Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)

Buy
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking. 

 

The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section.

 

The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture.

  • Understand the operation of IP networks and routers
  • Learn about the many threat models facing IP networks, Layer 2 Ethernet switching environments, and IPsec and MPLS VPN services
  • Learn how to segment and protect each IP traffic plane by applying defense in depth and breadth principles
  • Use security techniques such as ACLs, rate limiting, IP Options filtering, uRPF, QoS, RTBH, QPPB, and many others to protect the data plane of IP and switched Ethernet networks
  • Secure the IP control plane with rACL, CoPP, GTSM, MD5, BGP and ICMP techniques and Layer 2 switched Ethernet-specific techniques
  • Protect the IP management plane with password management, SNMP, SSH, NTP, AAA, as well as other VPN management, out-of-band management, and remote access management techniques
  • Secure the IP services plane using recoloring, IP fragmentation control, MPLS label control, and other traffic classification and process control techniques

 This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 
About the Author


Gregg Schudel,CCIE No. 9591 (Security), joined Cisco in 2000 as a consulting system engineer supporting the U.S. Service Provider Organization. Gregg focuses on IP core network and services security architectures and technology for inter-exchange carriers, web services providers, and mobile providers. Gregg is also part of a team of Corporate and Field resources focused on driving Cisco Service Provider Security Strategy. Prior to joining Cisco, Gregg worked for many years with BBN Technologies, where he supported network security research and development, most notably in conjunction with DARPA and other federal agencies involved in security research. Gregg holds an MS in engineering from George Washington University, and a BS in engineering from Florida Institute of Technology. 

 

David J. Smith, CCIE No. 1986 (Routing and Switching), joined Cisco in 1995 and is a consulting system engineer supporting the Service Provider Organization. Since 1999 David has focused on service provider IP core and edge architectures, including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry. Between 1995 and 1999, David supported enterprise customers designing campus and global WANs. Prior to joining Cisco, David worked at Bellcore developing systems software and experimental ATM switches. David holds an MS in information networking from Carnegie Mellon University, and a BS in computer engineering from Lehigh University.

(HTML tags aren't allowed.)

Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Professional Portal Development with Open Source Tools: JavaTM Portlet API, Lucene, James, Slide
Open source technology enables you to build customized enterprise portal frameworks with more flexibility and fewer limitations. This book explains the fundamentals of a powerful set of open source tools and shows you how to use them.

An outstanding team of authors provides a complete tutorial and reference guide to Java Portlet API, Lucene,...

Basal Cell Carcinoma: Advances in Treatment and Research
Basal Cell Carcinoma: Advances in Treatment and Research
?Basal Cell Carcinoma: Advances in Treatment and Research provides a comprehensive overview of evidence-based treatment approaches for the most common cancer worldwide - basal cell carcinoma. The first part of this book details the epidemiology, risk factors, pathophysiology, and different histologic subtypes of basal cell carcinoma...
The Handbook of Geoscience
The Handbook of Geoscience

Written in an engaging and highly readable style, The Handbook of Geoscience is ideal for students, administrators, legal professionals, non-scientific professionals, and general readers with little or no science background. This handbook is a user-friendly overview of our...


Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures
Fundamentals of Data Visualization: A Primer on Making Informative and Compelling Figures

Effective visualization is the best way to communicate information from the increasingly large and complex datasets in the natural and social sciences. But with the increasing power of visualization software today, scientists, engineers, and business analysts often have to navigate a bewildering array of visualization...

Automated Fingerprint Identification Systems (AFIS), First Edition
Automated Fingerprint Identification Systems (AFIS), First Edition
There is a world in which every crime is solved in 60 minutes, DNA matches are made “While U Wait,” and staff work on only one case at a time. But it is a fantasy land, an imaginary land; it is not the real world. This book is about the real world of biometric identification technology. It is a fascinating topic. This technology can...
Advances in Automatic Differentiation (Lecture Notes in Computational Science and Engineering)
Advances in Automatic Differentiation (Lecture Notes in Computational Science and Engineering)
This collection covers advances in automatic differentiation theory and practice. Computer scientists and mathematicians will learn about recent developments in automatic differentiation theory as well as mechanisms for the construction of robust and powerful automatic differentiation tools. Computational scientists and engineers will benefit from...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy