Staff AAA Radius is not an ISP AAA Option RADIUS TACACS+ Kerberos What to Configure? Simple Staff Authentication and Failsafe Simple Staff Authentication and Failsafe Simple Staff Authentication and Failsafe Staff Authentication Staff Accountability & Audit Checkpoint with Authentication and Accounting Limit Authority – Authorize Commands Set Privileges Checkpoint with default Authorization Note on Privilege Levels and Authorization One Time Password – Checking the ID What is One Time Password DoS the AAA Infrastructure How to protect the AAA Servers? Source Routing ICMP Unreachable Overload ICMP Unreachable Overload ICMP Unreachable Overload ICMP Unreachable Rate-Limiting Tip: scheduler allocate Introducing a New Router to the Network Introducing a New Router to the Network Secure Template Sources Input Hold Queue Input Hold Queue Input Hold Queue What Ports Are open on the Router? What Ports Are open on the Router? What Ports Are open on the Router? Receive ACL - Overview Receive Adjacencies Receive ACL Command Receive ACL Receive Path ACL Packet Flow Receive ACL – Traffic Flow rACL Processing rACL – Required Entries rACL – Required Entries rACL – Building Your ACL Filtering Fragments rACL – Iterative Deployment Classification ACL Example rACL – Iterative Deployment rACL – Iterative Deployment rACL – Iterative Deployment rACL – Sample Entries rACL – Sample Entries rACL – Sample Entries Use Detailed Logging Core Dumps Core Dumps Routing Protocol Security Why to Prefix Filter and Overview? (Threats) How to Prefix Filter? Where to Prefix Filter? Prefix Filter on Customers Egress Filter to Peers Ingress Filter from Peers Protocol Authentication (MD5) BGP BCPs that help add Resistance Routing Protocol Security Malicious Route Injection Perceive Threat Malicious Route Injection Reality – an Example Garbage in – Garbage Out: What is it? Garbage in – Garbage Out: Results Garbage in – Garbage Out: Impact Garbage in – Garbage Out: What to do? Malicious Route Injection Attack Methods Malicious Route Injection Impact What is a prefix hijack? Malicious Route Injection What can ISPs Do? Malicious Route Injection What can ISPs Do? Malicious Route Injection What can ISPs Do? What can ISPs Do? Containment Egress Prefix Filters What can ISPs Do? Containment Egress Prefix Filters What can ISPs Do? Containment Egress Prefix Filters Malicious Route Injection What can ISPs Do? How to Prefix Filter? Ingress and Egress Route Filtering Ingress and Egress Route Filtering Ingress and Egress Route Filtering Ingress and Egress Route Filtering Ingress and Egress Route Filtering Two Filtering Techniques Ideal Customer Ingress/Egress Route Filtering …. BGP Peering Fundamental Guarded Trust Where to Prefix Filter? Where to Prefix Filter? What to Prefix Filter? Documenting Special Use Addresses (DUSA) and Bogons Documenting Special Use Addresses (DUSA) Documenting Special Use Addresses (DUSA) Documenting Special Use Addresses (DUSA) Bogons Ingress Prefix Filter Template Ingress Prefix Filter Template Prefix Filters on Customers BGP with Customer Infers Multihoming Receiving Customer Prefixes Receiving Customer Prefixes Excuses – Why providers are not prefix filtering customers. What if you do not filter your customer? What if you do not filter your customer? Prefixes to Peers Prefixes to Peers Egress Filter to ISP Peers Issues Policy Questions Ingress Prefix Filtering from Peers Ingress Routes from Peers or Upstream Receiving Prefixes from Upstream & Peers (ideal case) Receiving Prefixes — Cisco IOS Net Police Route Filtering Net Police Route Filtering Net Police Filter Technique #1 Technique #1 Net Police Prefix List Net Police Prefix List Deployment Issues Technique #2 Net Police Prefix List Alternative Technique #2 Net Police Prefix List Alternative Net Police Filter – Technique #3 Technique #3 Net Police Prefix List Net Police Filter – Technique #3 Bottom Line Secure Routing Route Authentication Plain-text neighbor authentication MD-5 Neighbor Authentication: Originating Router MD-5 Neighbor Authentication: Originating Router Peer Authentication Peer Authentication OSPF Peer Authentication OSPF and ISIS Authentication Example BGP Peer Authentication BGP Peer Authentication BGP MD5’s Problem BGP BCPs That Help Build Security Resistance BGP Maximum Prefix Tracking BGP Maximum Prefix Tracking BGP Maximum Prefix Tracking Avoid Default Routes Network with Default Route – Pointing to Upstream A Network with Default Route – But not Pointing to Upstream Network with No Default Route Default Route and ISP Security - Guidance Default to a Sink-Hole Router/Network