staff aaa

139
Staff AAA

Upload: kory

Post on 18-Jan-2016

36 views

Category:

Documents


2 download

DESCRIPTION

Staff AAA. Radius is not an ISP AAA Option. RADIUS TACACS+ Kerberos. What to Configure?. Simple Staff Authentication and Failsafe. Simple Staff Authentication and Failsafe. Simple Staff Authentication and Failsafe. Staff Authentication. Staff Accountability & Audit. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Staff AAA

Staff AAA

Page 2: Staff AAA

Radius is not an ISP AAA Option

Page 3: Staff AAA

RADIUS TACACS+ Kerberos

Page 4: Staff AAA

What to Configure?

Page 5: Staff AAA

Simple Staff Authentication and Failsafe

Page 6: Staff AAA

Simple Staff Authentication and Failsafe

Page 7: Staff AAA

Simple Staff Authentication and Failsafe

Page 8: Staff AAA

Staff Authentication

Page 9: Staff AAA

Staff Accountability & Audit

Page 10: Staff AAA

Checkpoint with Authentication and Accounting

Page 11: Staff AAA

Limit Authority – Authorize Commands

Page 12: Staff AAA

Set Privileges

Page 13: Staff AAA

Checkpoint with default Authorization

Page 14: Staff AAA

Note on Privilege Levels and Authorization

Page 15: Staff AAA

One Time Password – Checking the ID

Page 16: Staff AAA

What is One Time Password

Page 17: Staff AAA

DoS the AAA Infrastructure

Page 18: Staff AAA

How to protect the AAA Servers?

Page 19: Staff AAA

Source Routing

Page 20: Staff AAA

ICMP Unreachable Overload

Page 21: Staff AAA

ICMP Unreachable Overload

Page 22: Staff AAA

ICMP Unreachable Overload

Page 23: Staff AAA

ICMP Unreachable Rate-Limiting

Page 24: Staff AAA

Tip: scheduler allocate

Page 25: Staff AAA

Introducing a New Router tothe Network

Page 26: Staff AAA

Introducing a New Router tothe Network

Page 27: Staff AAA

Secure Template Sources

Page 28: Staff AAA

Input Hold Queue

Page 29: Staff AAA

Input Hold Queue

Page 30: Staff AAA

Input Hold Queue

Page 31: Staff AAA

What Ports Are open on the Router?

Page 32: Staff AAA

What Ports Are open on the Router?

Page 33: Staff AAA

What Ports Are open on the Router?

Page 34: Staff AAA

Receive ACL - Overview

Page 35: Staff AAA

Receive Adjacencies

Page 36: Staff AAA

Receive ACL Command

Page 37: Staff AAA

Receive ACL

Page 38: Staff AAA

Receive Path ACL

Page 39: Staff AAA

Packet Flow

Page 40: Staff AAA

Receive ACL – Traffic Flow

Page 41: Staff AAA

rACL Processing

Page 42: Staff AAA

rACL – Required Entries

Page 43: Staff AAA

rACL – Required Entries

Page 44: Staff AAA

rACL – Building Your ACL

Page 45: Staff AAA

Filtering Fragments

Page 46: Staff AAA

rACL – Iterative Deployment

Page 47: Staff AAA

Classification ACL Example

Page 48: Staff AAA

rACL – Iterative Deployment

Page 49: Staff AAA

rACL – Iterative Deployment

Page 50: Staff AAA

rACL – Iterative Deployment

Page 51: Staff AAA

rACL – Sample Entries

Page 52: Staff AAA

rACL – Sample Entries

Page 53: Staff AAA

rACL – Sample Entries

Page 54: Staff AAA

Use Detailed Logging

Page 55: Staff AAA

Core Dumps

Page 56: Staff AAA

Core Dumps

Page 57: Staff AAA

Routing Protocol Security Why to Prefix Filter and Overview? (Threats) How to Prefix Filter? Where to Prefix Filter? Prefix Filter on Customers Egress Filter to Peers Ingress Filter from Peers Protocol Authentication (MD5) BGP BCPs that help add Resistance

Page 58: Staff AAA

Routing Protocol Security

Page 59: Staff AAA

Malicious Route InjectionPerceive Threat

Page 60: Staff AAA

Malicious Route InjectionReality – an Example

Page 61: Staff AAA

Garbage in – Garbage Out: What is it?

Page 62: Staff AAA

Garbage in – Garbage Out: Results

Page 63: Staff AAA

Garbage in – Garbage Out: Impact

Page 64: Staff AAA

Garbage in – Garbage Out: What to do?

Page 65: Staff AAA

Malicious Route InjectionAttack Methods

Page 66: Staff AAA

Malicious Route InjectionImpact

Page 67: Staff AAA

What is a prefix hijack?

Page 68: Staff AAA

Malicious Route InjectionWhat can ISPs Do?

Page 69: Staff AAA

Malicious Route InjectionWhat can ISPs Do?

Page 70: Staff AAA

Malicious Route InjectionWhat can ISPs Do?

Page 71: Staff AAA

What can ISPs Do?Containment Egress Prefix Filters

Page 72: Staff AAA

What can ISPs Do?Containment Egress Prefix Filters

Page 73: Staff AAA

What can ISPs Do?Containment Egress Prefix Filters

Page 74: Staff AAA

Malicious Route InjectionWhat can ISPs Do?

Page 75: Staff AAA

How to Prefix Filter?Ingress and Egress Route Filtering

Page 76: Staff AAA

Ingress and Egress Route Filtering

Page 77: Staff AAA

Ingress and Egress Route Filtering

Page 78: Staff AAA

Ingress and Egress Route Filtering

Page 79: Staff AAA

Ingress and Egress Route Filtering

Page 80: Staff AAA

Two Filtering Techniques

Page 81: Staff AAA

Ideal Customer Ingress/Egress Route Filtering ….

Page 82: Staff AAA

BGP Peering Fundamental

Page 83: Staff AAA

Guarded Trust

Page 84: Staff AAA

Where to Prefix Filter?

Page 85: Staff AAA

Where to Prefix Filter?

Page 86: Staff AAA

What to Prefix Filter? Documenting Special Use Addresses (DUSA) and Bo

gons

Page 87: Staff AAA

Documenting Special Use Addresses (DUSA)

Page 88: Staff AAA

Documenting Special Use Addresses (DUSA)

Page 89: Staff AAA

Documenting Special Use Addresses (DUSA)

Page 90: Staff AAA

Bogons

Page 91: Staff AAA

Ingress Prefix Filter Template

Page 92: Staff AAA

Ingress Prefix Filter Template

Page 93: Staff AAA

Prefix Filters on Customers

Page 94: Staff AAA

BGP with Customer Infers Multihoming

Page 95: Staff AAA

Receiving Customer Prefixes

Page 96: Staff AAA

Receiving Customer Prefixes

Page 97: Staff AAA

Excuses – Why providers are not prefix filtering customers.

Page 98: Staff AAA

What if you do not filter your customer?

Page 99: Staff AAA

What if you do not filter your customer?

Page 100: Staff AAA

Prefixes to Peers

Page 101: Staff AAA

Prefixes to Peers

Page 102: Staff AAA

Egress Filter to ISP Peers - Issues

Page 103: Staff AAA

Policy Questions

Page 104: Staff AAA

Ingress Prefix Filtering fromPeers

Page 105: Staff AAA

Ingress Routes from Peers or Upstream

Page 106: Staff AAA

Receiving Prefixes from Upstream & Peers (ideal case)

Page 107: Staff AAA

Receiving Prefixes — Cisco IOS

Page 108: Staff AAA

Net Police Route Filtering

Page 109: Staff AAA

Net Police Route Filtering

Page 110: Staff AAA

Net Police Filter Technique #1

Page 111: Staff AAA

Technique #1 Net Police Prefix List

Page 112: Staff AAA

Net Police Prefix List Deployment Issues

Page 113: Staff AAA

Technique #2 Net Police Prefix List Alternative

Page 114: Staff AAA

Technique #2 Net Police Prefix List Alternative

Page 115: Staff AAA

Net Police Filter – Technique #3

Page 116: Staff AAA

Technique #3 Net Police Prefix List

Page 117: Staff AAA

Net Police Filter – Technique #3

Page 118: Staff AAA

Bottom Line

Page 119: Staff AAA

Secure RoutingRoute Authentication

Page 120: Staff AAA

Plain-text neighbor authentication

Page 121: Staff AAA

MD-5 Neighbor Authentication: Originating Router

Page 122: Staff AAA

MD-5 Neighbor Authentication: Originating Router

Page 123: Staff AAA

Peer Authentication

Page 124: Staff AAA

Peer Authentication

Page 125: Staff AAA

OSPF Peer Authentication

Page 126: Staff AAA

OSPF and ISIS Authentication Example

Page 127: Staff AAA

BGP Peer Authentication

Page 128: Staff AAA

BGP Peer Authentication

Page 129: Staff AAA

BGP MD5’s Problem

Page 130: Staff AAA

BGP BCPs That Help Build Security Resistance

Page 131: Staff AAA

BGP Maximum Prefix Tracking

Page 132: Staff AAA

BGP Maximum Prefix Tracking

Page 133: Staff AAA

BGP Maximum Prefix Tracking

Page 134: Staff AAA

Avoid Default Routes

Page 135: Staff AAA

Network with Default Route – Pointing to Upstream A

Page 136: Staff AAA

Network with Default Route – But not Pointing to Upstream

Page 137: Staff AAA

Network with No Default Route

Page 138: Staff AAA

Default Route and ISP Security - Guidance

Page 139: Staff AAA

Default to a Sink-Hole Router/Network