O'Reilly logo

Router Security Strategies: Securing IP Network Traffic Planes by David J. Smith - CCIE No. 1986, Gregg Schudel - CCIE No. 9591

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Enterprise Network Case Studies

In this chapter, you will learn about the following:

• How to apply IP traffic plane security techniques to a typical Internet-based, IPsec VPN enterprise network design

• How to apply IP traffic plane security techniques to a typical MPLS VPN enterprise network design

• How the combination of IP traffic plane techniques provides an effective defense in depth and breadth security architecture

The purpose of this chapter is to demonstrate the use of the concepts and techniques described in Chapters 4 through 7 by applying them to conceptual enterprise networks as case studies. The intent is to clarify your understanding of how all of these security techniques are brought together to form an effective ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required