Forum Discussion
SSL VPN and Machine Cert Inspection
Hello!
Implementing an F5 SSL VPN with machine certificate inspection without using an agent can be challenging but is possible with the right configuration. One approach is to utilize the F5 BIG-IP Access Policy Manager (APM) which supports clientless VPN access and can perform machine certificate inspection. This can be achieved through the use of the BIG-IP APM web portal, where the certificate inspection is managed by the VPN gateway rather than an endpoint agent.
To implement this, you would need to configure the BIG-IP APM to require certificate-based authentication for access to the VPN. During the SSL handshake process, the APM can check for valid machine certificates. This setup will involve careful configuration of your certificate authority (CA) and certificate distribution to ensure that only devices with valid machine certificates can establish a connection.
Additionally, integrating a robust Public Key Infrastructure (PKI) is essential. This will help manage and distribute machine certificates effectively, even in an agentless environment. Ensure that your network policies are enforced to verify machine certificates before granting access, which can be done through the BIG-IP APM’s access policies.
While these approaches can help achieve your goal without endpoint agents, you should be aware of potential limitations in terms of granularity of control and visibility compared to agent-based solutions. Make sure to thoroughly evaluate the security and user experience implications of your chosen method.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com