Is it possible to use Microsoft's "Secure Connection Rules" to authenticate/encrypt connections while using VPN at the same time?
What are the configurations necessary?
It should look like this:
Client A <-- VPN --> VPN Gateway <-- LAN --> Client B
FTPd <------------- IPSec -------------> FTP
(I know there are other ways to secure FTP, I just use it for testing)
Thanks
Update 1:
To clarify the objectives:
- Traffic in the LAN should be authenticated and have integrity, but should not be encrypted (because of the IDS)
- Traffic passing the internet or other strange networks should have confidentiality
IPSec policies are applied based on source/destination addresses, so they should just not care about where the traffic is actually flowing; so, yes, applying them to computers whose communications happens via a VPN should work.
But why would you need such a thing, when you can encrypt the VPN itself?
Edit:
In order for IPSec to work, some traffic needs to flow between the involved machines:
More info here.
I don't know if this can be achieved through a VPN... the low-level IP protocols look very much like a possible problem here.
Yes, it is possible to use nested VPNs. This is actually less uncommon than you think in higher security environments.
Please see below for the more common use in higher security environments
Layers 3 doesn't get you that much extra but it is a possibility!
In the DoD, it is not uncommon to see
Notes on your objectives:
1) Encryption does not mean unreadable to an IDS. Using preshared secrets or a certificate will enable the IDS to eavesdrop for a performance hit.
2) You can have network authentication via 802.1x
3) You'll want to use AH for visibility to an IDS, if you cannot share secrets/certs
4) Use ESP for confidentiality
5) Host-based IDS on local and distant host can alleviate need for sharing secerts/certs
6) NIST 800-77 Guide to IPSEC VPNs is a good free publication on this subject.
If you are so concerned about the value of the information, maybe you should step up from IPSEC to something more secure like HAIPE, and start looking at type 1 encryptors? :)
Here's a possible why: you are subject to PCI compliance and you have a cardholder data environment within your business LAN. So while supporting from home or the road, you VPN to the business LAN, but you cannot allow easy connection into the CDE for administration. You require two-factor authentication and obviously don't want unauthorized personnel (namely, almost everyone in the business LAN) to be able to go into the CDE.