Solved

MPLS & Leased Line

Posted on 2009-06-30
9
7,723 Views
Last Modified: 2012-05-07
1. I have a private WAN that are (not connected to Internet) using MPLS to connect a few separate geographical location LAN. HQ LAN communicate with all sisters company LAN, but other LAN has its own autonomy and separately controls.
What are the risks and threats that this network face? Can external intruder connect to MPLS network via the MPLS service provider network?
2. Same as above, but now the private WAN is using point to point leased line (E1 & E3) network to connect these LAN.
What are the risks and threats that this leased line network face? Can external intruder connect to this leased line network via the leased line service provider network?
0
Comment
Question by:Arifnor
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 7

Assisted Solution

by:willbaclimon
willbaclimon earned 150 total points
ID: 24756479
The risk if very small, and in my opinion its the same MPLS vs Leased Line. Essentially a leased line is not a tin can with a wire straight to your building. Its physically shared.
0
 
LVL 7

Accepted Solution

by:
willbaclimon earned 150 total points
ID: 24756507
0
 

Author Comment

by:Arifnor
ID: 24759871
Willbaclimon,

Great stuff on MPLS. It seems it's quite impossible to penetrate the MPLS network. But the IT guys here in my organization is saying it is possible, thus they implement Firewall for each LAN (but, I think it is not cost effective). (Note that this network does not connect to external network i.e. Internet)

How do someone want to penetrate MPLS and leased Line? Any other threat and risks to MPLS and leased line?

0
SuperAntiSpyware Licenses Discounted by 25% !

Exclusive offer to Experts Exchange Members!
Buy SuperAntiSpyware License(s) from us and save 25% on the regular purchase price.
- Includes Full SuperAntiSpyware Vendor Support Entitlements
- Your Subscription does not begin until you activate your license
- Buy for your friends

 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 100 total points
ID: 24783828
--> But the IT guys here in my organization is saying it is possible

Have the shielded your building?  It is possible for me to go down to a local electronics store buy less than USD $100 worth of stuff and then start picking up the electronic signals from within your building and see your data.

Sure its possible to hack into a MPLS link, but as willbaclimon pointed out, it is also possible to break into a leased line.

Now is it plausible that some body could hack a MPLS circut?  No.

Technically there is not much difference between a MPLS link and a leased line.  In fact a MPLS link is a lease line to your building.  The major difference between MPSL and leased lines are the protocols uses at the "shared" level.  Just like willbaclimon stated, even leased lines are shared resources at some point in the connection.  They are not really a solid wire from one point to another.

0
 
LVL 7

Assisted Solution

by:willbaclimon
willbaclimon earned 150 total points
ID: 24787870
Well put
0
 

Author Comment

by:Arifnor
ID: 24809675
Thanks to all of you. I have review all the answers and confirm this with the IT guys. I will close the question
0
 

Expert Comment

by:belgarriff
ID: 26358576
Just tried to follow the link listed in the solution http://www.fleetllc.com/portal/showthread.php?p=44

My sophos antivirus reported the following, so you might want to remove the link to the fleetlic site
Threat: Mal/ObfJS-F

Threat source : http://www.fleetllc.com/portal/showthread.php?p=44
The requested location contained malicious content and was blocked from downloading.
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Blackberry and SMS logging 5 40
Weird Happening at my office with windows machines/network 16 84
best opensource encryption 9 68
Open attachments in viewer, not main app 4 32
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question