Mpls Vpns And Security

  • June 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Mpls Vpns And Security as PDF for free.

More details

  • Words: 2,041
  • Pages: 46
SEC-370

© 2001, Cisco Systems, Inc. All rights reserved.

1

Understanding MPLS/VPN Security Issues SEC-370 Michael Behringer <[email protected]>

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

3

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

4

The Principle: A “Virtual Router” Virtual Routing and Forwarding Instance ! ip vrf Customer_A rd 100:110 route-target export 100:1000 route-target import 100:1000 ! interface Serial0/1 ip vrf forwarding Customer_A ! Assign Interface to “Virtual Router” SEC-370

Route Distinguisher: Makes VPN routes unique Export this VRF with community 100:1000 Import routes from other VRFs with community 100:1000

© 2003, Cisco Systems, Inc. All rights reserved.

5

General VPN Security Requirements

• Address Space and Routing Separation • Hiding of the MPLS Core Structure • Resistance to Attacks • Impossibility of VPN Spoofing

Working assumption: The core (PE+P) is secure SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

6

Address Space Separation

64 bits

32 bits

Route Distinguisher

IPv4 Address

VPN IPv4 Address

Within the MPLS core all addresses are unique due to the Route Distinguisher

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

7

Routing Separation

• Each (sub-) interface is assigned to a VRF • Each VRF has a RD (route distinguisher) • Routing instance: within one RD -> within one VRF -> Routing Separation

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

8

Hiding of the MPLS Core Structure MPLS core PE

Visible Address Space

P

IP(PE; l0)

P

CE1 IP(CE1)

IP(PE; fa0)

VRF CE1

P

P

CE2 IP(CE2)

IP(PE; fa1)

VRF CE2

• VRF contains MPLS IPv4 addresses • Only peering Interface (on PE) exposed (-> CE)! -> ACL or unnumbered SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

9

Resistance to Attacks: Where and How? • Where can you attack? Address and Routing Separation, thus: Only Attack point: peering PE

• How?

See ISP Essentials

- Intrusions (telnet, SNMP, …, routing protocol) - DoS

SEC-370

Secure with ACLs © 2003, Cisco Systems, Inc. All rights reserved.

Secure with MD5 10

Label Spoofing

• PE router expects IP packet from CE • Labelled packets will be dropped • Thus no spoofing possible

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

11

Comparison with ATM / FR ATM/FR MPLS Address space separation

yes

yes

Routing separation

yes

yes

Resistance to attacks

yes

yes

Resistance to Label Spoofing Direct CE-CE Authentication (layer 3)

yes

yes

yes

with IPsec

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

12

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

13

Security Recommendations for ISPs • Secure devices (PE, P): They are trusted! • CE-PE interface: Secure with ACLs • Static PE-CE routing where possible • If routing: Use authentication (MD5) • Separation of CE-PE links where possible (Internet / VPN) • LDP authentication (MD5) • VRF: Define maximum number of routes Note: Overall security depends on weakest link! SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

14

PE-CE Routing Security In order of security preference: 1. Static: If no dynamic routing required (no security implications) 2. BGP: For redundancy and dynamic updates (many security features) 3. RIPv2: If BGP not supported (limited security features) SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

15

Securing the MPLS Core MPLS core

CE

BGP Route Reflector PE

P

VPN

PE P

CE

Internet

VPN

P

VPN

CE

PE

PE

VPN

VPN

PE

BGP peering with MD5 authentic. LDP with MD5

CE SEC-370

CE

CE © 2003, Cisco Systems, Inc. All rights reserved.

ACL and secure routing 16

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

17

MPLS Internet Architectures: Principles

• Core supports VPNs and Internet • VPNs remain separated • Internet as an option for a VPN • Essential: Firewalling

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

18

Separate VPN and Internet Access MPLS core

Customer LAN

To Internet Firewall / NAT

P CE1

PE1 VRF Internet

IDS

CE2

PE2 VRF VPN

To VPN

• Separation: +++ • DoS resistance: +++ • Cost: $$$ (Two lines and two PEs: Expensive!) SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

19

Separate Access Lines + CEs, one PE MPLS core

Customer LAN

To Internet Firewall / NAT

IDS

P CE1

PE1

CE2

VRF Internet VRF VPN

To VPN

• Separation: +++ • DoS resistance: ++ (DoS might impact VPN on PE) • Cost: $$ (Two lines, but only one PE) SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

20

Using a Single Access Line

Requirements to share a line: • PE requires separate sub-interfaces • CE requires separate sub-interfaces • CE side requires separate routing

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

21

Shared Access Line, Frame Relay MPLS core

Customer LAN

P Firewall / NAT Internet CE

PE1

VRF Internet

IDS VPN CE

VRF VPN

FR logical links

• Separation: +++ • DoS resistance: + • Cost: $ SEC-370

(DoS might affect VPN on PE, line, CE)

© 2003, Cisco Systems, Inc. All rights reserved.

22

Shared Access Line, Policy Routing MPLS core

Customer LAN

P Firewall / NAT Internet CE

IDS VPN CE

PE1

VRF Internet PR

VRF VPN

FR logical links

• Separation: +++ • DoS resistance: + • Cost: $ SEC-370

(DoS might affect VPN on PE, line, CE)

© 2003, Cisco Systems, Inc. All rights reserved.

23

Shared Access Line, CE with VRFs MPLS core

Customer LAN

P Firewall / NAT Internet CE

PE1

VRF Internet

IDS VRF Internet

VRF VPN

FR logical links

• Separation: +++ • DoS resistance: + • Cost: $ SEC-370

(DoS might affect VPN on PE, line, CE)

© 2003, Cisco Systems, Inc. All rights reserved.

24

Hub-and-Spoke VPN with Internet Access MPLS core

Hub Site

Firewall NAT

Internet CE

Internet To Internet -->

PE1 VRF Internet

IDS

PE2 VPN CE mbehring

VRF VPN

To VPN

PEs

VPN

VPN

VPN

CEs Spoke 1 SEC-370

Spoke 2

© 2003, Cisco Systems, Inc. All rights reserved.

Spoke 3 25

Alternative Topologies

• Full VPN mesh, one Internet Access • Internet access at several sites -> Several firewalls needed -> More complex

• Internet Access from all sites -> Complex, one firewall per site

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

26

Central Firewalling: Option 1: Stacking Firewalls Internet

+ Central Management NAT and Firewalling

+ Strong firewalls

SP Domain

+ Customer can choose firewall VPN

+ Different policies per customer possible

MPLS core PEs

VPN

VPN

+ CEs not touched

VPN

- One firewall per customer

CEs Customer 1 SEC-370

Customer 2

Customer 3

© 2003, Cisco Systems, Inc. All rights reserved.

27

Central Firewalling: Option 2: NAT on CE, one central FW Internet

+ Central Management SP Domain

Firewalling

+ One strong firewall

e.g PIX 535

+ Easy to deploy VPN

- Customer cannot pick his firewall

MPLS core PEs

NAT

VPN

CEs

Customer 1 SEC-370

VPN

NAT Customer 2

- CEs need config

VPN

NAT Customer 3

© 2003, Cisco Systems, Inc. All rights reserved.

28

Central Firewalling: Option 3: IOS Firewall on CE + Economic

Internet

+ One firewall per customer SP Domain

VPN

+ No central devices

MPLS core PEs

VPN

VPN

CEs NAT and firewall Customer 1 SEC-370

- Management more difficult

VPN

- CEs need config NAT and firewall

Customer 2

NAT and firewall Customer 3 © 2003, Cisco Systems, Inc. All rights reserved.

29

A Word on Carrier’s Carrier Cust. CE

Carrier’s Carrier

Carrier

Cust.

Carrier

CE PE

PE PE

PE PE

PE

IP data

IP data label IP data

label IP data label label IP data

• Same principles as in normal MPLS • Customer trusts carrier who trusts carrier SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

30

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

31

Ways to Attack • “Intrusion”: Get un-authorised access Theory: Not possible (as shown before) Practice: Depends on:

No Trust?

- Vendor implementation - Correct config and management

Use IPsec between CEs!

• “Denial-of-Service”: Deny access of others Much more interesting… SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

32

DoS against MPLS • DoS is about Resource Starvation, one of: - Bandwidth - CPU - Memory (buffers, routing tables, …)

- In MPLS, we have to examine: CE

PE

- Rest is the same as in other networks SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

33

Attacking a CE from MPLS (other VPN) • Is the CE reachable from the MPLS side? -> only if this is an Internet CE, otherwise not! (CE-PE addressing is part of VPN!)

• For Internet CEs: Same security rules apply as for any other access router.

MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

34

Attacking a CE-PE Line • Also depends on reachability of CE or the VPN behind it • Only an issue for Lines to Internet-CEs Same considerations as in normal networks

• If CE-PE line shared (VPN and Internet): DoS on Internet may influence VPN! Use CAR!

MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

35

Attacking a PE Router PE IP(PE; l0)

IP(P)

CE1 IP(CE1)

IP(PE; fa0) VRF CE1

CE2 IP(CE2)

IP(PE; fa1) VRF CE2

Attack points

VRF Internet

Only visible: “your” interface and interfaces of Internet CEs SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

36

DoS Attacks to PE can come from:

• Other VPN, connected to same PE • Internet, if PE carries Internet VRF Possible Attacks: • Resource starvation on PE Too many routing updates, too many SNMP requests, small servers, …

Has to be secured SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

37

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

38

Use IPsec if you need: • Encryption of traffic • Direct authentication of CEs • Integrity of traffic • Replay detection

• Or: If you don’t want to trust your ISP for traffic separation! SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

39

IPsec Topologies • CE to CE (static cryptomap) • Hub and Spoke (dynamic cryptomap) • Full Mesh with TED: Ideal!!! MPLS/VPN and TED are an ideal combination!!

IPsec is independent of MPLS IPsec and MPLS work together SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

40

Agenda • Analysis of MPLS/VPN Security • Security Recommendations • MPLS Security Architectures Internet Access Firewalling Options

• Attacking an MPLS Network • IPsec and MPLS • Summary SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

41

MPLS doesn’t provide:

• Protection against mis-configurations in the core • Protection against attacks from within the core • Confidentiality, authentication, integrity, anti-replay -> Use IPsec if required • Customer network security

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

42

Conclusions • MPLS VPNs can be secured as well as ATM/FR VPNs • Depends on correct configuration and function of the core • Use IPsec if you don’t trust core • There are many ways to map VPNs with Internet access securely onto MPLS

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

43

Understanding MPLS/VPN Security Issues Session SEC-370

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

44

Please Complete Your Evaluation Form Session SEC-370

SEC-370

© 2003, Cisco Systems, Inc. All rights reserved.

45

Presentation_ID

© 2001, Cisco Systems, Inc. All rights reserved.

46

Related Documents

Mpls
November 2019 15
Qos And Mpls
June 2020 2
Managing Vpns, Ca
December 2019 2
Mpls Overview
May 2020 5