MPLS Security Considerations



Similar documents
Why Is MPLS VPN Security Important?

SEC , Cisco Systems, Inc. All rights reserved.

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

MPLS VPN Security BRKSEC-2145

MPLS VPN Security in Service Provider Networks

MPLS Virtual Private Network (VPN) Security

Security of the MPLS Architecture

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

BGP-MPLS IP VPN Network Security

MPLS VPN Security. Intelligent Information Network. Klaudia Bakšová Systems Engineer, Cisco Systems

MPLS VPN Security Best Practice Guidelines

Introduction to MPLS-based VPNs

MPLS Implementation MPLS VPN

Introducing Basic MPLS Concepts

Introduction Inter-AS L3VPN

For internal circulation of BSNLonly

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

DD2491 p MPLS/BGP VPNs. Olof Hagsand KTH CSC

Expert Reference Series of White Papers. An Overview of MPLS VPNs: Overlay; Layer 3; and PseudoWire

Virtual Private Networks. Juha Heinänen Song Networks

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Quidway MPLS VPN Solution for Financial Networks

Enterprise Network Simulation Using MPLS- BGP

IPv6 over IPv4/MPLS Networks: The 6PE approach

Implementing Cisco Service Provider Next-Generation Edge Network Services **Part of the CCNP Service Provider track**

RFC 2547bis: BGP/MPLS VPN Fundamentals

How To Make A Network Secure

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

Provisioning Cable Services

Junos MPLS and VPNs (JMV)

VPN Technologies A Comparison

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

How Routers Forward Packets

Fundamentals Multiprotocol Label Switching MPLS III

Kingston University London

Implementing VPN over MPLS

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Table of Contents. Cisco Configuring a Basic MPLS VPN

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS L2VPN (VLL) Technology White Paper

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

Implementing Cisco MPLS

SBSCET, Firozpur (Punjab), India

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

MPLS in Private Networks Is It a Good Idea?

IMPLEMENTING CISCO MPLS V2.3 (MPLS)

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

AMPLS - Advanced Implementing and Troubleshooting MPLS VPN Networks v4.0

Implementing MPLS VPNs over IP Tunnels

How To Protect Your Network From Attack

MPLS-based Layer 3 VPNs

DD2491 p BGP-MPLS VPNs. Olof Hagsand KTH/CSC

Methods of interconnecting MPLS Networks

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Multi Protocol Label Switching (MPLS) is a core networking technology that

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

MPLS Concepts. Overview. Objectives

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

Interconnecting Cisco Networking Devices Part 2

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

MPLS VPN Implementation

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

INTRODUCTION TO L2VPNS

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Addressing Inter Provider Connections With MPLS-ICI

Configure ISDN Backup and VPN Connection

Transition to IPv6 in Service Providers

MPLS over Various IP Tunnels. W. Mark Townsley

Example: Advertised Distance (AD) Example: Feasible Distance (FD) Example: Successor and Feasible Successor Example: Successor and Feasible Successor

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

IPv6 Migration Challenges for Large Service Providers

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

IPv6 Fundamentals, Design, and Deployment

Case Study for Layer 3 Authentication and Encryption

Campus LAN at NKN Member Institutions

Configuring a Basic MPLS VPN

Layer 3 Multiprotocol Label Switching Virtual Private Network

Transcription:

MPLS Security Considerations Monique J. Morrow, Cisco Systems mmorrow@cisco.com November 1 2004 MPLS JAPAN 2004 1

Acknowledgments Michael Behringer, Cisco Systems 2

Why is MPLS Security Important? Customer buys Internet Service : Packets from SP are not trusted Perception: Need for firewalls, etc. Customer buys a VPN Service : Packets from SP are trusted Perception: No further security required SP Must Ensure Secure MPLS Operations 3

Security Relies on Three Pillars Security Architecture/ Algorithm Implementation Operation Break One, and All Security Is Gone! 4

Basic 2547 Security: Today s Arguments Can be misconfigured (operation) Routers can have bugs (implementation) PEs can be accessed from Internet, thus intrinsicly insecure Floods over Internet can impact VPN traffic True, but Same on ATM/FR PEs Can Be Secured, as Internet Routers Engineering/QoS 5

Correct Security Analysis Security has to be analyzed on three levels: Architecture/algorithm Implementation Operation Applied to MPLS/VPN: 1. The MPLS Architecture is secure (can be operated securely) 2. Implementation/operation issues may exist, like in any other technology 6

Protecting an MPLS/VPN Core Overview 1. Don t let packets into (!) the core No way to attack core, except through routing, thus: 2. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 3. Design for transit traffic QoS to give VPN priority over Internet Choose correct router for bandwidth Separate PEs where necessary 4. Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks 7

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 8

General VPN Security Requirements Address Space and Routing Separation Hiding of the MPLS Core Structure Resistance to Attacks Impossibility of VPN Spoofing Working assumption: The core (PE+P) is secure 9

Hiding of the MPLS Core Structure MPLS core Visible Address Space CE1 IP(CE1) IP(PE; fa0) VRF CE1 PE IP(PE; l0) P P P P CE2 IP(CE2) IP(PE; fa1) VRF CE2 VRF contains MPLS IPv4 addresses Only peering Interface (on PE) exposed (-> CE)! -> ACL or unnumbered 10 10

Resistance to Attacks: Where and How? Where can you attack? How? Address and Routing Separation, thus: Only Attack point: peering PE - Intrusions (telnet, SNMP,, routing protocol) -DoS Secure with ACLs Secure with MD5 See ISP Essentials 11 11

Label Spoofing PE router expects IP packet from CE Labelled packets will be dropped Thus no spoofing possible 12 12

Comparison with ATM / FR ATM/FR MPLS Address space separation yes yes Routing separation yes yes Resistance to attacks yes yes Resistance to Label Spoofing Direct CE-CE Authentication (layer 3) yes yes yes with IPsec 13 13

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 14 14

Security Recommendations for ISPs Secure devices (PE, P): They are trusted! Core (PE+P): Secure with ACLs on all interfaces Ideal: deny ip any <core-networks> Static PE-CE routing where possible If routing: Use authentication (MD5) Separation of CE-PE links where possible (Internet / VPN) LDP authentication (MD5) VRF: Define maximum number of routes Note: Overall security depends on weakest link! 15 15

PE-CE Routing Security In order of security preference: 1. Static: If no dynamic routing required (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. IGPs: If BGP not supported (limited security features) 16 16

Securing the MPLS Core CE CE PE VPN P MPLS core BGP Route Reflector P PE P VPN Internet CE VPN PE PE VPN VPN PE BGP peering with MD5 authentic. LDP with MD5 CE CE ACL and secure routing 17 CE 17

mbehring Address Planes: True Separation! CE VPN1 address space 0.0.0.0 255.255.255.255 CE CE VPN2 address space 0.0.0.0 255.255.255.255 CE several data planes control plane PE P core address space 0.0.0.0 255.255.255.255 PE PE-CE interfaces belong to VPN. Only attack point!! 18 18

Securing the Core: Infrastructure ACLs Easy with MPLS! CE PE VPN In MPLS: VRF belongs to customer VPN! On PE: deny ip any <PE VRF address space> Exception: Routing protocol from host to host Idea: No traffic to PE/P you can t attack Prevents intrusions 100% DoS: Very hard, but traffic over router theoretically enables DoS. 19 19

Securing the Core: Infrastructure ACLs CE.2 1.1.1.0/30.1 PE VPN PE VPN.1 1.1.1.8/30.2 CE CE.2 1.1.1.4/30.1 PE VPN PE VPN.1 1.1.1.12/30.2 CE Example: deny ip any 1.1.1.0 0.0.0.255 permit ip any any This is VPN address space, not core! Caution: This also blocks packets to the CE s! Alternatives: List all PE i/f in ACL, or use secondary i/f on CE 20 20

Best Practice Security Overview Secure devices (PE, P): They are trusted PEs: Secure with ACLs on all interfaces Static PE-CE routing where possible If routing: Use authentication (MD5) Maximum number of routes per peer (only BGP) Separation of CE-PE links where possible (Internet/VPN) LDP authentication (MD5) VRF: Define maximum number of routes Note: Overall security depends on weakest link 21 21

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 22 22

MPLS Internet Architectures: Principles Core supports VPNs and Internet VPNs remain separated Internet as an option for a VPN Essential: Firewalling 23 23

MPLS VPNs Are Quite Secure Perfect separation of VPNs No intrusions possible Perfect separation of the core from VPNs Again, no intrusions possible BUT THERE IS ONE REMAINING ISSUE 24 24

The Key Issue: DoS through a Shared PE Might Affect VPN Customer MPLS Core VPN Customer Customer VPN PE P P Internet Customer VRF CE1 Internet VRF PE has shared CPU / memory / bandwidth: Traffic could affect VPN customer (However, risk probably acceptable) P P P DoS Attack 25 25

Today s Best Practice: MPLS VPN Security Recommendation: To Internet CE1 PE1 PE routers should contain only VRFs of the same security level. Example: customer network CE2 PE2 VRF Internet VRF VPN Level 0: Internet Level 1: VPN customers (Level 2: Mission critical infrastructure) To VPN Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and conditions are right. 26 26

Separate VPN and Internet Access Customer LAN MPLS core To Internet Firewall / NAT CE1 PE1 P VRF Internet IDS CE2 PE2 VRF VPN To VPN Separation: +++ DoS resistance: +++ Cost: $$$ (Two lines and two PEs: Expensive!) 27 27

Separate Access Lines + CEs, one PE Customer LAN MPLS core To Internet Firewall / NAT CE1 PE1 P IDS CE2 VRF Internet VRF VPN To VPN Separation: +++ DoS resistance: Cost: ++ (DoS might impact VPN on PE) $$ (Two lines, but only one PE) 28 28

Using a Single Access Line Requirements to share a line: PE requires separate sub-interfaces CE requires separate sub-interfaces CE side requires separate routing 29 29

Shared Access Line, Frame Relay Customer LAN MPLS core Firewall / NAT Internet CE PE1 P IDS VPN CE VRF Internet VRF VPN FR switching FR logical links Separation: +++ DoS resistance: Cost: $ + (DoS might affect VPN on PE, line, CE) 30 30

Hub-and-Spoke VPN with Internet Access Hub Site MPLS core Internet Firewall NAT Internet CE PE1 To Internet --> VRF Internet IDS VPN CE PE2 To VPN mbehring VRF VPN PEs VPN VPN VPN CEs Spoke 1 Spoke 2 Spoke 3 31 31

Alternative Topologies Full VPN mesh, one Internet Access Internet access at several sites -> Several firewalls needed -> More complex Internet Access from all sites -> Complex, one firewall per site 32 32

From RFC2547bis: Data Plane Protection 1. a backbone router does not accept labeled packets over a particular data link, unless it is known that that data link attaches only to trusted systems, or unless it is known that such packets will leave the backbone before the IP header or any labels lower in the stack will be inspected, and Inter-AS should only be provisioned over secure, private peerings Specifically NOT: Internet Exchange Points (anyone could send labelled packets!! No filtering possible!!) 33 33

From RFC2547bis: Control Plane Protection 2. labeled VPN-IPv4 routes are not accepted from untrusted or unreliable routing peers, Accept routes with labels only from trusted peers Plus usual BGP filtering (see ISP Essentials*) 34 34

Inter-AS: Case 10.a) VRF-VRF back-to-back Cust. CE AS 1 AS 2 PE ASBR PE ASBR Cust. CE mbehring LSP IP data LSP Control plane: No signalling, no labels Data plane: IPv4 only, no labels accepted Security: as in 2547 Customer must trust both SPs 35 35

Security of Inter-AS 10.a) Static mapping SP1 does not see SP2 s network And does not run routing with SP2, except within the VPNs. Quite secure Potential issues: SP 1 can connect VPN connection wrongly (like in ATM/FR) 36 36

Inter-AS: Case 10.b) ASBR exchange labelled VPNv4 routes Cust. CE AS 1 AS 2 PE ASBR MP-BGP+labels ASBR PE Cust. CE mbehring LSP VPN label IP data LSP Control plane: MP-BGP, labels Data plane: Packets with one label AS1 can insert traffic into any shared VPN of AS2 Customer must trust both SPs 37 37

Security of Inter-AS 10.b) ASBR1 does signalling with ASBR2 MP-BGP: has to be secured, dampening etc Otherwise no visibility of the other AS (ASBR1 ASBR2 is the only interface between the SPs.) Potential Issues: SP1 can bring wrong CEs into any shared VPN SP1 can send packets into any shared VPN (not into VPNs that are not shared, since label is checked); SP can make any shared VPN insecure 38 38

Inter-AS: Case 10.c) ASBRs exchange PE loopbacks Cust. CE AS 1 AS 2 VPNv4 routes + labels PE ASBR PE loopb+labels PE ASBR Cust. CE mbehring LSP PE label VPN IP data Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4 routes + labels Data plane: PE label + VPN label AS1 can insert traffic into VPNs in AS2 Customer must trust both SPs 39 39

Security of Inter-AS 10.c) ASBR-ASBR signalling (BGP) RR-RR signalling (MP-BGP) Much more open than 10.a) and 10.b) LSPs between PEs, BGP between RR, ASBR Potential Issues: SP1 can bring a CE into any VPN on shared PEs SP1 can intrude into any VPN on shared PEs Very open architecture probably only applicable for ASes controlled by the same SP. 40 40

Inter-AS Summary and Recommendation Three different models for Inter-AS Different security properties Most secure: Static VRF connections (10.a), but least scalable Basically the SPs have to trust each other Hard / impossible to secure against other SP in this model Okay if all ASes in control of one SP Current Recommendation: Use 10.a) 41 41

Inter-AS Recommendation Start with 10.a) (static VPN connections) Not many Inter-AS customers yet anyway Easy start Maybe at some point (when many Inter-AS customers), move to 10.b) (ease of provisioning) 10.c) felt by most SPs as too open. Current recommendation: Only when both ASes under one common control 42 42

Carrier s Carrier Cust. CE PE Carrier Carrier s Carrier Carrier PE Cust. CE PE PE PE PE IP data IP data label IP data label IP data label label IP data Same principles as in normal MPLS Customer trusts carrier who trusts carrier 43 43

Carrier s Carrier: The Interface Carrier PE2 Carrier s Carrier PE1 Control Plane: PE1 assigns label to PE2 Data Plane: PE1 only accepts packets with this label on this i/f PE1 controls data plane No label spoofing possible 44 44

Carrier s Carrier: Summary Can be secured well Carrier has VPN on Carrier s Carrier MPLS cloud Carrier cannot intrude into other VPNs. Carrier can mess up his own VPN (VPNs he offers to his customers) End customer must trust both SPs. 45 45

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 46 46

Key: PE Security What happens if a single PE in the core gets compromised? Intruder has access to all VPNs; GRE tunnel to his CE in the Internet, bring that CE into any VPN. That VPN might not even notice Worst Case! Therefore: PE SECURITY IS PARAMOUNT! Therefore: No PE on customer premises! (Think about console access, password recovery ) 47 47

Solution: Operational Security Security depends on SP! Employee can make mistake, or malicious misconfiguration Potential Security hole: If PE compromised, VPNs might be insecure Cannot *prevent* all misconfigs Need to operationally control this 48 48

Operational Security Logging config changes Dual Control: Network operators must have no access to logging facility Otherwise they can hack the network, and delete the logs AAA for access AAA for command authorization Keep logs in a secure place (Malicious employee might change logs too) Tight control No service password-recovery where available Secure Operations is Hard!!! 49 49

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 50 50

Ways to Attack Intrusion : Get un-authorized access Theory: Not possible (as shown before) Practice: Depends on: - Vendor implementation - Correct config and management Denial-of-Service : Deny access of others Much more interesting No Trust? Use IPsec between CEs! 51 51

DoS Against MPLS DoS is about Resource Starvation, one of: Bandwidth CPU Memory (buffers, routing tables ) In MPLS, we have to examine: CE PE Rest is the same as in other networks 52 52

Attacking a CE from MPLS (other VPN) Is the CE reachable from the MPLS side? -> only if this is an Internet CE, otherwise not! (CE-PE addressing is part of VPN!) For Internet CEs: Same security rules apply as for any other access router. MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks 53 53

Attacking a CE-PE Line Also depends on reachability of CE or the VPN behind it Only an issue for Lines to Internet-CEs Same considerations as in normal networks If CE-PE line shared (VPN and Internet): DoS on Internet may influence VPN! Use CAR! MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks 54 54

Attacking a PE Router PE CE1 IP(CE1) IP(PE; fa0) IP(PE; l0) VRF CE1 IP(P) CE2 IP(CE2) IP(PE; fa1) VRF CE2 Attack points VRF Internet Only visible: your interface and interfaces of Internet CEs 55 55

DoS Attacks to PE Can Come from Other VPN, connected to same PE Internet, if PE carries Internet VRF Possible Attacks: Resource starvation on PE Too many routing updates, too many SNMP requests, small servers Has to Be Secured and Can Be Secured! 56 56

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 57 57

Use IPsec if you need: Encryption of traffic Direct authentication of CEs Integrity of traffic Replay detection Or: If you don t want to trust your ISP for traffic separation! 58 58

Where to Apply IPSec CE PE PE CE IPSec CE-CE IPSec CE-PE IPSec PE-PE Application: VPN Security Application: Special Cases (see later) Application: Remote Access into VPN 59 59

PE-PE IPSec Internet Draft Use of PE-PE IPSec in RFC2547 VPNs (E. Rosen et al) draft-ietf-l3vpn-ipsec-2547-02.txt IPSec instead of LSP inside 2547bis core Does not define IPSec specific mechanism Key exchange, SA scalability, 60 60

Applications of PE-PE IPSec If core is not pure MPLS, but IP based Standard 2547bis requires MPLS core, PE-PE IPSec does not Alternative: MPLS in IP/GRE/L2TPv3, but with PE-PE IPSec spoofing impossible Protect against misbehaving transit nodes Protection against sniffing on core lines 61 61

Non-Application: Customer Security Hacker wants to IPSec IPSec CE-CE PE-PE read VPN traffic insert traffic into VPN join a VPN DoS a VPN / the core Protects Fully Protects Fully Protects Fully Doesn t Protect Protects Partially Protects Partially Doesn t Protect Doesn t Protect 62 62

Non-Application: Customer Security IPSec Security Associations that associate ingress PE routes with egress PE routers do not ensure privacy for VPN data. The data is exposed on the PE-CE access links, and is exposed in the PE routers themselves. draft-ietf-l3vpn-ipsec-2547-02.txt CE PE PE CE IPSec Unsecured Unsecured 63 63

PE-PE IPSec: Encapsulation (draft-ietf-l3vpn-ipsec-2547-02.txt) 1. Pre-pend the VPN label, as in normal MPLS 2. Encapsulate: MPLS in GRE or IP (tunnel between PEs) IP Header GRE 3. Apply IPsec transport mode IP Header ESP/AH GRE VPN Label VPN Label VPN Label IP Header Data IP Header Data IP Header Data IPSec Transport Header Protected ( ) Normal MPLS: PE Label VPN Label IP Header Data 64 64

PE-PE IPSec: How It Works BGP + Ext. Community 1. Egress PE Signals IPSec Policy Per VPN Prefix VPN PE IPSec PE VPN 2. Inress PEs Establish IPSec Tunnel for Prefix Not defined in draft: How to establish IPSec tunnel 65 65

Agenda Analysis of MPLS/VPN Security Security Recommendations Secure MPLS VPN Design Internet Access Secure Operations Attacking an MPLS Network IPsec and MPLS Summary 66 66

MPLS Doesn t Provide Protection against misconfigurations in the core Protection against attacks from within the core Confidentiality, authentication, integrity, anti-replay Use IPSec if required Customer network security 67 67

MPLS Security Overview 1. Don t let packets into (!) the core No way to attack core, except through routing, thus: 2. Secure the routing protocol Neighbor authentication, maximum routes, dampening, 3. Design for transit traffic QoS to give VPN priority over Internet Choose correct router for bandwidth Separate PEs where necessary 4. Operate Securely Still Open : Routing Protocol Only Attack Vector: Transit Traffic Now Only Insider Attacks Possible Avoid Insider Attacks 68 68

Summary MPLS VPNs can be secured as well as ATM/FR VPNs Security depends on correct operation and implementation MPLS backbones can be more secure than normal IP backbones Core not accessible from outside Separate control and data plane Key: PE security Advantage: Only PE-CE interfaces accessible from outside Makes security easier than in normal networks 69 69

References RFC2082 RIP-2 MD5 Authentication RFC2154 OSPF with Digital Signatures RFC2385 Protection of BGP Sessions via the TCP MD5 Signature Option RFC3013 Recommended Internet Service Provider Security Services and Procedures RFC2196 Site Security Handbook MPLS and VPN Architectures ISBN 1-58705-002-1 Cisco ISP Essentials ISBN 1-58705-041-2 (http://www.ispbook.com/) http://www.cisco.com/public/cons/isp/documents/iosessentialspdf.zip General Information on Securing Cisco Routers http://www.cisco.com/en/us/tech/tk648/tk362/technologies_tech_note09186a0 080120f48.shtml Cisco Secure Virtual Private Networks - ISBN 1-58705-033-1 70 70

Q and A Presentation_ID 2003 Cisco Systems, Inc. All rights reserved. 71

Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 72

Backup Material MPLS JAPAN 2004 73

Non-IP networks: Not 100% secure!! Example: Telephone Network I had access to most, if not all, of the switches in Las Vegas, testified Mitnick, at a hearing of Nevada's Public Utilities Commission (PUC). I had the same privileges as a Northern Telecom technician. Source: http://online.securityfocus.com/news/497 74 74

Non-IP networks: Not 100% secure!! Example: ATM Switch a single 'land' packet sent to the telnet port (23) of either the inband or out-ofband interface will cause the device to stop responding to ip traffic. Over the course of 6-1/2 minutes, all CPU will be consumed and device reboots. Source: Bugtraq, 15 June 2002: Fore/Marconi ATM Switch 'land' vulnerability, by seeker_sojourn@hotmail.com; 75 75