13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

deployed <strong>in</strong> higher software level networks (except via HAGs) for defense-<strong>in</strong>-depth reasons (see<br />

section 8.4).<br />

However, VPNs are dist<strong>in</strong>ct partitioned networks with<strong>in</strong> the larger network system. The VPNs<br />

are unaware of the existence of anyth<strong>in</strong>g outside of their VPN. Each of the VPNs shown with<strong>in</strong><br />

figure 30 is isolated, unaware of the existence of other entities outside of their own VPN. Other<br />

entities cannot communicate with them and they cannot communicate with other entities—nor<br />

can they know about each other <strong>in</strong> the general case (see section 8.4). The reason this approach<br />

leverages reference 99 is that it provides for the VPNs themselves to <strong>in</strong>ternally grow to become<br />

as arbitrarily large and complex as they need to be <strong>in</strong> a secure and scalable manner.<br />

Figure 33 shows two additional po<strong>in</strong>ts that have not yet been discussed. The first is that the<br />

devices with<strong>in</strong> the enclaves are shown <strong>in</strong> two different network configurations. In the Level A<br />

network example on the left, they are shown as us<strong>in</strong>g a common, private physical LAN among<br />

themselves (alternatively, a switch or hub could have been shown). Second, <strong>in</strong> the Level D<br />

network example, which is on the right side of the figure, they are shown connected via<br />

multihomed <strong>in</strong>terfaces of the encapsulat<strong>in</strong>g gateway. The right-hand approach requires the<br />

encapsulat<strong>in</strong>g gateway to perform relay<strong>in</strong>g functions with<strong>in</strong> the LAN itself. The left-hand<br />

approach offloads that responsibility from the gateway and also enables support for devices with<br />

real-time or latency-sensitive requirements (e.g., see Requirement 7 <strong>in</strong> section 8.2).<br />

By perform<strong>in</strong>g both the PE and CE functions of figure 34, the encapsulat<strong>in</strong>g gateway straddles<br />

two different worlds. Its IP <strong>in</strong>terface to the enclave is addressed <strong>in</strong> accordance with the IP<br />

address<strong>in</strong>g policy of that enclave (see figure 33). Its IP <strong>in</strong>terface to the high-assurance LAN is<br />

addressed <strong>in</strong> accordance with the IP address<strong>in</strong>g policy of that airplane. If the VPN enclave and<br />

the airplane are addressed from the same IP address space, then that fact is not known to either<br />

the enclave or the airplane. Specifically, the IP address space of each VPN enclave is orthogonal<br />

to the other enclaves and to the airplane. No collision occurs if entities with<strong>in</strong> two different<br />

enclaves (or an enclave and the non-VPN parts of an airplane) have identical IP addresses. The<br />

only requirement is that the nonenclave entities with<strong>in</strong> the airplane need to be addressed from the<br />

same IP address space as is used by the NAS and that each entity with<strong>in</strong> a VPN enclave be<br />

addressed <strong>in</strong> a manner that is consistent for that specific enclave.<br />

Figure 30 shows that pilot and crew networks are not part of VPN encapsulated enclaves. If the<br />

pilot or crew members need to communicate with entities with<strong>in</strong> an enclave, the device accessed<br />

by the pilot or crew for that communication should be solely attached to that enclave. 33<br />

Alternatively, a HAG could be <strong>in</strong>serted directly between the enclave (or device) that the pilot or<br />

crew needs to communicate with, and the pilot’s (or crew’s) computer. 34<br />

The mechanism by which VPN partition<strong>in</strong>g physically is accomplished differs <strong>in</strong> terms of the<br />

specific protocol layer at which the partition<strong>in</strong>g controls occur. The approach recommended by<br />

this study does the partition<strong>in</strong>g at the network layer (layer 3). The recommended partition<strong>in</strong>g<br />

33<br />

34<br />

Requirement 1 (see section 8.2) requires that enclave-attached entities must never be dual-homed between the<br />

enclave and anyth<strong>in</strong>g else except via the agency of a HAG (see Requirement 8).<br />

Only encapsulation gateways and HAGs are permitted to be dual-homed between VPN enclaves and the<br />

airplane’s network.<br />

112

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!