ISP Edge Design
ISP Edge Design
Josef Ungerman
CCIE #6167
The Internet
IXP Intro
Euro-IX
Technical Details
Live Examples
OTT, Video and IXP
Summary
y & Resources
$
$
$ Global ISP Global ISP
$
$
$
$ Regional ISP Regional ISP
$ Regional ISP Regional ISP
$
$
$ IXP IXP
$
$ Access ISP Access ISP Access ISP Access ISP
$
$ Access ISP Access ISP
Transit
Carrying traffic across a network
y for a fee
Usually
Example: Access provider connects to a regional provider
Peering
Exchanging routing information and traffic
Usually for no fee
Sometimes called settlement free peering
Example: Regional provider connects to another regional
provider
ISP 1 ISP 2
ISP 1 ISP 2
ISP 6 ISP 3
IXP
ISP 5 ISP
S 4
ISP 1 eBGP
ISP 4
IXP
ISP 2
ISP 5
ISP 3
ISP 1 eBGP
ISP 4
ISP 2
ISP 5
ISP 3
ISP 1 eBGP
ISP 4
ISP 2
ISP 5
ISP 3
single
VLAN
LV PL,
LV, PL UA –
• highly fragmented ISP market
• maybe a lot of Hosting DC’s
P
MPLS Core
eBGP
International
IGW
P
MPLS Core
eBGP
International
IGW
P iBGP
IPv4 Route
Reflectors MPLS Core
National International
IGW IGW
P iBGP
IPv4 Route
Reflectors MPLS Core
National International
IGW IGW
P iBGP
IPv4 Route
Reflectors MPLS Core
ISP Transit
Routers
eBGP
ISP Customers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal 22
ISP design
g –p
peering
g layer
y
INTERNET
Other ISP’s
IXP
eBGP
IGW
P iBGP
IPv4 Route
Reflectors MPLS Core
ISP Transit
Routers
eBGP
ISP Customers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal 23
ISP design
g –p
peering
g layer
y
INTERNET
Other ISP’s
IXP
eBGP
Internet GW
+ ISP Transit
N-PE
EoMPLS
MPLS pseudowire eBGP
U-PE
ISP Customers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal 24
Internet Gateway
Existing
E i ti deployments
d l t (~60%
( 60% marketshare)
k t h )
• The most used ISP GW is Cisco 12000 (GSR)
• Many deployments are based on Cisco 7600
• Many small IGW’s are still Cisco 7200
96.0.21.0/24
Internet ISP ISP’s Customer
Allocation
oca o Block:
oc
96.0.19.0/24
96.0.0.0/19
96.0.18.0/24
CPU
To RP 4: Multiple queues to
raw queues queue
LC and RP CPU
ASIC 3 LPTS in
3: i iFIB police
li traffic
t ffi
Router bgp
neighbor 202.4.48.99
…ttl_security
!
mpls ldp
…
!
LC 1 PreIFIB TCAM HW Entries
Local port Remote port Rate Priority
any
y 179 any
y any
y 100 medium
Sockett
255
LPTS
202.4.48.1 179 202.4.48.99 2223 10000 medium
bgp
200.200.0.2 13232 200.200.0.1 646 100 medium
ldp
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal TCP Handshake
34
Detecting
g an attack:
Netflow
A flow is unidirectional
Turning it on (generic):
interface GigabitEthernet 1/1/1
ip route-cache flow [sampled]
Export (optional):
ip flow-export destination 172.17.246.225 9995
Traffic
• Source IP address
• Destination IP address Enable NetFlow
New
• Source port SNMP MIB
Interface
• Destination port
• Layer 3 protocol type
NetFlow
N tFl
• TOS byte (DSCP) Export Packets
GUI
© 2004
© 2006 Cisco Systems, Cisco
Inc. Systems,
All rights Inc. All rights Cisco
reserved. reserved.
Internal 37
37
NetFlow Cache Example
1. Create and update flows in NetFlow cache
Src Src Src Dst Dst Dst Bytes/
Srclf SrclPadd Dstlf DstlPadd Protocol TOS Flgs Pkts NextHop Active Idle
Port Msk AS Port Msk AS Pkt
00A
Fa1/0 173.100.21.2 Fa0/0 10.0.227.12 11 80 10 11000 00A2 /24 5 /24 15 10.0.23.2 1528 1745 4
2
Fa1/0 173.100.3.2 Fa0/0 10.0.227.12 6 40 0 2491 15 /26 196 15 /24 15 10.0.23.2 740 41.5 1
00A
Fa1/0 173.100.20.2 Fa0/0 10.0.227.12 11 80 10 10000 00A1 /24 180 /24 15 10.0.23.2 1428 1145.5 3
1
Fa1/0 173.100.6.2 Fa0/0 10.0.227.12 6 40 0 2210 19 /30 180 19 /24 15 10.0.23.2 1040 24.5 14
3. Aggregation
e.g. Protocol-Port Aggregation
4. Export version Scheme Becomes
Non-Aggregated
gg g Flows—Export
p Version 5 or 9 Payl Protocol Pkts SrcPort DstPort Bytes/Pkt
Export
Header
Usage • Packet
P k t Count
C t •• Source
S
Source
S IPIP
Address
Add
Address
Add From/To
• Byte Count •• Destination
Destination IPIPAddress
Address
Header Data
a a FlowSet
o Se Data
a a FlowSet
o Se
FlowSet ID FlowSet ID
C PE PE C
u u
s MPLS Core s
t PE or PE t
o IP Core
C with
ith BGP R
Routes
t O Only
l o
m m
e PE e
r PE r
s s
PoP PoP
BGP Blackholing
Peer A
IXP-W
IXP W
A Peer B
IXP-E
Upstream A D
Upstream
B
A C
Upstream
Upstream
B
E B
Target
NOC
G
F POP Target is taken
out
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal 47
Customer is DOSed
Before – Co
Co-Lateral
Lateral Damage
Peer A
IXP-W
IXP W
A Peer B
IXP-E
Upstream A D
Upstream
B
A C
Upstream
Upstream
B
E B
Target
Customers
NOC
G
F POP Attack causes
Co-Lateral
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal
Damage 48
Customer is DOSed
After – Packet Drops Pushed to the Edge
Peer A
IXP-W
IXP W
A Peer B
IXP-E
Upstream A D
Upstream
B
A C
Upstream
Upstream
B
E B
iBGP
Target
Advertises
List of Black
Holed
Prefixes
NOC
G
F POP
Remote Triggered Black Hole filtering is the foundation for a whole series
of techniques to traceback and react to DDOS attacks on an ISP’s network.
Easy preparation, does not effect ISP operations or performance.
It does adds the option to an ISP’s security toolkit.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Internal 50
BGP Blackholing: IOS configuration
• place a host-route
host route to Null on every BGP router
ip route 192.0.2.1 255.255.255.255 Null0
!!! packet with source IP prefix pointing to Null0 will be dropped !!!
Sinkholes
To ISP
Backbone
Sniffers and
Analyzers
To ISP Backbone
The
Th importance
i t off Netflow
N tfl
Basic ISP cecurity techniques