Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 30 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
30
Dung lượng
2,97 MB
Nội dung
NETWORK
SECURITY
HANDBOOK
FOR SERVICE
PROVIDERS
TABLE OF CONTENTS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
1 EXECUTIVE SUMMARY . . . . . . . . . . . . . . . . . . . . . . . 2
2 THE IMPORTANCE OF NETWORKSECURITY . . . . . . . . . . . . . . . 4
ANATOMY OF NETWORK THREATS . . . . . . . . . . . . . . . . . . . 8
Overview of Security Threats . . . . . . . . . . . . . . . . . . . . . 8
Distributed Denial of Service (DDoS) . . . . . . . . . . . . . . . . . . 8
Bots and Botnets . . . . . . . . . . . . . . . . . . . . . . . . . 9
Worms. . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Zero Day Attacks . . . . . . . . . . . . . . . . . . . . . . . . 10
Vulnerable Network Components . . . . . . . . . . . . . . . . . . 11
3 BEST PRACTICES FORSERVICE PROVIDER SECURITY . . . . . . . . . . 11
4 GENERAL BEST PRACTICES AND TOOLS FOR
SERVICE PROVIDER NETWORKSECURITY . . . . . . . . . . . . . . . 11
Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
MPLVS VPN . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Network Address Translation (NAT). . . . . . . . . . . . . . . . . . 12
Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . 13
Network Firewall . . . . . . . . . . . . . . . . . . . . . . . . 13
Intrusion Protection System (IPS) . . . . . . . . . . . . . . . . . . 13
Application Servers . . . . . . . . . . . . . . . . . . . . . . . 14
Identity and Policy Management . . . . . . . . . . . . . . . . . . 14
BEST PRACTICES FOR SECURING VOIP NETWORKS . . . . . . . . . . . 15
Securing the IP Edge of the VOIP Network . . . . . . . . . . . . . . . 17
Securing VOIP Elements in the Data Center . . . . . . . . . . . . . . 17
Securing Internet Peering Points for VoIP . . . . . . . . . . . . . . . 17
5 BEST PRACTICES FOR SECURING TV AND MULTIMEDIA SERVICES . . . . . . 18
Securing External Network Peering Points . . . . . . . . . . . . . . . 19
Securing the Video/Super Head-end . . . . . . . . . . . . . . . . . 19
Securing the Video/Hub Serving Ofce . . . . . . . . . . . . . . . . 19
BEST PRACTICES FOR SECURING 3
RD
GENERATION MOBILE DATA NETWORKS . . .20
BEST PRACTICES FOR SECURING SERVICE PROVIDER DATA CENTERS . . . . 22
4 JUNIPER NETWORKS SECURITY PRODUCT PORTFOLIO . . . . . . . . . . 24
Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Firewalls and IDP . . . . . . . . . . . . . . . . . . . . . . . . 25
Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Intrusion Detection and Prevention . . . . . . . . . . . . . . . . . 26
Session Border Controller . . . . . . . . . . . . . . . . . . . . . 26
Identity and Policy Management . . . . . . . . . . . . . . . . . . 27
5 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . 27
1
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
Network Strategy Partners, LLC (NSP) — Management Consultants to the networking
industry — helps service providers, enterprises, and equipment vendors around the globe
make strategic decisions, mitigate risk, and affect change through custom consulting
engagements. NSP’s consulting includes business case and ROI analysis, go-to-market
strategies, development of new service offerings, pricing and bundling as well as
infrastructure consulting. NSP’s consultants are respected thought-leaders in the
networking industry and inuence its direction through condential engagements for
industry leaders and through public appearances, white papers, and trade magazine
articles. Contact NSP at www.nspllc.com.
Juniper Networks high-performance network infrastructure helps businesses accelerate the
deployment of services and applications to take advantage of opportunities to innovate,
grow, and strengthen their business. With Juniper, businesses can answer the challenge of
complicated, legacy networks with high-performance, open, and exible solutions.
Jointly published by Juniper Networks
and Network Strategy Partners, LLC:
2
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
1. Executive Summary
The telecommunications industry is in the midst of a major paradigm shift. In
the 1990s, most major serviceproviders maintained separate networks for
wireline voice, mobile voice, data, and TV. Today, many serviceproviders are
migrating all of their network services to IP packet switched networks. Voice
services are still a major component of service provider revenue. As voice
moves from circuit switched to VoIP packet switched networks (see Figure 1),
service providers will have a major incentive to wind down operations on their
expensive, legacy circuit switched infrastructure.
By converging network services to integrated IP networks, serviceproviders
reduce capital and operations expenses while dramatically improving network
scalability and service exibility. Furthermore, the migration to IP is increasing
competition in the telecommunications market. Cable TV providers are
offering traditional voice services, telephone companies are offering Internet
and IPTV, and new entrants are building broadband wireless networks with Wi-Fi
and WiMax technology. As increased competition is accelerating the migration
to IP, serviceproviders operating legacy networks risk shrinking revenues and
operating margins.
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
3
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
Figure 1 - Forecast of VoIP Subscribers Worldwide
Service provider migration to IP networks has signicant benets and is, in fact,
necessary for long term survival. However, the rapid growth in the Internet is
also driving rapid growth in networksecurity threats, which are escalating both
in numbers and level of severity. Threats come from a myriad of sources that
are distributed around the world. In the early days of the Internet, most threats
were created by hackers who were just causing trouble for fun. Today, threats
come from independent hackers as well as highly organized crime syndicates
focused on proting from Internet criminal activities. Some of the potential
threats to service provider networks include:
Distributed denial of service attacks (DDoS)
•
Bots and botnets attacking servers and network infrastructure•
Worms propagating throughout the network•
Attacks on Domain Name System (DNS)•
Attacks on IP routing protocols•
Zero day attacks (these are new attacks which are unpredictable in nature) •
0
50
100
150
200
CY04 CY05 CY06 CY07 CY08 CY09 CY10 CY11
Asia Pacic EMEA North America CALA
r
75.3M VoIP Subs Worldwide in 2007, +62% Year over Year
r
Worldwide: 185.7M by CY11, a 5 - year CAGR of 25% >22M net new subs/year
2008 Infonetics Research, Inc.
Millions
Worldwide VoIP Subscribers
4
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
The ramications of such attacks on service provider networks include:
Service outages
•
Lost, damaged, or stolen customer data•
Lost, damaged, or stolen service provider data (usage data, billing records, •
passwords, and so on)
Global telecommunications revenues are expected to reach $2 trillion by the
end of 2008
1
, therefore as network services migrate to IP, it is essential that
service providers and telecommunications equipment vendors be vigilant
about security. Network infrastructure must defend itself from attacks, and
operators must implement networksecurity best practices. This network
security handbook provides serviceproviders with an anatomy of network
security threats and a set of best practices for protecting the network. Best
practices fornetworksecurity architecture are dened for some of the most
important services, applications, and network infrastructure including:
Voice services
•
TV and multimedia services•
Mobile networks•
Service provider data centers•
2. The Importance of Network Security
The convergence of voice, data, TV, and mobile telecommunications on IP
networks has elevated the importance of network security. For many service
providers, IP networksecurity presents new technical challenges because
legacy networks are fundamentally more secure than IP networks. The legacy
phone network is based on a closed, circuit switching model. Call signaling
uses the SS7 packet network which is not connected to the Internet or any
other data network. Legacy television service is delivered using broadcast over
digital or analog cable; specialized equipment which is not connected to any
external packet networks is used for video service delivery. Many legacy data
networks are based on Frame Relay and ATM; these technologies use secure
layer 2 protocols with little or no connectivity outside the private network.
Similarly, second-generation mobile networks are closed, circuit switching
1
Gartner
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
5
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
architectures with limited and controlled gateways to the Internet and other
data networks. In general, legacy telecommunications networks:
Implement service-specic networks
•
Are based on closed and proprietary architectures•
Utilize end-to-end management by service providers•
Have no customer controls•
Have no external exposure•
The migration to IP next-generation networks (NGNs) offers many strategic
advantages to service providers, however, the open, exible architecture of IP
networks also pose a complex set of security threats. Multiple services, including
wireline voice, video, data, and mobile voice and data are converging on a single
IP network. This means that IP network attacks could affect all network services
and, therefore, all network revenue. Also, threats that emerge from one service
(for example the Internet) could affect other services like TV that were previously
isolated. The IP network is based on an open, standards-based architecture
that allows for rapid and massive worldwide growth. The open nature of the IP
protocols, however, has also allowed intruders to easily access the tools needed
for network intrusions. Everyone has access to RFC documents explaining the
technical details of Internet protocols. In addition, extensive technical knowledge
is not required because there is easy access to open source tools on the Web for
creating network attacks and stealing valuable data.
IP networks use open standards fornetwork management, operations, and
provisioning. Protocols and standards such as SNMP, XML, and the newer Web
services management model enhance the power and exibility of operations
support systems (OSS), but they also create opportunities for intruders to access
the most sensitive and critical areas of the telecommunications network—the
network management and control plane.
Another dimension of the problem is that business users, residential users, and
mobile users are sharing the same IP network. Each of these customers has
different security requirements that need to be addressed in the service offerings
provided to them.
Attacks on IP networks can have serious and potentially devastating
consequences. Attacks can result in:
Service outages
•
Lost, damaged, or stolen customer data•
Lost, damaged, or stolen service provider data (usage data, billing records, •
passwords, and so on)
6
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
Service outages can result in loss of revenue, payment of penalties for violated
service-level agreements (SLAs), and increased customer churn. There are
serious liabilities associated with lost or stolen customer data; lawsuits often
result in high payments of damages as well as a tarnished public image. Lost
or stolen service provider data can result in compromised networks and billing
systems, or other serious problems.
As network services converge to IP, service availability of the IP network is critical.
Downtime, as a result of network attacks, software errors, or conguration errors,
often result in high costs. The cost of downtime is highly variable based on the
business and applications, but in all cases is quite high. Estimates of downtime
costs for various industries and applications
2
are presented in Table 1.
INDUSTRY APPLICATION AVERAGE COST/
HOUR OF DOWNTOWN
Transportation Airline Reservations $ 89,500
Retail Catalog Sales $ 90,000
Media Pay-per-view $ 1,150,000
Financial
Credit Card Sales $ 2,600,000
Financial Brokerage Operations $ 6,500,000
Table 1 - Downtime Cost Estimates in Different Vertical Markets
Downtime in service provider networks results in lost revenue due to SLA
penalties and, to add insult to injury, results in increased customer churn. Table
2 depicts some estimates
3
for hourly revenue loss forservice provider network
outages in small metro areas where 100,000 residential customers and 2,000
business customers are affected by an outage. In these small areas, residential
losses are estimated to be over $8,333 per hour and business losses almost
$6,944 per hour.
While revenue loss is problematic, the potentially more serious problem (espe-
cially in markets where there are competitive offerings) is customer churn due to
poor service. Table 3 presents a scenario for a small metro area with 100,000
customers, an increased churn rate of 5 percent due to dissatisfaction with
network service availability, and an average cost of churn of $400 per subscriber
4
.
2
See “Storage Virtualization and the full impact of Storage Disruptions: Relief and ROI”, Computer Technology Review,
February 2002, Volume XX11 Number 2.
3
These estimates are based on an ROI model developed by Network Strategy Partners, LLC.
4
The churn projections were based on an ROI model developed by Network Strategy Partners, LLC
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
7
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
In this scenario the average cost of churn for this small metro area would be
$2,000,000 per year. Clearly, network reliability and availability is a critical
business requirement for enterprises and service providers.
RESIDENTIAL BUSINESS
Number of Customers 100,000 2,000
Average Revenue per Customer $60.00 $2,500
Hourly Lost Revenue in an Outage $8,333 $6,944
Table 2 - Service Provider Hourly Lost Revenue for
Business and Residential Network Outages
RESIDENTIAL
Number of Residential Subscribers 100,0000
Increase Rate of Churn 5%
Total Cost of Churn per Year $400
Total Cost of Churn per Year
$2,000,000
Table 3 - ServiceProviders Costs of Increased Churn Due to Network Outages
Corporate executives, furthermore, are now legally responsible for the security
of their corporate information systems. There are multiple federal and state
government regulatory requirements requiring executives and companies to
comply with government mandated security requirements.
These regulations include:
Sarbanes-Oxley (SOX)
•
Cyber Security Critical Infrastructure Protection (CIP)•
Gramm-Leach-Bliley Act (GLBA)•
California Senate Bill Number 1386 (SB1386)•
Health Insurance Portability and Accounting Act (HIPAA)•
Payment Card Industry Data Security Standard (PCI DSS) •
Network security, clearly, is one of the highest priorities in IP NGNs, and
service providers need to be educated and vigilant to prevent devastating
network attacks.
8
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
NETWORK SECURITYHANDBOOKFORSERVICE PROVIDERS
Anatomy of Network Threats
The open IP architecture presents a myriad of threats from many sources to
all parts of the network. The following paragraphs give an overview of some
common threats, threat sources, and components of the network that could
be affected.
Overview of Security Threats
There are many types of security threats and they continue to grow, develop,
and mutate over time. A high level distribution of networksecurity threats is
presented in Figure 2, and a brief description of security threats is given in
the following subsections of this paper. This is not meant to be an exhaustive
description of network threats, but rather an overview of some common threats
and terminology.
Figure 2 - Distribution of NetworkSecurity Threats
Distributed Denial of Service Attack (DDoS)
A distributed denial of service (DDoS) attack is an attempt to make a computer
resource unavailable to its intended users. Perpetrators of DDoS attacks
typically target sites or services hosted on high-prole Web servers such as
banks, credit card payment gateways, and even DNS root servers. One common
method of attack involves saturating the target (victim) machine with external
communications requests such that it cannot respond to legitimate trafc,
or responds so slowly as to be rendered unavailable. In general terms, DDoS
attacks are implemented by either forcing the targeted network elements or
servers to reset, consuming their resources so that they can no longer provide
their intended service, or obstructing the communication media between the
0
5
10
15
20
25
30
35
40
45
50
DDoS Bots and
Botnets
Worms Compromised
Infrastructure
DNS BGP Route
Hijacking
[...]... firewall and IDP SR 580 X 0 Scalable Performance for Wider Range of Services Rich Standard Services - Firewal - IDP - Routing - QoS Extensible Security Services Integrated Networking Services Common Mangement (NSM) IS 200 G 0 SR 560 X 0 NS 540 0 NS 520 0 IS 100 G 0 Figure 10 - Juniper Networks Security Product Family 25 Network Security Handbook forServiceProviders Firewalls The top end of the product... Application or Content Provider Figure 8 - Architecture of Service Provider Data Centers 22 E32 Hosting or Content Delivery Operator NetworkSecurityHandbookforServiceProviders Data centers are the brains running the network services and therefore are a focal point fornetwork criminals attacking serviceproviders There are a complex set of systems and services running in the data center with vulnerabilities... elements, data center, and Internet peering points 16 NetworkSecurityHandbookforServiceProviders Securing the IP Edge of the VoIP Network The primary mechanisms for controlling traffic and securing the edge of the VoIP network are Session Border Controllers (SBCs) and IPS SBCs are specialized network devices designed to perform specific services in VoIP networks They are inserted into the signaling and/or... closely related - this discussion addresses both types of threats 6 Internet Information Services (IIS)—formerly called Internet Information Server—is a Microsoft-produced set of Internet-based services for servers using Microsoft Windows Network SecurityHandbookforServiceProviders In contrast, zero day attacks are new and therefore have no attack signatures to identify them To defend against zero day... management solutions Routers The Juniper Networks intelligent services edge includes the M-series and MX-series routing platforms that provide a broad range of edge functionality to support next-generation applications Each routing platform supports VLANs, MPLS VPNs, and ACLs for baseline security defenses 24 NetworkSecurityHandbookforServiceProviders Additional security is available with the MS-DPCs... a networksecurity best practice overview which is summarized in Table 4 We start by providing a summary of general best practices that can be applied to any service provider network General Best Practices and Tools forService Provider NetworkSecurity This section provides an overview of some of the devices and technologies for securing service provider networks The devices that provide network security. .. time-tomarket for new services 5 Conclusion Service provider networks are undergoing a massive paradigm shift as networks migrate from legacy circuit switched and closed data networks to converged IP and Carrier Ethernet networks This shift has created many business opportunities, but also created serious networksecurity vulnerabilities This network security handbook has explained why security is of... guratio n Confi Fixed guratio n Figure 9 - Establishing a Security Perimeter in a Virtualized Data Center 23 Network Security Handbook forServiceProviders A common approach for securing network and system infrastructure in data centers is a layered security model (seeFigure 9) In this model, security perimeter(s) are maintained such that trusted network components are separated from untrusted components... 12 NetworkSecurityHandbookforServiceProviders to attack hosts This is especially important for network servers that are a focal point for many attacks Access Control Lists (ACLs) The ACL is a list of permissions that specifies who or what is allowed to access the router or device, and what operations they are allowed to perform In an ACL-based security model, when a subject requests to perform... the network components above can result in loss of service or loss of data 3 Best Practices forService Provider Security Every network is unique and requires the attention of professional network architects and designers to ensure that the network is defensible The principles used by network designers to secure networks are based on a set of industry best practices This section of the securityhandbook . Route
Hijacking
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
9
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
intended. Windows.
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
11
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
NETWORK SECURITY HANDBOOK FOR SERVICE PROVIDERS
In