VPN Support
Ingate Virtual Private Network (VPN) can
communicate with any VPN clients, firewalls and other products
supporting the IPSec and IKE protocols.
Ingate VPN is included in all Ingate Firewalls and SIParators. Following are technical specifications and
other critical information for users of Ingate VPN.
Using VPN
To use VPN from off-site locations with an Ingate
Firewall, VPN client software must be installed on the traveling
computer. A Certifying Authority (CA)
for signing certificates is also required.
Technical specifications for Ingate VPN
Compatible VPN software must meet the following requirements:
- The IETF standards IPSec and IKE (or PPTP) must be supported.
- Preshared keys or X.509 certificates as authentication must be
used. Other methods using preshared keys, digital signatures or
certificates are not supported by Ingate VPN.
- For VPN clients, X.509 certificates
as authentication must be used.
- Main Mode must be supported. Ingate Firewall® does not support
Aggressive Mode.
- At least one of the encryption algorithms 3DES or AES must be
supported. Keep in mind that 3DES performs encryption with 168 bits,
and some countries do not allow export of products with such a strong
encryption algorithm.
- ESP must be used for traffic encryption. The ESP standard permits
the use of authentication only, but Ingate VPN will not permit this
for security reasons.
- At least one of the authentication algorithms MD5 or SHA1 must be
supported. [Almost all security products support these methods.]
- Tunnel mode must be used. Transport mode is not supported.
- PFS (Perfect Forward Secrecy), group 2 or 5, must be supported. Be
aware that PFS is turned off as default in some products.
VPN Software
Following are examples of VPN software that
Ingate has successfully tested for compatibility with Ingate’s
firewalls.
Greenbow
The Greenbow client can be bought from any Ingate reseller.
SSH Sentinel
SSH Sentinel supports Windows 95, 98, NT, 2000 and XP.
SafeNet
SafeNet is a VPN client and supports Windows 98, NT and 2000 (not Windows 2000 for Cisco).
SafeNet U.S.
http://www.safenet-inc.com/
SafeNet Sweden
Principal agent in Sweden is MBG Elektronik AB, +46-(0)42-13 60 60.
FreeS/WAN
A free implementation for Linux, http://www.freeswan.org/, combined with the X.509
patch at http://www.strongsec.com/freeswan/.
X.509 Certificates
In order to be compatible with Ingate IPSec VPN, the
IPSec software on the network must be authenticated by X.509
certificates, which are used to identify a computer when it
communicates with other computers. An X.509 certificate is digitally
signed to ensure that no one has changed the certificate. This
signature is made by a special kind of software, called a Certifying Authority (CA).
The construction of an X.509 certificate
An X.509 certificate consists of two parts:
private and public. The private part should be kept secret and should
not be moved more than is necessary. The public part can be freely
distributed.
The public part contains a Distinguished Name (DN). A DN consists
of several fields, each describing an identity of the computer and
signed by a CA to guarantee this identity.
Certifying Authority
A Certifying Authority (CA) can be compared to a
passport authority. The passport authority guarantees that the
passport identity is correct, and uses various methods to make the
passport hard to forge.
A CA producing X.509 certificates works in the same way. It uses a
digital signature to guarantee that the certificate belongs to the
computer using it. It is important that no unauthorized people can
access the CA.
A CA has a certificate of its own. This certificate can be signed
by the CA itself, as with the Ingate VPN's certificate engine.
This is how a certificate is created:
- The private part of the certificate is created.
- A certificate request is created.
- The public part of the certificate is created by the CA signing the certificate request.
Installation and protection of the CA server
The CA of a company is among the most important
things protecting the company's computer system. It should be
installed on a machine that is designated solely for CA, and both
physical and network access to it should be as restricted as
possible.
The CA certificate is protected by a password used when another
certificate is signed. This password should only be known by those who
need to be able to sign certificates.
VPN clients need to know the public part of the CA's own
certificate, so this should be put someplace where all current and
future users can reach it. Backup the public and the private part of
the CA's certificate, and store the backup where it can’t be
modified or read.
VPN client certificate signing routines
There are two ways to create certificates for VPN clients:
- By making the client create a certificate request and only using the CA for signing the public part
- By using use the CA for creating both keys and certificate for the client
From a security perspective, the first alternative is better, as the private part of the client certificate never leaves the client.
Following are suggested routines for creating and signing certificates for VPN clients and distribution of keys to and from the Ingate Firewall®.
Certificate signing routine
This routine is used for clients able to create their own certificates, but which need help with signing them.
- Let the client create a certificate request. Now the secret key is created in the client.
- Send the certificate request from the client to the CA. This is securely not a crucial step.
- Sign the certificate request.
- Send the signed certificate back to the client. This is securely not a crucial step.
- Configure the firewall with the new certificate. (See the Ingate Firewall® manual for more information.)
- Download the certificate for the firewall and send it to the client. This is securely not a crucial step.
Certificate creation routine
This routine is used for clients who cannot create certificates themselves.
- Create a new certificate on the CA.
- Distribute the private part of the certificate to the client, either on an encrypted network connection or via a floppy or something like that. This is securely a crucial step!
- Distribute the public part of the certificate to the client. This is securely not a crucial step.
- Backup the private part of the certificate in the same way as for the CA certificate.
- Configure the firewall with the new certificate. (See the Ingate Firewall® manual for more information.)
- Download the certificate for the firewall and send it to the client. This is securely not a crucial step.
|