Chapter 9. Service Provider Network Case Studies
In this chapter, you will learn about the following:
• How to apply IP traffic plane security techniques within an Internet transit SP network design
• How to apply IP traffic plane security techniques within an MPLS VPN SP network design
• How the combination of IP traffic plane techniques provides an effective defense in depth and breadth security architecture
The purpose of this chapter is to demonstrate the use of the security concepts and techniques described in Chapters 4 through 7 by applying them to a conceptual service provider (SP) network as case studies. The intent is to clarify your understanding of how all of these individual security techniques are brought together to form an effective ...
Get Router Security Strategies: Securing IP Network Traffic Planes now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.