13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

leverag<strong>in</strong>g IPsec’s ESP <strong>in</strong> tunnel mode <strong>in</strong> direct parallel to current U.S. DoD COMSEC<br />

and some civilian VPN practices.<br />

8. While military technologies could be used to implement the airborne network partitions,<br />

the use of civilian Internet protocols be deployed as a virtual private network.<br />

Specifically, this study recommends that the airborne community use the IETF’s L3VPN<br />

IPsec variant of RFC 4364 [99] for its VPN technology.<br />

9. Because of SWAP considerations and the network management issues associated with<br />

how to manage VPN enclaves, the VPN encapsulation be established by means of an<br />

encapsulation gateway middlebox, rather than the traditional dual PE and CE router<br />

approach (see figure 34) commonly used by reference 99 conformant implementations.<br />

10. Although the network partition capabilities and assurance of VPNs are demonstrably<br />

sound, security vulnerabilities (depend<strong>in</strong>g on how it is implemented) may potentially be<br />

<strong>in</strong>troduced by br<strong>in</strong>g<strong>in</strong>g <strong>in</strong> network management capabilities <strong>in</strong>to the encapsulat<strong>in</strong>g<br />

gateways (see section 8.4) that otherwise could not occur with<strong>in</strong> a VPN system. For this<br />

reason, this study recommends that the encapsulation gateways be deployed with the<br />

follow<strong>in</strong>g additional defense-<strong>in</strong>-depth security control protections:<br />

• Firewall (and, if <strong>in</strong> a nonair gap target environment, the packet filter as well) to be<br />

configured to discard any non-IPsec packets addressed to airborne encapsulat<strong>in</strong>g<br />

gateways.<br />

• The encapsulat<strong>in</strong>g gateway should also be configured to discard any packet sent<br />

to it that does not use IPsec’s ESP. It decapsulates and decrypts any received<br />

tunnel mode packets and forwards them to the VPN. Received transport mode<br />

packets are those communications to the encapsulat<strong>in</strong>g gateway itself. All<br />

transport mode packets must be successfully authenticated by the encapsulat<strong>in</strong>g<br />

gateway or else discarded.<br />

• QoS provisions ensur<strong>in</strong>g that the VPN is provided adequate network capacity<br />

(e.g., to avoid DoS) are also needed to ensure the viability of VPN partition<strong>in</strong>g.<br />

11. The encapsulation gateways will need to be certified as a high-assurance security item<br />

(i.e., EAL 5 or higher).<br />

12. Onboard aircraft network LAN implementations should also support physical (i.e.,<br />

hardware based) network protections to implement <strong>in</strong>tegrity enclave separation to<br />

physically isolate devices us<strong>in</strong>g a common LAN system <strong>in</strong>to networked enclaves on a<br />

need-to-communicate basis [9].<br />

13. Network communications between devices connected with<strong>in</strong> each network enclave<br />

should be supplemented with IPsec’s ESP <strong>in</strong> transport mode security protections<br />

whenever permitted by the specific communications performance requirements.<br />

142

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!