John Girard Bill Clark Gartner Webinar SSL VPN - A Lightweight Alternative To IPSEC These materials can be reproduced only with Gartner’s official approval. Approvals may be requested via to
© 2003 FULL VPN (IPSEC, PPTP, L2TP): AAA & DS integration at the workstation Expanded network, security and help desk training Distributed policy management console Session diagnostic tools for access and applications VPN clients for multiple platforms and OS note: proprietary clients work best Registry, policy & boot locks are recommended Personal firewall & antivirus SOHO security appliances (strongly recommended) Session disruption problems Personal PC/device liability/exposure plan. FULL VPN Checklist: It’s So Simple?
© 2003 A Full VPN Is A Network Connection
© 2003 A Full VPN Is A Network Connection DMZ Proxies Filters Policies
© 2003 The Joy of SSL IPSec Virtual Private Networks provide heavyweight tunnels from internal networks to external computers Secure Sockets Layer provides a lightweight way to transfer data between internal servers and external computers Sun, Novell, Aventail, OpenReach, Neoteris, others provide ways to access file/print services over SSL TLS, the upgrade to SSL, includes stronger encryption Why take the risk of opening a tunnel to the outside world? VS
© 2003 SSL VPN: Does the client have a browser? Yes. Next question? AAA & DS integration operate at the server/gateway Session diagnostics are server/gateway based Access control is menu-driven, granular by resource Most NAT, IP Address sharing issues are moot Session can survive an interrupted connection Maximum portability Better solution for “home PC” access and extranet/contractor access There will be times when “full VPN” users will want SSL access. SSL VPN Is Simple(r)
© 2003 SSL: Application or Network Access Private WEB access Private access for a designated C/S application Full network access for a designated workstation
© 2003 SSL VPN Best Practices: Network tunnels should only opened to company managed devices The session still needs to be firewalled! Apply cleanup scripts and applet firewalls Limit what users can see based UserID and Group Policy Track visited intranet links (what, who, when) Detect the type of device and type of network requesting the connection. If you don’t recognize them, place additional limits what the user can see Simpler, Not Foolproof
© 2003 Execution Criteria Visible in the competitive landscape as a brand name and as a solution, validated from independent sources Mind share and industry influence to capture business Request-for-proposal flexibility and competence Gartner client awareness and performance Business health Vision Criteria Ability to adopt longer-term values and cause changes in prevailing industry trends by its actions Mind share and industry influence to set directions Breadth of solution Enterprise focus/message based Value-added services Market Evaluation Criteria
© H2003 Magic Quadrant Neoteris Aventail Aspelle OpenReach Lemon Planet URoam Citrix Nortel Info Express Seagull Tarantella Whale Netilla Array Vision Execution
© Forecast site to site IPSEC (not individual remote access) individual IPSEC/PPTP individual SSL/HTTPS
© 2003 Questions?