Security in LTE backhauling
|
|
|
- Magnus Morgan
- 10 years ago
- Views:
Transcription
1 A White Paper by the NGMN Alliance Security in LTE backhauling next generation mobile networks
2 Security in LTE backhauling by NGMN Alliance Version: 1.0 Final Date: 29 February 2012 Document Type: Confidentiality Class: Authorised Recipients: Final Deliverable (approved) P Public N/A Project: P-OSB: Optimised Backhaul Editor / Submitter: Miguel Angel Alvarez, Frederic Jounay, Paolo Volpato Contributors: Approved by / Date: NGMN Optimized Backhaul Project Group NGMN Board 29 February 2012 For all Confidential documents (CN, CL, CR): This document contains information that is confidential and proprietary to NGMN Ltd. The information may not be used, disclosed or reproduced without the prior written authorisation of NGMN Ltd., and those so authorised may only use this information for the purpose consistent with the authorisation. For Public documents (P): 2012 Next Generation Mobile Networks Ltd. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written permission from NGMN Ltd. The information contained in this document represents the current view held by NGMN Ltd. on the issues discussed as of the date of publication. This document is provided as is with no warranties whatsoever including any warranty of merchantability, non-infringement, or fitness for any particular purpose. All liability (including liability for infringement of any property rights) relating to the use of information in this document is disclaimed. No license, express or implied, to any intellectual property rights are granted herein. This document is distributed for informational purposes only and is subject to change without notice. Readers should not design products based
3 Abstract The adoption of packet based architecture for the LTE backhaul has brought to an increased attention to security matters, often considered as critical issues to be addressed for the deployment of LTE networks. This paper is an NGMN informative contribution on the subject and aims to provide a common terminology and some high-level scenarios to introduce to Industry a few possible implementations for security in LTE backhauling. The attention has been put on the ways to assemble security mechanisms in a few scenarios suitable to address the security requirements of an LTE network. The per interface approach has been adopted to analyze every scenario presented. The term per interface refers to LTE interfaces (S1, X2), the core of this analysis, and the approach undertaken considers what happens to every LTE interface when crossing some defined points in the backhaul network. This is covered in chapter 5 The scenarios described in chapter 6 do not aim to be exhaustive; they should be taken as high level guidelines for Operators to define their own requirements and to what degree of security they are looking at. To this extent, an overview of the meaning of trusted versus un-trusted networks is also given. Security in LTE backhauling, Version 1.0, page 2
4 Table of Contents 1. Introduction Definitions and abbreviations References Scope of the work ITU-T X.800 series recommendations... 5 Approach taken... 5 Trusted and un-trusted networks LTE backhauling security Architecture and security points... 8 LTE flows... 9 Threats Per interface application of threats to security points Security areas Security scenarios Scenario 1: Trusted domain Pros & Cons Scenario 2: IPsec for control plane Pros & Cons Scenario 3: IPsec for all telecom flows (Control Plane, User Plane) Pros & Cons The position of SecGW OAM security Other Requirements Security on synchronization plane Conclusion Security in LTE backhauling, Version 1.0, page 3
5 1. Introduction Scope of this paper is to present some alternative security architectures (scenarios) to be considered in LTE backhauling. The content of this paper is informative; nevertheless some functions or mechanisms needed for the good implementation or operation of a network are addressed. As such sometimes the term requirement is used to indicate a functional or logical element to be evaluated when dealing with an end-to-end security architecture in backhauling. This paper has been developed under the NGMN TWG P11 - P-OSB scope and relates to the other papers already published by the same workgroup. 2. Definitions and abbreviations Abis Logical interface between 2G BTS and BSC PHB Per Hop Behaviour ATM Asynchronous Transfer Mode PDH Plesiochronous Digital Hierarchy BGP Border Gateway Protocol POS Packet Over Sonet CAC Call Admission Control PPP Point to Point Protocol CE Customer Edge QoS Quality of Service CPE Customer Premises Equipment S1 Logical interface between LTE BTS and packet core CSG Cell Site Gateway SDH Synchronous Digital Hierarchy DSCP Differentiated Service Code Point SecGW Security Gateway EPC Evolved Packet Core SGSN Serving GPRS Support Nodes GGSN Gateway GPRS Support Node S-GW Serving Gateway GPRS General Packet Radio Service TDM Time division Multiplex GW Gateway TE Traffic Engineering HSPA High Speed Packet Access UMTS Universal Mobile Telecommunication Service Iub Logical interface between 3G BTS and RNC VC Virtual Circuit LSP Label Switched Path VLAN Virtual LAN LTE Long Term Evolution VPLS Virtual Private LAN Service MPLS Multi Protocol Label Switching VPN Virtual Private Network MASG Mobile Aggregation Site Gateway VRF Virtual Routing and Forwarding OSPF Open Shortest Path First VSI Virtual Switching Instance P Provider (Router) X2 Logical interface between LTE BTS PE Provider Edge (Router) 3. References 1. NGMN Alliance, Next Generation Mobile Networks Beyond HSPA & EVDO A white paper, V3.0, December 2006 [available at 2. NGMN Alliance, Next Generation Mobile Networks Optimized Backhaul Requirements, August 14th, 2008 [available at 3. NGMN Alliance, LTE backhauling deployment scenarios, paper under publication 4. ITU-T X.800, Security architecture for Open Systems Interconnection for CCITT applications, March ITU-T X.805, Security architecture for systems providing end-to-end communications, October GPP TS : "3G security; Security architecture", March GPP TS : "3G security; Network Domain Security (NDS); IP network layer security", June GPP TS : "Network Domain Security (NDS); Authentication Framework (AF)", June GPP TR , 3GPP System Architecture Evolution (SAE); Security architecture, 10. IETF RFC 4303, "IP Encapsulating Security Payload (ESP)", December 2005 Security in LTE backhauling, Version 1.0, page 4
6 4. Scope of the work Compared to the second and third generation of mobile services (2G/3G), the LTE security requires a different system protection. The adoption of a packet-based architecture for the LTE backhaul network, the sometimes recognized lack of expertise when handling packet networks in contrast to circuit switched networks, this even worsened by a widespread know-how on attack methods and availability of hacking tools have found an answer in the work done by 3GPP in some relevant technical specifications, such as the TR [9] and related documents. TR and the related documents define the security architecture for LTE as well as the set of features and mechanisms to be implemented in the different network and service domains to obtain a level of security suitable for the support of the control and data plane of LTE by a backhaul network. As an example the LTE flat architecture moves some functions previously in the controller (BSC and RNC respectively) directly into the enodeb, exposing the service and the underlying packet backhaul network to potential security threats. Unlike in traditional radio networks which had their own physical infrastructure, this is particularly perceived as an issue when a shared network infrastructure is employed, for example in case of coexistence of fixed and mobile services on the same packet network. Moreover, the presence of the X2 interface, that supports direct handover among the vicinity enodebs, involves stronger security requirements on the nodes. Scope of this work is to discuss the security deployments in an LTE backhaul network and propose some guidelines for the implementation of a security architecture compliant with the backhaul scenarios defined in other NGMN papers, specifically [3]. After discussing, in chapter 5, how the analysis on LTE backhaul security has been performed and the resulting requirements, chapter 6 introduces some architectures that operators might consider for their own implementation of security. Chapter 7 also provides an high-level description security for OAM ITU-T X.800 series recommendations To address the need of having a common security related terminology, the ITU-T recommendations belonging to the X.800 family, and in particular X.805, have been extensively referenced throughout this paper. They have been specifically used to group the requirements into security areas, define the security threats, and map for every area and possible threats some security mechanisms. Please refer to [4] and [5] for the classification and terminology used Approach taken Among the several available methods to define and assess the LTE backhaul security architecture the current analysis took the per interface approach. Every LTE flow/interface (S1, X2) has been matched against the security requirements at every point into the backhaul network, as explained later. Security in LTE backhauling, Version 1.0, page 5
7 For each of the architectures presented in chapter 3 a table summarizes the degree of fulfilment of the security requirements, as defined by ITU-T X.805 and the mechanisms that could be implemented to obtain that level of security Trusted and un-trusted networks One of the basic questions to answer before evaluating what architecture is most suitable for a backhaul network is whether that network is considered trusted or un-trusted. This is key since, as stated by 3GPP in [9], for an un-trusted network it is mandatory to implement an increased layer of security than in trusted environments. Trusted (or un-trusted) networks can be defined in many different ways. One possible definition is based on criteria related to the property or control of physical site locations, owing of the network, operation managed by a single administrative authority, but more remains (e.g. what degree of network security one operator wants to reach, assessment to define the cost to reach it, etc.). As a start point to support operators to evaluate how trusted their network is, a very high-level decision tree is proposed, without pretending of being exhaustive. Site security One authority domain YES NO One authority domain YES NO YES NO Operator s Trust? decision on other? Untrust parameters Figure 1 Decision tree for a trusted / un-trusted network based on physical aspects An high level decision strategy might start from the physical security of a site (cell site, central office), including the ownership and/or a tight control of it (access, policies, etc.). A second step considers whether a single organization manages the network, or, put in different terms, the network can be organized as a single domain. If the two previous questions give a positive answer then it is likely that a network can be considered trusted. On the opposite, two negative answers might lead to an un-trusted network, not compliant with the two criteria of physical/logical security. Security in LTE backhauling, Version 1.0, page 6
8 In between there is a grey area where the definition of trusted or un-trusted network might depend on other parameters, ranging from the operator s attitude to deal with network security, market requirements or law enforcement policies, and a cost versus benefit assessment. In any case it is recognized that beyond the physical security aspects for any deployment it would be necessary to run a dedicated assessment to assess risk, identify the mitigation needs, plan and deploy controls and accept the residual risk. Security in LTE backhauling, Version 1.0, page 7
9 5. LTE backhauling security 3GPP has extensively analyzed the security for LTE services across an entire set of specifications (see as an example [6], [7], [8], [9]). Specifically [9] details the features that should be applied into every single function or service stratum to obtain a full-fledged security implementations. Whilst 3GPP mandates the implementation of those features into a backhaul network, considered in general as a non-secure connectivity medium, Operators have the freedom either to enable the features referenced by the specifications or leave them disabled. Depending on the willingness of Operators to enable such features, their attitude and many other factors, several security architectures can be found in backhauling, each with advantages and disadvantages. To assess the degree of security of some possible implementations scenarios, this work starts analyzing the impact of security threats over the LTE traffic at the main backhauling interfaces, to detect which are the most suitable mechanisms to mitigate or block a possible attack Architecture and security points The general description of the LTE backhauling architecture has been detailed in [3]. For sake of clarity, the same diagram is referenced here with the addition of the points (network elements or connections) where backhaul security is analyzed. Domain of analysis N P O Q enb R HSS enb Wireless Wireless MME Aggregation Core enb Wireline Wireline SGW First mile enb Second mile Access Aggregation A B C D E F1/F2 G H1/H2 I J K L M N Figure 2 Network points considered in the analysis The security points are listed and explained in the following table. Security in LTE backhauling, Version 1.0, page 8
10 Interface Network point Comments A User equipment Delivery of service to user Out of scope B Radio access link Radio access and transport Out of scope C enb Point of ingress to the network and service Out of scope D MEF UNI (enb Demarcation node link) Transit of Ethernet frames E Demarcation node Switching/routing of traffic F1 Wireless (microwave) first mile Transit of Ethernet frames (on air, often scrambled and/or proprietary format) F2 Wireline (fiber, copper) first mile Transit of Ethernet frames G Packet node Switching/routing of traffic H1/H2 Second mile - See F1/F2 As F1/F2 I Packet node Switching/routing of traffic J Aggregation network Ethernet transport K MASG Switching/routing of traffic L Core Any transport technology Out of scope M Controller Service control and handling Out of scope N OAM Log alarms and events, SW distribution, configuration parameters Out of scope O DHCP Server IP address Out of scope P Sync Master Network clock Out of scope Q Radius server Authentication server Out of scope R HSS Subscriber data, authentication vectors Out of scope Table 1 List of network points 5.2. LTE flows The per flow is the approach taken to analyze the backhaul security; it follows the previous statement of 3GPP and considers the impact, in the security domain, of every LTE flows when they cross some defined points into the backhaul network, as shown in the next paragraph. The key LTE interfaces considered are listed in the following table. Security in LTE backhauling, Version 1.0, page 9
11 Interface Scope Detail S1-U S1 User data Defines the user plane between enb and Serving GateWays S1-C S1 Control pane Used for signaling between the enb and the MME X2-U X2 User data Data plane distributed among enbs X2-C X2 Control plane Supports inter-enb handoff with no packet loss OAM Management plane Management traffic exchanged with network elements belonging to backhauling Table 2 List of interfaces 5.3. Threats There are many standards and documents that describe the attacks and risks in telecommunications networks. As mentioned earlier, this paper uses the security framework defined by the ITU-T X.800/X.805 recommendations. The ITU-T X.800 threats model is summarized in the table below. Threats Description Graphical representation Destruction Destruction of information and/or network resource (DoS Denialof-Service) Corruption/Modification Unauthorized tampering with an asset Removal Theft, removal or loss of information and other resource Disclosure/Interception Unauthorized access to an asset (eavesdropping) Interruption Network becomes unavailable or unusable Table 3 - Threats model Security in LTE backhauling, Version 1.0, page 10
12 The focus of the threats analysis is on intentional attacks and in particular: Insider attacks - abuse of administrator rights (enb/csg access) External attacks via networks from Internet or other PDN, from GPRS roaming exchange or other PLMN, from an external transport network or external non-3gpp access network; External attacks on physical access to the network on the radio interfaces, tampering with easily accessible devices (e.g. small cells), unauthorized physical access to network ports; Attacks from mobiles Per interface application of threats to security points Matching the threats defined in the previous paragraph with the LTE flows crossing the network points shown in Figure 2, we obtain a first result described into the next table. Network point S1-U S1-C OAM X2-U X2-C D hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, eavesdropping, destruction Spoofing of enb identity, enb impersonation, eavesdropping of management activities, management intrusion hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, destruction E Unauthorized access, loss of accountability of control plane activities Unauthorized access to CSG, impact on traffic steering, DoS attacks against node manageability, unauthorized modification of configuration data, loss of configuration data and accountability of management activities Traffic hijacking, if X2 routed/switched here Traffic hijacking, if X2 routed/switched here F1/F2 hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, eavesdropping, destruction Spoofing of enb identity, enb impersonation, eavesdropping of management activities, management intrusion hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, destruction G Unauthorized access, loss of accountability of control plane activities As point E, loss of configuration data and accountability of management activities Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service Security in LTE backhauling, Version 1.0, page 11
13 H1/H2 hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, eavesdropping, destruction Spoofing of enb identity, enb impersonation, eavesdropping of management activities, management intrusion hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, destruction I Unauthorized access, loss of accountability of control plane activities See E,, loss of configuration data and accountability of management activities Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service J hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, eavesdropping, destruction Spoofing of enb identity, enb impersonation, eavesdropping of management activities, management intrusion hijacking, eavesdropping, destruction hijacking, inject wrong/false control data, destruction K Unauthorized access, loss of accountability of control plane activities Table 4 List of threats per network point See E, loss of configuration data and accountability of management activities Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service Depending on topology and backhauling scenarios X2 steering might be impacted, denial of service In general, the closer the potential attack is to the core network, the less physical access methods are required. In other words physical access methods are more involved to deal with potential attacks brought from positions close to enbs. This is a security focus for LTE features. The operator shall also manage security backhauling networks form networks point of view. All access point shall have sufficient security rule to insure backhauling security. Security in LTE backhauling, Version 1.0, page 12
14 5.5. Security areas Security services can be grouped, according to ITU-T X.800/X.805, into a few categories whose scope is described in the next table. Area Authentication Access Control Traffic confidentiality and integrity Replay Protection Availability Accountability Communication security Privacy Table 5 Security areas Description This area provides for the authentication of a communicating peer entity and the source of data This service provides protection against unauthorized use of resources Data cannot be read by unauthorized parties or modified during transit Data should not delivered multiple times, out of order Avoid impacts over services, network elements and application due to (un)intentional reason such injection of false traffic, attacks, spoofing, (D)DoS Prevent ability to deny that an activity on the network occurred Ensure information only flows from source to destination Ensure identification and the network usage is kept private The possibility of addressing one or more of the eight security areas defined in the previous table depends on what security mechanisms are available in a network. Literature often groups the security methods in nine major categories, as shown in the columns of the next table. The table aims at matching the security mechanisms with the areas described before. If an operator wishes to address one security area, then one or more security mechanisms have to be selected, to obtain the implementation of the proper counter-measures to the threats listed in paragraph 5.4. The green cells in the table highlight that for addressing the service in one of the eight rows the security mechanisms belonging to one of the nine categories need to be enabled. For sake of clarity some examples, not exhaustive, of security mechanisms are listed into the green cells. Security in LTE backhauling, Version 1.0, page 13
15 Service/ mechanism Ciphering Digital signature ACL Data Integrity Authentication exchange Traffic padding Routing control Notarization Recovery Authentication DSA, RSA MAC PKI, X.509, Radius Access control VLAN ID, MAC addr. Confidentiality AES, 3DES, A5/3 Many encyph. algorithms VLAN, VRF Data integrity Asymmetric encyph. SHA1, SHA 256 Privacy IPsec Many encyph. algorithms VLAN, VRF Availability IPsec PKI, X.509, Radius Redundancy, backup, alarms Communication security IPsec, SSH VLAN, VRF Accountability DSA, RSA, ElGamal IPsec LOG activity Table 6 Examples of security mechanisms per area 1. The common term to indicate this function is ciphering (which also includes deciphering ). The name encipherment has been also maintained in this paper as it is referenced by ITU-T X.800 [4] As an example, if one operator needs to enable the authentication of the network elements part of the backhauling, then some mechanisms belonging to the Digital signature, Data integrity or Authentication exchange have to be enabled. From an implementation point of view, this corresponds to the usage of one or more mechanisms often related to the IPsec framework: algorithms for digital signature (i.e. DSA, RSA), for data integrity (e.g. MAC), certificate-based methods, etc. This table will be applied in the next chapter when dealing with network scenarios. For every scenario, some examples of security mechanisms will be examined and explained. Security in LTE backhauling, Version 1.0, page 14
16 6. Security scenarios The scenarios presented in this chapter aim at highlighting different ways to combine the security mechanisms introduced in the previous section to obtain a secure LTE backhauling. Three high-level scenarios are introduced: - A first scenario tries to answer to the necessity of a light security implementation, meaning without IPsec, leveraging on mechanisms already available in packet networks - The second presents IPsec for protecting the LTE control traffic (S1-C, X2-C), often considered as the most sensible for the service continuity - The third analyzes a full IPsec protection, both for control and user traffics. One point that will be discussed is the position of the Security Gateway (SecGW) applied to the topologies described in [3] Scenario 1: Trusted domain The key characteristic of this scenario is the absence of IPsec. This scenario might be considered by Operators perceiving their backhaul network as trusted. There may exist several motivations for that. One example, based on the decision tree presented in paragraph 4.3, is given by an operator who relies on the physical aspects of security (e.g. entirely owns the backhaul infrastructure and relies on tight control policies to access sites). Another example could be represented by operators who are not willing to handle extra operation due to the introduction of a security layer or that, after performing a risk assessment, determine the risk reduction that could be achieved by introducing IPsec does not justify the associated expenses. Also, this scenario might be considered for first LTE deployments provided that one operator is aware of the implications for enabling a security architecture afterwards, as pointes out in the pros/cons discussion. The scenario is shown in the next picture. Security in LTE backhauling, Version 1.0, page 15
17 Figure 3: Scenario 1 logical architecture Transport of LTE flows relies on the same mechanisms and architectures shown in [3]. In the example above a VLAN is considered to carry the Telecom bundle, but the case could be generalized for pseudowires, L2 or L3 VPNs. Security should focus on: Requirements against physical access; Restricted access, strong authentication. Even if not widely implemented, some techniques for supporting ciphering/integrity at L2 could be enabled (e.g AE MACsec for authentication and confidentiality of each packet exchanged link by link). Those solutions are not commonly found in deployed networks. The next picture highlights the degree of security reachable by this scenario and shows some of the mechanisms that can be enabled to achieve it. It is worth noting that without encryption or digital signatures techniques the services of authentication or confidentiality cannot be fulfilled (reason why the corresponding cells are filled with solid yellow, as a reminder for attention). Security in LTE backhauling, Version 1.0, page 16
18 Service/ mechanism Ciphering Digital signature ACL Data Integrity Authentication exchange Traffic padding Routing control Notarization Recovery Authentication Radius, password, smartcard (2) Access control VLAN ID, Confidentiality Many encyph. algorithms VLAN, VRF, PW, firewall Data integrity Privacy Many encyph. algorithms VLAN, VRF, PW firewall Availability Radius, password, smartcard (2) IDS/IPS, backup, alarms Communication security VLAN, VRF, PW, firewall Accountability LOG activity Table 7 Degree of security of scenario 1 and available mechanisms 1. Security not applicable, unless mechanisms different from IPsec are enabled (e.g. MACsec protocol) 2. Smartcards are included as an example for the storage of a certificate Pros & Cons The simplest advantage is that no operational burden is imposed by a security layer. IPsec is sometimes perceived as impacting the network (extra processing requested to enbs, extra overhead in transmission, etc.) leading, in ultimate analysis, to an extra cost. The usage of standard security mechanisms (i.e. ACLs, Firewalls, etc.) falls within the average skill of network operation teams. It is a scenario that perfectly fits any network topology, and does not require the planning of a detailed addressing (i.e. one IP address is associated to the transport pipe). On the other hand, the missing security features might have to be compensated at the service/application layer. The bottom line is that both the control and data traffic flows are neither encrypted nor integrity protected, so in theory exposed to any form of listening and/or modification, particularly important for signaling. Unless the elements of backhauling are strongly controlled, some attacks from within the network are possible. Security in LTE backhauling, Version 1.0, page 17
19 Another issue could be the adoption, in a second step, of some form of security as explained by the next scenarios; this might force the operator to considering a re-planning of the LTE flows transport. The adoption of L2 mechanisms still does not completely solve the problem. Protection is provided on the link only, traffic is still vulnerable while being processed in network nodes. Also, the hop-byhop security realized through them requires authentication credentials to be deployed and managed in every packet node Scenario 2: IPsec for control plane In this case IPsec is enabled for protecting the LTE control traffic. It might be considered by Operators with self-built backhauling or with enbs in areas secure enough to let Operators just encrypt the signaling traffic. As such the S1-C and X2-C flows are based on IPsec-ESP (encryption and integrity control, tunnel mode), whilst S1-U and X2-U remain based on the transport technology chosen for backhauling (as per [3]). Two different variants of this scenario can be considered. In the first case one VLAN only is used to carry both the encrypted control traffic and the unencrypted user traffic. In the second case two transport constructs are needed, to differentiate control from data traffic (VLANs, PWs, or any other solution based on a mix of L2 and L3 VPNs). The next picture shows the latter case, as it can be considered as an extension of the former. Security in LTE backhauling, Version 1.0, page 18
20 Figure 4: Scenario 2 logical architecture This scenario could implement the same security mechanisms of the previous one (e.g. the demarcation node at the cell site may act as PAE, supporting 802.1x). It has to be noted however that this scenario enables the security level described in [8]: the enb is authenticated to/by the MME. In other terms a tunnel is established from the enb and the MME, to cope with the requirements of authentication and confidentiality. In doing that both S1-C and X2-C are carried within an IPsec tunnel, characterized by the Encapsulating Security Payload (ESP) mode [10] and profiled following 3GPP specifications [7], [8], [9]. Also, [8] further profiles a certificate based network authentication based on a public key exchange. The typical deployment then sees the presence of a Security Gateway (SecGW) in front of the Evolved Packet Core (EPC). As a result, the next table shows the security level obtainable through this scenario. The usage of several mechanisms belonging to the IPsec framework raised the level of security, yet the lack of data integrity, authentication and encryption for the user plane has the consequence of having some cells half-colored. Security in LTE backhauling, Version 1.0, page 19
21 Service/ mechanism Ciphering Digital signature ACL Data Integrity Authentication exchange Traffic padding Routing control Notarization Recovery Authentication DSA, RSA MAC Radius, password, smartcard (2) Access control VLAN ID, Confidentiality AES, 3DES, A5/3 Many encyph. algorithms VLAN, VRF, PW, firewall Data integrity Asymmetric encyph. SHA1, SHA 256 Privacy IPsec Many encyph. algorithms VLAN, VRF, PW firewall Availability IPsec Radius, password, smartcard (2) IDS/IPS, backup, alarms Communication security IPsec, SSH VLAN, VRF, PW, firewall Accountability DSA, RSA, ElGamal IPsec LOG activity Table 8 - Degree of security of scenario 2 and available mechanisms 1. IPsec framework is applied only on control plane 2. Smartcards are included as an example for the storage of a certificate Pros & Cons The main advantage is clearly the protection offered to the control traffic, at a price of some limited overhead and performance impact. Also, it offers an easy path to eventually include S1-U and X2-U into the IPsec tunnel (Tunnel mode) 1. There is, probably, one major drawback related to the topology that could be chosen to support this scenario. enbs communicate directly to the SGW (the address plan is visible from backhauling, so in theory more exposed and require hub and spoke topologies), whilst SecGW will be the check point to reach MME. For X2-U, this has to be steered up to the first Transport node allowing local switching/routing. The SecGW assume also check point and manage the control plane connectivity between neighbour enodebs. The SecGW position shall be compatible with maximal latency supported by X2-C. 1 3GPP used IPSec Tunnel Mode to protect IP interface. Security in LTE backhauling, Version 1.0, page 20
22 6.3. Scenario 3: IPsec for all telecom flows (Control Plane, User Plane) The last scenario could be adopted by those Operators that want to extend the same security features of the previous one also to the data plane. One example is represented by mobile Operators that lease backhaul resources from other carriers or consider everything as un-trusted. The control traffic is then transported as in scenario 2, with S1-C and X2-C based on IPsec-ESP in tunnel mode (to support both encryption and integrity). S1-U and X2-U are based on IPsec as well, with the only difference that might be with or without integrity protection. This latter case is just for the support of authentication and confidentiality. Figure 5: Scenario 3 logical architecture The most notable difference with the previous scenario is IPsec used to carry the data plane. The picture shows two IPsec tunnels, but this is left to the Operator s decision (one tunnel may suffice). As a result, the next table shows the level of fulfilment of the security requirements. Security in LTE backhauling, Version 1.0, page 21
23 Service/ mechanism Ciphering Digital signature ACL Data Integrity Authentication exchange Traffic padding Routing control Notarization Recovery Authentication DSA, RSA MAC PKI, X.509, Radius smartcard (2) Access control VLAN ID, Confidentiality AES, 3DES, A5/3 Many encyph. algorithms VLAN, VRF, PW, firewall Data integrity Asymmetric encyph. SHA1, SHA 256 Privacy IPsec Many encyph. algorithms VLAN, VRF, PW, firewall Availability IPsec PKI, X.509, Radius smartcard (2) IDS/IPS, backup, alarms Communication security IPsec, SSH VLAN, VRF, PW, firewall Accountability DSA, RSA, ElGamal IPsec LOG activity Table 9 - Degree of security of scenario 3 and available mechanisms 1. IPsec framework is applied to all planes 2. Smartcards are included as an example for the storage of a certificate Pros & Cons The main advantage is clearly the protection offered to all of the traffic with no distinction. The S1- U interface has the same level of security of S1-C. On the other hand, this scenario has an increased computational impact on enb and imposes a bigger overhead at L1 transmission, bringing to some capacity waste as in the case of microwave links. Depending on the position of the SecGW some impact on switching/routing of X2 could be caused The position of SecGW The Security Gateway (SecGW) comes into play whenever the transport of LTE flows is protected by IPsec. The position SecGW can assume in the network depends on several factors among which: - Topology chosen by Operators for their network infrastructure (L2, L3 or a mix of the two, as shown in [ref. stream #1]); Security in LTE backhauling, Version 1.0, page 22
24 - Network requirements (e.g. scalability, performance, density of cell sites); - Operation constraints (different teams handle different network domains). - Wholesale offer (leased line) Following the definition of backhauling as given by [3], three main positions are suited for SecGW: - Very close to the enb, or at the cell site; - At the point of decoupling between two network domains (for the scope of [ref. stream #1] this could be between the access and the aggregation). This can be considered as a distributed position of SecGW; - In front of the Evolved Packet Core (EPC), or directly connected either to MME or S/P-GW. This could be referred to as a centralized position for SecGW. The first of the three, close to or even at the cell site, can be considered as a case of collapsed backhauling. As it is not likely to be found in the field, this case is not treated here. For the two remaining positions, distributed and centralized, an high level comparison is given in the next table. Pro Con Distributed SecGW Flexibility in adapting to the underlying network domains topology (i.e. point-to-point L2 access, L3 VPN aggregation) Lower latency is achieved for X2 (scenario 3, control and user planes carried in IPsec). Lower latency is achieved for X2 also in scenario 2 (control carried in IPsec), whilst for the user plane the same performance could be achieved by decoupling the SecGW from the transport function (two different network elements) For scenario 2 if two NEs are used for the decoupling mentioned above there could be an increased provisioning and configuration burden Centralized SecGW Less equipment requested (depends on scalability), cost effective solution Increased flexibility when dealing with redundancy. Please note with optical networks, the networks latency is less than 10 ms 2. More flexible in handling scenario 2 Higher latency for X2 in scenario 3 2 Current latency measure is ~10ms for 2250 km and 10 hops Security in LTE backhauling, Version 1.0, page 23
25 The number of SecGWs can be potentially high, depending on factors such as scalability and degree of distribution Increased overall operation Table 10 Distributed versus centralized SecGW Access and aggregation more exposed to threats It is not the intent of this paper to suggest which position should be adopted by SecGW. On a high level basis, it is likely that a centralized approach could be suitable for Operators willing to minimize the effort for operation. One redundant SecGW should be enough for connecting a few hundreds of enbs, if the model based on one IPsec tunnel per site is chosen. If enbs manage more than one IPsec tunnels (e.g. for decoupling every LTE flow), a tunnel providing integrity protection and encryption for the Control Plan and a second tunnel providing encryption only for the User Plan can be foreseen. The usage of two tunnels saves computational processing if compared to the usage of one tunnel only where integrity and encryption are enabled for both planes. It can be reminded that the Control Plan requires less processing than the User Plan. Security in LTE backhauling, Version 1.0, page 24
26 7. OAM security For completeness, this section highlights a security scenario for OAM. This is not directly related to any of the three scenarios presented earlier in this paper, but can be considered common to them. The next picture shows a possible implementation based on two VLANs (they could be collapsed into one), respectively carrying Access Control traffic and Management traffic. Access Aggregation enb enb First mile Second mile Aggregation Core MME SGW EAPoL Radius DHCP OAM enb Demarcation Node Packet node Packet node Flows carried as defined by backhaul architecture (VLAN, PWs, etc. Demarcation node Controller Server Figure 6 OAM example The reason to base OAM on two VLANs comes from a functional split: - A first VLAN may transport the data exchanged for the authentication of an enb and can include the 802.1x support based on EAPOL and Radius/Diameter, plus the DHCP traffic for the address assignment to the same enb; - A second VLAN may be used for management (FCAPS function). OAM security is primarily concerned with accountability and handling of privileges of operators. An example of usage is to limit access to OAM interfaces to what is necessary for an individual user to carry out assigned tasks. The authentication of an enb based on PAE (at the demarcation entity) could be considered anyway as a base level to start with. 3GPP specifies enb authentication is done within IKEv2, through certificates, when initializing the IPsec connectivity [8]. Security in LTE backhauling, Version 1.0, page 25
27 For enb management, only secure protocols could be employed: SNMPv3 (authentication, integrity and encryption packets), SSH or TLS for local or remote access, HTTPS for web interface, Secure FTP for data transfer. It should be noted that the use of TLS and HTTPS requires a PKI and provisioning of X.509 OAM certificates. The support of these protocols is mandated by 3GPP specifications such as [8] and [9]. The scenario could be simplified through the usage of one VLAN only. Also to be noted, IPsec can be used to tunnel OAM packets. Security in LTE backhauling, Version 1.0, page 26
28 8. Other Requirements 8.1. Security on synchronization plane The synchronization features is a main mandatory features for every mobile networks. A loss of synchronisation will have large radio link QoS impact. This may also be applicable for those security mechanisms that rely on the usage of time-stamps (e.g. certificates). As such it needs to be secured. Among the several approaches that can be considered the most likely: - Handling the synchronization traffic in a separate and dedicated VLAN; - Transport this traffic together with the control flows; - Choose to transport synchronization traffic together with the user data; - Bundle synchronization with some OAM traffic Independently from the chosen method, it is worth noting that the synchronization traffic is likely not to be encrypted. This is for two reasons: encryption could impact the overall performance of synchronization protocols such as the IEEE 1588v2 and avoid the operational burden imposed by IPsec when network elements receive a synch packet. Nevertheless, the need for master authentication and data integrity is envisioned. In addition, internal attacks that enable, for instance, to insert delays or cause quality of service degradation, should be avoided. Security in LTE backhauling, Version 1.0, page 27
29 9. Conclusion Defining an end-to-end, integrated security architecture for the LTE backhaul network is not trivial and many different aspects have to be considered. On the technical side a security architecture cannot be disjoint from the logical topology of the backhaul network. On top of that an Operator can choose what security services have to be enabled to reach a satisfactory degree of security. In the end, much of the technical design depends on aspects such as the Operator s expertise in dealing with the concepts presented through the three high-level security scenarios described in chapter 6. Apart from the technical side of the problem, security has to be also tackled from an economic standpoint (cost of the solution, management complexity) and from a performance point of view (match the security architecture with the transport architecture to avoid impairment on some traffic flows). In ultimate analysis the scope of this paper should be to introduce architectures that have be assessed by more detailed cost/benefit analyses that only Operators can run for their own network. Security in LTE backhauling, Version 1.0, page 28
How to secure an LTE-network: Just applying the 3GPP security standards and that's it?
How to secure an LTE-network: Just applying the 3GPP security standards and that's it? Telco Security Day @ Troopers 2012 Peter Schneider Nokia Siemens Networks Research 1 Nokia Siemens Networks 2012 Intro
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks
LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks 1 Nokia Siemens Networks New evolved Networks - new security needs Walled Garden Transport & Protocols
LTE Backhauling Deployment Scenarios
A White Paper by the NGMN Alliance LTE Backhauling Deployment Scenarios next generation mobile networks ngmn LTE backhauling deployment scenarios by NGMN Alliance Version: 1.4.2 FINAL Date: 3 rd July 2011
MPLS and IPSec A Misunderstood Relationship
# 129 TECHNOLOGY WHITE PAPER Page: 1 of 5 MPLS and IPSec A Misunderstood Relationship Jon Ranger, Riverstone Networks ABSTRACT A large quantity of misinformation and misunderstanding exists about the place
MPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Use of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
Secured VPN Models for LTE Backhaul Networks
Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi
Mobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
Mobile network evolution A tutorial presentation
Mobile network evolution A tutorial presentation Andy Sutton Principal Design Consultant - Transport Networks Avren Events, Time and Sync in Telecoms, Dublin, Ireland Tuesday 2 nd November 2010 hello About
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils
Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils 11/09/2012 1 Today s Talk Intro to 4G (LTE) Networks Technical Details Attacks and Testing Defences Conclusions 11/09/2012
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils
Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils 06/11/2012 1 Today s Talk Intro to LTE Networks Technical Details Attacks and Testing Defences Conclusions
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
Timing over Packet. Technical Brief
Technical Brief 02/08 1. Abstract This paper is designed to help operators understand how to deploy Precision Time Protocol (PTP, or IEEE 1588v2) in mobile networks for the purpose of synchronizing base
VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-10-30
Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
LTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
INTRODUCTION TO L2VPNS
INTRODUCTION TO L2VPNS 4 Introduction to Layer 2 and Layer 3 VPN Services CE Layer 3 VPN Link Comprised of IP Traffic Passed Over IP Backbone LEGEND Layer 3 VPN Layer 2 VPN CE CE PE IP Backbone PE CE Layer
Master Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
Securing Next Generation Mobile Networks
White Paper October 2010 Securing Next Generation Mobile Networks Overview As IP based telecom networks are deployed, new security threats facing operators are inevitable. This paper reviews the new mobile
November 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
The Keys for Campus Networking: Integration, Integration, and Integration
The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
THE Evolution of Mobile network and THE role of Network transport. Rodolfo Di Muro, PhD, MBA Programs marketing
THE Evolution of Mobile network and THE role of Network transport Rodolfo Di Muro, PhD, MBA Programs marketing Agenda 1 Mobile network evolution business opportunities 2 The role of the transport network
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
IP/MPLS-Based VPNs Layer-3 vs. Layer-2
Table of Contents 1. Objective... 3 2. Target Audience... 3 3. Pre-Requisites... 3 4. Introduction...3 5. MPLS Layer-3 VPNs... 4 6. MPLS Layer-2 VPNs... 7 6.1. Point-to-Point Connectivity... 8 6.2. Multi-Point
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua 2013.07
Network Access Security in Mobile 4G LTE Huang Zheng Xiong Jiaxi An Sihua 2013.07 Outline Mobile Evolution About LTE Overview of LTE System LTE Network Access Security Conclusion Mobile Evolution Improvements
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED
WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
Multi Protocol Label Switching (MPLS) is a core networking technology that
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
Wireless & Mobile. Working Group
Wireless & Mobile Working Group Table of Contents 1 Executive Summary... 3 2 Mission & Motivation... 3 3 Scope... 3 4 Goals & Non-Goals... 4 5 Deliverables... 5 6 Milestones... 6 7 Example Use Cases Summaries...
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP
Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual
Nokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Mobile. Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks
Mobile Analyzing, Planning and Optimizing Heterogeneous Mobile Access and Core Networks The Features NetWorks Mobile is a tool for analyzing, planning and optimizing the fixed-line part of your (mobile)
ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
Virtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
Building Trusted VPNs with Multi-VRF
Building Trusted VPNs with Introduction Virtual Private Networks (VPNs) have been a key application in networking for a long time. A slew of possible solutions have been proposed over the last several
Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T
White Paper Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T Introduction to Virtual Private LAN Service The Cisco Catalyst 6500/6800 Series Supervisor Engine 2T supports virtual
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks
Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks Outline 1 Next Generation Mobile Networks 2 New Radio Access Network
Addressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
DSL Forum. Working Text WT-101
DSL Forum Working Text WT-101 Revision 1 Migration to Ethernet Based DSL Aggregation For Architecture and Transport Working Group May 2004 Abstract: This working text outlines how an ATM aggregation network
0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV
Best Connections in the Business ProSphere NMS 0DQDJLQJ#0XOWLVHUYLFH#1HWZRUNV Figure 1: Xedge Switches managed by ProSphere NMS 7KH#0XOWLVHUYLFH#&KDOOHQJH Managing diverse protocols, applications and topologies
Service Definition. Internet Service. Introduction. Product Overview. Service Specification
Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS?
WHY CHOOSE COX BUSINESS FOR YOUR COMPANY S NETWORK SERVICE NEEDS? This document provides an overview of the Cox Business portfolio of business networking services and explains why customers should consider
WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. [email protected]
MPLS Layer 3 and Layer 2 VPNs over an IP only Core Rahul Aggarwal Juniper Networks [email protected] Agenda MPLS VPN services and transport technology Motivation for MPLS VPN services over an IP only core
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract
Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
GPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001
The leading edge in networking information White Paper Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM March 30, 2001 Abstract: The purpose of this white paper is to present discussion
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005
MPLS over IP-Tunnels Mark Townsley Distinguished Engineer 21 February 2005 1 MPLS over IP The Basic Idea MPLS Tunnel Label Exp S TTL MPLS VPN Label Exp S TTL MPLS Payload (L3VPN, PWE3, etc) MPLS Tunnel
MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport
MPLS-TP Future Ready. Today Introduction As data traffic started dominating telecom networks, there was a need for transport data networks, as opposed to transport TDM networks. Traditional transport technologies
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Diameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
W H I T E P A P E R. Security Features of the 7705 Service Aggregation Router
W H I T E P A P E R Security Features of the 7705 Service Aggregation Router NOV, 2009 Table of Contents 1 Executive Summary... 3 2 ITU-T x.805 Security Architecture... 4 3 7705 SAR Security Feature Summary...
Leveraging Microwave Packet Radio to Enhance and Extend IP/MPLS Backhaul Application Note
Leveraging Microwave Packet Radio to Enhance and Extend IP/MPLS Backhaul Application Note Abstract Mobile service providers (MSPs) are facing a highly competitive environment in a period of unrelenting
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
SEC-370. 2001, Cisco Systems, Inc. All rights reserved.
SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1 Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
EVALUATING NETWORKING TECHNOLOGIES
WHITE PAPER EVALUATING NETWORKING TECHNOLOGIES CONTENTS EXECUTIVE SUMMARY 01 NETWORKS HAVE CHANGED 02 Origin of VPNS Next-generation VPNS TODAY S CHOICES 04 Layer 3 VPNS Layer 2 VPNS MAKING YOUR DECISION
Connection-oriented Ethernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of Ethernet
Connection-oriented ernet (COE) Combining the Reliability, Performance, and Security of SONET with the Flexibility and Efficiency of ernet Topics Just what is connection-oriented ernet (COE) anyway? Fundamental
MPLS VPN Security BRKSEC-2145
MPLS VPN Security BRKSEC-2145 Session Objective Learn how to secure networks which run MPLS VPNs. 100% network focus! Securing routers & the whole network against DoS and abuse Not discussed: Security
Security of the MPLS Architecture
WHITE PAPER Security of the MPLS Architecture Scope and Introduction Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay (FR) with MPLS-based services. As Multiprotocol
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Architecture Overview NCHU CSE LTE - 1
Architecture Overview NCHU CSE LTE - 1 System Architecture Evolution (SAE) Packet core networks are also evolving to the flat System Architecture Evolution (SAE) architecture. This new architecture optimizes
