offices are
connected with routers or purposed appliances instead of client operating
systems, but be aware that many network devices today are running some flavour of a commodity operating system (usually a Unix variant) under the hood, which
requires patching and updates like any other system. Since users do not log in
to routers and browse the Internet, install unknown applications, or
double-click e-mail attachments, site-to-site connections tend to be more
secure.
The B2B connections mentioned previously are
site-to-site links where the corporation owns only one side of the connection.
This is typically found in situations where the organization’s networks are
linked with those of business partners. There is no quarantine type solution
that will check this type of connection yet, so it is up to the remote access
architect to define the minimum requirements for the partner tunnel endpoint,
or to bring the connection in through a place in the network where it is
isolated and there is visibility into what is taking place. It is important to
monitor the link traffic and, if possible, restrict it to only the necessary
internal destinations.
Site-to-site connections often allow
multiple users to use the same connection, which means the remote access
architect can afford to spend more money on the ends of the connection. Many
organizations actually put in stateful firewalls at the branch offices with the
corporate rules loaded on them. Having distributed firewall rules provides a
very good security model because it guarantees the same rules are used
regardless of the client location. It would be ideal to have stateful
distributed firewalls at all remote locations—both at corporate endpoints and
at home users’ endpoints—but this is typically too expensive. The remote access
architect will need to evaluate the cost and security of this approach for the
particular environment.
It is also important to ensure that branch offices are
not simply using a Network Address
Translation (NAT) device also as a VPN endpoint. This is sometimes done in
small offices and organizations, but setting up a NAT device with no firewall
features gives the users and administrators a false sense of security because
the network is within a private network. NAT alone is not sufficient to protect
a network, although it is helpful.
Another difficulty with distributed networks is continuing to
update the devices that maintain the links. In today’s security-conscious
world, it is critical to ensure that the routers and firewalls are always
updated with security patches and operating system updates in Software Development Companies. This can be a
stressful task. If a security patch or upgrade causes a system to go down, its
location and that of the other tunnel endpoint might be anywhere in the world.
When an endpoint goes down, critical systems cannot communicate and expert help
may not locally be available. However, this is a very important task. The last
thing your VPN-based network needs is infected or vulnerable endpoints.
I recently came across your blog and have been reading along. I thought I would leave my first comment.
ReplyDeleteISO 27001 Certification
Its absolutely nice blog. I really like this, Thanks for sharing this.
ReplyDeleteISO 27001 Certification in Kuwait
It is really very helpful for us and I have gathered some important information from this blog.
ReplyDeletehalal certification hong kong
Wow, the article is easy to read and understand to find important information
ReplyDeleteISO 27001 Certification
ISO 27001 Requirements
Nice post, I bookmark your blog because I found very good information on your blog, Thanks for sharing more information
ReplyDeleteISO 27001 Certifying Body in Hong Kong
This post is really nice and informative. The explanation given is really comprehensive and informative..
ReplyDeleteISO Certification in india
Nice post, I bookmark your blog because I found very good information on your blog, Thanks for sharing more information
ReplyDeleteISO 27001 Consultant