HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014

Size: px
Start display at page:

Download "HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014"

Transcription

1 HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD BSides Asheville 2014 aul Coggin Internetwork Consulting Solutions V## Goes Here 1

2 BG Hijacking in the News 2008 akistan Telecom accidentally hijacks 2011 Chinanet accidentally hijacks In 2010 China Telecom accidentally hijacked 50,000 blocks of I addresses 20 minutes Renesys reported a major BG hijacking in Belaruse and Iceland IS s possibly compromised - A software bug blamed

3 AS 5 Hijack I subnet /24 BG I refix and AS Hijacking Route Reflector AS 1 Route Reflector AS 6 IBG AS 7 EBG EBG EBG L2 Cross Connect AS 2 AS 3 AS 4 Hijack AS 4 & I subnet /24 The Longest I refix Wins 3

4 BG Hijacking in the News 2008 akistan Telecom accidentally hijacks 2011 Chinanet accidentally hijacks In 2010 China Telecom accidentally hijacked 50,000 blocks of I addresses 20 minutes Renesys reported a major BG hijacking in Belaruse and Iceland IS s possibly compromised - A software bug blamed

5 Virtual rivate Networks Virtual Networks Virtual rivate Networks Virtual Dialup Networks Virtual LANs Overlay VN eer-to-eer VN Layer-2 VN Layer-3 VN Access lists (Shared router) Split routing (Dedicated router) MLS/VN X.25 F/R ATM GRE ISec MLS VN is not encrypted unless encrypted separately 5

6 MLS and the OSI and TC/I Model OSI Model MLS Label Stack TC/I Model 7 Application 6 resentation Application 5 4 Session Transport Own the Label Transport 3 Network OSI 2.5 VN Label LD Label Internet 2 1 Data Link hysical TE Label Frame Header Network Interface 6

7 MLS Label CA 32-bit MLS Label Format Label : 20-bit EX : 3-bit Bottom-of-Stack : 1-bit TTL : 8-bit Source: 7

8 MLS Architecture Overview VN_A VN_B VN_A VN_B ibg sessions VN_A VN_A VN_B Routers (LSRs) are in the Core of the MLS Cloud Routers (Edge LSRs or LERs) Use MLS with the Core and lain I with Routers and Routers Use the Same IG Routing rotocol Routers are M-iBG Fully-meshed Service provider may accidentally or intentionally misconfigure VN s Utilize ISEC VN over MLS VN to insure security 8

9 CLI - VRF configuration ip vrf cust_a rd 200:1 route-target export 200:1 route-target import 200:1 ip vrf cust_2 rd 200:2 route-target export 200:2 route-target import 200:2 Interface Serial2/0 ip vrf forwarding cust_a Interface Serial2/1 ip vrf forwarding cust_b 1" M-BG! " OSF \ ISIS and LD 2" ip vrf cust_a rd 200:1 route-target export 200:1 route-target import 200:1 ip vrf cust_b rd 200:2 route-target export 200:2 route-target import 200:2 Interface Serial2/0 ip vrf forwarding cust_a Interface Serial2/1 ip vrf forwarding cust_b Static, BG, OSF, EIGR, RI Cust_1! Cust-2! Cust-1! Cust-2! MLS Trust Relationship Customer Trusts Service roviders 9

10 MLS Routing Table Global Routing Table Cust_A MLS VN Routing Table Cust_B MLS VN Routing Table 3 Routing Tables on 1 Router Separated by MLS VRF 10

11 MLS M-BG VN 11

12 MLS Network Attack Vectors Transport Network Infrastructure Network and System Architecture - Centralized, Distributed, Redundant - hysical and Logical - Transport Network (RF, Fiber, Copper) Attack Tree Network Infrastructure Attack Vectors Network rotocols - RouBng, Switching, Redundancy - Apps, Client/Server HW, SW, Apps, RDBMS - Open Source - Commercial Trust Rela@onships Internet, BSS, OSS, NMS, Net - Network Management and Network Devices - Billing, Middleware, rovisioning - Vendor remote access - (VT) - Tech staff remote access - Self rovisioning - hysical access - Trusted Insider - Cross connect - in- band management - hysical access to configurabon seqngs SNM Community String Dictionary Attack with Spoofing to Download Router\ Switch Configuration Build New Router Configuration File to enable further privilege escation Upload New Configuration File Using Comprimised SNM RW String Own Network Infrastructure Telnet\SSH Dictionary Attack Router\Switches\ NetMgt Server Build New Router Configuration File to enable further privilege escation Own Network Infrastructure Exploit ACL Trust Relationship Attack SNM\Telnet\SSH UNIX NetMgt Server Running NIS v1 Ypcat -d <domain> <server I> passwd Grab shadow file hashes Crack asswords Access Server Directly Discover Backup HW Configs Crack asswords Own Network Infrastructure Find NetMgt passwords and SNM config files MITM AR oisoning Sniffing Capture SNM Community Strings and Unencrypted Login\asswords, rotocol asswords Inject New Routes Or Bogus rotocol ackets Configure Device for Further rivilege Escalation Own Network Infrastructure Network Mgt Application Attempt to Login Using Default Login\assword Reconfigure Router or Switch Own Network Infrastructure Execute OS CMDs from Oracle L/SQL Attack Network from DB Further Enumerate Oracle SID s to Identify Default DBA System Level Accts\asswords H OpenView Server Enumerate Oracle TNS Listener to Identify Default SID s Login to Oracle DB with Discovered DBA rivilege Account Run Oracle SQL CMDs Execute OS CMDs Find NetMgt asswords, SNM info, OS password files Crack asswords Own Network Infrastructure Further Enumerate Oracle SID s to Identify User Accts. erform Dictionary Attack Run Oracle SQL CMDs Execute OS CMDs Add New rivileged OS Account Use New rivileged OS account to Escalate rivileged Access to Network 12

13 Service rovider MLS Network Global Internet Central Office/ O Label I Internet & MLS VN VN Label Data I Data I Data MLS VN Static, BG Internet & MLS VN MLS VN Central Office/ O Insider Threat - Add VN router - Layer 2 attacks - L2Tv3 - ERSAN - Lawful Intercept - GRE tunnel - Co-location cross connect Evil Cloud 13

14 Network Management Architecture for a Service rovider Remote VN NetMgt User \ Vendor AAA NOC Reports Database OSS rovisioning SQL OSS Internet Network Operations - Target - Leverage Intel from exploited - Exploit trust relationship to NOC - ivot NOC to,,, VN s - ivot to Internal, ITV, VoI, Internet\BG, Vendors,Transport Cust -1 Cust-2 Cust-1 Cust-2 SNM Agent Alarms, Traps, Reports, Backup I DWDM MLS CORE NMS, EMS, MOM Servers TL1 Gateway (TL1 to/from SNM) TL1 Configuration rovisioning, Control, Software Download OSS Cust-2 Cust-1 Cust-1 hysical Access - In-band Mgt - assword recovery - Trust Relationships - SNM, ACL s, Accts - rotocols - AAA, NetMgt I s 14

15 Transit Between MLS-VN backbones acket Capture Inject routes into VN Denial of Service Join VN MITM Cross-connect Inject labeled packets Traffic Engineering Disable I TTL Carrier Backbone 2 running IG and LD -1 Label Label 1 I M-iBG for VN-Iv4 OSF or ISIS LD Data -2 MLS Label\refix Recon - ERSAN - Lawful Intercept Attacker Network Monitoring Infrastructure Carrier Backbone 1 running IG and LD -1 OSF or ISIS LD Label I 1 L2 IX Data M-eBG for VN-Iv4 M-eBG for VN-Iv4 OSF or ISIS LD Label I 2 Carrier Backbone 3 running IG and LD Data L2 IX M-iBG for VN-Iv4 -ASBR1 -ASBR2 M-iBG for VN-Iv4-2 I Data I Data -1 If BG is being hijacked why not MLS? BG Transport ath Redirected Using MLS TE? -2 15

16 BG Route Monitoring Monitor Your I refixes Monitor Your Business artner I refixes Monitor Industry eers for Intel to redict Future Attack 16

17 MLS Security Recommendations Monitor for New Unexpected Route Advertisements Know Your Network! Utilize Encryption over MLS VN Links; S - ISEC Whitelist the Network Trust Relationships including Routing rotocols Whitelist Trusted Information Flows in Monitoring Utilize Separate VRF for In-band Management Dedicated Out-of-band Network Management with Un-attributable Internet I for VN AAA with separation of roles and responsibilities for operations and security monitoring Configuration Management and Monitoring Log all changes!! 2 Factor Authentication! 17

18 References Internet Routing Architectures, Halabi, Cisco ress MLS VN Security, Michael H. Behringer, Monique J. Morrow, Cisco ress IS Essentials, Barry Raveendran Greene, hilip Smith, Cisco ress Router Security Strategies Securing I Network Traffic lanes, Gregg Schudel, David J. Smith, Cisco ress MLS and VN Architectures, Jim Guichard, Ivan apelnjak, Cisco ress MLS Configuration on Cisco IOS Software, Lancy Lobo, Umesh Lakshman, Cisco ress Traffic Engineering with MLS, Eric Osborne, Ajay Simha, Cisco ress LAN Switch Security What Hackers Know About Your Switches, Eric Vyncke, Christopher aggen, Cisco ress RFC 2547 RFC 2547bis RFC 2917 RFC 4364 Attack Trees, Bruce Schneier, hrp:// hrp:// hijacking- belarus- iceland/ hrp:// ar- customers- your- facebook- data- went- to- china- and- korea- this- morning/ hrp:// hijacks- youtube- 1/ hrp:// 2011/sample- pcap- files 18

19 19

Defending the Enterprise Against Network Infrastructure Threats. DefCamp 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin

Defending the Enterprise Against Network Infrastructure Threats. DefCamp 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin Defending the Enterprise Against Network Infrastructure Threats DefCamp 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 SNMP Blow Defeat SNMP w/ ACL

More information

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems [email protected]

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems [email protected] Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS

More information

APNIC elearning: Introduction to MPLS

APNIC elearning: Introduction to MPLS 2/5/5 ANIC elearning: Introduction to MLS 3 MAY 25 3: M AEST Brisbane (UTC+) Issue Date: Revision: Introduction resenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security DNS/DNSSEC

More information

Keep it Simple with BGP/MPLS Virtual Private Networks

Keep it Simple with BGP/MPLS Virtual Private Networks White aper Keep it Simple with BG/MLS Virtual rivate Networks Joël Repiquet May 2002 www.lambdanet.net [email protected] Contents 1. Introduction... 3 2. VN Models... 4 2.1. Overlay vs. eer VNs... 4 2.2.

More information

SEC-370. 2001, Cisco Systems, Inc. All rights reserved.

SEC-370. 2001, Cisco Systems, Inc. All rights reserved. SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

More information

Why Is MPLS VPN Security Important?

Why Is MPLS VPN Security Important? MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :

More information

BSides Nashville 2014

BSides Nashville 2014 Bending and Twisting Networks BSides Nashville 2014 Paul Coggin Internetwork Consulting Solutions Architect @PaulCoggin www.dynetics.com V## Goes Here 1 SNMP Blow Defeat SNMP w/ ACL $ snmpblow.pl -s

More information

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin

Exploiting First Hop Protocols to Own the Network. Rocket City TakeDownCon 2015. Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin Exploiting First Hop Protocols to Own the Network Rocket City TakeDownCon 2015 Paul Coggin Senior Principal Cyber Security Analyst @PaulCoggin www.dynetics.com V## Goes Here 1 OSI and TCP/IP Model OSI

More information

BGP Configuration Guide

BGP Configuration Guide Configuration Guide 5991-3730 August 2005 BG Configuration Guide Configuring BG for Access to rivate I Services (BG/MLS VN Networks) This Configuration Guide provides an overview of rivate I Services (BG/MLS

More information

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager [email protected]

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager pgrosset@cisco.com I over MLS Course Number resentation_id 2001, Cisco Systems, Inc. All rights reserved. atrick Grossetete Cisco Systems Cisco IOS I roduct Manager [email protected] 1 Agenda I Migration Approaches enabled

More information

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks An ADTRAN White aper rivate I Service BG/MLS VN Networks rivate I Service BG/MLS VN Networks U ntil the advent of business communications over the Internet, a clear distinction between private and public

More information

MPLS Security Considerations

MPLS Security Considerations MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004 MPLS JAPAN 2004 1 Acknowledgments Michael Behringer, Cisco Systems 2 Why is MPLS Security Important? Customer

More information

Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman

Managing MPLS Networks. Oleg Kupershmidt and Joel Kaufman Managing MLS Networks Oleg Kupershmidt and Joel Kaufman Terms of This resentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change

More information

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet. HughesNet and MLS This white paper addresses how it is possible to seamlessly integrate MLS and HughesNet. The first sections contain a basic introduction to MLS and the required scenarios in which the

More information

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: [email protected]

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. E-mail: Kapil.Kumar@relianceinfo.com RA-MPLS VPN Services Kapil Kumar Network Planning & Engineering Data E-mail: [email protected] Agenda Introduction Why RA MPLS VPNs? Overview of RA MPLS VPNs Architecture for RA MPLS VPNs Typical

More information

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1 About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!!

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

MPLS VPN Security BRKSEC-2145

MPLS VPN Security BRKSEC-2145 MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

- Multiprotocol Label Switching -

- Multiprotocol Label Switching - 1 - Multiprotocol Label Switching - Multiprotocol Label Switching Multiprotocol Label Switching (MPLS) is a Layer-2 switching technology. MPLS-enabled routers apply numerical labels to packets, and can

More information

Brocade to Cisco Comparisons

Brocade to Cisco Comparisons 1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade

More information

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

the about MPLS security

the about MPLS security uth 22 the about truth MPLS security 11 MPLS is private. MPLS is a shared service! We use a private network is often stated as the reason for not protecting data as it travels over 3rd party networks.

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009 MikroTik RouterOS Introduction to MPLS Prague MUM Czech Republic 2009 Q : W h y h a v e n 't y o u h e a r d a b o u t M P LS b e fo re? A: Probably because of the availability and/or price range Q : W

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

Introduction to Carrier Ethernet VPNs: Understanding the Alternatives WHITE AR Introduction to Carrier Ethernet VNs: Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. WHITE AR - Introduction to Carrier Ethernet VNs: Understanding the Alternatives Table

More information

MPLS VPN Security in Service Provider Networks

MPLS VPN Security in Service Provider Networks MPLS VPN Security in Service Provider Networks Michael H. Behringer 1 HOUSEKEEPING We value your feedback, don t forget to complete your online session evaluations after each session and complete the Overall

More information

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0 Introduction...2 Overview...2 1. Technology Background...2 2. MPLS PNT Offer Models...3

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP belka@att.net Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those

More information

MPLS and IPSec A Misunderstood Relationship

MPLS and IPSec A Misunderstood Relationship # 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

DRO-210i LOAD BALANCING ROUTER. Review Package Contents DRO-210i LOAD BALANCING ROUTER Review Package Contents Make sure that the package contains the following items. DRO-210i Load Balancing Router 2 Straight Ethernet Cables 1 Cross Over Ethernet Cable 1 Power

More information

Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW)

Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW) Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW) Course Number: 642 825 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP

More information

Opengear Technical Note

Opengear Technical Note - Solutions for Avaya Installations Opengear Technical Note Jared Mallett - Product Marketing Manager Opengear solutions deliver cost-effective universal access to Avaya equipment and converged devices

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

MPLS Concepts. Overview. Objectives

MPLS Concepts. Overview. Objectives MPLS Concepts Overview This module explains the features of Multi-protocol Label Switching (MPLS) compared to traditional ATM and hop-by-hop IP routing. MPLS concepts and terminology as well as MPLS label

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

Cisco Router and Security Device Manager (SDM)

Cisco Router and Security Device Manager (SDM) Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and

More information

MPLS Traffic Engineering in ISP Network

MPLS Traffic Engineering in ISP Network MPLS Traffic Engineering in ISP Network Mohsin Khan Birmingham City University, England ABSTRACT Multi Protocol Label Switching (MPLS) is an innovative and vibrant technology. The most famous applications

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

MPLS Virtual Private Network (VPN) Security

MPLS Virtual Private Network (VPN) Security MPLS Virtual Private Network () Security An MFA Forum Sponsored Tutorial Monique Morrow MFA Forum Ambassador CTO Consulting Engineer Cisco Systems Slide 1 MPLS Security - Agenda Analysis of the Architecture

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

CCNP: Implementing Secure Converged Wide-area Networks

CCNP: Implementing Secure Converged Wide-area Networks CCNP: Implementing Secure Converged Wide-area Networks Cisco Networking Academy Version 5.0 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

November 2013. Defining the Value of MPLS VPNs

November 2013. Defining the Value of MPLS VPNs November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do

More information

Designing and Developing Scalable IP Networks

Designing and Developing Scalable IP Networks Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S& Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013)

PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013) PRI (T1/E1) Call Recorder User Manual Rev 1.0 (December 2013) 1. Call Recording Architecture Overview PRI Call recording solution consists of two major components: Passive T1/E1 Tap Adapter and server

More information

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15 Cain & Abel v 2.5 Password Cracking Via ARP Cache Poisoning Attacks v.1 2004 Page 1 of 15 Objective: At the end of this lab students will be able to use the password auditing and ARP Poison Routing (APR)

More information

Penetration Testing: Advanced Oracle Exploitation Page 1

Penetration Testing: Advanced Oracle Exploitation Page 1 Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»

More information

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

Third Party Network Management Standard Best practice

Third Party Network Management Standard Best practice Third Party Network Management Standard Best practice Issue 1.0 Date: 27/04/2016 Author: BT Security, 3rd Party Security Team SEC/STD/BP003 Contents 1 Introduction... 3 1.1 General... 3 1.2 Objectives...

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

www.pwc.com Network Security Auditing April 2015

www.pwc.com Network Security Auditing April 2015 www.pwc.com Network Security Auditing Agenda Objectives Concepts Definitions Key Review Areas Architecture Assessment Types Nipper Overview Firewall Configuration Review Case Study AlgoSec Overview Firewall

More information

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554)

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security (640-554) CCNA Security Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNA Security network'ün temellerini anlamış olan katılımcılara network güvenliği hakkında temel bilgi sağlamaya yönelik hazırlanmış

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Hijacking the Cloud: Systematic Risk in Datacenter Management Networks

Hijacking the Cloud: Systematic Risk in Datacenter Management Networks Hijacking the Cloud: Systematic Risk in Datacenter Management Networks SESSION ID: CSV-W04A Michael Cotton Chief Security Architect Digital Defense Inc. @mcotton256 Out of Band Vectors Renewed Focus in

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information