Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Router Security Strategies: Securing IP Network Traffic Planes (Networking Technology: Security)

Buy
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking. 

 

The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section.

 

The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture.

  • Understand the operation of IP networks and routers
  • Learn about the many threat models facing IP networks, Layer 2 Ethernet switching environments, and IPsec and MPLS VPN services
  • Learn how to segment and protect each IP traffic plane by applying defense in depth and breadth principles
  • Use security techniques such as ACLs, rate limiting, IP Options filtering, uRPF, QoS, RTBH, QPPB, and many others to protect the data plane of IP and switched Ethernet networks
  • Secure the IP control plane with rACL, CoPP, GTSM, MD5, BGP and ICMP techniques and Layer 2 switched Ethernet-specific techniques
  • Protect the IP management plane with password management, SNMP, SSH, NTP, AAA, as well as other VPN management, out-of-band management, and remote access management techniques
  • Secure the IP services plane using recoloring, IP fragmentation control, MPLS label control, and other traffic classification and process control techniques

 This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 
About the Author


Gregg Schudel,CCIE No. 9591 (Security), joined Cisco in 2000 as a consulting system engineer supporting the U.S. Service Provider Organization. Gregg focuses on IP core network and services security architectures and technology for inter-exchange carriers, web services providers, and mobile providers. Gregg is also part of a team of Corporate and Field resources focused on driving Cisco Service Provider Security Strategy. Prior to joining Cisco, Gregg worked for many years with BBN Technologies, where he supported network security research and development, most notably in conjunction with DARPA and other federal agencies involved in security research. Gregg holds an MS in engineering from George Washington University, and a BS in engineering from Florida Institute of Technology. 

 

David J. Smith, CCIE No. 1986 (Routing and Switching), joined Cisco in 1995 and is a consulting system engineer supporting the Service Provider Organization. Since 1999 David has focused on service provider IP core and edge architectures, including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry. Between 1995 and 1999, David supported enterprise customers designing campus and global WANs. Prior to joining Cisco, David worked at Bellcore developing systems software and experimental ATM switches. David holds an MS in information networking from Carnegie Mellon University, and a BS in computer engineering from Lehigh University.

(HTML tags aren't allowed.)

Database Processing: Fundamentals, Design, and Implementation (13th Edition)
Database Processing: Fundamentals, Design, and Implementation (13th Edition)

Get students straight to the point of database processing. Database Processing reflects a new teaching method that gets students straight to the point with its thorough and modern presentation of database processing fundamentals.
 

The thirteenth edition has been...

Ajax Starter Kit
Ajax Starter Kit

Ajax Programmer’s Toolkit with all the technologies you need to set up an Ajax development and testing environment on your Windows, Mac, or Linux computer.

 

Quick Start Guide teaches you the basics of Ajax programming in 21 short, easy-to-read...

Wideband Beamforming: Concepts and Techniques (Wireless Communications and Mobile Computing)
Wideband Beamforming: Concepts and Techniques (Wireless Communications and Mobile Computing)

This book provides an excellent reference for all professionals working in the area of array signal processing and its applications in wireless communications.

Wideband beamforming has advanced with the increasing bandwidth in wireless communications and the development of ultra wideband (UWB) technology.

In this...


Intelligent Energy Demand Forecasting (Lecture Notes in Energy)
Intelligent Energy Demand Forecasting (Lecture Notes in Energy)

As industrial, commercial, and residential demands increase and with the rise of privatization and deregulation of the electric energy industry around the world, it is necessary to improve the performance of electric operational management. Intelligent Energy Demand Forecasting offers approaches and methods to calculate optimal...

Introduction to Partial Differential Equations (Undergraduate Texts in Mathematics)
Introduction to Partial Differential Equations (Undergraduate Texts in Mathematics)

This textbook is designed for a one year course covering the fundamentals of partial differential equations, geared towards advanced undergraduates and beginning graduate students in mathematics, science, engineering, and elsewhere. The exposition carefully balances solution techniques, mathematical rigor, and significant applications, all...

Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy