ISP Systems Design. ISP Workshops. Last updated 24 April 2013



Similar documents
ISP Network Design. Point of Presence Topologies. ISP Network Design. PoP Topologies. Modular PoP Design. PoP Design

APNIC IPv6 Deployment

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Internet Security [1] VU Engin Kirda

Serial Deployment Quick Start Guide

Building Nameserver Clusters with Free Software

BT Internet Connect Global - Annex to the General Service Schedule

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

ISP Case Study. UUNET UK (1997) ISP/IXP Workshops. ISP/IXP Workshops. 1999, Cisco Systems, Inc.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Linux MDS Firewall Supplement

Multi-Homing Dual WAN Firewall Router

Use Domain Name System and IP Version 6

Virtual Private Servers

I N S T A L L A T I O N M A N U A L

Firewall VPN Router. Quick Installation Guide M73-APO09-380

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Introduction to Computer Security Benoit Donnet Academic Year

Small Business Server Part 2

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Enterprise Edge Communications Manager. Data Capabilities

CMPT 471 Networking II

A Modular Architecture Using Open Source Components

Firewalls (IPTABLES)

nexvortex Setup Guide

IPv6, Perspective from small to medium ISP

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Articles Fighting SPAM in Lotus Domino

QUICK START GUIDE. Cisco C170 Security Appliance

Simple Multihoming. ISP/IXP Workshops

How to Configure edgebox as an Server

DNS and BIND. David White

Deploying in a Distributed Environment

IPv6 Support in the DNS. Workshop Name Workshop Location, Date

Address Scheme Planning for an ISP backbone Network

Guardian Digital Secure Mail Suite Quick Start Guide

nexvortex Setup Template

Firewall Firewall August, 2003

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

Gateways Using MDaemon 6.0

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

IPv6 Addressing. ISP Training Workshops

Proxies. Chapter 4. Network & Security Gildas Avoine

CSCE 465 Computer & Network Security

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Firewalls. Pehr Söderman KTH-CSC

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

LinkProof DNS Quick Start Guide

ECE 4321 Computer Networks. Network Programming

Configuration Notes 0215

What is included in the ATRC server support

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

- Domain Name System -

Design, Implementation and Evolution of a DNS anycast resolving service in a country-wide ISP network

Configuration Example

IP Filtering for Patton RAS Products

Cisco S380 and Cisco S680 Web Security Appliance

F-Secure Messaging Security Gateway. Deployment Guide

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Overview of WebMux Load Balancer and Live Communications Server 2005

Reliable & Secure . Professional, Dependable, Complete Easy to Learn, Use and Grow

DNS Root NameServers

Quick Reference Guide: Server Hosting

Application Firewalls

A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Quick Start Guide. Sendio System Protection Appliance. Sendio 5.0

Networking Basics and Network Security

GroupWise SMTP Infrastructure Design:

How To Configure Multiburb Smt On A Sidewinder G2 In A Load Sharing Environment

Build yourself an ISP

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

F-Secure Internet Gatekeeper

The Leading Security Suites

L2F Case Study Overview

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Cryptography and network security

Application Note Multiple SIParator Distribution

nexvortex Setup Guide

Installing GFI MailEssentials

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Using DNS SRV to Provide High Availability Scenarios

Using Webmin and Bind9 to Setup DNS Sever on Linux

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

1 You will need the following items to get started:

Installing GFI MailSecurity

Configuring WAN Failover & Load-Balancing

English Translation of SecurityGateway for Exchange/SMTP Servers

Transcription:

ISP Systems Design ISP Workshops Last updated 24 April 2013 1

Agenda p DNS Server placement p Mail Server placement p News Server placement p Services network design p Services Network Security 2

ISP Services p Most ISP services such as DNS, Mail, etc are easily deliverable on low budget hardware platforms n Single Rack Unit in height (1RU) n Dual processor is default now n RAM is very cheap (may as well use 2Gbytes or more) n Hard drives are very cheap (SCSI more reliable) n Unix like operating systems (FreeBSD, Debian, Ubuntu, CentOS) are very common p In addition to commercial operating systems such as Solaris, RedHat Enterprise Linux &c n Minimal overhead, minimal OS install, plus the service required 3

DNS p Domain Name System n Provides name and address resolution n Servers need to be differentiated, properly located and specified p Primary nameserver p Secondary nameserver p Caching nameserver resolver 4

DNS p Primary nameserver n Holds ISP zone files p Forward zone (list of name to address mappings) for all ISP s and any customer zones p Reverse zone (list of address to name mappings) for all ISP s address space n Hardware & OS: easily satisfied by simple specification n Located in secure part of net, e.g. NOC LAN n Usually run as hidden master secondary nameservers are the official listed nameservers 5

DNS p Secondary nameserver n Holds copies of ISP zone files n At least two are required, more is better n Hardware & OS: easily satisfied by simple specification n Strongly recommended to be geographically separate from each other and the primary DNS p At different PoPs p On a different continent e.g. via services offered by ISC, PCH and others p At another ISP 6

Secondary DNS Example $ dig apnic.net ns ;; ANSWER SECTION: apnic.net. 10800 NS ns1.apnic.net. apnic.net. 10800 NS ns3.apnic.net. apnic.net. 10800 NS ns4.apnic.net. apnic.net. 10800 NS ns5.apnic.com. apnic.net. 10800 NS cumin.apnic.net. apnic.net. 10800 NS ns-sec.ripe.net. apnic.net. 10800 NS tinnie.arin.net. apnic.net. 10800 NS tinnie.apnic.net. ;; ADDITIONAL SECTION: ns1.apnic.net. 3600 A 202.12.29.25 ns3.apnic.net. 3600 A 202.12.28.131 ns4.apnic.net. 3600 A 202.12.31.140 ns5.apnic.com. 10800 A 203.119.43.200 cumin.apnic.net. 3600 A 202.12.29.59 tinnie.apnic.net. 3600 A 202.12.29.60 ns-sec.ripe.net. 113685 A 193.0.0.196 tinnie.arin.net. 10800 A 199.212.0.53 Brisbane Tokyo Hong Kong Washington Brisbane Amsterdam 7 Washington

Secondary DNS Example p apnic.net zone n Primary DNS in Brisbane (ns1.apnic.net) n Secondary DNS run all over the world by APNIC: p Brisbane p Hong Kong p Tokyo p Washington n Zone secondaried by p RIPE NCC in Amsterdam p ARIN in Washington n Geographical and service provider redundancy this is the perfect example! 8

DNS p Caching nameserver n This is the resolver it is the DNS cache n Your customers use this as resolver, NEVER your primary or secondary DNS n Provides very fast lookups n Does NOT secondary any zones n One, or preferably two per PoP (redundancy) n Hardware & OS: easily satisfied by simple specification 9

Caching Nameserver Web Cache DIAL network To Core Routers Switch redundancy Router redundancy DNS Cache redundancy Radius proxy DNS Cache DNS Cache p DIAL users automatically given the IP addresses of DNS caches when they dial in 10

Anycasting the Caching Nameserver p One trick of the trade n assign two unique IP addresses to be used for the two DNS resolver systems n use these two IP addresses in every PoP n route the two /32s across your backbone n even if the two resolver systems in the local PoP are down, the IGP will ensure that the next nearest resolvers will be reachable n Known as IP Anycast 11

DNS p Efficient and resilient design n Primary DNS keep it secure n Secondary DNS geographical and provider redundancy p Don t ever put them on the same LAN, switched or otherwise p Don t put them in the same PoP n Caching DNS one or two per PoP n Reduces DNS traffic across backbone n More efficient, spreads the load 12

DNS p Software n Make sure that the BIND distribution on the Unix system is up to date p The vendor s distribution is rarely current n Pay attention to bug reports, security issues n Reboot the DNS cache on a regular (e.g. monthly) basis p Clears out the cache p Releases any lost RAM p Accepted good practice by system administrators 13

DNS p Implementation n Put all your hosts, point-to-point links and loopbacks into the DNS p Under your ISP s domain name p Use sensible/meaningful names n Put all your hosts, point-to-point links and loopbacks into the REVERSE DNS also p Don t forget about in-addr.arpa and ip6.arpa many ISPs do p Some systems demand forward/reverse DNS mapping before allowing access 14

Mail p Must have at least two mail hosts (MX records) for all supported domains n Geographical separation helps p Dedicated POP3 server n Consumers/mobile users get mail from here p SMTP gateway dedicated to that function n Consumers/mobile users send mail via here p Mail relay open to CUSTOMERS only! n Don t let outside world use your mail relay p Block port 25 outbound for all customers n Insist that outbound e-mail goes through SMTP relay n SMTP relay does virus (ClamAV) and spam (Spamassassin) filtering 15

Mail Configuration Mail out to the Internet Incoming mail from Internet SpamAssassin ClamAV mail.isp.net ISP Mail Gateway smtp.isp.net Customer mail relay SpamAssassin ClamAV pop3.isp.net Customer POP3/IMAP server Incoming mail from customer Mail pulled by customer client 16

Mail Example p cisco.com mail (MX records) n primary MX are 6 systems in San Jose n Three backup MXes in RTP, Amsterdam and Sydney n backup MX only used if primary unavailable $ dig cisco.com mx ;; ANSWER SECTION: cisco.com. 86400 MX 10 sj-inbound-a.cisco.com. cisco.com. 86400 MX 10 sj-inbound-b.cisco.com. cisco.com. 86400 MX 10 sj-inbound-c.cisco.com. cisco.com. 86400 MX 10 sj-inbound-d.cisco.com. cisco.com. 86400 MX 10 sj-inbound-e.cisco.com. cisco.com. 86400 MX 10 sj-inbound-f.cisco.com. cisco.com. 86400 MX 15 rtp-mx-01.cisco.com. cisco.com. 86400 MX 20 ams-inbound-a.cisco.com. cisco.com. 86400 MX 25 syd-inbound-a.cisco.com. 17

Mail p Software n Make sure that the MAIL and POP3 distributions on the Unix system are up to date p The vendor distributions are rarely current n Pay attention to bug reports, security issues, unsolicited junk mail complaints IMPORTANT: Do NOT allow non-customers to use your mail system as a relay 18

News p News servers provide a Usenet news feed to customers p Distributed design required n Incoming newsfeed to one large server n Distributed to feed servers in each PoP n Feed servers provide news feed to customers n Outgoing news goes to another server n Separate reading news system n Separate posting news system 19

News System Placement News Feeder Customer connections POP Two Customer connections Customer connections POP Three POP One News Feeder News Feeder External connections News Collector News Distributor External connections 20

News System Placement News Feeder Customer connections POP Two Customer connections Customer connections POP Three POP One News Feeder News Feeder External connections News Collector News Distributor External connections 21

News p Software n Make sure that the Internet News distribution on the Unix system is up to date p The vendor distributions are rarely current n Pay attention to bug reports, security issues, unsolicited junk posting complaints IMPORTANT: Do NOT allow non-customers to use your news system for posting messages 22

Services Security 23

Security p ISP Infrastructure security p ISP Services security p Security is not optional! p ISPs need to: n Protect themselves n Help protect their customers from the Internet n Protect the Internet from their customers p The following slides are general recommendations n Do more research on security before deploying any network 24

ISP Infrastructure Security p ISP server security n Usernames, passwords, TCP wrappers, IPTABLES n Protect all servers using routers with strong filters applied p Hosted services security n Protect network from hosted servers using routers with strong filters n Protect hosted servers from Internet using routers with strong filters 25

ISP Infrastructure Security ISP Server Protection Access-list examples: To core routers Allow tcp/established to all servers ICMP DNS 2ary: udp/53 and tcp/53 POP3: tcp/110 Mail Relay: tcp/25 and ISP address range only News: tcp/119 and ISP address range only DNS Cache: udp/53 Web server: tcp/80 Service Network Gateway Routers Other necessary filters: DNS Mail POP3 secondary Relay NEWS All servers: SSH (tcp/22) from NOC LAN only DNS cache Web server 26

ISP Infrastructure Security Hosted Server Protection Access-list examples: Inbound Allow tcp/established to all servers ICMP Web server: tcp/80 SSH for customer access Any other ports for services sold to customers To core routers Service Network Gateway Routers Outbound ICMP Allow DNS udp/53 and tcp/53 Block all access to ISP address range Server1 Server2 Server3 Server4 Server5 Server6 27

ISP Infrastructure Security p Premises security n Locks electronic/card key preferred n Secure access 24x7 security arrangements n Environment control good aircon p Staff responsibility n Password policy, strangers, temp staff n Employee exit procedures p RFC2196 n (Site Security Handbook) p RFC3871 n (Operational Security Requirements for Large ISP IP Network Infrastructure ) 28

ISP Network Security Secure external access p How to provide staff access from outside n Set up ssh gateway (Unix system with ssh daemon and nothing else configured) n Provide ssh client on all staff laptops n ssh available on Unix and Windows n ssh is Secure Shell encrypted link p How not to provide access from outside n telnet, rsh, rlogin these are all insecure n Open host insecure, can be compromised 29

ISP Systems Design Summary 30

ISP Design Summary p KEEP IT SIMPLE & STUPID! (KISS) p Simple is elegant is scalable p Use Redundancy, Security, and Technology to make life easier for yourself p Above all, ensure quality of service for your customers 31

ISP Systems Design ISP Workshops 32