1. Field
The present invention relates to providing remote access for security services such as vulnerability scans and penetration tests to internal networks of clients and/or subscribers and, more particularly, to providing full access to client internal networks without requiring dedicated hardware.
2. Related Art
In order to provide security services such as vulnerability scans and penetration tests of client devices, the system providing the service must be attached to and able to route over the client internal network in order to communicate with the client devices. This requires either the physical presence on the client network of the systems providing the service or a dedicated piece of physical hardware to provide such network connectivity between the service provider's network and the client's network. TCP/IP network routing is a complex issue and specific IP address ranges have been allocated for private use, which means that client networks are likely to overlap in terms of IP addresses used.
Remote network connectivity between a service provider and a client can be provided by dedicated physical devices that are placed on the client network which create a Virtual Private Network (VPN) connection back to the service provider to allow network access.
A second solution is to install the full systems needed to provide the security services onto the client network and let the client manage them or manage them remotely through a command-pull structure, where the systems will periodically check with the service provider to receive any new instructions or updates.
Installing physical systems on a client network is an economic hardship and resource intensive, as it can be cost-prohibitive and time-intensive to manufacture, supply, install and maintain such hardware and/or connectivity in order to provide security services to a client. Hardware or network connectivity failures will prevent the service from being provided, resulting in loss of revenue when contracts cannot be fulfilled.
Physical devices on a client network opening up a Virtual Private Network (VPN) connection back to the service provider are unable to determine if there are IP address overlaps or conflicts and are unable to resolve complicated network routes between the service provider and the client. Each installation must be uniquely configured to be sure that there are no IP address conflicts or overlaps.
In accordance with the present invention, there is provided a virtual endpoint that will provide connectivity between the service provider network and the client network when running without requiring dedicated hardware.
The systems at the service provider providing security services are addressed with Public IP Addresses to avoid any IP address or conflicts with client systems.
When started, the virtual endpoint acquires an IP address from the client network by DHCP (Dynamic Host Configuration Protocol), and can be assigned a static IP Address if necessary. This allows it full access to the client network and provides the ability to route across the client network.
A secure VPN (Virtual Private Network) Tunnel is created by the virtual endpoint on the client network to the network of the service provider. The endpoints of the VPN tunnel are statically assigned public IP Addresses reserved by the service provider.
The systems providing the security services are configured to use the statically assigned Virtual Endpoint IP address as the gateway to route to the IP of the target system, allowing them access to the client systems regardless of the IP addressing scheme used by the client.
The virtual endpoint is configured to accept any incoming traffic over the VPN tunnel from the service provider, masquerade the source IP address with the local address given by the client network and forward the traffic to the destination IP address on the client network. The client destination target will respond to the masqueraded IP provided by the virtual endpoint by sending the response back to the virtual endpoint. When the response reaches the virtual endpoint, it will reverse the masquerade by replacing the original source IP on the traffic and forward it through the VPN tunnel, allowing it to reach the original system on the service providers network.
It would be advantageous to provide a virtual endpoint to provide network connectivity between remote networks.
It would also be advantageous to provide a routing scheme for the virtual endpoint that will remove any possibility of IP Addressing conflicts or overlaps.
It would also be advantageous to provide a virtual endpoint that guarantees isolation between the client network and the service provider networks.
It would also be advantageous to provide a virtual endpoint that can be quickly disconnected and reconnected without harm by simply powering it on or off.
It would also be advantageous to provide a virtual endpoint that can be used across all clients without any reconfiguration for unique client networks.
It would further be advantageous to provide a virtual endpoint that requires no specialized skills or knowledge to use.
A complete understanding of the present invention may be obtained by reference to the accompanying drawings, when considered in conjunction with the subsequent, detailed description, in which:
For purposes of clarity and brevity, like elements and components will bear the same designations and numbering throughout the Figures.
When started, the client virtual endpoint 16 acquires an IP address from the client internal network space 26 by DHCP (Dynamic Host Configuration Protocol), and can be assigned a static IP Address if necessary. This allows it full access to the client internal network space 26 and provides the ability to route across the client internal network space 26 and access to any routable client server 18 or system in the client internal network space 26.
A secure virtual private network connection 24 (VPN) is created by the client virtual endpoint 16 from the client internal network space 26 over the internet 10 through the client public interface 14 to the service provider public interface 12. The service provider public interface 12 routes the connection request to the virtual private network concentrator 22. The virtual private network concentrator 22 established the unique virtual private network connection 24 between the service provider network space 28 and the client virtual endpoint 16 on the client internal network space 26. The endpoints of the VPN tunnel are statically assigned public IP Addresses reserved by the service provider to prevent any routing conflicts.
The service provider server 20 providing the security services are configured to use the statically assigned Virtual Endpoint IP address as the gateway to route to the specific target IP address on the client network, allowing them access to the client systems regardless of the IP Addressing scheme used by the client.
The client virtual endpoint 16 is configured to accept any incoming traffic over the VPN tunnel from the service provider network space 28, masquerade the source IP address with the local IP address given by the client internal network space 26 and forward the traffic to the destination IP address of the client server 18 or system on the client internal network space 26. The client server 18 or system that has been selected as a target will respond to the masqueraded IP address provided by the client virtual endpoint 16 by sending the response back to the client virtual endpoint 16. When the response reaches the client virtual endpoint 16, it will reverse the masquerade by replacing the original source IP on the traffic and forward it through the virtual private network connection 24, allowing it to reach the original service provider server 20 on the service provider network space 28.
In
Since other modifications and changes varied to fit particular operating requirements and environments will be apparent to those skilled in the art, the invention is not considered limited to the example chosen for purposes of disclosure, and covers all changes and modifications which do not constitute departures from the true spirit and scope of this invention.
Having thus described the invention, what is desired to be protected by Letters Patent is presented in the subsequently appended claims.