Security Considerations for Always on VPN Deployments - Celestix (2024)

Security Considerations for Always on VPN (AOVPN) Deployments

Microsoft Always on VPN (AOVPN) is a remote access technology included as part of the Unified Remote Access role in Windows Server 2012 R2/2016/2019. Starting from Windows Server 2016, Routing and Remote Access server (RRAS) role is designed to be used remote access server as well as router supporting wide range of features. For AOVPN deployment the required features are support for IKEv2 VPN connections, Secure Socket Tunneling Protocol (SSTP), and LAN routing.

IKEv2 is a VPN tunneling protocol described in IEFT RFC 7296 and its main advantages is that it can tolerate interruptions in the undelaying network connections, for example if network connectivity is lot temporarily or if user moves its end point from one network to another, IKEv2 automatically restores the VPN Connection when network connection is reestablished.

It represents a paradigm shift in the way remote access is provided to corporate-managed Windows devices. AOVPN is fundamentally built using existing, widely deployed industry standard protocols for which security configuration is will understood. However, many organizations want to better understand the specific security features incorporated with AOVPN.

This whitepaper serves to provide an overview of security features in AOVPN. It will explain in detail how the authentication process works, provide insight into optional security configurations, its integration with Azure Cloud and advanced features, explore the differences between split and force tunneling, and outline how to address lost or stolen AOVPN devices. Finally, the benefits of using the Celestix E Series hardware appliance platform and its additional features and enhancements can provide the best experience for AOVPN deployments.

AOVPN is a collection of Windows platform technologies that are assembled to provide secure, seamless, and transparent, always on, bi-directional network connectivity for remote Windows 10 machines. AOVPN leverages authenticated IPsec encryption for mutual authentication, confidentiality, data integrity, access control and establishing along with data source authentication for IP datagrams. AOVPN supports both IPv6 and IPv4 protocols. AOVPN leverages variety of Authentication options such as Digital Certificate, EAP, smart cards, Windows Hello for Business, and OTP through MFA by way of EAP radius configuration. AOVPN provides two types of tunnels; Device Tunnel and User Tunnels and these tunnels can be provisioned via SCCM, Microsoft Endpoint configuration manager and Intune, or running PowerShell script on the windows 10 end point.

When a AOVPN client is outside of the corporate network and has an active

Internet connection, the client will attempt to establish connectivity with the AOVPN gateway using IKEv2 or SSTP (if tunnel type is set to Automatic then VPN client will cycle through all available tunnel types and connect to either IKEv2 or SSTP as these two tunnels are configured for AOVPN) type. In a typical configuration, two distinct AOVPN tunnels are established in an orderly fashion– a Device tunnel and a user tunnel.

Device tunnel – Enables Windows 10 AOVPN enable device to connect with specified VPN servers prior to users log on to the device using Machine certificate always present on the endpoint. Organizations require remote device management and Pre-login connectivity scenarios use device tunnel connectivity options. AOVPN Device Tunnel can be compared with DirectAccess Infrastructure tunnel. Device tunnel use IKEv2 tunnel type and can be configured to meet highest level of security and protection for remote connections.

User tunnel – Enables windows 10 AOVPN enabled device to connect only after Active Directory based user has successfully logged on to the device. After User tunnel connected with the specified VPN severs, it allows users to access organization corporate resources through VPN servers.

Device and User tunnels can work independently with their configured VPN profiles, can be configured to use different authentication methods, can be connected at the simultaneously, and can use appropriate VPN configuration settings.

AOVPN in Windows Server 2012 R2/2016/2019 can now be configured behind an existing edge firewall for additional protection. Using this deployment model, the AOVPN server is configured using private IPv4 addresses. The server can be configured with two network interfaces in parallel with existing perimeter networks, or with a single network interface either in the DMZ or on the LAN.

Perimeter/DMZ deployments reduce the exposure of the AOVPN server to untrusted networks. When the AOVPN server is located behind a device performing NAT, it supports only the IKEV2 and SSTP tunnel type for AOVPN clients. SSTP is an alternative to IKEv2 which uses industry standard TLS enabling it accessible from Internet and provides good security out of box. TLS used by SSTP tunnel type also support offloading feature using a third-party application delivery controller such as KEMP to reduce resource utilization on the AOVPN server. AOVPN client can be configured to connect as Always on, application triggering, and name-based triggering.

To provide even higher levels of assurance for AOVPN clients, strong user authentication can be implemented using Digital certificates, Windows Hello for business, smart cards (physical or virtual), One-time password of MFA support by utilizing EAP Radius integration. Custom configuration can be employed to provide additional security. For example, with additional configuration, IPsec custom crypto settings can be customized to meet higher security requirements.

Windows information protection (WIP) enables separation and protection of enterprise date against disclosure across corporate issued and personal devices. The EdpModelId node in the AOVPN VPNv2 configuration service provider (CSP) allows a windows 10 VPN client to work with WIP and extends its protection to remote devices. WIP use be used for File Encryption and file access blocking, restricting copy/paste, sharing and drag/drop operations, protect intranet resources over VPN, and protecting SMB and Internet cloud resources over the VPN.

AOVPN also support use traffic filters which provides enterprise the ability to decide what traffic is allowed into the corporate network based on their policy. Traffic filters can effectively be used for interface specific firewall rules on VPN interface and they are of two types; App-based (traffic from applications can be set to allow/deny) rules and traffic based rules (based on 5-tuple ports, addresses, and protocols).

AOVPN also support LockDown VPN which only allows the device to send network traffic over the VPN interface. Its enforces this by keeping VPN connected all times, user’s ability to disable/disconnect/Delete VPN Connection, applying force tunnel mode, and if VPN connection is not available then disable all outbound access.

To further enhance the overall security of AOVPN, a third-party Application

Delivery Controller (ADC) can be deployed to provide a level of pre authentication for AOVPN clients. Also, encryption methods using stronger cipher suites and Hashing algorithms.

DirectAccess Functionality

AOVPN equivalent

Transparent connectivity to corporate network

Always on VPN can be used to support; application launch based auto-triggering, namespace resolution requests or permanent Always ON VPN

Managing remotely connected DA clients via Manage-out from management workstations

Device Tunnel can be configured to achieve this functionality

Dedicated Tunnel (Infrastructure) to provide corporate access prior to user login

Device Tunnel can be configured to achieve this functionality

Use of Network Location service (NLS) to determine the inside / outside corporate location

Trusted Network detection can be used to achieve the similar compatibility, which is based on connection specific DNS suffix assigned to NIC

HTTPS Connectivity

SSTP can be used as fall-back option from IKEv22

DirectAccess operational status monitoring

Windows server 2016 Remote access console provides the operational status of VPN services

DirectAccess connected clients operational status

Windows server 2016 Remote access console provides the operational status of AOVPN clients

Inbox or Radius accounting for DA connections reporting

Windows server 2016 Remote access console provides the reporting for AOVPN clients

Enable Access to Management servers prior to user login

Device Tunnel with traffic filters can be configured to achieve similar functionality

Load balancing support using Windows NLB or third-party load balancer

AOVPN support the use of Windows NLB and third-party load balancer for load balancing SSTP and IKEv2 tunnel types

DirectAccess security groups to limit remote access functionality to specific domain joined devices

RADIUS can be used to configure granular authorisation access by the way of security groups in User Tunnel type

DirectAccess support behind edge firewall or NAT device

AOVPN can be configured to use protocols IKev2 or SSTP which fully support the use of VPN server behind NAT device or perimeter firewall

Multiple domains and forest support

AOVPN doesn’t depend on AD domain services forests and domain topology. AD authorisation can be achieved via RADIUS by way of EAP.

Split tunnel and force tunnel support for intranet/internet separation

AOVPN can be used to configure Split and force tunnel natively with additional application specific granular routing policies

Use of Network Connectivity assistant (NCA) to provide corporate connectivity status

AOVPN is integrated with native NCA and offers connectivity status from NIC

DirectAccess Multisite to provide multiple remote access entry points

AOVPN doesn’t offer this feature natively, however this functionality can be achieved by way of third-party global server load balancing (GSLB)

DirectAccess client configuration via Group Policy

AOVPN configuration can be applied using PowerShell, SCCM, Intune

By default, AOVPN is configured with split tunneling enabled. This allows the

AOVPN client to connect to the public Internet and the corporate network simultaneously. Some security administrators believe this to be a security risk, but closer evaluation reveals this risk to be more perceived than actual.

One concern with split tunneling is that a compromised device could allow an attacker to tunnel from the Internet through the connected AOVPN client to access resources on the corporate network. However, the authenticated nature of the AOVPN IPsec tunnels makes this impossible.

If a AOVPN client is infected with a virus or malicious software, it may be possible for it to infect other hosts on the corporate network via the AOVPN connection. However, this scenario also applies to traditional VPN clients. The risk is reduced with AOVPN because they are always managed, and this maintenance of client security posture allows for better malware defense and client protection.

With split tunneling, AOVPN clients have unrestricted access to the public Internet. This lack of filtering is a valid concern for security administrators, but again, this problem exists for traditional VPN clients too. A VPN client with split tunneling disabled may not be able to access the Internet freely while connected to the VPN, but once the user disconnects the VPN session they will once again has full unrestricted Internet access. AOVPN also use force tunnel with exclusions which enable enterprises to exclude office 356 or any other traffic from VPN tunnel by way of network addresses.

There are several ways to mitigate this issue. AOVPN can be configured to enable force tunneling, which requires AOVPN clients to use the on-premises corporate proxy servers to access the Internet. Force tunneling has some potential negative side effects, however. By forcing all of the client’s Internet traffic over the AOVPN connection, the user experience is often degraded by additional network latency introduced by encryption and web proxy traffic inspection. Also, the added network load can degrade performance and limit scalability of the AOVPN server. With AOVPN force tunnel is not supported in dual tunnel deployment and only supported on User tunnel type deployment.

A better solution is to enable remote filtering on existing on-premises secure web gateways (if available) or to investigate the use of cloud-based web content filtering solutions for remote/mobile clients.

AOVPN RRAS server can be configured to enforce revocation of VPNs that’s uses IKEv2 and machine certificates for device tunnel authentication. If a AOVPN enabled device is compromised or stolen then its machine issued certificate can be revoked and its access can be denied on the VPN server after its revocation list has been updated.

Concerns that always-on AOVPN clients represent an increased security risk are unfounded. Like a device configured for client-based VPN, an attacker would need valid user credentials to gain access to the network, but AOVPN includes additional safeguards. Clients use computer accounts that can be disabled in Active Directory to prevent connectivity, even if valid user credentials are supplied. If real-time remediation is necessary, terminating an active client session forces authentication, which will fail after the computer account is disabled.

The AOVPN client presents the same risks as a client configured with client-based VPN. Many of these risks can be mitigated using a combination of operational security techniques and technologies commonly used today. Mobile clients should be configured with full disk encryption and require a PIN to boot the device. They should be configured to require a password to be entered when waking from sleep or hibernation. Strong user authentication using smart cards or dynamic passwords can also be leveraged.

The AOVPN solution is improved by additional security measures included with the Celestix appliance platform (physical, virtual and AWS edition). Based on Microsoft and industry standard security best practices, the Celestix appliance platform has undergone extensive hardening and attack surface reduction. These processes disable or remove unnecessary services, applications, roles, and features for a stronger security posture. Additional measures include updating the default configuration of the Windows firewall to further restrict remote access to services running on the host and improving default encryption algorithms used by applications and services.

While augmenting the security, the Celestix appliance platform also offers simplified deployment and centralized management features. The platform lowers the total cost of ownership and maintenance overhead presented in other deployment options.

AOVPN is a compelling remote access solution that can be used to better manage remote Windows clients and dramatically improve their security posture, while at the same time securely providing ubiquitous and familiar remote access to on-premises applications and data. AOVPN leverages mature, well understood, and commonly deployed Windows platform technologies and works with Azure conditional access. Client connections are fully authenticated using a combination of digital certificates, in addition to machine and user authentication. The solution provides significantly higher levels of assurance when compared to DirectAccess, and security can be further enhanced with custom configuration. AOVPN provides support for both split and force tunneling and lost or stolen devices can be denied remote access administratively. The Celestix E Series hardware appliance platform increases the solution’s security through service hardening and attack surface reduction and simplifies feature installation with streamlined management interface.

Security Considerations for Always on VPN Deployments - Celestix (2024)

FAQs

How to secure always on VPN? ›

Always on VPN (AOVP) Security Configuration

To provide even higher levels of assurance for AOVPN clients, strong user authentication can be implemented using Digital certificates, Windows Hello for business, smart cards (physical or virtual), One-time password of MFA support by utilizing EAP Radius integration.

Is always on VPN more secure? ›

Always On VPN provides the following benefits: Enables the integration of Windows operating systems and third-party solutions to create advanced scenarios. Maintains network security by limiting connections based on traffic types, applications, and authentication methods.

What is the difference between VPN and always on VPN? ›

Active VPN profiles connect automatically and remain connected for scenarios such as user sign-in, network state changes, or changes in the state of a device screen. Always On VPN allows IT administrators to create secure VPN connections to applications hosted on Azure with minimal configuration.

What ports are required for always on VPN? ›

Join the VPN server to the domain. For information on how to join a server to a domain, see To join a server to a domain. Open your firewall rules to allow UDP ports 500 and 4500 inbound to the external IP address applied to the public interface on the VPN server.

Why are so many protocols and steps required to establish and maintain a secure VPN connection? ›

For VPNs to be most effective, protocol standards are necessary to build secure ways to transmit data over the public internet which is otherwise open and not secure for sending data. Think of VPN sessions as tunnels, or encrypted connections that connect to a company's private, secured network.

What happens if VPN is always on? ›

Should I leave my VPN on all the time? Yes, you should leave your VPN on all the time. VPNs offer the best online security, so keeping it on will protect you against data leaks and cyberattacks, especially while you're using public Wi-Fi. It can also safeguard against intrusive snoopers such as ISPs or advertisers.

What is the difference between Microsoft tunnel and always on VPN? ›

Always On VPN gives you the ability to create a dedicated VPN profile for device or machine. Always On VPN connections include two types of tunnels: Device tunnel connects to specified VPN servers before users log on to the device. Pre-login connectivity scenarios and device management purposes use device tunnel.

Is there a downside to always using a VPN? ›

One of the primary concerns when using VPNs is the potential decrease in internet speed. Encrypting data and routing it through remote servers can introduce latency, resulting in slower connections.

What protocol does always on VPN use? ›

In Windows Server 2022, Always On VPN includes support for the Internet Key Exchange version 2 VPN protocol for improved performance and security; Microsoft Entra ID (formerly Azure Active Directory) for conditional access policy integration; and XML profile configuration via PowerShell, Microsoft Endpoint ...

What is the most secure VPN method? ›

OpenVPN is the most secure VPN protocol and the safest choice thanks to its near-unbreakable encryption, which keeps users' data private even when using public Wi-Fi. Because it's open source, users can check the source code for vulnerabilities and reassure themselves that there are no weaknesses in its security.

How to troubleshoot always on VPN? ›

Go to Control Panel > Network and Internet > Network Connections, open the properties for your VPN Profile, and check to make sure the value in the General tab can publicly resolve through DNS. If not, the Remote Access server or VPN server being unable to resolve to an IP address is likely the cause of the issue.

Which three tools are primarily used to deploy and manage the always on VPN feature? ›

You can deploy and manage your VPN settings with Windows PowerShell, Microsoft Endpoint Configuration Manager, Intune, Windows Configuration Designer, or any third-party mobile device management (MDM) tool.

Is always on VPN non domain-joined? ›

Always On VPN supports domain-joined, nondomain-joined (workgroup), or Microsoft Entra ID–joined devices to allow for both enterprise and BYOD scenarios. Always On VPN is available in all Windows editions, and the platform features are available to third parties by way of UWP VPN plug-in support.

What are the three required technologies needed before deploying always on VPN? ›

To deploy Always On VPN, you will need to install and configure the following components:
  • A domain controller.
  • Active Directory Group Policy.
  • Network Policy Server (NPS)
  • A VPN server.
Dec 10, 2023

What is the most secure VPN port? ›

Port 443 is most commonly known for its use with HTTPS traffic and is rarely, if ever, blocked or restricted by firewalls or other security measures.

What are the differences between DirectAccess and always on VPN? ›

Where DirectAccess provides access to all internal resources when connected, Always On VPN allows administrators to restrict client access to internal resources in a variety of ways. In addition, traffic filter policies can be applied on a per-user or group basis.

Can a VPN be a security risk? ›

Your VPN provider can log some information, such as your IP address, so you should be aware of their data collection and logging policies. If the VPN provider experiences an attack or data breach, your organization's sensitive information and employees' personal data could be compromised or revealed.

What are the security requirements of VPN? ›

Choosing secure tunneling protocols is essential for a safe VPN. Protocols like IPsec and OpenVPN provide strong security features that are necessary for protecting data in transit. It is important to select protocols that support high levels of encryption and can effectively prevent data leaks and exposure.

How do I make my VPN more secure? ›

How can you secure your VPN from unauthorized access?
  1. Choose a strong encryption protocol.
  2. Use a reliable VPN provider.
  3. Configure your firewall and router.
  4. Use strong authentication methods.
  5. Monitor and audit your VPN activity.
  6. Here's what else to consider.
Nov 27, 2023

How do I make my VPN secure? ›

Steps for setting up a VPN
  1. Step 1: Line up key VPN components. ...
  2. Step 2: Prep devices. ...
  3. Step 3: Download and install VPN clients. ...
  4. Step 4: Find a setup tutorial. ...
  5. Step 5: Log in to the VPN. ...
  6. Step 6: Choose VPN protocols. ...
  7. Step 7: Troubleshoot. ...
  8. Step 8: Fine-tune the connection.

How do I keep my VPN safe? ›

To ensure your safety, look for a reputable VPN provider that offers a strict no-logs policy, a kill switch for automatically disconnecting from the internet if your VPN connection drops, DNS leak protection to prevent your DNS requests from being revealed to your ISP or other entities, a large and diverse network of ...

Does a VPN always protect you? ›

However, remember that only your data traffic on the internet is anonymized and protected by using a VPN. The VPN connection does not protect you from hacker attacks, Trojans, viruses or other malware. You should therefore rely on an additional trusted anti-virus software.

How to keep VPN always on iPhone? ›

One way to ensure that your iOS Device auto connects to the VPN is to enable “Connect on Demand” within your iOS VPN Settings, by going to General> VPN & Device Management> VPN> Private Internet Access.

Top Articles
Which types of restaurants are busiest (and slowest) on Valentine's Day? | Womply
Do This for Thicker, Richer Homemade Chicken Stock
Dunhams Treestands
Katie Pavlich Bikini Photos
Davita Internet
Fat Hog Prices Today
Hotels
Yogabella Babysitter
Ingles Weekly Ad Lilburn Ga
Cvs Devoted Catalog
Horned Stone Skull Cozy Grove
Dallas’ 10 Best Dressed Women Turn Out for Crystal Charity Ball Event at Neiman Marcus
Belle Delphine Boobs
Bad Moms 123Movies
Kvta Ventura News
Costco Gas Foster City
Dignity Nfuse
Boston Gang Map
Virginia New Year's Millionaire Raffle 2022
White Pages Corpus Christi
Scream Queens Parents Guide
Governor Brown Signs Legislation Supporting California Legislative Women's Caucus Priorities
Pirates Of The Caribbean 1 123Movies
Magic Seaweed Daytona
Sadie Sink Reveals She Struggles With Imposter Syndrome
Idle Skilling Ascension
Relaxed Sneak Animations
The Collective - Upscale Downtown Milwaukee Hair Salon
Gopher Carts Pensacola Beach
Taylored Services Hardeeville Sc
Askhistorians Book List
Robert A McDougal: XPP Tutorial
ShadowCat - Forestry Mulching, Land Clearing, Bush Hog, Brush, Bobcat - farm & garden services - craigslist
Garrison Blacksmith's Bench
Skroch Funeral Home
Goodwill Houston Select Stores Photos
KM to M (Kilometer to Meter) Converter, 1 km is 1000 m
Can You Buy Pedialyte On Food Stamps
Hellgirl000
Legit Ticket Sites - Seatgeek vs Stubhub [Fees, Customer Service, Security]
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Wunderground Orlando
Giovanna Ewbank Nua
Tricia Vacanti Obituary
The Great Brian Last
Best Haircut Shop Near Me
American Bully Puppies for Sale | Lancaster Puppies
The Many Faces of the Craigslist Killer
Lightfoot 247
Greg Steube Height
Craigslist Monterrey Ca
Convert Celsius to Kelvin
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 6022

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.