Contents

Foreword

Introduction

Part I IP Network and Traffic Plane Security Fundamentals

Chapter 1 Internet Protocol Operations Fundamentals

IP Network Concepts

Enterprise Networks

Service Provider Networks

IP Protocol Operations

IP Traffic Concepts

Transit IP Packets

Receive-Adjacency IP Packets

Exception IP and Non-IP Packets

Exception IP Packets

Non-IP Packets

IP Traffic Planes

Data Plane

Control Plane

Management Plane

Services Plane

IP Router Packet Processing Concepts

Process Switching

Fast Switching

Cisco Express Forwarding

Forwarding Information Base

Adjacency Table

CEF Operation

General IP Router Architecture Types

Centralized CPU-Based Architectures

Centralized ASIC-Based Architectures

Distributed CPU-Based Architectures

Distributed ASIC-Based Architectures

Summary

Review Questions

Further Reading

Chapter 2 Threat Models for IP Networks

Threats Against IP Network Infrastructures

Resource Exhaustion Attacks

Direct Attacks

Transit Attacks

Reflection Attacks

Spoofing Attacks

Transport Protocol Attacks

UDP Protocol Attacks

TCP Protocol Attacks

Routing Protocol Threats

Other IP Control Plane Threats

Unauthorized Access Attacks

Software Vulnerabilities

Malicious Network Reconnaissance

Threats Against Layer 2 Network Infrastructures

CAM Table Overflow Attacks

MAC Spoofing Attacks

VLAN Hopping Attacks

Private VLAN Attacks

STP Attacks

VTP Attacks

Threats Against IP VPN Network Infrastructures

MPLS VPN Threat Models

Threats Against the Customer Edge

Threats Against the Provider Edge

Threats Against the Provider Core

Threats Against the Inter-Provider Edge

Carrier Supporting Carrier Threats

Inter-AS VPN Threats

IPsec VPN Threat Models

Summary

Review Questions

Further Reading

Chapter 3 IP Network Traffic Plane Security Concepts

Principles of Defense in Depth and Breadth

Understanding Defense in Depth and Breadth Concepts

What Needs to Be Protected?

What Are Defensive Layers?

What Is the Operational Envelope of the Network?

What Is Your Organization’s Operational Model?

IP Network Traffic Planes: Defense in Depth and Breadth

Data Plane

Control Plane

Management Plane

Services Plane

Network Interface Types

Physical Interfaces

Logical Interfaces

Network Edge Security Concepts

Internet Edge

MPLS VPN Edge

Network Core Security Concepts

IP Core

MPLS VPN Core

Summary

Review Questions

Further Reading

Part II Security Techniques for Protecting IP Traffic Planes

Chapter 4 IP Data Plane Security

Interface ACL Techniques

Unicast RPF Techniques

Strict uRPF

Loose uRPF

VRF Mode uRPF

Feasible uRPF

Flexible Packet Matching

QoS Techniques

Queuing

IP QoS Packet Coloring (Marking)

Rate Limiting

IP Options Techniques

Disable IP Source Routing

IP Options Selective Drop

ACL Support for Filtering IP Options

Control Plane Policing

ICMP Data Plane Mitigation Techniques

Disabling IP Directed Broadcasts

IP Sanity Checks

BGP Policy Enforcement Using QPPB

IP Routing Techniques

IP Network Core Infrastructure Hiding

IS-IS Advertise-Passive-Only

IP Network Edge External Link Protection

Protection Using More Specific IP Prefixes

Protection Using BGP Communities

Protection Using ACLs with Discontiguous Network Masks

Remotely Triggered Black Hole Filtering

IP Transport and Application Layer Techniques

TCP Intercept

Network Address Translation

IOS Firewall

IOS Intrusion Prevention System

Traffic Scrubbing

Deep Packet Inspection

Layer 2 Ethernet Security Techniques

Port Security

MAC Address–Based Traffic Blocking

Disable Auto Trunking

VLAN ACLs

IP Source Guard

Private VLANs

Traffic Storm Control

Unknown Unicast Flood Blocking

Summary

Review Questions

Further Reading

Chapter 5 IP Control Plane Security

Disabling Unused Control Plane Services

ICMP Techniques

Selective Packet Discard

SPD State Check

SPD Input Queue Check

SPD Monitoring and Tuning

IP Receive ACLs

IP Receive ACL Deployment Techniques

Activating an IP Receive ACL

IP Receive ACL Configuration Guidelines

IP Receive ACL Feature Support

Control Plane Policing

CoPP Configuration Guidelines

Defining CoPP Policies

Tuning CoPP Policies

Platform-Specific CoPP Implementation Details

Cisco 12000 CoPP Implementation

Cisco Catalyst 6500/Cisco 7600 CoPP Implementation

Neighbor Authentication

MD5 Authentication

Generalized TTL Security Mechanism

Protocol-Specific ACL Filters

BGP Security Techniques

BGP Prefix Filters

IP Prefix Limits

AS Path Limits

BGP Graceful Restart

Layer 2 Ethernet Control Plane Security

VTP Authentication

DHCP Snooping

Dynamic ARP Inspection

Sticky ARP

Spanning Tree Protocol

Summary

Review Questions

Further Reading

Chapter 6 IP Management Plane Security

Management Interfaces

Password Security

SNMP Security

Remote Terminal Access Security

Disabling Unused Management Plane Services

Disabling Idle User Sessions

System Banners

Secure IOS File Systems

Role-Based CLI Access

Management Plane Protection

Authentication, Authorization, and Accounting

AutoSecure

Network Telemetry and Security

Management VPN for MPLS VPNs

Summary

Review Questions

Further Reading

Chapter 7 IP Services Plane Security

Services Plane Overview

Quality of Service

QoS Mechanisms

Classification

Marking

Policing

Queuing

MQC

Packet Recoloring Example

Traffic Management Example

Securing QoS Services

MPLS VPN Services

MPLS VPN Overview

Customer Edge Security

Provider Edge Security

Infrastructure ACL

IP Receive ACL

Control Plane Policing

VRF Prefix Limits

IP Fragmentation and Reassembly

Provider Core Security

Disable IP TTL to MPLS TTL Propagation at the Network Edge

IP Fragmentation

Router Alert Label

Network SLAs

Inter-Provider Edge Security

Carrier Supporting Carrier Security

Inter-AS VPN Security

IPsec VPN Services

IPsec VPN Overview

IKE

IPsec

Securing IPsec VPN Services

IKE Security

Fragmentation

IPsec VPN Access Control

QoS

Other IPsec Security-Related Features

Other Services

SSL VPN Services

VoIP Services

Video Services

Summary

Review Questions

Further Reading

Part III Case Studies

Chapter 8 Enterprise Network Case Studies

Case Study 1: IPsec VPN and Internet Access

Network Topology and Requirements

Router Configuration

Data Plane

Control Plane

Management Plane

Services Plane

Case Study 2: MPLS VPN

Network Topology and Requirements

Router Configuration

Data Plane

Control Plane

Management Plane

Services Plane

Summary

Further Reading

Chapter 9 Service Provider Network Case Studies

Case Study 1: IPsec VPN and Internet Access

Network Topology and Requirements

Router Configuration

Data Plane

Control Plane

Management Plane

Services Plane

Case Study 2: MPLS VPN

Network Topology and Requirements

Router Configuration

Data Plane

Control Plane

Management Plane

Services Plane

Summary

Further Reading

Part IV Appendixes

Appendix A Answers to Chapter Review Questions

Appendix B IP Protocol Headers

IP Version 4 Header

TCP Header

UDP Header

ICMP Header

ICMP Echo Request/Echo Reply Query Message Headers

ICMP Time to Live Exceeded in Transit Error Message Header

ICMP Destination Unreachable, Fragmentation Needed and Don’t Fragment was Set Error Message Header

Other ICMP Destination Unreachable Error Message Headers

Ethernet/802.1Q Header

IEEE 802.3 Ethernet Frame Header Format

IEEE 802.1Q VLAN Header Format

MPLS Protocol Header

Further Reading

Appendix C Cisco IOS to IOS XR Security Transition

Data Plane Security Commands

Control Plane Security Commands

Management Plane Security Commands

Services Plane Security Commands

Further Reading

Appendix D Security Incident Handling

Six Phases of Incident Response

Preparation

Understand the Threats

Deploy Defense in Depth and Breadth Security Strategies

Establish Well-Defined Incident Response Procedures

Establish an Incident Response Team

Identification

Classification

Traceback

Reaction

Post-Mortem Analysis

Cisco Product Security

Cisco Security Vulnerability Policy

Cisco Computer and Network Security

Cisco Safety and Security

Cisco IPS Signature Pack Updates and Archives

Cisco Security Center

Cisco IntelliShield Alert Manager Service

Cisco Software Center

Industry Security Organizations

Regional Network Operators Groups

Further Reading

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset