eBooks-it.org Logo
eBooks-IT.org Inner Image

MPLS VPN Security

MPLS VPN Security Image

Book Details:

Publisher:Cisco Press
Series: Cisco Press
Author:Michael H. Behringer
Edition:1
ISBN-10:1587051834
ISBN-13:9781587051838
Pages:312
Published:Jun 18 2005
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:5.29 MB

Book Description:

A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues Operate and maintain a secure MPLS core with industry best practices Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS) Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network. MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions. Drawing upon the authors' considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment. "The authors of this book, Michael Behringer and Monique Morrow, have a deep and rich understanding of security issues, such as denial-of-service attack prevention and infrastructure protection from network vulnerabilities. They offer a very practical perspective on the deployment scenarios, thereby demystifying a complex topic. I hope you enjoy their insights into the design of self-defending networks." -Jayshree V. Ullal, Senior VP/GM Security Technology Group, Cisco Systems

Download Link:

Related Books:

MPLS and VPN Architectures

MPLS and VPN Architectures Image
A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousands of VPNs Extensive case studies guide you through the design and deployment of real-world MPLS/VPN networks Configuration examples and guidelines assist in configuring MPLS on Cisco devices Design and implementation options help you build various VPN topologies Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. There are many uses for this new technology, both within a service-provider environment and wit...

MPLS and VPN Architectures Volume 2

MPLS and VPN Architectures Volume 2 Image
Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT) How VRFs can be extended into a customer site to provide separation inside the customer network The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone How to carry customer multicast traffic inside a VPN The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier ...

MPLS and VPN Architectures

MPLS and VPN Architectures Image
Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNsAssists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questionsOffers in-depth analysis of MPLS architectureHelps you learn how MPLS scales to support tens of thousands of virtual private networks (VPNs)Provides extensive case studies that guide you through the design and deployment of real-world MPLS/VPN networksPresents configuration examples and guidelines that assist you in configuring MPLS on Cisco devicesProvides design and implementation options that help you build various VPN topologiesMultiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. The most widely deployed usage ...



2007 - 2021 © eBooks-IT.org