
C
H
A
P
T
E
R
2
A Threat Model for MPLS VPNs
To be able to evaluate MPLS security, it is necessary to define a threat model for the various
zones of trust. This chapter uses the zones of trust that were defined in Chapter 1 and
outlines the threats against those zones. Later in this book, MPLS VPN security is analyzed
based on this threat model, and mechanisms are discussed to defend against the threats.
A complete threat model (for example, one designed for use as a security policy) must identify
threats from outside and inside a trusted zone. This is because, in practice, many threats come
from the inside. For example, a thief might ...