19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

entity can tell independently from the IP address which of the two parameters<br />

applies to it. Generally, the only difference between the versions of file<br />

/etc/ipsec.conf which are stored on the two gateways is therefore confined to<br />

the parameter interfaces, for example because on one side an ethernet is used<br />

and on the other side a token ring. In the present example recommendations as<br />

to how to configure file /etc/ipsec.conf are provided below.<br />

config setup section<br />

This section contains general settings which are not specific to any particular<br />

connection.<br />

interfaces = ipsec0=eth0<br />

First of all, the parameter interfaces is used to specify over which network<br />

interfaces secure connections should be established. No encrypted packets are<br />

sent over any other interfaces. In the example presented above, the connection<br />

to the firewall is in each case established by the eth0 interface of the gateway.<br />

forwardcontrol = yes<br />

If the parameter forwardcontrol is set to the value yes, FreeS/WAN will<br />

independently enable or disable the forwarding of IP packets when IPSEC is<br />

activated or inactivated. This is recommended as this setting will prevent<br />

packets from being transmitted unencrypted when the VPN is not available.<br />

On starting up the Linux system, steps should be taken to ensure that<br />

forwarding of IP packets is disabled until the network interfaces have been<br />

activated. How this setting is implemented will depend on the version of<br />

Linux that is being used.<br />

dumpdir =<br />

<strong>The</strong> dumpdir parameter should be set to a blank value in order to prevent the<br />

FreeS/WAN components from generating core dumps in the event of a<br />

program error. Otherwise there is a danger that unauthorised persons could<br />

extract secret keys, for example, from these core dumps.<br />

plutoload = %search<br />

plutostart = %search<br />

<strong>The</strong> pluto daemon is part of the FreeS/WAN package and is used for<br />

automatic key management. <strong>The</strong> parameters plutoload and plutostart<br />

determine which connections are automatically loaded into the pluto database<br />

and activated. It is advisable to set these parameters in each case to the special<br />

value %search. This will ensure that the connections which have been<br />

specified via the auto parameter are loaded and activated.<br />

conn west-east section<br />

This section contains settings which apply specifically to a particular<br />

connection, for example west-east.<br />

type = tunnel<br />

<strong>The</strong> operating mode for this connection is specified with the type parameter.<br />

Since in the present case the network traffic is to be protected between two<br />

local networks using gateways, it is imperative that the tunnel mode is used.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!