MPLS over Various IP Tunnels. W. Mark Townsley



Similar documents
MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Cisco Which VPN Solution is Right for You?

Virtual Private Networks. Juha Heinänen Song Networks

Introduction to MPLS-based VPNs

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

WAN Topologies MPLS. 2006, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr Cisco Systems, Inc. All rights reserved.

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Introducing Basic MPLS Concepts

How Routers Forward Packets

Requirements for VoIP Header Compression over Multiple-Hop Paths (draft-ash-e2e-voip-hdr-comp-rqmts-01.txt)

MPLS VPNs: Layer 2 or Layer 3? Understanding the Choice

Virtual Private Networks

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

INTRODUCTION TO L2VPNS

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Transition to IPv6 in Service Providers

MPLS Concepts. Overview. Objectives

RFC 2547bis: BGP/MPLS VPN Fundamentals

Jerry Ash AT&T Bur Goode AT&T George Swallow Cisco Systems, Inc.

Junos MPLS and VPNs (JMV)

MPLS Implementation MPLS VPN

Sprint Global MPLS VPN IP Whitepaper

IPv6 over IPv4/MPLS Networks: The 6PE approach

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

What Is a Virtual Private Network?

SBSCET, Firozpur (Punjab), India

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Virtualization Network Admission Control Deployment Guide

The Essential Guide to Deploying MPLS for Enterprise Networks

Data Center Network Virtualisation Standards. Matthew Bocci, Director of Technology & Standards, IP Division IETF NVO3 Co-chair

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Enhancing Converged MPLS Data Networks with ATM, Frame Relay and Ethernet Interworking

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

VPN taxonomy. János Mohácsi NIIF/HUNGARNET tf-ngn meeting April 2005

Project Report on Traffic Engineering and QoS with MPLS and its applications

SDN CONTROLLER. Emil Gągała. PLNOG, , Kraków

Cisco Configuring Basic MPLS Using OSPF

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Protocol Security Where?

MPLS Security Considerations

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Addressing Inter Provider Connections With MPLS-ICI

Master Course Computer Networks IN2097

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

How To Make A Network Secure

CCNA Security 1.1 Instructional Resource

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

MPLS VPN Security BRKSEC-2145

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Building Trusted VPNs with Multi-VRF

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

MPLS VPN Security Best Practice Guidelines

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

- Multiprotocol Label Switching -

MPLS in Private Networks Is It a Good Idea?

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Securing IP Networks with Implementation of IPv6

TrustNet Group Encryption

Implementing MPLS VPNs over IP Tunnels

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

MPLS L2VPN (VLL) Technology White Paper

MPLS-TP. Future Ready. Today. Introduction. Connection Oriented Transport

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

Network Virtualization with the Cisco Catalyst 6500/6800 Supervisor Engine 2T

Network virtualization

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Security of the MPLS Architecture

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

For internal circulation of BSNLonly

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

VPN Technologies A Comparison

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

L2 VPNs. Pseudowires. Virtual Private LAN Services. Metro/Carrier Ethernet.

Department of Communications and Networking. S /3133 Networking Technology, Laboratory course A/B

TRILL for Data Center Networks

Layer 2 and 3 Virtual Private Networks: Taxonomy, Technology, and Standardization Efforts

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

MPLS-based Layer 2 VPNs. Kireeti Kompella Juniper Networks

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

MPLS is the enabling technology for the New Broadband (IP) Public Network

SEC , Cisco Systems, Inc. All rights reserved.

Transcription:

MPLS over Various IP Tunnels W. Mark Townsley

Generic MPLS over IP Manual, Point to Point Tunnel IP/MPLS Network P Manually Configured Tunnel IP Network P IP/MPLS Network Typically a GRE tunnel, but may use other encapsulation Connects disparate MPLS networks over IP Acts as a single MPLS network, so all services enabled by MPLS are available across both clouds

Generic MPLS over IP Manual. Point to Point Tunnels IP/MPLS Network P Label Switched Paths IP Network P IP/MPLS Network Tunnel acts as a link layer between MPLS networks LSPs are still setup between all nodes as if directly connected on the same MPLS network

Generic MPLS over IP Manual, Point to Point Tunnels IP/MPLS Network P Manually Configured Tunnels IP Network P IP/MPLS Network IP/MPLS Network With multiple MPLS networks and multiple IP-only s participating, manual configurations may become cumbersome

MPLS over IP for 2547 VPN Support Targeting a specific MPLS application gives us more options. Instead of manually configuring tunnels, Tunnel Reachability Information is sent via a BGP Next Hop Tunnel SAFI (draft-nalawade-kapoor-tunnel-safi-.txt) This advertises which tunnel method is best to reach a given. i.e., MPLS/LSP, MPLS/GRE, MPLS/IP, MPLS/L2TPv3, MPLS/IPsec, etc. Includes any parameters necessary to select a given tunnel at a particular (IPsec policies, L2TPv3 Session/Cookie, protocol type, etc.) No additional configuration necessary beyond locally enabling the encapsulation mode. IPsec is an exception, as it requires IKE for Security Association setup.

MPLS (RFC2547) VPNs over IP Extending the reach of MPLS IP/MPLS Network MPLS/IP MPLS/LSP IP Network IP/MPLS Network MPLS/LSP is used when possible, MPLS/IP when not MPLS networks need not setup LSPs to reach one another across clouds, only IP reachability between s is needed. Useful in MPLS migration scenerios

MPLS (RFC2547) VPNs over IP Native IP Core BGP (2547bis) Native IP Core MPLS/IP Core remains IP-only. s run MPLS only at the edge Deploy RFC 2547 service without moving to MPLS core right away

RFC 2547 VPNs: Cons of MPLS/IP vs. MPLS/LSP MTU decreased by at least 6 bytes An IP core may be more vulnerable to spoofing attacks vs. an isolated MPLS core Potential Interoperability issues due to multiple encapsulation options

Encapsulation Options Each of these modes are referred to in one or more IETF drafts MPLS over IP MPLS over GRE MPLS over L2TPv3 Any of the above with MPLS over IPsec transport mode. Which to choose?

Spoofing Attack w/internet 2. SP Core enables attack by allowing only a single packet through to an MPLS/GRE/IP router, and to the Customer VPN by guessing one valid MPLS label Backchannel 3. Host within customer VPN responds, sending packet through firewall over Internet SP Core Customer VPN. Hacker sends spoofed Hacker MPLS over GRE/IP packet. Inner source IP = Hacker s source address. Inner Dest IP = Enterprise Host Outer source IP = SP source address. Outer Dest IP = Any SP Router with MPLS/GRE/IP Internet

Packet Spoofing Attacks VPN A SP IP or MPLS Core VPN B Spoofed MPLS Packet If MPLS VPN packets can make into your core 2-bit Label Exp S TTL Rogue PDU (Hacker s choosing) Assuming the hacker can send 5 pps to a with 4 routes, all possible valid labels may be found in 3.5 minutes (an average of 2 discovered per second).

Packet Spoofing Attacks Isolated MPLS Core VPN A Isolated MPLS Core VPN B Spoofed MPLS Packets For security reasons a router should never accept a packet with a label from a router. (draft-behringer-mpls-security-4.txt, section 3.4) As long as this holds true, all spoofed MPLS packets from the are dropped at the customer interface, unable to reach into the MPLS core.

Packet Spoofing Attacks MPLS over GRE/IP VPN A IP or MPLS Core VPN B Spoofed MPLS over IP or GRE Packets L3 ACL L3 ACL Enabling MPLS over IP anywhere requires that L3ACLs be maintained across the entire network boundary. This may be difficult to maintain, subject to configuration errors, etc. Given the ease of spoofing a packet by a blind attacker it could be dangerous to rely on L3ACLs for MPLS over IP

Blind Insertion Attack The aim of the hacker is not to disrupt your core, but to transit the core network to gain access to or disrupt the VPN. Hacker can send a packet into your core network and hit a VPN (e.g., L3ACLs fail) Hacker does not have the sophistication to capture and decode packets in the core for use in a orchestrated attack

Spoofing MPLS over IP 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 Label Exp S TTL Rogue PDU (Hacker s choosing) MPLS PDU MPLS VPN Label One correct guess at the 2-bit MPLS label, and the Hacker wins

Spoofing MPLS over GRE 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 Rec = Flags = Ver = Protocol = x8847 Label Exp S TTL Rogue PDU (Hacker s choosing) MPLS PDU MPLS VPN Label No help here as the GRE header is set with constant, well-known values. The same 2 bits must be guessed as with MPLS over IP

Spoofing MPLS over L2TPv3 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 Session ID (32 bits) Cookie (64 bits - Optional) Label Exp S TTL Rogue PDU (Hacker s choosing) Hacker must guess 64 cryptographically random bits, in addition to the MPLS label. Attacking at Mpps, a 64-bit cookie will average on the order of 5, years to guess one correct value.

Packet Spoofing Attacks VPN A SP Core VPN B Spoofed MPLS over L2TPv3 Packets L2TPv3 If boundary protections fail and MPLS packets can enter your core, L2TPv3 offers a second layer of spoofing protection Very lightweight: No additional configuration necessary vs. MPLS over IP or MPLS over GRE

What about IPsec? All MPLS over IP encapsulations may be protected by IPsec transport mode (GRE, IP or L2TPv3). To IPsec, this looks like host to host security. There is no IPsec tunneling involved. Only packets from authenticated sources are processed, so the VPN is protected from packet spoofing attacks, including ones where the hacker can sniff the core

Packet Spoofing Attacks: IPsec VPN A SP Core VPN B IPsec IPsec provides full cryptographic protection of each packet traversing the SP Core, certainly protecting against packet spoofing Heavyweight solution: Requires provisioning a full mesh of p2p IKE (Internet Key Exchange) sessions, cryptographic acceleration, synchronization of IPSec state with other control planes ( Reachability w/mp- BGP, IGP, LSP), etc.

Summary MPLS over IP may be leveraged for Migrating to MPLS Enabling MPLS applications across multiple, disparate MPLS networks Enabling MPLS applications over a Native IP core network, using MPLS only at the edge IP Tunnels may be configured manually to carry MPLS, or dynamically for certain MPLS applications Manually configured tunnels link disparate MPLS networks or IP-only s into one larger MPLS network MPLS edge applications such as RFC 2547 VPNs may be operated over IP without manually configuring IP Tunnels. There are a variety of MPLS over IP encapsulations to choose from MPLS directly over IP is the most efficient encapsulation, but the easiest to spoof. MPLS over GRE has effectively the same properties as MPLS over IP, but with a 4-byte larger header MPLS over L2TPv3 has an even larger encapsulation (8 additional bytes), but protects against blind packet spoofing attacks with very little additional operational overhead. MPLS over IPsec is the most secure encapsulation, but has the most operational and encapsulation overhead