Vi har bytt namn till Adlibris Campus! Campusbokhandeln ❤️ Adlibris - Läs mer här

Logga in
MPLS VPN Security

MPLS VPN Security

Ej i lager

Beskrivning

Foreword

Introduction

Part I       MPLS VPN and Security Fundamentals

Chapter  1MPLS VPN Security: An Overview

Key Security Concepts

Security Differs from Other Technologies

What Is “Secure”?

No System Is 100 Percent Secure

Three Components of System Security

Principle of the Weakest Link

Principle of the Least Privilege

Other Important Security Concepts

Overview of VPN Technologies

Fundamentals of MPLS VPNs

Nomenclature of MPLS VPNs

Three Planes of an MPLS VPN Network

Security Implications of Connectionless VPNs

A Security Reference Model for MPLS VPNs

Summary

Chapter  2A Threat Model for MPLS VPNs

Threats Against a VPN

Intrusions into a VPN

Denial of Service Against a VPN

Threats Against an Extranet Site

Threats Against the Core

Monolithic Core

Inter-AS: A Multi-AS Core

Carrier’s Carrier: A Hierarchical Core

Threats Against a Network Operations Center

Threats Against the Internet

Threats from Within a Zone of Trust

Reconnaissance Attacks

Summary

Part II      Advanced MPLS VPN Security Issues

Chapter  3MPLS Security Analysis

VPN Separation

Address Space Separation

Traffic Separation

Robustness Against Attacks

Where an MPLS Core Can Be Attacked

How an MPLS Core Can Be Attacked

How the Core Can Be Protected

Hiding the Core Infrastructure

Protection Against Spoofing

Specific Inter-AS Considerations

Model A: VRF-to-VRF Connections at the AS Border Routers

Model B: EBGP Redistribution of Labeled VPN-IPv4 Routes from AS to Neighboring AS

Model C: Multihop eBGP Redistribution of Labeled VPN-IPv4
Routes Between Source and Destination ASs, with eBGP
Redistribution of Labeled IPv4 Routes from AS to Neighboring AS

Comparison of Inter-AS Security Considerations

Specific Carrier’s Carrier Considerations

How CsC Works

Security of CsC

Security Issues Not Addressed by the MPLS Architecture

Comparison to ATM/FR Security

VPN Separation

Robustness Against Attacks

Hiding the Core Infrastructure

Impossibility of VPN Spoofing

CE-CE Visibility

Comparison of VPN Security Technologies

Summary

Chapter  4Secure MPLS VPN Designs

Internet Access

MPLS Core Without Internet Connectivity

Generic Internet Design Recommendations

Internet in a VRF

Internet in the Global Routing Table

Overview of Internet Provisioning

Extranet Access

MPLS VPNs and Firewalling

Designing DoS-Resistant Networks

Overview of DoS

Designing a DoS-Resistant Provider Edge

Tradeoffs Between DoS Resistance and Network Cost

DoS Resistant Routers

Inter-AS Recommendations and Traversing Multiple Provider
Trust Model Issues

Case A: VRF-to-VRF Connection on ASBRs

Case B: eBGP Redistribution of Labeled VPN-IPv4 Routes

Case C: Multi-Hop eBGP Distribution of Labeled VPN-IPv4 Routes
with eBGP Redistribution of IP4 Routes

Carriers’ Carrier

Layer 2 Security Considerations

Multicast VPN Security

Summary

Chapter  5Security Recommendations

General Router Security

Secure Access to Routers

Disabling Unnecessary Services for Security

IP Source Address Verification

12000 Protection and Receive ACLs (rACLs)

Control Plane Policing

AutoSecure

CE-Specific Router Security and Topology Design Considerations

Managed CE Security Considerations

Unmanaged CE Security Considerations

CE Data Plane Security

PE-Specific Router Security

PE Data Plane Security

PE-CE Connectivity Security Issues

P-Specific Router Security

Securing the Core

Infrastructure Access Lists (iACLs)

Routing Security

Neighbor Router Authentication

MD5 for Label Distribution Protocol

CE-PE Routing Security Best Practices

PE-CE Addressing

Static Routing

Dynamic Routing

eBGP PE-CE Routing

EIGRP PE-CE Routing

OSPF PE-CE Routing

RIPv2 PE-CE Routing

PE-CE Routing Summary

Prevention of Routes from Being Accepted by Nonrecognized Neighbors

BGP Maximum-Prefix Mechanism

Internet Access

Resource Sharing: Internet and Intranet

Sharing End-to-End Resources

Additional Security

Addressing Considerations

LAN Security Issues

LAN Factors for Peering Constructs

IPsec: CE to CE

IPsec PE-PE

MPLS over IP Operational Considerations: L2TPv3

MPLS over L2TPv3

Securing Core and Routing Check List

Summary

Part III     Practical Guidelines to MPLS VPN Security

Chapter  6How IPsec Complements MPLS

IPsec Overview

Location of the IPsec Termination Points

CE-CE IPsec

PE-PE IPsec

Remote Access IPsec into an MPLS VPN

Deploying IPsec on MPLS

Using Other Encryption Techniques

Summary

Chapter  7Security of MPLS Layer 2 VPNs

Generic Layer 2 Security Considerations

C2 Ethernet Topologies

C3 VPLS Overview

C4 VPWS Overview

C5 VPLS and VPWS Service Summary and Metro Ethernet Architecture Overview

C6 VPLS and VPWS Security Overview

Physical Interconnection Option Details

D1 SP Interconnect Models

D3 Metro Ethernet Model

Customer Edge

CE Interconnection Service Is a Layer 3 Device

Customer Edge Interconnection Service Is a Layer 2 Device

Hijack Management Security

Disable Password Recovery

U-PE STP Priority

Apply Broadcast Limiters

Disable/Block Layer 2 Control Traffic

VTP Transparent Operation

MAC Address Limits and Port Security

Controlling Reserved VLANs

Removing Unused VLANs


Hard-Code Physical Port Attributes

Establish Network Reporting

Enable 802.1x

Summary

Chapter  8Secure Operation and Maintenance of an MPLS Core

Management Network Security

Securely Managing CE Devices

Management VRF Overview

Management VRF Details

Securely Managing the Core Network

Summary

Part IV     Case Studies and Appendixes

Chapter  9Case Studies

Internet Access

NAT Via Common Gateways

PE to Multiple Internet Gateways

NAT via a Single Common Gateway

Registered NAT by CE

Internet Access via Customer-Controlled NAT

Internet Access Using Global Routing Table

BGP Internet Routing Table from the Service Provider of an ISP

Tier 3 ISP Connecting to an Upstream Tier via a Service Provider

Hybrid Model

Multi-Lite VRF Mechanisms

Configuration Example for Internet and VPN Service Using the Same CE

Layer 2 LAN Access

Summary

Appendix ADetailed Configuration Example for a PE

Appendix BReference List

Index

 

Produktinformation

Kategori:
Okänd
Bandtyp:
Häftad
Språk:
Engelska
Upplaga:
0
Utgiven:
2005-06-23
ISBN:
9781587051838
Sidantal:
312

Sök

Varukorg

Din varukorg är tom
Köp Sälj Sök Meny