Chapter 5. IP Control Plane Security
In this chapter, you learn about the following:
• Security techniques that may be used to protect the IP control plane
• Security techniques that may be used to protect the control plane of Layer 2 switched Ethernet networks
This chapter describes techniques available to mitigate the risks of unauthorized traffic reaching the IP control plane. As control plane protocols enable IP host connectivity across a routed network, it is critical that:
• Control plane resources within an IP router are protected to mitigate the risk of DoS attacks because most control plane packets are handled at the IOS process level
• Control plane protocols are secured to mitigate the risk of protocol attacks, which may result in ...
Get Router Security Strategies: Securing IP Network Traffic Planes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.