D-Link DFL-2500 User Guide - Page 229

Key Distribution

Page 229 highlights

210 Chapter 21. VPN Planning • If the above requirements cannot be met, for instance, in cases where the home computer belongs to the employee, then do not grant VPN access. End Point Security for Partners and other Companies This subject is usually far more sensitive than securing computers that are actually owned by the company. In cases where management has dictated that a VPN should be established with a partner, subsidiary, or subcontractor that has far more lax security policies, it can become a real nightmare for the IT staff. It is far from uncommon for a motivated intruder to research companies likely to have connections to his/her target, virtual or otherwise. Should the target's security be too high, it may prove to be far more fruitful to probe other locations that may be used to launch an attack around the primary defense perimeters. In cases where the security of the remote network cannot be guaranteed, technically and/or physically, it may be a good idea to move shared resources to servers in a separate DMZ and grant remote access only to those servers. 21.1.2 Key Distribution Plan your key distribution schemes ahead of time. Issues that need to addressed include: • By what means to distribute the keys ? Email is not a good idea. Phone conversations might be secure enough. This depends on your local security policy. • How many different keys should be used? One key per user? One key per group of users? One key per LAN-to-LAN connection? One key for all users and one key for all LAN-to-LAN connections? You are probably better off using more keys than you think necessary today, since it becomes easier to adjust access per user (group) in the future. • Should the keys be changed? If so, how often? In cases where keys are shared by multiple users, you may want to consider overlapping schemes, so that the old keys work for a short period of time when new keys have been issued. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

210
Chapter 21. VPN Planning
If the above requirements cannot be met, for instance, in cases where
the home computer belongs to the employee, then do not grant VPN
access.
End Point Security for Partners and other Companies
This subject is usually far more sensitive than securing computers that are
actually owned by the company. In cases where management has dictated
that a VPN should be established with a partner, subsidiary, or
subcontractor that has far more lax security policies, it can become a real
nightmare for the IT staff.
It is far from uncommon for a motivated intruder to research companies
likely to have connections to his/her target, virtual or otherwise. Should
the target’s security be too high, it may prove to be far more fruitful to
probe other locations that may be used to launch an attack around the
primary defense perimeters.
In cases where the security of the remote network cannot be guaranteed,
technically and/or physically, it may be a good idea to move shared
resources to servers in a separate DMZ and grant remote access only to
those servers.
21.1.2
Key Distribution
Plan your key distribution schemes ahead of time. Issues that need to
addressed include:
By what means to distribute the keys ? Email is not a good idea.
Phone conversations might be secure enough. This depends on your
local security policy.
How many different keys should be used? One key per user? One key
per group of users? One key per LAN-to-LAN connection? One key
for all users and one key for all LAN-to-LAN connections? You are
probably better off using more keys than you think necessary today,
since it becomes easier to adjust access per user (group) in the future.
Should the keys be changed? If so, how often? In cases where keys
are shared by multiple users, you may want to consider overlapping
schemes, so that the old keys work for a short period of time when
new keys have been issued.
D-Link Firewalls User’s Guide