MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com

Similar documents
Why Is MPLS VPN Security Important?

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

APNIC elearning: Introduction to MPLS

MPLS VPN Security BRKSEC-2145

SEC , Cisco Systems, Inc. All rights reserved.

MPLS Security Considerations

MPLS Virtual Private Network (VPN) Security

MPLS VPN Security in Service Provider Networks

Keep it Simple with BGP/MPLS Virtual Private Networks

MPLS VPN Security Best Practice Guidelines

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Table of Contents. Cisco Configuring a Basic MPLS VPN

Introduction Inter-AS L3VPN

How To Make A Network Secure

HIJACKING LABEL SWITCHED NETWORKS IN THE CLOUD. BSides Asheville 2014

Configuring a Basic MPLS VPN

BGP-MPLS IP VPN Network Security

Security of the MPLS Architecture

Understanding Virtual Router and Virtual Systems

Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines

Cisco Network Foundation Protection Overview

BGP Configuration Guide

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

l.cittadini, m.cola, g.di battista

MPLS VPN Implementation

Introduction to MPLS-based VPNs

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

IPv6 over MPLS. Course Number Presentation_ID. Patrick Grossetete Cisco Systems Cisco IOS IPv6 Product Manager

MPLS-based Layer 3 VPNs

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Cisco Configuring Basic MPLS Using OSPF

HP Networking BGP and MPLS technology training

HughesNet and MPLS. This white paper addresses how it is possible to seamlessly integrate MPLS and HughesNet.

- Multiprotocol Label Switching -

How To Import Ipv4 From Global To Global On Cisco Vrf.Net (Vf) On A Vf-Net (Virtual Private Network) On Ipv2 (Vfs) On An Ipv3 (Vv

MPLS Implementation MPLS VPN

Methods of interconnecting MPLS Networks

Unicast Reverse Path Forwarding

Using OSPF in an MPLS VPN Environment

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

MPLS VPN Route Target Rewrite

Introducing Basic MPLS Concepts

Enterprise Network Simulation Using MPLS- BGP

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

How Routers Forward Packets

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Exterior Gateway Protocols (BGP)

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Understanding Route Redistribution & Filtering

DDoS Mitigation Techniques

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Implementing MPLS VPNs over IP Tunnels

Tutorial: Options for Blackhole and Discard Routing. Joseph M. Soricelli Wayne Gustavus NANOG 32, Reston, Virginia

Sample Configuration Using the ip nat outside source static

Recommended IP Telephony Architecture

Network provider filter lab

Network Virtualization Network Admission Control Deployment Guide

Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP

For internal circulation of BSNLonly

An ADTRAN White Paper. Private IP Service BGP/MPLS VPN Networks

Inter-Autonomous Systems for MPLS VPNs

MPLS Inter-AS VPNs. Configuration on Cisco Devices

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Lab Configure IOS Firewall IDS

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

IP interconnect interface for SIP/SIP-I

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Customized BGP Route Selection Using BGP/MPLS VPNs

Seven Pillars of Carrier Grade Security in the AT&T Global IP/MPLS Network

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN

Interconnecting Cisco Networking Devices Part 2

LAB II: Securing The Data Path and Routing Infrastructure

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Implementing Cisco MPLS

Cisco IOS Flexible NetFlow Technology

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

NetFlow/IPFIX Various Thoughts

MPLS Concepts. Overview. Objectives

Exam Name: BGP + MPLS Exam Exam Type Cisco Case Studies: 3 Exam Code: Total Questions: 401

Quidway MPLS VPN Solution for Financial Networks

Frame Mode MPLS Implementation

Transcription:

Intelligent Information Network MLS VN Security Klaudia Bakšová Systems Engineer, Cisco Systems kbaksova@cisco.com

Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 2

The rinciple: A Virtual Router Virtual Routing and Forwarding Instance! ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000! interface Serial0/1 ip vrf forwarding Customer_A! Assign Interface to Virtual Router Route Distinguisher: Makes VN routes unique Export this VRF with community 100:1000 Import routes from other VRFs with community 100:1000 3

General VN Security Requirements Address Space and Routing Separation Hiding of the MLS Core Structure Resistance to Attacks Impossibility of VN Spoofing Working assumption: The core (+) is secure 4

mbehring Address lanes: True Separation! VN1 Address Space 0.0.0.0 255.255.255.255? VN2 Address Space 0.0.0.0 255.255.255.255? Several Data lanes: VNv4 Addr. Control lane: Iv4 Addr.? Core Address Space 0.0.0.0 255.255.255.255? - Interfaces Belong to VN; Only Attack oint!! 5

Hiding of the MLS Core Structure Visible Address Space of VN1 MLS core I(; l0) 1 I(1) I(; fa0) VRF 1 2 I(2) I(; fa1) VRF 2 interface to the only point where a VN can see the core and send packets to the core device; seen and accessible from VN1 space only, VN1 cannot see any other interface on the Only peer addresses of VN1 exposed (-> )! -> ACL for interfaces for receive traffic I unnumbered for interfaces complete hiding of the core from that VN! routers not reachable from VN 6

rotection Against Spoofing VN Customer VN Customer Transit ACL Customer Internet Service rovider Internet Internet * Exceptions: Inter-AS, CsC Customer VN Customer Internet Customer LS Label Spoofing - Interface between and pure I without labels labeled packet received from, automatically drops it Cannot spoof labels from outside! I spoofing possible, remains within the originating VN RFC2827 7

Inter-AS: What are we trying to achieve? An S should have: 100% (full) reachability to all Inter-AS VNs shared between them (control plane and data plane) 0% (no) reachability to VNs that are not shared (control plane and data plane) S networks should be independent: Must be secured against each other Not attackable from outside (other S, customer, Internet) 8

Inter-AS: What Are We NOT Trying to Achieve? Any Form of Separation Between Inter-AS VNs (Control or Data lane) - Interconnection of VNs is 100% No firewalling, no limitations, no sanity checks within an Inter-AS VN If an S Holds VN Sites in an Inter-AS Set-Up, He Has Full Access to All VN Sites, Also on Other ASes 9

Inter-AS: Case A VRF-VRF Back-to-Back Cust. AS 1 AS 2 ASBR ASBR Cust. mbehring LS I Data LS Control plane: No signalling, no labels interfaces external to AS are pure I, each ASBR holds its own VRF for the shared VN ASBR - as if a single router connecting a router (the other ASBR) Data plane: Iv4 only, no labels accepted Not very scalable 10

Inter-AS: Case A otential Security Issues Accidental misconnection at the ASBR Ss have to make sure they are clear about which interface/subinterface connects which VN Routing issues VRFs on both ASBRs will exchange routing for a given Inter-AS VN Routing security refix number limited to avoid memory overflow Security: as in RFC2547; most secure interconnection model no labels accepted due to - analogy, neighbouring AS cannot see the AS core Ss are completely separated, VRF-to-VRF connection, no global routing table connection Neighboring ASBR - just an I interface to MLS core no label spoofing 11

Inter-AS: Case B ASBR exchange labelled VNv4 routes Cust. AS 1 AS 2 ASBR M-eBG+Labels ASBR Cust. mbehring LS VN label I Data LS Control plane: M-eBG between ASBRs, no IG or TD/LD Inter-AS VNv4 routes held in BG table, not in VRFs Data plane: one connection between ASBRs data plane traffic for different VNs must be kept separate labelling packets before sending them to the other ASBR (label stack swapped for ASBR VN label) inherent behaviour to M-eBG Better scalability, BG table size might be an issue 12

Inter-AS: Case B otential Security Issues No AS VN label is checked on ASBRs when forwarding, => possible label spoofing => data plane not possible to secure completely External interfaces accept labelled packets instead of just I packets No way for ASBR to check on the VN membership of the packet, as there is no VRF on ASBR Control plane: ingress ASBR interfaces ACL to filter any I accept BG Ss are completely separate Visibility only the neighbouring ASBR, via ebg 13

Inter-AS Case C: ASBRs Exchange loopbacks Cust. AS 1 AS 2 VNv4 Routes + Labels ASBR Loopb+Labels ASBR Cust. mbehring LS label VN I Data Control plane: visibility of both Ss through Multihop M-BG ASBR exchange just loopback vie ebg + labels; s exchange VNv4 routes + labels end to end without involving ASBRs => no need to hold VN specific information, only loopbacks and their labels => very scalable Data plane: label + VN label, ASBRs only as routers, LS built from in AS1 to in AS2 14

Inter-AS: Case C otential Security Issues Security: S must be able to reach all s of neighbouring AS which hold connections of shared VNs, issue: ASBR cannot check VN label, sees only egress label, possible VN label spoofing => probability of misinsertion Control plane: ingress ASBR interfaces ACL to filter any I accept BG ASBR no VRF, no VN routing information => VN label below egress label cannot be checked (e.g. intrusion no VN label appended, H pops egress label at router, receives a pure I packet gets routed into S core) All these label spoofing attacks carried out by S, not by customer VN, as data can be injected at ASBR only! 15

The Key Issue: Designing a DoS Resistant rovider Edge Customer VN MLS core VN Customer VRF 1 Internet Customer DoS Attack Internet VRF rimary prerequisite I address visibility has shared CU / memory / bandwidth resources for different VRFs: Traffic can affect VN customer(s) via performance degradation up to complete loss of connectivity DoS attacks usually perceived as coming from Internet, however also coming from customer VNs A way to compromise MLS core thorough security of s crucial to avoid the threat 16

Today s Best ractice: DoS Through a Shared Solved by Using a different design To Internet 1 1 Separate VN and Internet traffic on physically different routers customer network 2 To VN 2 VRF Internet VRF VN routers should contain only VRFs of the same security level. Example: Level 0: Internet Level 1: VN customers Internet VN subject to DoS attack in no different way than other network technologies, i.e. this is not an MLS-specific issue DO NOT expose addresses to Internet at all, or with dynamic routing use limit to routing reachability only Infrastructure ACL! 17

Separate VN and Internet Access Customer LAN MLS core To Internet Firewall / NAT 1 1 VRF Internet IDS 2 2 VRF VN To VN Separation DoS resistance 18

Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 19

Internet rovisioning on an MLS Core Most common VN user requirement S to provide Internet access in addition to VN connectivity Two basic possibilities: 1. Internet in global table, either: 1a) Internet-free MLS core (using LSs between s) 1b) Internet routing held by the entire MLS core ( and ) 2. Internet in VRF Internet carried as a VN on the core Issue how to design an MLS core for Internet access such that VNs remain secure 20

MLS Core Without Internet Connectivity MLS Core no connection to the Internet; only VNs connect to the core, not reachable, also (except in case seen below) ure MLS VN service considered most secure well secured against intrusions and DoS attacks from the outside (core invisible from the outside) VN Spoofing impossible, VNs not reachable from the outside But what about: B VRF B VRF B B A VRF A mbehring VRF Ambehring A Internet Service rovider Internet has become part of the VN, above statements still hold DoS attack within such VN no immense threat as access capacity of VN A can be limited by configuration 21

Internet in a VRF Internet Service rovider Internet Internet VN Customer Customer Customer VN Customer VN Customer Internet Routing Table (Global Routing Table) VN Routing Table (VRF) Internet in a VRF Internet Customer 22

Internet in a VRF Security Features Internet is handled just the same as a VN, Customer VNs not reachable from Internet VN The core is secure against attacks from the outside as the Internet has no access to the core not reachable Spoofing is impossible between VNs and Internet in a VN Internet VN possibility of DoS of higher magnitude can be reachable from Internet if not secured properly Customer VNs must not be affected -> provide sufficient capacity in the core OR use QoS to prioritize VN traffic over Internet traffic Scalability Issue a prefix held in a VRF requires about three times as much memory as a prefix held in the global table => additional memory required 23

Internet in the Global Routing Table Using LSs Between s Internet Routing Table (Global Routing Table) VN Routing Table (VRF) Internet Service rovider Internet VN Customer Customer Internet Customer VN Customer VN Customer Internet Customer LS Ingress - ibg next hop - Egress loopback Next hop to egress usually has label, LS is used to reach egress routers do not need to know Internet routes (nor run BG, only IG and LD) 24

Internet in the Global Routing Table Using LSs Between s - Recommendations In this model routers have to carry routes for routers in their IG Traffic coming from the outside into a router's global routing table will have normally a route to the routers ( reachable unidirectionally) LD and ibg threatened via attacks against TC usage of MD5 authentication as a solution use Infrastructure ACLs to prevent packets from outside reach the inside of the core use Receive ACLs and Control lane olicing to protect the control plane of a single platform Consider using NSA addresses in core IS-IS 25

Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 26

Securing the Core: Infrastructure ACLs VN In MLS: address belongs to VRF! Intended to filter data destined for network infrastructure equipment, i.e. what protocols and addresses can access critical infrastructure equipment On all reachable VRF interfaces: deny ip any < address space> permit ip any any exception: routing protocol from only and all transit traffic Idea: rotecting the Core DoS: traffic over router theoretically enables DoS, primary threat traffic destined for R iacls also to deny source private address space, reserved addresses, Ss own address space - antispoofing 27

Securing the Core: Infrastructure ACLs.2 1.1.1.0/30.1 VN VN.1 1.1.1.8/30.2.2 1.1.1.4/30.1 VN VN.1 1.1.1.12/30.2 Example: deny ip any 1.1.1.0 0.0.0.255 permit ip any any This Is VN Address Space, Not Core! Caution: This also blocks packets to the s! Alternatives: List all i/f in ACL, or use secondary i/f on 28

Securing the Core: - routing protocol security In order of security preference: 1. Static: If no dynamic routing required (no security implications no fabricated routing updates, less CU impact, possible sniffing not revealing routes due to no updates) 2. BG: For redundancy and dynamic updates (many security features prefix filtering, route dampening, one BG process, multiple address-families (per customer/vrf), redistribution at not necessary into ibg) 3. IGs: If BG not supported (limited security features peering address known, no neighbor definition, use iacls) 29

Routing Security: Neighbor Authentication and BG TTL Use static routing between and where possible no errant routes announced, no routing data crossing the wire, no CU impact Routers authenticate each time a routing update is exchange between them reliable information received from a trusted source Verification through MD5 hash Supported: BG, ISIS, OSF, EIGR, RIv2, LD MD5 for LD label spoofing protection, enable also on M-iBG 30

Control of Routes from a BG eer Injection of too many routes possible attack at routing table stability, CU and memory: otential DoS attack, leading e.g. to F disabling or reload Control with maximum prefix command After exceeding the number BG peering disabled, neighbor down From This Neighbor Accept Max 45 refixes, Then Reset Session router bgp 13 neighbor 140.0.250.2 maximum-prefix 45 80 restart 2 Log a Warning at 80% (of 45), and Restart the BG Session After Two Min. 31

Control of Routes from a BG eer: Logging 6d22h: %BG-4-MAXFX: No. of prefix received from 140.0.250.2 (afi 2) reaches 37, max 45 6d22h: %BG-3-MAXFXEXED: No. of prefix received from 140.0.250.2 (afi 2): 46 exceed limit 45 6d22h: %BG-5-ADJCHANGE: neighbor 140.0.250.2 vpn vrf VN_20499 Down BG Notification sent 6d22h: %BG-3-NOTIFICATION: sent to neighbor 140.0.250.2 3/1 (update malformed) 0 bytes FFFF FFFF FF 32

VRF Maximum refix Number Injection of too many routes: otential memory overflow otential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF ip vrf red maximum routes 45 80 Accept Max 45 refixes, and Log a Warning at 80% (of 45), 33

-Specific Router Security Control lane hardening Receive traffic L3 routing environment (authentication, max number of prefixes ) Infrastructure ACLs rotection ACLs (anti-spoofing, etc.) Data lane Hardening Use urf Strict mode on each interface of the routers facing interfaces and on the routers -facing interfaces 34

Attacking a from MLS (other VN) Is the reachable from the MLS side? -> only if this is an Internet, otherwise not! (- addressing is part of VN!) For Internet s: Same security rules apply as for any other access router. MLS hides VN-s: Secure! Internet s: Same as in other networks 35

Agenda Analysis of MLS/VN Security Inter-AS VNs rovider Edge DoS possibility Secure MLS VN Design Internet Access Security Recommendations Summary 36

Securing the MLS Core: Wrap-Up VN MLS core BG Route Reflector VN Internet VN VN VN BG peering with MD5 authentic. LD with MD5 ACL and secure routing 37

MLS Security Overview 1. Don t let packets into (!) the core No way to attack core, except through routing, thus: 2. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 3. Design for transit traffic QoS to give VN priority over Internet Choose correct router for bandwidth Separate s where necessary 4. Operate Securely Still open : routing protocol Only attack vector: Transit traffic Now only insider attacks possible Avoid insider attacks 38