Title: Staff AAA
1Staff AAA
2Radius is not an ISP AAA Option
3RADIUS TACACS Kerberos
4What to Configure?
5Simple Staff Authentication and Failsafe
6Simple Staff Authentication and Failsafe
7Simple Staff Authentication and Failsafe
8Staff Authentication
9Staff Accountability Audit
10Checkpoint with Authentication and Accounting
11Limit Authority Authorize Commands
12Set Privileges
13Checkpoint with default Authorization
14Note on Privilege Levels and Authorization
15One Time Password Checking the ID
16What is One Time Password
17DoS the AAA Infrastructure
18How to protect the AAA Servers?
19Source Routing
20ICMP Unreachable Overload
21ICMP Unreachable Overload
22ICMP Unreachable Overload
23ICMP Unreachable Rate-Limiting
24Tip scheduler allocate
25Introducing a New Router tothe Network
26Introducing a New Router tothe Network
27Secure Template Sources
28Input Hold Queue
29Input Hold Queue
30Input Hold Queue
31What Ports Are open on the Router?
32What Ports Are open on the Router?
33What Ports Are open on the Router?
34Receive ACL - Overview
35Receive Adjacencies
36Receive ACL Command
37Receive ACL
38Receive Path ACL
39Packet Flow
40Receive ACL Traffic Flow
41rACL Processing
42rACL Required Entries
43rACL Required Entries
44rACL Building Your ACL
45Filtering Fragments
46rACL Iterative Deployment
47Classification ACL Example
48rACL Iterative Deployment
49rACL Iterative Deployment
50rACL Iterative Deployment
51rACL Sample Entries
52rACL Sample Entries
53rACL Sample Entries
54Use Detailed Logging
55Core Dumps
56Core Dumps
57Routing Protocol Security
- Why to Prefix Filter and Overview? (Threats)
- How to Prefix Filter?
- Where to Prefix Filter?
- Prefix Filter on Customers
- Egress Filter to Peers
- Ingress Filter from Peers
- Protocol Authentication (MD5)
- BGP BCPs that help add Resistance
58Routing Protocol Security
59Malicious Route InjectionPerceive Threat
60Malicious Route InjectionReality an Example
61Garbage in Garbage Out What is it?
62Garbage in Garbage Out Results
63Garbage in Garbage Out Impact
64Garbage in Garbage Out What to do?
65Malicious Route InjectionAttack Methods
66Malicious Route InjectionImpact
67What is a prefix hijack?
68Malicious Route InjectionWhat can ISPs Do?
69Malicious Route InjectionWhat can ISPs Do?
70Malicious Route InjectionWhat can ISPs Do?
71What can ISPs Do?Containment Egress Prefix
Filters
72What can ISPs Do?Containment Egress Prefix
Filters
73What can ISPs Do?Containment Egress Prefix
Filters
74Malicious Route InjectionWhat can ISPs Do?
75How to Prefix Filter?Ingress and Egress Route
Filtering
76Ingress and Egress Route Filtering
77Ingress and Egress Route Filtering
78Ingress and Egress Route Filtering
79Ingress and Egress Route Filtering
80Two Filtering Techniques
81Ideal Customer Ingress/Egress Route Filtering .
82BGP Peering Fundamental
83Guarded Trust
84Where to Prefix Filter?
85Where to Prefix Filter?
86What to Prefix Filter?
- Documenting Special Use Addresses (DUSA) and
Bogons
87Documenting Special Use Addresses (DUSA)
88Documenting Special Use Addresses (DUSA)
89Documenting Special Use Addresses (DUSA)
90Bogons
91Ingress Prefix Filter Template
92Ingress Prefix Filter Template
93Prefix Filters on Customers
94BGP with Customer Infers Multihoming
95Receiving Customer Prefixes
96Receiving Customer Prefixes
97Excuses Why providers are not prefix filtering
customers.
98What if you do not filter your customer?
99What if you do not filter your customer?
100Prefixes to Peers
101Prefixes to Peers
102Egress Filter to ISP Peers - Issues
103Policy Questions
104Ingress Prefix Filtering fromPeers
105Ingress Routes from Peers or Upstream
106Receiving Prefixes from Upstream Peers (ideal
case)
107Receiving Prefixes Cisco IOS
108Net Police Route Filtering
109Net Police Route Filtering
110Net Police Filter Technique 1
111Technique 1 Net Police Prefix List
112Net Police Prefix List Deployment Issues
113Technique 2 Net Police Prefix List Alternative
114Technique 2 Net Police Prefix List Alternative
115Net Police Filter Technique 3
116Technique 3 Net Police Prefix List
117Net Police Filter Technique 3
118Bottom Line
119Secure RoutingRoute Authentication
120Plain-text neighbor authentication
121MD-5 Neighbor Authentication Originating Router
122MD-5 Neighbor Authentication Originating Router
123Peer Authentication
124Peer Authentication
125OSPF Peer Authentication
126OSPF and ISIS Authentication Example
127BGP Peer Authentication
128BGP Peer Authentication
129BGP MD5s Problem
130BGP BCPs That Help Build Security Resistance
131BGP Maximum Prefix Tracking
132BGP Maximum Prefix Tracking
133BGP Maximum Prefix Tracking
134Avoid Default Routes
135Network with Default Route Pointing to Upstream
A
136Network with Default Route But not Pointing to
Upstream
137Network with No Default Route
138Default Route and ISP Security - Guidance
139Default to a Sink-Hole Router/Network