HW SD-WAN 05 Security
HW SD-WAN 05 Security
Foreword
⚫ On a conventional enterprise WAN, enterprise branches connect to the headquarters, for example,
through MPLS private lines, to access the headquarters or data center for service operations or Internet
access. Security policies can be implemented at the headquarters, for example, deploying firewalls and
other security devices, to manage and control branch-to-Internet access behaviors. The relatively closed
network architecture of conventional enterprise WANs ensures security to some extent.
⚫ With the emergence of SD-WAN, the conventional closed architecture of enterprise WANs transforms
to an open architecture, which enlarges the attack surface and brings new security challenges such as
unauthorized access, data leakage, and network attacks.
⚫ This course describes how to cope with these security challenges to meet the confidentiality, integrity,
availability, and traceability requirements of SD-WAN networks and provide a secure, reliable, and
stable service running environment.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
2. System Security
3. Service Security
3 Huawei Confidential
SD-WAN Security Risks
iMaster NCE-WAN ⚫ The SD-WAN Solution is built on a public network, and
therefore its components are vulnerable to attacks and
the communication between components faces security
risks. In addition, user services carried by the SD-WAN
RR
Solution, such as site-to-site, site-to-Internet, and site-to-
SaaS application access services, are threatened by
various security risks. The SD-WAN Solution faces the
HQ/DC
following security challenges:
Branch CPE
MPLS
CPE
Identity spoofing
4 Huawei Confidential
• Data leakage: Inter-component communication data and user service data are
transmitted over a public network such as the Internet. Such data may be
intercepted or tampered with, which affects system running.
• Service security requirements: User services carried by the SD-WAN Solution have
security requirements, such as filtering specific packets, blocking intrusion
behaviors, and limiting access to URLs.
SD-WAN Security Solution
iMaster NCE-WAN ⚫ To help enterprises better cope with the security
Security
hardening challenges facing the SD-WAN Solution and take
measures accordingly, Huawei defines security of the
SD-WAN Solution from two aspects:
RR
System security: refers to the security of the SD-WAN
Solution itself. Huawei SD-WAN Solution provides system
security to ensure secure and reliable system running.
HQ/DC Service security: refers to the security of services carried by
Branch CPE
MPLS the SD-WAN Solution. Huawei SD-WAN Solution provides
CPE
security protection measures for enterprises to flexibly select
Internet Branch
based on their actual requirements to ensure secure and
CPE
reliable running of user services.
Branch
CPE
SaaS applications
5 Huawei Confidential
▫ Component security
▫ IPsec
▫ Firewall
▫ IPS
▫ URL filtering
2. System Security
◼ Inter-Component Communication Security
▫ Component Security
3. Service Security
6 Huawei Confidential
Inter-Component Communication Security
⚫ Key components of the SD-WAN Solution include iMaster NCE-WAN, route
reflectors (RRs), and customer-premises equipment (CPEs). The components use
iMaster NCE-WAN secure communication protocols to establish management, control, and data
channels with each other to ensure communication security.
⚫ Management channel
Management
channel Management channels are established between CPEs or RRs and iMaster NCE-WAN.
The control channel security mechanisms include identity authentication and secure
data transmission.
⚫ Data channel
Branch Internet/MPLS HQ/DC Data channels are established between CPEs.
Data channel CPE
CPE The data channel security mechanism ensures secure transmission of service data.
7 Huawei Confidential
Management Channel Security (1)
⚫ After a CPE is powered on and registers with iMaster NCE-
Bidirectional certificate authentication
WAN, iMaster NCE-WAN configures and delivers services to
the CPE. In this process, the CPE and iMaster NCE-WAN may iMaster
CPE
be spoofed because they reside on a public network. NCE-WAN
Pre-configured Pre-configured
⚫ Bidirectional certificate authentication is used to enable the device certificate device certificate
and CA certificate TCP and CA certificate
CPE and iMaster NCE-WAN to verify the certificates of each
other to ensure their validity. SSH (Callhome)
8 Huawei Confidential
• iMaster NCE-WAN verifies the validity and validity period of a CPE's certificates.
• A CPE verifies the validity and validity period of the certificates of iMaster NCE-
WAN.
9 Huawei Confidential
• SSH provides secure remote login and other security network services over
insecure networks.
Control Channel Security
⚫ Because CPEs and RRs reside on a public network, control channels established between them may be spoofed. After control
channels are established, data may be intercepted or tampered with during transmission in the channels.
CPE RR
Pre-configured Pre-configured
device certificate device certificate
DTLS
and CA certificate and CA certificate CPE RR
DTLS BGP over GRE over IPsec
10 Huawei Confidential
• Control channels contain DTLS connections and BGP connections that are derived
from DTLS connections. A CPE exchanges IPsec tunnel information with an RR
through a DTLS connection and then establishes a BGP connection with the RR
under the protection of the IPsec encryption mechanism.
• The RR verifies the validity and validity period of the CPE's certificates.
• The CPE verifies the validity and validity period of the RR's certificates.
Data Channel Security
⚫ Inter-site data is transmitted across public networks, and may be leaked or tampered with during transmission. In this case,
encryption is required to ensure security of data during transmission.
• Data between CPEs is carried over the overlay tunnel established CPE-1 CPE-2 CPE-3
between them. IPsec is used to ensure confidentiality and integrity
• A Security Association (SA) defines elements for secure communication between
of the data during transmission.
two peers, such as security protocols as well as encryption and authentication
algorithms.
• CPEs establish IPsec SAs based on IPsec SA information advertised by RRs through
control channels, but not through Internet Key Exchange (IKE) negotiation. This
improves the establishment flexibility and scalability of IPsec tunnels.
11 Huawei Confidential
• The IKE protocol provides the mechanisms of automatic key negotiation and
IPsec SA establishment to simplify IPsec configuration and maintenance.
Contents
2. System Security
▫ Inter-Component Communication Security
◼ Component Security
3. Service Security
12 Huawei Confidential
Component Security (1)
⚫ Security of iMaster NCE-WAN
iMaster NCE-WAN is a key component of the SD-WAN Solution, and its security directly determines the reliability and availability of the entire network.
iMaster NCE-WAN must be deployed in a firewall-protected area and provide comprehensive security functions to mitigate security risks. The security
functions include but are not limited to those in the following tables.
13 Huawei Confidential
• The Lightweight Directory Access Protocol (LDAP) is used for accessing online
directory services based on TCP/IP.
Component Security (2)
⚫ Security of CPEs and RRs
The security of the physical and network environments where CPEs and RRs reside must be ensured, so that the CPEs and RRs can
run securely, reliably, and stably. The system architecture of CPEs and RRs complies with the three-layer and three-plane security
isolation mechanism defined by ITU-T X.805, in which the management, control, and forwarding planes are isolated. This ensures
that attacks on any of the planes do not affect other planes. In addition, CPEs and RRs themselves must have multiple security
protection capabilities, including but not limited to those in the following table.
Category Measures
Physical security The service ports, serial ports, and services that are not in use are disabled to prevent attacks to devices through them.
Sensitive data, such as service data, user names, and passwords, are encrypted to prevent leakage.
Data security
Data access permissions are controlled to prevent unauthorized access to data.
Identity authentication and permission control are performed on user login behaviors. Local authentication and remote
authentication (HWTACACS) are supported.
Authentication
User names and passwords are strictly protected, password complexity check is performed, and the anti-brute force cracking
mechanism is implemented.
CPEs and RRs can defend against various network attacks, such as IP flood attacks, ICMP flood attacks, malformed packet
Attack defense
attacks, and packet fragment attacks.
A log system records all the system configuration operations and the exceptions that occur during running of the system,
Security audit
facilitating post-event auditing.
14 Huawei Confidential
2. System Security
3. Service Security
◼ Site-to-Site Access Security
15 Huawei Confidential
Site-to-Site Access Security
Service traffic between sites is transmitted over a public
network (such as the Internet), and may be leaked or
Site-to-site tampered with during transmission. In this case, IPsec is
access traffic HQ/
IPsec
Branch DC required to protect data. Site-to-site access security is also
CPE
CPE a type of data channel security.
MPLS
Internet
Branch
CPE
Branch
CPE
SaaS applications
16 Huawei Confidential
GRE over IPsec for Secure Data Transmission
⚫ Site-to-site access traffic is first encapsulated by GRE. GRE is simple. However, data is transmitted over GRE tunnels
in clear text and prone to interception.
⚫ Typically, GRE is used together with IPsec on the live network. GRE is used to establish interconnection channels
between sites, and IPsec is used to encrypt GRE tunnel packets.
GRE over IPsec data encapsulation
17 Huawei Confidential
Contents
2. System Security
3. Service Security
▫ Site-to-Site Access Security
◼ Site-to-Internet Access Security
18 Huawei Confidential
Site-to-Internet Access Security
Advanced
security VAS Direct site-to-Internet access faces various security risks. In
such access scenario, CPEs need to provide certain service
security protection capabilities, such as firewall, intrusion
HQ/DC
Branch prevention system (IPS), and URL filtering. In addition,
CPE
CPE Value-Added Service (VAS) functions can be deployed on
MPLS
SD-WAN networks to provide advanced security protection
through physical firewalls deployed in off-path mode.
Internet
Access to the
Internet
Branch
Access to SaaS
applications CPE
Branch
CPE Firewall/IPS/URL
filtering SaaS applications
19 Huawei Confidential
URL Advanced
Firewall IPS
Filtering Security VAS
Demilitarized
50 (medium security level)
zone (DMZ)
Trust zone Trust zone 85 (high security level)
Untrust zone
20 Huawei Confidential
• The names of default security zones on a firewall contain only lowercase letters
and are case-sensitive. The security zones include:
▫ Untrust zone: defines insecure networks such as the Internet.
▫ DMZ: defines the zone where intranet servers reside. Intranet servers are
frequently accessed by extranet devices but are not allowed to proactively
access the extranet. Therefore, intranet servers face security risks, and need to
be deployed in a security zone with a priority lower than the trust zone and
higher than the untrust zone.
▪ A DMZ is originally a military term, referring to a partially controlled
area between a military control area and a public area. A DMZ
configured on a firewall is logically and physically separated from
intranets and extranets.
▪ The servers such as WWW servers and FTP servers that provide network
services for external devices are deployed in a DMZ. If these servers are
deployed on an intranet, malicious users may exploit security
vulnerabilities of some services to attack the intranet. If they are
deployed on an extranet, their security cannot be ensured.
▫ Trust zone: defines the zone where intranet terminals reside.
▫ Local zone: defines a device itself, including the interfaces on the device. All
packets constructed on and proactively sent from the device are considered to
be sent from the local zone, and the packets to be responded and processed
by the device (not only detected or forwarded) are considered to be received
by the local zone. Local zone configurations cannot be modified. For example,
interfaces cannot be added to the local zone.
• Due to the particularity of the local zone, a security policy needs to be
configured to permit packet exchange between the local zone and the
security zone of a peer in scenarios where a device is required to send and
receive packets.
URL Advanced
Firewall IPS
Filtering Security VAS
Internet
Egress (built-in
firewall)
22 Huawei Confidential
URL Advanced
Firewall IPS
Filtering Security VAS
Internet
Trust zone Untrust zone
Egress (built-in
firewall)
23 Huawei Confidential
MPLS MPLS
Overlay traffic Underlay traffic
Underlay traffic
Branch HQ Branch HQ
• Internet access traffic of all branch sites is diverted to the HQ • Internet access traffic of the branch site and HQ site is directly
site and then to the Internet. The firewall function needs to be transmitted to the Internet from the local CPEs. The firewall
enabled on the CPE at the HQ site to isolate the intranet and function needs to be enabled on the CPEs at the branch site and
extranet. HQ site to isolate the intranet and extranet.
24 Huawei Confidential
URL Advanced
Firewall IPS
Filtering Security VAS
IPS Overview
⚫ The IPS is a network security mechanism.
Trojan
⚫ It is used to detect intrusion behaviors (such as buffer Viruses horses Spyware
All-round protection
Internal and external prevention
Constant update for up-to-date protection
Authorized user Authorized user Authorized user
25 Huawei Confidential
• The IPS can detect and block network intrusions in real time. After detecting
network intrusions, the IPS can automatically discard intrusion packets or block
attack sources to fundamentally prevent attacks. The IPS has the following
advantages:
▫ Real-time attack blocking: When the IPS deployed on a network in in-path
mode detects network intrusions, it can block the intrusions and attack traffic
in real time, minimizing impacts of the intrusions.
▫ In-depth protection: New attacks are hidden at the application layer of the
TCP/IP protocol. The IPS can detect the content of application-layer packets,
analyze and reassemble network data flows for protocol analysis and
detection, and determine the traffic that must be blocked based on the attack
type and policy.
▫ All-round protection: The IPS provides protection measures against a variety of
attacks such as worms, viruses, Trojan horses, botnets, spyware, adware,
Common Gateway Interface (CGI) attacks, cross-site scripting attacks, injection
attacks, directory traversal attacks, information leaks, remote file inclusion
attacks, overflow attacks, code execution, DoS attacks, and scanning attacks,
comprehensively protecting network security.
▫ Internal and external protection: The IPS can protect enterprises from both
external and internal attacks. The IPS can detect the traffic passing through
and protect servers and clients.
▫ Constant update for up-to-date protection: The IPS signature database is
constantly updated to maintain the highest security level. You can periodically
update the IPS signature database from the update center to ensure effective
intrusion prevention.
URL Advanced
Firewall IPS
Filtering Security VAS
Feature 3 C01
C01
Action: Block
26 Huawei Confidential
• By default, a CPE has multiple default IPS profiles for different application
scenarios. The default IPS profiles can be viewed, copied, and referenced by
security policies, but cannot be modified or deleted.
▫ strict: It contains all signatures and the action is block. It is applicable to all
protocols and all threat categories. This profile applies to scenarios where all
packets that match signatures need to be blocked.
▫ web_server: It contains all signatures and the default actions are used. It is
applicable to the DNS, HTTP, and FTP protocols, and all threat categories. This
profile applies to the scenarios where the CPE is deployed in front of a web
server.
▫ file_server: It contains all signatures and the default actions are used. It is
applicable to the DNS, SMB, NetBIOS, NFS, SunRPC, MSRPC, file transfer, and
Telnet protocols, and all threat categories. This profile applies to the scenarios
where the CPE is deployed in front of a file server.
▫ dns_server: It contains all signatures and the default actions are used. It is
applicable to the DNS protocol and all threat categories. This profile applies to
the scenarios where the CPE is deployed in front of a DNS server
▫ mail_server: It contains all signatures and the default actions are used. It is
applicable to the DNS, IMAP4, SMTP, and POP3 protocols, and all threat
categories. This profile applies to the scenarios where the CPE is deployed in
front of a mail server.
▫ inside_firewall: It contains all signatures and the default actions are used. It is
applicable to all protocols and all threat categories. This profile applies to the
scenarios where the CPE is deployed behind a firewall.
▫ dmz: It contains all signatures and the default actions are used. It is applicable
to all protocols except NetBIOS, NFS, SMB, Telnet, and TFTP, and all threat
categories. This profile applies to the scenarios where the CPE is deployed in
front of a DMZ.
▫ outside_firewall: It contains all signatures and the default actions are used. It
is applicable to all protocols and all threats except Scanner. This profile applies
to the scenarios where the CPE is deployed in front of a firewall.
▫ ids: It contains all signatures and the action is alert. It is applicable to all
protocols and all threat categories. This profile applies to the scenarios where
the CPE is deployed in off-path mode as an IDS device.
▫ default: It contains all signatures and the default actions are used. It is
applicable to all protocols and all threat categories. This profile applies to the
scenarios where the CPE is deployed in in-path mode as an IPS device.
URL Advanced
Firewall IPS
Filtering Security VAS
IPS Implementation
⚫ When a data flow matches a security policy that contains an IPS profile, the CPE sends the data flow to the IPS
module to match the signatures referenced by the IPS profile one by one.
⚫ If the data flow matches a signature, the action defined for the signature, such as block or alert, will be taken for
the data flow. IPS module
Signature (feature + behavior) IPS profile
Signature filter 1 Signature filter 2
Type: Predefined
Protocol: HTTP Protocol: UDP
Protocol: HTTP Action: Default
A01 Action: Default
Action: Alert
Others: condition A
A01 B01
Type: predefined
Protocol: UDP
B01
Action: Block
Others: condition B Actual action of the
signature
A01 Alert
B01 Block
HTTP traffic
Egress (built-in firewall/IPS)
28 Huawei Confidential
• When a data flow matches multiple signatures, the actual action for the data
flow is as follows:
▫ If the actions defined for all the matched signatures are alert, the action for
the data flow is alert.
▫ If the action defined for any of the matched signatures is block, the action for
the data flow is block.
• When a data flow matches multiple signature filters, the action defined for the
signature filter with the highest priority will be taken for the data flow.
URL Advanced
Firewall IPS
Filtering Security VAS
MPLS MPLS
Overlay traffic
Underlay traffic
Underlay traffic
CPE
CPE CPE IPS enabled CPE IPS enabled IPS enabled
Branch HQ Branch HQ
• Internet access traffic of all branch sites is • Internet access traffic of the branch site and HQ site
diverted to the HQ site and then to the Internet. is directly transmitted to the Internet from the local
The IPS function needs to be enabled on the CPE CPEs. The IPS function needs to be enabled on the
at the HQ site to block various intrusions from CPEs at the HQ site and branch site to block various
the Internet. intrusions from the Internet.
29 Huawei Confidential
URL Advanced
Firewall IPS
Filtering Security VAS
30 Huawei Confidential
• URL filtering regulates users' online behaviors by controlling their HTTP requests
and permitting or denying users' access to certain network resources.
URL Advanced
Firewall IPS
Filtering Security VAS
URL Matching
⚫ Each web page on the Internet has a unique identifier, that is, the URL.
⚫ The URL format is as follows:
Hostname Path
http://www.abcd.com:8080/news/education.aspx?name=tom&age=20
Protocol :Port Query
⚫ A regular expression is typically used for URL matching. The following table lists commonly used matching modes.
31 Huawei Confidential
• Each web page on the Internet has a unique identifier, that is, the URL.
• URLs fully describe the addresses of web pages or other resources on the
Internet. To put it simply, a URL is a web address.
Internet
www.game.com
Visit www.game.com. Egress (built-in firewall,
URL filtering enabled)
32 Huawei Confidential
▫ After the gateway receives an HTTP GET or POST request from a user, it
checks the validity of the request based on the configured policies.
▪ If the URL is valid, the HTTP request is permitted and the user can browse
the website.
▪ If the URL is invalid, the gateway pushes an alarm page and blocks the
HTTP connection.
Branch Branch
33 Huawei Confidential
URL Advanced
Firewall IPS
Filtering Security VAS
Firewall
HQ
Physical firewall
• A physical firewall is deployed in off-path mode and
CPE deployed in off-
path mode provides advanced security protection for centralized
Internet access traffic of sites.
34 Huawei Confidential
Contents
2. System Security
3. Service Security
▫ Site-to-Site Access Security
35 Huawei Confidential
Site-to-SaaS Application Access Security
Third-party
Internet cloud security
gateway
Branch
Access to SaaS CPE
Branch applications
CPE
SaaS applications
36 Huawei Confidential
Application Scenarios of Third-Party Cloud Security
Application scenarios
iMaster NCE-WAN
37 Huawei Confidential
Deployment Modes of Third-Party Cloud Security Gateways
Deployment modes
CPE2 GRE
Access point 2
38 Huawei Confidential
2. (True or False) The built-in firewall function enables CPEs to control the traffic between
different security zones. For example, when the priorities of zone 1 and zone 2 are 20 and
60 respectively on a firewall, the traffic from zone 1 to zone 2 is outbound traffic.
39 Huawei Confidential
1. ABC
2. False
Summary
40 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.