Designing Access Controls

 

 

Make Decisions about Remote Access (VPN)

 

 

N o t e

The IPsec protocol in particular requires you to design a detailed security

 

policy. In addition to the options listed above, policies include parameters

 

such as the Diffie-Hellman group, the IKE initiate and response mode, and

 

separate encryption and hash algorithms for the temporary IKE security

 

association (SA). Although a detailed discussion of these options is beyond

 

the scope of this guide, you can find a very detailed explanation in the

 

ProCurve Secure Router Advanced Management and Configuration Guide.

 

Finally, endpoints require a VPN client, which is configured to match options

 

 

on the VPN gateway. The gateway itself can be a standalone hardware appli-

 

ance or software built into a router, firewall, or server.

 

Table 3-25lists the options available for the three most common VPN

 

protocols.

 

 

 

Table 3-25. Options for VPN Protocols

 

 

 

 

 

Protocol

Authentication

Encryption Protocols Client

Gateway

 

Methods

and Algorithms

 

 

 

 

 

IPsec with IKE

IKE

 

Authentication

 

Preshared key

Header (AH), integrity

 

 

(password)

only

 

Digital certificates:

Message Digest 5

 

 

Rivest

 

(MD5)

 

 

Secure Hash

 

 

 

Signature

 

 

 

Algorithm (RSA)

 

Algorithm 1

 

 

Digital

 

(SHA-1)

 

 

Encapsulating

 

 

 

Signature

 

 

 

Algorithm (DSA)

Security Payload

 

Xauth—optional

(ESP), integrity and

 

privacy:

 

second layer of

 

MD5

 

authentication

 

 

 

 

SHA-1

 

 

 

 

Digital Encryption

 

 

 

 

 

Standard (DES)

 

 

 

 

Triple DES (3DES)

 

 

 

 

Advanced

 

 

 

 

 

Encryption

 

 

 

 

 

Standard (AES)

ProCurve VPN

ProCurve Secure

 

Client

 

Router 7000dl

• Mac native (no GUI)

Other vendor:

Linux FreeS/WAN

 

Software built

Other vendors

 

 

into a router or

 

 

 

 

firewall

 

 

 

Hardware

 

 

 

 

appliance

3-39