"It is
impossible for ideas to compete in the marketplace if no forum for Internet Protocol Security Contributed by Array Networks, Inc.
Introduction Virtual Private Networks or VPNs allow corporate enterprises to extend access to their internal networks to external employees and partners over standard Internet public networks. The primary reason VPNs came to be was the immensely expensive lease line solutions. An enterprise had to have a physically closed network connection between its partners and remote employees, either through dial-up RAS (Remote Access Server) solutions into the enterprise network, or lease fractional T1 type connections between remote offices and partners. What is a VPN really? VPNs are the enabling technology which allows clients (employees) and partners to use standard public Internet ISPs and high-speed lines to access closed private networks. A common misconception is that VPNs are always IPSec protocol solutions. In fact, there are many encryption and security protocols which offer the functionality of a VPN. SSL is one such protocol. What is an encryption or security protocol? Security protocols and encryption are transmission protocols which are used to transmit high value data securely. Encryption, which is at the core of any security protocol, gives you three fundamental advantages over �clear-text� or unencrypted data: Data privacy - or the ability to hide the data which is being transmitted Data authenticity and integrity � the mathematical algorithm of encryption give security protocols the ability to ensure data has not been modified or damaged in transit Non-repudiation - another feature of the math contained in encryption is the ability to prove an act occurred What is IPSec? IPSec � or Internet Protocol Security, the security protocol most commonly associated with a VPN � is an encryption protocol which provides for secure encrypted data transmission at the Network Layer across a public network such as the Internet. Two parties who wish to create an IPSec tunnel must first negotiate on a standard way to communicate. Since IPSec supports several modes of operation, both sides must first decide on the security policy and mode to use, which encryption algorithms they wish to communicate with and what type of authenticate method to use. In IPSec, all protocols which sit upon the network layer are encrypted (once an IPSec tunnel is created) between the two communicating parties. TCP, UDP, SNMP, HTTP, POP, AIM, KaZaa etc, are all encrypted regardless of their built in (or lack of built in) security and encryption. IPSec issues and complaints Because IPSec sits at the network layer not only is all your network traffic encrypted, but all users gain access to all company resources as if they were physically resident in the office connected to that LAN. You may or may not want partners or temporary remote employees to be part of your network. Your network may only need to have a small portion of its traffic secure. You may not want to encrypt everything from the remote client to the corporate network.
What is SSL and how is it different? SSL � or Secure Sockets Layer � is an application layer protocol used most often to secure web-based communications over the Internet. SSL uses encryption and authentication much like IPSec. Originally SSL protocol encrypted the traffic between two applications that wished to speak to each other but did not encrypt all the traffic from one host to another. However, with the progress in technology SSL VPNs now can be used to encrypt all traffic between a client and a server with SSL VPNs similar to IPSec clients encryption, except that with SSL VPNs there is no requirement for a "fat client". Any client side software that may needed to support Network Layer Encryption is downloaded on the fly using ActiveX technology or Java after the user has been successfully authenticated and authorized. This makes it a "touchless" technology allowing for centralized management and control since the light-weight clients are intelligent and are driven by the centralized access control gateway. This also extends the client support beyond those applications that are "SSL aware" to applications, such as Web browsers like Internet Explorer and Netscape or email applications such as Outlook and Eudora and allows any IP based application including TCP, UDP, ICMP etc. Thus enabling a wide range of applications from web browsing to video conferencing over this ubiquitous tunneling mechanism. Why use an SSL proxy? There are many reasons to use a SSL proxy instead of communicating directly from a client to a SSL enabled resource. The most evident reason is performance.
Why use an SSL proxy over an IPSec VPN?
End-to-End vs. End-to-Edge Security One of the major disadvantages of IPSec is that it only creates a secure tunnel between a client and an edge VPN Server. When the client requests access to a resource, he is treated as if he was a member of that same network the resource resides on with IPSec. The only secure connection is between the client and the edge of the corporate network; all the data running over the internal network is in the clear, including any passwords and sensitive data that are sent. With SSL, a secure tunnel is established directly from the client to the resource the client is accessing. With true end-to-end security, no data is sent in the clear, either on the internal network or on the Internet. Everything from the client to the resource is securely authenticated and encrypted. Which Technology is right for me? IPSec � Best used for site-to-site connectivity where tunnels are permanently established, such as in the case of connecting branch offices to corporate offices and in scenarios where large volumes of background traffic needs to be sent from automated programs talking to other automatic programs. SSL � Should be used for all Remote access scenarios. About Array Networks Founded in 2000, Array Networks is a leading provider of high-performance, secure universal access solutions. Array delivers product lines that address the rapidly growing SSL VPN market as well as the application acceleration market. More than 500 customers including enterprises, service providers, government and vertical organizations in healthcare, finance and education rely on Array to provide anytime, anywhere secure and optimized access. Array provides the world�s fastest and most scalable SSL VPN products on the market today. Array�s technology performs 8 times faster and scales 12 times higher than its nearest competitor. As a result, no other company can deliver high-performance SSL VPN solutions at a comparable cost. Search Our Site Search the ENTIRE Business
Forum site. Search includes the Business
|