D-Link DFL-2500 User Guide - Page 240

X.509 Certificate, Identification Lists ID Lists

Page 240 highlights

22.1. IPsec 221 X.509 Certificate The other option for primary authentication is to use X.509 Certificate within each VPN gateway. To prove the identity, each gateway owns a certificate signed by a trusted CA. The certificate proves that the public key attached to it truly belongs to the gateway holder, and every gateway also keeps a copy of CA's public key to be able to trust the CA and validate the certificates of other gateways issued from that CA. Compared to the use of PSK, certificates are more flexible. Many VPN clients, for instance, can be managed without having the same pre-shared key configured on all of them, which is often the case when using pre-shared keys and roaming clients. Instead, should a client be compromised, the client's certificate can simply be revoked. No need to reconfigure every client. But complexity is also added by this method. Certificate-based authentication may be used as part of a larger infrastructure, making all VPN clients and gateways dependent on third parties. In other words, there are more things that have to be configured, and there are more things that can go wrong. Identification Lists (ID Lists) When X.509 certificates are used as authentication method, the firewall will accept all remote gateways or VPN clients that are capable of presenting a certificate signed by any of the trusted Certificate Authorities(CAs). This can be a potential problem, especially when using roaming clients. Consider a scenario where employees on the road shall be given access to the internal corporate networks using VPN clients. The organization administers their own CA, and certificates have been issued to the employees. Different groups of employees are likely to have access to different parts of the internal networks. For instance, members of the sales force need access to servers running the order system, while technical engineers need access to technical databases. As the IP addresses of the travelling employees VPN clients cannot be foreseen, the incoming VPN connections from the clients cannot be differentiated. This means that the firewall is unable to control the access to various parts of the internal networks. The concept of Identification Lists(ID Lists) presents a solution to this problem. An identification list contains one or more configurable D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

22.1. IPsec
221
X.509 Certificate
The other option for primary authentication is to use
X.509 Certificate
within each VPN gateway. To prove the identity, each gateway owns a
certificate signed by a trusted CA. The certificate proves that the public
key attached to it truly belongs to the gateway holder, and every gateway
also keeps a copy of CA’s public key to be able to trust the CA and
validate the certificates of other gateways issued from that CA.
Compared to the use of PSK, certificates are more flexible. Many VPN
clients, for instance, can be managed without having the same pre-shared
key configured on all of them, which is often the case when using pre-shared
keys and roaming clients. Instead, should a client be compromised, the
client’s certificate can simply be revoked. No need to reconfigure every
client. But complexity is also added by this method. Certificate-based
authentication may be used as part of a larger infrastructure, making all
VPN clients and gateways dependent on third parties. In other words,
there are more things that have to be configured, and there are more things
that can go wrong.
Identification Lists (ID Lists)
When X.509 certificates are used as authentication method, the firewall will
accept all remote gateways or VPN clients that are capable of presenting a
certificate signed by any of the trusted Certificate Authorities(CAs). This
can be a potential problem, especially when using roaming clients.
Consider a scenario where employees on the road shall be given access to
the internal corporate networks using VPN clients. The organization
administers their own CA, and certificates have been issued to the
employees. Different groups of employees are likely to have access to
different parts of the internal networks. For instance, members of the sales
force need access to servers running the order system, while technical
engineers need access to technical databases.
As the IP addresses of the travelling employees VPN clients cannot be
foreseen, the incoming VPN connections from the clients cannot be
differentiated. This means that the firewall is unable to control the access
to various parts of the internal networks.
The concept of
Identification Lists(ID Lists)
presents a solution to this
problem. An identification list contains one or more configurable
D-Link Firewalls User’s Guide