
xv
Part III Practical Guidelines to MPLS VPN Security 195
Chapter 6
How IPsec Complements MPLS 197
IPsec Overview 197
Location of the IPsec Termination Points 200
CE-CE IPsec 200
PE-PE IPsec 203
Remote Access IPsec into an MPLS VPN 205
Deploying IPsec on MPLS 206
Using Other Encryption Techniques 207
Summary 208
Chapter 7
Security of MPLS Layer 2 VPNs 211
Generic Layer 2 Security Considerations 211
C2 Ethernet Topologies 212
C3 VPLS Overview 214
C4 VPWS Overview 215
C5 VPLS and VPWS Service Summary and Metro Ethernet Architecture
Overview 215
C6 VPLS and VPWS Security Overview 217
Physical Interconnection Option Details 219
D1 SP Interconnect Models 219