MPLS security analysis

This extract from "CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN), 3rd Edition" by Richard Froom, Balaji Sivasubramanian and Erum Frahim, describes how MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection) and much more!

"MPLS security analysis," Chapter 3 of CCNP Self-Study: Building Cisco Multilayer Switched Networks, 3rd Edition by Richard Froom, Balaji Sivasubramanian and Erum Frahim, describes how MPLS provides security (VPN separation, robustness against attacks, core hiding, and spoofing protection), how the different Inter-AS and carrier's carrier models work, and how secure they are compared to each other. It discusses which security mechanisms the MPLS architecture does not provide and how MPLS VPNs compare in security to ATM or Frame Relay VPNs.

Read the rest of the excerpt in this PDF: MPLS security analysis

Excerpted from CCNP Self-Study: Building Cisco Multilayer Switched Networks, 3rd Edition by Richard Froom, Balaji Sivasubramanian and Erum Frahim (ISBN: 1587052199). Copyright 2005, Cisco Systems, Inc.

Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.

Read more on Data centre networking

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close