68
© 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco DDoS Solution Design & Technical ReviewCisco Systesm Korea Solution S.E Team 최우형 ([email protected])

Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1

“ Cisco DDoS Solution Design & Technical Review”

Cisco Systesm KoreaSolution S.E Team최우형 ([email protected])

Page 2: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2

Hijacking / InjectionHijacking / Injection

L2 Hijacking / L2 InjectionL3 Hijacking / L2 InjectionL3 Hijacking / L3 PBR InjectionL3 Hijacking / L3 VRF InjectionL2 Hijacking / L3 PBR InjectionL2 Hijacking / L3 VRF Injection

Page 3: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3

L2 Hijacking / L2 InjectionL2 Hijacking / L2 Injection

Zone192.168.1.0/24

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

VLAN interface

.1

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Guard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.1.0 255.255.255.0 nexthop192.168.200.253

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

Exit

proxy 192.168.200.100

Gi1/1

Gi1/2

Vlan200

Page 4: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4

L2 Hijacking / L2 Injection (cont)L2 Hijacking / L2 Injection (cont)

Zone192.168.1.0/24

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

Port2 (Data Port)giga2

Port1 (Management Port)eth1

VLAN interface

10.1.1.0/24

.1

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

!interface GigabitEthernet1/2no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

interface Vlan100ip address 192.168.100.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan200ip address 192.168.200.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

VLAN10

Gi1/1

Gi1/2

Access port setting 가능

Page 5: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5

Hijacking / InjectionHijacking / Injection

L2 Hijacking / L2 InjectionL3 Hijacking / L2 InjectionL3 Hijacking / L3 PBR InjectionL3 Hijacking / L3 VRF InjectionL2 Hijacking / L3 PBR InjectionL2 Hijacking / L3 VRF Injection

Page 6: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6

L3 Hijacking / L2 InjectionL3 Hijacking / L2 Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

.254Routed(L3) Port

VLAN interface

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Guard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.1.0 255.255.255.0 nexthop192.168.200.253

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

exit

proxy 192.168.200.100

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

Vlan200

Page 7: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7

L3 Hijacking / L2 Injection (cont)L3 Hijacking / L2 Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

.254Routed(L3) Port

VLAN interface

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1ip address 192.168.128.254 255.255.255.0

interface GigabitEthernet1/2no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

interface Vlan100ip address 192.168.100.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan200ip address 192.168.200.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

Page 8: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8

Hijacking / InjectionHijacking / Injection

L2 Hijacking / L2 InjectionL3 Hijacking / L2 InjectionL3 Hijacking / L3 PBR InjectionL3 Hijacking / L3 VRF InjectionL2 Hijacking / L3 PBR InjectionL2 Hijacking / L3 VRF Injection

Page 9: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9

L3 Hijacking / L3 InjectionL3 Hijacking / L3 Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.1

.254Routed(L3) Port

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

Guard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.1.0 255.255.255.0 nexthop192.168.200.254

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

exit

proxy 192.168.200.100

64.0.0.0/24Routed(L3) Port

Vlan200

Page 10: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10

L3 Hijacking / L3 PBR InjectionL3 Hijacking / L3 PBR Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.1

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Zone192.168.1.0/24

.1

Gi1/2

64.0.0.0/24

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1ip address 192.168.128.254 255.255.255.0

interface GigabitEthernet1/2ip address 64.0.0.254 255.255.255.0

interface Vlan100ip address 192.168.100.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan200ip address 192.168.200.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arpip policy route-map PBR1

access-list 100 permit ip any 192.168.1.0 0.0.0.255

route-map PBR1 permit 10match ip address 100set ip next-hop 64.0.0.1

router ospf 1network 192.168.200.0 0.0.0.255 area 0 Advertise ProxyIP Subnet

PBR

Page 11: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11

L3 Hijacking / L3 VRF InjectionL3 Hijacking / L3 VRF Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.1

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Zone192.168.1.0/24

.1

Gi1/2

64.0.0.0/24

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

ip vrf GUARD-VRFrd 100:1

interface GigabitEthernet1/1ip address 192.168.128.254 255.255.255.0

interface GigabitEthernet1/2ip address 64.0.0.254 255.255.255.0

interface Vlan100ip address 192.168.100.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan200ip vrf forwarding GUARD-VRFip address 192.168.200.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

router ospf 1network 192.168.200.0 0.0.0.255 area 0

Ip route vrf GUARD-VRF 192.168.1.0 255.255.2550. 64.0.0.1 global

Advertise ProxyIP Subnet

VRF

Page 12: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12

L2 Hijacking / L3L2 Hijacking / L3 InjectionInjection

Zone192.168.1.0/24

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

VLAN interface

.1

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Guard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.1.0 255.255.255.0 nexthop192.168.200.253

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

Exit

proxy 192.168.200.100

Gi1/1

Gi1/2

Vlan200

Page 13: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13

L2 Hijacking / L3 Injection (cont)L2 Hijacking / L3 Injection (cont)

Zone192.168.1.0/24

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

NOC

Internet

.254

.253

Port2 (Data Port)giga2

Port1 (Management Port)eth1

VLAN interface

10.1.1.0/24

.1

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1no ip addressswitchportswitchport access vlan 100switchport mode access

!interface GigabitEthernet1/2no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

interface Vlan100ip address 192.168.100.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan200ip address 192.168.200.254 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

VLAN10

Gi1/1

Gi1/2

Routing Loop 를피하기위해PBR or VRF 구성가능

Page 14: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14

Divert Tech OverviewExternal 구성시방법

Page 15: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15

Hijacking / InjectionHijacking / Injection

L3 iBGP Hijacking / L2 External InjectionL3 iBGP Hijacking / L3 PBR External InjectionL3 eBGP Hijacking / L3 VRF over GRE Internal InjectionSpecific BGP Instance for the VRF

Page 16: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16

L3 L3 iBGPiBGP Hijacking / L2 External InjectionHijacking / L2 External Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.253

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

VLAN127192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

Page 17: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.253

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Ex: Other Pysical Connection (Dedicate Injection Link)

Page 18: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.253

.254Routed(L3) Port

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

VLAN100192.168.127.0/24

.253 .253

Guard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.1.0 255.255.255.0 nexthop192.168.200.253

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

Exit

proxy 192.168.200.100 Vlan200

Page 19: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.253

.254Routed(L3) Port

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

VLAN100192.168.127.0/24

.253 .253

MSFC Interface Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

!interface GigabitEthernet1/2no ip addressswitchportswitchport access vlan 200switchport mode access

interface Vlan100ip address 192.168.100.253 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan127ip address 192.168.127.253 255.255.255.0

Page 20: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.253

.254Routed(L3) Port

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1

Gi1/2

VLAN100192.168.127.0/24

.253 .253

MSFC Routing Configuration

:router ospf 1 *1network 192.168.100.0 0.0.0.255 area 0 *1network 192.168.127.0 0.0.0.255 area 0 *1

router bgp 100bgp log-neighbor-changesneighbor 192.168.127.254 remote-as 100!address-family ipv4redistribute static route-map GUARDneighbor 192.168.127.254 activateneighbor 192.168.127.254 next-hop-self *2neighbor 192.168.127.254 send-communityneighbor 192.168.127.254 advertisement-interval 0neighbor 192.168.127.254 soft-reconfiguration inboundno auto-summaryno synchronizationexit-address-family

!access-list 1 permit 192.168.100.1!route-map GUARD permit 10match ip next-hop 1set community no-export

!route-map GUARD permit 20!Ip route 0.0.0.0 0.0.0.0 192.168.127.254 *3

Guard 의 Hijacking Subnet 이 IGP에의해 Advertise 되면, by IGP, Router 로부터 Diversion 된것은 Guard IP Address 가BGP Next-Hop 처럼보임.

“next-hop-self”를이용해서 Nexthop을 Overwriting 시켜도됨

재분배를이용한 Static route injection 기법사용다른 BGP Peer에게 Route가 Advertise 되는것을피하기위한구성

Page 21: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21

L3 L3 iBGPiBGP Hijacking / L2 External InjectionHijacking / L2 External Injection

router#sh ip roO 192.168.111.0/24 [110/2] via 192.168.200.253, 00:06:22, Vlan200

69.0.0.0/32 is subnetted, 1 subnetsB 69.69.69.69 [200/0] via 99.99.99.253, 06:04:40

72.0.0.0/32 is subnetted, 1 subnetsB 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59

Cat#sh ip ro72.0.0.0/32 is subnetted, 1 subnetsB 69.69.69.69 [200/0] via 99.99.99.253, 06:04:40

72.0.0.0/32 is subnetted, 1 subnetsB 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59S* 0.0.0.0/0 [1/0] via 192.168.127.254

ebgp-router#sh ip ro72.0.0.0/32 is subnetted, 1 subnetsB 69.69.69.69 [200/0] via 99.99.99.253, 06:04:40

72.0.0.0/32 is subnetted, 1 subnetsB 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59

6K+GuardModule

Diversion-From-Router

Any other EBGP Router

No Protection

Page 22: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

router#sh ip roO 192.168.111.0/24 [110/2] via 192.168.200.253, 00:06:22, Vlan200B 192.168.111.0/25 [200/0] via 192.168.127.253, 00:02:20B 192.168.111.128/25 [200/0] via 192.168.127.253, 00:02:20

69.0.0.0/32 is subnetted, 1 subnetsB 69.69.69.69 [200/0] via 99.99.99.253, 06:04:40

72.0.0.0/32 is subnetted, 1 subnetsB 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59

Cat#sh ip ro72.0.0.0/32 is subnetted, 1 subnets

B 69.69.69.69 [200/0] via 99.99.99.253, 06:04:4072.0.0.0/32 is subnetted, 1 subnets

B 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59S 192.168.111.0 [25/0] via 192.168.127.200, Vlan100S 192.168.111.128 [25/0] via 192.168.127.200, Vlan100S* 0.0.0.0/0 [1/0] via 192.168.127.254

ebgp-router#sh ip ro72.0.0.0/32 is subnetted, 1 subnetsB 69.69.69.69 [200/0] via 99.99.99.253, 06:04:40

72.0.0.0/32 is subnetted, 1 subnetsB 72.72.72.2 [20/0] via 66.66.66.100, 06:36:59

6K+GuardModule

Diversion-From-Router

Any other EBGP Router

Protection

Page 23: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23

L3 L3 iBGPiBGP Hijacking / L2 External Injection (cont)Hijacking / L2 External Injection (cont)

NOC

Internet

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

Zone

Ex: Other Pysical Connection (Dedicate Injection Link)

Page 24: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24

Hijacking / InjectionHijacking / Injection

L3 iBGP Hijacking / L2 External InjectionL3 iBGP Hijacking / L3 PBR External InjectionL3 eBGP Hijacking / L3 VRF over GRE Internal InjectionSpecific BGP Instance for the VRF

Page 25: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25

L3 L3 iBGPiBGP Hijacking / L3 PBR External InjectionHijacking / L3 PBR External Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

Gi1/0

192.168.129.254

Page 26: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26

L3 L3 iBGPiBGP Hijacking / L3 PBR External Injection (cont)Hijacking / L3 PBR External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

Guard Module Configuration

diversion injection 0.0.0.0 0.0.0.0 nexthop 192.168.200.254

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

Exit

proxy 192.168.200.100 Vlan200

Page 27: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27

L3 L3 iBGPiBGP Hijacking / L3 PBR External Injection (cont)Hijacking / L3 PBR External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

Internet

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

MSFC Interface Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface GigabitEthernet1/1no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

!interface GigabitEthernet1/2no ip addressshutdown

interface Vlan100ip address 192.168.100.253 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

interface Vlan127ip address 192.168.127.253 255.255.255.0

::

Page 28: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28

L3 L3 iBGPiBGP Hijacking / L3 PBR External Injection (cont)Hijacking / L3 PBR External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

Internet

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

MSFC Routing Configuration

:router bgp 100bgp log-neighbor-changesneighbor 192.168.127.254 remote-as 100!address-family ipv4redistribute static route-map GUARDneighbor 192.168.127.254 activateneighbor 192.168.127.254 next-hop-selfneighbor 192.168.127.254 send-communityneighbor 192.168.127.254 advertisement-interval 0neighbor 192.168.127.254 soft-reconfiguration inboundno auto-summaryno synchronizationexit-address-family

!access-list 1 permit 192.168.100.1!route-map GUARD permit 10match ip next-hop 1set community no-export

!route-map GUARD permit 20!Ip route 0.0.0.0 0.0.0.0 192.168.127.254

Page 29: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29

L3 L3 iBGPiBGP Hijacking / L3 PBR External Injection (cont)Hijacking / L3 PBR External Injection (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

iBGPeBGP

Area0

AS100AS200

Gi1/0

Diversion-From-Router Configuration

interface GigabitEthernet1/0.127encapsulation dot1Q 127ip address 192.168.127.254 255.255.255.0

!interface GigabitEthernet0/0.200encapsulation dot1Q 200ip address 192.168.200.254 255.255.255.0ip policy route-map PBR

router ospf 1log-adjacency-changesnetwork 192.168.128.0 0.0.0.255 area 0network 192.168.129.0 0.0.0.255 area 0network 192.168.200.0 0.0.0.255 area 0

router bgp 100bgp log-neighbor-changesneighbor 192.168.127.253 remote-as 100neighbor 192.168.127.253 soft-reconfiguration inboundno auto-summaryno synchronization

!access-list 100 permit ip any 192.168.1.0 0.0.0.255route-map PBR permit 10match ip address 100set ip next-hop 192.168.129.254

192.168.129.254

Advertise ProxyIP Subnet to the ZonePBR

Page 30: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30

Hijacking / InjectionHijacking / Injection

L3 iBGP Hijacking / L2 External InjectionL3 iBGP Hijacking / L3 PBR External InjectionL3 eBGP Hijacking / L3 VRF over GRE Internal InjectionSpecific BGP Instance for the VRF

Page 31: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal InjectionHijacking / L3 VRF over GRE Internal Injection

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGPeBGP

Area0

AS65501AS200

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

Page 32: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

NOC

Internet

Zone192.168.1.0/24

Cat6K + Guard ModuleDiversion-From-Router

Injection-To-Router

Page 33: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGPeBGP

Area0

AS65501AS200

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

Guard Module Configuration

diversion injection 0.0.0.0 0.0.0.0 nexthop 192.168.200.254

interface eth1ip address 10.1.1.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

Exit

proxy 192.168.200.100 on Vlan200

If it has no statement “diversion hijacking receive-via-ip” or“diversion hijacking receive-via-vlan”,Guard will use smallest VLAN numberfor hijacking automatically

Page 34: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

Internet

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGPeBGP

Area0

AS65501AS200

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

MSFC Interface Configuration

anomaly-guard module 2 port 1 allowed-vlan 10anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 10

interface Tunnel0ip address 192.168.130.254 255.255.255.0tunnel source 192.168.127.253tunnel destination 192.168.129.254

!interface GigabitEthernet1/1no ip addressswitchportswitchport trunk encapsulation dot1qswitchport mode trunk

!interface Vlan100ip address 192.168.100.253 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

!interface Vlan127ip address 192.168.127.253 255.255.255.0

!interface Vlan200ip vrf forwarding GUARD-VRFip address 192.168.200.253 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

:

VRF

GRE Tunnel Interface

Page 35: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

Internet

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGPeBGP

Area0

AS65501AS200

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

MSFC Routing Configuration

ip vrf GUARD-VRFrd 100:1

router bgp 65501bgp log-neighbor-changesneighbor 192.168.127.254 remote-as 100!address-family ipv4redistribute static route-map GUARD-ROUTEneighbor 192.168.127.254 activateneighbor 192.168.127.254 send-communityneighbor 192.168.127.254 advertisement-interval 0neighbor 192.168.127.254 soft-reconfiguration inboundneighbor 192.168.127.254 route-map GUARD-COMM outno auto-summaryno synchronizationexit-address-family

!ip route 0.0.0.0 0.0.0.0 192.168.127.254ip route vrf GUARD-VRF 192.168.1.0 255.255.255.0 192.168.130.1 global

access-list 1 permit 192.168.100.1!route-map GUARD-ROUTE permit 10match ip next-hop 1

!route-map GUARD-COMM permit 10match ip next-hop 1set community no-advertise

!route-map GUARD-COMM permit 20

Static Route 재분배

Peer 에게 Advertise 하기위한Community 속성추가

Static VRF(GUARD-VRF)의 Nexthop route는GRE Peer의 Tunnel Interface가됨.

VRF

Page 36: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 36

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

NOC

Internet

.254

.254

Port2 (Data Port)giga2

Port1 (Management Port)eth1

10.1.1.0/24VLAN10

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGPeBGP

Area0

AS65501AS200

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

Inject-To-Router Configuration

interface Tunnel0ip address 192.168.130.1 255.255.255.0tunnel source 192.168.129.254tunnel destination 192.168.127.253

!interface GigabitEthernet1/0ip address 192.168.129.254 255.255.255.0

!router ospf 1log-adjacency-changesnetwork 192.168.129.0 0.0.0.255 area 0network 192.168.111.0 0.0.0.255 area 0

ip route 192.168.200.0 255.255.255.0 192.168.130.254

GRE Tunnel Interface

GUARD-VRF Zone의 Next Hop

Page 37: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37

L3 L3 eBGPeBGP Hijacking / L3 VRF over GRE Internal Injection Hijacking / L3 VRF over GRE Internal Injection (cont)(cont)

NOC

Internet

Port2 (Data Port)giga2

Port1 (Management Port)eth1

Zone192.168.1.0/24

eBGPeBGP

AS65501AS200

AS100iBGP

Ex: Other Routing Topology

Page 38: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38

Hijacking / InjectionHijacking / Injection

L3 iBGP Hijacking / L2 External InjectionL3 iBGP Hijacking / L3 PBR External InjectionL3 eBGP Hijacking / L3 VRF over GRE Internal InjectionSpecific BGP Instance for Injection VRF

Page 39: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

AS65501

iBGP

192.168.132.1

192.168.132.2192.168.131.2

192.168.131.1

Page 40: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 40

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

Zone192.168.1.0/24

Cat6K + Guard ModuleDiversion-From-Router

Injection-To-Router

Zone-Local-Router

Page 41: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 41

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

192.168.131.2

192.168.131.1AS65501

iBGP

192.168.132.1

192.168.132.2

MSFC Interface Configuration

interface Tunnel0ip address 192.168.130.254 255.255.255.0tag-switching iptunnel source 192.168.127.253tunnel destination 192.168.129.254

!interface Vlan200ip vrf forwarding GUARD-VRFip address 192.168.200.253 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arp

!

GRE Tunnel Interface

VRF

Page 42: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 42

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

192.168.131.2

192.168.131.1AS65501

iBGP

MSFC Routing Configuration

ip vrf GUARD-VRFrd 100:1route-target export 100:1route-target import 100:1

router bgp 65501bgp log-neighbor-changesneighbor 192.168.127.254 remote-as 100neighbor 192.168.131.1 remote-as 65501!address-family ipv4redistribute static route-map GUARD-ROUTEneighbor 192.168.127.254 activateneighbor 192.168.127.254 send-communityneighbor 192.168.127.254 advertisement-interval 0neighbor 192.168.127.254 soft-reconfiguration inboundneighbor 192.168.127.254 route-map GUARD-COMM outneighbor 192.168.131.1 activeno auto-summaryno synchronizationexit-address-family!address-family vpnv4neighbor 192.168.130.1 activateneighbor 192.168.130.1 send-community extendedexit-address-family!address-family ipv4 vrf GUARD-VRFredistribute connectedno auto-summaryno synchronizationexit-address-family

!

Page 43: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

AS65501

iBGP

Inject-To-Router Interface Configuration!interface Tunnel0ip address 192.168.130.1 255.255.255.0tag-switching iptunnel source 192.168.129.254tunnel destination 192.168.127.253

!interface Tunnel1ip vrf forwarding GUARD-VRFip address 192.168.131.1 255.255.255.0tunnel source 192.168.132.1tunnel destination 192.168.132.2

!interface GigabitEthernet1/0ip address 192.168.129.254 255.255.255.0

!interface GigabitEthernet1/1ip address 192.168.132.1 255.255.255.0

!:

192.168.132.1

192.168.132.2192.168.131.2

192.168.131.1

Diversion-From-Router Configuration

Same configuration

Page 44: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 44

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

AS65501

iBGP

192.168.132.1

192.168.132.2192.168.131.2

192.168.131.1

Inject-To-Router Routing Configuration!router ospf 1log-adjacency-changesnetwork 192.168.129.0 0.0.0.255 area 0network 192.168.132.0 0.0.0.255 area 0

!router bgp 65501no synchronizationbgp log-neighbor-changesneighbor 192.168.130.254 remote-as 65501neighbor 192.168.130.254 send-community extendedno auto-summary!address-family ipv4 vrf GUARD-VRFredistribute connectedredistribute staticno auto-summaryno synchronizationexit-address-family!address-family vpnv4neighbor 192.168.130.254 activateneighbor 192.168.130.254 send-community extendedno auto-summaryexit-address-family

!ip route vrf GUARD-VRF 192.168.1.0 255.255.255.0 192.168.131.2 global

Page 45: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

AS65501

iBGP

192.168.132.1

192.168.132.2192.168.131.2

192.168.131.1

Zone-Local-Router Configuration!interface Tunnel1ip address 192.168.131.2 255.255.255.0tunnel source 192.168.132.2tunnel destination 192.168.132.1

!interface GigabitEthernet1/0ip address 192.168.132.2 255.255.255.0

!router ospf 1log-adjacency-changesnetwork 192.168.1.0 0.0.0.255 area 0network 192.168.132.0 0.0.0.255 area 0

!ip route 192.168.200.0 255.255.255.0 192.168.131.1ip route 0.0.0.0 0.0.0.0 192.168.132.1

Page 46: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 46

Specific BGP Instance for Injection VRF (cont)Specific BGP Instance for Injection VRF (cont)

VLAN100

VLAN200

192.168.100.0/24

192.168.200.0/24

.1

.1

.254

.254

.254

Port2 (Data Port)giga2

192.168.128.0/24

Zone192.168.1.0/24

.1VLAN127

192.168.127.0/24

.253 .253

Gi1/1

eBGP

GUARD-VRF

AS65501

Gi1/0

192.168.129.254

AS100

Tunnel0192.168.130.1

Tunnel0192.168.130.254

AS65501

iBGP

192.168.132.1

192.168.132.2192.168.131.2

192.168.131.1

Cat#sh ip roC 192.168.127.0/24 is directly connected, Vlan127

192.168.1.0/25 is subnetted, 2 subnetsS 192.168.1.0 [25/0] via 192.168.100.1, Vlan100S 192.168.1.128 [25/0] via 192.168.100.1, Vlan100C 192.168.130.0/24 is directly connected, Tunnel0C 192.168.200.0/24 is directly connected, Vlan200C 192.168.100.0/24 is directly connected, Vlan100S* 0.0.0.0/0 [1/0] via 192.168.127.254

JaffaCat#sh ip ro v GUARD-VRFRouting Table: GUARD-VRFC 192.168.200.0/24 is directly connected, Vlan200B 192.168.1.0/24 [200/0] via 192.168.130.1, 03:42:51B 192.168.131.0/24 [200/0] via 192.168.130.1, 03:42:51

Inject#sh ip roO 192.168.1.0/24 [110/2] via 192.168.132.2, 17:21:30, GigabitEthernet1/1O 192.168.127.0/24 [110/2] via 192.168.129.1, 17:21:30, GigabitEthernet1/0C 192.168.129.0/24 is directly connected, GigabitEthernet1/0C 192.168.132.0/24 is directly connected, GigabitEthernet1/1

Inject#sh ip ro v GUARD-VRFRouting Table: GUARD-VRFB 192.168.200.0/24 [200/0] via 192.168.130.254, 04:32:42C 192.168.131.0/24 is directly connected, Tunnel1S 192.168.1.0/24 [1/0] via 192.168.131.2

Page 47: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 47

Loadsharing & HA 구성

Page 48: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 48

Multiple Guard Module for Multiple Guard Module for LoadshareLoadshare/HA/HA

VLAN100

VLAN200

192.168.100.0/24192.168.200.0/24

.1

.1

.254

Internet

Port2 (Data Port)giga2

VLAN127192.168.127.0/24

.253 .253

BGP AS65501

.2

.2Proxy 192.168.200.102

Proxy 192.168.200.101

Zone192.168.1.0/24 Cat6K + Multiple Guard Module

Diversion-FromRouter

Injection-ToRouter

.1

.2

Port1 (Management Port)eth1

Page 49: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 49

Multiple Guard Module for Multiple Guard Module for LoadshareLoadshare/HA/HA

VLAN100

VLAN200

192.168.100.0/24192.168.200.0/24

.1

.1

.254

Internet

Port2 (Data Port)giga2

VLAN127192.168.127.0/24

.253 .253

BGP AS65501

.2

.2Proxy 192.168.200.102

Proxy 192.168.200.101

Zone192.168.1.0/24 Cat6K + Multiple Guard Module

Diversion-FromRouter

Injection-ToRouter

.1

.2

Port1 (Management Port)eth1

MSFC Configuration

anomaly-guard module 2 port 1 allowed-vlan 11anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 3 port 1 allowed-vlan 11anomaly-guard module 3 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 11anomaly-guard module 3 port 1 native-vlan 11

interface eth1ip address 11.1.1.1

255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.1 255.255.255.0

mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0

mtu 1500no shutdown

exit

interface eth1ip address 11.1.1.2

255.255.255.0mtu 1500no shutdown

exitinterface giga2

mtu 1500no shutdown

exitinterface giga2.100

ip address 192.168.100.2 255.255.255.0

mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.2 255.255.255.0

mtu 1500no shutdown

exit

Page 50: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50

Configuration ProcedureConfiguration Procedure

Loadsharing1. 구성하려는모듈을동일한 weight 값으로설정2. 두모듈에같은 Zone을 Config3. 두모듈이동시에 Traffic을 Learning4. Activate

Redundant1. Primary module에 Low weight 값을설정, Secondary module에는 High weight 값을설정

2. primary module에서 Traffic을 Learning3. Activate

Page 51: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 51

Multiple Guard Module for Multiple Guard Module for LoadshareLoadshare/HA/HA

VLAN100

VLAN200

192.168.100.0/24192.168.200.0/24

.1

.1

.254

Internet

VLAN127192.168.127.0/24

.2

.2Proxy 192.168.200.102

Proxy 192.168.200.101

Zone192.168.1.0/24 Cat6K + Multiple Guard Module

Diversion-FromRouter

Injection-ToRouter

.1

.2

Cat#sh ip ro | i 192.168.1192.168.1.0/24 is variably subnetted, 3 subnets, 2 masks

B 192.168.1.0/25 [20/0] via 192.168.127.253, 04:23:11O 192.168.1.0/24 [110/2] via 192.168.129.254, 1d02h, Vlan63B 192.168.1.128/25 [20/0] via 192.168.127.253, 04:23:11

Loadsharing

Cat#sh ip ro static192.168.111.0/25 is subnetted, 2 subnetsS 192.168.111.0 [1/0] via 192.168.100.1, Vlan100

[1/0] via 192.168.100.2, Vlan100S 192.168.111.128[1/0] via 192.168.100.1, Vlan100

[1/0] via 192.168.100.2, Vlan100

Redundant (Primary Fail)

Cat#sh ip ro static192.168.111.0/25 is subnetted, 2 subnetsS 192.168.111.0 [2/0] via 192.168.100.2, Vlan100S 192.168.111.128[2/0] via 192.168.100.2, Vlan100

Redundant (Primary Active)

Cat#sh ip ro static192.168.111.0/25 is subnetted, 2 subnetsS 192.168.111.0 [1/0] via 192.168.100.1, Vlan100S 192.168.111.128[1/0] via 192.168.100.1, Vlan100

Page 52: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 52

Config Sample-Confidential-실제구축사례.

Page 53: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 53

ADM/AGM Design & Configuration

Giga 3/2 Vlan 3192.168.63.5/30

Mgmt Vlan 1192.168.63.13/30

HijackingVlan 100 192.168.100.1/24

Injection Vlan 200192.168.200.1/24

Mgmt Vlan 1192.168.63.14/30

Vlan 100 192.168.100.254

Vlan 200 192.168.200.254

192.168.32.0 ~ 192.168.62.0/224

Giga 6/1 Vlan 1192.168.37.1/24

Page 54: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 54

ADM/AGM Design & ConfigurationGuard Module Configuration

diversion hijacking receive-via-ip 192.168.100.1diversion hijacking receive-via-vlan 100diversion injection 192.168.0.0 255.255.0.0 nexthop192.168.200.254

interface eth1ip address 192.168.63.14 255.255.255.0mtu 1500no shutdown

interface giga2mtu 1500no shutdown

interface giga2.100ip address 192.168.100.1 255.255.255.0mtu 1500no shutdown

exitinterface giga2.200

ip address 192.168.200.1 255.255.255.0mtu 1500no shutdown

exit

proxy 192.168.200.100

MSFC Configurationanomaly-guard module 2 port 1 allowed-vlan 1anomaly-guard module 2 port 2 allowed-vlan 100,200anomaly-guard module 2 port 1 native-vlan 1

interface GigabitEthernet3/2switch access vlan 3

interface GigabitEthernet6/1switch access vlan 1

Interface Vlan 1Ip address 192.168.37.4 255.255.255.0

Interface Vlan 3ip address 192.168.63.

interface Vlan100ip address 192.168.100.254 255.255.255.0

interface Vlan200ip address 192.168.200.254 255.255.255.0

ip policy route-map AGM

route-map AGM permit 10match ip address 199set ip next-hop 192.168.37.1

router ospf 1network 192.168.200.0 0.0.0.255 area 0

Page 55: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55

ADM/AGM Design & Configurationaccess-list 199 remark AGM-ACLaccess-list 199 permit ip any 192.168.32.0 0.0.0.255access-list 199 permit ip any 192.168.33.0 0.0.0.255access-list 199 permit ip any 192.168.33.0 0.0.0.255access-list 199 permit ip any 192.168.34.0 0.0.0.255access-list 199 permit ip any 192.168.35.0 0.0.0.255access-list 199 permit ip any 192.168.36.0 0.0.0.255access-list 199 permit ip any 192.168.37.0 0.0.0.255access-list 199 permit ip any 192.168.38.0 0.0.0.255access-list 199 permit ip any 192.168.39.0 0.0.0.255access-list 199 permit ip any 192.168.40.0 0.0.0.255access-list 199 permit ip any 192.168.41.0 0.0.0.255access-list 199 permit ip any 192.168.42.0 0.0.0.255access-list 199 permit ip any 192.168.43.0 0.0.0.255access-list 199 permit ip any 192.168.44.0 0.0.0.255access-list 199 permit ip any 192.168.45.0 0.0.0.255access-list 199 permit ip any 192.168.46.0 0.0.0.255access-list 199 permit ip any 192.168.47.0 0.0.0.255access-list 199 permit ip any 192.168.48.0 0.0.0.255access-list 199 permit ip any 192.168.49.0 0.0.0.255access-list 199 permit ip any 192.168.50.0 0.0.0.255

access-list 199 permit ip any 192.168.51.0 0.0.0.255access-list 199 permit ip any 192.168.52.0 0.0.0.255access-list 199 permit ip any 192.168.53.0 0.0.0.255access-list 199 permit ip any 192.168.54.0 0.0.0.255access-list 199 permit ip any 192.168.55.0 0.0.0.255access-list 199 permit ip any 192.168.56.0 0.0.0.255access-list 199 permit ip any 192.168.57.0 0.0.0.255access-list 199 permit ip any 192.168.58.0 0.0.0.255access-list 199 permit ip any 192.168.59.0 0.0.0.255access-list 199 permit ip any 192.168.60.0 0.0.0.255access-list 199 permit ip any 192.168.61.0 0.0.0.255access-list 199 permit ip any 192.168.62.0 0.0.0.255access-list 199 permit ip any 192.168.63.0 0.0.0.255

Page 56: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 56

AGXT & ADXT LAB Topology

Attacker11.11

Attack Net11.254 / V13G3/0/8~11

Internet12.254 / V13G3/0/12~15

G3/0/110.254

F3/4810.1

G5/1,V200

G5/1,V200

G4/1

G0, 200.1

G0, 200.2

G0

F3/13

13.13 13.14 13.15

BGP AS 10

BGP AS 100

V13

Injection NetPBR Next Hop Point

Monitor Rx

F3/1

F3/2

F3/3

Mgmt NetMgmt Net

1.11cisco12345

1.12cisco12345

1.10cisco

Divert NetDivert Net

Victim NetVictim Net

Attack NetAttack Net

Lo0 4.4.4.4proxy4.10~15

Lo0 5.5.5.5proxy5.10~15

Page 57: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 57

Detector Pre-configinterface eth0

ip address 192.168.1.10 255.255.255.0!interface giga0no shutdown!service wbmservice internode-comm!permit wbm *permit ssh *permit internode-comm 192.168.1.12 permit internode-comm 192.168.1.11 !default-gateway 192.168.1.1!logging host 192.168.1.159logging host 192.168.1.150logging trap debugginglogging facility local0!remote-guard ssl 192.168.1.12remote-guard ssl 192.168.1.11

Mgmt Interface Config

Monitor (Detection) Interface

SSL & SSH Service Enable

SSL & SSH 접속 권한 설정

Mgmt Interface G.W 설정

Guard Config Sync

Page 58: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58

Guard#1 Pre-Configinterface eth0

ip address 192.168.1.11 255.255.255.0!interface giga0

ip address 192.168.200.1 255.255.255.0!interface lo:0

ip address 4.4.4.4 255.255.255.0!default-gateway 192.168.1.1!proxy 4.4.4.10proxy 4.4.4.11proxy 4.4.4.12proxy 4.4.4.13!service wbmservice internode-comm!permit wbm *permit ssh *permit internode-comm 192.168.1.10 !logging host 192.168.1.159logging host 192.168.1.150logging trap debugginglogging facility local7

Mgmt Interface Config

Divert Interface

Proxy Interface를 위한 Loopback Interface 설정

Proxy IP 설정

SSL & SSH Service Enable

SSL & SSH 접속 권한 설정

Mgmt Interface G.W 설정

Page 59: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 59

Guard#1 Pre-Configrouter bgp 100

bgp router-id 192.168.200.1bgp bestpath compare-routeridredistribute guardneighbor 192.168.200.254 remote-as 10neighbor 192.168.200.254 description GW-Router neighbor 192.168.200.254 soft-reconfiguration

inboundneighbor 192.168.200.254 distribute-list nothing-in inneighbor 192.168.200.254 route-map filt-out out!ip route 0.0.0.0/0 192.168.200.254ip route 192.168.13.0/24 192.168.200.254ip route 192.168.14.0/24 192.168.200.254!access-list nothing-in deny any!route-map filt-out permit 10set community 10:100 no-export no-advertise

Hijacking Routing을 위한 BGP 설정

Injection Routing을 위한 Routing 구성

Hijacking Routing을 위한 BGP Filter

Page 60: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 60

Guard#2 Pre-Configinterface eth0

ip address 192.168.1.12 255.255.255.0!interface giga0

ip address 192.168.200.2 255.255.255.0!interface lo:0

ip address 5.5.5.5 255.255.255.0!default-gateway 192.168.1.1!proxy 5.5.5.10proxy 5.5.5.11proxy 5.5.5.12proxy 5.5.5.13!service wbmservice internode-comm!permit wbm *permit ssh *permit internode-comm 192.168.1.10 !logging host 192.168.1.159logging host 192.168.1.150logging trap debugginglogging facility local7

Mgmt Interface Config

Divert Interface

Proxy Interface를 위한 Loopback Interface 설정

Proxy IP 설정

SSL & SSH Service Enable

SSL & SSH 접속 권한 설정

Mgmt Interface G.W 설정

Page 61: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 61

Guard#2 Pre-Configrouter bgp 100

bgp router-id 192.168.200.2bgp bestpath compare-routeridredistribute guardneighbor 192.168.200.254 remote-as 10neighbor 192.168.200.254 description GW-Router neighbor 192.168.200.254 soft-reconfiguration inboundneighbor 192.168.200.254 distribute-list nothing-in inneighbor 192.168.200.254 route-map filt-out out!ip route 0.0.0.0/0 192.168.200.254ip route 192.168.13.0/24 192.168.200.254ip route 192.168.14.0/24 192.168.200.254!access-list nothing-in deny any!route-map filt-out permit 10set community 10:100 no-export no-advertise

Hijacking Routing을 위한 BGP 설정

Injection Routing을 위한 Routing 구성

Hijacking Routing을 위한 BGP Filter

Page 62: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 62

GW-Router Configinterface GigabitEthernet3/0/1description "Server-Farm-Switch-Connected"switchport access vlan 10!interface GigabitEthernet3/0/11description "Attacker-Network"switchport access vlan 11!interface GigabitEthernet3/0/12description "Normal-Internet-Network-12"switchport mode access!interface Vlan10description "Server-Farm-Switch-Connected"ip address 192.168.10.254 255.255.255.0

!interface Vlan11description "Attacker-network"ip address 192.168.11.254 255.255.255.0

! interface Vlan12description "Normal-Internet-Network-12"ip address 192.168.12.254 255.255.255.0

!

Interface loopback 0description “Normal-Internet-Network”ip address 2.2.2.2 255.255.255.0

!ip route 192.168.1.0 255.255.255.0 192.168.10.1ip route 192.168.13.0 255.255.255.0 192.168.10.1ip route 192.168.200.0 255.255.255.0 192.168.10.1

Page 63: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 63

Cat6500 Configinterface GigabitEthernet3/13switchport access vlan 13!interface GigabitEthernet3/48switchport access vlan 10!interface Vlan1ip address 192.168.1.1 255.255.255.0

!interface Vlan10ip address 192.168.10.1 255.255.255.0

!interface Vlan13ip address 192.168.13.254 255.255.255.0

!interface Vlan200ip address 192.168.200.254 255.255.255.0ip policy route-map PBR

!ip access-list extended Victimpermit ip any 192.168.13.0 0.0.0.255!

route-map PBR permit 10match ip address Victimset interface Vlan13

L2 Forwarding을 위한 PBR 설정

Page 64: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 64

Cat6500 Configrouter bgp 10no synchronizationbgp router-id 192.168.200.254bgp cluster-id 16843009bgp log-neighbor-changesneighbor 192.168.200.1 remote-as 100neighbor 192.168.200.1 description GuardXTneighbor 192.168.200.1 timers 2 6neighbor 192.168.200.1 timers 2 6neighbor 192.168.200.1 soft-reconfiguration inboundneighbor 192.168.200.1 distribute-list RoutesToGuard outneighbor 192.168.200.1 route-map Guard-In inneighbor 192.168.200.2 remote-as 100neighbor 192.168.200.2 description GuardXTneighbor 192.168.200.2 timers 2 6neighbor 192.168.200.2 timers 2 6neighbor 192.168.200.2 soft-reconfiguration inboundneighbor 192.168.200.2 distribute-list RoutesToGuard outneighbor 192.168.200.2 route-map Guard-In inmaximum-paths 2no auto-summary

!ip route 2.2.2.0 255.255.255.0 192.168.10.254ip route 4.4.4.0 255.255.255.0 192.168.200.1ip route 5.5.5.0 255.255.255.0 192.168.200.2ip route 192.168.11.0 255.255.255.0 192.168.10.254ip route 192.168.12.0 255.255.255.0 192.168.10.254!ip access-list standard RoutesToGuarddeny any!route-map Guard-In permit 10match community 99 exact-match

!ip bgp-community new-formatip community-list 99 permit 10:100 no-export no-advertise

Guard와 Hijacking을 위한 BGP Config

Page 65: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 65

공격발생시 BGP Routing을통한 Hijacking

Cat6509#sh ip route

S 192.168.12.0/24 [1/0] via 192.168.10.254192.168.13.0/24 is variably subnetted, 2 subnets, 2 masks

C 192.168.13.0/24 is directly connected, Vlan13B 192.168.13.13/32 [20/0] via 192.168.200.2, 01:04:58

[20/0] via 192.168.200.1, 01:04:50 공격 발생시 BGP Hijacking Routing

Page 66: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 66

공격발생시 Guard에서의 Injection 변경

router# sh ip routeS>* 0.0.0.0/0 [1/0] via 192.168.200.254, giga0C>* 5.5.5.0/24 is directly connected, loC>* 5.5.5.10/32 is directly connected, loC>* 5.5.5.11/32 is directly connected, loC>* 5.5.5.12/32 is directly connected, loC>* 5.5.5.13/32 is directly connected, loC>* 5.5.5.14/32 is directly connected, loC>* 5.5.5.15/32 is directly connected, loC>* 127.0.0.0/8 is directly connected, loC>* 192.168.1.0/24 is directly connected, eth0S>* 192.168.13.0/24 [1/0] via 192.168.200.254, giga0G>* 192.168.13.13/32 is directly connected, loS>* 192.168.14.0/24 [1/0] via 192.168.200.254, giga0C>* 192.168.200.0/24 is directly connected, giga0C>* 192.168.200.100/32 is directly connected, lo

공격 발생시 Injection route

Page 67: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 67

Guard 경유시 Traffic 전송률

Page 68: Cisco DDoSSolution Design & Technical Review · ip address 192.168.100.254 255.255.255.0 no ip redirects no ip unreachables no ip proxy-arp interface Vlan200 ip address 192.168.200.254

© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 68