Download presentation
Presentation is loading. Please wait.
Published byAgatha Scott Modified over 9 years ago
1
ANCP Network Anti-Attack Updates draft-fan-ancp-network-anti-attack-01 IETF 78 th, July. 25-30, 2010 Bo Wu (wu.bo@zte.com.cn )wu.bo@zte.com.cn Liang Fan ( fan.liang2@zte.com.cn )fan.liang2@zte.com.cn Bo Yuan ( yuan.bo3@zte.com.cn)yuan.bo3@zte.com.cn ZTE Corporation
2
Current Status 01-version updates –Add 2 use cases based on comments from last meeting
3
Attacker Problem statement Traditionally, network attacks from subscribers are detected at NAS site Detection could be done by NAS or additional device, such as Firewall/DPI box. Centralized attacking detection & policy enforcement
4
Case 1: Control Message Attack PPPoE/DHCP Control Message Attack –PPPoE PADI, DHCP discover, etc. –Could be a fake one or just replicated from the original one –Massive amount of packets per second Influence to the NAS –All control message will be sent to the control plane –Though trigger the traffic managing policy on control plane, but will Loss of the legal control message of the same type –NAS will enforce ACL to rate-limit control packets from dedicated subscriber Attacker
5
Example: PADI Packet Attack Attacker 1.The attacker sends a large number of PADI Packets 2.The NAS receives these packets and sends the packets to its control plane 3.The PPP control plane on the NAS will be aware of the abnormal rate of control messages from a dedicated subscriber 4.The NAS sends the anti-attack policy to the AN.
6
Case 2: DOS Attack DOS attack –SYN flood, fraggle, smurf, etc. –Towards the NAS & the network behind the NAS –Usually happened on a large number of hosts (synchronously) Original Solution –Detected on the NAS site, by an internal or external DPI function module –Policies implemented on the NAS site Attacker
7
Example: SYN Flood Attack 1.The attacker sends a large number of SYN packets 2.The NAS will be aware of the SYN flood attack from the dedicated subscriber with or without an external box. 3.The NAS sends the anti-attack policy to the AN. Attacker
8
Conclusion Use ANCP to dynamically trigger current available function on the AN. MAC Black/White List –Send MAC black list of the attacking message, or MAC white list of the registered MAC addresses to the AN –MAC white list not applicable to enterprise user MAC Table Size Limitation –Enable MAC learning limitation on the AN MAC Rate Limitation –Limit upstream rate of a dedicated MAC on the AN –No influence to other hosts on the same access loop
9
Next steps Need comments from work group Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.