I was under the impression that Checkpoint fw-1 v4.0 ships with unlimited
VPN Client capabilities.
Ref: http://www.checkpoint.com/products/firewall-1/4.0/index.html#VPN

In order to support MS PPTP, a Firewall would need to be able to pass
protocol type 47/GRE and port 1723/TCP between Extranet clients and an
Intranet PPTP server(s).  This MS-PPTP is not supported very well with many
Firewalls.  MS has made available both Security and Performance enhancements
for 95, 98, and NT clients and it's still free.

Options:

*       Utilize the VPN capabities available from Checkpoint.

*       Place the PPTP server on the outside of the Firewall and establish
rules on Firewall to except traffic from the PPTP server needed to support
remote application needs.  Hint: Use same server to support PPTP, MS Proxy
Caching, and Public Web Publishing.

*       Invest in a Nortel-Baynetworks Extranet server to support both MS
PPTP and IPSEC clients.

Ref: http://www.baynetworks.com/news/Press/9811231.shtml

> ----------
> From:         Frank Knobbe[SMTP:[EMAIL PROTECTED]]
> Sent:         Monday, December 28, 1998 11:28 PM
> To:   [EMAIL PROTECTED]
> Subject:      FW: [FW1] PPTP through Checkpoint Firewall
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> > Sent: Sunday, December 27, 1998 11:27 PM
> > To: [EMAIL PROTECTED]
> > Subject: [FW1] PPTP through CHeckpoint Firewall
> > 
> >      I have checkpoint firewall single gateway non vpn 
> > version connected to 
> >      internet. We wanted to have virtual private network 
> > using PPTP with a 
> >      remote site which is connected to internet through dial up.
> >      
> >      I have heard that PPTP is not very secure. Kindly shed 
> > some light on 
> >      the pros and cons of using it and identify the best 
> > online resources 
> >      for its configuration. Also how can one give it access 
> > through FW-1?
> 
> 
> Microsoft's implementation of PPTP is reasonable secure. You can set very
> strong encryption (128 bit) for data privacy. But there is a documented
> attack on the _authentication_ handshake. If someone can sniff the PPTP
> packet flow, it is possible to gain user session information, including
> password hashes.
> 
> However, as with all VPN implementation I suggest using OTP authentication
> using tokens. With this strong authentication it doesn't matter if someone
> actually captures the one-time password because he/she will not be able to
> use it a second time. The session key can be gathered with above attack,
> but
> I have not seen any successful man-in-the-middle attack against a PPTP
> session. It is, however, possible to decrypt the data stream with this
> session key (as far as I know).
> 
> The downside of PPTP is that you can not bring it in or out a proxy, or
> passed a firewall with NAT. A different VPN or tunnel protocol like IPSec
> may be the better choice.
> 
> Since you have a Checkpoint firewall, I would recommend to invest a little
> more for a proven (and so far attack resistant) VPN solution using
> Checkpoint (fw to fw, or client to fw via SecuRemote). In either case I
> recommend tokens.
> 
> However, if funds are a problem, I see no reason not to use PPTP, but then
> again, it all depends on what wealth and worth of data you want to
> protect.... You need to exercise security within reason.
> 
> 
> Regards,
> Frank
> 
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Personal Privacy 6.0
> Comment: PGP encrypted email preferred
> 
> iQA/AwUBNohodSlma9DCzQQeEQKHqACg9jHfn07kxOuRAB+rbhm//68p1yEAoMYp
> Z20BHTENQZWySmMEu9VcqM4o
> =PhnE
> -----END PGP SIGNATURE-----
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to