Chapter 5. IP Control Plane Security
In this chapter, you learn about the following:
• Security techniques that may be used to protect the IP control plane
• Security techniques that may be used to protect the control plane of Layer 2 switched Ethernet networks
This chapter describes techniques available to mitigate the risks of unauthorized traffic reaching the IP control plane. As control plane protocols enable IP host connectivity across a routed network, it is critical that:
• Control plane resources within an IP router are protected to mitigate the risk of DoS attacks because most control plane packets are handled at the IOS process level
• Control plane protocols are secured to mitigate the risk of protocol attacks, which may result in ...