Nokia Network Group Encryption Application Note EN
Nokia Network Group Encryption Application Note EN
Application note
1 Application note
Network group encryption
Abstract
Security is a key consideration for any mission-critical communications network. The widespread adoption
of IP/MPLS—from carrier to enterprise to mission-critical environments—for creating a converged network
using a common networking paradigm, requires a comprehensive and universal security framework that
does not impede the network’s objectives and functions, or the ability to securely deliver critical services.
Today’s encryption solutions have a selective security focus on specific environments and require tradeoffs
between functionality and operational simplicity when extended beyond their original design. Nokia network
group encryption (NGE) is a security solution that provides a ubiquitous, efficient and scalable encryption
framework. By ensuring seamless, end-to-end security and confidentiality for all IP/MPLS traffic types
and topologies, Nokia NGE meets the demands of modern and evolving wireline, wireless and converged
mission-critical networks.
2 Application note
Network group encryption
Contents
Abstract 2
1 Encryption challenges for network operators 4
2 Nokia’s approach 4
2.1 Traffic types that need to be secured in IP/MPLS networks 4
2.2 Shortcomings of traditional encryption methods 5
2.3 NGE design goals for mission-critical IP/MPLS networks 8
3 NGE solution functional overview 10
3.1 NGE components 10
3.2 NGE MPLS services packet formats 13
3.3 NGE encryption algorithms 14
3.4 NGE domain packet formats 15
3.5 Example of the NGE solution in practice 16
4 NGE in-depth view 17
4.1 Encryption key management 17
4.2 IP/MPLS services encryption 19
4.3 NGE domains 23
5 NGE benefits 26
5.1 Simplicity 26
5.2 Flexibility 27
5.3 Robustness 27
5.4 Performance 27
6 Conclusion 28
7 Acronyms 29
8 References 30
3 Application note
Network group encryption
1 Encryption challenges for network operators
Network operators worldwide recognize IP/MPLS as a key technology that extends its versatility to mission-
critical applications by allowing various types of networks and services to be consolidated onto a single
unified packet transport model. Often, when encryption is applied to mission-critical networks, compromises
need to be made that break the homogeneity and uniformity of the network and diminish the benefits
of convergence.
Existing solutions are often intrusive to the design or may require tradeoffs that create additional operational
challenges. In some cases, the encryption solution requires new types of encapsulation and use of new
topologies—that deviate from the original IP/MPLS network design. In other situations, current solutions
cannot encrypt all types of traffic in a seamless manner or breaks the end-to-end integrity of encryption by
introducing hop-by-hop encryp/decrypt requirements. Sometimes, the IP/MPLS control plane itself is not
encrypted, and is left exposed to unauthorized inspection and even direct manipulation by third parties.
This paper discusses a new technique for encrypting and authenticating mission-critical IP/MPLS traffic.
Nokia network group encryption (NGE) is a versatile, scalable, seamless and homogeneous group-based
framework for ensuring and maintaining security, privacy and confidentiality—through encryption and
authentication—for any type of traffic transported over an IP/MPLS network.
Nokia NGE is designed to leverage all the benefits associated with an IP/MPLS architecture without being
intrusive or requiring compromises to security or network design, therefore increasing operational simplicity.
For all of these reasons, NGE is an important component of the Nokia security feature set [6] for securing
mission-critical networks.
2 Nokia’s approach
This section provides the background to the Nokia NGE solution and outlines Nokia’s motivation for offering
a new encryption framework and architecture.
TDM, VPWS
4 Application note
Network group encryption
Dedicated, point-to-point traffic is used to carry specific circuits or connections over designated tunnels,
pipes or leased lines. This might include IP flows or non-IP based traffic such as teleprotection and SCADA
circuits in power grids, dedicated circuits for transportation in train and track control, or other point-to-
point mission-critical circuits. Dedicated, point-to-point traffic typically uses virtual leased line (VLL) or
pseudowire-based MPLS services.
There is also traffic that is multi-point to multi-point or any-to-any in nature. Any-to-any critical traffic
has many use cases: in smart grid automation, traffic surveillance, train monitoring and control systems,
and in process message buses used in modern industrial control applications. This traffic typically leverages
the capabilities of Layer 3 IP VPNs or Layer 2 virtual private LAN service (VPLS) technology that include
multi-point to multi-point features. Encrypting this type of traffic typically requires a group-based approach
to scale the network.
The third traffic type is IP/MPLS control plane traffic, the operational foundation of IP/MPLS networks and
services. The control plane is used to establish and manage services, and it carries sensitive information
such as topology, IP addressing and protocol details. Control plane traffic is often overlooked when securing
mission-critical networks. However, the control plane is arguably one of the most important parts of a
network to be secured.
Traditional encryption models cannot provide a complete encryption solution for all these traffic types
concurrently without making compromises, introducing difficulties, or adding extra operational expense
to the solution.
IP/Layer 3
network
5 Application note
Network group encryption
To adapt IPsec for any-to-any communication, an operator must establish a mesh of point-to-point tunnels
between participating nodes. Scaling issues and the operational complexity of this solution are well known
and have inhibited this approach from being adopted at a large scale to solve any-to-any communication
using a point-to-point encryption approach.
The Group Domain of Interpretation (GDOI) specifications [7], which leverage IPsec technology, have made
it more feasible to transport any-to-any Layer 3 traffic. However, the fundamental point-to-point nature
of the IPsec control plane still remains, and similar to IPsec, it does not adapt well for Layer 2 and other
non-IP-based traffic.
Both IPsec and GDOI use the Internet Key Exchange (IKEv2) protocol [8] to distribute shared encryption
keys between two end routers. When this control plane is operational, data is encrypted and traffic can flow.
However, if the IKE control plane fails, encryption is halted. Moreover, the mission-critical traffic becomes
severely impacted because the transport tunnels from IPsec or GDOI are no longer available.
Running a separate control plane beyond the existing IP/MPLS routing and signaling control plane adds
additional complexity to network topologies and requires special considerations to guard against failures.
In addition, when so many tunnels exist in a network where each tunnel requires an IKE session, growing
these networks for any-to-any services becomes burdensome, raising concerns regarding IKE’s ability to
efficiently manage large numbers of tunnels.
As an example of IKE control plane issues for GDOI, IKE runs on a key server, typically another router in the
network. The IKE control plane sessions need to be managed between a key server and group members
(other routers in the network). Scaling up the IKE control plane to support large numbers of group members
remains the biggest challenge because of the overhead added to router resources to support these IKE
sessions. This overhead can quickly impose restrictions on a router’s ability to efficiently manage and
perform the required large-scale processing.
Also, requiring an IKE control plane for encryption that is separate from the control plane used to operate
the underlying IP/MPLS network can lead to added risks of topology inconsistency. This could cause issues
with routing reachability of key servers that are necessary to maintain IKE sessions, keep tunnels up, keep
GDOI key synchronization intact, and maintain traffic flows. Finally, GDOI does not protect the IP/MPLS
control plane as part of its security framework.
NGE does not use a separate control plane function to distribute and manage keys between peering nodes
that need to send encrypted traffic. Therefore, there is no risk of a control plane malfunction that can stop
mission-critical traffic from being encrypted or can drop the traffic altogether.
NGE is also designed without a bias for Layer 3 traffic or point-to-point tunneled traffic. Because its keys are
group-based, NGE easily handles any-to-any communication of any type of traffic, including Layer 2 VPLS
multipoint-to-multipoint services and machine-type communication (MTC) applications leveraging any-peer
to any-peer communication. Finally, NGE is designed to protect the IP/MPLS control plane and management
traffic as well as user traffic, ensuring that the control protocols user traffic relies on are not compromised.
6 Application note
Network group encryption
The first concern relates to using routing and forwarding information—IP/MPLS encapsulation in Layer
2 packets. To determine where packets need to be sent, MACsec needs to decrypt traffic, extract the
forwarding information in IP/MPLS, and then re-encrypt the traffic.
For IP/MPLS networks this requirement may be imposed at each hop in the network because Layer 2.5
MPLS and Layer 3 IP header information must be accessed to determine next-hop paths and tunnels.
This can present a potential security risk at each point where the packet is decrypted because port or
service mirroring techniques could be used to duplicate clear text packets towards rogue and untrusted
parties.
Multi-hop encryption and decryption also adds latency and introduces additional hardware and power
costs because MACsec-capable hardware is required at each point in the network where MACsec decryption
and re-encryption is occurring.
Figure 3 shows the main challenges to offering end-to-end IP/MPLS traffic protection using MACsec.
Traffic mirror of
Packets in the clear packets in clear text
and risk of being snooped
E2E encryption between security perimeters is interrupted as intermediate nodes perform decryption/encryption
The second concern is that it is not straightforward to carry MACsec traffic over wireless or wireline Layer
3 service provider networks. Because MACsec functions at Layer 2, operators that rely on Layer 3 carrier
VPN services to interconnect sites (e.g., IP services over LTE networks) are left with a disjoint solution for
two possible reasons: either another encapsulation layer is needed to put MACsec into Layer 3 packets
or another Layer 3 security technology is needed to encrypt and protect these Layer 3 domains. To have
a comprehensive security framework across the whole network, operators may need to “stitch” security
across their Layer 2 and Layer 3 environments. This is cumbersome, complicated and adds unnecessary
operational overhead when designing and planning networks.
NGE is designed to work over any type of Layer 2 and Layer 3 service provider network, including cellular
networks that need to support growing and evolving MTC (M2M and Internet of Things [IoT]) devices and
applications. NGE provides a consistent security framework for wireline, wireless and converged networks
that uses a single, contiguous technology to provide a comprehensive and uniform end-to-end solution.
7 Application note
Network group encryption
2.3 NGE design goals for mission-critical IP/MPLS networks
As larger numbers of smart applications are being deployed for critical infrastructures, it is necessary for
mission-critical networks to leverage the benefits of IP/MPLS technology to its fullest. In doing so, security
cannot create compromises or add additional burden that will reduce the usefulness and original intent of
the network. NGE’s flexibility to support different traffic types and any-to-any topologies while enabling
security makes it an ideal choice to connect a wide variety of devices and equipment.
We have already seen that with traditional Layer 3 or Layer 2 approaches to encryption and authentication,
there are limitations on the types of traffic that can be secured.
The benefits of MPLS’ ability to carry different traffic types at either Layer 2 or Layer 3 have been proven
through successful deployments worldwide. In some cases, it is the non-IP traffic carried over MPLS that is
considered mission-critical. In others, modern mission-critical protocols leverage both Layer 2 and Layer 3
concurrently.
Nokia’s approach to security is to capitalize on MPLS’ ability to support the variety of traffic types by
designing and optimizing a security framework that overlays encryption for MPLS payloads and results in
encrypted traffic carried over an IP/MPLS network without altering the original traffic or creating additional
encapsulations and overhead.
Nokia NGE performs encryption and authentication functions directly on the original traffic, and then
packetizes it in the same MPLS frame that otherwise would have been used for unencrypted transport.
With this approach, all original MPLS labels and functions are kept untouched so that MPLS services (e.g.,
VLL, VPLS and VPRN) are treated the same way as before the security function was added. Also, because
NGE uses a group-based encryption approach, it provides any-to-any communication for encrypted and
authenticated Layer 2 and Layer 3 traffic, including multicast traffic related to VPRNs, Internet enhanced
services (IESs) and VPLS.
In a similar way, NGE can be applied directly to the IP/MPLS control plane without altering the network
architectures that rely on that control plane. With NGE, key protocols such as OSPF, BGP, IS-IS, RSVP-TE,
LDP and BFD can also be protected end to end.
As already mentioned, traditional encryption solutions face scaling, complexity, setup and control plane
management issues. These sometimes result in less secure frameworks and have constraints to fully
addressing all traffic types that need to be secured.
To address these shortcomings, Nokia has designed and developed NGE to:
• Overlay a flexible and efficient security framework on top of IP/MPLS to minimize the configuration and
operational complexities associated with adding encryption to services. This is accomplished by leveraging
existing network designs (e.g., for MPLS high availability, QoS, scalability and flexibility) and architectures.
With this approach, encryption does not dictate the network design; instead, it is applied to the design.
• Maximize the types of traffic that can be secured with a comprehensive encryption solution, including
legacy, Layer 2, Layer 3 and IP/MPLS control plane and network management traffic
• Maximize end-to-end integrity of traffic without breaking the security construct (which other techniques,
such as multi-hop or tunnel-by-tunnel encryption/decryption, may do)
• Maximize the service uptime in mission-critical networks with non-stop encrypted services where traffic
flows are ensured at all times—even during failures and recovery—by using restoration techniques that
minimize the traffic and encryption impact of link outages or nodal (router) failures
8 Application note
Network group encryption
• Minimize the additional/incremental control plane overhead traffic needed to operate functions
enabling security, privacy and confidentiality while optimizing network resources for wireline, wireless
and converged networks
• Minimize additional latency and eliminate potential performance bottlenecks that may be incurred
with control plane-heavy encryption solutions while maximizing encrypted traffic throughput.
Table 1 provides a quick comparison of NGE and traditional Layer 3/ Layer 2 encryption approaches
and techniques.
9 Application note
Network group encryption
3 NGE solution functional overview
This section discusses:
• NGE components: Building blocks that comprise the Nokia NGE solution
• NGE MPLS services packet formats and encryption algorithms
• An example that illustrates how the Nokia NGE solution is used in practice.
10 Application note
Network group encryption
NGE uses symmetric pre-shared keys to perform encryption and authentication. These are stored in key
groups and managed by the NSP. The NSP ensures that all nodes participating in an encrypted service or
allocated to an NGE domain have the key groups configured and synchronized. Only those key groups that
are relevant to particular nodes are provided access to (downloaded with) the key groups and sensitive
keying information.
Operational actions performed by the NSP include:
• Deploying keys to new nodes where/when new encrypted services are required
• Performing re-keying of the network at regular intervals
• Deleting keys from nodes that no longer need those keys.
Control
key group
Transmission
key group
Key group partitions provide
SAR-8 SAR-8 another layer of security,
ensuring only encrypted
DA/FAN Distribution services and control plane
key group key group associated with relevant nodes
are accessible by those nodes.
SAR-Hm SAR-Hm
0123 SAR-H
DA/FAN
SAR-Hm key group SAR-H
SAR-Hc
DA/FAN nodes do not contain 0123
SAR-H
keys to more critical components
of the network.
SAR-Hc
SAR-Hc
11 Application note
Network group encryption
In the Figure 5 scenario, distribution automation (DA) and field area networks (FANs) are less critical
than transmission or distribution substation network equipment. Due to the differences in criticality of
infrastructure, it would be ideal to ensure that nodes at risk do not contain more critical information than
is necessary. Encryption keys for sensitive portions of the network should not be available where nodes
are at risk.
NGE enables operators to partition encryption keys between different security domains in a network. For
example, if an attacker attempts to gain access to the network from a DA or FAN location that may be prone
to attack because added physical security measures may be impractical or cost-prohibitive, the attacker will
not be able to gain sensitive key information for other parts of the network. Thanks to key group domains
and partitioning, the security perimeter is greatly reduced, and an attacker will have a very limited scope
for any potential attacks.
12 Application note
Network group encryption
Figure 6. NGE domain
NGE
interface
NGE node
Key group’s symmetric group key
13 Application note
Network group encryption
Figure 7. NGE services encryption packet format examples
PE-7705/VSR ABR/ASBR ABR/ASBR PE-7705/VSR
Other labels,
e.g., BGP label All labels remain as is. No change in behavior of LSR, S-PE,
routes ABR, ASBR for either VLL or VPRN services. Operations on
service label are identical with or without NGE enabled.
ESP* header Encrypted
Service label VPRN service
MPLS packet
Encrypt label BGP route VPN Encrypt Sequence no. Payload Authentication
Tunnel/GRE SPI
label label label (unused) data
14 Application note
Network group encryption
3.4 NGE domain packet formats
When creating NGE domains where NGE is then applied to Layer 3 user and control plane packets, NGE
reuses a standard IPsec transport mode packet format (see Figure 8).
NGE can also be enabled to protect the Layer 2 protocols IS-IS and LLDP. These protocols carry sensitive
information about a network’s topology, and NGE ensures they are not visible for inspection by attackers
who might attempt to packet sniff the network. NGE again reuses the ESP protocol defined in RFC 4303 to
encrypt the contents of the IS-IS and LLDP packets.
The packet format is shown in Figure 9.
DEST SRC VLANs… Etype: MACsec ESP LLC IS-IS payload Authentication data
Authenticated
Encrypted
Authenticated
15 Application note
Network group encryption
3.5 Example of the NGE solution in practice
A common use case of NGE is to protect traffic over a variety of network types. From private IP/MPLS, to
Layer 2 or Layer 3 carrier VPN services, to LTE wireless networks, NGE is designed to provide comprehensive
security across each type.
Figure 10 shows an example of NGE providing protection over a wireless service provider.
Figure 10. Application of NGE MPLS services and control plane encryption
LTE
NSP
PDN interface
L3 VPRN
NGE
VPLS GRE-SDP LTE
VPWS
CTL plane
VSR-a (NGE)
7705 SAR-Hm
NGE-enabled on:
• VPRN (L3)
• GRE-SDP (L2)
• PDN interface (CTL)
In this example, NGE is applied to the various services and control plane traffic types on the 7705 SAR-Hm,
an LTE/3G-capable IP/MPLS router to extend mission-critical services over wireless, and the Nokia VSR
Appliance (VSR-A) head-end node. NGE is enabled on the three main traffic types to provide end-to-end
security across the wireless provider’s network.
As shown, NGE is enabled using a green key group on a GRE-SDP to protect VLL and VPLS Layer-2 based
services that transit the network using that SDP. The GRE-SDP or multiple SDPs could be destined towards:
• Other 7705 SAR-Hm nodes reachable over wireless to provide M2M and IoT connectivity
• The VSR head-end node, to terminate services on it
• Other 7705 SAR, 7750 Service Router (SR) and VSR nodes past the VSR head-end node.
In Figure 10, NGE is also enabled on the VPRN by configuring a pink key group for the VPRN. All nodes
participating in the pink VPRN can send any-to-any traffic between themselves without the need to
configure a mesh of tunnels between them. Traffic can again travel between wireless nodes for IoT
applications or back to the head-end node that also participates in the VPRN.
Finally, in the Figure 10 example, NGE is enabled on the wireless interface (packet data network [PDN]
interface or router interface) by configuring a blue key group on the wireless interface. This creates an NGE
domain over wireless for all 7705 SAR-Hm nodes that need to establish a control plane between themselves
or to the head-end node and exchange routes or provide IP/MPLS signaling and control. All control plane
traffic, such as BGP, BFD, T-LDP, etc., is NGE encrypted when exiting the wireless interface and must be NGE
encrypted when received on the same interface.
16 Application note
Network group encryption
Figure 11 shows the packet format and flows that might be expected in such a network.
Figure 11. Protocol stack of NGE MPLS services and control plane encryption
7705 SAR-Hm VSR-a NGE 7705 SAR
NGE – MPLS services encryption for L2/L3 services
Figure 11 shows Layer 3 GRE-MPLS-based services in the wireless domain while providing a seamless
transition to a private IP/MPLS network that uses LSP tunnels to continue carrying the NGE encrypted traffic
for a complete end-to-end security solution.
17 Application note
Network group encryption
Pre-shared keys are generated internally on the NSP using a strong random number generator with high
entropy. When downloading the encryption keys to the nodes, the NSP opens a new secure shell (SSH)
session to each node and installs the keys.
The NSP uses a default user ID or an operator-defined user ID that is specifically assigned for NGE key group
updates. Activities by either ID can be tracked through regular user accounting and logging methods for
security audit purposes, which may be a requirement driven by internal processes or external regulations
such as NERC-CIP [3] audits.
The SSH sessions protect the keys during transport using a strong AES256 encryption algorithm, and the
nodes store the NGE keys internally in a secure manner.
The NSP computes a simple CRC32 checksum for each key in use. To ensure that each node in the network
has the correct set of keys, the NSP polls the nodes for the CRC checksums. When all the nodes report the
correct checksum, the NSP knows that all the nodes are synchronized with the correct keys.
The NSP ensures that newly generated keys do not have CRC32 collisions with the previous keys used. If
a collision is detected, the NSP skips to new key values that do not collide with the previous CRC32 values.
An advantage of using SSH for NGE key download is that it provides an extra layer of security in addition
to NGE-secured transport tunnels. A new SSH session is opened on every key update. The pre-shared keys
are downloaded over an in-band communications channel; for example, through a dedicated management
VPRN service configured to use NGE. This way, the key download process can have two layers of security:
the SSH session itself and the NGE-encrypted services carrying the SSH session.
This approach presents a significant challenge to a potential attacker, who needs to be able to decode the
NGE tunnel and the SSH session at the same time. The added burden of decoding the SSH session before
the next re-keying interval in a short time makes this task impossible without access to extraordinary
compute resources.
Using in-band management in the described manner is not mandatory but is an option for additional
security during key download.
After an NGE domain is secured, the NSP can use the encryption in this security domain for key updates.
This greatly reduces the concerns associated with man-in-the-middle types of attacks.
After NGE is enabled, at no point can certificates or any other sensitive information that is normally
transmitted as clear text (for example, when handshaking of the SSH session occurs) be intercepted by a
man-in-the-middle because all certificates and other sensitive information will be hidden in encrypted NGE
packets.
Even after a network outage, NGE is designed to maintain its encrypted services and SSH is constantly
protected with an additional level of security.
18 Application note
Network group encryption
In traditional encryption solutions, when a network outage occurs, the security control plane needs to be
re-established by re-handshaking and re-configuring itself to key servers that may be overburdened during
network fluctuations. These added strains can delay the restoration of mission-critical traffic.
Also, for traditional approaches that rely on control plane connectivity to a key server, in case of lost
connectivity to a key server, the traffic is immediately impacted and may be lost until connectivity to the key
server is re-established. This is not the case with NGE—because NGE was designed to maximize both service
availability and the efficiency of its security operation.
Because keys are securely stored on the node, at no time is there any risk that the traffic in the NGE domain
will be impacted. If a network outage occurs, the nodes can immediately start using the locally stored keys
to maintain traffic uptime in the secured domain. If connectivity to the NSP is lost, there is no impact to
the keys that are already in the network because no control plane is running between the NSP and the
nodes. NGE was designed to optimally balance the continuous requirement for security while maximizing
mission-critical traffic uptime. Once the connectivity to NSP is re-established, the NSP will engage in a
re-keying procedure.
19 Application note
Network group encryption
By applying key groups to SDPs and VPRNs, the list of encrypted services that is supported by NGE includes:
• VLLs: E-pipes and C-pipes
• VPRN services and IES using Layer 3 spoke-SDP termination
• VPLS using spoke and mesh SDPs
• Routed VPLS into a VPRN or IES
• MP-BGP-based VPRNs.
For services that use SDPs, tunnels can be either MPLS LSPs (RSVP-TE or LDP static LSP), BGP or GRE
tunnels.
For VPRN services that use MP-BGP, the auto-bind feature is supported using LDP, GRE, RSVP-TE or MPLS
(LDP or RSVP-TE).
As mentioned in Section 3.2, “NGE MPLS services packet formats”, NGE adds a global encryption label to
the label stack for encrypting MPLS services and is used to identify NGE packets that are encrypted. The
global encryption label is added to the bottom of the stack. This allows LSR, ABRs/ASBRs and other routing
elements to forward NGE packets without the need understand NGE or to even know that the content of
NGE MPLS packets is encrypted.
When a destination provider edge (PE) such as the Nokia 7705 SAR—which needs to have full visibility at the
service layer—receives NGE packets, it will check whether an encryption label was employed. If so, it will then
decrypt the packets as required.
20 Application note
Network group encryption
Figure 12. SDP encryption
NSP
NGE services encryption can be enabled on SDPs. A SAP that is
configured to use an encrypted SDP will have its traffic encrypted at
the LER. The NSP manages the services end to end and ensures nodes
participating in the service have the necessary keys to encrypt/decrypt.
SAPs
VPRN IP/MPLS network VPRN
Encrypted VPLS (transit LSRs) VPLS Encrypted
services VLL VLL services
SDP (NGE) SDP (NGE)
Unencrypted service
Traffic is encrypted
and decrypted at the
network interface on
the associated MDA.
This way, transport LSPs can carry both encrypted and unencrypted services, possibly optimizing hardware
dedicated for encryption to only traffic that requires the additional security. This capability adds a great deal
of flexibility to the types of services that can be encrypted using NGE while minimizing the maintenance
of the MPLS network because the LSPs and tunnels used for transport are not impacted or modified when
enabling or disabling NGE.
The types of services and traffic that use SDP encryption include:
• VPRNs or IESs that use spoke SDPs
• VPLS-based services that use spoke or mesh SDPs
• Ethernet pseudowires (E-pipes) and constant-bit-rate pseudowires (C-pipes) such as serial links
• E1/T1 circuits
• G.703 co-directional
• C37.94
• FXS/FXO
• E&M
• Other legacy interfaces.
21 Application note
Network group encryption
Nokia routers use a convenient method of binding Layer 3 VPRN services to LSPs or GRE tunnels based
on the reachability of other routers in the VPRN as advertised in MP-BGP. Typically, nodes participating in
a VPRN establish BGP sessions to an RR to learn routes to other nodes in the VPRN. Any node can reach
any other node using multi-point to multi-point communication.
NGE can be directly applied to the VPRN service in a single operation to enable all VPRN traffic to be
encrypted. The operator simply assigns a specific key group for that VPRN on the NSP. The key group
information needed to enable NGE is then downloaded to all nodes in the VRPN.
After all the key groups have been downloaded and verified, each node is capable of encrypting and
decrypting traffic in the VPRN by using the keys in the associated key group. The NSP then proceeds to
enable NGE on each node as required until all nodes in the VPRN have been NGE-enabled for the VPRN.
Figure 13 shows an example of VPRN encryption over a wireless network using cellular or WLAN that includes
NGE nodes connected to a Layer 2 or Layer 3 service provider or a private IP/MPLS network. There is no
need to establish PE-to-PE security tunnels or meshes of security tunnels because the NSP downloads
the group keys to the nodes participating in the VPRN after the operator enables NGE with one click on
the VPRN. The VPRN traffic is never impacted when enabling or disabling encryption on the VPRN.
VPRN B
VPRN A
VPRN B
VPRN B
L3/L2 carrier or
private IP/MPLS VPRN A
Cellular/Wi-Fi BGP RR
VPRN B
VPRN A
VPRN A
VPRN B
VPRNs can also be configured to use Layer 3 spoke SDPs. A Layer 3 spoke SDP is used to specifically assign
MPLS tunnels to VPRN services without having the system choose the tunnels automatically, as is the case
when using the auto-binding function. Using layer 3 spoke SDPs to assign MPLS tunnels to VRPRN services
is convenient for connecting other routers that are not NGE-capable or NGE-aware to the VPRN. Doing this
allows interworking and extending services in the same VPRN outside of the NGE domain.
22 Application note
Network group encryption
Using Layer 3 spoke SDP configuration in combination with auto-binding extends the flexibility of NGE.
In addition, NGE provides simple rules for how to configure a combination of encrypted and unencrypted
service in the same VPRN.
In the figure, traffic is encrypted when entering the NGE domain using the key group configured on the
router interface, and is decrypted when exiting the NGE domain. Traffic may traverse multiple hops before
exiting the NGE domain, yet decryption occurs only on the final node when the traffic exits the NGE domain.
Various traffic types are supported and encrypted when entering the NGE domain, as shown by the following
items on the NGE node in the figure.
Item 1. Self-generated packets: These packets include all types of control plane and management
packets, including OSPF, BGP, LDP, SNMPv3, SSH, ICMP, RSVP-TE and 1588.
Item 2. User Layer 3 packets: Any Layer 3 user packets that are routed into the NGE domain from an
interface outside of the NGE domain are encrypted.
Item3. IPsec packets: IPsec packets are NGE encrypted when entering the NGE domain to ensure that
the IPsec packet’s security association information does not conflict with the NGE domain.
23 Application note
Network group encryption
GRE-MPLS based service traffic consists of Layer 3 packets. Router interface NGE is not applied to these
types of packets. Instead, they use service-level NGE for encryption to avoid double-encrypting these
packets and impacting throughput and latencies. The two types of GRE-SDP packets that can enter the
NGE domain are shown by items 4 and 5 in the figure.
Item 4. GRE-SDP MPLS packets (SDP or VPRN) with service-level NGE enabled: These encrypted packets
use the key group that is configured on the service. The services key group can be different from the
key group configured on the router interface where the GRE-MPLS packet enters the NGE domain.
Item 5. GRE-MPLS packets (SDP or VPRN) with NGE disabled: These packets are not encrypted and can
traverse the NGE domain in clear text. If these packets require encryption, SDP or VPRN encryption
must be enabled.
Creating an NGE domain from the NSP requires the operator to determine the type of NGE domain being
managed. This will indicate whether NGE gateway nodes are required to manage the NGE domain.
The two types of NGE domains are:
• Private IP/MPLS network NGE domain
• Private over intermediary network NGE domain.
NGE domain
A C
D NSP
New node
24 Application note
Network group encryption
4.3.2 Private over intermediary network NGE domain
The second type of NGE domain is a private IP/MPLS network that traverses an intermediary network NGE
domain, in which the intermediary network is used to interconnect nodes in the NGE domain using a multi-
point to multi-point service (see Figure 16). The intermediary network is typically a service provider network
that provides a private IP VPN service or a private VPLS used to interconnect a private network that does not
mimic point-to-point links.
NGE domain
C
NGE domain
A gateway node
Single interface
into provider
NSP NFM-P
D
New node
Private over intermediary network NGE domains have nodes with links that connect to a service provider
network where a single link can communicate with multiple nodes over a Layer 3 service such as a VPRN
or a Layer 2 service such as VPLS.
In Figure 16, Node A has NGE enabled on its interface with the service provider and uses that single
interface to communicate with Nodes B and Node C, and eventually with Node D when it has been added
to the NGE domain. This type of NGE domain requires the recognition of NGE gateway nodes that allow
the NSP to reach new nodes that enter the domain. Node C is designated as a gateway node.
When Node D is added to the NGE domain, it must first have the NGE domain key group downloaded to it
from the NSP. The NSP creates what is known as an NGE exception access control list (ACL) on the gateway
node, C, to allow specific communication with Node D using SNMPv3 and SSH through the NGE domain.
IP exception ACLs allow for specific encryption control on router interfaces that have NGE enabled.
After the key group is downloaded, the NSP enables router interface encryption on Node D’s interface
with the service provider. Node D is now able to participate in the NGE domain. The NSP also automatically
removes the IP exception ACL from Node C when Node D enters the NGE domain.
The next section describes the concept of IP exception ACLs used in NGE domains.
25 Application note
Network group encryption
This concept is illustrated in Figure 17.
BFD BFD
OSPF OSPF
BGP BGP
BFD
T-LDP T-LDP
T-LDP
SNMPv3 SNMPv3
SNMPv3
Etc. Etc.
Etc.
User
User User
Outside Outside
NGE domain NGE domain
IP exception ACL Inside NGE IP exception ACL
• Allow inbound domain; selected • Allow inbound
- BFP packets from PE1 packets encrypted - BFP packets from PE2
end to end
- OSPF packets from PE1 - OSPF packets from PE2
• Allow outbound • Allow outbound
- BFP packets to PE1 - BFP packets to PE2
- OSPF packets to PE1 - OSPF packets to PE2
IP exception ACLs are convenient if specific traffic flows to neighbor peering routers that are not NGE
enabled need to be sent without encryption. For example, it may be necessary to peer with a service
provider router to exchange routes using OSPF and provide a BFD function, yet all other protocol
information between the private NGE nodes must be secured. In this case, OSPF and BFD to the peering
router can be NGE-disabled using an exception ACL while all other traffic is protected.
NGE provides a simple yet flexible way for operators to choose which packet flows require NGE and which
do not. The NSP assists the operator in managing the IP exception ACLs, where they are applied, and
when they are enabled or disabled.
5 NGE benefits
Nokia NGE, with its next-generation techniques for encryption and authentication of a wide variety of
MPLS-based services and associated control and management planes, provides significant benefits to
users in the areas of simplicity, flexibility, robustness and performance.
5.1 Simplicity
NGE’s service plane- and control plane-aware encryption is simple to configure and operate thanks
to the NSP’s inherent network-wide visibility of services and control plane. NGE’s ability to seamlessly
introduce a security overlay onto existing MPLS network architectures and designs allows operators to
26 Application note
Network group encryption
maintain operations and maintenance functions such as resiliency, QoS and OAM while adding security
to their networks. With this overlay approach to encryption, networks remain scalable, highly available
and functionally equivalent without the compromises that other solutions impose.
Core routers can switch and route NGE packets seamlessly, maintaining interoperability at locations where
they are deployed as LSRs, ABRs/ASBRs and pseudowire switching PE points. This results in a powerful
end-to-end security framework that can be applied across the entire IP/MPLS network.
NGE is a highly scalable solution that avoids large meshed tunnel configurations and complex topologies.
It reuses the MPLS network planning and resource allocations associated with the IP/MPLS user and control
planes, and can adapt to many diverse types of network topologies and architectures.
The positive business impact on operational savings is directly driven by NGE’s simplicity and overlay
approach, freeing network planners to focus on maximizing services first, without restrictions or
compromises caused by security.
5.2 Flexibility
NGE provides the flexibility to choose the IP/MPLS services and control plane items that require security.
NGE does not impose any bias towards the types of traffic that can be encrypted: all network traffic types
that an operator may find a good candidate to be protected in their IP/MPLS network can be protected and
secured with NGE. The overall security framework can be tailored to address the security requirements of
the network.
NGE provides the means to secure traffic in private IP MPLS networks or when traffic is crossing third-
party service provider networks. NGE provides an end-to-end, multi-point to multi-point solution over
these third-party service providers that includes cellular/wireless providers supporting MTC (M2M and IoT)
applications, Layer 3 IP VPN providers, and Layer 2 VPLS or VLL service providers.
NGE provides additional functionality to create security partitions using key groups, allowing a hierarchical
and tiered approach to a security architecture. For NGE domains, an operator can selectively choose traffic
flows to be encrypted using IP exception ACLs on a per-flow basis.
5.3 Robustness
NGE robustness was designed and built into the solution. At the heart of NGE, the NSP delivers highly robust
key management with hitless re-keying procedures and hitless encryption enable/disable operations for
both services and control plane encryption.
Because key management and synchronization is performed centrally, no additional requirements related to
key management functions are imposed on routers. As a result, there is minimal control plane overhead and
maintenance required for network-wide encryption. There is also no risk to traffic based on an encryption
control plane failure. During network outages or disruptions that cause reachability to the NSP to falter,
traffic is never dropped, and encryption functions never halt.
NGE nodes will always forward their encrypted mission-critical traffic, without exception.
5.4 Performance
NGE provides high performance and comprehensive encryption solutions for all types of Layer 2 and Layer 3
services—without requiring conversion to IP and without adding extra overhead that potentially can increase
latency (which is the usual case with IP encapsulation). All services are encrypted in MPLS packets without
27 Application note
Network group encryption
the need for further modification. For Layer 3 services, there is complete Layer 3 privacy because all IP
headers are hidden from explicit inspection in the MPLS payload.
For control plane encryption in NGE domains using router interface level encryption, packets reuse IPsec
transport mode, which does not add extra overhead and complexity to packets, thereby optimizing this
aspect of the NGE solution.
NGE packets are encrypted and decrypted only once—at their origin and at their destination. This ensures
low end-to-end latency and high throughput. Bandwidth consumption related to encryption overhead
is lower than with tradition encryption because packet overhead for NGE is lower than with traditional
approaches. (For example, NGE uses a 4-byte encryption label rather than an additional IPsec tunnel and
GRE headers.) Lower overhead can save considerable bandwidth on constant bit rate services that have
small packet sizes, including TDM pseudowires, teleprotection and services using SCADA-related protocols.
6 Conclusion
Cyber security is a growing concern for our society at large and for network operators in particular.
Operators need to be proactive in evaluating their security risks, and then formulate their security policy
and plan accordingly.
Nokia NGE is an innovative security tool that provides comprehensive protection for both IP and non-IP
traffic seamlessly at the MPLS and IP layer with minimal key management overhead and complexity. It is an
ideal solution for operators who are looking for an advanced security solution not available with traditional
methods to help secure their mission-critical networks.
To learn more about Nokia Network Group Encryption, visit the Cyber Security for Power Utilities web page.
28 Application note
Network group encryption
7 Acronyms
ABR area border router M2M machine-to-machine
ACL access control list MACsec Media Access Control security
ASBR autonomous system border router MDA 7750 Service Router Media Dependent Adapter
BFD Bidirectional Forwarding Detection MP-BGP Multiprotocol BGP
BGP Border Gateway Protocol MPLS Multiprotocol Label Switching
CCTV closed circuit television MTC machine type communication
CBC Cipher Block Chaining NFM-P Network Functions Manager for Packet
CPE customer premises equipment NGE network group encryption
CPM Converged IP Messaging NOC Network Operations Center
CSM Control Switch Module NSP Nokia Network Services Platform
CTL Control OAM operations, administration and maintenance
DA distribution automation OSPF Open Shortest Path First
DMVPN dynamic multipoint VPN PDN packet data network
E&M ear and mouth (signaling) PGW Packet Data Network Gateway
ESP Encapsulating Security Payload QoS Quality of Service
FAN field area network RAN radio access network
FXO Foreign eXchange Office RSVP-TE Resource Reservation Protocol – Traffic Engineering
FXS Foreign eXchange Subscriber RTU remote terminal unit
GDOI Group Domain of Interpretation SAP service access point
GRE Generic Routing Encapsulation SAR Nokia 7705 Service Aggregation Router
ICMP Internet Control Message Protocol SCADA supervisory control and data acquisition
IED intelligent electronic device SDP service distribution point
IES internet enhanced service SNAP Standard Network Access Protocol
IGMP Internet Group Management Protocol SNMP Simple Network Management Protocol
IGP Interior Gateway Protocol SPI security parameter index
IKE Internet Key Exchange SSH Secure Shell Protocol
IoT Internet of Things TDM time division multiplexing
IP Internet Protocol T-LDP targeted LDP
IPsec IP security VLAN virtual local area network
IS-IS Intermediate System-to-Intermediate System VLL virtual leased line
LAN local area network VPLS virtual private LAN service
LDP Label Distribution Protocol VPN virtual private network
LER label edge router VPRN virtual private routed network
LLC Logical Link Control VPWS virtual private wireless service
LLDP Link Layer Discovery Protocol VSR Nokia Virtualized Service Router
LMR land mobile radio system VSR-a Nokia VSR Appliance
LSP label switched path WLAN wireless LAN
LSR label switched router
LTE long term evolution
29 Application note
Network group encryption
8 References
1. IEEE 802.1AE: IEEE Standard for Local and Metropolitan Access Networks: Media Access Control (MAC)
Security. 2006. findstds/standard/802.1AE-2006.html
2. IETF. RFC 5996. Internet Key Exchange Protocol Version 2 (IKEv2). September 2010.
http://www.ietf.org/rfc/rfc5996.txt
3. IETF. RFC 4302. IP Authentication Header. December 2005.
http://www.ietf. org/rfc/rfc4302.txt
4. IETF. RFC 4303. IP Encapsulating Security Payload (ESP). December 2005.
http://www.ietf.org/rfc/rfc4303.txt
5. IETF. RFC 6407. The Group Domain of Interpretation. October 2011.
http://www. ietf.org/rfc/rfc6407.txt
6. Nokia Mission-Critical Communications Networks Solution for Power Utilities: Attaining NERC CIP
Version 5 Reliability Standards Compliance (application note). July 2016.
https://resources.ext.nokia.com/asset/181741
7. Nokia 7705 Service Aggregation Router: Security Overview for Power Utilities (application note). 2016.
https://resources.ext.nokia.com/asset/184431
8. Nokia 7705 Service Aggregation Router: Security overview for mission-critical networks (application
note). 2016. https://resources.ext.nokia.com/asset/174129
Nokia is a registered trademark of Nokia Corporation. Other product and company names
mentioned herein may be trademarks or trade names of their respective owners.
Nokia Oyj
Karaportti 3
FI-02610 Espoo
Finland
Tel. +358 (0) 10 44 88 000