Designing Access Controls

Make Decisions about Remote Access (VPN)

Protocol

Authentication

Encryption Protocols Client

Gateway

 

Methods

and Algorithms

 

 

 

 

 

L2TP/IPsec

IKE

 

ESP, integrity and

 

Preshared key

privacy:

 

 

(password)

MD5

 

Digital certificates:

SHA-1

 

 

RSA

DES

 

 

DSA

3DES

 

 

 

 

AES

PPTP

Microsoft

Microsoft Point-to-

 

 

Challenge

Point Encryption

 

 

Handshake

(MPPE), privacy

 

 

Authentication

Rivest Cipher 4

 

 

Protocol version 2

 

(RC4)

(MS-CHAPv2) (passwords)

EAP-TLS (digital certificate)

Windows native

Windows Server

 

 

2000 or 2003

 

Other vendors:

 

 

Software built

 

 

 

into router or

 

 

 

firewall

 

 

Hardware

 

 

 

appliance

Windows native

Windows Server

Mac native

 

2000 or 2003

Other vendors

Other vendor:

 

 

 

Software built

 

 

 

 

in to router or

 

 

 

 

firewall

 

 

 

Hardware

 

 

 

 

appliance

This rest of this section guides you through the process of selecting these options. Although the VPN technologies and options are quite different from those for port authentication, the factors that you must consider are similar:

Vulnerability and risk assessment

User type and sophistication

Administrative workload and IT budget

Endpoints and administrative control over endpoints

Existing network infrastructure

Vulnerability and Risk Assessment

How vulnerable is the network? How much risk can your company tolerate?

In “Vulnerability and Risk Tolerance” on page 3-21, you already considered the negative consequences of a breach in security. The only difference for the remote zone is that the potential field of attackers widens. For example, a hacker attempting to collect passwords on your LAN must access a port in your LAN. A VPN, on the other hand, opens up your private network to access from practically any location. With a good VPN design, however, you can ensure that convenient access does not come at the price of exposing confi- dential data to any Internet user.

3-40

Page 156
Image 156
HP Access Control Client Software manual Vulnerability and Risk Assessment, Dsa