19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

- which transport protocol is used and to which protocol layer (OSI layer)<br />

they must be assigned (see also S 4.90 Use of cryptographic procedures on<br />

the various layers of the ISO/OSI reference model);<br />

- which protocols can be transmitted over the tunnel connection;<br />

- which cryptographic procedures for implementing the tunnel are supported;<br />

- whether the tunnel end points are authenticated;<br />

- and whether it is possible to have several parallel tunnels on one instance<br />

of the transport protocol used.<br />

<strong>The</strong> tunnel protocol is essentially responsible for<br />

- management of the tunnel(s): establishment, maintenance and termination,<br />

- negotiation of the cryptographic procedures to be used to implement the<br />

tunnel: key exchange procedures, encryption procedures and signature<br />

procedures,<br />

- assembly and disassembly of the data packets of the protocols which can<br />

be transmitted through the tunnel, and<br />

- encryption and decryption of the data packets.<br />

In the RAS environment, the following tunnel protocols have been<br />

established:<br />

- Layer 2 protocols:<br />

- Point to Point Tunnelling Protocol (PPTP) and<br />

- Layer 2 Tunnelling Protocol (L2TP): L2TP is a combination of<br />

PPTP and the Layer 2 Forwarding (L2F) protocol developed by<br />

Cisco which forwards Point to Point Protocol (PPP) packets from a<br />

PPP server over a WAN connection to an L2F-capable router which<br />

then disassembles them and feeds them into a network.<br />

- <strong>The</strong> Layer 3 specification IPsec (Internet Protocol Security).<br />

<strong>The</strong> protocols possess the characteristics summarised in the following table.<br />

Tunnel<br />

protocol<br />

Layer Transported<br />

protocols<br />

PPTP 2 IP, IPX,<br />

NetBEUI<br />

L2TP 2 IP, IPX,<br />

NetBEUI<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Required<br />

underlying<br />

protocol<br />

Number of<br />

tunnels<br />

supported<br />

IP 1 No<br />

IP, X.25, Frame<br />

Relay, ATM<br />

Several Yes<br />

IPsec 3 IP IP 1 Yes<br />

Tunnel<br />

authentic<br />

ation<br />

All the protocols can establish secure connections to a LAN over an insecure<br />

switched network through the use of cryptographic procedures, thus protecting<br />

the confidentiality and integrity of the data. Depending on the particular<br />

protocol, it is possible to establish one or more tunnel connections.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!