O'Reilly logo

Router Security Strategies: Securing IP Network Traffic Planes by David J. Smith - CCIE No. 1986, Gregg Schudel - CCIE No. 9591

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Threat Models for IP Networks

In this chapter, you will learn about the following:

Threats against IP network infrastructures

Threats against Layer 2 switched Ethernet network infrastructures

Threats against IP VPN network infrastructures

Knowledge of the threats against IP, Layer 2 switched Ethernet, and IP VPN network infrastructures will allow you to gain a firmer understanding of the vulnerabilities and risks associated with your network. Without a thorough understanding of the many threats, you cannot take the necessary steps to implement an effective security solution. Network design techniques to mitigate the risks are presented in Part II, “Security Techniques for Protecting IP Traffic Planes.”

Threats Against IP Network ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required