|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm61315586 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050822s2005 inu fo 000 0 eng d |
010 |
|
|
|a 2003116565
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VOD
|d CEF
|d VLB
|d OCLCQ
|d AZU
|d OCLCQ
|d OCLCF
|d IDEBK
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCA
|d VT2
|d HS0
|d WYU
|d EBLCP
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA540193
|2 bnb
|
016 |
7 |
|
|a 013195261
|2 Uk
|
019 |
|
|
|a 729550906
|a 741349122
|a 748094986
|a 1024282089
|a 1027201670
|a 1048120859
|a 1048390359
|a 1064978071
|a 1153017140
|
020 |
|
|
|z 1587051834
|q (pbk.)
|
020 |
|
|
|a 8131737705
|
020 |
|
|
|a 9788131737705
|
020 |
|
|
|a 9781587051838
|
020 |
|
|
|a 1587051834
|
029 |
1 |
|
|a HEBIS
|b 291462782
|
029 |
1 |
|
|a AU@
|b 000067074347
|
029 |
1 |
|
|a AU@
|b 000057222379
|
035 |
|
|
|a (OCoLC)61315586
|z (OCoLC)729550906
|z (OCoLC)741349122
|z (OCoLC)748094986
|z (OCoLC)1024282089
|z (OCoLC)1027201670
|z (OCoLC)1048120859
|z (OCoLC)1048390359
|z (OCoLC)1064978071
|z (OCoLC)1153017140
|
050 |
|
4 |
|a TK5105.573
|b Beh 2005
|
072 |
|
7 |
|a UTP
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Behringer, Michael H.
|
245 |
1 |
0 |
|a MPLS VPN security /
|c Michael H. Behringer, Monique Morrow.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco ;
|a London :
|b Pearson Education [distributor],
|c 2005.
|
300 |
|
|
|a 1 online resource (400 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (p. [275]-277) and index.
|
505 |
0 |
|
|a Cover -- Contents -- Foreword -- Introduction -- Part I: MPLS VPN and Security Fundamentals -- Chapter 1 MPLS VPN Security: An Overview -- Key Security Concepts -- Other Important Security Concepts -- Overview of VPN Technologies -- Fundamentals of MPLS VPNs -- A Security Reference Model for MPLS VPNs -- Summary -- Chapter 2 A Threat Model for MPLS VPNs -- Threats Against a VPN -- Threats Against an Extranet Site -- Threats Against the Core -- Threats Against the Internet -- Threats from Within a Zone of Trust -- Reconnaissance Attacks -- Summary -- Part II: Advanced MPLS VPN Security Issues -- Chapter 3 MPLS Security Analysis -- VPN Separation -- Robustness Against Attacks -- Hiding the Core Infrastructure -- Protection Against Spoofing -- Specific Inter-AS Considerations -- Specific Carriers Carrier Considerations -- Security Issues Not Addressed by the MPLS Architecture -- Comparison to ATM/FR Security -- Summary -- Chapter 4 Secure MPLS VPN Designs -- Internet Access -- Extranet Access -- MPLS VPNs and Firewalling -- Designing DoS-Resistant Networks -- Inter-AS Recommendations and Traversing Multiple Provider Trust Model Issues -- Carriers Carrier -- Layer 2 Security Considerations -- Multicast VPN Security -- Summary -- Chapter 5 Security Recommendations -- General Router Security -- CE-Specific Router Security and Topology Design Considerations -- PE-Specific Router Security -- PE Data Plane Security -- PE-CE Connectivity Security Issues -- P-Specific Router Security -- Securing the Core -- Routing Security -- CE-PE Routing Security Best Practices -- Internet Access -- Sharing End-to-End Resources -- LAN Security Issues -- IPsec: CE to CE -- MPLS over IP Operational Considerations: L2TPv3 -- Securing Core and Routing Check List -- Summary -- Part III: Practical Guidelines to MPLS VPN Security -- Chapter 6 How IPsec Complements MPLS -- IPsec Overview -- Location of the IPsec Termination Points -- Deploying IPsec on MPLS -- Using Other Encryption Techniques -- Summary -- Chapter 7 Security of MPLS Layer 2 VPNs -- Generic Layer 2 Security Considerations -- C2 Ethernet Topologies -- C3 VPLS Overview -- C4 VPWS Overview -- C5 VPLS and VPWS Service Summary and Metro Ethernet Architecture Overview -- C6 VPLS and VPWS Security Overview -- Customer Edge -- Summary -- Chapter 8 Secure Operation and Maintenance of an MPLS Core -- Management Network Security -- Securely Managing CE Devices -- Securely Managing the Core Network -- Summary -- Part IV: Case Studies and Appendixes -- Chapter 9 Case Studies -- Internet Access -- Multi-Lite VRF Mechanisms -- Layer 2 LAN Access -- Summary -- Appendix A: Detailed Configuration Example for a PE -- Appendix B: Reference List -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- KL -- M -- N -- OP -- R -- S -- T -- UV -- WZ.
|
520 |
|
|
|a This is the eBook version of the printed book. A practical guide to hardening MPLS networks Define ""zones of trust"" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and inside attack forms Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons Interpret com.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a MPLS standard.
|
650 |
|
0 |
|a Computer security
|v Software.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Software.
|
650 |
|
6 |
|a MPLS (Norme)
|
650 |
|
6 |
|a Sécurité informatique
|v Logiciels.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Logiciels.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a MPLS standard.
|2 fast
|0 (OCoLC)fst01004577
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
655 |
|
7 |
|a Software.
|2 fast
|0 (OCoLC)fst01411640
|
700 |
1 |
|
|a Morrow, Monique.
|
776 |
0 |
8 |
|i Print version:
|a Behringer, Michael H.
|t MPLS VPN security.
|d Indianapolis, Ind. : Cisco ; London : Pearson Education [distributor], 2005
|z 1587051834
|w (OCoLC)60371411
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587051834/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
880 |
|
|
|6 020-00
|z 1587051834 (pbk.)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5243584
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15629059
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis23897564
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851740
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37820902
|
994 |
|
|
|a 92
|b IZTAP
|