SEC-370. 2001, Cisco Systems, Inc. All rights reserved.



Similar documents
MPLS Security Considerations

Why Is MPLS VPN Security Important?

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS Peter Raedler Systems Engineer 2001, Cisco Systems, Inc. Agenda Overview of MPLS Business Opportunities Security

MPLS VPN Security BRKSEC-2145

Security of the MPLS Architecture

MPLS VPN Security in Service Provider Networks

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

MPLS Virtual Private Network (VPN) Security

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems

BGP-MPLS IP VPN Network Security

In this chapter, you learn about the following: How MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing

For internal circulation of BSNLonly

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Virtual Private Networks. Juha Heinänen Song Networks

MPLS VPN Security Best Practice Guidelines

MPLS Implementation MPLS VPN

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Introduction Inter-AS L3VPN

Provisioning Cable Services

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Table of Contents. Cisco Configuring a Basic MPLS VPN

Securing a Core Network

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

Configuring a Basic MPLS VPN

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

A Policy Information Model for RFC2547-like IP VPNs

How Routers Forward Packets

MPLS VPN Implementation

Methods of interconnecting MPLS Networks

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Secure Inter-Provider IP VPNs

Introducing Basic MPLS Concepts

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Cisco Certified Security Professional (CCSP)

RFC 2547bis: BGP/MPLS VPN Fundamentals

Quidway MPLS VPN Solution for Financial Networks

CISCO IOS NETWORK SECURITY (IINS)

Implementing Cisco MPLS

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Cisco Implementing Cisco Service Provider Next-Generation Egde Network Services. Version: 4.1

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Cisco Exam Implementing Cisco Service Provider Next-Generation Egde Network Services Version: 7.0 [ Total Questions: 126 ]

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

Introduction to MPLS-based VPNs

VPN Technologies A Comparison

MPLS-based Layer 2 VPNs. Kireeti Kompella Juniper Networks

Network Working Group Request for Comments: March 1999

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

MPLS L2VPN (VLL) Technology White Paper

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

Fundamentals Multiprotocol Label Switching MPLS III

Kingston University London

Junos MPLS and VPNs (JMV)

IPv6 over IPv4/MPLS Networks: The 6PE approach

SBSCET, Firozpur (Punjab), India

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Cisco Which VPN Solution is Right for You?

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Implementing VPN over MPLS

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

International Civil Aviation Organization

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Campus LAN at NKN Member Institutions

Exam : Implementing Cisco Service Provider Next-Generation Egde Network Services. Title :

Enterprise Network Simulation Using MPLS- BGP

MPLS-based Layer 3 VPNs

Addressing Inter Provider Connections With MPLS-ICI

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

How To Make A Network Secure

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Network Virtualization Network Admission Control Deployment Guide

Cisco Certified Network Expert (CCNE)

Multi Protocol Label Switching (MPLS) is a core networking technology that

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

S ITGuru Excercise 3: BGP/MPLS VPN. Spring Timo-Pekka Heikkinen, Juha Järvinen and Piia Töyrylä

IPv6 Fundamentals, Design, and Deployment

IPv6 Migration Challenges for Large Service Providers

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Lecture 17 - Network Security

MPLS Concepts. Overview. Objectives

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Building Trusted VPNs with Multi-VRF

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Layer 3 MPLS VPN Enterprise Consumer Guide Version 2

INTRODUCTION TO L2VPNS

l.cittadini, m.cola, g.di battista

MPLS in Private Networks Is It a Good Idea?

Transcription:

SEC-370 2001, Cisco Systems, Inc. All rights reserved. 1

Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer <mbehring@cisco.com> SEC-370 2003, Cisco Systems, Inc. All rights reserved. 3

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 4

The Principle: A Virtual Router Virtual Routing and Forwarding Instance! ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000! interface Serial0/1 ip vrf forwarding Customer_A! Assign Interface to Virtual Router Route Distinguisher: Makes VPN routes unique Export this VRF with community 100:1000 Import routes from other VRFs with community 100:1000 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 5

General VPN Security Requirements Address Space and Routing Separation Hiding of the MPLS Core Structure Resistance to Attacks Impossibility of VPN Spoofing Working assumption: The core (PE+P) is secure SEC-370 2003, Cisco Systems, Inc. All rights reserved. 6

Address Space Separation 64 bits 32 bits Route Distinguisher IPv4 Address VPN IPv4 Address Within the MPLS core all addresses are unique due to the Route Distinguisher SEC-370 2003, Cisco Systems, Inc. All rights reserved. 7

Routing Separation Each (sub-) interface is assigned to a VRF Each VRF has a RD (route distinguisher) Routing instance: within one RD -> within one VRF -> Routing Separation SEC-370 2003, Cisco Systems, Inc. All rights reserved. 8

CE2 IP(CE2) IP(PE; fa1) VRF CE2 Hiding of the MPLS Core Structure MPLS core Visible Address Space CE1 IP(CE1) IP(PE; fa0) VRF CE1 PE IP(PE; l0) P P P P VRF contains MPLS IPv4 addresses Only peering Interface (on PE) exposed (-> CE)! -> ACL or unnumbered SEC-370 2003, Cisco Systems, Inc. All rights reserved. 9

Resistance to Attacks: Where and How? Where can you attack? Address and Routing Separation, thus: Only Attack point: peering PE How? See ISP Essentials - Intrusions (telnet, SNMP,, routing protocol) -DoS Secure with ACLs Secure with MD5 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 10

Label Spoofing PE router expects IP packet from CE Labelled packets will be dropped Thus no spoofing possible SEC-370 2003, Cisco Systems, Inc. All rights reserved. 11

Comparison with ATM / FR ATM/FR MPLS Address space separation yes yes Routing separation yes yes Resistance to attacks yes yes Resistance to Label Spoofing Direct CE-CE Authentication (layer 3) yes yes yes with IPsec SEC-370 2003, Cisco Systems, Inc. All rights reserved. 12

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 13

Security Recommendations for ISPs Secure devices (PE, P): They are trusted! CE-PE interface: Secure with ACLs Static PE-CE routing where possible If routing: Use authentication (MD5) Separation of CE-PE links where possible (Internet / VPN) LDP authentication (MD5) VRF: Define maximum number of routes Note: Overall security depends on weakest link! SEC-370 2003, Cisco Systems, Inc. All rights reserved. 14

PE-CE Routing Security In order of security preference: 1. Static: If no dynamic routing required (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. RIPv2: If BGP not supported (limited security features) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 15

Securing the MPLS Core CE CE PE VPN P MPLS core BGP Route Reflector P PE P VPN Internet CE VPN PE PE VPN VPN PE BGP peering with MD5 authentic. LDP with MD5 CE CE CE ACL and secure routing SEC-370 2003, Cisco Systems, Inc. All rights reserved. 16

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 17

MPLS Internet Architectures: Principles Core supports VPNs and Internet VPNs remain separated Internet as an option for a VPN Essential: Firewalling SEC-370 2003, Cisco Systems, Inc. All rights reserved. 18

Separate VPN and Internet Access Customer LAN MPLS core To Internet Firewall / NAT CE1 PE1 P VRF Internet IDS CE2 PE2 VRF VPN To VPN Separation: +++ DoS resistance: +++ Cost: $$$ (Two lines and two PEs: Expensive!) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 19

Separate Access Lines + CEs, one PE Customer LAN MPLS core To Internet Firewall / NAT CE1 PE1 P IDS CE2 VRF Internet VRF VPN To VPN Separation: +++ DoS resistance: Cost: ++ (DoS might impact VPN on PE) $$ (Two lines, but only one PE) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 20

Using a Single Access Line Requirements to share a line: PE requires separate sub-interfaces CE requires separate sub-interfaces CE side requires separate routing SEC-370 2003, Cisco Systems, Inc. All rights reserved. 21

Shared Access Line, Frame Relay Customer LAN MPLS core Firewall / NAT Internet CE PE1 P IDS VPN CE VRF Internet VRF VPN Separation: +++ DoS resistance: Cost: $ FR logical links + (DoS might affect VPN on PE, line, CE) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 22

Shared Access Line, Policy Routing Customer LAN MPLS core Firewall / NAT Internet CE PE1 P IDS VPN CE PR VRF Internet VRF VPN FR logical links Separation: +++ DoS resistance: Cost: $ + (DoS might affect VPN on PE, line, CE) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 23

Shared Access Line, CE with VRFs Customer LAN MPLS core Firewall / NAT Internet CE PE1 P IDS VRF Internet VRF Internet VRF VPN Separation: +++ DoS resistance: Cost: $ FR logical links + (DoS might affect VPN on PE, line, CE) SEC-370 2003, Cisco Systems, Inc. All rights reserved. 24

Hub-and-Spoke VPN with Internet Access Hub Site MPLS core Internet Firewall NAT Internet CE PE1 To Internet --> VRF Internet IDS VPN CE PE2 To VPN mbehring VRF VPN PEs VPN VPN VPN CEs Spoke 1 Spoke 2 Spoke 3 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 25

Alternative Topologies Full VPN mesh, one Internet Access Internet access at several sites -> Several firewalls needed -> More complex Internet Access from all sites -> Complex, one firewall per site SEC-370 2003, Cisco Systems, Inc. All rights reserved. 26

Central Firewalling: Option 1: Stacking Firewalls SP Domain CEs PEs Customer 1 MPLS core VPN Internet VPN VPN Customer 2 NAT and Firewalling VPN Customer 3 + Central Management + Strong firewalls + Customer can choose firewall + Different policies per customer possible + CEs not touched - One firewall per customer SEC-370 2003, Cisco Systems, Inc. All rights reserved. 27

Central Firewalling: Option 2: NAT on CE, one central FW Internet + Central Management SP Domain e.g PIX 535 VPN MPLS core Firewalling + One strong firewall + Easy to deploy - Customer cannot pick his firewall PEs VPN VPN VPN - CEs need config CEs NAT NAT NAT Customer 1 Customer 2 Customer 3 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 28

Central Firewalling: Option 3: IOS Firewall on CE SP Domain PEs MPLS core VPN CEs NAT and firewall Internet VPN VPN VPN NAT and firewall NAT and firewall + Economic + One firewall per customer + No central devices - Management more difficult - CEs need config Customer 1 Customer 2 Customer 3 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 29

A Word on Carrier s Carrier Cust. CE Carrier Carrier s Carrier Carrier Cust. CE PE PE PE PE PE PE IP data IP data label IP data label IP data label label IP data Same principles as in normal MPLS Customer trusts carrier who trusts carrier SEC-370 2003, Cisco Systems, Inc. All rights reserved. 30

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 31

Ways to Attack Intrusion : Get un-authorised access Theory: Not possible (as shown before) Practice: Depends on: - Vendor implementation - Correct config and management Denial-of-Service : Deny access of others Much more interesting No Trust? Use IPsec between CEs! SEC-370 2003, Cisco Systems, Inc. All rights reserved. 32

DoS against MPLS DoS is about Resource Starvation, one of: - Bandwidth - CPU - Memory (buffers, routing tables, ) - In MPLS, we have to examine: CE PE - Rest is the same as in other networks SEC-370 2003, Cisco Systems, Inc. All rights reserved. 33

Attacking a CE from MPLS (other VPN) Is the CE reachable from the MPLS side? -> only if this is an Internet CE, otherwise not! (CE-PE addressing is part of VPN!) For Internet CEs: Same security rules apply as for any other access router. MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks SEC-370 2003, Cisco Systems, Inc. All rights reserved. 34

Attacking a CE-PE Line Also depends on reachability of CE or the VPN behind it Only an issue for Lines to Internet-CEs Same considerations as in normal networks If CE-PE line shared (VPN and Internet): DoS on Internet may influence VPN! Use CAR! MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks SEC-370 2003, Cisco Systems, Inc. All rights reserved. 35

Attacking a PE Router PE CE1 IP(CE1) IP(PE; fa0) IP(PE; l0) IP(P) VRF CE1 CE2 IP(CE2) IP(PE; fa1) VRF CE2 Attack points VRF Internet Only visible: your interface and interfaces of Internet CEs SEC-370 2003, Cisco Systems, Inc. All rights reserved. 36

DoS Attacks to PE can come from: Other VPN, connected to same PE Internet, if PE carries Internet VRF Possible Attacks: Resource starvation on PE Too many routing updates, too many SNMP requests, small servers, Has to be secured SEC-370 2003, Cisco Systems, Inc. All rights reserved. 37

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 38

Use IPsec if you need: Encryption of traffic Direct authentication of CEs Integrity of traffic Replay detection Or: If you don t want to trust your ISP for traffic separation! SEC-370 2003, Cisco Systems, Inc. All rights reserved. 39

IPsec Topologies CE to CE (static cryptomap) Hub and Spoke (dynamic cryptomap) Full Mesh with TED: Ideal!!! MPLS/VPN and TED are an ideal combination!! IPsec is independent of MPLS IPsec and MPLS work together SEC-370 2003, Cisco Systems, Inc. All rights reserved. 40

Agenda Analysis of MPLS/VPN Security Security Recommendations MPLS Security Architectures Internet Access Firewalling Options Attacking an MPLS Network IPsec and MPLS Summary SEC-370 2003, Cisco Systems, Inc. All rights reserved. 41

MPLS doesn t provide: Protection against mis-configurations in the core Protection against attacks from within the core Confidentiality, authentication, integrity, anti-replay -> Use IPsec if required Customer network security SEC-370 2003, Cisco Systems, Inc. All rights reserved. 42

Conclusions MPLS VPNs can be secured as well as ATM/FR VPNs Depends on correct configuration and function of the core Use IPsec if you don t trust core There are many ways to map VPNs with Internet access securely onto MPLS SEC-370 2003, Cisco Systems, Inc. All rights reserved. 43

Understanding MPLS/VPN Security Issues Session SEC-370 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 44

Please Complete Your Evaluation Form Session SEC-370 SEC-370 2003, Cisco Systems, Inc. All rights reserved. 45

Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 46