Download pdf - 1308PSC40-45backh

Transcript
Page 1: 1308PSC40-45backh

7/27/2019 1308PSC40-45backh

http://slidepdf.com/reader/full/1308psc40-45backh 1/3

40 PUBLIC SAFETY COMMUNICATIONS  ◀ ∥ ▶  august 2013  ◀ ∥ ▶  www.APCOINTL.Org www.APCOINTL.Org  ◀ ∥ ▶  august 2013  ◀ ∥ ▶  PUBLIC SAFETY COMMUNICATIONS 41

Mobile BackhaulPrivacy

  A  c  c  e

  s s   C o

 n  t r o l

Dat a C o n   d  e n t  i  a l  i   t    y   

Co m m u n  i c

 a  t  i o n   S  e

  c  u  r   i   t   y

A v  a i  l  a b i l i t y 

LMRLTE IP/MPLS

IP/MPLS

LTE Evolved

Packed Core

FIGURE 1 Securing the CommunicationsFlow in Mobile Backhaul

LMRController

An IP/MPLS BackhaulNetwork Provides Resilience& Enhanced Security Against

Cyber Attacks

By DaviD Christophe

 ybersecurity threats and attacks ongovernment systems are increasing infrequency. In these and other emer-

gency situations, it’s critical to ensurethe availability of mission-critical landmobile radio (LMR) voice communica-tions with minimal interruptions betweenfirst responders and dispatch. As publicsafety, utility and transportation agen-cies extend LMR backhaul networks toeliminate coverage gaps, and while they build capacity and an extended footprintfor mobile broadband with LTE, they alsopossess an excellent opportunity to furtherenhance security. Of course, with today’stight budgets, any solutions must have aminimal impact on the overall cost.

Globally, agencies are deployingbackhaul solutions based on IP/MPLStechnology as their LMR network foot-print expands, as well as to replaceolder backhaul equipment that lackscapacity or is no longer supported. Thisallows them to efficiently support new LMR systems and powerful IP-basedapplications, such as video surveillanceon a single secure network.

Converging all of this new and existingtraffic onto a single backhaul networkincreases flexibility, simplifies networkmanagement, enhances security andreduces costs without jeopardizing reli-ability. For base stations that lack fiberor copper access, agencies are deploy-ing packet microwave radio for transport,

 with IP/MPLS riding on top. An IP/ MPLS backhaul network also providesthe required foundation for mobile broad-band with LTE.

Increased securIty

Backhaul communications originate, tran-sit and terminate in remote areas, as wellas in close proximity to citizens, homesand businesses. This potentially offerscyber criminals entry points for hackinginto an agency’s communications network.As a result, an increasing focus on security is warranted for these increasingly moresophisticated threats. Figure 1 (below)identifies several facets to securing theflow of communications in backhaul. Thecapabilities inherent in IP/MPLS proto-cols and routers secure this critical infor-mation and provide a flexible, powerfulplatform for further enhancements.

access control

Limiting physical equipment access toauthorized personnel is a key element insecuring backhaul communications. Thismay include placing equipment in locked

enclosures and securing base station siteperimeters with fencing. In remote areas,a motion-activated camera is deployed ata base station so that when physical secu-rity is compromised, the camera alerts anoperations center and provides images of 

 whatever activity is taking place at the site.Agencies can then initiate the appropriate,immediate response.

Limiting access to the IP/MPLS routerand supported services is critical, and typi-cally is handled with user IDs and pass-

 words with defined spans of control. Forexample, a field technician may use anID and password to access a base stationrouter to initiate troubleshooting, but that

person may only have the ability to view,not change, router system parameters.Strong technician/administrator systemaccess security is provided with industry-standard Simple Network ManagementProtocol (SNMP) v3 confidentiality andintegrity features and Secure Shell (SSH)encryption.

 Within the IP/MPLS network, accesscontrol lists (ACLs) and filters areused to control access to specific usersand host IP addresses. These preventspoofing, denial-of-service (DOS)

   p   h   o   t   o    K

   e   v   I   n    l

   I   n   K

Page 2: 1308PSC40-45backh

7/27/2019 1308PSC40-45backh

http://slidepdf.com/reader/full/1308psc40-45backh 2/3

42 PUBLIC SAFETY COMMUNICATIONS  ◀ ∥ ▶  august 2013  ◀ ∥ ▶  www.APCOINTL.Org

figure 3: Inherent IP/MPLS & IncrementalCapabilities to Secure Communications

a cPassword, Span of Control, Secure Shell(SSH), Access Control Lists, Firewall

d ciii Encryption

cii si VPN, MPLS

pi Network Address Translation, Encryption

aiii

Network Redundancy and Architecture,Intrusion Detection System, Intrusion

Protection System

FIGURE 2 Network Architecture & Use of MPLS Control& Failure Recovery Mechanisms for High Availability 

LMR

LMR

LMR LMRLMR

LMR LMR LMR

LMRLMR

LMR

LMR

LMR LMRLMRLMR

LMR

LMR

LTELTE

LTE

LTE

LTE

LTE

LTE

LTE LTE

LTE

LTE

LTELTE

LTE

LTE

LTE

LTE

LTELTE

LTE

LTE

LTE

LTE

LTE

MPLS FastReroute

MPLS FastReroute

MPLS FastReroute

MPLS FastReroute

LTESmallCells

City

GOMOBILESmarter Decisions for Dispatch

Intergraph® Mobile Responder puts I/CAD on your iPad (and other smartphones andtablets, too), improving safety, productivity, and communications. It’s an easy-to-use appthat reduces radio traffic and dispatcher workload. One police agency equipped more than6,000 officers with Mobile Responder, saving $300 mill ion over the next 12 years. Thatagency is making smarter decisions. You can, too.

WWW.INTERGRAPH.COM/PUBLICSAFETY/MOBILE

© 2013 Intergraph Corporation. All rights reserved. Intergraph and the Intergraph logo are registered trademarks of Intergraph

Corporation or its subsidiaries in the United States and in other countries.

attacks and other malicious acts.Network access security can be fur-

ther enhanced with the inclusion of afirewall that helps stop unexpected andunwanted traffic from entering the net-

 work through the router. This includes

a set of rules to determine which traf-fic passes or is dropped or rejected ineach direction, based on criteria suchas source and destination address orport. To tightly control access, a specificrule set is assigned to a specific port,host group or protocol. Example: Trafficentering and exiting the port associated

 with the LMR base station can only go to, and originate from, the uniqueaddress associated with the controller.Other traffic is dropped or rejected.

data confIdentIalIty

Encryption and authentication can fur-ther enhance traffic privacy and con-

fidentiality in the backhaul network,inhibiting eavesdropping and tampering

 with user voice, video and data trafficin transit. Even a cyber criminal whogained network access would not have

 visibility of the user traffic. Widely deployed Internet Protocol

Security (IPsec) can be used for Layer 3(IPv4 and IPv6) traffic in a point-to-pointencryption solution. With this protocol,each packet in a communications sessionis authenticated and encrypted. Whena session is initiated, the cryptographic

keys that will be used during the sessionare negotiated.

To inhibit the destabilization of synchronous services, 1588v2 packetauthentication is deployed. For example,this might be used when 1588v2 is pro-

 viding timing distribution for the back-haul network to minimize the chance of a cyber criminal destabilizing the syn-chronization and causing base stationsto shutdown to avoid radio frequency interference.

Encryption also can be extended toadditional types of traffic such as TDM(not just IP with IPsec), and router con-trol plane communications. The latterinhibits a cyber criminal from gatheringintelligence on the network topology and then, for example, changing routingadjacencies to disrupt or redirect back-haul traffic flows.

communIcatIon securIty

 Virtual private networks (VPNs) isolatetraffic, keeping it private and unaffectedby other data streams. For example, one

 VPN is established for LMR user datatraffic from a base station, and another for

signaling traffic. Agencies can maintaincommunications security through the useof VPNs along with MPLS label swap-ping and its associated tables on routers,

 which ensure traffic only enters/exits thenetwork at pre-identified points.

prIvacy

To help ensure that the identification anduse of devices on the network remains pri-

 vate, a network address translation (NAT)capability is added to an IP/MPLS net-

 work. This enables the device address onthe network to remain hidden to outsiders

 while permitting access by authorized

Securely extending Mobile backhaul

Page 3: 1308PSC40-45backh

7/27/2019 1308PSC40-45backh

http://slidepdf.com/reader/full/1308psc40-45backh 3/3

44 PUBLIC SAFETY COMMUNICATIONS  ◀ ∥ ▶  august 2013  ◀ ∥ ▶  www.APCOINTL.Org

Established

1946

Santa Ana, CAwww.stancilcorp.com

Bill HouserCell: (760) 519-0671

[email protected]

Melbourne, FLwww.stancil.net

Mike HannerDirect: (888) 431-7950 Option 1

[email protected]

With Stancil You Also Know Where

P25 Validated

NG9-1-1 Ready

Web Access – Tablets

Web Access – Smartphones

Quality ScoringMulti Storage Capabilities

Redaction

GeoCentric Capture & Display

VoIP

RoIP

SIPREC

Video

Text & PicturesScreen Capture

24x7 Support

System Monitoring

tancil ogging ecorder

12/8/2012 at 12:17:13

(310) 555-5555

  :

Don’t

Settle.Expect more. A lot more.Call Handling    VIPER

®

Call Handling Solutions  Power 911®

Emergency

Call Control    Power MIS®

Advanced Call Reporting and Analysis 

A9-1-1

®

Connect

TM

Purpose-Built Call Handling Appliance 

  EmergencyCall Tracking System (ECaTS)    Call Control Interface    NextGen GIS   

MapFlexTM 9-1-1 Geospatial Call Management    MapSAG®

GIS Data

Management System    Enterprise Geospatial Database Management

System (EGDMS)    Supplemental Data    TXT29-1-1®

    BewareSM Incident

Intelligence  Smart911TM

Personal Safety Profile  Operational Continuity  

THOR Shield®

Comprehensive Mobile Emergency Communications Program 

 HFConnectTM

Emergency Communications of Last Resort

Visit booth #1217 at APCO to discover all we have to offer.

users. Encryption can be deployed inbackhaul to further enhance privacy anddata confidentiality.

avaIlabIlIty

 When economically feasible, backhaulcan be architected for high resiliency through a network design that includesmultiple paths to base stations andcontrollers. High network availability 

is achieved using control and failurerecovery mechanisms such as MPLSFast Reroute, which switches traffic inless than 50 ms to an alternative pathupon detection of a failure (Figure2, page 42). Mission-critical backhaultraffic can be made resilient to a linkfailure during congested periods whenIP/MPLS is combined with packetmicrowave radio equipped with

intelligent discard, utilizing multipleradio links.

An intrusion detection system (IDS)detects and reports anomalous activitiesand behaviors recognized as attack pat-terns. It’s combined with intrusion pro-tection system (IPS) capabilities thatautomatically contain attacks, furtherensuring high availability throughoutbackhaul.

IDS detects activities that may makethe network unavailable for its intendeduse—for example, denial-of-service(DOS)/distributed denial-of-service(DDOS), transmission control proto-col reset (TCP RST) and TCP SYN(synchronize) attacks. It also detectsthe TCP/UDP port scan activities of cyber-criminals seeking an open portfor network access, and provides valu-able attacker identification.

IPS provides automatic mitigationactions in response to a detected intru-sion. This can include separately definedactions for a service, port or groups. Forexample, for the port associated witha base station, mission-critical back-

haul traffic is placed on a white list toensure that it gets through. Attackingtraffic is blacklisted and excluded. Of course, during the attack mitigationmechanisms will need to maintain thehigh throughput of the mission-criticaltraffic with low latency through thefirewall.

Goal: resIlIence

The capabilities inherent in IP/MPLSrouters are securing backhaul networkcommunications. An opportune timeto further enhance security capabilitiesis when extending a network’s reachand adding capacity in preparation

for mobile broadband with LTE. IP/ MPLS router solutions that providecapabilities such as encryption, fire-

 wall, intrusion detection/protection andNAT, along with a resilient networkarchitecture, will make backhaul moreresilient to the growing frequency andsophistication of cyber security attacks. 

||PSC||

DaviD Christophe is a marketing director at

Alcatel-Lucent. Send questions or comments to

him at [email protected].

Securely extending Mobile backhaul