MPLS VPN Security
暫譯: MPLS VPN 安全性

Michael H. Behringer, Monique Morrow

  • 出版商: Cisco Press
  • 出版日期: 2005-06-08
  • 售價: $2,730
  • 貴賓價: 9.5$2,594
  • 語言: 英文
  • 頁數: 312
  • 裝訂: Paperback
  • ISBN: 1587051834
  • ISBN-13: 9781587051838
  • 相關分類: 資訊安全
  • 已絕版

買這商品的人也買了...

商品描述

Description:

A practical guide to hardening MPLS networks 

  • Define "zones of trust" for your MPLS VPN environment
  • Understand fundamental security principles and how MPLS VPNs work
  • Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms
  • Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons
  • Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues
  • Operate and maintain a secure MPLS core with industry best practices
  • Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification
  • Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS)
  • Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents 

Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network.

 

MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions.

 

Drawing upon the authors’ considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment.

 

"The authors of this book, Michael Behringer and Monique Morrow, have a deep and rich understanding of security issues, such as denial-of-service attack prevention and infrastructure protection from network vulnerabilities. They offer a very practical perspective on the deployment scenarios, thereby demystifying a complex topic. I hope you enjoy their insights into the design of self-defending networks."

—Jayshree V. Ullal, Senior VP/GM Security Technology Group, Cisco Systems®

 

 

 

Table of Contents:

Foreword

Introduction

Part I       MPLS VPN and Security Fundamentals

Chapter  1MPLS VPN Security: An Overview

Key Security Concepts

Security Differs from Other Technologies

What Is “Secure”?

No System Is 100 Percent Secure

Three Components of System Security

Principle of the Weakest Link

Principle of the Least Privilege

Other Important Security Concepts

Overview of VPN Technologies

Fundamentals of MPLS VPNs

Nomenclature of MPLS VPNs

Three Planes of an MPLS VPN Network

Security Implications of Connectionless VPNs

A Security Reference Model for MPLS VPNs

Summary

Chapter  2A Threat Model for MPLS VPNs

Threats Against a VPN

Intrusions into a VPN

Denial of Service Against a VPN

Threats Against an Extranet Site

Threats Against the Core

Monolithic Core

Inter-AS: A Multi-AS Core

Carrier’s Carrier: A Hierarchical Core

Threats Against a Network Operations Center

Threats Against the Internet

Threats from Within a Zone of Trust

Reconnaissance Attacks

Summary

Part II      Advanced MPLS VPN Security Issues

Chapter  3MPLS Security Analysis

VPN Separation

Address Space Separation

Traffic Separation

Robustness Against Attacks

Where an MPLS Core Can Be Attacked

How an MPLS Core Can Be Attacked

How the Core Can Be Protected

Hiding the Core Infrastructure

Protection Against Spoofing

Specific Inter-AS Considerations

Model A: VRF-to-VRF Connections at the AS Border Routers

Model B: EBGP Redistribution of Labeled VPN-IPv4 Routes from AS to Neighboring AS

Model C: Multihop eBGP Redistribution of Labeled VPN-IPv4
Routes Between Source and Destination ASs, with eBGP
Redistribution of Labeled IPv4 Routes from AS to Neighboring AS

Comparison of Inter-AS Security Considerations

Specific Carrier’s Carrier Considerations

How CsC Works

Security of CsC

Security Issues Not Addressed by the MPLS Architecture

Comparison to ATM/FR Security

VPN Separation

Robustness Against Attacks

Hiding the Core Infrastructure

Impossibility of VPN Spoofing

CE-CE Visibility

Comparison of VPN Security Technologies

Summary

Chapter  4Secure MPLS VPN Designs

Internet Access

MPLS Core Without Internet Connectivity

Generic Internet Design Recommendations

Internet in a VRF

Internet in the Global Routing Table

Overview of Internet Provisioning

Extranet Access

MPLS VPNs and Firewalling

Designing DoS-Resistant Networks

Overview of DoS

Designing a DoS-Resistant Provider Edge

Tradeoffs Between DoS Resistance and Network Cost

DoS Resistant Routers

Inter-AS Recommendations and Traversing Multiple Provider
Trust Model Issues

Case A: VRF-to-VRF Connection on ASBRs

Case B: eBGP Redistribution of Labeled VPN-IPv4 Routes

Case C: Multi-Hop eBGP Distribution of Labeled VPN-IPv4 Routes
with eBGP Redistribution of IP4 Routes

Carriers’ Carrier

Layer 2 Security Considerations

Multicast VPN Security

Summary

Chapter  5Security Recommendations

General Router Security

Secure Access to Routers

Disabling Unnecessary Services for Security

IP Source Address Verification

12000 Protection and Receive ACLs (rACLs)

Control Plane Policing

AutoSecure

CE-Specific Router Security and Topology Design Considerations

Managed CE Security Considerations

Unmanaged CE Security Considerations

CE Data Plane Security

PE-Specific Router Security

PE Data Plane Security

PE-CE Connectivity Security Issues

P-Specific Router Security

Securing the Core

Infrastructure Access Lists (iACLs)

Routing Security

Neighbor Router Authentication

MD5 for Label Distribution Protocol

CE-PE Routing Security Best Practices

PE-CE Addressing

Static Routing

Dynamic Routing

eBGP PE-CE Routing

EIGRP PE-CE Routing

OSPF PE-CE Routing

RIPv2 PE-CE Routing

PE-CE Routing Summary

Prevention of Routes from Being Accepted by Nonrecognized Neighbors

BGP Maximum-Prefix Mechanism

Internet Access

Resource Sharing: Internet and Intranet

Sharing End-to-End Resources

Additional Security

Addressing Considerations

LAN Security Issues

LAN Factors for Peering Constructs

IPsec: CE to CE

IPsec PE-PE

MPLS over IP Operational Considerations: L2TPv3

MPLS over L2TPv3

Securing Core and Routing Check List

Summary

Part III     Practical Guidelines to MPLS VPN Security

Chapter  6How IPsec Complements MPLS

IPsec Overview

Location of the IPsec Termination Points

CE-CE IPsec

PE-PE IPsec

Remote Access IPsec into an MPLS VPN

Deploying IPsec on MPLS

Using Other Encryption Techniques

Summary

Chapter  7Security of MPLS Layer 2 VPNs

Generic Layer 2 Security Considerations

C2 Ethernet Topologies

C3 VPLS Overview

C4 VPWS Overview

C5 VPLS and VPWS Service Summary and Metro Ethernet Architecture Overview

C6 VPLS and VPWS Security Overview

Physical Interconnection Option Details

D1 SP Interconnect Models

D3 Metro Ethernet Model

Customer Edge

CE Interconnection Service Is a Layer 3 Device

Customer Edge Interconnection Service Is a Layer 2 Device

Hijack Management Security

Disable Password Recovery

U-PE STP Priority

Apply Broadcast Limiters

Disable/Block Layer 2 Control Traffic

VTP Transparent Operation

MAC Address Limits and Port Security

Controlling Reserved VLANs

Removing Unused VLANs


 

Hard-Code Physical Port Attributes

Establish Network Reporting

Enable 802.1x

Summary

Chapter  8Secure Operation and Maintenance of an MPLS Core

Management Network Security

Securely Managing CE Devices

Management VRF Overview

Management VRF Details

Securely Managing the Core Network

Summary

Part IV     Case Studies and Appendixes

Chapter  9Case Studies

Internet Access

NAT Via Common Gateways

PE to Multiple Internet Gateways

NAT via a Single Common Gateway

Registered NAT by CE

Internet Access via Customer-Controlled NAT

Internet Access Using Global Routing Table

BGP Internet Routing Table from the Service Provider of an ISP

Tier 3 ISP Connecting to an Upstream Tier via a Service Provider

Hybrid Model

Multi-Lite VRF Mechanisms

Configuration Example for Internet and VPN Service Using the Same CE

Layer 2 LAN Access

Summary

Appendix ADetailed Configuration Example for a PE

Appendix BReference List

Index

商品描述(中文翻譯)

描述:
一本實用指南,旨在加強 MPLS 網路的安全性

- 定義您的 MPLS VPN 環境中的「信任區域」
- 理解基本的安全原則以及 MPLS VPN 的運作方式
- 建立一個 MPLS VPN 威脅模型,定義攻擊點,例如 VPN 隔離、VPN 偽造、對網路主幹的拒絕服務攻擊、錯誤配置、嗅探和內部攻擊形式
- 確定 VPN 安全需求,包括對攻擊的韌性、隱藏核心基礎設施、對偽造的保護,以及 ATM/Frame Relay 安全比較
- 解釋複雜的架構,例如外部網路訪問,並提供 Inter-AS、承載支持承載、第二層安全考量和多供應商信任模型問題的建議
- 根據行業最佳實踐操作和維護安全的 MPLS 核心
- 將 IPsec 整合到您的 MPLS VPN 中,以增強加密和數據來源驗證的安全性
- 通過互連第二層網路,利用新的可用架構(如虛擬專用線服務 (VPWS) 和虛擬專用 LAN 服務 (VPLS))來建立 VPN
- 考慮操作、管理和管理 (OAM) 以及 MPLS 主幹安全事件,保護您的核心網路免受攻擊

多協議標籤交換 (MPLS) 正在成為一種廣泛部署的技術,特別是用於提供虛擬專用網路 (VPN) 服務。對於從現有 VPN 技術(如 ATM)遷移到 MPLS VPN 的公司來說,安全性是一個主要關注點。部署 MPLS VPN 的組織需要安全最佳實踐來保護其網路,特別是對於更複雜的部署模型,例如供應商間網路和網路上的互聯網供應。

《MPLS VPN 安全性》是第一本針對 MPLS VPN 網路的安全特性進行探討的書籍,並展示如何加強和安全地運行 MPLS 網路。本書分為四個部分,首先概述安全性和 VPN 技術。關於威脅和攻擊點的章節為後續章節的討論提供了基礎。第二部分從各種角度探討整體安全性,包括架構、設計和操作組件。第三部分提供實施 MPLS VPN 安全的實用指南。第四部分呈現現實案例研究,涵蓋所有前面章節的細節,以提供整體安全解決方案的範例。

根據作者在攻擊緩解和基礎設施安全方面的豐富經驗,《MPLS VPN 安全性》是您理解如何有效保護 MPLS 環境中通信的實用指南。

「本書的作者,Michael Behringer 和 Monique Morrow,對安全問題有深刻而豐富的理解,例如拒絕服務攻擊的預防和基礎設施對網路漏洞的保護。他們對部署場景提供了非常實用的觀點,從而揭開了這一複雜主題的神秘面紗。我希望您能享受他們對自我防禦網路設計的見解。」
—Jayshree V. Ullal,思科系統公司安全技術組高級副總裁/總經理

目錄:
前言
介紹
第一部分 MPLS VPN 和安全基礎
第 1 章 MPLS VPN 安全性:概述
關鍵安全概念
安全與其他技術的區別
什麼是「安全」?
沒有系統是百分之百安全的
系統安全的三個組成部分
最弱鏈接原則
最小特權原則
其他重要安全概念
VPN 技術概述
MPLS VPN 的基本原則
MPLS VPN 的命名法
MPLS VPN 網路的三個層面
無連接 VPN 的安全影響
MPLS VPN 的安全參考模型
總結
第 2 章 MPLS VPN 的威脅模型
對 VPN 的威脅
對 VPN 的入侵
對 VPN 的拒絕服務攻擊
對外部網路站點的威脅
對核心的威脅
單體核心
Inter-AS:多 AS 核心
承載的承載:分層核心
對網路運營中心的威脅
對互聯網的威脅
來自信任區域內的威脅
偵察攻擊
總結
第二部分 高級 MPLS VPN 安全問題
第 3 章 MPLS 安全分析
VPN 隔離
地址空間隔離
流量隔離
對攻擊的韌性
MPLS 核心可能受到攻擊的地方
MPLS 核心可能受到攻擊的方式
如何保護核心
隱藏核心基礎設施
對偽造的保護
特定的 Inter-AS 考量
模型 A:AS 邊界路由器的 VRF 到 VRF 連接
模型 B:從 AS 到相鄰 AS 的標籤 VPN-IPv4 路由的 EBGP 重新分配
模型 C:源 AS 和目的 AS 之間標籤 VPN-IPv4 路由的多跳 eBGP 重新分配,並從 AS 到相鄰 AS 的標籤 IPv4 路由的 eBGP 重新分配
Inter-AS 安全考量的比較
特定的承載的承載考量
CsC 的運作方式
CsC 的安全性
MPLS 架構未解決的安全問題
與 ATM/FR 安全的比較
VPN 隔離
對攻擊的韌性
隱藏核心基礎設施
VPN 偽造的不可能性
CE-CE 可見性
VPN 安全技術的比較
總結

最後瀏覽商品 (19)