tailieunhanh - Security of the MPLS Architecture

Intrusion detection systems and vulnerability scanners provide an additional layer of network firewalls permit or deny traffic based on source, destination, port, or other criteria, they do not actually analyze traffic for attacks or search the network for existing vulnerabilities. In addition, firewalls typically do not address the internal threat presented by “insiders.” The Cisco Intrusion Detection System (IDS) is the industry's first real-time, network intrusion detection system that can protect the network perimeter, extranets, and increasingly vulnerable internal networks. The system uses sensors, which are high-speed network appliances, to analyze individual packets to detect suspicious activity. If the data stream in a network exhibits. | White Paper Cisco Systems Security of the MPLS Architecture Scope and Introduction architecture security Miercom . Many enterprises are thinking of replacing traditional Layer 2 VPNs such as ATM or Frame Relay FR with MPLS-based services. As Multiprotocol Label Switching MPLS is becoming a more widespread technology for providing virtual private network VPN services MPLS architecture security is of increasing concern to service providers SPs and VPN customers. This paper gives an overview of MPLS architecture security for both SPs and MPLS users and compares it with traditional Layer 2 services from a security perspective. This paper also recommends how to secure an MPLS infrastructure. The focus is specifically on the MPLS Border Gateway Protocol BGP VPN architecture. The Miercom group has also undertaken research in this field and conducted practical testing of MPLS MPLS is being used to achieve the following results to engineer the core network more easily and efficiently traditional MPLS and MPLS traffic engineering to provide VPN services MPLS-VPN and to facilitate quality of service QoS across a network core MPLS-DBP . In this paper the main emphasis is on security of the VPN provisioning aspect of MPLS although most of it applies to other aspects of MPLS. This paper assumes that the MPLS core network is provided in a secure manner. Thus it does not address basic security concerns such as securing the network elements against unauthorized access misconfigurations of the core internal within the core attacks and so on. If a customer does not wish to assume the SP network is secure it becomes necessary to run IP Security IPSec over the MPLS infrastructure Section 6 . Analysis of the security features of routing protocols is covered only to the extent that it influences MPLS. This paper does not cover IPSec technology except to highlight the combination of MPLS with IPSec. Part A covers an analysis of the security that MPLS provides compared to similar Layer 2 .

TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.