MPLS VPN Security BRKSEC-2145
|
|
|
- Rodger O’Brien’
- 10 years ago
- Views:
Transcription
1 MPLS VPN Security BRKSEC-2145
2 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security appliances such as firewall and IPS Content and application security Target audience: People running, architecting or securing MPLS network Should be familiar with the fundamentals of MPLS 2
3 MPLS Security: History 2001: First MPLS deployments; little security concerns 2002: First security concerns raised by SP and Enterprises; first Gartner report 2003: MPLS Security becoming key concern; Miercom test; first white papers; second Gartner report 2004: RFC 4381: Security of the MPLS VPN Architecture 2005: MPLS VPN Security book; focus on inter-as, L2VPN, other advanced subjects : No major security debates 2009: Renewed interest; hacker reports; insider threats 3
4 MPLS VPN Security Agenda Analysis of the Architecture Secure MPLS VPN Design General Best Practices Internet Access Inter-AS and CsC Layer 2 VPN Security Multicast VPN Security IPsec and MPLS Summary 4
5 Analysis of the MPLS VPN Architecture (RFC 4364) Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6 Comparison with ATM/FR ATM/FR MPLS Address Space Separation Yes Yes Routing Separation Yes Yes Resistance to Attacks Yes Yes Resistance to Label Spoofing Direct CE-CE Authentication (Layer 3) Yes Yes Yes With IPsec 6
7 Basic RFC 4364 Security: Today s Arguments Can be mis-configured (operation) Routers can have bugs (implementation) PEs can be accessed from Internet, thus intrinsically insecure Floods over Internet can impact VPN traffic True, but same on ATM/FR PEs can be secured, as Internet routers Engineering/QoS 7
8 mbehring Address Planes: True Separation! (Example is IPv4 also applies to IPv6) CE VPN1 Address Space CE CE VPN2 Address Space CE Several Data Planes: VPNv4 Addr. Control Plane: IPv4 Addr. PE P PE Core Address Space PE-CE Interfaces Belong to VPN; Only Attack Point!! 8
9 Secure MPLS VPN Design General Security Best Practices Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10 Secure MPLS/VPN Core Design 1. Secure each router individually 2. Don t let packets into (!) the core No way to attack core, except through routing, thus: 3. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 4. Design for transit traffic QoS to give VPN priority over Internet Choose correct router for bandwidth Separate PEs where necessary 5. Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks 10
11 Securing the Core: Infrastructure ACLs Easy with MPLS! CE PE VPN In MPLS: VRF Belongs to Customer VPN! On PE: deny ip any <PE VRF address space> Exception: routing protocol from host to host Idea: no traffic to PE/P you can t attack Prevents intrusions 100% DoS: hard, but theoretically possible with transit traffic 11
12 Securing the Core: Infrastructure ACLs CE /30.1 PE VPN PE VPN /30.2 CE CE /30.1 PE VPN PE VPN /30.2 CE Example: deny ip any permit ip any any This Is VPN Address Space, Not Core! Caution: This also blocks packets to the CE s! Alternatives: List all PE i/f in ACL, or use secondary i/f on CE, or ACL with dis-contiguous subnet masks ( ) 12
13 VRF Maximum Prefix Number Injection of too many routes: Potential memory overflow Potential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF ipvrf red maximum routes Accept Max 45 Prefixes, and Log a Warning at 80% (of 45), 13
14 Control of Routes from a BGP Peer Injection of too many routes: Potential memory overflow Potential DoS attack Control with maximum prefix command (under the BGP neighbor definition) From This Neighbor Accept Max 45 Prefixes, Then Reset Session router bgp 13 neighbor maximum-prefix restart 2 Log a Warning at 80% (of 45), and Restart the BGP Session After Two Min. 14
15 Best Practice Security Overview Secure devices (PE, P): They are trusted! See next slide for risks PEs: Secure with ACLs on all interfaces Static PE-CE routing where possible For routing, LDP: Use authentication (MD5) Maximum number of routes per VRF and per peer (only BGP) Separation of CE-PE links where possible (Internet/VPN) Note: Overall security depends on weakest link! 15
16 Key: PE Security What happens if a single PE in the core gets compromised? Intruder has access to all VPNs; GRE tunnel to his CE in the Internet, bring that CE into any VPN That VPN might not even notice Worst Case!!!! Therefore: PE Security is Paramount!!!!!!! Therefore: No PE on customer premises!!!!!!! (Think about console access, password recovery ) 16
17 MPLS VPNs are Quite Secure Perfect Separation of VPNs No intrusions possible Perfect Separation of the Core from VPNs Again, no intrusions possible But there is one remaining issue 17
18 The Issue: DoS Through a Shared PE Might Affect VPN Customer PE Has Shared CPU/Memory/Bandwidth: Traffic COULD affect VPN customer (however, risk probably acceptable) MPLS core Customer VPN PE P P VPN Customer VRF CE1 P Internet Customer Internet VRF P P 18
19 Customer Network Today s Best Practice: MPLS VPN Security Recommendation: PE Routers Should Contain Only VRFs of the Same Security Level; Example: To Internet CE1 CE2 PE1 PE2 VRF Internet VRF VPN Level 0: Internet Level 1: VPN customers (Level 2: Mission critical infrastructure) To VPN Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and conditions are right 19
20 Secure MPLS VPN Design Internet Access Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
21 Internet Provisioning on an MPLS Core Two basic possibilities: 1. Internet in global table, either: 1a) Internet-free core (using LSPs between PEs) 1b) hop-by-hop routing 2. Internet in VRF Internet carried as a VPN on the core This is the default!!! 21
22 Internet in the Global Routing Table Using LSPs Between PEs Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) LSP Internet Customer 22
23 Internet in the Global Routing Table Using LSPs Between PEs Default behavior, if Internet in global table!! On ingress PE: BGP next hop: Egress PE loopback Next hop to egress usually has label! LSP is used to reach egress PE P routers do not need to know Internet routes (nor run BGP) Security consequence: PE routers are fully reachable from Internet, by default (bi-directional) P routers are also by default reachable from Internet; but only uni-directional, they don t know the way back! 23
24 Internet in the Global Routing Table Using LSPs Between PEs Recommendations: Fully secure each router! Do not advertise IGP routes outside (This is a general security recommendation for all cores!) P routers not reachable (unless someone defaults to you) PE routers not reachable (possible exception: Peering PE) Infrastructure ACLs to block core space: Additional security mechanism Even if someone defaults to you, he cannot reach the core 24
25 Internet in the Global Routing Table Hop-by-Hop Routing Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) Internet Customer 25
26 Internet in the Global Routing Table Hop-by-Hop Routing Like in standard IP core Each router speaks BGP, and carries Internet routes Not default, must be configured! Security consequence: P and PE routers by default fully reachable from Internet Recommendations: (like before) Fully secure each router! Do not advertise IGP routes outside Infrastructure ACLs 26
27 Internet in a VRF Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) Internet in a VRF Internet Customer 27
28 Internet in a VRF Internet is a VPN on the core Full separation to other VPNs, and the core, by default! Connection between Internet and a VPN (for service) must be specifically configured Security consequence: But!!! P routers not reachable from anywhere! PE routers only reachable on outbound facing interfaces; Very limited Much easier to secure Routes in a VRF take more memory Convergence times increase on old systems 28
29 Alternatively: No Internet on the Core Pure MPLS VPN service considered most secure But what about: PE PE CE B VRF B VRF B CE B CE A VRF A mbehring VRF Ambehring CE A Internet Service Provider however, bandwidth usually limited and some firewall / control applied 29
30 Secure MPLS VPN Design Inter-AS and Carrier s Carrier Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
31 security functionality Inter-AS: The Options Option A VRF back to back; IP interface Option B ASBRs exchange labelled VPN prefixes; labelled interface Option C ASBRs don t hold VPN information - only Route Reflectors do; labelled interface ASBR: Autonomous System Border Router VRF: Virtual Routing and Forwarding instance 31
32 Inter-AS: Case A VRF-VRF Back-to-Back Cust. CE AS 1 AS 2 PE ASBR PE ASBR Cust. CE mbehring LSP IP Data LSP Control plane: No signalling, no labels Data plane: IPv4 only, no labels accepted Security: as in RFC 2547 (single-as) SPs are completely separated 32
33 Security of Inter-AS case A Static mapping Only IP interfaces SP1 does not see SP2 s network And does not run routing with SP2, except within the VPNs Quite secure Potential issues: SP 1 can connect VPN connection wrongly (like in ATM/FR) Customer can flood routing table on PE (this is the same issue as in RFC 2547 (single-as); solution: prefix limits) 33
34 Inter-AS: Case B ASBR exchange labelled VPNv4 routes Cust. CE AS 1 AS 2 PE ASBR MP-eBGP+Labels ASBR PE Cust. CE mbehring LSP VPN label IP Data LSP Control plane: MP-eBGP, labels Data plane: Packets with one label 34
35 Security of Inter-AS Case B: Summary Control Plane can be secured well Data Plane has some security issues: Label is not checked today (since i/f in global table) Labelled packets on any MPLS i/f will be forwarded if LFIB entry exists Potential Issues: Insertion of traffic into non-shared VPNs (uni-directional only) (requires compromised/faulty ASBR, remote exploit not possible) All global i/f on an ASBR share the same LFIB, thus might affect third parties Good: No visibility of other AS (except ASBR i/f) 35
36 Inter-AS Case C: ASBRs Exchange PE loopbacks Cust. CE AS 1 AS 2 VPNv4/v6 Routes + Labels PE ASBR PE Loopb+Labels PE ASBR Cust. CE mbehring LSP PE label VPN IP Data Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4/v6 routes + labels Data plane: PE label + VPN label AS1 can insert traffic into VPNs in AS2 Only requirement: Must have LSP to correct egress PE Customer must trust both SPs 36
37 Security of Inter-AS Case C ASBR-ASBR signalling (BGP) RR-RR signalling (MP-BGP) Much more open than Case A and B More interfaces, more visible parts (PE, RR) Potential Issues: SP1 can intrude into any VPN on PEs which have a Inter-AS VPN configured Cannot check what s underneath the PE label Very open architecture Acceptable for ASes controlled by the same SP 37
38 Inter-AS Summary and Recommendation Three different models for Inter-AS Different security properties Most secure: Static VRF connections (case A), but least scalable Basically the SPs have to trust each other Hard/impossible to secure against other SP in this model But: Can monitor with MPLS aware NetFlow (!!) Okay if all ASes in control of one SP Current Recommendation: Use case A 38
39 Carrier s Carrier Cust. CE1 Carrier Carrier s Carrier Carrier Cust. CE2 PE1 PE2 CsC CE1 CsC PE1 CsC PE2 CsC CE2 IP data IP data label IP data label IP data label label IP data Same principles as in normal MPLS Customer trusts carrier who trusts carrier 39
40 Carrier s Carrier: The Interface Carrier s Carrier Carrier CsC-CE CsC-PE Control Plane: CsC-PE assigns label to CsC-CE Data Plane: CsC-PE only accepts packets with this label on this interface CsC-PE controls data plane, no spoofing possible 40
41 Layer 2 VPN Security Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
42 Virtual Private LAN Service (VPLS) Overview Network behaves as a switch Spanning Tree MAC address learning ARP, etc. Examine threats to a switch to understand VPLS security 42
43 VPLS Security Threats VLAN Hopping MAC Attacks DHCP Attacks ARP Attack NDP Spoofing (IPv6) Spoofing Attacks Other Attacks 43
44 Best Practices for L2 Security (VPLS) 1. Always use a dedicated VLAN ID for Trunk Ports 2. Disable unused ports and put them in an unused VLAN 3. Use Secure Transmission when managing Switches (SSH, OOB, Permit Lists) 4. Deploy Port Security 5. Set all host ports to Non Trunking 6. ALWAYS use a dedicated VLAN for Trunk Ports 7. Avoid using VLAN 1 8. Have a plan for ARP Security issues and implement it!!! 9. Use SNMP V3 to secure SNMP transmission 10. Use STP Attack mitigation 11. Use MD5 Authentication for VTP 12. Plan for and implement DHCP Attack mitigation 13. Use Private VLAN s to better secure guest VLAN s 14. Use and implement 802.1x to protect entry into your network 15. Consider using VACL s to limit access to key network resources 44
45 Multicast VPN Security Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
46 mbehring Address Planes: True Separation for unicast and multicast! CE CE VPN1 address space including mc addresses VPN2 address space CE CE several data planes control plane PE including mc addresses P core address space PE including mc addresses PE-CE interfaces belong to VPN. Only attack point!! 46
47 MVPN Security Best Practices Avoid RP on PE Router Reason: higher exposure to DoS against PE Avoid src/rec directly connected to PE Careful with MDT group addressing Make MDT unreachable from Internet Filtering, private addressing 47
48 Multicast VPN Summary Each VPN can use multicast independently Source and group may overlap with other VPN Different PIM modes can be used VPNs remain fully separated No reachability between VPNs, unicast or multicast Cannot spoof other VPN, unicast or multicast MPLS core remains secure Not attackable from VPNs, unicast or multicast However: DoS of PE might affect other VPNs on that PE, this must be secured specifically Core cannot be spoofed 48
49 IPsec and MPLS Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
50 Where to Apply IPSec CE PE PE CE IPSec CE-CE IPSec CE-PE IPSec PE-PE Application: Remote Access into VPN Application: VPN Security Application: Special Cases 50
51 How to Establish IPSec: Options Option 1: Static IPSec Pre-configure static IPSec tunnels Works, but does not scale well Option 2: Dynamic Cryptomap/ Tunnel Endpoint Discovery Scaling improvements over 1). Option 3: DMVPN Dynamic tunnel establishment Easy to configure and maintain Some scaling issues Option 4: GET VPN Easy to configure and maintain Scales well Dynamic Multipoint VPN Group Encrypted Transport But: GETVPN doesn t support IPv6 yet 51
52 GET VPN: IPsec Made Easy! Traditional IPsec: - n 2 Problem (scalability) IKE/IPsec Key Server GET VPN: - 2 Security Associations - to the key server (~IKE) - to the group (IPsec) IPsec 52
53 Summary Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
54 MPLS VPN Security Agenda Analysis of the Architecture Secure MPLS VPN Design General Best Practices Internet Access Inter-AS and CsC Layer 2 VPN Security Multicast VPN Security IPsec and MPLS Summary 54
55 MPLS doesn t provide: Protection against mis-configurations in the core Protection against attacks from within the core Confidentiality, authentication, integrity, anti-replay Use IPsec if required Customer network security 55
56 Summary MPLS VPNs can be well secured Security depends on correct operation and implementation MPLS backbones can be more secure than normal IP backbones Core not accessible from outside Separate control and data plane Key: PE security 56
57 For More Information: MPLS VPN Security Authors: Michael Behringer Monique Morrow Cisco Press, ISBN: First published: June, 2005; still up to date; 57
58 Additional Information MPLS Security White Paper: Analysis of the security of the MPLS architecture RFC on MPLS VPN Security: Miercom MPLS test report: Practical tests show that MPLS is secure Garnter research note M : "MPLS Networks: Drivers Beat Inhibitors in 2003"; 10 Feb
59 Q&A Presentation_ID 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
60 60
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow
MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!
MPLS VPN Security in Service Provider Networks
MPLS VPN Security in Service Provider Networks Michael H. Behringer 1 HOUSEKEEPING We value your feedback, don t forget to complete your online session evaluations after each session and complete the Overall
MPLS Security Considerations
MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer
MPLS Virtual Private Network (VPN) Security
MPLS Virtual Private Network () Security An MFA Forum Sponsored Tutorial Monique Morrow MFA Forum Ambassador CTO Consulting Engineer Cisco Systems Slide 1 MPLS Security - Agenda Analysis of the Architecture
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems [email protected]
Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems [email protected] Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS
Introduction Inter-AS L3VPN
Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
BGP-MPLS IP VPN Network Security
Network Working Group M. Behringer Request for Comments: 4381 Cisco Systems Inc Category: Informational February 2006 Status of This Memo Analysis of the Security of BGP/MPLS IP Virtual Private Networks
MPLS VPN Security Best Practice Guidelines
Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. [email protected] [email protected]
MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions
MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Security of the MPLS Architecture
WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Virtual Private Networks. Juha Heinänen [email protected] Song Networks
Virtual Private Networks Juha Heinänen [email protected] Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint
DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC
DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0
Course Outline AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0 Module 1: MPLS Features Lesson 1: Describing Basic MPLS Concepts Provide an overview of MPLS forwarding, features,
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
Implementing MPLS VPNs over IP Tunnels
Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
Junos MPLS and VPNs (JMV)
Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service
Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Fundamentals Multiprotocol Label Switching MPLS III
Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu
Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems [email protected]
Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems [email protected] 1 Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
Department of Communications and Networking. S-38.2131/3133 Networking Technology, Laboratory course A/B
Department of Communications and Networking S-38.2131/3133 Networking Technology, Laboratory course A/B Work Number 38: MPLS-VPN Basics Student Edition Preliminary Exercises and Laboratory Assignments
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS
WHITE PAPER UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS Copyright 2010, Juniper Networks, Inc. 1 Table of Contents Executive Summary.............................................................................................
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Demonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC
DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
MPLS multi-domain services MD-VPN service
MPLS multi-domain services MD-VPN service Xavier Jeannin, RENATER Tomasz Szewczyk / PSNC Training and Workshops for advancing NRENs 8-11 Sept 2014 Chisinau, Moldova MPLS brief overview Original purpose:
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0
AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
RFC 2547bis: BGP/MPLS VPN Fundamentals
White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
MPLS Inter-AS VPNs. Configuration on Cisco Devices
MPLS Inter-AS VPNs Configuration on Cisco Devices (C) Herbert Haas 2005/03/11 1 #1: Back-to-Back VRF ip vrf blue rd 1:1 route-target both 1:1 address-family ipv4 vrf blue neighbor 1.1.1.2 activate ip vrf
BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel
BUILDING MPLS-BASED MULTICAST VPN SOLUTION DENOG3 Meeting, 20.10.2011/Frankfurt Carsten Michel Agenda Multicast VPN (mvpn) Overview L3VPN Multicast Solution using PIM/GRE (Draft-Rosen) MPLS Multicast Building
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support
Product Bulletin Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support PB696622 Cisco IOS Software Release 15.0(1)SY1 supports Cisco Catalyst 6500 Series Supervisor Engine 2T only. Release
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
IPv6 Fundamentals, Design, and Deployment
IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]
s@lm@n Cisco Exam 400-201 CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ] Cisco 400-201 : Practice Test Question No : 1 Which two frame types are correct when configuring T3 interfaces?
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Campus LAN at NKN Member Institutions
Campus LAN at NKN Member Institutions RS MANI [email protected] 1/7/2015 3 rd Annual workshop 1 Efficient utilization Come from: Good Campus LAN Speed Segregation of LANs QoS Resilient Access Controls ( L2 and
MPLS VPN Implementation
MPLS VPN Implementation Overview Virtual Routing and Forwarding Table VPN-Aware Routing Protocols VRF Configuration Tasks Configuring BGP Address families Configuring BGP Neighbors Configuring MP-BGP Monitoring
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire
Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)
CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış
VPN Technologies A Comparison
VPN Technologies A Comparison Matthew Finlayson, [email protected] Jon Harrison, [email protected] Richard Sugarman, [email protected] First issued February 2003 100
Virtual Private LAN Service (VPLS)
White Paper Virtual Private LAN Service (VPLS) Scalable Ethernet-Based Enterprise Connectivity and Broadband Delivery Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000
Kingston University London
Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data
Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor
642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division
Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Cisco 642-889. Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1
Cisco 642-889 Implementing Cisco Service Provider Next-Generation Egde Network Services Version: 4.1 QUESTION NO: 1 Cisco 642-889 Exam Which type of VPN requires a full mesh of virtual circuits to provide
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
