Title: Core Protection, DDoSDetection
1Core Protection,DDoS-Detection -Mitigation
Experience_at_ACOnet
- CEENet / Nato Workshop
- Ohrid, June 27, 2005
- Harald Michl michl_at_cc.univie.ac.at
2Agenda
- Who is ACOnet
- Layer2 Protection Methods
- IP inbound Filtering
- BGP Filtering
- DDoS Protection
- Selected Products
- Experience Lessons Learned
- Future
- Demonstration
3Who is ACOnet
- Austrias NREN http//www.ACO.net/
- Connecting Universities,
- regional School Networks,
- Research Institutes,
- governmental Departments
- Switched/Layer2 GbEthernet Core
- (AT-wide)
- Routed/Layer3 Global Connectivity Service
- Operated by UniVie and operations partners at
universities hosting a POP
4ACOnet Topology
5ACOnet Core Vienna
6ACOnet Core Equipment
- Vienna
- Cat6509/SUP2/FlexWAN(ATM)/OSMs
- IOS12.1(26)E
- Regional POPs
- Cat3750G-12S-Stacks
- Cisco7507 (for serialATM)
- GigabitEthernet Core
- Alcatel/ADVA-DWDM
- operated by Telekom Austria
7Layer2 Protection
- Reason primarily protect against (customer)
configuration mistakes and asymmetric DWDM
transmission failures - Global config Level
- UDLD enable
- errdisable detect recovery
- VLAN Level STP (pvst mode)
- Interface Level
- storm-control broadcast ( multicast)
- spanning-tree guard root
8IP inbound Filtering
- From Upstreams, Customers Peers
- deny RFC1918
- deny Bogon Sourceshttp//www.cymru.com/Bogons/
- From Customers (not yet implemented)
- strict uRPF (single homed)
- Caution with diverted Prefixes !
- prefix-based (dual-homed)
9BGP inbound Filtering
- From Customers and small Peers
- prefix-based (auto-generated from RIPE-DB)
- From larger Peers
- AS-Path depth
- max-prefix
- From Upstreams
- deny Bogon Prefixes
10Why DDoS Protection ?
- Regular attacks experienced since 2001
specifically towards IRC servers (at universities
in Linz, Graz, Vienna) - Attacks have been affecting POP infrastructure
and customers - UniVie technically responsible for
- .AT-ccTLD nameservers
- No 7x24 staffed NOC
11Why Riverhead Guard ?
- Scaling well for our network size and topology
- Diversion model instead of in-line
- Self removing in case of failure
- Excellent helpful staff cooperation during test
installation and early production phase - Good understanding of customer needs
- Fast and flexible with implementation of
improvements - In 2004 Riverhead bought by Cisco and product now
named Cisco Guard XT http//www.cisco.com/en/US/p
roducts/ps5894/
12How is it deployed in ACOnet
- Currently one Guard XT in Vienna
- Dedicated VLAN, with Guard and all POP routers
directly connected (easy Layer2 forwarding) - BGP/diversion only with Vienna core ?
- Policy route-maps (PBR forwarding) needed for
Vienna customers only
13Cisco Guard simple view
14Cisco Guard Diverting traffic
more specific announcement
15Cisco Guard Reinject traffic (1)
more specific announcement
next hop
16Cisco Guard Reinject traffic (2)
more specific announcement
next hop
17Cisco Guard Reinject traffic (3)
more specific announcement
next hop
18Cisco Guard Attention!
DO NOT USE STRICT URPF !!!
more specific announcement
19What it protects
- Permanently
- IRC Servers in Linz, Graz and Vienna
- Selected FTP/WWW Servers
- Selected .AT-ccTLD Server(s)
- On-Demand
- Profiled / baselined Customer Hosts and Subnets
- Parts of Core Infrastructure when under attack
- On-The-Fly
- Any ACOnet Customer asking for ad-hoc protection
20What is missing
- ACOnet investigating/implementing
- per zone/customer reporting
- Automatic Protection (using Peakflow SP/CP)
- and other new features in R3/XT
- Cisco Guard
- Overlapping Zones
- Securing customer support quality
21Why Arbor Peakflow ?
- Complementary tool needed for Anomaly Detection
in the core - Neither Cisco Detector nor IDS generally suited
for anomaly detection in the core - Looking for Netflow based analyzer
- Talking to other Riverhead users
- Testing Arbor Peakflow/DoS Traffic
- Promise to integrate consolidate and to
directly interface with Cisco Guard - Peakflow SP/CP http//www.arbor.net/products_sp.p
hp
22How is Arbor Peakflow used?
- Intended to use mainly for Anomaly Detection
- Great functionality of traffic-module
- analysis of traffic flow
- (getting back) peering statistics
- traffic statistic of/for customers
- AS-Explorer
23Arbor Peakflow _at_ ACOnet
24Experience Lessons Learned
- Generally good experience with both products,
however - Peakflow quality highly depends on Netflow
quality, which hasnt been as good as expected on
our Cat6k5 - No TCP flags (not supported on any current
PFCs/ASICs) - Severe Netflow hashing problems (bug) on SUP2 /
IOS12.2(18)SXD gt now back to 12.1(26)E - Cisco Support
- Cumbersome to get priority and engineering focus
- Learning curve longer than expected on Arbor
products
25Future
- Upgrading Core to SUP720-3B(XL) and 12.2S
- Deploy CoPP (Control Plane Policing / Protection)
- Infrastructure ACLs (partial / on-demand ?)
- Still working on migration to consolidated Arbor
platform (Peakflow SP/CP) - Integration with Cisco Guard
- Cooperation with upstreams and peers
- Fingerprint Sharing
- Keeping our minds open for other / complementary
solutions - And then IPv6 !?!?!?
26Live Show!fasten your seatbelt ?
Peakflow reports attack
Guards cleans traffic
27Questions ?