Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC - - PowerPoint PPT Presentation

matthew foval chase forbes larry francioni xochitl roman
SMART_READER_LITE
LIVE PREVIEW

Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC - - PowerPoint PPT Presentation

Matthew Foval Chase Forbes Larry Francioni Xochitl Roman IPSEC Encrypts each data packet during the connection Transport mode and Tunneling mode Creates a tunnel between two L2TP connection points L2TP Usually paired with


slide-1
SLIDE 1

Matthew Foval · Chase Forbes · Larry Francioni · Xochitl Roman

slide-2
SLIDE 2
slide-3
SLIDE 3
slide-4
SLIDE 4
slide-5
SLIDE 5
  • Encrypts each data packet during the connection
  • Transport mode and Tunneling mode

IPSEC

  • Creates a tunnel between two L2TP connection points
  • Usually paired with another VPN Protocol to create highly

secure connections

L2TP

  • Creates a tunnel and encapsulates the data packet
  • One of the most widely used VPN protocols

PPTP

slide-6
SLIDE 6
  • VPN connection where the web browser acts as

the client

  • Most commonly used by online shopping

websites and service providers

SSL/TLS

  • Creates VPN tunnel and ensures it is encrypted
  • SOCKS Proxy Forwarding

SSH

slide-7
SLIDE 7
slide-8
SLIDE 8
slide-9
SLIDE 9
slide-10
SLIDE 10

Internal Production Network

slide-11
SLIDE 11
slide-12
SLIDE 12

System and Risk Evaluation Audit Checklist Audit Report

https://www.giac.org/paper/gsna/64/auditing-checkpoint- vpn1-mobile-user-virtual-private-network-vpn/100319

slide-13
SLIDE 13

System and Risk Evaluation

Risk Likelihood Consequences

Virus or Trojan on mobile user laptop Medium Severe - Potential compromise of the internal network Hackergains internal information provided by VPN gateway Low Low – Information gathering to be used in a later attack Lack of strong passwords allow Hackerto impersonate valid user High Severe – Definite compromise of the internal network

slide-14
SLIDE 14

Audit Step 2. Physical Security Control Objective Unauthorized physical access to the VPN gateway server must be protected. Risk Without proper security, access to the box would allow a person to attempt password guessing, ability to create/modify CheckPoint user accounts, booting from floppy, or accidental/ intentional denial of service. Very high likelihood. Risks #5 Compliance While different levels of security are possible depending on business requirements, a basic level of security (e.g. server is behind a locked door and is password protected) needs to exist to achieve compliance: Server is locked in a room with restricted access. Logs are kept of server access. Server is in a locked rack and is password protected. Testing Observe precautions in place by asking to visit theserver room. Record steps that a visitor is required to go through to get access (e.g. Sign log book) Attempt to access the server and record controls on server access (e.g. Locked rack, password protected screen) Objective/Subjective Objective – Server access must be limited to authorized personnel, behind a locked door and password protected.

System and Risk Evaluation Audit Checklist

slide-15
SLIDE 15

System and Risk Evaluation Audit Checklist Audit Report

Executive Summary Audit Findings Recommendations Cost

slide-16
SLIDE 16
  • https://www.giac.org/paper/gsna/64/auditing-checkpoint-vpn1-mobile-user-

virtual-private-network-vpn/100319

  • https://www.vpnoneclick.com/types-of-vpn-and-types-of-vpn-protocols/
  • http://www.howtogeek.com/118145/vpn-vs.-ssh-tunnel-which-is-more-secure/