This chapter covers the following topics:
Comparing an enterprise’s security implications using provider-provisioned IP VPNs based on MPLS to traditional Frame Relay and ATM Layer 2 VPNs.
Understanding the security issues raised in the provider network by using shared or private PEs.
Understanding the cost and security trade-offs for different types of connectivity for connecting PEs to CEs.
Understanding how to apply on your network security techniques such as filtering, tracing spoofed packets, remote-trigger black-hole filtering, loose and strict uRPF, sinkholes, and backscatter traceback.
Understanding hacker tools such as bots, botnets, and worms and how to mitigate ...