O'Reilly logo

Selecting MPLS VPN Services by Craig Huegen, John Monaghan, Monique Morrow, Steve Pickavance, Chris Lewis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Enterprise Security in an MPLS VPN Environment

<feature><title></title>

This chapter covers the following topics:

  • Comparing an enterprise’s security implications using provider-provisioned IP VPNs based on MPLS to traditional Frame Relay and ATM Layer 2 VPNs.

  • Understanding the security issues raised in the provider network by using shared or private PEs.

  • Understanding the cost and security trade-offs for different types of connectivity for connecting PEs to CEs.

  • Understanding how to apply on your network security techniques such as filtering, tracing spoofed packets, remote-trigger black-hole filtering, loose and strict uRPF, sinkholes, and backscatter traceback.

  • Understanding hacker tools such as bots, botnets, and worms and how to mitigate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required