MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow



Similar documents
Why Is MPLS VPN Security Important?

MPLS VPN Security in Service Provider Networks

MPLS VPN Security BRKSEC-2145

MPLS Security Considerations

MPLS Virtual Private Network (VPN) Security

SEC , Cisco Systems, Inc. All rights reserved.

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems

MPLS VPN Security Best Practice Guidelines

Introduction Inter-AS L3VPN

Security of the MPLS Architecture

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

BGP-MPLS IP VPN Network Security

Introduction to MPLS-based VPNs

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

Introducing Basic MPLS Concepts

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

For internal circulation of BSNLonly

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

Implementing Cisco MPLS

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

Virtual Private Networks. Juha Heinänen Song Networks

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

MPLS Implementation MPLS VPN

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Implementing MPLS VPNs over IP Tunnels

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Kingston University London

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

How Routers Forward Packets

MPLS-based Layer 3 VPNs

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MPLS Inter-AS VPNs. Configuration on Cisco Devices

Enterprise Network Simulation Using MPLS- BGP

- Multiprotocol Label Switching -

RFC 2547bis: BGP/MPLS VPN Fundamentals

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

IPv6 over IPv4/MPLS Networks: The 6PE approach

S ITGuru Exercise (3: Building the MPLS BGP VPN) Spring 2006

Interconnecting Cisco Networking Devices Part 2

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Junos MPLS and VPNs (JMV)

IPv6 over MPLS VPN. Contents. Prerequisites. Document ID: Requirements

MPLS Concepts. Overview. Objectives

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Table of Contents. Cisco Configuring a Basic MPLS VPN

How To Make A Network Secure

MPLS VPN Route Target Rewrite

Addressing Inter Provider Connections With MPLS-ICI

MPLS L2VPN (VLL) Technology White Paper

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Provisioning Cable Services

Quidway MPLS VPN Solution for Financial Networks

: Interconnecting Cisco Networking Devices Part 2 v1.1

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

Fundamentals Multiprotocol Label Switching MPLS III

MPLS VPN Implementation

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments

HP Networking BGP and MPLS technology training

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Frame Mode MPLS Implementation

Configuring a Basic MPLS VPN

BUY ONLINE AT:

INTRODUCTION TO L2VPNS

MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Case Study for Layer 3 Authentication and Encryption

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

IPv6 Fundamentals, Design, and Deployment

Network Virtualization Network Admission Control Deployment Guide

Layer 3 MPLS VPN Enterprise Consumer Guide Version 2

MPLS in Private Networks Is It a Good Idea?

SBSCET, Firozpur (Punjab), India

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

MPLS/BGP Network Simulation Techniques for Business Enterprise Networks

Regaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud

Implementing VPN over MPLS

Transcription:

MPLS VPN Security in Service Provider Networks Peter Tomsu Michael Behringer Monique Morrow 1

About this Presentation Advanced level advanced MPLS concepts and architectures. Target Audience: Service provider!! Network operators and designers Technical focus 2

Why Is MPLS VPN Security Important? Customer buys Internet Service : Packets from SP are not trusted Perception: Need for firewalls, etc. Customer buys a VPN Service : Packets from SP are trusted Perception: No further security required SP Must Ensure Secure MPLS Operations 3

Objectives Understand how secure MPLS VPNs* are And what IPsec offers in addition Best practices on how to secure General MPLS VPN deployments Inter-provider VPN Specific cases (Internet, etc) * Here: MPLS VPN = RFC 4364 (old RFC 2547bis) 4

MPLS VPN Security _ Agenda Analysis of the Architecture Secure MPLS VPN Design General Best Practices Internet Access Inter-AS and CsC IPsec and MPLS Outlook Summary 5

Analysis of the MPLS VPN Architecture (RFC 4364) 6

Comparison with ATM/FR Address Space Separation Routing Separation Resistance to Attacks Resistance to Label Spoofing Direct CE-CE Authentication (Layer 3) ATM/FR Yes Yes Yes Yes Yes MPLS Yes Yes Yes Yes With IPsec 7

Basic RFC 4364 Security: Today s Arguments Can be mis-configured (operation) Routers can have bugs (implementation) PEs can be accessed from Internet, thus intrinsically insecure Floods over Internet can impact VPN traffic True, but same on ATM/FR PEs can be secured, as Internet routers Engineering/QoS 8

Security Relies on Three Pillars Security Architecture/ Algorithm Implementation Operation Break One, and All Security Is Gone! 9

mbehring Address Planes: True Separation! CE VPN1 Address Space 0.0.0.0 255.255.255.255 CE CE VPN2 Address Space 0.0.0.0 255.255.255.255 CE Several Data Planes: VPNv4 Addr. Control Plane: IPv4 Addr. PE P PE Core Address Space 0.0.0.0 255.255.255.255 PE-CE Interfaces Belong to VPN; Only Attack Point!! 10

Secure MPLS VPN Design _ General Security Best Practices 11

Secure MPLS/VPN Core Design 1. Secure each router individually 2. Don t let packets into (!) the core No way to attack core, except through routing, thus: 3. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 4. Design for transit traffic QoS to give VPN priority over Internet Choose correct router for bandwidth Separate PEs where necessary 5. Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks 12

PE-CE Routing Security In order of security preference: 1. Static: If no dynamic routing required (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. IGPs: If BGP not supported (limited security features) 13

Securing the Core: Infrastructure ACLs Easy with MPLS! CE PE VPN In MPLS: VRF Belongs to Customer VPN! On PE: deny ip any <PE VRF address space> Exception: routing protocol from host to host Idea: no traffic to PE/P you can t attack Prevents intrusions 100% DoS: very hard, but traffic over router theoretically enables DoS 14

Securing the Core: Infrastructure ACLs CE.2 1.1.1.0/30.1 PE VPN PE VPN.1 1.1.1.8/30.2 CE CE.2 1.1.1.4/30.1 PE VPN PE VPN.1 1.1.1.12/30.2 CE Example: deny ip any 1.1.1.0 0.0.0.255 permit ip any any Caution: This also blocks packets to the CE s! This Is VPN Address Space, Not Core! Alternatives: List all PE i/f in ACL, or use secondary i/f on CE, or ACL with dis-contiguous subnet masks (11111101) 15

Neighbor Authentication Router knows his neighbors Verification through shared MD5 secret Verifies updates it receives from neighbor Supported: BGP, ISIS, OSPF, EIGRP, RIPv2, LDP Key chains supported for ISIS, EIGRP, RIP Use them where available Easier key roll-over Support for LDP key chains soon Config easy 16

VRF Maximum Prefix Number Injection of too many routes: Potential memory overflow Potential DoS attack For a VRF: Specify the maximum number of routes allowed In This VRF ip vrf red maximum routes 45 80 Accept Max 45 Prefixes, and Log a Warning at 80% (of 45), 17

Control of Routes from a BGP Peer Injection of too many routes: Potential memory overflow Potential DoS attack Control with maximum prefix command (under the BGP neighbor definition) From This Neighbor Accept Max 45 Prefixes, Then Reset Session router bgp 13 neighbor 140.0.250.2 maximum-prefix 45 80 restart 2 Log a Warning at 80% (of 45), and Restart the BGP Session After Two Min. 18

Control of Routes from a BGP Peer: Logging 6d22h: %BGP-4-MAXPFX: No. of prefix received from 140.0.250.2 (afi 2) reaches 37, max 45 6d22h: %BGP-3-MAXPFXEXCEED: No. of prefix received from 140.0.250.2 (afi 2): 46 exceed limit 456d22h: %BGP- 5-ADJCHANGE: neighbor 140.0.250.2 vpn vrf VPN_20499 Down BGP Notification sent 6d22h: %BGP-3-NOTIFICATION: sent to neighbor 140.0.250.2 3/1 (update malformed) 0 bytes FFFF FFFF FF 19

Best Practice Security Overview Secure devices (PE, P): They are trusted! See next slide for risks PEs: Secure with ACLs on all interfaces; CoPP Static PE-CE routing where possible If routing: Use authentication (MD5) Maximum number of routes per peer (only BGP) Separation of CE-PE links where possible (Internet/VPN) Control Plane Policing LDP authentication (MD5) (key chains to be supported soon) VRF: Define maximum number of routes Note: Overall security depends on weakest link! 20

Key: PE Security What happens if a single PE in the core gets compromised? Intruder has access to all VPNs; GRE tunnel to his CE in the Internet, bring that CE into any VPN That VPN might not even notice Worst Case!!!! Therefore: PE Security is Paramount!!!!!!! Therefore: No PE on customer premises!!!!!!! (Think about console access, password recovery ) 21

No Service Password-Recovery Different implementations When password recovery erase NVRAM Password recovery impossible (really!) Where available: Use It! This makes it hard to intrude into a PE, even with physical access! 22

Solution: Operational Security Security depends on SP! Employee can make mistake, or malicious misconfiguration Potential Security hole: If PE compromised, VPNs might be insecure Cannot *prevent* all misconfigs Need to operationally control this 23

Operational Security Logging config changes; automated audits Dual Control: Network operators must have no access to logging facility See also: Router Security Audit (12.0(27)S, 12.2(18)S) AAA for access CLI views or AAA for command authorization Keep logs in a secure place (Malicious employee might change logs too) Tight control No service password-recovery where available Secure Operations Is Hard!!! 24

MPLS VPNs are Quite Secure Perfect Separation of VPNs No intrusions possible Perfect Separation of the Core from VPNs Again, no intrusions possible But there is one remaining issue 25

The Issue: DoS Through a Shared PE Might Affect VPN Customer PE Has Shared CPU/Memory/Bandwidth: Traffic COULD affect VPN customer (however, risk probably acceptable) MPLS core Customer VPN PE P P VPN Customer VRF CE1 P Internet Customer Internet VRF P P DoS Attack 26

Today s Best Practice: MPLS VPN Security Recommendation: PE Routers Should Contain Only VRFs of the Same Security Level; Example: Customer Network To Internet CE1 CE2 PE1 PE2 VRF Internet VRF VPN Level 0: Internet Level 1: VPN customers (Level 2: Mission critical infrastructure) To VPN Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and conditions are right 27

Separate VPN and Internet Access Customer LAN MPLS core To Internet Firewall/NAT CE1 PE1 P VRF Internet IDS CE2 PE2 VRF VPN To VPN Separation: +++ DoS resistance: +++ Cost: $$$ (two lines and two PEs: expensive!) 28

Shared Access Line, CE with VRF Lite Customer LAN MPLS core Firewall/NAT Internet CE PE1 P IDS VRF Internet VRF Internet VRF VPN FR Logical Links Separation: +++ DoS resistance: + (DoS might affect VPN on PE, line, CE) Cost: $ Note: CE config more complex here! 29

Hub-and-Spoke VPN with Internet Access Hub Site MPLS core Internet Firewall NAT Internet CE PE1 To Internet _ VRF Internet IDS VPN CE PE2 To VPN mbehring VRF VPN PEs VPN VPN VPN CEs Spoke 1 Spoke 2 Spoke 3 30

MPLS Deployment Scenarios Shared MPLS Core & Edge Shared MPLS Core & Separate Edge Separate MPLS Core & Edge Public/Private PE Public PE Private PE Public PE Private PE MPLS Core MPLS Core MPLS Core MPLS Core MPLS Core Network Single MPLS core for both public IP and private VPN traffic Optional BGP/Internet free core Single MPLS core for both public IP and private VPN traffic Optional BGP/Internet free core Separate MPLS cores for public IP and private VPN traffic Optional BGP/Internet free core MPLS Edge Network PE routers terminate both public IP and private VPN connections Dedicated PE routers used for termination of public IP and private VPN connections Dedicated PE routers used for termination of public IP and private VPN connections 31

Current MPLS Deployments Internal survey of key SP customers on deployment of public and private MPLS services Separate MPLS core & edge Shared MPLS core & separate edge Shared MPLS core & edge No common MPLS deployment preference Balanced distribution of various MPLS deployment scenarios 31% 38% 31% Separate MPLS Core & Edge Shared MPLS Core & Separate Edge Shared MPLS Core & Edge Source: Internal 2006 MPLS Security Survey by Michael Behringer. 32

Future MPLS Deployment Plans Future MPLS deployment plans indicate increasing network consolidation Increasing number of shared MPLS core deployments Common MPLS core for public and private services Migration of both public and private services onto single MPLS edge 19% 31% 50% Separate MPLS Core & Edge Shared MPLS Core & Separate Edge Shared MPLS Core & Edge Source: Internal 2006 MPLS Security Survey by Michael Behringer. 33

Alternative Model for Securing PEs Untrusted Network CE PE Core Block packets to PE (actually, entire core!) on CE (!) Core not attackable from outside (Attacks with transit traffic still theoretically possible) BUT: CE must be trusted!!! Can we really assume that??? 34

How Can We Trust the CE? Untrusted Network CE PE Core Goal: No unauthorised change / bypass of CE config Strong CE security (basic router security) No service password-recovery Prevents config access through console/aux ports Some form of authentication Protects against another device being used instead of CE PPPoX, routing authentication (but then routing required) 35

Secure MPLS VPN Design _ Internet Access 36

Internet Provisioning on an MPLS Core Two basic possibilities: 1. Internet in global table, either: 1a) Internet-free core (using LSPs between PEs) 1b) hop-by-hop routing 2. Internet in VRF Internet carried as a VPN on the core This is the default!!! 37

Internet in the Global Routing Table Using LSPs Between PEs Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) LSP Internet Customer 38

Internet in the Global Routing Table Using LSPs Between PEs Default behavior, if Internet in global table!! On ingress PE: BGP next hop: Egress PE loopback Next hop to egress usually has label! LSP is used to reach egress PE P routers do not need to know Internet routes (nor run BGP) Security consequence: PE routers are fully reachable from Internet, by default (bi-directional) P routers are also by default reachable from Internet; but only uni-directional, they don t know the way back! 39

Internet in the Global Routing Table Using LSPs Between PEs Recommendations: Fully secure each router! Do not advertise IGP routes outside (This is a general security recommendation for all cores!) P routers not reachable (unless someone defaults to you) PE routers not reachable (possible exception: Peering PE) Infrastructure ACLs to block core space: Additional security mechanism Even if someone defaults to you, he cannot reach the core 40

Internet in the Global Routing Table Hop-by-Hop Routing Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) Internet Customer 41

Internet in the Global Routing Table Hop-by-Hop Routing Like in standard IP core Each router speaks BGP, and carries Internet routes Not default, must be configured! Security consequence: P and PE routers by default fully reachable from Internet Recommendations: (like before) Fully secure each router! Do not advertise IGP routes outside Infrastructure ACLs 42

Internet in a VRF Internet Service Provider Internet CE VPN Customer Customer PE P Internet PE P Customer PE VPN Customer VPN Customer Internet Routing Table (Global Routing Table) VPN Routing Table (VRF) Internet in a VRF Internet Customer 43

Internet in a VRF Internet is a VPN on the core Full separation to other VPNs, and the core, by default! Connection between Internet and a VPN (for service) must be specifically configured Security consequence: P routers not reachable from anywhere! PE routers only reachable on outbound facing interfaces; Very limited Much easier to secure But!!! Routes in a VRF take more memory!! Convergence times increase These are serious issues! 44

Internet in a VRF Recommendations: Fully secure each router (you never know ) Secure external facing PE interfaces! Use Infrastructure ACLs for this (see earlier) (Internal PE i/f and P cannot be reached from outside) 45

Alternatively: No Internet on the Core Pure MPLS VPN service considered most secure But what about: PE PE CE B VRF B VRF B CE B CE A VRF A mbehring VRF Ambehring CE A Internet Service Provider however, bandwidth usually limited and some firewall / control applied 46

Secure MPLS VPN Design _ Inter-AS and CsC 47

Inter-AS: What are we trying to achieve? An SP should have: 100% (full) reachability to all Inter-AS VPNs (control plane and data plane) 0% (no) reachability to VPNs that are NOT shared (control plane and data plane) SP networks should be independent: Not attackable from outside (other SP, customer, Internet) Limited reachability from outside 48

Inter-AS: What Are We NOT Trying to Achieve? Any Form of Separation Between Inter-AS VPNs (Control or Data Plane) Interconnection of VPNs is 100% No firewalling, no limitations, no sanity checks within an Inter-AS VPN If an SP Holds VPN Sites in an Inter-AS Set-Up, He Has Full Access to All VPN Sites, Also on Other ASes 49

Inter-AS: The Options Option A VRF back to back; IP interface Option B ASBRs exchange labelled VPN prefixes; labelled interface Option C ASBRs don t hold VPN information - only RRs do; labelled interface security functionality ASBR: Autonomous System Border Router RR: Route Reflector VRF: Virtual Routing and Forwarding instance 50

Inter-AS: Case A VRF-VRF Back-to-Back Cust. CE AS 1 AS 2 PE ASBR PE ASBR Cust. CE mbehring LSP IP Data LSP Control plane: No signalling, no labels Data plane: IPv4 only, no labels accepted Security: as in RFC 2547 (single-as) SPs are completely separated 51

Security of Inter-AS case A Static mapping Only IP interfaces SP1 does not see SP2 s network And does not run routing with SP2, except within the VPNs Quite secure Potential issues: SP 1 can connect VPN connection wrongly (like in ATM/FR) Customer can flood routing table on PE (this is the same issue as in RFC 2547 (single-as); solution: prefix limits) 52

Inter-AS: Case B ASBRs Exchange Labeled VPNv4 Routes Cust. CE AS 1 AS 2 PE ASBR MP-eBGP+Labels ASBR PE Cust. CE mbehring LSP VPN label IP Data LSP Control plane: MP-eBGP, labels Data plane: Packets with one label Labeled packets at interface Lookup in LFIB But not checked, thus spoofing possible! 53

Security of Inter-AS Case B: Summary Control Plane can be secured well Data Plane has some security issues: Label is not checked today (since i/f in global table) Labelled packets on any MPLS i/f will be forwarded if LFIB entry exists Potential Issues: Insertion of traffic into non-shared VPNs (uni-directional only) (requires compromised/faulty ASBR, remote exploit not possible) All global i/f on an ASBR share the same LFIB, thus might affect third parties Good: No visibility of other AS (except ASBR i/f) 54

Inter-AS Case C: ASBRs Exchange PE loopbacks Cust. CE AS 1 AS 2 VPNv4 Routes + Labels PE ASBR PE Loopb+Labels PE ASBR Cust. CE mbehring LSP PE label VPN IP Data Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4 routes + labels Data plane: PE label + VPN label AS1 can insert traffic into VPNs in AS2 Only requirement: Must have LSP to correct egress PE Customer must trust both SPs More scalable, but worse for security! 55

Security of Inter-AS Case C ASBR-ASBR signalling (BGP) RR-RR signalling (MP-BGP) Much more open than Case A and B More interfaces, more visible parts (PE, RR) Potential Issues: SP1 can intrude into any VPN on PEs which have a Inter-AS VPN configured Cannot check what s underneath the PE label Very open architecture Acceptable for ASes controlled by the same SP 56

Inter-AS Summary and Recommendation Three different models for Inter-AS Different security properties Most secure: Static VRF connections (case A), but least scalable Basically the SPs have to trust each other Hard/impossible to secure against other SP in this model But: Can monitor with MPLS aware NetFlow (!!) Okay if all ASes in control of one SP Current Recommendation: Use case A 57

IPsec and MPLS 58

Use IPSec If You Need: Encryption of traffic Direct authentication of CEs Integrity of traffic Replay detection Or: If you don t want to trust your ISP for traffic separation! 59

Where to Apply IPSec CE PE PE CE IPSec CE-CE IPSec CE-PE IPSec PE-PE Application: Remote Access into VPN Application: VPN Security Application: Special Cases (See Later) 60

How to Establish IPSec: Options Option 1: Static IPSec Pre-configure static IPSec tunnels Works, but does not scale well Option 2: Dynamic Cryptomap/ Tunnel Endpoint Discovery Scaling improvements over 1). Option 3: DMVPN Dynamic tunnel establishment Easy to configure and maintain Some scaling issues Option 4: GET VPN Easy to configure and maintain Scales well Dynamic Multipoint VPN Group Encrypted Transport 61

GET VPN: IPsec Made Easy! launched Dec 2006 Traditional IPsec: - n 2 Problem (scalability) IKE/IPsec Key Server GET VPN: - 2 Security Associations - to the key server (~IKE) - to the group (IPsec) Only 1 group association needed! IPsec 62

Outlook 63

What We Are Working On GET VPN: Platform support PE Security: Control Plane Protection (VRF aware) General router security improvements LDP and Routing: Better MD5 key management (eg LDP key chains) LDP lossless key change Many more features 64

Summary 65

MPLS doesn t provide: Protection against mis-configurations in the core Protection against attacks from within the core Confidentiality, authentication, integrity, anti-replay -> Use IPsec if required Customer network security 66

Summary MPLS VPNs can be secured as well as ATM/FR VPNs Security depends on correct operation and implementation MPLS backbones can be more secure than normal IP backbones Core not accessible from outside Separate control and data plane Key: PE security Advantage: Only PE-CE interfaces accessible from outside Makes security easier than in normal networks 67

For More Information: MPLS VPN Security Authors: Michael Behringer Monique Morrow Cisco Press, ISBN: 1587051834 Published June, 2005 68

Additional Information MPLS Security White Paper: http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/mxinf_ds.htm Analysis of the security of the MPLS architecture RFC on MPLS VPN Security: http://www.ietf.org/rfc/rfc4381.txt Miercom MPLS test report: http://www.mier.com/reports/cisco/mpls-vpns.pdf Practical tests show that MPLS is secure Garnter research note M-17-1953: "MPLS Networks: Drivers Beat Inhibitors in 2003"; 10 Feb 2003 69

Q and A 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 70

71