
282
basic template and ACL examples,
144–145
deployment guidelines, 146–148
fragmented packets and, 146
secure access to routers, 136–139
generalized TTL security mechanism (GTSM),
119, 124
global routing table, 89– 94, 255–256
GDOI (group domain of interpretation), 207
H
hard-code physical port attributes, 229–230
hidden core infrastructure
ATM/FR security comparisons, 75
overview, 56–57
hierarchical core, 37–39
Hijack Management Security, 222
hop-by-hop routing, 90
hub and spoke topology, 158
hybrid service model, 260
I
iACLs (infrastructure access lists), 164–165
deployment examples, 169–171
developing protection ACL, 167–169
examples, 165–166
risk assessment, ...