Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.

Slides:



Advertisements
Similar presentations
Chapter 7 RIP version 2.
Advertisements

RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Chapter 9: Access Control Lists
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—2-1 Label Assignment and Distribution Introducing Typical Label Distribution in Frame-Mode MPLS.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Chapter 5 IP Routing Routing Sending packets through network from one device to another What must routers know? – Destination address – Neighboring routers.
CCNA 2 v3.1 Module 6.
Routing.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Assessing Network Routing Performance and.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
Computer Networks Layering and Routing Dina Katabi
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
– Chapter 4 – Secure Routing
TCOM 515 Lecture 6.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Lecture Week 7 RIPv2 Routing Protocols and Concepts.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network BGP Attributes and Path Selection Process.
Routing and Routing Protocols Routing Protocols Overview.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Access Control List ACL. Access Control List ACL.
IP Forwarding.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
10/8/2015CST Computer Networks1 IP Routing CST 415.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Access Control List (ACL)
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-5-1 WAN Connections Routing & Enabling RIP.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
1 Internet Routing. 2 Terminology Forwarding –Refers to datagram transfer –Performed by host or router –Uses routing table Routing –Refers to propagation.
Page 110/27/2015 A router ‘knows’ only of networks attached to it directly – unless you configure a static route or use routing protocols Routing protocols.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
CCNA 2 Week 7 Distance Vector Routing. Copyright © 2005 University of Bolton Topics Distance Vector Protocol Issues RIP IGRP.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Routing and Routing Protocols
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
1 Version 3.1 Module 6 Routed & Routing Protocols.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Filtering Spoofed Packets Network Ingress Filtering (BCP 38) What are spoofed or forged packets? Why are they bad? How to keep them out.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—6-1 Scaling Service Provider Networks Scaling IGP and BGP in Service Provider Networks.
 RIP — A distance vector interior routing protocol  IGRP — The Cisco distance vector interior routing protocol (not used nowadays)  OSPF — A link-state.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—5-1 Customer-to-Provider Connectivity with BGP Connecting a Multihomed Customer to a Single Service.
RIP V1 W.lilakiatsakun. RIP V1 characteristics RIP is a distance vector routing protocol. RIP is a distance vector routing protocol. RIP uses hop count.
1 Border Gateway Protocol (BGP) and BGP Security Jeff Gribschaw Sai Thwin ECE 4112 Final Project April 28, 2005.
Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Chapter 4: Network Layer
BGP 1. BGP Overview 2. Multihoming 3. Configuring BGP.
Chapter 4: Network Layer
Introduction to Networking
Routing.
Chapter 3: Dynamic Routing
Chapter 2: Static Routing
– Chapter 4 – Secure Routing
Dynamic Routing and OSPF
Chapter 4: Network Layer
COMP/ELEC 429/556 Introduction to Computer Networks
Computer Networks Protocols
Routing.
Presentation transcript:

Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education Build security into the design of routing –router authentication –route authentication –control directed broadcast –black hole filtering –URPF –Path integrity –2 Case studies

Network Security2 Design issues of secure routing Route filtering –When designing a private network, it is important to ensure that ‘route filtering’ is used to filter out any bogus or undesired routes coming into the private net. Examples: special addresses –It is equally important to ensure that the only networks advertised by the private network are those desired. –To ensure that IP address blocks belonging to a private network are not allowed to be advertised back into the network from outside. –‘net police filtering’ (aka. ‘prefix filtering’) – next

Network Security3 Design issues of secure routing Prefix Filtering –No routes with prefixes more specific than /20 (or up to /24) are allowed to come in. –To ensure that an attack cannot be staged on a large ISP’s router by increasing the size of its routing tables –Routes more specific than /20 are often not needed by large ISPs, so those routes can be filtered out to keep its routing table from getting out of control. –Example: incoming route filtering in a BGP router, next page

Network Security4 Prefix Filtering –Example: incoming route filtering in a BGP router Router bgp 100 Network Distribute-list prefix max24 in ! Ip prefix-list max24 seq 5 permit /0 ge 8 le 24 ! The route /0 is the default route. –See e/ip2_i2gt.html#wp for command details and other examples. e/ip2_i2gt.html#wp –Another example: next

Network Security5 Prefix Filtering Example labs_interdomain-routing/netkit-lab_bgp-prefix- filtering/netkit-lab_bgp-prefix-filtering.pdfhttp:// labs_interdomain-routing/netkit-lab_bgp-prefix- filtering/netkit-lab_bgp-prefix-filtering.pdf ! Configure router 1 in AS 1: router bgp 1 network /24 network /24 neighbor remote-as 2 neighbor description Router 2 of AS2 neighbor prefix-list partialOut out neighbor prefix-list partialIn in ! ! only /24 is announced to neighbor ip prefix-list partialOut permit /24 ! ! all, with the exception of /24, is accepted from ip prefix-list partialIn deny /24 ip prefix-list partialIn permit any

Network Security6 Design issues of secure routing 1.network convergence (aka. route convergence) –depends on many factors complexity of the net architecture redundancy in the network route calculation algorithms and configuration loops in the network –Fast convergence is desirable. Problems with a slow-converging network –can mean a considerable loss of revenue and/or productivity –may be subject to DoS attacks, because it takes longer to recover from network-disrupting attacks and thus aggravates problems

Network Security7 Source:

Network Security8 Design issues of secure routing 2.static routes –can be used to hard code information in the routing tables such that this info is unaffected by a network attack or propagated impact from other parts of the network –Disadvantage? scalability

Network Security9 Authentication of Router and Routes Rationale of authenticating routers and routes: 1.As part of an attack, the attacker may configure his machine or router to share incorrect routing information with the attacked router (AR). Impacts? Incorrect routing, disabled router, traffic redirection 2.Flood of routing table e.g., A rogue router may act as a BGP speaker and neighbor, and advertises lots of specific routes into a core router’s routing table. Impacts? slow or disabled router

Network Security10 Authentication of Router and Routes Solutions? 1.Router authentication: Routers must authenticate each other before sharing information. Password-based authentication- Drawback? MD5-HMAC - Implications? 2.Route authentication: Integrity of the exchanged routing information must be verified. Hashing-based methods, such as MD5-HMAC, can be used to authenticate routes.

Network Security11 Control/disable directed broadcast ‘Directed broadcast’ allows packets to be broadcast to all the machines on the subnet directly attached to a router. May be used by attackers to start attacks smurf attack A type of DoS attack An attacker sends a ping echo request to the broadcast address on a network, causing all the machines in that segment to send echo replies to the attacked router.  impact: packet flood

Network Security12 Black Hole Filtering Purpose: to filter out undesired traffic, by directing specific routes to a null interface An alternative to ACL Advantage: no access list processing  save processing time Disadvantage: Null routing is based on the packets’ destination IP addresses only, while ACL can work on source address, destination address, and layer 4 info as well. A weaker form of route filtering Example: interface null0

Network Security13 URPF Unicast Reverse Path Forwarding Purpose: to thwart attempts to send packets with spoofed source IP addresses A mechanism configured on a router to disable outgoing packets with source IP addresses not in the range belonging to its site Advantage: A more efficient and effective outgoing packets filtering mechanism than ACL Requirement: CEF (Cisco Express Forwarding) must be enabled on that router, because URPF looks at the FIB (forwarding information base) rather than at the routing table.

Network Security14 URPF (cont.) Constraint: can not be deployed on a router that has asymmetric routes set up. –In asymmetric routing, more than one interface is used (by a router or firewall) to route packets of a private network.  The interface through which the router sends return traffic for a packet may not be the same interface on which the original packet was received. In general, URPF is deployed on the edge of a network.  allowing the anti-spoofing capabilities to be effective to the entire network Example: ip verify unicast reverse-path

Network Security15 Path Integrity Rule of thumb: Routing should be performed based on the optimum paths calculated by the underlying routing protocols.  However, the routing protocols may be affected by ICMP redirects and IP source routing when making such calculations. ICMP redirects allows a router to inform another router on its local segment not to use certain hop in its path to certain host.  because including the hop will result in paths that’s not optimal –ICMP redirects is the default setting on Cisco routers. –Should be disabled unless absolutely necessary IP source routing: next

Network Security16 Path Integrity (cont.) IP source routing: an IP feature, allowing a user to set a field in the IP packet to specify the desired path May be used by attackers to subvert the workings of normal routing protocols Example: An attacker can specify a router (A) that is attached to both a private and the public network as an intermediate point in the source path to reach a private address (e.g., ). All intermediate routers, with IP source routing enabled, will forward the packet to router A.  causing DoS attack Advice: disable IP source routing on the router

Network Security17 Case study 1 - Securing the BGP Routing Protocol BGP is an exterior gateway protocol Example techniques: –Enable BGP peer authentication –Filter incoming routes –Filter outgoing routes –Use the network statement to advertise the network block –Disable BGP multihop feature (that is, do not allow peering between routers not directly connected to each other) –Control TCP port 179 (the BGP port)  using the firewall or ACLs to do the filtering –Disable BGP version negotiation (instead, hard-code the version info) –Use police filters and null routes –Set up BGP route flap dampening values  to prevent flapping routes –Use the maximum-prefix command –Logging changes in neighbor status

Network Security18 Case Study 2 - Securing the OSPF routing protocols The Open Shortest Path First protocol is a hierarchical interior gateway protocol (IGP) for routing Example techniques: –Router authentication –Nonbroadcast neighbor configuration –Using stub areas –Using loopback interfaces as the router IDs –Tweaking SPF timers –Route filtering –…

Network Security19 Summary Security of routers and routes is critical for the security of the whole network. The net administrator should configure his routers and routes, not only to protect the private network, but also to help to protect the whole Internet. A checklist for infrastructure security: