2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security 1
MPLS VPN Securityin Service ProviderNetworks
Peter TomsuMichael BehringerMonique Morrow
2 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
About this Presentation
Advanced level advanced MPLS concepts and architectures.
Target Audience:Service provider!!Network operators and designersTechnical focus
3 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Why Is MPLS VPN Security Important?
Customer buys Internet Service:Packets from SP are not trustedPerception: Need for firewalls, etc.
Customer buys a VPN Service:Packets from SP are trustedPerception: No further security required
SP Must Ensure SecureMPLS Operations
4 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Objectives
Understand how secure MPLS VPNs* areAnd what IPsec offers in addition
Best practices on how to secureGeneral MPLS VPN deploymentsInter-provider VPNSpecific cases (Internet, etc)
* Here: MPLS VPN = RFC 4364 (old RFC 2547bis)
5 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
MPLS VPN Security _ Agenda
Analysis of the Architecture
Secure MPLS VPN DesignGeneral Best PracticesInternet AccessInter-AS and CsC
IPsec and MPLS
Outlook
Summary
6 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Analysis of theMPLS VPNArchitecture
(RFC 4364)
7 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Comparison with ATM/FR
With IPsecYesDirect CE-CEAuthentication (Layer 3)
YesYesResistance toLabel Spoofing
YesYesResistance to Attacks
YesYesRouting Separation
YesYesAddress Space Separation
MPLSATM/FR
8 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Basic RFC 4364 Security:Todays Arguments
Can be mis-configured(operation)
Routers can have bugs(implementation)
PEs can be accessedfrom Internet, thus intrinsicallyinsecure
Floods over Internetcan impact VPN traffic
True, but sameon ATM/FR
PEs can be secured,as Internet routers
Engineering/QoS
9 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Security Relies on Three Pillars
Security
Arc
hite
ctur
e/A
lgor
ithm
Impl
emen
tatio
n
Ope
ratio
nBreak One, and All Security Is Gone!
10 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Address Planes: True Separation!
Core Address Space0.0.0.0255.255.255.255
PE
VPN1 Address Space0.0.0.0255.255.255.255CE CE
VPN2 Address Space0.0.0.0255.255.255.255CE CE
mbehring
PEP
PE-CEInterfaces
Belong to VPN;Only Attack
Point!!Control Plane:
IPv4 Addr.
Several DataPlanes:
VPNv4 Addr.
11 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Secure MPLS VPNDesign _General SecurityBest Practices
12 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Secure MPLS/VPN Core Design1. Secure each router individually2. Dont let packets into (!)
the coreNo way to attack core, exceptthrough routing, thus:
3. Secure the routing protocolNeighbor authentication, maximumroutes, dampening,
4. Design for transit trafficQoS to give VPN priorityover InternetChoose correct routerfor bandwidthSeparate PEs where necessary
5. Operate Securely
Still Open:RoutingProtocol
Only AttackVector:Transit Traffic
Now OnlyInsider AttacksPossible
Avoid InsiderAttacks
13 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
PE-CE Routing Security
In order of security preference:
1. Static: If no dynamic routing required(no security implications)
2. BGP: For redundancy and dynamic updates(many security features)
3. IGPs: If BGP not supported(limited security features)
14 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Securing the Core:Infrastructure ACLs
On PE: deny ip any Exception: routing protocol from host to host
Idea: no traffic to PE/P you cant attack
Prevents intrusions 100%
DoS: very hard, but traffic over router theoreticallyenables DoS
CE PEVPN
Easy with MPLS!
In MPLS:VRF Belongs toCustomer VPN!
15 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Securing the Core:Infrastructure ACLs
CE PEVPN
CE PEVPN
PEVPN
PEVPN
CE
CE
1.1.1.0/30
1.1.1.4/30
1.1.1.8/30
1.1.1.12/30.1
.1
.1
.1.2
.2
.2
.2
This Is VPN AddressSpace, Not Core!
Example:deny ip any 1.1.1.0 0.0.0.255permit ip any any
Caution: This also blocks packets to the CEs!Alternatives: List all PE i/f in ACL, or use secondaryi/f on CE, or ACL with dis-contiguous subnet masks (11111101)
16 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Neighbor Authentication
Router knows his neighborsVerification through shared MD5 secret
Verifies updates it receives from neighbor
Supported: BGP, ISIS, OSPF, EIGRP, RIPv2, LDP
Key chains supported for ISIS, EIGRP, RIPUse them where availableEasier key roll-overSupport for LDP key chains soon
Config easy
17 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
VRF Maximum Prefix Number
Injection of too many routes:Potential memory overflow
Potential DoS attack
For a VRF: Specify the maximum number ofroutes allowed
ip vrf red maximum routes 45 80
Accept Max 45 Prefixes,In This VRF
and Log a Warning at80% (of 45),
18 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Control of Routes from a BGP Peer
Injection of too many routes:Potential memory overflowPotential DoS attack
Control with maximum prefix command(under the BGP neighbor definition)
router bgp 13 neighbor 140.0.250.2 maximum-prefix 45 80 restart 2
Accept Max 45 Prefixes,Then Reset Session
From ThisNeighbor
Log a Warningat 80% (of 45),
and Restart the BGPSession After Two Min.
19 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Control of Routes from a BGP Peer:Logging
6d22h: %BGP-4-MAXPFX: No. of prefix received from140.0.250.2 (afi 2) reaches 37, max 45
6d22h: %BGP-3-MAXPFXEXCEED: No. of prefix receivedfrom 140.0.250.2 (afi 2): 46 exceed limit 456d22h: %BGP-5-ADJCHANGE: neighbor 140.0.250.2 vpn vrf VPN_20499Down BGP Notification sent
6d22h: %BGP-3-NOTIFICATION: sent to neighbor140.0.250.2 3/1 (update malformed) 0 bytes FFFF FFFFFF
20 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Best Practice Security Overview Secure devices (PE, P): They are trusted!
See next slide for risks
PEs: Secure with ACLs on all interfaces; CoPP Static PE-CE routing where possible If routing: Use authentication (MD5) Maximum number of routes per peer (only BGP) Separation of CE-PE links where possible
(Internet/VPN) LDP authentication (MD5) (key chains to be supported soon) VRF: Define maximum number of routes Note: Overall security depends on weakest link!
ControlPlane
Policing
21 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Key: PE Security
What happens if a single PE in the core getscompromised?
Intruder has access to all VPNs; GRE tunnel to his CE in the Internet, bring that CE into any VPNThat VPN might not even noticeWorst Case!!!!
Therefore: PE Security is Paramount!!!!!!!
Therefore: No PE on customer premises!!!!!!!(Think about console access, password recovery)
22 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
No Service Password-Recovery
Different implementationsWhen password recovery erase NVRAMPassword recovery impossible (really!)
Where available: Use It!
This makes it hard to intrude into a PE,even with physical access!
23 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Solution: Operational Security
Security depends on SP!Employee can make mistake, or malicious misconfiguration
Potential Security hole:If PE compromised, VPNs might be insecure
Cannot *prevent* all misconfigsNeed to operationally control this
24 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
Operational Security
Logging config changes; automated auditsDual Control: Network operators must have no access tologging facilitySee also: Router Security Audit (12.0(27)S, 12.2(18)S)
AAA for access CLI views or AAA for command authorization
Keep logs in a secure place(Malicious employee might change logs too)
Tight control No service password-recovery where available
Secure Operations Is Hard!!!
25 2006 Cisco Systems, Inc. All rights reserved. Cisco PublicIPM-3012 MPLS Security
MPLS VPNs are Quite Secure
Perfect Separation of VPNsNo intrusions possible