the about MPLS security



Similar documents
Virtual Privacy vs. Real Security

TrustNet Group Encryption

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

November Defining the Value of MPLS VPNs

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Group Encryption. The key to protecting data in motion BLACK BOX blackbox.com

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

ethernet services for multi-site connectivity security, performance, ip transparency

Multi Protocol Label Switching (MPLS) is a core networking technology that

Enterprise Network Simulation Using MPLS- BGP

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ENTERPRISE CONNECTIVITY

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

SEC , Cisco Systems, Inc. All rights reserved.

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

The Next Generation Network:

MPLS/IP VPN Services Market Update, United States

MikroTik RouterOS Introduction to MPLS. Prague MUM Czech Republic 2009

Group Encrypted Transport VPN

Lecture 17 - Network Security

WAN Optimization in MPLS Networks- the Transparency Challenge!

WHITEPAPER. VPLS for Any-to-Any Ethernet Connectivity: When Simplicity & Control Matter

WAN Optimization. Riverbed Steelhead Appliances

Fundamentals of MPLS for Broadcast Applications

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Managed Services: Taking Advantage of Managed Services in the High-End Enterprise

Sprint Global MPLS VPN IP Whitepaper

How To Protect Your Network From Attack

Enterprise Business Products 2014

Gigabit Multi-Homing VPN Security Router

Evolving Your Network with Metro Ethernet and MPLS VPNs

CARRIER MPLS VPN September 2014

Introducing Basic MPLS Concepts

- Multiprotocol Label Switching -

Virtual Private Networks Solutions for Secure Remote Access. White Paper

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

MPLS VPN basics. E-Guide

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Global Headquarters: 5 Speen Street Framingham, MA USA P F

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

The Evolution of Ethernet

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

Frame Relay vs. IP VPNs

MITEL. NetSolutions. Flat Rate MPLS VPN

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper

RFC 2547bis: BGP/MPLS VPN Fundamentals

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Demonstrating the high performance and feature richness of the compact MX Series

Network Management for Common Topologies How best to use LiveAction for managing WAN and campus networks

Global Headquarters: 5 Speen Street Framingham, MA USA P F

High speed Ethernet WAN: Is encryption compromising your network?

MPLS provides multi-site solution

Optimizing Networks for NASPI

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

Introduction to

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Virtual Private LAN Service

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

MPLS and IPSec A Misunderstood Relationship

Network Virtualization Network Admission Control Deployment Guide

Colt IP VPN Services Colt Technology Services Group Limited. All rights reserved.

Gigabit SSL VPN Security Router

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

MPLS: Key Factors to Consider When Selecting Your MPLS Provider

MPLS Implementation MPLS VPN

High Level Overview of IPSec and MPLS IPVPNs

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

WAN Traffic Management with PowerLink Pro100

IVCi s IntelliNet SM Network

The Business Case for Network-based Layer 3 IP VPNs

UIP1868P User Interface Guide

Overlay Networks and Tunneling Reading: 4.5, 9.4

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Quidway MPLS VPN Solution for Financial Networks

Master Course Computer Networks IN2097

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

How To Make A Network Secure

How To Secure My Data

Mesh VPN Link Sharing (MVLS) Solutions

Providing Secure IT Management & Partnering Solution for Bendigo South East College

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

MPLS in Private Networks Is It a Good Idea?

International Civil Aviation Organization

Virtual Private Networks

MPLS over Various IP Tunnels. W. Mark Townsley

The term Virtual Private Networks comes with a simple three-letter acronym VPN

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Site2Site VPN Optimization Solutions

Transcription:

uth 22 the about truth MPLS security

11 MPLS is private. MPLS is a shared service! We use a private network is often stated as the reason for not protecting data as it travels over 3rd party networks. But is MPLS really private? MPLS is technically a VPN or a Virtual Private Network, meaning it s not actually private - it only mimics privacy by logically separating data with labels. More importantly - even if MPLS were private, is privacy the equivalent of security? The answer is no. It is important to understand that a service provider has the technical possibility to sniff VPN data, and VPN users can either choose to trust the service providers not to use their data inappropriately, or they can encrypt the traffic over the MPLS core. Analyzing MPLS Security Michael H. Behringer and Monique Morrow MPLS is a shared network service - there is nothing private about it The labels generated by MPLS logically segment user traffic but they are used only for forwarding purposes. Traffic from thousands of different customers and users (including traffic from other carriers and the Internet) traverse a common set of backbone routers in rapid succession. Each router in an MPLS network performs label swapping. The new label is used by the next router for forwarding purposes. At any given moment traffic from competitors and other provider networks flows across a common infrastructure. Data is shared almost immediately...carriers talk about frame relay or MPLS VPNs all the time, and if you think they're secure, you're mistaken. WAN Encryption: Just Do It Mike Fratto Network Computing 2 2011 Certes Networks, Inc. All rights reserved. Customer Edge (CE) routers are assigned to individual customers, but Provider Edge (PE) and Provider backbone (P) routers are shared. In other words, only the router in your office is private - the very next router your traffic hits (and all the routers after it) are shared by multiple users. WP-MPLS082411

22 MPLS is secure. The truth is that MPLS provides no MPLS has no inherent security! There is a common misconception that MPLS provides some level of security. The truth is that MPLS offers- No protection against misconfigurations Human and machine errors as well as OS bugs can result in MPLS traffic being misrouted. No protection from attacks within the core MPLS is vulnerable to all the traditional WAN attack vectors. No protection or detection of sniffing/snooping It is impossible to detect if someone is siphoning or replicating data - there is no alarm that goes off if data is being stolen. No Data Security The data is left in the clear and can be accessed, replicated, or used by anyone who gains access to it. Label Value TC S TTL 20 bits 3 bits The illustration above shows the components of an MPLS header. Note the absence of any security measures within the header itself. The Label Value provides forwarding information used by the routers. Traffic Class (TC) bits are used to provide services such as traffic prioritization. The Stacking bit (S) allows multiple labels to be used. TTL is a time to live marker to allow packets to expire. None of these mechanisms provide security. Also note that the original IP packet is unchanged, which means: With MPLS- your data traverses a shared network in the clear....an organization s network traffic is in the clear on an MPLS network, meaning that the carrier and anyone else that has access to the organization s network can read packets on the MPLS network. 2012. Certes Networks, Inc. All rights reserved. 1 bit 8 bits L2 Header MPLS header IP Packet 3 PCI Guru

33 Providers position MPLS accurately. Providers continue to market MPLS as a secure service! In a podcast dated April 2009, a Product Director from a major service provider said security was built in to MPLS based on the following: Traffic streams are kept separate. There are controls around provisioning and management. There are gateways between the Public Internet and the MPLS. Netflow and J-Flow are used to identify malicious activity. Nearly every MPLS service provider makes similar claims. Service providers can make these claims because they bear no responsibility for the integrity of your data - SLAs are built around reliable delivery not data integrity or security. Hackers and Data Thieves know better! There are papers and video tutorials readily available on the Internet that provide a cook book approach to sniffing and redirecting MPLS traffic. Here s what Black Hat had to say about MPLS security claims: Providers say: Traffic streams are kept separate. Hackers know: The mechanism used to separate traffic can also be used to identify targets of interest! Providers say: There are controls around provisioning and management. Hackers know: Provisioning and management are to data security what traffic lights are to bank robbers - they do not prevent data theft! Providers say: There are gateways between the Internet and the MPLS network. Hackers know: Traffic is not accidentally leaking out to the Internet, it is being stolen right off the MPLS backbone! Providers say: They use Netflow/J-Flow to identify malicious activity. Hackers know: Post-event notification is not a substitute for prevention! Other industries don t get away with pushing debunked benefits! Why do service providers continue to make these claims? 2012. Certes Networks, Inc. All rights reserved. 4

44 Encryption breaks MPLS. Group Encryption is transparent to MPLS! IPsec VPNs are typically used to protect data on MPLS networks. While they do provide excellent security, they also mask many of the features service providers offer, including: Class of Service Netflow/J-Flow Network Address Translation (NAT) Policy based routing Other traditional issues with IPsec tunnels include: Forces any-to-any networks to become point-to-point connections Requires complex configurations, which are expensive to operate and manage Group A Hub- Spoke Port# Hourly Refresh AES 256 Group B Full Mesh Source /Destination Daily Refresh AES 256 Hub- Spoke Full Mesh With Group Encryption you can decouple security from the infrastructure and maintain application performance, while protecting data and complying with privacy regulations. Secondary Data Center Group Encryption allows security administrators to create encryption policies that match the existing network topology and application flows - without creating tunnels. By maintaining the original headers, Group Encryption allows you to retain all of the benefits (including layer 4 services) of MPLS, while providing the highest level of data protection. Primary Data Center Encrypted Carrier Ethernet Branch Offices Group 1 Is not VoIP or Video compatible (due to increased latency) Slows/breaks Multicast Breaks load balancing Often requires router/os upgrades Hides application information required for troubleshooting 2012. Certes Networks, Inc. All rights reserved. 5 Branch Offices Group 2 "With [Group Encryption], we can protect our data while maintaining traffic shaping and other network services that require access to the Layer 4 header. This eliminates what used to be a tradeoff between security and performance." Ron Pass Senior Network Engineer First Franklin Financial

ruth 55 Encryption kills performance. You can encrypt MPLS without impacting quality or performance! Latency has traditionally been one of the major drawbacks of encryption. Even with an accelerator card in place there can be as much as an 80% drop in performance on a WAN link while encrypting. No amount of cryptographic acceleration can help because encryption is not the only cause of latency. Other contributors are massive policy maps and the associated look-ups that get created when an any-to-any network is relegated into point-to-point relationships. Latency can also be caused by the repeated passing of packets through the router backplane. Group Encryption does not impact network performance. Because Group Encryption does not impact the underlying infrastructure or impose point-to-point connections, any topology can be secured without modifications. Full mesh networks can be encrypted while preserving Layer-4 services VoIP can be encrypted without impacting call quality Dual carrier networks can be secured without impacting SLAs Load balanced networks can be secured without impacting high availability Encrypt latency sensitive application such as Voice and Video Because the complexity of tunnels and the latencyinducing policy look-ups are avoided, voice and video can be secured without hampering quality. The TrustNet solution enables companies to protect their data without impeding the performance or operation of the network. Charles Kolodgy Vice President, Security Products IDC 6 2012. Certes Networks, Inc. All rights reserved. Headquarters IP Network IP PBX Data Center VoD Server Branch Locations Muticast Server

ruth 66 Encryption is expensive. Encryption is not expensive - encryption with traditional IPsec tunnels is expensive! It can take as many as 15 minutes to set up a VPN tunnel. That may not sound like much but consider this: A 50 node network would take 36,750 minutes to figure all the IPsec tunnels. That s 600 hours of work just to set it up. All of those tunnels create policy maps that can significantly choke router throughput. A typical 1Gbps link can cost $3k a month and you could get as little as 240Mbps throughput, even with a standard accelerator card. You could be wasting thousands of dollars per month per site. If you have to add or drop a site, it s another 300 hours of work every time! All of this complexity also creates additional vulnerabilities in the network. Group Encryption has a low Total Cost of Ownership (TCO)! With tunnel-less Group Encryption, policies are created using drag and drop functionality. You can secure a large full mesh network with a single policy that takes only minutes to set up and manage, even for very large networks. Policy and encryption key refreshes can be set up to take place at regular intervals or with the click of a button. Performance is maintained because the massive policy look ups that choke router performance are avoided. In some cases, WAN acceleration can be avoided because there is nothing impeding performance. "The de-coupling of the encryption service from the network infrastructure means our customers no longer have to chose between performance and security. Also, the simple installation and ease of management of the solution helps keep costs under control, which is an important consideration for our customers." Orhan Düz Operations Group Manager KoçSistem 2012 Certes Networks, Inc. All rights reserved. 7

77 Additional Facts: Certes Networks released the industry s first Group Encryption solution in 2006 Certes Networks has partnered with premier service providers to provide MPLS compatible encryption as a managed service Certes Networks offers the industry s only Layer 4 compatible encryption solution Certes Networks offers tunnel-less Group Encryption at Layer 2, Layer 3, and Layer 4 For more information visit us at www.certesnetworks.com 2012. Certes Networks, Inc. All rights