Anybody could shed light why it poses security concern without VRF?

johnifanx98johnifanx98 Member Posts: 329
Intro to VRF lite - Packet Life

When introducing VRF, it reads,
Obviously, the addition of a "back door" Internet access link opens a huge security hole, but we can employ VRFs here to segment the single physical infrastructure into two virtual, isolated networks.

Comments

  • kmcintosh78kmcintosh78 Member Posts: 195
    I believe it has to do with the idea of packets traversing the non-MPLS can be intercepted outside of the ISP established MPLS network.

    MPLS is basically a virtual network, where the ISP has created the confinement, hence VRF.
    VRF Lite will just head out into the wide open internet.

    If I am wrong, someone please correct me.
    What I am working on
    CCNP Route (Currently) 80% done
    CCNP Switch (Next Year)
    CCNP TShoot (Next Year)
  • Forsaken_GAForsaken_GA Member Posts: 4,024
    It has nothing to do with MPLS. VRF Lite is just employing VRF's without an MPLS network being involved.

    As for why it's a security hole, take a look at the diagram. To the right, you have the Corporate Internet access, which goes through a firewall.

    To the left, you have the Guest internet access, which goes directly to the core router. That's why it's a security hole, the guest internet circuit would entirely bypass all the normal security mechanisms and allow direct access to the internal network from the internet, and vice versa. That is a Bad Thing.

    With VRF's, the core router simply puts the guest internet access into it's own routing instance, and the traffic from the two networks will never meet.

    Conceptually, it's like a layer 3 vlan. At layer 2, VLAN's can't directly communicate with each other, there has to be a layer 3 device involved. Devices in differing VRF's can also not communicate with each other, without very specific configuration on the router.
Sign In or Register to comment.