RBI Cloud setup .pptx Shared by iftas sifynoc team
OkGoogle19
21 views
21 slides
Oct 11, 2024
Slide 1 of 21
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
About This Presentation
RBI Cloud team
Size: 3.21 MB
Language: en
Added: Oct 11, 2024
Slides: 21 pages
Slide Content
IFTAS - Cloud Setup Training Created by R.R.Ram Manoj
RBI-IFTAS Cloud DC Banks VRF:- 9434-ICLOUD-HUB VRF:- 9435-ICLOUD-SPOKE SIFY GDC
RBI-IFTAS Cloud DC Banks VRF:- 9434-ICLOUD-HUB VRF:- 9435-ICLOUD-SPOKE Hardware used CISCO 1921 CISCO 1941
RBI-IFTAS Cloud DC Banks VRF:- 9434-ICLOUD-HUB VRF:- 9435-ICLOUD-SPOKE Service Provider
RBI-IFTAS Cloud DC Banks VRF:- 9434-ICLOUD-HUB VRF:- 9435-ICLOUD-SPOKE Protocols
TCL BSNL Sify Servers DC-DC connectivity Servers PRY Traffic PATH SCY Traffic PATH TRY Traffic PATH All the providers are delivered only single link, no backup link Each link connected with dedicated router(1:1)
TCL BSNL Sify Servers Member bank-DC connectivity Servers Bank can take any of the service providers based on the feasibility Each link connected with dedicated router at bank side (1:1) VTI(GRE over IPSEC ) running between MB to DC and BGP is running through the VTI interface VTI(GRE over IPSEC) VTI(GRE over IPSEC) VTI(GRE over IPSEC)
INTERNET: IFTAS CLOUD team having the two Internet sites at HYD IFTAS DC and GPX Mumbai HYD DC – SIFY (Managed) + TCL (Un-Managed ) GPX DC – Airtel (Un-Managed ) + TCL (Un-Managed ) Only Sify router is under managed services. Lastmile with BGP and weight attributes. Site is protected with Cloud DDOS services PE : 1.7.0.229 Interface - Bundle-Ether8.125 RP/0/RSP0/CPU0:AP-HYD-GGD-T1-ST-SIP-CA91-R01-GDC#sh run int Bundle-Ether8.125 Tue Mar 30 19:31:27.997 IST interface Bundle-Ether8.125 description INDIAN FINANCIAL TECHNOLOGY & ALLIED SERVICES-SIFY-GDC-3932792-60-MBPS-ECINT-ETH-PRIMARY-4602420617 service-policy input RATE-LIMIT-IN-60MB service-policy output RATE-LIMIT-OUT-60MB ipv4 address 223.31.193.57 255.255.255.252 encapsulation dot1q 125
OFFNET DDOS ( without Attack ) Airtel TCL DDOS NMS INTERNET SIFY NTA Data Polling GPX DC ( Un-Managed ) GPX DC is connected with Airtel and TCL. DDOS GENIE monitor the traffic in WAN interface using NTA
OFFNET DDOS ( with Attack ) Airtel TCL DDOS NMS INTERNET SIFY NTA Data Polling GPX DC ( Un-Managed ) Running GRE tunnel from Chennai PE to GPX(R1/R2) and IFTAS(R1) routers Static routes for GPX LAN pool pointing towards Tunnel interface (Manual additions when attacks) Chennai PE 100.70.3.10 GRE Tunnel
PE Tunnel Interface Chennai PE - 100.70.3.10
Steps to follow when attacks Steps Tasks Owner Step 1 DDOS team intimate the attack to IFTAS cloud team(Mail/Call) Sify DDOS Step 2 IFTAS team will raise the request to Airtel and TCL to supress the LAN advertisement on eBGP then should confirm back to Sify IFTAS Step 3 Sify DDOS team send request to Netops add the static routes in Chennai IPE(100.70.3.10) towards GRE tunnel and starts advertise the LAN pool in the Gateways Sify DDOS Step 4 SIFY DDOS team shold confirm forward traffic from Iterne to IFTAS CE routed through DDOS device and ensure scrubbing is on progress. Sify DDOS Step 5 SIFY DDOS team provide the confirmations back to IFTAS traffic routed through Sify Cloud DDOS protected services Sify DDOS Step 6 After Attack is stopped inform IFTAS team to rollback the changes Sify DDOS
Tools Used Beamon
Tools Used Ioni (back end tool) Fusion
Daily Incident
Support Work flow Helpdesk & IFTAS Sify NOC LM Provider RF Team Fiber Team Netops Team Customers Other ISP