MPLS VPN Security
暫譯: MPLS VPN 安全性
Michael H. Behringer, Monique Morrow
- 出版商: Cisco Press
- 出版日期: 2005-06-08
- 售價: $2,730
- 貴賓價: 9.5 折 $2,594
- 語言: 英文
- 頁數: 312
- 裝訂: Paperback
- ISBN: 1587051834
- ISBN-13: 9781587051838
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$980$774 -
$900$711 -
$750$638 -
$780$616 -
$2,550$2,423 -
$650$507 -
$2,275$2,161 -
$2,560$2,432 -
$620$490 -
$580$452 -
$750$593 -
$590$460 -
$560$437 -
$880$748 -
$780$616 -
$580$493 -
$620$490 -
$3,250$3,088 -
$2,030$1,929 -
$680$537 -
$1,800$1,710 -
$720$569 -
$800$632 -
$1,575$1,496 -
$3,040$2,888
商品描述
Description:
A practical guide to hardening MPLS networks
- Define "zones of trust" for your MPLS VPN environment
- Understand fundamental security principles and how MPLS VPNs work
- Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms
- Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons
- Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues
- Operate and maintain a secure MPLS core with industry best practices
- Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification
- Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS)
- Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents
Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network.
MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions.
Drawing upon the authors’ considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment.
"The authors of this book, Michael Behringer and Monique Morrow, have a deep and rich understanding of security issues, such as denial-of-service attack prevention and infrastructure protection from network vulnerabilities. They offer a very practical perspective on the deployment scenarios, thereby demystifying a complex topic. I hope you enjoy their insights into the design of self-defending networks."
—Jayshree V. Ullal, Senior VP/GM Security Technology Group, Cisco Systems®
Table of Contents:
Foreword
Introduction
Part I MPLS VPN and Security Fundamentals
Chapter 1MPLS VPN Security: An Overview
Key Security Concepts
Security Differs from Other Technologies
What Is “Secure”?
No System Is 100 Percent Secure
Three Components of System Security
Principle of the Weakest Link
Principle of the Least Privilege
Other Important Security Concepts
Overview of VPN Technologies
Fundamentals of MPLS VPNs
Nomenclature of MPLS VPNs
Three Planes of an MPLS VPN Network
Security Implications of Connectionless VPNs
A Security Reference Model for MPLS VPNs
Summary
Chapter 2A Threat Model for MPLS VPNs
Threats Against a VPN
Intrusions into a VPN
Denial of Service Against a VPN
Threats Against an Extranet Site
Threats Against the Core
Monolithic Core
Inter-AS: A Multi-AS Core
Carrier’s Carrier: A Hierarchical Core
Threats Against a Network Operations Center
Threats Against the Internet
Threats from Within a Zone of Trust
Reconnaissance Attacks
Summary
Part II Advanced MPLS VPN Security Issues
Chapter 3MPLS Security Analysis
VPN Separation
Address Space Separation
Traffic Separation
Robustness Against Attacks
Where an MPLS Core Can Be Attacked
How an MPLS Core Can Be Attacked
How the Core Can Be Protected
Hiding the Core Infrastructure
Protection Against Spoofing
Specific Inter-AS Considerations
Model A: VRF-to-VRF Connections at the AS Border Routers
Model B: EBGP Redistribution of Labeled VPN-IPv4 Routes from AS to Neighboring AS
Model C:
Multihop eBGP Redistribution of Labeled VPN-IPv4
Routes Between Source and
Destination ASs, with eBGP
Redistribution of Labeled IPv4 Routes from AS to
Neighboring AS
Comparison of Inter-AS Security Considerations
Specific Carrier’s Carrier Considerations
How CsC Works
Security of CsC
Security Issues Not Addressed by the MPLS Architecture
Comparison to ATM/FR Security
VPN Separation
Robustness Against Attacks
Hiding the Core Infrastructure
Impossibility of VPN Spoofing
CE-CE Visibility
Comparison of VPN Security Technologies
Summary
Chapter 4Secure MPLS VPN Designs
Internet Access
MPLS Core Without Internet Connectivity
Generic Internet Design Recommendations
Internet in a VRF
Internet in the Global Routing Table
Overview of Internet Provisioning
Extranet Access
MPLS VPNs and Firewalling
Designing DoS-Resistant Networks
Overview of DoS
Designing a DoS-Resistant Provider Edge
Tradeoffs Between DoS Resistance and Network Cost
DoS Resistant Routers
Inter-AS
Recommendations and Traversing Multiple Provider
Trust Model
Issues
Case A: VRF-to-VRF Connection on ASBRs
Case B: eBGP Redistribution of Labeled VPN-IPv4 Routes
Case C:
Multi-Hop eBGP Distribution of Labeled VPN-IPv4 Routes
with eBGP
Redistribution of IP4 Routes
Carriers’ Carrier
Layer 2 Security Considerations
Multicast VPN Security
Summary
Chapter 5Security Recommendations
General Router Security
Secure Access to Routers
Disabling Unnecessary Services for Security
IP Source Address Verification
12000 Protection and Receive ACLs (rACLs)
Control Plane Policing
AutoSecure
CE-Specific Router Security and Topology Design Considerations
Managed CE Security Considerations
Unmanaged CE Security Considerations
CE Data Plane Security
PE-Specific Router Security
PE Data Plane Security
PE-CE Connectivity Security Issues
P-Specific Router Security
Securing the Core
Infrastructure Access Lists (iACLs)
Routing Security
Neighbor Router Authentication
MD5 for Label Distribution Protocol
CE-PE Routing Security Best Practices
PE-CE Addressing
Static Routing
Dynamic Routing
eBGP PE-CE Routing
EIGRP PE-CE Routing
OSPF PE-CE Routing
RIPv2 PE-CE Routing
PE-CE Routing Summary
Prevention of Routes from Being Accepted by Nonrecognized Neighbors
BGP Maximum-Prefix Mechanism
Internet Access
Resource Sharing: Internet and Intranet
Sharing End-to-End Resources
Additional Security
Addressing Considerations
LAN Security Issues
LAN Factors for Peering Constructs
IPsec: CE to CE
IPsec PE-PE
MPLS over IP Operational Considerations: L2TPv3
MPLS over L2TPv3
Securing Core and Routing Check List
Summary
Part III Practical Guidelines to MPLS VPN Security
Chapter 6How IPsec Complements MPLS
IPsec Overview
Location of the IPsec Termination Points
CE-CE IPsec
PE-PE IPsec
Remote Access IPsec into an MPLS VPN
Deploying IPsec on MPLS
Using Other Encryption Techniques
Summary
Chapter 7Security of MPLS Layer 2 VPNs
Generic Layer 2 Security Considerations
C2 Ethernet Topologies
C3 VPLS Overview
C4 VPWS Overview
C5 VPLS and VPWS Service Summary and Metro Ethernet Architecture Overview
C6 VPLS and VPWS Security Overview
Physical Interconnection Option Details
D1 SP Interconnect Models
D3 Metro Ethernet Model
Customer Edge
CE Interconnection Service Is a Layer 3 Device
Customer Edge Interconnection Service Is a Layer 2 Device
Hijack Management Security
Disable Password Recovery
U-PE STP Priority
Apply Broadcast Limiters
Disable/Block Layer 2 Control Traffic
VTP Transparent Operation
MAC Address Limits and Port Security
Controlling Reserved VLANs
Removing Unused VLANs
Hard-Code Physical Port Attributes
Establish Network Reporting
Enable 802.1x
Summary
Chapter 8Secure Operation and Maintenance of an MPLS Core
Management Network Security
Securely Managing CE Devices
Management VRF Overview
Management VRF Details
Securely Managing the Core Network
Summary
Part IV Case Studies and Appendixes
Chapter 9Case Studies
Internet Access
NAT Via Common Gateways
PE to Multiple Internet Gateways
NAT via a Single Common Gateway
Registered NAT by CE
Internet Access via Customer-Controlled NAT
Internet Access Using Global Routing Table
BGP Internet Routing Table from the Service Provider of an ISP
Tier 3 ISP Connecting to an Upstream Tier via a Service Provider
Hybrid Model
Multi-Lite VRF Mechanisms
Configuration Example for Internet and VPN Service Using the Same CE
Layer 2 LAN Access
Summary
Appendix ADetailed Configuration Example for a PE
Appendix BReference List
Index
商品描述(中文翻譯)
描述:
一本實用指南,旨在加強 MPLS 網路的安全性
- 定義您的 MPLS VPN 環境中的「信任區域」
- 理解基本的安全原則以及 MPLS VPN 的運作方式
- 建立一個 MPLS VPN 威脅模型,定義攻擊點,例如 VPN 隔離、VPN 偽造、對網路主幹的拒絕服務攻擊、錯誤配置、嗅探和內部攻擊形式
- 確定 VPN 安全需求,包括對攻擊的韌性、隱藏核心基礎設施、對偽造的保護,以及 ATM/Frame Relay 安全比較
- 解釋複雜的架構,例如外部網路訪問,並提供 Inter-AS、承載支持承載、第二層安全考量和多供應商信任模型問題的建議
- 根據行業最佳實踐操作和維護安全的 MPLS 核心
- 將 IPsec 整合到您的 MPLS VPN 中,以增強加密和數據來源驗證的安全性
- 通過互連第二層網路,利用新的可用架構(如虛擬專用線服務 (VPWS) 和虛擬專用 LAN 服務 (VPLS))來建立 VPN
- 考慮操作、管理和管理 (OAM) 以及 MPLS 主幹安全事件,保護您的核心網路免受攻擊
多協議標籤交換 (MPLS) 正在成為一種廣泛部署的技術,特別是用於提供虛擬專用網路 (VPN) 服務。對於從現有 VPN 技術(如 ATM)遷移到 MPLS VPN 的公司來說,安全性是一個主要關注點。部署 MPLS VPN 的組織需要安全最佳實踐來保護其網路,特別是對於更複雜的部署模型,例如供應商間網路和網路上的互聯網供應。
《MPLS VPN 安全性》是第一本針對 MPLS VPN 網路的安全特性進行探討的書籍,並展示如何加強和安全地運行 MPLS 網路。本書分為四個部分,首先概述安全性和 VPN 技術。關於威脅和攻擊點的章節為後續章節的討論提供了基礎。第二部分從各種角度探討整體安全性,包括架構、設計和操作組件。第三部分提供實施 MPLS VPN 安全的實用指南。第四部分呈現現實案例研究,涵蓋所有前面章節的細節,以提供整體安全解決方案的範例。
根據作者在攻擊緩解和基礎設施安全方面的豐富經驗,《MPLS VPN 安全性》是您理解如何有效保護 MPLS 環境中通信的實用指南。
「本書的作者,Michael Behringer 和 Monique Morrow,對安全問題有深刻而豐富的理解,例如拒絕服務攻擊的預防和基礎設施對網路漏洞的保護。他們對部署場景提供了非常實用的觀點,從而揭開了這一複雜主題的神秘面紗。我希望您能享受他們對自我防禦網路設計的見解。」
—Jayshree V. Ullal,思科系統公司安全技術組高級副總裁/總經理
目錄:
前言
介紹
第一部分 MPLS VPN 和安全基礎
第 1 章 MPLS VPN 安全性:概述
關鍵安全概念
安全與其他技術的區別
什麼是「安全」?
沒有系統是百分之百安全的
系統安全的三個組成部分
最弱鏈接原則
最小特權原則
其他重要安全概念
VPN 技術概述
MPLS VPN 的基本原則
MPLS VPN 的命名法
MPLS VPN 網路的三個層面
無連接 VPN 的安全影響
MPLS VPN 的安全參考模型
總結
第 2 章 MPLS VPN 的威脅模型
對 VPN 的威脅
對 VPN 的入侵
對 VPN 的拒絕服務攻擊
對外部網路站點的威脅
對核心的威脅
單體核心
Inter-AS:多 AS 核心
承載的承載:分層核心
對網路運營中心的威脅
對互聯網的威脅
來自信任區域內的威脅
偵察攻擊
總結
第二部分 高級 MPLS VPN 安全問題
第 3 章 MPLS 安全分析
VPN 隔離
地址空間隔離
流量隔離
對攻擊的韌性
MPLS 核心可能受到攻擊的地方
MPLS 核心可能受到攻擊的方式
如何保護核心
隱藏核心基礎設施
對偽造的保護
特定的 Inter-AS 考量
模型 A:AS 邊界路由器的 VRF 到 VRF 連接
模型 B:從 AS 到相鄰 AS 的標籤 VPN-IPv4 路由的 EBGP 重新分配
模型 C:源 AS 和目的 AS 之間標籤 VPN-IPv4 路由的多跳 eBGP 重新分配,並從 AS 到相鄰 AS 的標籤 IPv4 路由的 eBGP 重新分配
Inter-AS 安全考量的比較
特定的承載的承載考量
CsC 的運作方式
CsC 的安全性
MPLS 架構未解決的安全問題
與 ATM/FR 安全的比較
VPN 隔離
對攻擊的韌性
隱藏核心基礎設施
VPN 偽造的不可能性
CE-CE 可見性
VPN 安全技術的比較
總結