HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 2
Introduction, A Parable: Confidentiality, Authentication, and Integrity
UPC - 882780301016
View all HP 635n manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 2 highlights
IKE Authentication: Kerberos ...136 HP Jetdirect IPsec Configuration Wizard: Kerberos Authentication 137 Microsoft Windows: Kerberos Authentication 152 HP Web Jetadmin 10.x IPsec Configuration Wizard 154 Summary ...172 Appendix A: IKE Templates...173 Appendix B: Troubleshooting Web Jetadmin and Kerberos 178 Appendix C: Importing a Certificate 181 Introduction What does Internet Protocol Security, also known as IPsec, do? What does it provide that is different than other security protocols? Isn't IPsec a protocol used strictly for Virtual Private Networks? Why would I use IPsec on my Intranet? Why would I want to use IPsec to protect my printing and imaging communication? We will answer these questions and more in this whitepaper. In order to get our arms around IPsec and use it fruitfully to solve problems, we'll need to establish the background from which it came. In addition, we'll look at the Intranet threat model and show how terribly easy it is to circumvent basic security measures in most networks. Next, we'll talk about IPsec and how it can be used to prevent these attacks. Finally, we'll show how to configure and deploy IPsec for printing and imaging devices. IPsec is complex and as a prominent security researcher once said, "Complexity is the enemy of security". Rather than discuss all the features of IPsec, we will be taking a practical simplified approach to minimize configuration complexities and maximize the security of your printing and imaging devices. It is important to note that IPsec is a technology tool that is used in the implementation of an overall company's security policy. If you are engaged in "print and sprint", where you 'print' documents you consider sensitive then 'sprint' to the shared printer in the hallway in the hopes of getting there before anyone else does, you are probably (a) violating an existing security policy, (b) don't have a security policy to violate, and/or (c) shouldn't be using IPsec because you've got bigger security problems to solve. Please do not forgo having a security policy simply for the sake of throwing technology, such as IPsec, at perceived security issues. The IPsec Policy is really determined by a company's overall Security Policy. A helpful guide on security policy can be found on the website run by the National Institute for Standards and Technology (NIST) and at the SANS Institute. In addition, be sure to read the Request For Comments (RFC) 2196 - Site Security Handbook. A Parable: Confidentiality, Authentication, and Integrity It is vitally important that the concepts of Confidentiality, Authentication, and Integrity are understood before continuing. Most people do not have a true understanding of these concepts as they relate to IPsec because IPsec is a network protocol and network protocol specifications aren't usually read for leisure. To illustrate these concepts, let's work through a parable. There is a small company of about ten employees. The boss of the company works remotely and so no one has ever seen him. One day he announces via email that no one will get a pay raise because earnings are too low. The next day, the police call the boss to report that his company building has obscenities, directed at him, spray painted on the outside walls. The boss is positive that one of the employees had something to do with it and decides to conduct an investigation to find out whom. He drives into work with the intention of conducting one-on-one interviews with each of his employees. The boss arrives at the building and is incensed at what he reads on the walls. He storms up to the entrance but is stopped by a security guard. The security guard says "Identification Please." The boss says "I'm the Boss, let me in". The security guard says "I'm sorry sir, but I'll need to see a company badge." The boss is really angry now because he has to drive all the way back home and get his employee badge. It was a long trip and now back at home he has calmed down. He realizes that the security guard did an important thing by not allowing just anyone without a badge access to his building. He is determined to 2