19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

If, contrary to the example, the value ah was set for the parameter auth, IP<br />

packets with protocol number 51 must be allowed through. Any other<br />

communication with the gateway or the local network must be prevented by<br />

the relevant firewall system.<br />

As the firewall system and the gateway are implemented so that they are<br />

separate from each other, the parameters leftfirewall and rightfirewall, plus<br />

leftupdown and rightupdown are not used.<br />

Where Network Address Translation (NAT) is used, it should be noted that<br />

address translation must be performed either on a component between the<br />

gateway and the local network or on the gateway itself. Generally the<br />

addresses cannot be translated within the firewall system. <strong>The</strong> reason for this<br />

is that parts of the IP packets are modified when NAT is used, so that IPSEC<br />

integrity checking generally will not work. NAT may therefore only be<br />

performed "behind" the IPSEC gateway. If address translation is to be<br />

performed on the same <strong>IT</strong> system on which FreeS/WAN is also operated, it<br />

should be noted that this will make processing of the IP packets on that <strong>IT</strong><br />

system very complex. <strong>Information</strong> on this point will be found in the<br />

FreeS/WAN documentation. It is therefore simpler and administration is also<br />

easier if NAT is carried out on a separate component between the gateway and<br />

the local network.<br />

VPN functional test<br />

Before the VPN is used in actual operations, it is necessary to check that it is<br />

functioning as desired. During the test phase, instead of the two local networks<br />

only test computers should be connected to the gateways. Otherwise the<br />

possibility that "real" data will be sent unprotected over the Internet if the<br />

VPN does not function correctly straightaway cannot be excluded.<br />

It is necessary to check that the packets are really encrypted. As described in<br />

the documentation, the simplest way of doing this is using the tools ping and<br />

tcpdump. <strong>The</strong> ping tool enables IP packets which are easy to detect to be<br />

generated, while tcpdump can be used to monitor the network traffic generated<br />

by FreeS/WAN. It should be noted that the ping command must be run on the<br />

test computer and not on the gateway. In the present configuration example,<br />

the VPN only protects the traffic between the local networks (which are<br />

replaced during the test phase by one or more test computers) and not the<br />

traffic from or to the gateways. (See also "Remote administration of a<br />

gateway" above on this point.) <strong>The</strong> command tcpdump for monitoring the<br />

network traffic generated can be run on any <strong>IT</strong> system between the two<br />

gateways.<br />

If the VPN is not functioning as desired, for example no communication is<br />

possible or the network traffic is not encrypted, FreeS/WAN provides a<br />

number of diagnostic tools. For example, information on the status of the<br />

software program can be obtained from examining the contents of the pseudofile<br />

/proc/net/ipsec_tncfg and by running the command ipsec look. Further<br />

information on this subject is contained in the FreeS/WAN documentation.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!