Browse Docs
ONLINE DOCUMENTATION
|
Appgate SDP with DefensX AgentIn this document
OverviewAppgate SDP is a cloud-native, API-enabled Zero Trust Network Access (ZTNA) solution that secures user access to applications across hybrid, cloud, and on-premises environments. It uses Single Packet Authorization (SPA), a technique originally popularized by the open-source tool fwknop, first released in 2004. SPA can operate in two different modes:
By default, Appgate SDP uses the UDP-TCP model, which sends two UDP packets simultaneously:
Both packets contain encrypted payloads that allow the Appgate SDP controller to authenticate the client and dynamically open firewall access. Problem DescriptionAppgate SDP uses a DNS-like packet because outbound DNS traffic is commonly allowed in most networks. However, the packet must reach the SDP controller without any modification. In practice, this requirement can fail in several scenarios:
Any modification to the original packet prevents Appgate SDP from verifying the client. Normally, the Appgate client also sends a DTLS packet (UDP 443) to the same controller at the same time. If:
then both SPA-DNS and SPA-DTLS packets fail, preventing the client from authenticating.
In this case, the client will typically show a Connection failed error after approximately 20 seconds. SolutionEnsure that UDP port 443 is allowed on the firewall so the SPA-DTLS mechanism can function. This port should be enabled even if the DefensX Agent is not installed, because the other scenarios (DNS interception, ISP filtering, or DNS security controls) are also common and can interfere with SPA-DNS packets. |