+ All Categories
Home > Documents > IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing...

IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing...

Date post: 30-Dec-2019
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
11
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Shishio Tsuchiya [email protected] IPv6 CPE Balanced Security draft-v6ops-vyncke-balanced-ipv6-security
Transcript
Page 1: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

Shishio Tsuchiya

[email protected]

IPv6 CPE Balanced Securitydraft-v6ops-vyncke-balanced-ipv6-security

Page 2: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

何が問題か?

• 既存のIPv4ではNAPTが提供され、それによりInboudトラフィックのセキュリティが担保されてきた。

• 一方エンドツーエンドのコミュニケーションには問題があるケースがあった。

• そこでIPv6ではエンドツーエンドのコミュニケーションが重点される様になった。

Page 3: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

今までのIPv6セキュリティ

• RFC 6092: Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

多くのベンダーでインプリ済み

•  draft-vyncke-advanced-ipv6-security-03 IPSやレピュテーションなど最新セキュリティ技術を導入

CPEでのインプリ無し

Page 4: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

Balanced Security?

Page 5: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Balanced Security?

•  SwissCommが適用したモデル

• 基本的にRFC6092のAll Openモードで動作

• ただしWell-knownな例外を除く

Page 6: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

Well-knownな例外その1 Drop inbound

トランスポート ポート番号 プロトコル

TCP 22 Secure Shell (SSH) TCP 23 Telnet TCP 80 HTTP

TCP 3389 マイクロソフト リモートデスクトップ

TCP 5900 VNC リモートデスクトップ

Page 7: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Well-knownな例外その2 inbound/outbound ドロップ

トランスポート ポート番号

プロトコル

TCP/UDP 88 Kerberos

TCP 111 SUN Remote Procedure Call

TCP 135 Microsoft EPMAP (End Point Mapper)

TCP 139 NetBIOS Session Service

TCP 445 Microsoft SMB Domain Server

TCP 513 Login

TCP 514 Shell

TCP 548 Apple Filing Protocol over TCP

TCP 631 Internet Printing Protocol

UDP 1900 Simple Service Discovery Protocol

TCP 2689 Simple Service Discovery Protocol

UDP 3702 Web Services Dynamic Discovery

UDP 5353 Multicast DNS

UDP 5355 Link-Local Multicast Name Resolution

Page 8: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

さて、日本ってどうだっけ?

IPv4 Internet IPv6 Internet

NTT NGN Dual Stack Core Network

BRAS

HGW

FTTH

NTT NGN Dual Stack Core Network

BRAS

HGW

JPNE

BBIX

Internet MF

GW-ISP

LNS

ISP-c ISP-b ISP-a

ISP-c ISP-b ISP-a

ISP-c ISP-b ISP-a

PBR LNS

IPv4 Internet

IPv6 Internet

ISP-A

LNS

ISP-A

PPP o E IPv6

Native IPv6

IPv4 IPv6 IPv4

IPv6 NAT Adapter

Adapter

ここの部分

Page 9: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

閉域網ではあるけど、パススルー(All open)

NTT NGN Dual Stack Core Network

BRAS

HGW

LNS LNS

IPv4 Internet

IPv6 Internet

ISP-A

IPv6 IPv4

IPv6パススルー

Page 10: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

このドラフトは

•  Swisscomのみ/Managed CPEのみでは無く色々な例が追加される予定です。

• カテゴリはInformationalになり、強制権はもちろん無いでしょう。

• ただし、業界スタンダードの手法と日本のやり方が分かれるのは色々不具合があるはずです。

• 日本でのパターン・実情をインプットしませんか?

Page 11: IPv6 CPE Balanced Security...Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service すべての入力トラフィック許可かすべてをDenyかいずれか

Thank you.


Recommended