Solved

VPN choice guidance needed - PPTP v L2TP on specific hardware

Posted on 2003-11-06
4
655 Views
Last Modified: 2010-04-11
Hi,

Firstly, I am new to firewalls/vpn, network infrastructure in general, so I'm asking this question for all you security experts out there.

My scenario:

I have a single web server running w2k that is running behind a zyxel firewall hosted at a remote location.  The server has 2 network cards.  One is attached to the firewall and the other is currently disabled.

I need to create a VPN between my office and the server.

As I see it, I have 3 options:

1.  I can create a PPTP connection directly to the firewall (as the firewall supports this, but I need to use zyxel firewall client software)

2.  I can create a PPTP VPN server on the web server, and set the firewall to allow the connnection through (don't see any advantage to this however, except I wouldn't have to buy the zyxel firewall client)

3.  I can enable the second network card, use TCP/IP filtering on it to disable everything except what is required to enable L2TP, set up a VPN server on the web server and use it.   (the firewall does not allow L2TP passthrough, and is not an L2TP VPN Server)

I guess my question is, L2TP offers better security, but if it means having to enable another network card which wouldn't be behind a firewall, is it worth it?

Any discussion on this is more than welcome!


Chris

0
Comment
Question by:cemack
  • 2
4 Comments
 
LVL 10

Accepted Solution

by:
KingHollis earned 500 total points
ID: 9698587
Chris

Consider PPTP if you have low security requirements, need a simple VPN solution and multiprotocol support is a must.
Consider L2TP if you need a faster and leaner solution than offered by PPTP.
Consider IPSec if the main selection criterion is security and you need ease of use and
configuration.
Consider L2TP/IPSec if complete interoperability and strong security are most important to you.

In your particular case, the ONLY reason I would go with L2TP would be if you are going to use L2TP/IPSec. And, implementing L2TP/IPSec is fairly involved for this simple of an implementation. Otherwise, just use the PPTP solution and keep all NICs behind your firewall.

Hope this helps.
0
 
LVL 9

Expert Comment

by:TooKoolKris
ID: 9701712
Only somebody fully knowledged in the setup of your environment can really answer your question. Only you can decide if allowing communication on this other NIC is worth the security risks involved. Can it be done, sure. Yes you can control the filtering on this NIC as well. However what you are doing is effectively taking away communication control from the firewall and putting into the hands of your NIC and the policy that controls the communication of this NIC. If you feel confident enough about your ability to control the communication across this NIC then I would say have at it. However if you don't then I would say let the firewall do its job and find another way to accomplish your task.
0
 

Author Comment

by:cemack
ID: 9770199
Moderator:

Can this be split say 350/150 between KingHollis and TooKookKris please?  

Thanks to both for your replies, higher points to KingHollis just because he's a bit more specific.

I've decided to go with the straightforward option of PPTP using the firewall VPN server as security isn't my biggest concern, and it offloads the VPN processing to the firewall.
0
 
LVL 10

Expert Comment

by:KingHollis
ID: 9771929
Chris:

Good move! Best of luck!

h.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Protect postfix server against DDos / Dos attacks 7 36
Encrypt a drive for use only in work environment? 10 83
PCI Compliance - mixing SAQs 6 31
Home wireless security 10 48
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question