D-Link DFL-2500 User Guide - Page 254

Man-in-the-middle, Replay, Spoofing, Dictionary, L2TP/IPsec

Page 254 highlights

22.2. PPTP/ L2TP 235 IP Header UDP Header L2TP Header PPP Payload PPP Frame Table 22.2: L2TP Encapsulation. L2TP encryption L2TP calls for MPPE for encryption. L2TP/IPsec The authentication methods addressed by PPTP and L2TP mainly rely on the user's password, and the encryption to the tunneling data is not initially designed for these protocols. Thus, PPTP and L2TP are NOT resistant to many common attacks, e.g. Man-in-the-middle, Replay, Spoofing, Dictionary, and Dos attacks. L2TP and IPsec can work together to benefit from both flexibility and stronger security. By encapsulating L2TP as payload into an IPsec packet, connections can be protected by sound encryption and authentication. This combination is called L2TP/IPsec. How To: Configure L2TP in D-Link Firewall In this section, guidelines and examples for configuring L2TP clients and servers are covered. Example: Configuring L2TP/IPsec Server (PSK) This example describes how to set up a L2TP server with IPsec, using pre-shared keys. The LAN network is a 192.68.1.0/24 network, and 10.0.0.0/24 is the network on the WAN interface. L2TP clients will connect to the L2TP/IPsec server on 10.0.0.1 on the WAN interface, in order to access resources on the LAN interface. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

22.2. PPTP/ L2TP
235
IP
Header
UDP
Header
L2TP
Header
PPP
Payload
PPP Frame
Table 22.2: L2TP Encapsulation.
L2TP encryption
L2TP calls for MPPE for encryption.
L2TP/IPsec
The authentication methods addressed by PPTP and L2TP mainly rely on
the user’s password, and the encryption to the tunneling data is not
initially designed for these protocols. Thus, PPTP and L2TP are NOT
resistant to many common attacks, e.g.
Man-in-the-middle
,
Replay
,
Spoofing
,
Dictionary
, and
Dos
attacks.
L2TP and IPsec can work together to benefit from both flexibility and
stronger security. By encapsulating L2TP as payload into an IPsec packet,
connections can be protected by sound encryption and authentication. This
combination is called
L2TP/IPsec
.
How To: Configure L2TP in D-Link Firewall
In this section, guidelines and examples for configuring L2TP clients and
servers are covered.
Example
:
Configuring L2TP/IPsec Server (PSK)
This example describes how to set up a L2TP server with IPsec, using
pre-shared keys. The LAN network is a 192.68.1.0/24 network, and
10.0.0.0/24 is the network on the WAN interface. L2TP clients will connect
to the L2TP/IPsec server on 10.0.0.1 on the WAN interface, in order to
access resources on the LAN interface.
D-Link Firewalls User’s Guide