60
BRKSEC-2145 MPLS VPN Security

MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

Embed Size (px)

Citation preview

Page 1: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

BRKSEC-2145

MPLS VPN Security

Page 2: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 2

Session Objective

Learn how to secure networks which run MPLS VPNs.

100% network focus!

Securing routers & the whole network against DoS and abuse

Not discussed:

Security appliances such as firewall and IPS

Content and application security

Target audience:

People running, architecting or securing MPLS network

Should be familiar with the fundamentals of MPLS

Page 3: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 3

MPLS Security: History

2001: First MPLS deployments; little security concerns

2002: First security concerns raised by SP and Enterprises; first Gartner report

2003: MPLS Security becoming key concern; Miercomtest; first white papers; second Gartner report

2004: RFC 4381: “Security of the MPLS VPN Architecture”

2005: MPLS VPN Security book; focus on inter-as, L2VPN, other advanced subjects

2006-2008: No major security debates

2009: Renewed interest; hacker reports; insider threats

Page 4: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 4

MPLS VPN Security ― Agenda

Analysis of the Architecture

Secure MPLS VPN Design

General Best Practices

Internet Access

Inter-AS and CsC

Layer 2 VPN Security

Multicast VPN Security

IPsec and MPLS

Summary

Page 5: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 5

Analysis of the MPLS VPN Architecture (RFC 4364)

Page 6: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 6

Comparison with ATM/FR

ATM/FR MPLS

Address Space Separation Yes Yes

Routing Separation Yes Yes

Resistance to Attacks Yes Yes

Resistance to Label Spoofing

Yes Yes

Direct CE-CE Authentication (Layer 3)

Yes With IPsec

Page 7: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 7

Basic RFC 4364 Security:Today’s Arguments

Can be mis-configured (operation)

Routers can have bugs (implementation)

PEs can be accessed from Internet, thus intrinsically insecure

Floods over Internet can impact VPN traffic

True, but same

on ATM/FR

PEs can be secured,

as Internet routers

Engineering/QoS

Page 8: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 8

Address Planes: True Separation!(Example is IPv4 – also applies to IPv6)

Core Address Space0.0.0.0—255.255.255.255

PE

VPN1 Address Space0.0.0.0—255.255.255.255

CE CE

VPN2 Address Space0.0.0.0—255.255.255.255

CE CEmbehring

PEP

PE-CE Interfaces

Belong to VPN;Only Attack

Point!!Control Plane:

IPv4 Addr.

Several Data Planes:

VPNv4 Addr.

Page 9: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 9

Secure MPLS VPN Design ― General Security Best Practices

Page 10: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 10

Secure MPLS/VPN Core Design

1. Secure each router individually

2. Don’t let packets into (!) the core

No way to attack core, except through routing, thus:

3. Secure the routing protocol

Neighbor authentication, maximum routes, dampening,…

4. Design for transit traffic

QoS to give VPN priority over Internet

Choose correct router for bandwidth

Separate PEs where necessary

5. Operate Securely

Still ―Open‖: RoutingProtocol

Only Attack Vector: Transit Traffic

Now Only Insider Attacks Possible

Avoid Insider Attacks

Page 11: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 11

Securing the Core: Infrastructure ACLs

On PE: “deny ip any <PE VRF address space>”

Exception: routing protocol from host to host

Idea: no traffic to PE/P you can’t attack

Prevents intrusions 100%

DoS: hard, but theoretically possible with transit traffic

CE PE

VPN

Easy with MPLS!

In MPLS: VRF Belongs to Customer VPN!

Page 12: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 12

Securing the Core: Infrastructure ACLs

Example:

deny ip any 1.1.1.0 0.0.0.255

permit ip any any

Caution: This also blocks packets to the CE’s!

Alternatives: List all PE i/f in ACL, or use secondary i/f on CE, or ACL with dis-contiguous subnet masks (11111101)

CE PE

VPN

CE PE

VPN

PE

VPN

PE

VPN

CE

CE

1.1.1.0/30

1.1.1.4/30

1.1.1.8/30

1.1.1.12/30.1

.1

.1

.1.2

.2

.2

.2

This Is VPN Address Space, Not Core!

Page 13: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 13

VRF Maximum Prefix Number

Injection of too many routes:

Potential memory overflow

Potential DoS attack

For a VRF: Specify the maximum number of routes allowed

ipvrf redmaximum routes 45 80

… Accept Max 45 Prefixes,…In This VRF…

…and Log a Warning at 80% (of 45),…

Page 14: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 14

Control of Routes from a BGP Peer

Injection of too many routes:

Potential memory overflow

Potential DoS attack

Control with “maximum prefix” command

(under the BGP neighbor definition)

router bgp 13neighbor 140.0.250.2 maximum-prefix

45 80 restart 2

… Accept Max 45 Prefixes, Then Reset Session …

From This Neighbor…

…Log a Warning at 80% (of 45),…

…and Restart the BGP Session After Two Min.

Page 15: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 15

Best Practice Security Overview

Secure devices (PE, P): They are trusted!

See next slide for risks…

PEs: Secure with ACLs on all interfaces

Static PE-CE routing where possible

For routing, LDP: Use authentication (MD5)

Maximum number of routes per VRF and per peer (only BGP)

Separation of CE-PE links where possible(Internet/VPN)

Note: Overall security depends on weakest link!

Page 16: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 16

Key: PE Security

What happens if a single PE in the core gets compromised?

Intruder has access to all VPNs; GRE tunnel to “his” CEin the Internet, bring that CE into any VPN

That VPN might not even notice…

Worst Case!!!!

Therefore: PE Security is Paramount!!!!!!!

Therefore: No PE on customer premises!!!!!!!

(Think about console access, password recovery…)

Page 17: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 17

MPLS VPNs are Quite Secure

Perfect Separation of VPNs

No intrusions possible

Perfect Separation of the Core from VPNs

Again, no intrusions possible

But there is one remaining issue…

Page 18: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 18

Customer VPN

The Issue: DoS Through a Shared PE Might Affect VPN Customer

Traffic COULD affect VPN customer (however, risk probably acceptable)

PE

MPLS core

P

VPN Customer

P

P

PInternet Customer Internet

VRF

VRF CE1

P

PE Has Shared CPU/Memory/Bandwidth:

Page 19: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 19

Today’s Best Practice:MPLS VPN Security Recommendation:

Level 0: Internet

Level 1: VPN customers

(Level 2: Mission critical infrastructure)

PE1

CE2

CE1

PE2

To Internet

To VPN

VRF Internet

VRF VPN

Cu

sto

mer

Netw

ork

PE Routers Should Contain Only VRFs of the Same Security Level; Example:

Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and

conditions are right

Page 20: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 20

Secure MPLS VPN Design ― Internet Access

Page 21: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 21

Internet Provisioning on an MPLS Core

Two basic possibilities:

1. Internet in global table, either:

1a) Internet-free core (using LSPs between PEs)

1b) hop-by-hop routing

2. Internet in VRF

Internet carried as a VPN on the core

This is the “default”!!!

Page 22: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 22

Internet in the Global Routing TableUsing LSPs Between PEs

Internet PECustomer

PE

P P

Internet Routing Table

(Global Routing Table)

VPN Routing Table (VRF)

Customer

PE

Internet CE

VPN

Customer

VPN

Customer

Internet

Customer

VPN

Customer

LSP

Internet Service

Provider

Page 23: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 23

Internet in the Global Routing TableUsing LSPs Between PEs

Default behavior, if Internet in global table!!

On ingress PE: BGP next hop: Egress PE loopback

Next hop to egress usually has label!

LSP is used to reach egress PE

P routers do not need to know Internet routes (nor run BGP)

Security consequence:

PE routers are fully reachable from Internet, by default (bi-directional)

P routers are also by default reachable from Internet;but only uni-directional, they don’t know the way back!

Page 24: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 24

Internet in the Global Routing TableUsing LSPs Between PEs

Fully secure each router!

Do not advertise IGP routes outside

(This is a general security recommendation for all cores!)

P routers not reachable (unless someone defaults to you)

PE routers not reachable (possible exception: Peering PE)

Infrastructure ACLs to block core space:

Additional security mechanism

Even if someone defaults to you, he cannot reach the core

Recommendations:

Page 25: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 25

Internet Service

Provider

Internet PE

Customer

PE

P P

Customer

PE

Internet CE

VPN

Customer

VPN

Customer

Internet

Customer

VPN

Customer

Internet in the Global Routing TableHop-by-Hop Routing

Internet Routing Table

(Global Routing Table)

VPN Routing Table (VRF)

Page 26: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 26

Internet in the Global Routing TableHop-by-Hop Routing

Like in standard IP core

Each router speaks BGP, and carries Internet routes

Not default, must be configured!

Security consequence:

P and PE routers by default fully reachable from Internet

Recommendations: (like before)

Fully secure each router!

Do not advertise IGP routes outside

Infrastructure ACLs

Page 27: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 27

Internet in a VRF

Internet Service

Provider

Internet PE

Customer

PE

P P

VPN

Customer

Customer

PE

Internet CE

VPN

Customer

Internet

Customer

VPN

Customer

Internet Routing Table

(Global Routing Table)

VPN Routing Table (VRF)

Internet in a VRF

Page 28: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 28

Internet in a VRF

Internet is a VPN on the core

Full separation to other VPNs, and the core, by default!

“Connection” between Internet and a VPN (for service) must be specifically configured

Security consequence:

P routers not reachable from anywhere!

PE routers only reachable on outbound facing interfaces;

Very limited

Much easier to secure

But!!!

Routes in a VRF take more memory

Convergence times increase on “old” systems

Page 29: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 29

Alternatively: No Internet on the Core

Pure MPLS VPN service considered “most secure”

But what about:

mbehring

PE

CE B

CE A

VRF B

VRF Ambehring

PE

VRF B

VRF A

CE B

CE A

however, bandwidth usually limitedand some firewall / control applied

Internet

Service

Provider

Page 30: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 30

Secure MPLS VPN Design ― Inter-AS and Carrier’s Carrier

Page 31: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 31

Inter-AS: The Options

Option A

VRF back to back;

IP interface

Option B

ASBRs exchange labelled VPN prefixes;

labelled interface

Option C

ASBRs don’t hold VPN information - only Route Reflectors do;

labelled interface

ASBR: Autonomous System Border RouterVRF: Virtual Routing and Forwarding instance

secu

rity

functionalit

y

Page 32: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 32

mbehring

Inter-AS: Case AVRF-VRF Back-to-Back

Control plane: No signalling, no labels

Data plane: IPv4 only, no labels accepted

Security: as in RFC 2547 (single-AS)

SPs are completely separated

Cust. Cust.AS 1 AS 2

CE CE

PE ASBR PEASBR

IP DataLSP LSP

Page 33: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 33

Security of Inter-AS case A

Static mapping

Only IP interfaces

SP1 does not “see” SP2’s network

And does not run routing with SP2, except within the VPNs

Quite secure

Potential issues:

SP 1 can connect VPN connection wrongly(like in ATM/FR)

Customer can flood routing table on PE (this is the same issue as in RFC 2547 (single-AS); solution: prefix limits)

Page 34: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 34

mbehring

Inter-AS: Case BASBR exchange labelled VPNv4 routes

Control plane: MP-eBGP, labels

Data plane: Packets with one label

Cust. Cust.AS 1 AS 2

CE CE

PE ASBR PEASBR

VPN label IP Data

MP-eBGP+Labels

LSP LSP

Page 35: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 35

Security of Inter-AS Case B: Summary

Control Plane can be secured well

Data Plane has some security issues:

Label is not checked today (since i/f in global table)

Labelled packets on any MPLS i/f will be forwarded if LFIB entry exists

Potential Issues:

Insertion of traffic into non-shared VPNs(uni-directional only)(requires compromised/faulty ASBR, remote exploit not possible)

All global i/f on an ASBR share the same LFIB, thus might affect third parties

Good: No “visibility” of other AS (except ASBR i/f)

Page 36: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 36

mbehring

Inter-AS Case C:ASBRs Exchange PE loopbacks

Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4/v6 routes + labels

Data plane: PE label + VPN label

AS1 can insert traffic into VPNs in AS2

Only requirement: Must have LSP to correct egress PE

Customer must trust both SPs

Cust. Cust.AS 1 AS 2

CE CE

PE ASBR PEASBR

LSP

PE Loopb+Labels

VPN IP DataPE label

VPNv4/v6 Routes + Labels

Page 37: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 37

Security of Inter-AS Case C

ASBR-ASBR signalling (BGP)RR-RR signalling (MP-BGP)

Much more “open” than Case A and B

More interfaces, more “visible” parts (PE, RR)

Potential Issues:

SP1 can intrude into any VPN on PEs which have a Inter-AS VPN configured

Cannot check what’s underneath the PE label

Very open architecture

Acceptable for ASes controlled by the same SP

Page 38: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 38

Inter-AS Summary and Recommendation

Three different models for Inter-AS

Different security properties

Most secure: Static VRF connections (case A), but least scalable

Basically the SPs have to trust each other

Hard/impossible to secure against other SP in this model

But: Can monitor with MPLS aware NetFlow (!!)

Okay if all ASes in control of one SP

Current Recommendation: Use case A

Page 39: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 39

Carrier’s Carrier

Same principles as in normal MPLS

Customer trusts carrier who trusts carrier

Carrier’s

CarrierCust. Cust.Carrier Carrier

CE1 CE2

PE1

CsC

CE1

PE2

CsC

CE2CsC

PE1CsC

PE2

IP

label

label

data

IP data

label IP data

label IP data

IP data

Page 40: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 40

Carrier’s Carrier: The Interface

Control Plane:

CsC-PE assigns label to CsC-CE

Data Plane:

CsC-PE only accepts packets with this label on this interface

CsC-PE controls data plane, no spoofing possible

Carrier’s

CarrierCarrier

CsC-CE CsC-PE

Page 41: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 41

Layer 2 VPN Security

Page 42: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 42

Virtual Private LAN Service(VPLS) Overview

Network behaves as a switch

Spanning Tree

MAC address learning

ARP, etc.

Examine threats to a switch to understand VPLS security

Page 43: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 43

VPLS Security Threats

VLAN “Hopping”

MAC Attacks

DHCP Attacks

ARP Attack

NDP Spoofing (IPv6)

Spoofing Attacks

Other Attacks

Page 44: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 44

Best Practices for L2 Security (VPLS)

1. Always use a dedicated VLAN ID for Trunk Ports

2. Disable unused ports and put them in an unused VLAN

3. Use Secure Transmission when managing Switches (SSH, OOB, Permit Lists)

4. Deploy Port Security

5. Set all host ports to Non Trunking

6. ALWAYS use a dedicated VLAN for Trunk Ports

7. Avoid using VLAN 1

8. Have a plan for ARP Security issues and implement it!!!

9. Use SNMP V3 to secure SNMP transmission

10. Use STP Attack mitigation

11. Use MD5 Authentication for VTP

12. Plan for and implement DHCP Attack mitigation

13. Use Private VLAN’s to better secure guest VLAN’s

14. Use and implement 802.1x to protect entry into your network

15. Consider using VACL’s to limit access to key network resources…

Page 45: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 45

Multicast VPN Security

Page 46: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 46

core address space0.0.0.0 – 255.255.255.255

Address Planes: True Separation for unicast and multicast!

VPN2 address space0.0.0.0 – 255.255.255.255

VPN1 address space0.0.0.0 – 255.255.255.255

CE

PE

CE

CE

CE

mbehring

PEP

PE-CE interfaces belong

to VPN.Only attack

point!!control plane

several data planes

including mc addresses

including mc addresses

including mc addresses

Page 47: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 47

MVPN Security Best Practices

Avoid RP on PE Router

Reason: higher exposure to DoS against PE

Avoid src/rec directly connected to PE

Careful with MDT group addressing

Make MDT unreachable from Internet

Filtering, private addressing

Page 48: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 48

Multicast VPN – Summary

Each VPN can use multicast independently

Source and group may overlap with other VPN

Different PIM modes can be used

VPNs remain fully separated

No reachability between VPNs, unicast or multicast

Cannot spoof other VPN, unicast or multicast

MPLS core remains secure

Not attackable from VPNs, unicast or multicast

However: DoS of PE might affect other VPNs on that PE, this must be secured specifically

Core cannot be spoofed

Page 49: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 49

IPsec and MPLS

Page 50: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 50

Where to Apply IPSec

CE PE PE CE

IPSec CE-CE

IPSec PE-PE

IPSec CE-PE

Application: VPN Security

Application: Special Cases

Application: Remote Access into VPN

Page 51: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 51

How to Establish IPSec: Options

Option 1: Static IPSec

Pre-configure static IPSec tunnels

Works, but does not scale well

Option 2: Dynamic Cryptomap/Tunnel Endpoint Discovery

Scaling improvements over 1).

Option 3: DMVPN

Dynamic tunnel establishment

Easy to configure and maintain

Some scaling issues

Option 4: GET VPN

Easy to configure and maintain

Scales well

Dynamic Multipoint VPN

Group Encrypted Transport

But: GETVPN doesn’t support IPv6

yet

Page 52: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 52

GET VPN: IPsec Made Easy!

Traditional IPsec:

- n2 Problem (scalability)

IKE/IPsec

GET VPN:

- 2 Security Associations

- to the key server (~IKE)

- to the group (IPsec)

IPsec

Key Server

Page 53: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 53

Summary

Page 54: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 54

MPLS VPN Security ― Agenda

Analysis of the Architecture

Secure MPLS VPN Design

General Best Practices

Internet Access

Inter-AS and CsC

Layer 2 VPN Security

Multicast VPN Security

IPsec and MPLS

Summary

Page 55: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 55

MPLS doesn’t provide:

Protection against mis-configurations in the core

Protection against attacks from within the core

Confidentiality, authentication, integrity, anti-replay

Use IPsec if required

Customer network security

Page 56: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 56

Summary

MPLS VPNs can be well secured

Security depends on correct operation and implementation

MPLS backbones can be more secure than “normal” IP backbones

Core not accessible from outside

Separate control and data plane

Key: PE security

Page 57: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 57

Authors:

Michael Behringer

Monique Morrow

Cisco Press,

ISBN: 1587051834

First published:

June, 2005; still up to date;

For More Information: ―MPLS VPN Security‖

Page 58: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 58

Additional Information

MPLS Security White Paper:http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/mxinf_ds.htm

Analysis of the security of the MPLS architecture

RFC on MPLS VPN Security:http://www.ietf.org/rfc/rfc4381.txt

Miercom MPLS test report:http://www.mier.com/reports/cisco/MPLS-VPNs.pdf

Practical tests show that MPLS is secure

Garnter research note M-17-1953: "MPLS Networks: Drivers Beat Inhibitors in 2003"; 10 Feb 2003

Page 59: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 59

Q&A

Page 60: MPLS VPN Security - Deniz AYDINmonsterdark.com/wp-content/uploads/MPLS-VPN-Security.pdf · MPLS Security: History 2001: First MPLS deployments; little security concerns ... Cisco

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco PublicBRKSEC-2145 60