Download presentation
Presentation is loading. Please wait.
Published byAndra Bennett Modified over 8 years ago
1
SECURITY CONTROLS FOR AN ENERGY SCIENCE DMZ Robert Marcoux 01/13/2013
2
2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SCIENCE DMZ REQUIREMENTS The Science DMZ Model addresses several key issues in data intensive science, including: Reducing or eliminating the packet loss that causes poor TCP performance Implementing appropriate security architectures and controls so that high-performance applications are not hampered by unnecessary constraints Providing an on-ramp for local science resources to access wide area science services including virtual circuits, software defined networking environments, and 100 Gigabit infrastructures. Incorporating network testing, network measurement, and performance analysis through the deployment of perfSONAR
3
3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURITY CONTROLS
4
4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURITY CONTROLS – AGGRESSIVE FILTERING Firewall Filters - Firewall Filters are a tool for controlling and restricting access to network resources. A Firewall Filter examines the Layer 3 and Layer 4 headers on a packet-by-packet basis. Based on configured rules, a Firewall Filter decides whether the router forwards or drops the packet. Firewall Filters differ from a stateful firewall, which examines the packet’s data and monitors the activity of TCP sessions. Firewall Filters use the data obtained by the Internet Processor ASIC on the Packet Forwarding Engine. Filter-Based Forwarding (Policy Based Routing) - Filter-based forwarding allows you to control the next-hop selection for traffic by defining input packet filters that examine the fields in a packet’s header. If a packet satisfies the match conditions of the filter, the packet is forwarded using the routing instance specified in the filter action statement.
5
5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURITY CONTROLS REMOTELY TRIGGERED BLACK HOLE (RTBH) Remotely Triggered Black Hole - Destination based RTBH Requires pre-configuration of discard route on all edge routers Monitoring via separate mechanism identifies destination of attack Monitoring router injects a discard route in forwarding target prefix BGP community used to distribute the discard route Routers drop traffic taking the target completely offline Attack completed however collateral damage limited S-RTBH Behavior for match and filtering action defined in RFC 5635 Requires pre-configuration of discard route on all edge routers Monitoring identifies source of attack and injects discard route BGP community used to distribute the discard route Routers drop traffic taking the target completely offline Each participating router can take 2 actions based on capabilities: –Strict uRPF: On packet associated with a flow look up FIB determine if no route to originating prefix from the same interface discard else forward –Loose uRPF: On packet associated with a flow look up FIB determine if no route to originating prefix from any interface discard else forward Junos Implementation 12.1 T-series uRPF loose mode to recognize discard nH behavior 12.2 MX uRPF loose mode to recognize discard nH behavior
6
6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net JFLOW MONITORING: VERSIONS AND AVAILABILITY RE based monitoring Sampled packets are sent to RE RE generates flow records Flow v5 and v8 are supported Performance is ~7Kpps Service PIC based monitoring Sampled packets are sent to a PIC PIC generates flow records Flow v5,v8 and v9 are supported for v9 (IPv4, IPv6, MPLS) Performance starts from 1Mpps (IPv4) Forwarding plane/Trio based monitoring All processing done inside Trio (including flow records) IPFIX (version after v9) (IPv4 only) Performance is line rate (no sampling needed)
7
7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURITY CONTROLS – BGP FLOWSPEC (RFC-5575) BGP Flowspec - Border Gateway Protocol Network Layer Reachability Information (BGP NLRI) encoding format that can be used to distribute traffic flow specifications. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix. The information is carried via the BGP, thereby reusing protocol algorithms, operational experience, and administrative processes such as inter-provider peering agreements. Flow spec addresses the limitations of existing solutions by allowing the “flow”- based NLRI to convey additional information about traffic filtering rules for traffic that should be discarded Since a new address family is defined, filtering information is now separated from the routing information (and in fact this information is kept in a separate RIB: instance-name.inetflow.0) Provides a tool for Network Operators to quickly react to DDOS attacks, saving valuable time between identification of attack and implementation of various remediation schemes.
8
8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net WHAT IS IN THE BGP FLOW SPEC NLRI? A Flow Specification NLRI is defined which may include several components in order to identify particular flows The NLRI field of the MP_REACH_NLRI and MP_UNREACH_NLRI is encoded as a 1 or 2 octet NLRI length field followed by a variable length NLRI value. The NLRI length is expressed in octets +------------------------------+ | length (0xnn or 0xfn nn) | +------------------------------+ | NLRI value (variable) | +------------------------------+ Type 1 - Destination Prefix Type 2 - Source Prefix Type 3 - IP Protocol Type 4 – Source or Destination Port Type 5 – Destination Port Type 6 - Source Port Type 7 – ICMP Type Type 8 – ICMP Code Type 9 - TCP flags Type 10 - Packet length Type 11 – DSCP Type 12 - Fragment Encoding
9
9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net FLOW ROUTE ORIGINATION There are a couple of options: Configure static flow routes from a central control point (RR or IRCP) or from distributed control points (PE or Peering Edge) Supported today by Arbor Networks Flow Routes are automatically advertised by BGP once the Flow NLRI Control Plane is established
10
10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net BGP ADDRESS FAMILY: FLOW-SPEC A flow-spec “route” includes information about the action that should be taken for matching traffic (using BGP extended communities): Drop the packet Sample the packet for CFLOW export Rate limit traffic to a rate included in the BGP update Mark traffic with a DSCP value included in the BGP update Redirect traffic into a VRF routing instance specified by the BGP update
11
11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net FLOW-SPEC EXAMPLE Flow-spec route is advertised into the network All web traffic from host A to host B should be dropped Matching traffic is automatically dropped by the first router that sees the data Flow-spec route: Host A to Host B, TCP, HTTP: Drop A B
12
12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURE CLEAN ROUTING USING BGP (SCRUB) Traffic matching flow-spec routes can be redirected, not just dropped Create tunnels (such as MPLS LSPs) from every router to a special scrubber router Traffic matching the flow-spec routes is redirected into the tunnels The scrubber router directs traffic through security devices to inspect the traffic Clean traffic is released back into the network
13
13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURE CLEAN ROUTING USING BGP (SCRUB) A flow-spec route is currently advertised that selects all traffic from host A matching UDP port 53 Matching traffic is tunneled to the SCRUBnet router and fully inspected Legitimate traffic is released back into the network and routed normally to host B A B Flow-spec route: Source: Host A, UDP, DNS: Redirect
14
14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURE CLEAN ROUTING USING BGP (SCRUB) Traffic that doesn’t match any active flow-spec routes is routed normally No impact to non-suspect traffic A B Flow-spec route: Source: Host A, UDP, DNS: Redirect
15
15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net ADDITIONAL SECURITY CONTROLS – SERVICES DPC/MPC Services DPC/MPC – Security Controls that can be scaled across multiple services blades in lieu of being processed in the RE (Better Performance - Scalable) Statefull Firewall Netflow (offloaded) Full IPS IPSEC Tunnels
16
16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net SECURITY CONTOLS DEVELOPMENT – JUNOS SDK JUNOS Software Development Kit (SDK) - Applications run on either a Routing Engine or a services module and so can be thought of as being either Routing Engine applications or service applications, respectively. Routing Engine applications run on the control plane. Typically, these applications perform network management and protocol signaling. They also initiate servers. Positioned on the control plane, Routing Engine applications can coordinate other subsystems and services. A Routing Engine is always present in any device, so these applications are always deployable without the addition of any extra hardware or software. Service applications run on the services plane. The services plane is specialized to enable high-performance, customized, and stateful packet processing on the transit or monitored traffic selected for servicing. Service applications may also perform operations similar to Routing Engine applications, but such activities typically supplement packet processing. On some of the smaller Juniper Networks devices, physical modules do not necessarily plug in to a chassis. Rather a single box contains the necessary hardware. Nonetheless, applications are still supported in the control and services planes and we continue to use the Routing Engine and services modules terminology.
17
17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net PROTECTING THE ROUTING ENGINE
18
18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net PROTECTING THE ROUTING ENGINE Firewall Filter Using Prefix-lists to Group Hosts or Networks Using Apply-path to Build Dynamic Prefix-lists Using Policers to Rate-limit Traffic Firewall filters must be told in which direction to inspect traffic, and there are two directions in which to apply the filters: Input: Packets are matched against the firewall filter as they enter the interface from the network. Output: Packets are matched against the firewall filter as they leave the interface prior to reaching the network.
19
19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net DDOS PROTECTION To protect against DDoS attacks, you can configure policers for host-bound exception traffic. The policers specify rate limits for individual types of protocol control packets or for all control packet types for a protocol. You can monitor policer actions for packet types and protocol groups at the level of the router, Routing Engine, and line cards. You can also control logging of policer events. The policers at the Trio MPC are the first line of protection. Control traffic is dropped when it exceeds any configured policer values or, for unconfigured policers, the default policer values. Each violation generates a notification to alert operators about a possible attack. The violation is counted, the time that the violation starts is noted, and the time of the last observed violation is noted. When the traffic rate drops below the bandwidth violation threshold, a recovery timer determines when the traffic flow is consider to have returned to normal. If no further violation occurs before the timer expires, the violation state is cleared and a notification is generated. DDoS policers are present: One at the Trio chipset, two at the line card, and two at the Routing Engine.
20
20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net LINKS
21
21 Copyright © 2012 Juniper Networks, Inc. www.juniper.net LINKS DDoS Protection Configuration Guide http://www.juniper.net/techpubs/en_US/junos12.2/information-products/topic-collections/config-guide- ddos-protection/config-guide-ddos-protection.pdf http://www.juniper.net/techpubs/en_US/junos12.2/information-products/topic-collections/config-guide- ddos-protection/config-guide-ddos-protection.pdf This Week: Hardening Junos Devices http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/hardening-junos-devices-checklist/ http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/hardening-junos-devices-checklist/ Day One: Configuring Junos Policies and Firewall Filters http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/configuring-junos-policies/ http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/configuring-junos-policies/ Day One: Securing the Routing Engine on M, MX, and T Series http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/securing-routing-engine/ http://www.juniper.net/us/en/community/junos/training-certification/day-one/fundamentals- series/securing-routing-engine/ For iPads and iPhones, use your device’s iBook app. Search for “Juniper Networks” in the iBookstore. Download directly to your iPhone or iPad. For Kindles, Androids, Blackberry, iPhones/iPads, Macs. and PCs, download the free Kindle app for your device. Go to the Kindle Store using your device’s Kindle app and search for “Juniper.” Download directly to your device.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.