Why Is MPLS VPN Security Important?



Similar documents
MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS VPN Security BRKSEC-2145

MPLS VPN Security in Service Provider Networks

MPLS Security Considerations

SEC , Cisco Systems, Inc. All rights reserved.

MPLS Virtual Private Network (VPN) Security

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems

Introduction Inter-AS L3VPN

MPLS VPN Security Best Practice Guidelines

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

BGP-MPLS IP VPN Network Security

For internal circulation of BSNLonly

Security of the MPLS Architecture

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

MPLS Inter-AS VPNs. Configuration on Cisco Devices

MPLS Implementation MPLS VPN

Table of Contents. Cisco Configuring a Basic MPLS VPN

Configuring a Basic MPLS VPN

Introducing Basic MPLS Concepts

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Implementing Cisco MPLS

How Routers Forward Packets

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

MPLS VPN Implementation

MPLS-based Layer 3 VPNs

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

Introduction to MPLS-based VPNs

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

How To Make A Network Secure

- Multiprotocol Label Switching -

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS VPN Route Target Rewrite

Enterprise Network Simulation Using MPLS- BGP

Kingston University London

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Frame Mode MPLS Implementation

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

l.cittadini, m.cola, g.di battista

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

Implementing MPLS VPNs over IP Tunnels

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Cisco Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1

Lab 4.2 Challenge Lab: Implementing MPLS VPNs

Approach to build MPLS VPN using QoS capabilities

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

Provisioning Cable Services

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: Total Questions: 401

Quidway MPLS VPN Solution for Financial Networks

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Methods of interconnecting MPLS Networks

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Fundamentals Multiprotocol Label Switching MPLS III

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Implementing VPN over MPLS

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Cisco Exam Implementing Cisco Service Provider Next-Generation Egde Network Services Version: 7.0 [ Total Questions: 126 ]

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

ANALYSIS OF THREE PUBLICALLY AVAILABLE INTER-AS MPLS L3 VPN IMPLEMENTATIONS. A Thesis by. Abdulhakim Abubaker Abushaala

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Virtual Private Networks. Juha Heinänen Song Networks

Using OSPF in an MPLS VPN Environment

S ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Customized BGP Route Selection Using BGP/MPLS VPNs

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments

Interconnecting Cisco Networking Devices Part 2

Inter-Autonomous Systems for MPLS VPNs

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

RFC 2547bis: BGP/MPLS VPN Fundamentals

Addressing Inter Provider Connections With MPLS-ICI

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

MPLS Multi-Vendor Provisioning. Presented by Brian O Sullivan Director, Product Management Dorado Software October 21, 2003

Designing and Developing Scalable IP Networks

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Layer 3 MPLS VPN Enterprise Consumer Guide Version 2

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

IPv6 over IPv4/MPLS Networks: The 6PE approach

MPLS Concepts. Overview. Objectives

BGP Advanced Features and Enhancements

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv

Transcription:

MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service : Packets from SP are not trusted Perception: Need for firewalls, etc. Customer buys a VPN Service : Packets from SP are trusted Perception: No further security required SP Must Ensure Secure MPLS Operations 2

MPLS VPN Security Agenda Analysis of the Architecture Secure MPLS VPN Design General Best Practices Inter-AS Considerations Summary 3 Analysis of the MPLS VPN Architecture (RFC 4364) 4

The Principle: A Virtual Router Virtual Routing and Forwarding Instance! ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000! interface Serial0/1 ip vrf forwarding Customer_A! Assign Interface to Virtual Router Route Distinguisher: Makes VPN routes unique Export this VRF with community 100:1000 Import routes from other VRFs with community 100:1000 5 General VPN Security Requirements Address Space and Routing Separation Hiding of the MPLS Core Structure Resistance to Attacks Impossibility of VPN Spoofing Working assumption: The core (PE+P) is secure 6

Address Space Separation 64 bits 32 bits Route Distinguisher IPv4 Address VPN IPv4 Address Within the MPLS core all addresses are unique due to the Route Distinguisher 7 Routing Separation Each (sub-) interface is assigned to a VRF Each VRF has a RD (route distinguisher) Routing instance: within one RD -> within one VRF -> Routing Separation (For Inter-AS and CsC architectures, see advanced presentation) 8

2 IP(2) IP(PE; fa1) VRF 2 Hiding of the MPLS Core Structure MPLS core Visible Address Space 1 IP(1) IP(PE; fa0) VRF 1 PE IP(PE; l0) P P P P VRF contains MPLS IPv4 addresses Only peering Interface (on PE) exposed (-> )! -> ACL or unnumbered 9 Resistance to Attacks: Where and How? Where can you attack? How? Address and Routing Separation, thus: Only Attack point: peering PE - Intrusions (telnet, SNMP,, routing protocol) -DoS Secure with ACLs Secure with MD5 See ISP Essentials 10

Label Spoofing PE router expects *IP* packet from Labelled packets will be dropped Thus no spoofing possible 11 Comparison with ATM/FR Address Space Separation Routing Separation Resistance to Attacks Resistance to Label Spoofing Direct - Authentication (Layer 3) ATM/FR Yes Yes Yes Yes Yes MPLS Yes Yes Yes Yes With IPsec 12

Basic RFC 4364 Security: Today s Arguments Can be mis-configured (operation) Routers can have bugs (implementation) PEs can be accessed from Internet, thus intrinsically insecure Floods over Internet can impact VPN traffic True, but same on ATM/FR PEs can be secured, as Internet routers Engineering/QoS 13 Security Relies on Three Pillars Security Architecture/ Algorithm Implementation Operation Break One, and All Security Is Gone! 14

mbehring Address Planes: True Separation! VPN1 Address Space 0.0.0.0 255.255.255.255 VPN2 Address Space 0.0.0.0 255.255.255.255 Several Data Planes: VPNv4 Addr. Control Plane: IPv4 Addr. PE P PE Core Address Space 0.0.0.0 255.255.255.255 PE- Interfaces Belong to VPN; Only Attack Point!! 15 Secure MPLS VPN Design General Security Best Practices 16

Secure MPLS/VPN Core Design 1. Secure each router individually 2. Don t let packets into (!) the core No way to attack core, except through routing, thus: 3. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 4. Design for transit traffic QoS to give VPN priority over Internet Choose correct router for bandwidth Separate PEs where necessary 5. Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks 17 PE- Routing Security In order of security preference: 1. Static: If no dynamic routing required (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. IGPs: If BGP not supported (limited security features) 18

Securing the Core: Infrastructure ACLs Easy with MPLS! PE VPN In MPLS: VRF Belongs to Customer VPN! On PE: deny ip any <PE VRF address space> Exception: routing protocol from host to host Idea: no traffic to PE/P you can t attack Prevents intrusions 100% DoS: very hard, but traffic over router theoretically enables DoS 19 Securing the Core: Infrastructure ACLs.2 1.1.1.0/30.1 PE VPN PE VPN.1 1.1.1.8/30.2.2 1.1.1.4/30.1 PE VPN PE VPN.1 1.1.1.12/30.2 Example: deny ip any 1.1.1.0 0.0.0.255 permit ip any any This Is VPN Address Space, Not Core! Caution: This also blocks packets to the s! Alternatives: List all PE i/f in ACL, or use secondary i/f on, or ACL with dis-contiguous subnet masks (11111101) 20

Neighbor Authentication Router knows his neighbors Verification through shared MD5 secret Verifies updates it receives from neighbor Supported: BGP, ISIS, OSPF, EIGRP, RIPv2, LDP Key chains supported for ISIS, EIGRP, RIP Use them where available Easier key roll-over Config easy 21 VRF Maximum Prefix Number Injection of too many routes: Potential memory overflow Potential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF ip vrf red maximum routes 45 80 Accept Max 45 Prefixes, and Log a Warning at 80% (of 45), 22

Control of Routes from a BGP Peer Injection of too many routes: Potential memory overflow Potential DoS attack Control with maximum prefix command (under the BGP neighbor definition) From This Neighbor Accept Max 45 Prefixes, Then Reset Session router bgp 13 neighbor 140.0.250.2 maximum-prefix 45 80 restart 2 Log a Warning at 80% (of 45), and Restart the BGP Session After Two Min. 23 Control of Routes from a BGP Peer: Logging 6d22h: %BGP-4-MAXPFX: No. of prefix received from 140.0.250.2 (afi 2) reaches 37, max 45 6d22h: %BGP-3-MAXPFXEXED: No. of prefix received from 140.0.250.2 (afi 2): 46 exceed limit 456d22h: %BGP- 5-ADJCHANGE: neighbor 140.0.250.2 vpn vrf VPN_20499 Down BGP Notification sent 6d22h: %BGP-3-NOTIFICATION: sent to neighbor 140.0.250.2 3/1 (update malformed) 0 bytes FFFF FFFF FF 24

Best Practice Security Overview Secure devices (PE, P): They are trusted! See next slide for risks PEs: Secure with ACLs on all interfaces Static PE- routing where possible If routing: Use authentication (MD5) Maximum number of routes per peer (only BGP) Separation of -PE links where possible (Internet/VPN) LDP authentication (MD5) VRF: Define maximum number of routes Note: Overall security depends on weakest link! 25 Key: PE Security What happens if a single PE in the core gets compromised? Intruder has access to all VPNs; GRE tunnel to his in the Internet, bring that into any VPN That VPN might not even notice Worst Case!!!! Therefore: PE Security is Paramount!!!!!!! Therefore: No PE on customer premises!!!!!!! (Think about console access, password recovery ) 26

Inter-AS Considerations 27 Inter-AS: The Options Option A VRF back to back; IP interface Option B ASBRs exchange labelled VPN prefixes; labelled interface Option C ASBRs don t hold VPN information - only RRs do; labelled interface security functionality ASBR: Autonomous System Border Router RR: Route Reflector VRF: Virtual Routing and Forwarding instance 28

mbehring Inter-AS: Case A VRF-VRF Back-to-Back Cust. AS 1 AS 2 PE ASBR PE ASBR Cust. LSP IP Data LSP Control plane: No signalling, no labels Data plane: IPv4 only, no labels accepted Security: as in RFC 2547 (single-as) SPs are completely separated 29 Security of Inter-AS case A Static mapping Only IP interfaces SP1 does not see SP2 s network And does not run routing with SP2, except within the VPNs Quite secure Potential issues: SP 1 can connect VPN connection wrongly (like in ATM/FR) Customer can flood routing table on PE (this is the same issue as in RFC 2547 (single-as); solution: prefix limits) 30

mbehring Inter-AS: Case B ASBR exchange labelled VPNv4 routes Cust. AS 1 AS 2 PE ASBR MP-eBGP+Labels ASBR PE Cust. LSP VPN label IP Data LSP Control plane: MP-eBGP, labels Data plane: Packets with one label 31 Security of Inter-AS Case B: Summary Control Plane can be secured well Data Plane has some security issues: Label is not checked today (since i/f in global table) Labelled packets on any MPLS i/f will be forwarded if LFIB entry exists Potential Issues: Insertion of traffic into non-shared VPNs (uni-directional only) (requires compromised/faulty ASBR, remote exploit not possible) All global i/f on an ASBR share the same LFIB, thus might affect third parties Good: No visibility of other AS (except ASBR i/f) 32

mbehring Inter-AS Case C: ASBRs Exchange PE loopbacks Cust. AS 1 AS 2 VPNv4 Routes + Labels PE ASBR PE Loopb+Labels PE ASBR Cust. LSP PE label VPN IP Data Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4 routes + labels Data plane: PE label + VPN label AS1 can insert traffic into VPNs in AS2 Only requirement: Must have LSP to correct egress PE Customer must trust both SPs 33 Security of Inter-AS Case C ASBR-ASBR signalling (BGP) RR-RR signalling (MP-BGP) Much more open than Case A and B More interfaces, more visible parts (PE, RR) Potential Issues: SP1 can intrude into any VPN on PEs which have a Inter-AS VPN configured Cannot check what s underneath the PE label Very open architecture Acceptable for ASes controlled by the same SP 34

Inter-AS Summary and Recommendation Three different models for Inter-AS Different security properties Most secure: Static VRF connections (case A), but least scalable Basically the SPs have to trust each other Hard/impossible to secure against other SP in this model But: Can monitor with MPLS aware NetFlow (!!) Okay if all ASes in control of one SP Current Recommendation: Use case A 35 Summary 36

Summary MPLS VPNs can be secured as well as ATM/FR VPNs Security depends on correct operation and implementation MPLS backbones can be more secure than normal IP backbones Core not accessible from outside Separate control and data plane Key: PE security Advantage: Only PE- interfaces accessible from outside Makes security easier than in normal networks 37 For More Information: MPLS VPN Security Authors: Michael Behringer Monique Morrow Cisco Press, ISBN: 1587051834 Published June, 2005 38

Additional Information MPLS Security White Paper: http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/mxinf_ds.htm Analysis of the security of the MPLS architecture RFC on MPLS VPN Security: http://www.ietf.org/rfc/rfc4381.txt Miercom MPLS test report: http://www.mier.com/reports/cisco/mpls-vpns.pdf Practical tests show that MPLS is secure Garnter research note M-17-1953: "MPLS Networks: Drivers Beat Inhibitors in 2003"; 10 Feb 2003 39 Q and A 40

41