Deployments with IDP

About IDP

Securing intranet work application and resource traffic is vital to protecting your network from hostile outside intrusion. You can add levels of application security to your remote access network by integrating a Ivanti Connect Secure system with a Juniper Networks Intrusion Detection. The IDP device may provide the following types of protection in this solution (some forms of protection depend upon the specific configuration):

The IDP device provides the following types of protection (some forms of protection depend upon the specific configuration):

Protects against attacks from user to application and from application to user (from a server-side endpoint)

Detects and blocks most network worms based on software vulnerabilities

Detects and blocks non-file-based Trojan Horses

Detects and blocks effects of spyware. adware, and key loggers

Detects and blocks many types of malware

Detects and blocks zero-day attacks through the use of anomaly detection

From 9.1R15 onwards, support for Sensors is deprecated. Ensure you remove all related configurations before upgrading to 9.1R15. Upgrade may fail if all configurations are not removed. For more information refer KB45044.

You do not need a special license from Ivanti to enable interaction between Ivanti Connect Secure and the IDP.

Using the Ivanti Connect Secure admin console, you can configure and manage interaction attributes between it and an IDP, including the following:

Global configuration parameters such as the IDP hostname or IP address, the TCP port over which the sensor communicates with Ivanti Connect Secure, and the one-time password Ivanti Connect Secure and IDP use to authenticate with one another.

Dynamically changing the IDP configuration from Ivanti Connect Secure and alerting the IDP of changes in the IP address pool available to remote users.

Various levels of attack severity warnings.

The IDP sits behind Ivanti Connect Secure on your internal network and monitors traffic flowing from Ivanti Connect Secure into the LAN. Any abnormal events detected by the IDP Sensor are reported to Ivanti Connect Secure, which you configure to take appropriate action based on the severity level of the reported events.

IDP Deployment Scenarios

The two most likely deployment scenarios are as follows:

Customer use of Ivanti Connect Secure for extended enterprise access and IDP for security of all perimeter traffic including but not limited to traffic from Ivanti Connect Secure. Ivanti Connect Secure and IDP Topology Scenario 1 illustrates this scenario, in which Ivanti Connect Secure is deployed in the DMZ or on the LAN and the IDP is deployed in-line behind the firewall and in front of the LAN.

Ivanti Connect Secure and IDP Topology Scenario 1

 

In the second deployment scenario, IDP is only used to protect traffic that comes through Ivanti Connect Secure but not in-line with other perimeter traffic. Figure 315 illustrates this deployment scenario.

Ivanti Connect Secure and IDP Topology Scenario 2

 

Configuring Ivanti Connect Secure to Interoperate with IDP

The IDP Sensor is a powerful tool to counter users who initiate attacks. Integration with Ivanti Connect Secure allows you to configure automatic responses as well as manually monitor and manage users.

To configure the system to interoperate with an associated standalone IDP Sensor, you must first ensure the IDP has been configured according to the instructions described in the Signaling Setup appendix of IDP Series Concepts and Examples Guide, Version 5.1rX.

On Ivanti Connect Secure you can specify actions to be taken in response to users that perform attacks:

Users page-Manually identify and quarantine or disable users on the System > Status > Active Users page, which lists users who have performed attacks.

Interaction Between the IC Series and IDP

Ivanti Connect Secure receives the source and destination IP addresses and port numbers of the attacking host and the resource against which the attack was launched, along with the attack identifier, severity of the attack, and the time at which the attack was launched.

Ivanti Connect Secure incorporates and displays the attack information received from the IDP sensor on the System > Status > Active Users page. Based on the attackers IP address and port number, the system can uniquely identify the user's session.

For manual action, you look up the information available on the Active Users page and decide on an action.

Identifying and Managing Quarantined Users Manually

When the system quarantines a user based on an attack, you can display and manage the states by locating the user link in the System > Status > Active Users page.

A small warning icon displayed in front of the username.

The hyperlinked username.

An enabled Quarantined option button on the specific user's page. If the user is not quarantined, the option button is disabled.

You can manage quarantined users from either the admin GUI or by logging in as a user with administrative rights on the local authentication server.

To manage quarantined users:

1.Identify quarantined users at System > Status > Active Users.

2.Locate the quarantined user from the Authentication > Auth. Servers > System Local on the admin GUI or from the Admin Users window on the local authentication server. You must be logged in to the local authentication server as an administrator user in order to see the Admin User option.

3.Click the username link. The user page opens, showing a number of options. See Managing Quarantined Users

Managing Quarantined Users

 

4.Click Disabled to disallow a user from authenticating.

5.Click Quarantined to leave a user in a quarantined state. The Quarantined option is only enabled if the user is already quarantined.

The system assigns quarantined users to the quarantined role, regardless of their login realm.

6.Click Save Changes.

7.To re-enable previously quarantined or disabled users, select Authentication > Auth. Servers > Select Server > Users and click the link for the given user.

You can also disable users from this location.

8.Click Enabled to release the user from quarantine.

9.Click Save Changes.