Matthew Foval · Chase Forbes · Larry Francioni · Xochitl Roman
Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC - - PowerPoint PPT Presentation
Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC - - PowerPoint PPT Presentation
Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC Encrypts each data packet during the connection Transport mode and Tunneling mode Creates a tunnel between two L2TP connection points L2TP Usually paired with
- Encrypts each data packet during the connection
- Transport mode and Tunneling mode
IPSEC
- Creates a tunnel between two L2TP connection points
- Usually paired with another VPN Protocol to create highly
secure connections
L2TP
- Creates a tunnel and encapsulates the data packet
- One of the most widely used VPN protocols
PPTP
- VPN connection where the web browser acts as
the client
- Most commonly used by online shopping
websites and service providers
SSL/TLS
- Creates VPN tunnel and ensures it is encrypted
- SOCKS Proxy Forwarding
SSH
Internal Production Network
System and Risk Evaluation Audit Checklist Audit Report
https://www.giac.org/paper/gsna/64/auditing-checkpoint- vpn1-mobile-user-virtual-private-network-vpn/100319
System and Risk Evaluation
Risk Likelihood Consequences
Virus or Trojan on mobile user laptop Medium Severe - Potential compromise of the internal network Hackergains internal information provided by VPN gateway Low Low – Information gathering to be used in a later attack Lack of strong passwords allow Hackerto impersonate valid user High Severe – Definite compromise of the internal network
Audit Step 2. Physical Security Control Objective Unauthorized physical access to the VPN gateway server must be protected. Risk Without proper security, access to the box would allow a person to attempt password guessing, ability to create/modify CheckPoint user accounts, booting from floppy, or accidental/ intentional denial of service. Very high likelihood. Risks #5 Compliance While different levels of security are possible depending on business requirements, a basic level of security (e.g. server is behind a locked door and is password protected) needs to exist to achieve compliance: Server is locked in a room with restricted access. Logs are kept of server access. Server is in a locked rack and is password protected. Testing Observe precautions in place by asking to visit theserver room. Record steps that a visitor is required to go through to get access (e.g. Sign log book) Attempt to access the server and record controls on server access (e.g. Locked rack, password protected screen) Objective/Subjective Objective – Server access must be limited to authorized personnel, behind a locked door and password protected.
System and Risk Evaluation Audit Checklist
System and Risk Evaluation Audit Checklist Audit Report
Executive Summary Audit Findings Recommendations Cost
- https://www.giac.org/paper/gsna/64/auditing-checkpoint-vpn1-mobile-user-
virtual-private-network-vpn/100319
- https://www.vpnoneclick.com/types-of-vpn-and-types-of-vpn-protocols/
- http://www.howtogeek.com/118145/vpn-vs.-ssh-tunnel-which-is-more-secure/