Table of Contents
Preface
Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools
1
Data Centers and the Enterprise Network Architecture and its Components
Exploring networks and data flows
The data center, core, and user networks
Switching (L2) and routing (L3) topologies
Switching (L2) and routing (L3)
L2 and L3 architectures
L2 and L3 architecture data flow
L2 and L3 architecture data flow with redundancy
L2 and L3 topologies with firewalls
L2 and L3 topologies with overlays
The network perimeter
The data, control, and management planes
The data plane
The control plane
The management plane
SDN and NFV
Software-defined networking (SDN)
Network function virtualization (NFV)
Cloud connectivity
Type of attacks and ...
Get Network Protocols for Security Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.