US LHC Tier-1 WAN Data Movement Security Architectures Phil DeMar (FNAL); Scott Bradley (BNL)

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Encrypting Wireless Data with VPN Techniques
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Guide to Network Defense and Countermeasures Second Edition
FNAL Site Perspective on LHCOPN & LHCONE Future Directions Phil DeMar (FNAL) February 10, 2014.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing & Switching.
Internet2 Network: Convergence of Innovation, SDN, and Cloud Computing Eric Boyd Senior Director of Strategic Projects.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Assessing Path Control Network Performance Issues.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Questionaire answers D. Petravick P. Demar FNAL. 7/14/05 DLP -- GDB2 FNAL/T1 issues In interpreting the T0/T1 document how do the T1s foresee to connect.
Chapter 1: Hierarchical Network Design
InterVLAN Routing Design and Implementation. What Routers Do Intelligent, dynamic routing protocols for packet transport Packet filtering capabilities.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
CD FY09 Tactical Plan Review FY09 Tactical Plan for Wide-Area Networking Phil DeMar 9/25/2008.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
End-to-end resource management in DiffServ Networks –DiffServ focuses on singal domain –Users want end-to-end services –No consensus at this time –Two.
Common Devices Used In Computer Networks
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Fermi National Accelerator Laboratory, U.S.A. Brookhaven National Laboratory, U.S.A, Karlsruhe Institute of Technology, Germany CHEP 2012, New York, U.S.A.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Thoughts on Future LHCOPN Some ideas Artur Barczyk, Vancouver, 31/08/09.
Hierarchical Network Design – a Review 1 RD-CSY3021.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
TeraPaths TeraPaths: Establishing End-to-End QoS Paths through L2 and L3 WAN Connections Presented by Presented by Dimitrios Katramatos, BNL Dimitrios.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Brookhaven Science Associates U.S. Department of Energy 1 Network Services BNL USATLAS Tier 1 / Tier 2 Meeting John Bigrow December 14, 2005.
Connect. Communicate. Collaborate perfSONAR MDM Service for LHC OPN Loukik Kudarimoti DANTE.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Cisco S3C3 Virtual LANS. Why VLANs? You can define groupings of workstations even if separated by switches and on different LAN segments –They are one.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Point-to-point Architecture topics for discussion Remote I/O as a data access scenario Remote I/O is a scenario that, for the first time, puts the WAN.
TeraPaths: A QoS Enabled Collaborative Data Sharing Infrastructure for Petascale Computing Research The TeraPaths Project Team Usatlas Tier 2 workshop.
Characteristics of Scaleable Internetworks
Brookhaven Science Associates U.S. Department of Energy 1 Network Services LHC OPN Networking at BNL Summer 2006 Internet 2 Joint Techs John Bigrow July.
Use of Alternate Path Circuits at Fermilab {A Site Perspective of E2E Circuits} Phil DeMar I2/JointTechs Meeting Monday, Feb. 12, 2007.
A Strawman for Merging LHCOPN and LHCONE infrastructure LHCOPN + LHCONE Meeting Washington, DC, Jan. 31, 2013 W. E. Johnston and Chin Guok.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
100GE Upgrades at FNAL Phil DeMar; Andrey Bobyshev CHEP 2015 April 14, 2015.
Brookhaven Science Associates U.S. Department of Energy 1 n BNL –8 OSCARS provisioned circuits for ATLAS. Includes CERN primary and secondary to LHCNET,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Fermilab Cal Tech Lambda Station High-Performance Network Research PI Meeting BNL Phil DeMar September 29, 2005.
Secure High Performance Networking at BNL Winter 2013 ESCC Meeting John Bigrow Honolulu Hawaii.
Security fundamentals
Instructor Materials Chapter 7: EIGRP Tuning and Troubleshooting
Instructor Materials Chapter 1: LAN Design
Planning and Troubleshooting Routing and Switching
Instructor Materials Chapter 9: NAT for IPv4
Establishing End-to-End Guaranteed Bandwidth Network Paths Across Multiple Administrative Domains The DOE-funded TeraPaths project at Brookhaven National.
Routing and Switching Essentials v6.0
Chapter 5: Inter-VLAN Routing
Chapter 2: Static Routing
Virtual LANs.
Chapter 2: Static Routing
* Essential Network Security Book Slides.
Software Defined Networking (SDN)
IS4680 Security Auditing for Compliance
Instructor Materials Chapter 9: NAT for IPv4
Chapter 11: Network Address Translation for IPv4
Presentation transcript:

US LHC Tier-1 WAN Data Movement Security Architectures Phil DeMar (FNAL); Scott Bradley (BNL) CHEP 2013 October 17, 2013

The Challenges with High Impact Data Movement Network Bandwidth:  General R&E networks may not provide enough Site Perimeter Security Obstacles:  Firewall performance isn’t keeping up Intermingling Bulk Data Traffic with Interactive Applications:  Don’t want this to be your users audio/video apps Optimal performance may require use of alternate network paths  Means using non-default routing mechanisms 2

Long Term Trend Toward Isolating Wide-Area Science Data Movement At Tier-1 Centers, LHC WAN data dwarfs everything else: (Final year of Tevatron operations) Hybrid R&E Networks to service high impact science data: Isolated network paths Potentially with B/W guarantees Data circuit technologies enable virtual pt-to-pt connections More secure “private” network paths Discipline-specific networks appear 3 ESnet4 circa 2009

ESnet-Developed Model for a Prototype Site Science DMZ General idea: separate science data from general campus network infrastructure Components:  Data Transfer Node (DTN):  Optimized for WAN transfers  Bypass routing around site firewalls  Network measurement infrastructure  PerfSONAR An architecture, not implementation 4 ESnet prototype Science DMZ figure

Prototype Science DMZ Data Paths Custom WAN path(s) for science DMZ systems:  Appropriate bandwidth provisioning is primary goal  Optimizing latency isn’t a goal Specific security policies & tools for science data traffic Science DMZ resides outside of site perimeter 5 ESnet figure on Science DMZ data paths

Diverse Set of LHC WAN Paths LHC Optical Private Network (LHCOPN) for T0 T1 data Tightly-controlled access Dedicated bandwidth LHC Open Network Exchange (LHCONE) for T1/T2 T1/T2 Loosely-controlled access Mix of routed & end-to-end traffic End-to-end circuits: Sometimes over private links Sometimes over R&E networks Routed IP path over general R&E network infrastructure When no other paths are available 6 LHCOPN LHCONE Controlled-access traffic reduces security risks

Policy-Based Routing (PBR) PBR = forwarding of specific packets based on administrative decision or policy: In contrast to following normal (dynamic…) routing tables Manually configured on routers Cisco implementation is Route-Map command: Up to 5-tuple mapping (src/dest IP, src/dest port, protocol) Basic components are “mapping” & “action taken if matched” Similar capabilities available from other vendors Generic name = ACL-based forwarding 7

IPSLA & Object Tracking PBR is a form of static routing: Potential for black-holing traffic is path is down IPSLA and Object Tracking can be used to avoid black-holing IPSLA continuously checks to make sure path is up: ICMP ping to remote end of path Also used for SNMP monitoring of status for end-to-end circuits Object Tracking maintains status of path as an object If IPSLA fails, object (path) is marked as down Route-maps (PBR) configured with tracking object identifier If object is down, PBR forwarding is not implemented 8

FNAL Implementation 9

Site Perimeter Basics at FNAL FNAL does not have a site firewall OK, we have one but science data systems aren’t behind it Firewalls aren’t a factor for our science data movement Site security based on wide spectrum of controls Strong authentication mandated Onus on sysadmins to secure their systems Intense vulnerability scanning Perimeter controls (ACLs), IPS, web proxy, etc By default, science data must pass thru perimeter controls Bypass exception: “Known traffic from well-managed systems at trusted sites” Exception based on risk analysis and acceptable residual risk

FNAL’s PBR Implementation Forwards science traffic to alternate network paths 2-tuple, based on src/dest netblocks CMS Tier1 is always one netblock Remote T0/T1/T2 netblock is always the other All FNAL PBR is internal: No PBR forwarding into WAN Perimeter security control mechanism for bypass traffic: Only PBR-validated traffic can use the bypass route

FNAL Network Perimeter versus the Science DMZ Model CMS Tier-1 integrated into campus network:  No special DTN nodes  Tier-1 dCache servers are equivalent to DTNs Separate border router for bypass traffic:  Consistent with bypass traffic security policy Non-bypass traffic to/from Tier-1 passes through normal perimeter security controls

US-CMS Tier-1 – Alternate WAN Paths US-CMS Tier-1: ~1600 systems Distributed across 4 computer rooms dCache servers distributed as well Primary & secondary Tier-1 LAN switches Connections to campus core Also to bypass perimeter router (E2E) for WAN science data Higher bandwidth connection for science data movement

By Default, Tier-1 Traffic Follows General IP (Routed) Path Tier-1 WAN traffic forwarded through primary Tier-1 switch Path symmetry more important than traffic load balancing Layer -2 traffic within LAN distributed across links via VPC Unless bypass routed, traffic will pass through campus core & border router This includes perimeter security controls

Alternate Network Paths via PBR PBR steers select traffic to/from bypass router Based on src/dst address blocks Our Tier-1 netblock is always one of the tuples Remote Tier-0, Tier-1, or Tier-2 is the other PBR is manually configured: A bit of a pain, but scalable to level of CMS collaboration Dealing with address changes at remote sites also an issue

Non-PBR Traffic on Bypass Connections Incoming traffic not in PBR tables forwarded to border router:  Still gets into the Tier1  But passes through security controls  Also creates WAN path asymmetry  May cause firewall problem on remote end 16 We monitor flow data between bypass and border router for this type of traffic  Will add to PBR tables if its valid CMS traffic  But this is still a manual process

FNAL Future Directions – Perimeter Architecture Costs of 100GE will necessitate consolidating bypass router functions into border & backup border routers: Consistent with general technology trend to consolidate network hardware & virtualize network functions 17

BNL Implementation 18

BNL Science DMZ 100gb/sec WAN Connectivity: Provides native 100gb/sec. interfaces Will interface to Testing and Production 100g waves Supports multiple 10gb/sec. and 40gb/sec. connections Initially 2 attachment ports at 100gb/sec. Dedicated CIDR block for IP addressing Will have limited Etherchannel to BNL campus Dedicated routing platform – Juniper MX2010

BNL Science DMZ cont Current Status First 100g wave in testing phase Will participate in TA100 testing with CERN Currently evaluating an Arista 7508E switch for aggregation, others to follow High port density and types are key requirements

Dedicated SCI DMZ Router Aggregation Switch BNL Science DMZ Topology

General Future Directions - OpenFlow PBR has worked very well to isolate & control our science data traffic, but: Manual configuration is a pain Adds complexity to site routing & troubleshooting Keeping up with address changes/additions is difficult OpenFlow - emerging standard for flow-based forwarding: PBR is essentially flow-based forwarding, too We’re investigating OpenFlow to replace current PBR Long term vision - end-to-end forwarding based on OpenFlow Short term goal - replace PBR within the US-CMS Tier-1 22

Summary Separating science data movement from general network traffic has worked well at US-LHC Tier-1s Enabled us to meet needs of both LHC stakeholders & general users, but not at each other’s expense Science DMZ architectures based around PBR for LHC traffic: Avoids performance issues with overloading perimeter security tools Our implementations work well for us because: We are dealing with established traffic characteristics Our stakeholders are well-organized & long-lived May not translate well to other disciplines Looking toward OpenFlow as a more standard approach to separate out our science data movement

24 Questions ?