MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environmentUnderstand fundamental security principles and how MPLS VPNs workBuild an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s back...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A practical guide to
hardening MPLS networks Define "zones of trust" for your MPLS VPN environmentUnderstand fundamental security principles and how MPLS VPNs
workBuild an MPLS VPN threat model that defines attack points, such
as VPN separation, VPN spoofing, DoS against the network’s
backbone, misconfigurations, sniffing, and inside attack formsIdentify VPN security requirements, including robustness
against attacks, hiding of the core infrastructure, protection
against spoofing, and ATM/Frame Relay security comparisonsInterpret complex architectures such as extranet access with
recommendations of Inter-AS, carrier-supporting carriers, Layer 2
security considerations, and multiple provider trust model
issuesOperate and maintain a secure MPLS core with industry best
practicesIntegrate IPsec into your MPLS VPN for extra security in
encryption and data origin verificationBuild VPNs by interconnecting Layer 2 networks with new
available architectures such as virtual private wire service (VPWS)
and virtual private LAN service (VPLS)Protect your core network from attack by considering
Operations, Administration, and Management (OAM) and MPLS backbone
security incidents Multiprotocol Label
Switching (MPLS) is becoming a widely deployed technology,
specifically for providing virtual private network (VPN) services.
Security is a major concern for companies migrating to MPLS VPNs
from existing VPN technologies such as ATM. Organizations deploying
MPLS VPNs need security best practices for protecting their
networks, specifically for the more complex deployment models such
as inter-provider networks and Internet provisioning on the
network.MPLS VPN Security
is the first book to address the security features of MPLS VPN
networks and to show you how to harden and securely operate an MPLS
network. Divided into four parts, the book begins with an overview
of security and VPN technology. A chapter on threats and attack
points provides a foundation for the discussion in later chapters.
Part II addresses overall security from various perspectives,
including architectural, design, and operation components. Part III
provides practical guidelines for implementing MPLS VPN security.
Part IV presents real-world case studies that encompass details
from all the previous chapters to provide examples of overall
secure solutions.Drawing upon the
authors’ considerable experience in attack mitigation and
infrastructure security, MPLS VPN Security is your practical
guide to understandin |
---|