MPLS VPN Security Best Practice Guidelines
MPLS VPN Security Best Practice Guidelines
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
MPLS Security
MPLS Evolution
Initial MPLS Large SP and Enterprise Next-Generation
Deployments MPLS deployments MPLS Deployments
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
MPLS Security Drivers
Enterprise Segment
Regulatory compliance Sarbanes-Oxley Act
Financials
Extranet security Financial application access
User traffic segmentation Secure campus connectivity
Education/Research
Regulatory compliance
Extranet security Extranet partner connectivity
Other
MPLS technology value-add
Government Segment
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Security Risk
• MPLS security architecture components
Network design
Implementation
Operation
• Level of MPLS network deployment complexity determines
perceived security risks
• Influencing factors of MPLS deployment complexity
Network architecture (e.g., physical v.s. logical separation)
Networking services run on top of MPLS network
• Types of networking services
Public IP services (Internet)
Private (VPN) connectivity services
• Single MPLS core for • Single MPLS core for • Separate MPLS cores
MPLS both public IP and both public IP and for public IP and
Core private VPN traffic private VPN traffic private VPN traffic
Network • Optional BGP/Internet • Optional BGP/Internet • Optional BGP/Internet
free core free core free core
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Network Complexity versus Capital Costs
Logical
Separation Simplifications for implementing
MPLS security mechanisms
reducing MPLS deployment risks.
Shared MPLS
Network Core & Edge
MPLS security mechanism enable
Complexity Public/Private secure logical separation of MPLS
PE
(Risk) traffic forwarding and signaling
Separate MPLS
MPLS
Core & Edge
Core
Public Private
PE PE
Physical
Sweet MPLS MPLS Separation
Core Core
Spot
Still “Open”:
• Don’t let packets into the core (for Routing
MPLS: PE routers)
Protocol
No way to attack core, except
through routing, thus:
Avoid Insider
Attacks
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Security Recommendations for ISPs
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Feature Portfolio
Relevant Standardization
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Conclusions
References
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Q and A
Copyright © 2005, Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr