1 / 7

Scenarios

Scenarios. Business Applications. Scenario 1: Secure EPON FTTH/FTTB (provider network) Scenario 2: IEEE 802 Link Security RPR provider network? ??? Scenario 3: Secure Bridged Networks RPR enterprise networks? ???. Levels of Trust.

mercer
Download Presentation

Scenarios

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Scenarios

  2. Business Applications • Scenario 1: Secure EPON • FTTH/FTTB (provider network) • Scenario 2: IEEE 802 Link Security • RPR provider network? • ??? • Scenario 3: Secure Bridged Networks • RPR enterprise networks? • ???

  3. Levels of Trust • Scenarios 3a, 3b and 3c depict different levels of trust of a network • In the absence of any SA (#3), all bridges are trusted • 3a) Implies the opposite (complete paranoia) • 3b) The ES’s trust exactly one SB (there may be other SB’s but the ES’s don’t trust them). • 3c) The left ES trusts the left SB and the right ES, the right SB. Neither ES trusts the SB furthest from it. SB’s trust each other, and they may be separated by a normal (security–unware) bridge B or an SB they don’t trust. • Different security approach depending on trust level

  4. Classification of Scenarios • Classify scenarios by trust models (first cut): • Scenario T1: ES-EN-ES • Enterprise trust model • ES-EN links may be shared medium • Scenario T2: ES-PN-EN • Provider network in one Admin Domain • Scenario T3: ES-PN-EN • Provider network spans multiple Admin Domains • EPON ES-PN links or other shared media ES: End System EN: Enterprise Network PN: Provider Network

  5. Unified Solution: Two Architecture Views? • Single-hop security associations • Basis of the solution is the link security • Secure Bridged network is designed as a (secure) sequence of secure links • Multi-hop security associations • A secure bridged network operates as a single end-to-end security association where end points may be secure bridges, not stations • Link security may be obtained by considering the link as the simplest form of a network • Combinations are possible

  6. Scope of Security Associations

  7. Single-hop SAs SA management is between contiguous “devices” (simple) L2 network infrastructure must be security-aware New infrastructure? Upgrade existing? What is the impact? Disadvantage: can’t support secure link layer between bridged stations separated by security-unaware bridges Multi-hop SAs No impact in the network infrastructure (transparent service) SA management is more complicated During SA establishment? After topology changes Restricted link protection Control and management frames may cannot be protected Is it needed? Special mechanisms can be added Factors

More Related