MPLS VPN security

A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s ba...

Descripción completa

Detalles Bibliográficos
Autor Corporativo: Safari Tech Books Online (-)
Otros Autores: Behringer, Michael H Author (author), Morrow, Monique Contributor (contributor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] Cisco Press 2005
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626931906719

Ejemplares similares