13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

mechanism relies upon the controlled <strong>in</strong>sertion (encapsulation) of a redundant IP packet header<br />

specific for the service provider with<strong>in</strong> the protocol stack of the customer network packets (see<br />

figure 21) while they are conveyed across the service provider’s network. The <strong>in</strong>sertion of the<br />

redundant (encapsulated) IP header is accomplished by means of a specific encapsulation<br />

mechanism for that VPN connection (see figure 34). The encapsulated packets are then<br />

conveyed across the service provider’s network by means of the encapsulated IP header (i.e., the<br />

service provider’s IP header that was <strong>in</strong>serted <strong>in</strong>to the protocol stack). Each of the customer<br />

packets conveyed by the VPN has their own IP header for their own customer network, which is<br />

not visible to either the service provider or other VPNs supported by that service provider<br />

because they only see the service provider-<strong>in</strong>serted IP header. Additional assurance is provided<br />

by the fact that the address<strong>in</strong>g with<strong>in</strong> the VPN is a function of the specific network (i.e., IP<br />

address<strong>in</strong>g of the redundant IP header is from the address spaced used by the service provider’s<br />

network; IP address<strong>in</strong>g of the customer’s orig<strong>in</strong>al IP header is from the address space used by the<br />

customer’s network), which may or may not be from the same IP address space. The approach<br />

recommended by this study also has a third assurance mechanism: the customer’s entire orig<strong>in</strong>al<br />

IP protocol stack is encrypted when the encapsulation takes place so that all customer<br />

<strong>in</strong>formation is <strong>in</strong> cipher text form while travers<strong>in</strong>g the service provider’s network. These<br />

provisions ensure separation between the various VPNs themselves as well as from the<br />

convey<strong>in</strong>g service provider network<br />

Because the network management approach suggested <strong>in</strong> section 8.4 could possibly (depend<strong>in</strong>g<br />

on how it is implemented) <strong>in</strong>troduce security vulnerabilities that otherwise could not exist with<strong>in</strong><br />

VPN systems, VPNs should be deployed with the follow<strong>in</strong>g defense-<strong>in</strong>-depth [50] security<br />

protections:<br />

• Firewall (and, if <strong>in</strong> a nonair gap target environment, the packet filter as well) should be<br />

configured to discard any non-IPsec packets addressed to airborne encapsulat<strong>in</strong>g<br />

gateways.<br />

• The encapsulat<strong>in</strong>g gateway should also be configured to discard any packet sent to it that<br />

does not use the IPsec’s ESP. It decapsulates and decrypts any received tunnel mode<br />

packets and forwards them to the VPN. Received transport mode packets are those<br />

communications to the encapsulat<strong>in</strong>g gateway itself. All transport mode packets must be<br />

successfully authenticated by the encapsulat<strong>in</strong>g gateway or else be discarded.<br />

• QoS provisions to ensure that the VPN is provided adequate network capacity (e.g., to<br />

avoid DoS) are also needed to ensure the viability of VPN partition<strong>in</strong>g.<br />

An <strong>in</strong>tegral part of this study’s recommendation is that VPN enclaves should be created to<br />

protect safety-relevant airborne assets from network risks and to enable controlled, safe, and<br />

secure communications between air-to-air and air-to-ground entities. This means that ground<br />

entities that communicate with safety-relevant airborne systems also need to be arranged <strong>in</strong>to<br />

appropriate VPN enclaves to communicate with those airborne enclaves. This further means that<br />

their networks are def<strong>in</strong>ed accord<strong>in</strong>g to the same requirements (see section 8.2) as airborne<br />

systems so that their communications could mitigate the risks identified <strong>in</strong> section 4 and<br />

113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!