MPLS Virtual Private Network (VPN) Security

Size: px
Start display at page:

Download "MPLS Virtual Private Network (VPN) Security"

Transcription

1 MPLS Virtual Private Network () Security An MFA Forum Sponsored Tutorial Monique Morrow MFA Forum Ambassador CTO Consulting Engineer Cisco Systems Slide 1 MPLS Security - Agenda Analysis of the Architecture Secure MPLS Design General Best Practices Internet Access Inter-AS and Carriers Carrier Layer 2 Security Attacking an MPLS Network IPsec and MPLS Ongoing standardization work Summary Slide 2 1

2 MPLS Security Tutorial Contributors Developed by: Michael Behringer Cisco Systems Monique Morrow Cisco Systems Contributors: Victoria Fineberg DISA Ross Callon Juniper David Christophe Lucent Slide 3 About this Presentation Advanced level Expected: Basic understanding of MPLS protocols and how MPLS s operate. Target Audience: Service providers Network operators and designers Network security engineers Technical focus Slide 4 2

3 Why Is MPLS Security Important? Customer buys Internet Service : Packets from SP are not trusted Perception: Need for firewalls, etc. Customer buys a Service : Packets from SP are trusted Perception: Few or no further security measures required SP Must Ensure Secure MPLS Operations Slide 5 Objectives Understand how secure MPLS s* are And what IPsec offers in addition Best practices on how to secure General MPLS Inter-provider Specific cases (Internet connectivity, etc) Examples are for IPv4 s Also applicable to IPv6 * Here: MPLS = RFC 4364 (old 2547bis ) Slide 6 3

4 Analysis of the MPLS Architecture (RFC 4364) Slide 7 MPLS Security Framework Trusted Zone External Network MPLS Network External Network External Network Interface External Network Interface Control Plane MPLS core signaling LDP, RSVP, and BGP MPLS edge signaling BGP, LDP, RIP, OSPF Forwarding Plane MPLS packet forwarding IP or MPLS packet forwarding Slide 8 4

5 MPLS Security Service Provider View Trusted Zone Customer Network MPLS Network Peer SP Network External Service Interface External Network Connect Interface MPLS Edge Security Security for service interface Focus on control plane access and resources on router MPLS Core Security Security for end-to-end (-) MPLS traffic integrity Focus on MPLS packet forwarding MPLS Inter-AS Security Security for network interconnect interface Focus on data/control plane access on ASBR Slide 9 MPLS Security Enterprise View Trusted Zone Extranet Customer Network MPLS Network SP MPLS Network Extranet Service Interface External WAN Interface Extranet Edge Security Security of extranet interface Focus on data/control plane access across interface with partner MPLS Core Security Security for end-to-end (-) MPLS traffic integrity Focus on MPLS traffic segmentation WAN Edge Security Security of WAN interface with SP Focus on data/control plane access across -CE link with SP Slide 10 5

6 Comparison with ATM/FR Address Space Separation Routing Separation Resistance to Attacks Resistance to Label Spoofing Direct CE-CE Authentication (Layer 3) ATM/FR Yes Yes Yes Yes Yes MPLS Yes Yes Yes Yes With IPsec Slide 11 Basic MPLS Security: Today s Arguments Can be mis-configured (operation) Routers can have bugs (implementation) s can be accessed from Internet, thus intrinsically insecure Floods over Internet can impact traffic True, but same on ATM/FR s can be secured, as Internet routers Engineering/QoS Slide 12 6

7 mbehring Security Relies on Three Pillars Security Architecture/ Algorithm Implementation Operation Break One, and All Security Is Gone! Slide 13 Address Planes: True Separation! CE 1 Address Space CE CE 2 Address Space CE Several Data Planes: v4 Addr. Control Plane: IPv4 Addr. P Core Address Space CE Interfaces Belong to ; Only Attack Point!! Slide 14 7

8 Secure MPLS Design General Security Best Practices Slide 15 Secure MPLS/ Core Design Don t let packets into the core (for MPLS: routers) No way to attack core, except through routing, thus: Secure the routing protocol Neighbor authentication, maximum routes, dampening, Design for transit traffic QoS to give priority over Internet Choose correct router for bandwidth Separate s where necessary Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks Slide 16 8

9 -CE Routing Security In order of security preference (for both CE and ): 1. Static: If no dynamic routing required; also static default route (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. IGP: If BGP not supported (limited security features) Slide 17 Securing the MPLS Core CE CE P MPLS Core BGP Route Reflector P P Internet CE BGP Peering With MD5 Authentic. LDP With MD5 CE CE Slide 18 CE ACL, and Secure Routing 9

10 Securing the Core: Infrastructure ACLs CE On : deny ip any <VRF address space on the > Exception: routing protocol from host to host Idea: no traffic to /P you can t attack Prevents intrusions 100% DoS: very hard, but traffic over router theoretically enables DoS Easy with MPLS! In MPLS: VRF Belongs to Customer! Slide 19 Securing the Core: Infrastructure ACLs CE / /30.2 CE CE / /30.2 CE Example: This Is Address deny ip any Space, Not Core! permit ip any any Caution: This also blocks packets to the CE s! Alternatives: List all i/f in ACL, or use secondary i/f on CE Slide 20 10

11 Neighbor Authentication Router knows his neighbors Verification through MD5 based authentication Verifies updates it receives from neighbor Supported: BGP, ISIS, OSPF, RIPv2, LDP Key chains for key rollover Use them where available Config easy Slide 21 Maximum Prefix Control Injection of too many routes: Potential memory overflow Potential DoS attack Two security mechanisms: Specify maximum number of routes For a VRF For a BGP peer Slide 22 11

12 VRF Maximum Prefix Number Injection of too many routes: Potential memory overflow Potential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF Accept Max 45 Prefixes ip vrf red maximum routes and Log a Warning at 80% (of 45) Slide 23 Control of Routes from a BGP Peer Injection of too many routes: Potential memory overflow Potential DoS attack Control with maximum prefix command (under the BGP neighbor definition) From This Neighbor Accept Max 45 Prefixes, Then Reset Session router bgp 13 neighbor maximum-prefix restart 2 Log a Warning at 80% (of 45) and Restart the BGP Session After 2 min. Slide 24 12

13 Control of Routes from a BGP Peer: Logging 6d22h: %BGP-4-MAXPFX: No. of prefix received from (afi 2) reaches 37, max 45 6d22h: %BGP-3-MAXPFXEXCEED: No. of prefix received from (afi 2): 46 exceed limit 456d22h: %BGP- 5-ADJCHANGE: neighbor vpn vrf _20499 Down BGP Notification sent 6d22h: %BGP-3-NOTIFICATION: sent to neighbor /1 (update malformed) 0 bytes FFFF FFFF FF Slide 25 Best Practice Security Overview Secure devices (, P): They are trusted! See next slide for risks s: Secure with ACLs on all interfaces Static -CE routing where possible If dynamic routing: Use authentication (MD5) Maximum number of routes per peer (only BGP) Separation of CE- links where possible (Internet/) LDP authentication (MD5) VRF: Define maximum number of routes Note: Overall security depends on weakest link! Slide 26 13

14 Key: Security What happens if a single in the core gets compromised? Intruder has access to all s; GRE tunnel to his CE in the Internet, bring that CE into any That might not even notice Worst Case!!!! Therefore: Security is Paramount!!!!!!! Therefore: No on customer premises!!!!!!! (Think about console access, password recovery ) Slide 27 Solution: Operational Security Security depends on SP! Employee can make mistake, or malicious misconfiguration Potential Security hole: If compromised, s might be insecure Cannot *prevent* all misconfigs Need to operationally control this Slide 28 14

15 Operational Security Logging config changes Dual Control: Network operators must have no access to logging facility AAA for access Use command authorization where possible Keep logs in a secure place (Malicious employee might change logs too) Tight control Disable password recovery where possible Secure Operations Is Hard!!! Slide 29 MPLS s are Quite Secure Perfect Separation of s No intrusions possible Perfect Separation of the Core from s Again, no intrusions possible But there is one remaining issue Slide 30 15

16 Issue: DoS Through a Shared Might Affect Customer Has Shared CPU/Memory/Bandwidth: Traffic COULD affect customer (however, risk probably acceptable) Customer Customer MPLS core P P VRF CE1 P Internet Customer global table P P DoS Attack Slide 31 Today s Best Practice: Routers Should Contain Only VRFs of the Same Security Level; Example: Customer Network To Internet CE1 CE2 To 1 2 VRF Internet VRF Level 0: Internet Level 1: customers (Level 2: Mission critical infrastructure) Note: This is negotiable: Shared Internet/ may be acceptable if price and conditions are right Slide 32 16

17 Separate and Internet Access Customer LAN MPLS core To Internet Firewall/NAT CE1 1 P VRF Internet IDS CE2 2 VRF To Separation: +++ DoS resistance: +++ Cost: $$$ (two lines and two s: expensive!) Slide 33 Shared Access Line, CE with VRF Lite Customer LAN MPLS core Firewall/NAT Internet CE 1 P IDS VRF Internet VRF Internet VRF Separation: CE +++ Logical Links (e.g. FR) DoS resistance: + (DoS might affect on, attachment circuit, CE) Cost: $ Slide 34 17

18 mbehring Hub-and-Spoke with Internet Access Hub Site MPLS core Internet Firewall NAT Internet CE 1 To Internet VRF Internet IDS CE 2 To VRF s CEs Spoke 1 Spoke 2 Spoke 3 Slide 35 Extranet and Firewalling Extranet / Internet A Customer VRF A VRF B Customer B VRF A VRF B Extranet means: Connecting s Route Targets define where traffic is going Usually firewalling required to restrict connectivity and maintain separation Slide 36 18

19 Alternative Topologies Full mesh, one Internet access Internet access at several sites Several firewalls needed More complex Internet access from all sites Complex, one firewall per site Slide 37 Secure MPLS Design Internet Access Slide 38 19

20 Internet Provisioning on an MPLS Core Two basic possibilities: 1. Internet in global table, either: 1a) Internet-free core (using LSPs between s) 1b) hop-by-hop routing 2. Internet in VRF Internet carried as a on the core Slide 39 Internet in Global Routing Table Using LSPs Between s Internet Service Provider Internet CE Customer Customer P Internet P Customer Customer Customer Internet Routing Table (Global Routing Table) in a VRF LSP Internet Customer Slide 40 20

21 Internet in Global Routing Table Using LSPs Between s Default behavior, if Internet in global table!! On ingress : BGP next hop: Egress loopback Next hop to egress usually has label! LSP is used to reach egress P routers do not need to know Internet routes (nor run BGP) Security consequence: routers are fully reachable from Internet, by default (bi-directional) P routers are also by default reachable from Internet; but only uni-directional, they don t know the way back! Slide 41 Internet in Global Routing Table Using LSPs Between s Recommendations: Fully secure each router! Do not advertise IGP routes outside (General recommendation for all cores!) P routers not reachable (unless someone defaults to you) routers not reachable (possible exception: Peering ) Infrastructure ACLs to block core space: Additional security mechanism Even if someone defaults to you, he cannot reach the core Slide 42 21

22 Internet in Global Routing Table Hop-by-Hop Routing Internet Service Provider Internet CE Customer Customer P Internet P Customer Customer Customer Internet Routing Table (Global Routing Table) in a VRF Internet Customer Slide 43 Internet in Global Routing Table Hop-by-Hop Routing Like in standard IP core Each router speaks BGP, and carries Internet routes Not default, must be configured! Security consequence: P and routers by default fully reachable from Internet Recommendations: (like before) Fully secure each router! Do not advertise IGP routes outside Infrastructure ACLs Slide 44 22

23 Internet in a VRF Internet Service Provider Internet CE Customer Customer P Internet P Customer Customer Customer Internet Routing Table (Global Routing Table) in a VRF Internet in a VRF Slide 45 Internet Customer Internet in a VRF Internet is a on the core Full separation to other s, and the core, by default! Connection Internet (for service) must be specifically configured Security consequence: P routers not reachable from anywhere! routers only reachable on outbound facing interfaces Very limited access to core Much easier to secure But!!! Routes in a VRF take more memory!! Check feasibility of putting Internet into the VRF!! Plus other restrictions, convergence, etc. Slide 46 23

24 mbehring mbehring Internet in a VRF Recommendations: Fully secure each router (you never know ) Secure external facing interfaces! Use Infrastructure ACLs for this (see earlier) (Internal i/f and P cannot be reached from outside) Slide 47 Alternatively: No Internet on the Core Pure MPLS service considered most secure But what about: CE B VRF B VRF B CE B CE A VRF A VRF A CE A Internet Service Provider however, bandwidth usually limited and some firewall / control applied Slide 48 24

25 mbehring mbehring s Private Internet Connection CE B VRF B VRF B CE B CE A VRF A VRF A CE A Internet Service Provider customer has private Internet connection Announces his address space to ISP If that includes CE- links, s are accessible from Internet If not, only transit traffic attacks very hard (limited in b/w by CE- link) Slide 49 Secure MPLS Design Inter-AS and CsC Slide 50 25

26 Standard-based L3 IP Interconnect Inter-AS/Interprovider specification in RFC4364 IETF, RFC4364, Paragraph 10 : 10A: Simple IP interconnect: The other network looks like a CE for each cross-sp 10B: Trusted MPLS interconnect: One logical connection for all s but routes still have to be maintained on provider border routers 10C: Trusted and even more scalable MPLS interconnect: Provider border routers don t have to maintain routes Current deployments 10A: Simple, low volume Interconnects between untrusted parties 10B and 10C: Mostly deployed for higher volume or when there is a shareholder relation between SPs Slide 51 Inter-AS: What are we trying to achieve? An SP should have: 100% (full) reachability to all Inter-AS s (control plane and data plane) 0% (no) reachability to s that are not shared (control plane and data plane) SP networks should be independent: Not attackable from outside (other SP, customer, Internet) Limited reachability from outside Slide 52 26

27 Inter-AS: What Are We NOT Trying to Achieve? Any Form of Separation Between Inter-AS s (Control or Data Plane) Interconnection of s is 100% No firewalling, no limitations, no sanity checks within an Inter-AS If an SP Holds Sites in an Inter-AS Set-Up, He Has Full Access to All Sites, Also on Other ASes Slide 53 From RFC 4364 Data Plane Protection 1. a backbone router does not accept labeled packets over a particular data link, unless it is known that that data link attaches only to trusted systems, or unless it is known that such packets will leave the backbone before the IP header or any labels lower in the stack will be inspected, and Inter-AS should only be provisioned over secure, private peerings Specifically NOT: Internet Exchange Points (anyone could send labelled packets!! No filtering possible!!) Slide 54 27

28 mbehring Inter-AS: Case A VRF-VRF Back-to-Back Cust. CE1 AS 1 AS 2 1 ASBR1 2 ASBR2 Cust. CE2 LSP IP Data LSP Control plane: No signalling, no labels Data plane: IPv4 only, no labels accepted Security: as in single AS (very good) SPs are completely separated Slide 55 Security of Inter-AS case A Static mapping Only IP interfaces SP1 does not see SP2 s network And does not run routing with SP2, except within the s Quite secure Potential issues: SP 1 can incorrectly connect s (like in ATM/FR) Customer can flood routing table on (this is the same issue as in single-as; solution: prefix limits) Slide 56 28

29 mbehring Inter-AS: Case B: ASBR exchange labelled v4 routes Cust. CE1 AS 1 AS 2 1 ASBR1MP-eBGP+Labels ASBR2 2 Cust. CE2 LSP label IP Data LSP Control plane: MP-eBGP, labels Data plane: Packets with one label Slide 57 Security of Inter-AS Case B: Summary Control Plane can be secured well Data Plane can also be secured Permit packets with labels that were assigned on the control plane Deny others Good: No visibility of other AS (except ASBR i/f) Slide 58 29

30 mbehring Inter-AS Case C: ASBRs Exchange loopbacks Cust. CE1 AS 1 AS 2 v4 Routes + Labels 1 ASBR1 Loopb+Labels 2 ASBR2 Cust. CE2 LSP label label IP Data Control plane: ASBR: just loopback + labels; /RR: v4 routes + labels Data plane: label + label AS1 can insert traffic into s in AS2 Only requirement: Must have LSP to correct egress Customer must trust both SPs Slide 59 Security of Inter-AS Case C ASBR-ASBR signalling (BGP) RR-RR signalling (MP-BGP) Much more open than Case A and B More interfaces, more visible parts (, RR) Potential Issues: SP1 can intrude into any on s which have a Inter-AS configured Cannot check what s underneath the label Very open architecture Acceptable for ASes controlled by the same SP Slide 60 30

31 Inter-AS Summary and Recommendation Three different models for Inter-AS Different security properties Most secure: Static VRF connections (case A), but least scalable Basically the SPs have to trust each other Hard/impossible to secure against other SP in this model But: Can monitor with flow monitoring Case B and C are okay if all ASes are in control of one SP Otherwise: Current Recommendation: Use case A Slide 61 From RFC4364: Data Plane Protection 1. a backbone router does not accept labeled packets over a particular data link, unless it is known that that data link attaches only to trusted systems, or unless it is known that such packets will leave the backbone before the IP header or any labels lower in the stack will be inspected, and In CsC packets are switched through the core based on the top label The packet is not further inspected on the core Slide 62 31

32 Carrier s Carrier Cust. CE1 1 Carrier CsC CE1 Carrier s Carrier CsC 1 CsC 2 CsC CE2 Carrier 2 Cust. CE2 IP data IP data label IP data label IP data label label IP data Same principles as in normal MPLS Customer trusts carrier who trusts carrier Slide 63 Carrier s Carrier: The Interface Carrier s Carrier Carrier CsC-CE CsC- Control Plane: CsC- assigns label to CsC-CE Data Plane: CsC- only accepts packets with this label on this interface CsC- controls data plane, no spoofing possible Slide 64 32

33 Carrier s Carrier: Security Carrier is a on core Carrier s network Cannot spoof other /carrier: CsC- verifies top incoming label in data path Top label determines egress (+interface, +prefix) Can mess up his own! Basically like in a single AS Slide 65 Carrier s Carrier: Summary Can be secured well Carrier has on Carrier s Carrier MPLS cloud Carrier cannot intrude into other s. End customer must trust both SPs. Slide 66 33

34 L2 Security Slide 67 Watch out for Layer 2 Security!! ASBR IXP ASBR 3rd party in same VLAN (e.g. IXP) can: insert spoofed packets into s (cannot be prevented today technically!!) Do layer 2 attacks to do man-in-the-middle (could be mostly prevented, but is often not done) Recommendation: Inter-AS and CsC connections only on private peerings!! Slide 68 34

35 What the Standards Say RFC 3985 (PWE3 Architecture) PWE3 provides no means of protecting the integrity, confidentiality, or delivery of the native data units. The use of PWE3 can therefore expose a particular environment to additional security threats. Assumptions that might be appropriate when all communicating systems are interconnected via a point-to-point or circuit-switched network may no longer hold when they are interconnected with an emulated wire carried over some types of PSN. Note: This talks only about customer security! Slide 69 Virtual Private Wire Service (VPWS) Overview Attachment circuit Private Wire Attachment circuit PSN Tunnel CE VPWS P P P VPWS CE Directed LDP In VPWS: Packets coming in on one side, are blindly forwarded to the other. Low security exposure Slide 70 35

36 Virtual Private LAN Service (VPLS) Overview Network behaves as a switch Spanning Tree MAC address learning ARP, etc. Examine threats to a switch to understand VPLS security Slide 71 VPLS Security Threats VLAN Hopping MAC Attacks DHCP Attacks ARP Attack Spoofing Attacks Other Attacks Slide 72 36

37 Best Practices for L2 Security Always use use a dedicated VLAN VLAN ID ID for for Trunk Trunk Ports Ports Disable unused ports ports and and put put them them in in an an unused VLAN VLAN Use Use Secure Transmission when when managing Switches (SSH, (SSH, OOB, OOB, Permit Permit Lists) Lists) Deploy Port Port Security Set Set all all host host ports ports to to Non Non Trunking ALWAYS use use a dedicated VLAN VLAN for for Trunk Trunk Ports Ports Avoid Avoid using using VLAN VLAN Have Have a plan plan for for ARP ARP Security issues issues and and implement it!!! it!!! Use Use SNMP SNMP V3 V3 to to secure secure SNMP SNMP transmission Use Use STP STP Attack Attack mitigation Use Use MD5 MD5 Authentication for for VTP VTP Plan Plan for for and and implement DHCP DHCP Attack Attack mitigation Use Use Private VLAN s to to better better secure secure guest guest VLAN s Use Use and and implement 802.1x 802.1x to to protect entry entry into into your your network Consider using using VACL s to to limit limit access to to key key network resources Slide 73 Exposure to Customer Must trust provider Protocols carried over PW might not be designed for high-grade security Easy to break security (integrity, confidentiality, availability) Example: VRRP / HSRP Depends on what you do with PW Make sure you understand what you run on top of PW No general answer possible Slide 74 37

38 Exposure to SP s do not analyse L2 frames s just encapsulate and forward L2 frames Also applies to L2 signalling Therefore: s cannot be attacked on control plane (there is none to the outside) s may be overwhelmed on data plane (too much traffic to forward DoS) This threat is identical to any other network Correct provisioning solves this issue Slide 75 Attacking an MPLS Network Slide 76 38

39 Threat Model Security Threats Malicious user behavior Unintended human error, misconfiguration, protocol side effects Security Vulnerability Denial of Service (DoS) attacks Intrusion attacks Undesired MPLS protocol side effects MPLS device misconfiguration Description MPLS network resources become unavailable to authorized users MPLS network resources become available to unauthorized users MPLS network resources become available to unauthorized users as a result of unintended device misconfiguration or unexpected protocol side effects Slide 77 Security Threats CE P ASBR ASBR P CE Malicious user behavior Unintended human error, misconfiguration, protocol side effects MPLS Service Edge ( Router) Control plane DoS attacks (ie:bgp) Unauthorized control plane access (ie: SNMP,) MPLS Core (P routers) Control plane DoS attacks (ie: LDP) Unintended P router access due to Unintended Route incorrect/missing access leakage due to VRF misconfiguration and/or IGP route control configuration router access due to distribution incorrect/missing access traffic misforwarding due to configuration unexpected (rare) Slide 78 protocol side effects MPLS Inter-AS Edge (ASBR) Unauthorized /IGP access via label spoofing Control plane DoS attack Unintended Route leakage due to VRF misconfiguration or incorrect route distribution ASBR router access due to incorrect/missing access configuration 39

40 Ways to Attack Intrusion : Get un-authorized access Theory: Not possible (as shown before) Practice: Depends on: - Vendor implementation - Correct configuration and management Denial-of-Service : Deny access of others Much more interesting No Trust? Use IPSec Between CEs! Slide 79 DoS Against MPLS DoS is about Resource Starvation, one of: Bandwidth CPU Memory (buffers, routing tables ) In MPLS, we have to examine: CE Rest is the same as in other networks Slide 80 40

41 Attacking a CE from MPLS (Other ) Is the CE reachable from the MPLS side? only if this is an Internet CE, otherwise not (CE- addressing is part of!) For Internet CEs: Same security rules apply as for any other access router MPLS Hides -CEs: Secure! Internet CEs: Same as In Other Networks Slide 81 Attacking a CE- Line Also depends on reachability of CE or the behind it Only an issue for lines to Internet-CEs Same considerations as in normal networks If CE- line shared ( and Internet): DoS on Internet may influence! MPLS Hides -CEs: Secure! Internet CEs: Same as In Other Networks Slide 82 41

42 Attacking a Router CE1 IP(CE1) IP(; fa0) IP(; l0) IP(P) VRF CE1 CE2 IP(CE2) IP(; fa1) VRF CE2 Attack Points VRF Internet Only Visible: Your Interface and Interfaces of Internet CEs Slide 83 DoS Attacks to Can Come from Other, connected to same Internet, if carries Internet VRF Possible Attacks: Resource starvation on Too many routing updates, too many SNMP requests, small servers Has to Be Secured and Can Be Secured! Slide 84 42

43 IPsec and MPLS Slide 85 Use IPsec If You Need: Encryption of traffic Direct authentication of CEs Integrity of traffic Replay detection Or: If you don t want to trust your ISP for traffic separation! Slide 86 43

44 Where to Apply IPsec CE CE IPsec CE-CE IPsec CE- IPsec - Application: Remote Access into Application: Security Application: Special Cases Slide 87 Applications of - IPSec If core is not pure MPLS, but IP based Standard 4364 requires MPLS core, - IPSec does not Alternative: MPLS in IP/GRE/L2TPv3, but with - IPSec spoofing impossible Protect against misbehaving transit nodes Protection against sniffing on core lines Slide 88 44

45 draft-ietf-l3vpn-ipsec txt: - IPsec in MPLS s Normal RFC 4364 Instead of LSPs between s, use IPsec Packets on the core instead of this: Look like this: label IPsec Header IP Data Careful: Does not encrypt CE-: Most vulnerable!! Work in progress, pretty stable IP Data Actually, the Labelled Packet Is First IP/GRE Encapsulated, Then Put in IPsec Transport Mode; IPsec Requires an IP Packet!! Slide 89 - IPSec: How It Works BGP + Ext. Community 1. Egress Signals IPSec Policy Per Prefix IPSec 2. Ingress s Establish IPSec Tunnel for Prefix Not defined in draft: How to establish IPSec tunnel Slide 90 45

46 IPsec: - vs. CE-CE Hacker wants to read traffic insert traffic into join a DoS a /the core IPsec CE-CE Protects Fully Protects Fully Protects Fully Doesn t Protect IPsec - Protects Partially Protects Partially Doesn t Protect Doesn t Protect Slide 91 Ongoing Standardizations Work Slide 92 46

47 Relevant Standardization IETF L3 WG: Working on Layer 3 architectures, such as MPLS IP s, IP s using virtual routers, and IPsec s. IETF L2 WG: Working on Layer 2 architectures, such as VPLS and VPWS Slide 93 Summary Slide 94 47

48 MPLS doesn t provide: Protection against mis-configurations in the core Protection against attacks from within the core Confidentiality, authentication, integrity, antireplay -> Use IPsec if required Customer network security Slide 95 Summary MPLS s can be secured as well as ATM/FR s Security depends on correct architecture, operation and implementation MPLS backbones can be more secure than normal IP backbones Core not accessible from outside Separate control and data plane Key: security Advantage: Only -CE interfaces accessible from outside Makes security easier than in normal networks Slide 96 48

49 References MPLS Security ISBN RFC4381 Analysis of MPLS Security RFC2082 RIP-2 MD5 Authentication RFC2154 OSPF with Digital Signatures RFC2385 Protection of BGP Sessions via the TCP MD5 Signature Option RFC3013 Recommended Internet Service Provider Security Services and Procedures RFC2196 Site Security Handbook Garnter research note M : "MPLS Networks: Drivers Beat Inhibitors in 2003"; 10 Feb 2003 MPLS and Architectures ISBN MPLS Security ISBN Slide 97 For More Information For questions, utilize the MFA Forum Message Board Website: Slide 98 49

50 Thank you for attending the MPLS Security Tutorial Slide 99 50

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!

More information

MPLS Security Considerations

MPLS Security Considerations MPLS Security Considerations Monique J. Morrow, Cisco Systems mmorrow@cisco.com November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer

More information

MPLS VPN Security in Service Provider Networks

MPLS VPN Security in Service Provider Networks MPLS VPN Security in Service Provider Networks Michael H. Behringer 1 HOUSEKEEPING We value your feedback, don t forget to complete your online session evaluations after each session and complete the Overall

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS

More information

MPLS VPN Security Best Practice Guidelines

MPLS VPN Security Best Practice Guidelines Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. mmorrow@cisco.com mbehring@cisco.com

More information

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) How the different Inter-AS and Carrier s Carrier

More information

Introduction to MPLS-based VPNs

Introduction to MPLS-based VPNs Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions

More information

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001 The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion

More information

Security of the MPLS Architecture

Security of the MPLS Architecture WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol

More information

Secure Inter-Provider IP VPNs

Secure Inter-Provider IP VPNs Secure Inter-Provider IP VPNs Shankar Rao, Sr. Product Manager, Qwest Communications shankar.rao@qwest.com Scott Poretsky, Director of QA, Quarry Technologies sporetsky@quarrytech.com October 19, 2004

More information

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point

More information

BGP-MPLS IP VPN Network Security

BGP-MPLS IP VPN Network Security Network Working Group M. Behringer Request for Comments: 4381 Cisco Systems Inc Category: Informational February 2006 Status of This Memo Analysis of the Security of BGP/MPLS IP Virtual Private Networks

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC

DD2491 p2 2011. MPLS/BGP VPNs. Olof Hagsand KTH CSC DD2491 p2 2011 MPLS/BGP VPNs Olof Hagsand KTH CSC 1 Literature Practical BGP: Chapter 10 MPLS repetition, see for example http://www.csc.kth.se/utbildning/kth/kurser/dd2490/ipro1-11/lectures/mpls.pdf Reference:

More information

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks rahul@juniper.net Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core

More information

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track** Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge

More information

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005 MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel

More information

Course Contents CCNP (CISco certified network professional)

Course Contents CCNP (CISco certified network professional) Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,

More information

How To Make A Network Secure

How To Make A Network Secure 1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance

More information

MPLS Peter Raedler Systems Engineer praedler@cisco.com 2001, Cisco Systems, Inc. Agenda Overview of MPLS Business Opportunities Security

MPLS Peter Raedler Systems Engineer praedler@cisco.com 2001, Cisco Systems, Inc. Agenda Overview of MPLS Business Opportunities Security MPLS Peter Raedler Systems Engineer praedler@cisco.com 1 Agenda Overview of MPLS Business Opportunities Security 2 Copyright All rights reserved. 1 Optical Internetworking Eliminating the overhead Traditional

More information

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of

More information

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed

More information

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions Luyuan Fang ATT MPLSCon 2005, NYC The world s networking company SM Outline Overview of the L3 VPN deployment VoIP over MPLS VPN MPLS

More information

Securing a Core Network

Securing a Core Network Securing a Core Network Manchester, 21 Sep 2004 Michael Behringer Christian Panigl Session Number Presentation_ID 325_mbehring 2001, 2003 Cisco Systems, Inc. All

More information

RFC 2547bis: BGP/MPLS VPN Fundamentals

RFC 2547bis: BGP/MPLS VPN Fundamentals White Paper RFC 2547bis: BGP/MPLS VPN Fundamentals Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2001 or 888 JUNIPER www.juniper.net

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _

More information

Network Working Group Request for Comments: 2547. March 1999

Network Working Group Request for Comments: 2547. March 1999 Network Working Group Request for Comments: 2547 Category: Informational E. Rosen Y. Rekhter Cisco Systems, Inc. March 1999 BGP/MPLS VPNs Status of this Memo This memo provides information for the Internet

More information

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks

Virtual Private Networks. Juha Heinänen jh@song.fi Song Networks Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between

More information

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1

640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

IPv6 over IPv4/MPLS Networks: The 6PE approach

IPv6 over IPv4/MPLS Networks: The 6PE approach IPv6 over IPv4/MPLS Networks: The 6PE approach Athanassios Liakopoulos Network Operation & Support Manager (aliako@grnet.gr) Greek Research & Technology Network (GRNET) III Global IPv6 Summit Moscow, 25

More information

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5

More information

MPLS Implementation MPLS VPN

MPLS Implementation MPLS VPN MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

Introduction Inter-AS L3VPN

Introduction Inter-AS L3VPN Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back

More information

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Expert Reference Series of White Papers An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire 1-800-COURSES www.globalknowledge.com An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire Al Friebe,

More information

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor 642-902 Route: Implementing Cisco IP Routing Course Introduction Course Introduction Module 01 - Planning Routing Services Lesson: Assessing Complex Enterprise Network Requirements Cisco Enterprise Architectures

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPN taxonomy János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005 VPNs Definition: the capability of both private and public networks to support a communication infrastructure connecting geographically

More information

MPLS in Private Networks Is It a Good Idea?

MPLS in Private Networks Is It a Good Idea? MPLS in Private Networks Is It a Good Idea? Jim Metzler Vice President Ashton, Metzler & Associates March 2005 Introduction The wide area network (WAN) brings indisputable value to organizations of all

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

How Routers Forward Packets

How Routers Forward Packets Autumn 2010 philip.heimer@hh.se MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA

IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction

More information

VPN Technologies A Comparison

VPN Technologies A Comparison VPN Technologies A Comparison Matthew Finlayson, matthewfinlayson@metaswitch.com Jon Harrison, jon.harrison@metaswitch.com Richard Sugarman, richard.sugarman@metaswitch.com First issued February 2003 100

More information

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30 Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Enterprise Network Simulation Using MPLS- BGP

Enterprise Network Simulation Using MPLS- BGP Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC

DD2491 p2 2009. BGP-MPLS VPNs. Olof Hagsand KTH/CSC DD2491 p2 2009 BGP-MPLS VPNs Olof Hagsand KTH/CSC Literature Practical BGP: Chapter 10 JunOS Cookbook: Chapter 14 and 15 MPLS Advantages Originally, the motivation was speed and cost. But routers does

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual

More information

MPLS over Various IP Tunnels. W. Mark Townsley

MPLS over Various IP Tunnels. W. Mark Townsley MPLS over Various IP Tunnels W. Mark Townsley Generic MPLS over IP Manual, Point to Point Tunnel IP/MPLS Network P Manually Configured Tunnel IP Network P IP/MPLS Network Typically a GRE tunnel, but may

More information

Kingston University London

Kingston University London Kingston University London Thesis Title Implementation and performance evaluation of WAN services over MPLS Layer-3 VPN Dissertation submitted for the Degree of Master of Science in Networking and Data

More information

For internal circulation of BSNLonly

For internal circulation of BSNLonly E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

Designing and Developing Scalable IP Networks

Designing and Developing Scalable IP Networks Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Demonstrating the high performance and feature richness of the compact MX Series

Demonstrating the high performance and feature richness of the compact MX Series WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

Fundamentals Multiprotocol Label Switching MPLS III

Fundamentals Multiprotocol Label Switching MPLS III Fundamentals Multiprotocol Label Switching MPLS III Design of Telecommunication Infrastructures 2008-2009 Rafael Sebastian Departament de tecnologies de la Informació i les Comunicaciones Universitat Pompeu

More information

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Troubleshooting and Maintaining Cisco IP Networks Volume 1 Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division Tackling the Challenges of MPLS VPN ing Todd Law Product Manager Advanced Networks Division Agenda Background Why test MPLS VPNs anyway? ing Issues Technical Complexity and Service Provider challenges

More information

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com 1 Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties

More information

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network

More information

INTRODUCTION TO L2VPNS

INTRODUCTION TO L2VPNS INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer

More information

Junos MPLS and VPNs (JMV)

Junos MPLS and VPNs (JMV) Junos MPLS and VPNs (JMV) Course No: EDU-JUN-JMV Length: Five days Onsite Price: $32500 for up to 12 students Public Enrollment Price: $3500/student Course Level JMV is an advanced-level course. Prerequisites

More information

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint

More information

200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) 200-101: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2) Course Overview This course provides students with the knowledge and skills to successfully install, operate, and troubleshoot a small

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: stephan.gross@tu-dresden.de

More information

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang luyuanfang@att.com AT&T 1 Outline! BGP/MPLS VPN (RFC 2547bis)! Setting up LSP for VPN - Design Alternative Studies! Interworking of LDP / RSVP

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Implementing Cisco MPLS

Implementing Cisco MPLS Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,

More information

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Course Description The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level

More information

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IMPLEMENTING CISCO MPLS V3.0 (MPLS) IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility

More information

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service Nowdays, most network engineers/specialists consider MPLS (MultiProtocol Label Switching) one of the most promising transport technologies. Then, what is MPLS? Multi Protocol Label Switching (MPLS) is

More information

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved. MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

IPv6 Fundamentals, Design, and Deployment

IPv6 Fundamentals, Design, and Deployment IPv6 Fundamentals, Design, and Deployment Course IP6FD v3.0; 5 Days, Instructor-led Course Description The IPv6 Fundamentals, Design, and Deployment (IP6FD) v3.0 course is an instructor-led course that

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: Kapil.Kumar@relianceinfo.com Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

MPLS-based Layer 3 VPNs

MPLS-based Layer 3 VPNs MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses

More information