VORDEL
VORDEL
VORDEL
Note: All examples in this document refer to the Vordel Gateway version 6.x. Therefore, it
may contain references to features not included in earlier versions.
Vordel Implementation Guide, Copyright © 2000 – 2012 Vordel Limited. All rights reserved. The trademarks, logos
and service marks displayed herein are registered and unregistered trademarks of Vordel and others.
Table of Contents
1 Introduction ............................................................................................................... 1
2 Architecture ............................................................................................................... 1
3 Form Factors.............................................................................................................. 2
4 Advantages of Choosing an Appliance.......................................................................... 2
5 Who Owns the XML Networking Infrastructure? ........................................................... 3
5.1 Operations Staff.................................................................................................. 3
5.2 System Architects ............................................................................................... 5
6 Where do you Deploy a Gateway? ............................................................................... 5
7 Securing the Last Mile ................................................................................................ 6
8 Planning for Installation .............................................................................................. 6
8.1 Policies Development .......................................................................................... 7
8.2 Traffic Analysis ................................................................................................... 8
8.3 High Availability .................................................................................................. 9
8.4 Load Balancing and Scalability ........................................................................... 10
8.5 SSL Termination ............................................................................................... 11
8.6 Disaster Recovery ............................................................................................. 12
8.7 Staging and Testing .......................................................................................... 12
9 How does Vordel Interact with your Existing Infrastructure? ....................................... 14
9.1 Databases ........................................................................................................ 14
9.2 Anti Virus ......................................................................................................... 14
9.3 Operations and Management............................................................................. 14
9.4 Network Firewalls ............................................................................................. 15
9.5 Application Servers ........................................................................................... 15
9.6 Enterprise Service Buses ................................................................................... 16
9.7 Directories and User Stores ............................................................................... 16
9.8 Access Control .................................................................................................. 19
9.9 Public Key Infrastructure ................................................................................... 20
9.10 Registries and Repositories................................................................................ 20
10 Conclusion........................................................................................................ 20
Vordel Gateway 6 Deployment White Paper
1 Introduction
This document answers the typical questions that customers ask when deploying Vordel 6.x
Gateways. Enterprises use the software and appliance versions of these products to perform
a broad range of XML processing scenarios and tasks, including, but not limited to the
following:
• Security
• Application offload
• Service level enforcement
• Service virtualization
• Protocol mediation for XML traffic
2 Architecture
Businesses today are exploiting XML and Web Services to enable rapid application integration
internally across the enterprise and externally with trading partners, suppliers and end-
customers. Regardless of what stage an enterprise is along the path of XML adoption, be it
for tactical point-to-point XML-based integration projects through to the full-blown roll out of
Services Oriented Architecture (SOA), Vordel's solution addresses the requirements of this
wave of integration.
Vordel 6 is a set of enterprise XML network infrastructure products that addresses the key
requirements of XML-based integration and SOA. The following diagrams show the logical
and physical architecture of Vordel 6:
1
Vordel Gateway 6 Deployment White Paper
3 Form Factors
Vordel is available in software and hardware forms:
• Appliance (hardware / software combination): includes a crypto acceleration card and
optionally a Hardware Security Module (HSM)
• Virtual Appliance (virtual image of the appliance): for VMware, Oracle VM, and
Amazon EC2
• Software: installable for Windows, Linux, and Solaris Sparc
Typically, Vordel customers use a mix of software for development and initial testing of
policies, with appliances used for preproduction and production systems.
2
Vordel Gateway 6 Deployment White Paper
Figure 3: VX Architecture
3
Vordel Gateway 6 Deployment White Paper
The appliance and virtual appliance platforms incorporate a powerful Web Administration
Interface to control the common system specific tasks that are required by operations staff.
The Web interface runs by default and makes the configuration of all system related tasks
relatively quick and easy.
4
Vordel Gateway 6 Deployment White Paper
As well as providing operational management functionality of its own, the Vordel Gateway
also interoperates with network operations tools such as HP OpenView, BMC Control, and CA
UniCenter.
5
Vordel Gateway 6 Deployment White Paper
• Internal traffic and pre-scanned external traffic should then be processed by the
Gateway located in the LAN. This type of checking includes:
o WS standards support
o Checking of service level agreements and enforcing throttle threshold levels
o Integration with a wide range of third-party systems
6
Vordel Gateway 6 Deployment White Paper
Guidelines
• Decide what type of policy you need to process your traffic. Think in terms of
functional requirements instead of technologies. Vordel can help map the technologies
to the requirements for you. Examples of functional requirements include: “only
trusted clients should be allowed send XML into the network”, and “an evidential audit
trail should be kept”.
• Think about what you already have in your architecture that could help achieve these
aims. Examples include LDAP directories, databases that already have replication
strategies in place, and network monitoring tools.
• Create a policy to match these requirements and test its performance. Vordel provides
an integrated performance testing tool (Vordel SOAPbox) to help you with this
process.
• Consider using Vordel Policy Director to manage policies across a whole XML network
infrastructure, including multiple Gateways. This will make the migration from test to
production much easier to manage.
• Use the Vordel Real Time Monitoring console to help identify what the bottlenecks are
in your system. If part of the solution is slowing the overall system, try to find
alternatives to meet your requirements.
• View information on network usage using Vordel Reporter.
• Test the performance capability of backend Web Services.
7
Vordel Gateway 6 Deployment White Paper
Example
Supplier A is creating a service that will accept Purchase Order (PO) documents from
customers. The PO documents are formatted using XML. The functional requirements are:
• The service should not accept anything that will damage the PO system.
• Incoming XML messages must to be authenticated against a customer database to
make sure they come from a valid customer account.
• The supplier already has an LDAP directory and would like to use it to store the
customer accounts.
• The supplier must be able prove that the message came from the customer.
These requirements can be achieved using a policy that includes XML Threat processing, and
an XML Signature Check, which verifies the certificate against the LDAP Directory.
Guidelines
• Take traffic distribution into account when calculating performance requirements.
• If traffic bursts cause problems for service producers, consider using the Gateway to
smooth the traffic. There are a number of techniques for doing this.
• Take message size distribution into account when running performance tests.
8
Vordel Gateway 6 Deployment White Paper
High Availability can also be maintained using hot, cold, or warm stand-by systems:
• Cold standby: system turned off.
• Warm (or passive) standby: system operational but not containing state.
• Hot (or active) standby: fully operational and with current system state.
9
Vordel Gateway 6 Deployment White Paper
Guidelines
• For maximum availability, Vordel advises the use of a Gateway in hot standby for each
production Gateway.
• Use Gateways to protect against malicious attacks that undermine availability.
• Limit traffic to backend Web Services to protect against flooding. This is particularly
important with legacy systems that have been recently service-enabled. Legacy
systems may not have been designed for the traffic patterns to which they are now
subjected.
• Monitor SOA infrastructure carefully to identify issues early. Vordel Reporter and the
Real Time Monitoring console enable this. Interfaces are also provided to SNMP and
syslog.
The Gateway imposes no special requirements on load balancers. Loads are balanced on a
number of characteristics including the response time or system load. The execution of Vordel
policies is stateless, and the route through which a message takes on a particular system has
no bearing on its processing. Some items such as caches and counters are held on a
distributed cache, which is updated on a per message basis. As a result, Gateways can
operate successfully in both sticky and non-sticky modes.
10
Vordel Gateway 6 Deployment White Paper
The distributed state poses a number of questions for active/active versus active/passive
clustering: if the counter and cache state important, you must design your overall system so
that at least one Gateway is active at all times. So for a resilient HA system, a minimum of at
least two active Gateways at any one time with a third and fourth in passive mode is
recommended.
The Gateway itself load balances outgoing messages to backend services using a round-robin
or response time-based algorithm. It can also redirect messages to backup systems as a
result of connection failures.
For more details on caching setup, see the Configuring Distributed Caching white paper on
the Vordel Extranet.
Guidelines
• Use Vordel Policy Director to maintain the same policy on load balanced Gateways.
• Configure alerts to identify when Gateways and backend Web Services are
approaching maximum capacity and need to be scaled.
• Use Vordel Real Time Monitoring to see what parts of the system are processing the
most traffic.
11
Vordel Gateway 6 Deployment White Paper
Guidelines
• Vordel Policy Director helps get Disaster Recovery sites up and running quicker by
pushing out the Gateway policies to the backup solution.
• Remember to include third-party systems in Disaster Recovery solutions.
12
Vordel Gateway 6 Deployment White Paper
Guidelines
• Use Vordel Policy Director to control the migration of policies from development
through to production.
• Make sure that only people who are responsible for production systems can make
changes to them.
• Keep an audit trail of all system changes.
• Have a plan in place to rollback quickly in the event of a problem occurring.
• Test all systems and policy updates before promoting them to production.
• Test High Availability and resiliency before going into production.
13
Vordel Gateway 6 Deployment White Paper
9.1 Databases
Vordel interoperates with both relational and XML database types. Databases may be used
for a wide variety of purposes by Vordel Gateway (for example, for access control credentials,
authorization attributes, identity and role information, and logging and reporting).
Vordel uses JDBC to connect to databases. Supported databases include MySQL, Oracle, DB2
and SQL server.
14
Vordel Gateway 6 Deployment White Paper
Advantages
Gateways have a number of advantages over traditional application firewalls for XML
processing:
• They understand the structure of the traffic, and can detect subtle attack mechanisms
such as entity expansion attacks and external reference attacks.
• They can consume information in the messages such as security and platform specific
tokens.
• They can use well understood standards such as XML Schema, XPath, and WSDL to
properly content filter the traffic.
If an attack or unusual traffic pattern is detected, the Gateway can notify the firewall to block
the traffic at source using OPSEC or some other notification mechanism.
Firewall Modes
You can configure the Gateway in two modes:
• Block unidentified traffic, which is the default setting. If there is no policy configured
for this traffic, block it, and (depending on configuration), raise an alert. In this way,
rogue XML traffic is detected and blocked.
• Pass unidentified traffic.
You can configure the Gateway to act as a network endpoint or a network proxy, or both in
tandem.
15
Vordel Gateway 6 Deployment White Paper
Similarities
• Protocol mediation
• XML routing and transformation
• Service composition
• XML processing
Differences
• Gateways can be used for simple composite services (chained), but do not support
Business Process Execution Language (BPEL), and are not suitable for long duration
composite services.
• ESBs are usually delivered with a wealth of backend adapters for systems such as
CICS, IMS, Siebel, or SAP.
• Gateways are stateless and cannot maintain transaction state.
• Gateways are targeted at performance and application acceleration.
• Gateways have been designed to provide superior security capabilities, without
impacting performance.
Deployment Considerations
User stores contain some of the most valuable information in an organization. They contain
private identity information such as phone numbers, addresses, email addresses, medical
plan IDs, usernames and passwords, certificates and organization structures. Gateways must
be able to interact with user stores without compromising them.
16
Vordel Gateway 6 Deployment White Paper
Advantages
• Simple and easy to setup.
• There is a single entry point through the DMZ for XML traffic.
Disadvantages
• Exposing important user information in the DMZ is a potential security risk.
• LDAP server is only being used for external traffic.
17
Vordel Gateway 6 Deployment White Paper
Advantages
• User store is protected from external access.
Disadvantages
• Network professionals need to maintain two entry points into the LAN from the DMZ
for a single application.
• The user store is addressable from the DMZ, which is contrary to many organization’s
security policies.
Advantages
• Most secure deployment available.
• By separating threat from access control, it is easy to run separate security policies for
internal and external traffic.
• Policy Director can be used to manage all Gateways
Disadvantages
• This is a more expensive option.
18
Vordel Gateway 6 Deployment White Paper
• Vordel Gateway can directly connect into the Identity Management system as an
agent. This solution is currently available for Oracle Access Manager, Oracle
Entitlements Server, RSA Access Manager, CA SiteMinder, and IBM Tivoli Access
Manager. The Identity Management policy is defined in the Identity Management
product to which Vordel delegates the authentication and authorization.
• Vordel Gateway can connect to the Identity Manager using the XML Access Control
Markup Language (XACML) and Security Assertion Markup Language (SAML)
protocols. Vordel can request an authorization decision from a SAML Policy Decision
Point (PDP) for an authenticated client using the SAML Protocol (SAMLP), which is
defined in XACML. In such cases, Vordel presents evidence to the PDP in the form of
user credentials, such as the Distinguished Name of a client's X.509 certificate, or a
username/password combination.
• The PDP decides whether a user is authorized to access the requested resource. It
then creates an authorization assertion, signs it, and returns it to Vordel in a SAMLP
response. Vordel can then perform a number of checks on the response, such as
validating the PDP's signature and certificate, and examining the assertion. It can also
insert the SAML authorization assertion into the message for consumption by a
downstream Web Service. This allows propagation of the access control decision to
occur.
19
Vordel Gateway 6 Deployment White Paper
10 Conclusion
This document describes how the Vordel Gateway fits in an enterprise deployment, and how
it can be used to secure and accelerate the deployment of services or APIs.
20