All rights reserved. January 2006
The information in this document is subject to change without notice. The statements,
configurations, technical data, and recommendations in this document are believed to be
accurate and reliable, but are presented without express or implied warranty. Users must take full
responsibility for their applications of any products specified in this document. The information in
this document is proprietary to Nortel Networks.
The software described in this document is furnished under a license agreement and may be
used only in accordance with the terms of that license.
Trademarks
Nortel, the Nortel logo, the Globemark, Unified Networks, PASSPORT, BayStack, Nortel
Application Switch, Nortel Business Communications Manager, Nortel Communication Serv er,
Nortel IP Softphone, Nortel Multimedia Communication Server, Nortel Multimedia PC Client,
Nortel Multimedia Web Client, Nortel Threat Protection System, Nortel VPN Gateway, and Nortel
VPN Router are trademarks of Nortel.
Adobe and Acrobat Reader are trademarks of Adobe Systems Incorporated.
All other trademarks are the property of their respective owners.
Disclaimer
This engineering document contains the best information available at the time of publication in
terms of supporting the application and engineering of Nortel products in the customer
environment. They are solely for the use by Nortel customers and meant as a guide for network
engineers and planners from a network engineering perspective. All information is subje ct to
interpretation based on internal Nortel test methodologies, which were used to derive the various
capacity and equipment performance criteria and should be reviewed with Nortel engineering
primes prior to implementation in a live environment.
This guide is intended to define the recommended designs and best practices for a Secure
Remote Access Solution. The document provides an overview of the best design practices to
implement a network capable of providing access to business applications, incl uding web
applications, client-server applications, and IP Telephony and multimedia services to teleworkers
and road warriors.
The intended audience for this Solution Guide is Nortel sales teams, Partner sales teams and end
customers. All of these groups can benefit from understanding the common design pra ctices and
recommended components for a Secure Remote Access Solution.
Revision control
No Date Version Revised by Remarks
1 10/19/05 0.1 B. Black Initial Draft
2 11/18/05 0.2 B. Black Best Practices and Other Updates
3 11/28/05 0.3 B. Black Edits based on initial feedback
Today’s enterprise network must support a growing number of mobile workers who require
access to a broad range of information and applications. These worke rs include full-time
teleworkers who use remote access as the primary connection to the network and service s.
There is also a growing number of occasional teleworkers. Another key user category is the road
warrior, who improves productivity by engaging customers and business partners out of the office
but must stay connected. As organizations recognize the benefits of IP Telephony and multimedia
solutions, including intelligent call routing, network presence, application integration, and network
convergence, they demand that these benefits be available beyond the traditional boundaries of
the enterprise network. This Technical Solution Guide provides a prescription for meeting this
requirement while providing the network and information security that must accompany such a
solution.
This guide provides a list of best practices for Secure Remote Access that reduce security
exposure and lower cost of operation. It provides information about solution design, deployment,
and network integration to maximize the benefits to your organization.
1.1 Scope of solution
This document describes the infrastructure components required to desi gn a Secure Remote
Access solution. This document highlights the Nortel recommended designs and best practices
for implementing a converged solution. While it is impossible to include every design scenario,
this document discusses the most prevalent situations encountered within the enterprise. The
following highlights the components covered within these designs:
Intrusion detection and prevention (optional but recommended):
Nortel Threat Protection System
Communication Servers and Clients:
Nortel Multimedia Communication Server 5100 Nortel Communication Server 1000 Nortel Business Communications Manager 50/200/400 Nortel Multimedia PC Client Nortel Multimedia Web Client Nortel IP Softphone 2050
Following best practices in designing and deploying a remote access solution lowers cost of
ownership and dramatically lowers the risk of common security incidents, such as unauthorized
access, theft of information, hacking, denial of service and propagation of threats such as worms
and viruses. Nortel solutions fully support these best practices.
2.1 Keep it simple!
Complexity is the enemy of security and should be avoided in a Secure Remote Access design.
Determine which set of applications each group of users needs. This application set will be small
for most users, and typically includes:
Web access to e-mail
Access to a common web portal (News and Frequently Accessed Information)
Phone directory
IP Telephony and multimedia
Web access to voice mail, such as Nortel CallPilot
Employee tools such as expense vouchering/purchasing/timesheets
Key line-of-business applications based on employee role
The number of unique roles or groups of users is also typically small and might not directly map
to the concept of organizational departments. For many deployments, providing access to less
than a dozen key applications maximizes the benefit of remote access while allowing strict
access control and tracking.
2.2 User authentication
The first step in granting access is user authentication: establishing that a remote user has the
appropriate credentials to connect to the network.
Use a network-based external authentication system that is common to your network and
application environment. Users should not have different sets of IDs and passwords for remote
access. A common authentication system simplifies user management and authorization control,
as well as providing a framework for single sign-on or reduced sign-on capability.
When possible, use a two-factor authentication system that implements a one-time-password
(OTP) scheme. These systems are compatible with existing authentication systems and prevent
unauthorized access based on password guessing or theft. Two-factor authentication schemes
are a key requirement when allowing access from public devices, such as shared PCs a nd
Internet kiosks. You can also restrict remote access to less sensitive applications if users do not
present two-factor-based credentials.
When two-factor authentication is not used, prevent password guessing by requiring passwords
that are at least eight characters long and use a mix of letters, numbers, and punctuation. Set
these passwords to expire at regular intervals, and prohibit reuse of the past five passwords.
Employ a preauthentication scan of the client system to detect crimeware or malware, such as
keyloggers, to prevent theft of access credentials.
Employ a mechanism for Password Guess Lockout to disable an account upon successive failed
logon attempts. You can do this through configuration of your network-based authentication
system. The mechanism must be tied to a process that alerts system administrators of failed
logon attempts and requires follow-up with appropriate action.
Define a procedure to reset expired or locked-out passwords that requires providing additional
private information that is only known to valid users.
2.3 Client admission, compliance, and remediation
In addition to user authentication, check the security policy compliance of endpoints, such as
PCs, laptops, and other devices connecting to your network, before they are admitted. Establish a
minimal set of criteria that includes:
Antivirus protection and signature updates
Personal firewall to protect PCs while connecting through the Internet
Antispyware to detect and remove software that collects personal information
Required operating system type, version, and service pack level
You can also use this minimal set of requirements to distinguish managed devices from sha re d
PCs such as Internet kiosks and home computers. In the case of non-compliance, you can deny
access or provide access to a minimal set of controlled web applications based on the security
sensitivity of your environment. You may also wish to provide a remediation portal for noncompliant devices with access to softw are updates, patches, and other tools.
2.4 Establish authorization based on user and network context
Employ the security concept of least privilege – only allow access to the minimal set of
applications and network subnets required for each group of remote access users. In general,
remote access users do not need full IP access to all parts of your network, including desktop
subnets and all application servers. Use per-group access controls as a baseline for limiting
access. Augment this baseline with additional rules to allow or deny access based on:
Authentication strength (client-certificate use, simple password or OTP/two-factor)
Device type (managed or non-managed/shared)
Source IP address (applicable for home-based teleworkers with static IP assignments)
Results of endpoint compliance scanning
Access type (such as web-only access or full IP access through virtual network adaptors)
2.5 Inspect and track remote access user activity
After users are granted access, it is critical to continually monitor and log activity. Check endpoint
compliance periodically to determine if rogue software successfully disabled security software
during a session.
Ensure that key security and information access related events are logged to a centralized event
manager, such as a syslog server or security event/incident collector. Examples of items to track
include:
Successful and failed logon attempts, including source address and username
Session start and stop times
IP assignment of private addresses with correlation to username
Access control violations
Endpoint compliance-check violations
When providing web-based access, the VPN Gateway will proxy all information requests through
a single, common internal IP address. In this case, configure the gateway to embed user
information such as the username in HTTP headers to allow per-user tracking through intern al
IDS and web application servers.
Ensure that the topology you use for remote access deployment allows security inspection of
non-encrypted traffic. This requires placing internal firewalls and intrusion detection and
prevention (IDP) systems on the trusted side of the VPN Gateway so that remote user traffic can
be inspected and blocked accordingly.
2.6 Protect information and network access
There are a number of techniques you can employ to ensure that information and network access
are protected, even in the case of forgetful or careless end users. Examples include:
Enable idle timeouts to close a remote access session after a period of inactivity. This
limits unauthorized access if a user walks away from an active session.
Enable session timeouts to limit the total session time allowed.
Use a cache wiper to remove any residual data left behind during a session.
Disable split tunneling. Split tunneling allows non-remote access traffic, such as web
access to Internet sites, to bypass the VPN connection. If a connected PC is
compromised and a hacker connects through a backdoor, the hacker will have access to
internal resources during an active session. To limit the possibility of this type of attack,
disable split tunneling. Note that this will not prevent reverse-connecting Trojan horses
and backdoors unless the protocol ports used are blocked by your access control lists
and DMZ security policies. Use endpoint security checking, including malware detection,
to disallow connections from hosts infected with those threats.
2.7 Ensure remote access availability
Provide a resilient and highly available solution by using an active/active deployment with
redundant VPN Gateways. Depending on the size of your network and criticality of remote
access, you may wish to employ both local redundancy through clustering and geographical
redundancy with a multisite VPN Gateway deployment.
2.8 Don’t forget people, process, and policy
These best practices are related to deployment options for a Virtual Private Network. Such a
solution needs to reflect company policies and procedures, including:
Information security policy
Audit logging and data retention policy
Appropriate legislative compliance policies
In addition to the technology to support Secure Remote Access, it is critical to establish operating
procedures and security policy elements specific to remote users and clients.
Education and training of end users also plays a key role in protecting information and securing
access to the network.
The VPN Gateway portfolio provides several different access modes. These access modes can
be used concurrently by different users or groups. They can be served from the same public IP
address or separated as desired. Each mode has advantages and disadvantages in terms of
application support flexibility, compatibility, and security.
3.1 IPsec
IPsec delivers network level access to the intranet through a preinstalled software client that
provides a virtual network adapter to the client operating system. All applications and protocols
are supported, and the end user experience is comparable to that of a LAN connected user.
Access controls configured on the VPN Gateway limit which subnets the client can access.
Endpoint security for IPsec access is provided by an installed version of the TunnelGuard agent.
IPsec strengths include broad application support and the fact that it is a proven, time-tested
technology for Secure Remote Access.
IPsec weaknesses include the fact that the client must be installed on each connecting device
and the fact that some networks may block the protocol ports used by IPsec. This can be an
issue for traveling employees that spend time in corporate intranets managed by external parties,
such as customers or business partners.
3.2 SSL-VPN Clientless Mode
SSL-VPN Clientless Mode allows any web browser to be used as a VPN client. It provides access
to a portal with links to web-based applications (see Figure 1 for a sample SSL-VPN portal).
The advantages of SSL-VPN Clientless Mode include ubiquitous access, including home P Cs,
Internet kiosks and shared or public PCs. No software installation is required. A Java Virtual
Machine is required to provide endpoint compliance checking through an applet-based version of
TunnelGuard. Another benefit of SSL-VPN Clientless Mode is that it provides a highly restricted
access mode, with all web requests proxied by the VPN Gateway. This provides a high level of
granular access control, including URL path checking on a per-group basis.
SSL-VPN Clientless Mode cannot provide access to non-web applications.
3.3 SSL-VPN Enhanced Clientless Mode
SSL-VPN Enhanced Clientless Mode extends the Clientless Mode through Java applets that
enable client-server application communication. This mode provides access to many client-server
applications, such as e-mail clients, including Microsoft Outlook, and remote access applications,
such as Windows Terminal Server or Citrix.
SSL-VPN Enhanced Clientless Mode cannot provide access to complex applications that do not
support Network Address Translation (NAT) or that use dynamic ports. An example of a complex
application is Voice over IP (VoIP).
3.4 SSL-VPN NetDirect Mode
NetDirect Mode provides full network level access through a virtual adapter. A browser-based
applet version of NetDirect is available, as well as a preinstalled client version. NetDirect was
developed to provide IPsec-like access without the limitations of IPsec, such as the requirement
for preinstallation and issues with NAT and firewall traversal. NetDirect supports any IP