Re: [j-nsp] IPv6 RE protection

2015-04-26 Thread Cydon Satyr
Thanks, I will check those out.

Do you consider not having IPv6 filter on RE a big security issue? Do you
use it on your routers?

BR

On Sun, Apr 26, 2015 at 4:49 AM, Michael Loftis mlof...@wgops.com wrote:



 On Saturday, April 25, 2015, Cydon Satyr cydonsa...@gmail.com wrote:

 Hello,
 Currently we don't use any IPv6 RE protect filters on our routers (6PE
 only
 in network). We do use IPv6 filters on public interfaces, however.
 Would you recommend deploying IPv6 RE filters on our edge routers at
 least.

 What kind of configuration you have in your network?

 Also, do you know if Juniper still only supports matching on one
 next-header?


 Depends on your hardware. MPC can dig a bit more precisely but DPC is
 limited (hardware)


 http://www.juniper.net/documentation/en_US/junos14.2/topics/reference/general/firewall-filter-match-conditions-for-ipv6-traffic.html





 Best Regards community
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp



 --

 Genius might be described as a supreme capacity for getting its possessors
 into trouble of all kinds.
 -- Samuel Butler


___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IPv6 RE protection

2015-04-26 Thread Mark Tinka


On 26/Apr/15 11:32, Cydon Satyr wrote:
 Thanks, I will check those out.

 Do you consider not having IPv6 filter on RE a big security issue? Do you
 use it on your routers?

Take IPv6 as seriously as you take IPv4 - is my M.O.

Mark.
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IPv6 RE protection

2015-04-26 Thread sthaug
 Do you consider not having IPv6 filter on RE a big security issue?

Yes.

 Do you use it on your routers?

Yes.

As an absolute minimum you want to protect against telnet/ssh login
attempts towards the router interface addresses. But there's quite a
bit more...

Steinar Haug, Nethelp consulting, sth...@nethelp.no
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] solution to a firewall question

2015-04-26 Thread Ben Dale


Hi Vijesh,

On 24 Apr 2015, at 1:18 am, Vijesh Chandran vij...@juniper.net wrote:

 Hi all,
  I am wondering if we have a solution to this issue.
  I need two firewall attached to an interface as input-list. e.g.: f1 and f2.
  Input-list [f1 f2]
  f1 to match a condition (all tcp port 80) and accept and count that packet.
  f2 to classify those packets based on code points and push to a forwarding 
 class. Is this possible?
 
 -Thanks,
 Vijesh
 

If f2 is only matching on code-points, is there any reason you can't just use a 
class-of-service classifier instead for this functionality?

Cheers,

Ben

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] vpls question

2015-04-26 Thread Ben Dale
Hi James,

On 27 Apr 2015, at 5:31 am, james list jameslis...@gmail.com wrote:

 Hi amarjeet
 Because if PE1 fails there is faster convergence to PE2 due to neighbor
 already established.
 

Is there a reason you wouldn't consider using an L3VPN instead of a VPLS?  It 
seems odd to me that you would be using L3 adjacencies to an L2 service.

If it really is L2 fail-over you are chasing, then Amarjeet is correct - 
multihoming and site-preference are designed for exactly this purpose.

If you customer requires L3 connectivity across your VPLS, you would be better 
off carrying their OSPF across the VPLS and let their CEs form adjacencies with 
each other - that way, you can take care of L2 fail-over, and the customer is 
responsible for L3.

Cheers,

Ben



 Cheers
 James
 Il 24/apr/2015 13:23, james list jameslis...@gmail.com ha scritto:
 
 I have a VPLS multi-homed environment with two MX routers (PE1 and PE2)
 connected to a single ethernet switch (CE1). I have PE1 configured with
 site-preference as primary and PE2 as backup.
 
 
 Behind the CE1 there is a router running OSPF with both MX (on irb
 interface).
 
 
 My goal is to have:
 
 1)Multihoming to prevent loops
 
 2)Let the router run two OSPF neighbor with both PE and not just one
 with the primary PE.
 
 I’m wondering if using:
 
 
 set routing-instances  protocols vpls connectivity-type irb
 
 
 instead of the default (connectivity-type ce) could give me the option to
 reach my goal number 2) and if I can introduce any drawback.
 
 
 Or if there is another solution keeping 1).
 
 
 I don’t have a lab to test…
 
 
 Any help/feedback is really appreciated.
 
 
 Greetings
 
 James
 
 ___
 juniper-nsp mailing list juniper-nsp@puck.nether.net
 https://puck.nether.net/mailman/listinfo/juniper-nsp

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IPv6 RE protection

2015-04-26 Thread Saku Ytti
On (2015-04-27 02:40 +0800), Amarjeet Singh wrote:

 Hello - Security is all or none thing, if something left open risk is
 always there.

I would describe it less as binary off/on and more as layers. Each layer
adding budget requirements to the attacker, but also are increasingly
OPEX/CAPEX heavy for you to implement and may cause significant customer
dissatisfaction.
Notion that you have 'all' security, is almost certainly false.

It is probably exponential in its nature, cost increasing and amount of
attackers removed decreasing, so you almost certainly never ever will meet the
long tail of NSA/GCHQ and friends.
Often in commercial application you should just do what regulator mandates and
client contracts require, doing more way be business risk.

 You should apply IPv6 filters too.
 Juniper MX series book has very nice example for it, have a peek to it.

My top 5 errors people make:

1) use of 'port' (like port bgp, or anything else) - this allows attacker
reach arbitrary port in our device

2) omit 'destination-address', we may not be able to trust source-address in
every L3 MPLS VPN case, but we can trust that we don't provision
infrastructure addreses to L3 VPN customer interfaces

3) for tcp, don't do shortcuts, allow both directions separately unless you
can guarantee direction (bgp passive). Be familiar with your ephemeral port
range to avoid excessive range

4) be familiar with the protocol, does it impose TTL limits, if so, enforce
them. Does it impose source-port limits? If so, enforce them.

5) policing in junos lo0 filters is not useful or practical (due bps only and
due to build-in unconfigurable NPU = LC_CPU policer). Implement
ddos-protection, it's pps based, unfortunately you need to reconfigure every
protocol, so it's lot of cruft in config ('apply-flags omit' is your friend),
usually 'sub' level is useless, turn it off, I'd recommend turning 'ifl' level
statically on (not auto).

-- 
  ++ytti
___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] IPv6 RE protection

2015-04-26 Thread Amarjeet Singh
Hello - Security is all or none thing, if something left open risk is
always there.
You should apply IPv6 filters too.
Juniper MX series book has very nice example for it, have a peek to it.

Br, Amarjeet



 Message: 1
 Date: Sat, 25 Apr 2015 22:36:47 +0200
 From: Cydon Satyr cydonsa...@gmail.com
 To: juniper-nsp@puck.nether.net
 Subject: [j-nsp] IPv6 RE protection
 Message-ID:
 
 caf0puwd4wtpxy1xeth0vc2vdh07g0xmvhutmh0n1w7crzre...@mail.gmail.com
 Content-Type: text/plain; charset=UTF-8

 Hello,
 Currently we don't use any IPv6 RE protect filters on our routers (6PE only
 in network). We do use IPv6 filters on public interfaces, however.
 Would you recommend deploying IPv6 RE filters on our edge routers at least.

 What kind of configuration you have in your network?

 Also, do you know if Juniper still only supports matching on one
 next-header?

 Best Regards community



___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


Re: [j-nsp] vpls question

2015-04-26 Thread james list
Hi amarjeet
Because if PE1 fails there is faster convergence to PE2 due to neighbor
already established.

Cheers
James
Il 24/apr/2015 13:23, james list jameslis...@gmail.com ha scritto:

 I have a VPLS multi-homed environment with two MX routers (PE1 and PE2)
 connected to a single ethernet switch (CE1). I have PE1 configured with
 site-preference as primary and PE2 as backup.


 Behind the CE1 there is a router running OSPF with both MX (on irb
 interface).


 My goal is to have:

 1)Multihoming to prevent loops

 2)Let the router run two OSPF neighbor with both PE and not just one
 with the primary PE.

 I’m wondering if using:


 set routing-instances  protocols vpls connectivity-type irb


 instead of the default (connectivity-type ce) could give me the option to
 reach my goal number 2) and if I can introduce any drawback.


 Or if there is another solution keeping 1).


 I don’t have a lab to test…


 Any help/feedback is really appreciated.


 Greetings

 James

___
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp