S 4.224 Integration of VPN components into a security gateway

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

It is essential for the security of a VPN to integrate the VPN endpoints into the security gateways. The ideal placement of the VPN components depends on several factors in this case:

The most well known protocols for designing VPNs include IPSec, TLS/SSL, PPTP, and L2TP. Therefore, these types of VPNs are examined in the following. However, the recommendations shown here may also be applied to most other procedures. The decision to select a certain procedure depends on the particular application and the area in which it will be used. It may absolutely be expedient for an organisation to operate several VPNs using different VPN protocols and cryptographic procedures.

The decision regarding which procedure to use and how the individual VPN components should be arranged must be documented.

VPNs using IPSec or TLS/SSL

Where the VPN gateway is integrated relative to the packet filter of the security gateway depends on how many interfaces are available on the VPN gateway.

Placement of a VPN component with one interface
Figure 1: Placement of a VPN component with one interface

Placement of a VPN component with two interfaces
Figure 2: Placement of a VPN component with two interfaces

VPNs using Layer 2 protocols

Layer 2 VPNs can be implemented with the help of the PPTP (Point to Point Tunnelling Protocol) and L2TP (Layer 2 Tunnelling Protocol) protocols, for example. They are often used to build VPNs over public telecommunication networks, for example the GSM or ISDN networks. An ALG should also be used in Layer 2 VPNs between the LAN and the VPN connection for the purpose of network separation.

When connecting several different user groups with different rights, every user group should be assigned to a separate key class to ensure the data transmitted between the user groups remains confidential.

Review questions: