Link to home
Start Free TrialLog in
Avatar of ramick
ramick

asked on

security with VPN

I have successfully configured several VPN connections between my LAN and those of some of my clients using Vigor ADSL routers. I have used DES-MD5 so the data is encrypted so am relatively happy with the tunnelling using L2TP but my question is concerning the security of data on the networks using the default firewall settings. At present it seems that NAT is the only thing protecting the workstations. There is a default filter in the firewall settings that blocks TCP/IP /UDP on ports 137-139 and 53. I have also changed the default port for remote access of the router and the VPN connections are between fixed stated IP addresses.

How can I acertain whether the security settings are secure or what can I do to further improve scurity?

 
Avatar of Les Moore
Les Moore
Flag of United States of America image

There are lots of things you can do, but the question is, how much value do they add, and how much value is the data you want to protect? You don't want to spend $50K to protect $1K worth of data, but you can certainly justify spending $50K to protect business loss of $50M if a network gets compromised.
You can be reasonably assured that you have taken prudent measures for the data you have, if the routers contain a stateful packet inspection engine (LinkSys does, D-Links does, I don't know about the Vigor). If you want to go one step further, look into an intrusion detection package that would alert you to potential intrusions, then you can adjust the ports that are blocked.
Network Ice (formerly BlackIce Defender) from ISS is a relatively good product:
http://www.iss.net

Just remember that security is a process, not a one-time implementation. You have to continually evaluate and adjust to the changing climate.
Avatar of ramick
ramick

ASKER

Thanks for that Irmoore. There is a 'Keep State' and 'Source Route' box under the default filter sets that I mentioned in the question but they are not checked. Should I not be blocking other un-used ports  - I only access the networks for remote control of machines.
If you mean blocking from the internet to the lan, then block all ports unless you have a web server,etc.  If you mean blocking ports from the lan to the internet, or across the vpn then that depends on your company and its users.  If you have users that use kazaa, irc,etc, or abuse the internet then yes, block outgoing.  If you want to be the most secure, then yes, block outgoing except the bare minimum.
I would enable Keep State, but not Source Route. Which model Vigor do you have?

Avatar of ramick

ASKER

I use the Vigor 2600 ADSL modem/router. Only concerned about access from the internet to the LAN's. Users only have internet access, no mail, web or ftp servers or other services used.
ASKER CERTIFIED SOLUTION
Avatar of Les Moore
Les Moore
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of ramick

ASKER

Thanks. Reassuring. Will keep an eye on things though.