MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems
|
|
|
- Godfrey Ellis
- 10 years ago
- Views:
Transcription
1 Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems
2 Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 2
3 The rinciple: A Virtual Router Virtual Routing and Forwarding Instance! ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000! interface Serial0/1 ip vrf forwarding Customer_A! Assign Interface to Virtual Router Route Distinguisher: Makes VN routes unique Export this VRF with community 100:1000 Import routes from other VRFs with community 100:1000 3
4 General VN Security Requirements Address Space and Routing Separation Hiding of the MLS Core Structure Resistance to Attacks Impossibility of VN Spoofing Working assumption: The core (+) is secure 4
5 mbehring Address lanes: True Separation! VN1 Address Space ? VN2 Address Space ? Several Data lanes: VNv4 Addr. Control lane: Iv4 Addr.? Core Address Space ? - Interfaces Belong to VN; Only Attack oint!! 5
6 Hiding of the MLS Core Structure Visible Address Space of VN1 MLS core I(; l0) 1 I(1) I(; fa0) VRF 1 2 I(2) I(; fa1) VRF 2 interface to the only point where a VN can see the core and send packets to the core device; seen and accessible from VN1 space only, VN1 cannot see any other interface on the Only peer addresses of VN1 exposed (-> )! -> ACL for interfaces for receive traffic I unnumbered for interfaces complete hiding of the core from that VN! routers not reachable from VN 6
7 rotection Against Spoofing VN Customer VN Customer Transit ACL Customer Internet Service rovider Internet Internet * Exceptions: Inter-AS, CsC Customer VN Customer Internet Customer LS Label Spoofing - Interface between and pure I without labels labeled packet received from, automatically drops it Cannot spoof labels from outside! I spoofing possible, remains within the originating VN RFC2827 7
8 Inter-AS: What are we trying to achieve? An S should have: 100% (full) reachability to all Inter-AS VNs shared between them (control plane and data plane) 0% (no) reachability to VNs that are not shared (control plane and data plane) S networks should be independent: Must be secured against each other Not attackable from outside (other S, customer, Internet) 8
9 Inter-AS: What Are We NOT Trying to Achieve? Any Form of Separation Between Inter-AS VNs (Control or Data lane) - Interconnection of VNs is 100% No firewalling, no limitations, no sanity checks within an Inter-AS VN If an S Holds VN Sites in an Inter-AS Set-Up, He Has Full Access to All VN Sites, Also on Other ASes 9
10 Inter-AS: Case A VRF-VRF Back-to-Back Cust. AS 1 AS 2 ASBR ASBR Cust. mbehring LS I Data LS Control plane: No signalling, no labels interfaces external to AS are pure I, each ASBR holds its own VRF for the shared VN ASBR - as if a single router connecting a router (the other ASBR) Data plane: Iv4 only, no labels accepted Not very scalable 10
11 Inter-AS: Case A otential Security Issues Accidental misconnection at the ASBR Ss have to make sure they are clear about which interface/subinterface connects which VN Routing issues VRFs on both ASBRs will exchange routing for a given Inter-AS VN Routing security refix number limited to avoid memory overflow Security: as in RFC2547; most secure interconnection model no labels accepted due to - analogy, neighbouring AS cannot see the AS core Ss are completely separated, VRF-to-VRF connection, no global routing table connection Neighboring ASBR - just an I interface to MLS core no label spoofing 11
12 Inter-AS: Case B ASBR exchange labelled VNv4 routes Cust. AS 1 AS 2 ASBR M-eBG+Labels ASBR Cust. mbehring LS VN label I Data LS Control plane: M-eBG between ASBRs, no IG or TD/LD Inter-AS VNv4 routes held in BG table, not in VRFs Data plane: one connection between ASBRs data plane traffic for different VNs must be kept separate labelling packets before sending them to the other ASBR (label stack swapped for ASBR VN label) inherent behaviour to M-eBG Better scalability, BG table size might be an issue 12
13 Inter-AS: Case B otential Security Issues No AS VN label is checked on ASBRs when forwarding, => possible label spoofing => data plane not possible to secure completely External interfaces accept labelled packets instead of just I packets No way for ASBR to check on the VN membership of the packet, as there is no VRF on ASBR Control plane: ingress ASBR interfaces ACL to filter any I accept BG Ss are completely separate Visibility only the neighbouring ASBR, via ebg 13
14 Inter-AS Case C: ASBRs Exchange loopbacks Cust. AS 1 AS 2 VNv4 Routes + Labels ASBR Loopb+Labels ASBR Cust. mbehring LS label VN I Data Control plane: visibility of both Ss through Multihop M-BG ASBR exchange just loopback vie ebg + labels; s exchange VNv4 routes + labels end to end without involving ASBRs => no need to hold VN specific information, only loopbacks and their labels => very scalable Data plane: label + VN label, ASBRs only as routers, LS built from in AS1 to in AS2 14
15 Inter-AS: Case C otential Security Issues Security: S must be able to reach all s of neighbouring AS which hold connections of shared VNs, issue: ASBR cannot check VN label, sees only egress label, possible VN label spoofing => probability of misinsertion Control plane: ingress ASBR interfaces ACL to filter any I accept BG ASBR no VRF, no VN routing information => VN label below egress label cannot be checked (e.g. intrusion no VN label appended, H pops egress label at router, receives a pure I packet gets routed into S core) All these label spoofing attacks carried out by S, not by customer VN, as data can be injected at ASBR only! 15
16 The Key Issue: Designing a DoS Resistant rovider Edge Customer VN MLS core VN Customer VRF 1 Internet Customer DoS Attack Internet VRF rimary prerequisite I address visibility has shared CU / memory / bandwidth resources for different VRFs: Traffic can affect VN customer(s) via performance degradation up to complete loss of connectivity DoS attacks usually perceived as coming from Internet, however also coming from customer VNs A way to compromise MLS core thorough security of s crucial to avoid the threat 16
17 Today s Best ractice: DoS Through a Shared Solved by Using a different design To Internet 1 1 Separate VN and Internet traffic on physically different routers customer network 2 To VN 2 VRF Internet VRF VN routers should contain only VRFs of the same security level. Example: Level 0: Internet Level 1: VN customers Internet VN subject to DoS attack in no different way than other network technologies, i.e. this is not an MLS-specific issue DO NOT expose addresses to Internet at all, or with dynamic routing use limit to routing reachability only Infrastructure ACL! 17
18 Separate VN and Internet Access Customer LAN MLS core To Internet Firewall / NAT 1 1 VRF Internet IDS 2 2 VRF VN To VN Separation DoS resistance 18
19 Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 19
20 Internet rovisioning on an MLS Core Most common VN user requirement S to provide Internet access in addition to VN connectivity Two basic possibilities: 1. Internet in global table, either: 1a) Internet-free MLS core (using LSs between s) 1b) Internet routing held by the entire MLS core ( and ) 2. Internet in VRF Internet carried as a VN on the core Issue how to design an MLS core for Internet access such that VNs remain secure 20
21 MLS Core Without Internet Connectivity MLS Core no connection to the Internet; only VNs connect to the core, not reachable, also (except in case seen below) ure MLS VN service considered most secure well secured against intrusions and DoS attacks from the outside (core invisible from the outside) VN Spoofing impossible, VNs not reachable from the outside But what about: B VRF B VRF B B A VRF A mbehring VRF Ambehring A Internet Service rovider Internet has become part of the VN, above statements still hold DoS attack within such VN no immense threat as access capacity of VN A can be limited by configuration 21
22 Internet in a VRF Internet Service rovider Internet Internet VN Customer Customer Customer VN Customer VN Customer Internet Routing Table (Global Routing Table) VN Routing Table (VRF) Internet in a VRF Internet Customer 22
23 Internet in a VRF Security Features Internet is handled just the same as a VN, Customer VNs not reachable from Internet VN The core is secure against attacks from the outside as the Internet has no access to the core not reachable Spoofing is impossible between VNs and Internet in a VN Internet VN possibility of DoS of higher magnitude can be reachable from Internet if not secured properly Customer VNs must not be affected -> provide sufficient capacity in the core OR use QoS to prioritize VN traffic over Internet traffic Scalability Issue a prefix held in a VRF requires about three times as much memory as a prefix held in the global table => additional memory required 23
24 Internet in the Global Routing Table Using LSs Between s Internet Routing Table (Global Routing Table) VN Routing Table (VRF) Internet Service rovider Internet VN Customer Customer Internet Customer VN Customer VN Customer Internet Customer LS Ingress - ibg next hop - Egress loopback Next hop to egress usually has label, LS is used to reach egress routers do not need to know Internet routes (nor run BG, only IG and LD) 24
25 Internet in the Global Routing Table Using LSs Between s - Recommendations In this model routers have to carry routes for routers in their IG Traffic coming from the outside into a router's global routing table will have normally a route to the routers ( reachable unidirectionally) LD and ibg threatened via attacks against TC usage of MD5 authentication as a solution use Infrastructure ACLs to prevent packets from outside reach the inside of the core use Receive ACLs and Control lane olicing to protect the control plane of a single platform Consider using NSA addresses in core IS-IS 25
26 Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 26
27 Securing the Core: Infrastructure ACLs VN In MLS: address belongs to VRF! Intended to filter data destined for network infrastructure equipment, i.e. what protocols and addresses can access critical infrastructure equipment On all reachable VRF interfaces: deny ip any < address space> permit ip any any exception: routing protocol from only and all transit traffic Idea: rotecting the Core DoS: traffic over router theoretically enables DoS, primary threat traffic destined for R iacls also to deny source private address space, reserved addresses, Ss own address space - antispoofing 27
28 Securing the Core: Infrastructure ACLs /30.1 VN VN / /30.1 VN VN /30.2 Example: deny ip any permit ip any any This Is VN Address Space, Not Core! Caution: This also blocks packets to the s! Alternatives: List all i/f in ACL, or use secondary i/f on 28
29 Securing the Core: - routing protocol security In order of security preference: 1. Static: If no dynamic routing required (no security implications no fabricated routing updates, less CU impact, possible sniffing not revealing routes due to no updates) 2. BG: For redundancy and dynamic updates (many security features prefix filtering, route dampening, one BG process, multiple address-families (per customer/vrf), redistribution at not necessary into ibg) 3. IGs: If BG not supported (limited security features peering address known, no neighbor definition, use iacls) 29
30 Routing Security: Neighbor Authentication and BG TTL Use static routing between and where possible no errant routes announced, no routing data crossing the wire, no CU impact Routers authenticate each time a routing update is exchange between them reliable information received from a trusted source Verification through MD5 hash Supported: BG, ISIS, OSF, EIGR, RIv2, LD MD5 for LD label spoofing protection, enable also on M-iBG 30
31 Control of Routes from a BG eer Injection of too many routes possible attack at routing table stability, CU and memory: otential DoS attack, leading e.g. to F disabling or reload Control with maximum prefix command After exceeding the number BG peering disabled, neighbor down From This Neighbor Accept Max 45 refixes, Then Reset Session router bgp 13 neighbor maximum-prefix restart 2 Log a Warning at 80% (of 45), and Restart the BG Session After Two Min. 31
32 Control of Routes from a BG eer: Logging 6d22h: %BG-4-MAXFX: No. of prefix received from (afi 2) reaches 37, max 45 6d22h: %BG-3-MAXFXEXED: No. of prefix received from (afi 2): 46 exceed limit 45 6d22h: %BG-5-ADJCHANGE: neighbor vpn vrf VN_20499 Down BG Notification sent 6d22h: %BG-3-NOTIFICATION: sent to neighbor /1 (update malformed) 0 bytes FFFF FFFF FF 32
33 VRF Maximum refix Number Injection of too many routes: otential memory overflow otential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF ip vrf red maximum routes Accept Max 45 refixes, and Log a Warning at 80% (of 45), 33
34 -Specific Router Security Control lane hardening Receive traffic L3 routing environment (authentication, max number of prefixes ) Infrastructure ACLs rotection ACLs (anti-spoofing, etc.) Data lane Hardening Use urf Strict mode on each interface of the routers facing interfaces and on the routers -facing interfaces 34
35 Attacking a from MLS (other VN) Is the reachable from the MLS side? -> only if this is an Internet, otherwise not! (- addressing is part of VN!) For Internet s: Same security rules apply as for any other access router. MLS hides VN-s: Secure! Internet s: Same as in other networks 35
36 Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 36
37 Securing the MLS Core: Wrap-Up VN MLS core BG Route Reflector VN Internet VN VN VN BG peering with MD5 authentic. LD with MD5 ACL and secure routing 37
38 MLS Security Overview 1. Don t let packets into (!) the core No way to attack core, except through routing, thus: 2. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 3. Design for transit traffic QoS to give VN priority over Internet Choose correct router for bandwidth Separate s where necessary 4. Operate Securely Still open : routing protocol Only attack vector: Transit traffic Now only insider attacks possible Avoid insider attacks 38
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow
MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!
APNIC elearning: Introduction to MPLS
2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security DNS/DNSSEC
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
MPLS Security Considerations
MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer
MPLS Virtual Private Network (VPN) Security
MPLS Virtual Private Network () Security An MFA Forum Sponsored Tutorial Monique Morrow MFA Forum Ambassador CTO Consulting Engineer Cisco Systems Slide 1 MPLS Security - Agenda Analysis of the Architecture
MPLS VPN Security in Service Provider Networks
MPLS VPN Security in Service Provider Networks Michael H. Behringer 1 HOUSEKEEPING We value your feedback, don t forget to complete your online session evaluations after each session and complete the Overall
Keep it Simple with BGP/MPLS Virtual Private Networks
White aper Keep it Simple with BG/MLS Virtual rivate Networks Joël Repiquet May 2002 www.lambdanet.net [email protected] Contents 1. Introduction... 3 2. VN Models... 4 2.1. Overlay vs. eer VNs... 4 2.2.
MPLS VPN Security Best Practice Guidelines
Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. [email protected] [email protected]
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Table of Contents. Cisco Configuring a Basic MPLS VPN
Table of Contents Configuring a Basic MPLS VPN...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Related Products...2 Conventions...2 Configure...3 Network Diagram...3 Configuration
Introduction Inter-AS L3VPN
Introduction Inter-AS L3VPN 1 Extending VPN services over Inter-AS networks VPN Sites attached to different MPLS VPN Service Providers How do you distribute and share VPN routes between ASs Back- to- Back
How To Make A Network Secure
1 2 3 4 -Lower yellow line is graduate student enrollment -Red line is undergradate enrollment -Green line is total enrollment -2008 numbers are projected to be near 20,000 (on-campus) not including distance
HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014
HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD BSides Asheville 2014 aul Coggin Internetwork Consulting Solutions Architect @aulcoggin www.dynetics.com V## Goes Here 1 BG Hijacking in the News 2008 akistan
Configuring a Basic MPLS VPN
Configuring a Basic MPLS VPN Help us help you. Please rate this document. Contents Introduction Conventions Hardware and Software Versions Network Diagram Configuration Procedures Enabling Configuring
BGP-MPLS IP VPN Network Security
Network Working Group M. Behringer Request for Comments: 4381 Cisco Systems Inc Category: Informational February 2006 Status of This Memo Analysis of the Security of BGP/MPLS IP Virtual Private Networks
Security of the MPLS Architecture
WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
BGP Configuration Guide
Configuration Guide 5991-3730 August 2005 BG Configuration Guide Configuring BG for Access to rivate I Services (BG/MLS VN Networks) This Configuration Guide provides an overview of rivate I Services (BG/MLS
MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
l.cittadini, m.cola, g.di battista
MPLS VPN l.cittadini, m.cola, g.di battista motivations customer s problem a customer (e.g., private company, public administration, etc.) has several geographically distributed sites and would like to
MPLS VPN Implementation
MPLS VPN Implementation Overview Virtual Routing and Forwarding Table VPN-Aware Routing Protocols VRF Configuration Tasks Configuring BGP Address families Configuring BGP Neighbors Configuring MP-BGP Monitoring
Introduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE [email protected] Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**
Course: Duration: Price: $ 3,695.00 Learning Credits: 37 Certification: Implementing Cisco Service Provider Next-Generation Edge Network Services Implementing Cisco Service Provider Next-Generation Edge
IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager [email protected]
I over MLS Course Number resentation_id 2001, Cisco Systems, Inc. All rights reserved. atrick Grossetete Cisco Systems Cisco IOS I roduct Manager [email protected] 1 Agenda I Migration Approaches enabled
MPLS-based Layer 3 VPNs
MPLS-based Layer 3 VPNs Overall objective The purpose of this lab is to study Layer 3 Virtual Private Networks (L3VPNs) created using MPLS and BGP. A VPN is an extension of a private network that uses
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint
Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.
Where MPLS part I explains the basics of labeling packets, it s not giving any advantage over normal routing, apart from faster table lookups. But extensions to MPLS allow for more. In this article I ll
Cisco Configuring Basic MPLS Using OSPF
Table of Contents Configuring Basic MPLS Using OSPF...1 Introduction...1 Mechanism...1 Hardware and Software Versions...2 Network Diagram...2 Configurations...2 Quick Configuration Guide...2 Configuration
HP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.
HughesNet and MLS This white paper addresses how it is possible to seamlessly integrate MLS and HughesNet. The first sections contain a basic introduction to MLS and the required scenarios in which the
- Multiprotocol Label Switching -
1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can
How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv
BGP Support for IP Prefix Import from Global Table into a VRF Table The BGP Support for IP Prefix Import from Global Table into a VRF Table feature introduces the capability to import IPv4 unicast prefixes
MPLS Implementation MPLS VPN
MPLS Implementation MPLS VPN Describing MPLS VPN Technology Objectives Describe VPN implementation models. Compare and contrast VPN overlay VPN models. Describe the benefits and disadvantages of the overlay
Methods of interconnecting MPLS Networks
Methods of interconnecting MPLS Networks NANOG31, May 2005 San Francisco Cable & Wireless Internet Engineering Udo Steinegger What this talk is about General This presentation covers technologies on how
Unicast Reverse Path Forwarding
Unicast Reverse Path Forwarding This feature module describes the Unicast Reverse Path Forwarding (RPF) feature, which helps to mitigate problems caused by malformed or forged IP source addresses passing
Using OSPF in an MPLS VPN Environment
Using OSPF in an MPLS VPN Environment Overview This module introduces the interaction between multi-protocol Border Gateway Protocol (MP-BGP) running between Provider Edge routers (s) and Open Shortest
WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr. 2006 Cisco Systems, Inc. All rights reserved.
MPLS WAN Topologies 1 Multiprotocol Label Switching (MPLS) IETF standard, RFC3031 Basic idea was to combine IP routing protocols with a forwarding algoritm based on a header with fixed length label instead
MPLS VPN Route Target Rewrite
The feature allows the replacement of route targets on incoming and outgoing Border Gateway Protocol (BGP) updates Typically, Autonomous System Border Routers (ASBRs) perform the replacement of route targets
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Enterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India [email protected] 2 Department of Information Technolgy,
IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: 112085. Requirements
IPv6 over MPLS VPN Document ID: 112085 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram VRF Configuration Multiprotocol BGP (MP BGP) Configuration
IPv6 Security. Scott Hogg, CCIE No. 5133 Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA
IPv6 Security Scott Hogg, CCIE No. 5133 Eric Vyncke Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Contents Introduction xix Chapter 1 Introduction to IPv6 Security 3 Reintroduction
MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at: http://networksims.com/i01.
MPLS Cisco MPLS MPLS Introduction The most up-to-date version of this test is at: http://networksims.com/i01.html Cisco Router Challenge 227 Outline This challenge involves basic frame-mode MPLS configuration.
How Routers Forward Packets
Autumn 2010 [email protected] MULTIPROTOCOL LABEL SWITCHING (MPLS) AND MPLS VPNS How Routers Forward Packets Process switching Hardly ever used today Router lookinginside the packet, at the ipaddress,
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009
MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
IMPLEMENTING CISCO MPLS V3.0 (MPLS)
IMPLEMENTING CISCO MPLS V3.0 (MPLS) COURSE OVERVIEW: Multiprotocol Label Switching integrates the performance and traffic-management capabilities of data link Layer 2 with the scalability and flexibility
Configuring MPLS Hub-and-Spoke Layer 3 VPNs
CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes
Implementing MPLS VPNs over IP Tunnels
Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead
Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia
Tutorial: Options for Blackhole and Discard Routing Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia Caveats and Assumptions The views presented here are those of the authors and they do not
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Network provider filter lab
Network provider filter lab Olof Hagsand Pehr Söderman KTH CSC Group Nr Name 1 Name 2 Name 3 Name 4 Date Instructor s Signature Table of Contents 1 Goals...3 2 Introduction...3 3 Preparations...3 4 Lab
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
For internal circulation of BSNLonly
E3-E4 E4 E&WS Overview of MPLS-VPN Overview Traditional Router-Based Networks Virtual Private Networks VPN Terminology MPLS VPN Architecture MPLS VPN Routing MPLS VPN Label Propagation Traditional Router-Based
An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks
An ADTRAN White aper rivate I Service BG/MLS VN Networks rivate I Service BG/MLS VN Networks U ntil the advent of business communications over the Internet, a clear distinction between private and public
Inter-Autonomous Systems for MPLS VPNs
Inter-Autonomous Systems for MPLS VPNs This feature module explains how to provide MPLS VPN services that can span several autonomous systems (ASs) and VPN service providers. History of the Inter-Autonomous
MPLS Inter-AS VPNs. Configuration on Cisco Devices
MPLS Inter-AS VPNs Configuration on Cisco Devices (C) Herbert Haas 2005/03/11 1 #1: Back-to-Back VRF ip vrf blue rd 1:1 route-target both 1:1 address-family ipv4 vrf blue neighbor 1.1.1.2 activate ip vrf
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
IP interconnect interface for SIP/SIP-I
Page INTERCONNECT SPECIFICATION Public 1 (7) IP interconnect interface for SIP/SIP-I 0 Document history... 2 1 Scope... 2 2 References... 2 3 Definitions/Acronyms... 3 4 IP Interconnect specification...
Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction Network virtualization is a cost-efficient way to provide traffic separation. A virtualized network
Customized BGP Route Selection Using BGP/MPLS VPNs
Customized BGP Route Selection Using BGP/MPLS VPNs Laurent Vanbever Université catholique de Louvain, BE!"#$%&'()"&*%+%$,#-./#+"0&(*% Pierre Francois (UCLouvain, BE), Olivier Bonaventure (UCLouvain, BE)
Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network
Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network INTRODUCTION AT&T s legacy and expertise lies in the creation and maintenance of secure, reliable networks that are always on
Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN
BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN The BGP Multipath Load Sharing for ebgp and ibgp feature allows you to configure multipath load balancing with both external BGP (ebgp)
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Implementing Cisco MPLS
Implementing Cisco MPLS Course MPLS v2.3; 5 Days, Instructor-led Course Description This design document is for the refresh of the Implementing Cisco MPLS (MPLS) v2.3 instructor-led training (ILT) course,
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
IMPLEMENTING CISCO MPLS V2.3 (MPLS)
IMPLEMENTING CISCO MPLS V2.3 (MPLS) COURSE OVERVIEW: The course will enable learners to gather information from the technology basics to advanced VPN configuration. The focus of the course is on VPN technology
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
MPLS Concepts. Overview. Objectives
MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label
Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: 642-691 Total Questions: 401
Question: 1 Every time a flap occurs on a route, the route receives A. 750 per-flap penalty points which are user configurable B. 1500 per-flap penalty points which are user configurable C. 200 per-flap
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
Frame Mode MPLS Implementation
CHAPTER 4 Frame Mode MPLS Implementation Lab 4-1: Configuring Frame Mode MPLS (4.5.1) In this lab, you learn how to do the following: Configure EIGRP on a router. Configure LDP on a router. Change the
