MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network'...
Wedi'i Gadw mewn:
Prif Awduron: | Behringer, Michael H., Morrow, Monique J. |
---|---|
Fformat: | Llyfr |
Iaith: | English |
Cyhoeddwyd: |
Cisco Press
2011
|
Pynciau: | |
Mynediad Ar-lein: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/26270 |
Tagiau: |
Ychwanegu Tag
Dim Tagiau, Byddwch y cyntaf i dagio'r cofnod hwn!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
Eitemau Tebyg
-
MPLS and VPN Architectures
gan: Pepelnjak, Ivan, et al.
Cyhoeddwyd: (2011) -
CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study)
gan: Roland, John F., et al.
Cyhoeddwyd: (2011) -
CCIP: MPLS Study Guide
gan: Reagan, James
Cyhoeddwyd: (2011) -
Secure socket layer virtual priv ate network - SSL VPN /
gan: Giảng Hán Phú. -
Cisco Ccip Mpls Study Guide
gan: Reagan, James
Cyhoeddwyd: (2011)