PIM neighbor filtering
ACL rules can be configured on interfaces to filter received Hello packets. Neighbor relationships can be established only after the Hello packets pass the filtering.
If a large number of malicious Hello packets exist, configure rules on interfaces so that the interfaces allow only specified Hello packets to pass through and discard malicious Hello packets.
PIM Join message filtering
ACL rules can be configured on interfaces to filter received Join messages. This can prevent attacks initiated using malicious Join messages.
If a large number of malicious Join messages exist, configure rules on interfaces so that the interfaces allow only specified Join messages to pass through and discard malicious Join messages.
IPv4/IPv6 PIM IPsec authentication
IPsec authentication can be configured on interfaces to authenticate IPv4/IPv6 PIM messages. With IPv4/IPv6 PIM IPsec configured, the IPv4/IPv6 PIM messages that are not protected by IPsec or fail to be authenticated are discarded.
MSDP whitelist
MSDP is implemented based on the whitelist. MSDP establishes a stable link with the peer to construct the peer remote address, local interface address, remote port number, local port number, and IP protocol number (TCP). The call component interface instructs the underlayer to transmit the messages meeting these conditions first (the priority policy depends on the implementation at the underlayer). After the MSDP neighbor relationship is torn down, the call component interface instructs the underlayer to delete the policy of preferentially transmitting the messages meeting the conditions.
The malicious messages that do not match the whitelist are discarded. This effectively prevents attacks that are conducted through malicious messages.
MSDP MD5 authentication
MD5 authentication can be configured on MSDP peers to provide security protection. Make sure you enable MD5 authentication and the same authentication password for both MSDP peers. After this function is enabled, the transmit peer sends an MD5-encrypted MSDP message, which is transferred to the receive peer over a TCP connection. The receive peer decrypts the MSDP message by following the uniform MD5 encryption rules and the key contained the message. After decrypting the message successfully, the receive peer reports the message to the MSDP module for processing. Only the MSDP messages passing MD5 authentication are processed. This effectively prevents attacks that are conducted using malicious messages.
MD5 authentication is insecure. Keychain authentication is recommended.
MSDP keychain authentication
Multicast MSDP supports keychains. Keychains and new TCP extension options can be used to configure a group of passwords for each TCP connection. Each password can be configured with different encryption algorithms and validity periods. Passwords can be changed at any time, which greatly improves the security of encrypted messages. Only the messages that are authenticated using a keychain are processed. This effectively prevents attacks conducted using malicious messages.
Configuring TCP-AO authentication can enhance the security of the TCP connections between MSDP peers. Compared with MD5 authentication, MSDP TCP-AO authentication applies to networks that require high security.
Source address-based IGMP/MLD message filtering
ACL rules can be configured on interfaces to filter received IGMP/MLD messages. This can prevent attacks initiated using malicious IGMP/MLD messages.
If a large number of malicious IGMP/MLD messages exist, configure rules on interfaces so that the interfaces allow only the IGMP/MLD messages with specified source IP addresses to pass through and discard malicious IGMP/MLD messages.
IGMP/MLD IPsec authentication
IPsec authentication can be configured on interfaces to authenticate IGMP//MLD messages. With IGMP/MLD IPsec configured, the IGMP/MLD messages that are not protected by IPsec or fail to be authenticated are discarded.
Attacks can be initiated through malicious IGMP/MLD messages. To configure a device to discard such malicious messages, you can configure source address-based IGMP/MLD message filtering. The possible attack methods are as follows:
If the ipsec sa and hello ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the pim ipsec sa and pim hello ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the ipsec sa and hello ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the pim ipv6 ipsec sa and pim ipv6 hello ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
MSDP establishes a stable link with the peer.
If the ipsec sa and query ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the igmp ipsec sa and igmp query ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the ipsec sa and query ipsec sa commands are both configured, the command configured later overrides the command configured earlier.
If the mld ipsec sa and mld query ipsec sa commands are both configured, the command configured later overrides the command configured earlier.