
Specific Inter-AS Considerations 59
network are the PE-CE interfaces. This may seem an unrealistic assumption at first, but in
fact, any VPN technology is insecure if someone can insert packets in the core, because it
would allow, for example, the insertion of random ATM cells with crafted virtual path and
circuit information, and the same effect: getting packets into another VPN.
Therefore, the MPLS core is treated as a zone of trust where packets can only enter on
well-known interfaces. See Chapter 1, “MPLS VPN Security: An Overview,” for more
details on zones of trust and this concept.
NOTE In a standard MPLS VPN network consisting of a single ...