13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

entire airborne network environment. Network management devices will not be able to<br />

physically view, or even to have knowledge of the physical existence of, any device with<strong>in</strong> a<br />

VPN unless the management station itself is with<strong>in</strong> that same VPN. Therefore, the encapsulation<br />

gateways may optionally support provisions to provide visibility of VPN-resident systems that<br />

they support to network managers located outside of their VPN (e.g., on the common aircraft<br />

LAN) so that a s<strong>in</strong>gle aircraft network manager can potentially manage all of the devices with<strong>in</strong><br />

that aircraft. (Note: because highly assured devices cannot be misconfigured, similarly highly<br />

assured devices may not need to be managed either. If this is the case, then the encapsulat<strong>in</strong>g<br />

gateways primarily serve to forward status and logg<strong>in</strong>g <strong>in</strong>formation to the network management<br />

system, <strong>in</strong>clud<strong>in</strong>g reports of the ongo<strong>in</strong>g software <strong>in</strong>tegrity checks.) If this provision is<br />

supported, then strong authentication and authorization protections need to be <strong>in</strong> place to ensure<br />

that only that management station can manage those devices. Specifically, the system needs to<br />

be designed to prohibit spoof<strong>in</strong>g, or man-<strong>in</strong>-the-middle vulnerabilities, between the network<br />

manager and the encapsulation gateways by requir<strong>in</strong>g authenticated communications hav<strong>in</strong>g<br />

strong <strong>in</strong>tegrity protections (i.e., required use of the IPsec’s ESP <strong>in</strong> transport mode between the<br />

manager and encapsulat<strong>in</strong>g gateway).<br />

8.3.4 Packet Filter.<br />

The packet filter <strong>in</strong> the aircraft control must be configured such that noncockpit crew network<br />

cannot address any encapsulation gateway. If the aircraft is us<strong>in</strong>g the figure 1 target architecture<br />

(i.e., no air gap between the passenger and avionics systems), then the packet filter needs to<br />

additionally provide the follow<strong>in</strong>g services:<br />

• No device with<strong>in</strong> the passenger network can access the noncockpit crew network or the<br />

cockpit pilot network. (Note: If the network is configured so that devices <strong>in</strong> the cockpit<br />

or noncockpit crew network can access entities with<strong>in</strong> the passenger network (e.g., for<br />

network debugg<strong>in</strong>g and management), then the filter def<strong>in</strong>itions would probably need to<br />

comb<strong>in</strong>e transport layer connections orig<strong>in</strong>at<strong>in</strong>g from the passenger network with IP<br />

addresses <strong>in</strong> the cockpit and noncockpit networks rather than solely <strong>in</strong> terms of IP<br />

address filter<strong>in</strong>g alone. If airl<strong>in</strong>es restrict network management oversight to solely use<br />

TCP transports (which is what the IETF’s ISMS update to SNMPv3 will probably<br />

require), then the restriction could possibly be def<strong>in</strong>ed at the packet filter <strong>in</strong> terms of the<br />

direction of the TCP synchronous (SYN) and require that all user datagram protocol and<br />

other transports be blocked to those addresses.)<br />

• No device with<strong>in</strong> the passenger network can send packets to any encapsulation gateways<br />

(located with<strong>in</strong> aircraft control).<br />

• The packet filter, or a device closely associated with the packet filter compris<strong>in</strong>g a<br />

common system (e.g., QoS middlebox), rate-limits communications from the passenger<br />

network to ensure that passenger communications cannot exceed a certa<strong>in</strong> threshold rate.<br />

This provision attempts to ensure that passengers alone cannot cause a denial of service<br />

attack on the aircraft control’s high-assurance LAN by consum<strong>in</strong>g a disproportionate<br />

share of its capacity.<br />

116

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!