Staff AAA. Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos.

Slides:



Advertisements
Similar presentations
An Operational Perspective on BGP Security Geoff Huston February 2005.
Advertisements

The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
Point Protection 111. Check List AAA to the Network Devices Controlling Packets Destined to the Network Devices Config Audits.
Securing the Router Chris Cunningham.
Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling.
2006 Double Shot Security, Inc. All rights reserved 1 Operational Security Current Practices APNIC22 - Kaohsiung, Taiwan Merike Kaeo
Routing Security Capabilities draft-zhao-opsec-routing-capabilities-02.txt OPSEC WG, IETF #66.
Sink Holes 111. Sink Hole Routers/Networks Sink Holes are a Swiss Army Knife security tool. –BGP speaking Router or Workstation that built to suck in.
BGP Security APNIC Open Policy Meeting Routing SIG 23 February 2005 Kyoto, Japan Russ Housley
Border Gateway Protocol Ankit Agarwal Dashang Trivedi Kirti Tiwari.
1 © 1999, Cisco Systems, Inc. Course Number Presentation_ID ISP Security Issues in today’s Internet It’s not a nice place anymore...
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Inter-domain Routing security Problems Solutions.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Border Gateway Protocol (BGP4) Rizwan Rehman, CCS, DU.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Edge Protection 111. The Old World: Network Edge Core routers individually secured Every router accessible from outside “outside” Core telnet snmp.
BGP Best Current Practices
– Chapter 4 – Secure Routing
Tracking and Tracing Cyber-Attacks
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Module 14: Configuring Server Security Compliance
SECURING BGP Matthew Nickasch University of Wisconsin-Platteville Dept. of Computer Science & Software Engineering.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Control Plane Protection 111. BGP Attack Vectors Understanding BGP Attack Vectors will help you plan and prioritize the techniques deployed to build greater.
Chapter 9. Implementing Scalability Features in Your Internetwork.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Interdomain Routing Security. How Secure are BGP Security Protocols? Some strange assumptions? – Focused on attracting traffic from as many Ases as possible.
MENU Implications of Securing Router Infrastructure NANOG 31 May 24, 2004 Ryan McDowell
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Chapter 10 Security. A typical secured network Recognizing Security Threats 1- Application-layer attacks Ex: companyname.com/scripts/..%5c../winnt/system32/cmd.exe?/c+dir+c:\
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—3-1 Implementing a Scalable Multiarea Network OSPF- Based Solution Lab 3-5 Debrief.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
 RIP — A distance vector interior routing protocol  IGRP — The Cisco distance vector interior routing protocol (not used nowadays)  OSPF — A link-state.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 BGP Overview Establishing BGP Sessions.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
CPS 2.2 Features                  Internal Use - Confidential.
Connecting an Enterprise Network to an ISP Network
Cisco Exam Questions Dumps
Cisco Exam Questions Dumps
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
BGP Best Current Practices
Cisco Want to Pass CCNA Cisco Certified Network Associate Exam
Cisco Real Exam Dumps IT-Dumps
Get Cisco Exam Free Study material | Dumps4download.co.in
Chapter 8: Monitoring the Network
– Chapter 4 – Secure Routing
– Chapter 3 – Device Security (B)
BGP Instability Jennifer Rexford
Presentation transcript:

Staff AAA

Radius is not an ISP AAA Option

RADIUS TACACS+ Kerberos

What to Configure?

Simple Staff Authentication and Failsafe

Staff Authentication

Staff Accountability & Audit

Checkpoint with Authentication and Accounting

Limit Authority – Authorize Commands

Set Privileges

Checkpoint with default Authorization

Note on Privilege Levels and Authorization

One Time Password – Checking the ID

What is One Time Password

DoS the AAA Infrastructure

How to protect the AAA Servers?

Source Routing

ICMP Unreachable Overload

ICMP Unreachable Rate-Limiting

Tip: scheduler allocate

Introducing a New Router to the Network

Secure Template Sources

Input Hold Queue

What Ports Are open on the Router?

Receive ACL - Overview

Receive Adjacencies

Receive ACL Command

Receive ACL

Receive Path ACL

Packet Flow

Receive ACL – Traffic Flow

rACL Processing

rACL – Required Entries

rACL – Building Your ACL

Filtering Fragments

rACL – Iterative Deployment

Classification ACL Example

rACL – Iterative Deployment

rACL – Sample Entries

Use Detailed Logging

Core Dumps

Routing Protocol Security  Why to Prefix Filter and Overview? (Threats)  How to Prefix Filter?  Where to Prefix Filter?  Prefix Filter on Customers  Egress Filter to Peers  Ingress Filter from Peers  Protocol Authentication (MD5)  BGP BCPs that help add Resistance

Routing Protocol Security

Malicious Route Injection Perceive Threat

Malicious Route Injection Reality – an Example

Garbage in – Garbage Out: What is it?

Garbage in – Garbage Out: Results

Garbage in – Garbage Out: Impact

Garbage in – Garbage Out: What to do?

Malicious Route Injection Attack Methods

Malicious Route Injection Impact

What is a prefix hijack?

Malicious Route Injection What can ISPs Do?

What can ISPs Do? Containment Egress Prefix Filters

Malicious Route Injection What can ISPs Do?

How to Prefix Filter? Ingress and Egress Route Filtering

Ingress and Egress Route Filtering

Two Filtering Techniques

Ideal Customer Ingress/Egress Route Filtering ….

BGP Peering Fundamental

Guarded Trust

Where to Prefix Filter?

What to Prefix Filter? Documenting Special Use Addresses (DUSA) and Bogons

Documenting Special Use Addresses (DUSA)

Bogons

Ingress Prefix Filter Template

Prefix Filters on Customers

BGP with Customer Infers Multihoming

Receiving Customer Prefixes

Excuses – Why providers are not prefix filtering customers.

What if you do not filter your customer?

Prefixes to Peers

Egress Filter to ISP Peers - Issues

Policy Questions

Ingress Prefix Filtering from Peers

Ingress Routes from Peers or Upstream

Receiving Prefixes from Upstream & Peers (ideal case)

Receiving Prefixes — Cisco IOS

Net Police Route Filtering

Net Police Filter Technique #1

Technique #1 Net Police Prefix List

Net Police Prefix List Deployment Issues

Technique #2 Net Police Prefix List Alternative

Net Police Filter – Technique #3

Technique #3 Net Police Prefix List

Net Police Filter – Technique #3

Bottom Line

Secure Routing Route Authentication

Plain-text neighbor authentication

MD-5 Neighbor Authentication: Originating Router

Peer Authentication

OSPF Peer Authentication

OSPF and ISIS Authentication Example

BGP Peer Authentication

BGP MD5 ’ s Problem

BGP BCPs That Help Build Security Resistance

BGP Maximum Prefix Tracking

Avoid Default Routes

Network with Default Route – Pointing to Upstream A

Network with Default Route – But not Pointing to Upstream

Network with No Default Route

Default Route and ISP Security - Guidance

Default to a Sink-Hole Router/Network