The unique characteristics

The TURAYA.TrustedVPN solution has been developed with two principal design goals in mind: 

  • Hard-edged security
  • Foolproof administration. TURAYA.

TrustedVPN provides a comprehensive state-of-the-art security infrastructure as a ready-to- run and fully automatic solution. The danger of inadequate configuration settings disappears to a large extent. When managing the system, the operator can fully focus on the higher level of system-wide logical trust relationships between networks and users rather than administrating individual devices and their parameter settings.  

The architecture

The solution consists of three main components:

  • The TURAYA.TrustedObjects Manager as the central management server for configuration, monitoring and provisioning 
  • The TURAYA.TrustedVPN appliance as a VPN gateway deployable in several variations at the individual sites 
  • The TURAYA.TrustedVPN software client can be used by road warriors to access corporate resources  

The VPN appliances are designed as completely closed systems that are solely remotely managed. For initial commissioning, a base configuration for their external network connection needs to be created in the TURAYA.TrustedObjects Manager. With one click, this data set can be exported as a signed file to a USB storage device. Attaching this device once at the individual VPN appliance is the only operation required locally. Once the VPN appliance has been connected to the network, it will set up a TrustedChannel to the TURAYA.

TrustedObjects Manager which will take over full control of this appliance. The TrustedChannel is a mutually authenticated and encrypted link. The management system has additionally confirmed the integrity of the VPN appliance by means of a “remote attestation” process prior to accepting this new link. In accordance with the management system’s configuration requirement, the TURAYA.TrustedVPN appliances provide IPsec tunnels for peer-to-peer connectivity to other appliances and can optionally accept access requests from mobile users on the basis of their IPsec software clients.
All key material used to secure such communications links is always generated within the VPN appliances and certified by the management system. Security is anchored in hardware. The management system and the VPN appliances are equipped with an embedded trusted platform module (TPM) chip that acts as a security anchor and is fully integrated into the overall system architecture – up to and including the application level.

More specifically, the TPM implementation addresses within the appliances:

  • Secure storage of private keys within individual appliances such that these keys will never leave the security chip and hence, the trustworthy mutual authentication of VPN gateways vis-à-vis the management station using the integrated PKI procedures
  • Trustworthy system boot-up by performing a prior hardware-based check of the signatures inherent to all essential software modules
  • Intangible encryption of persistent configuration data and firmware components.

As a result, the overall system continuously monitors itself and prevents all manipulations – both remote and local attempts.