P Style="Margin: 0Px" Router Security Strategies: Securing Ip
Network Traffic Planes Provides A Compre-Hensive Approach To
Understand And Implement Ip Traffic Plane Separation And
Protection On Ip Routers. This Book Details The Distinct Traffic
Planes Of Ip Networks And The Advanced Techniques Necessary To
Operationally Secure Them. This Includes The Data, Control,
Management, And Services Planes That Provide The Infrastructure
For Ip Networking.A /P P Style="Margin: 0Px"A/P P Style="Margin:
0Px"The First Section Provides A Brief Overview Of The Essential
Components Of The Internet Protocol And Ip Networking. At The End
Of This Section, You Will Understand The Fundamental Principles
Of Defense In Depth And Breadth Security As Applied To Ip Traffic
Planes. Techniques To Secure The Ip Data Plane, Ip Control Plane,
Ip Management Plane, And Ip Services Plane Are Covered In Detail
In The Second Section./P P Style="Margin: 0Px"A/P P
Style="Margin: 0Px"The Final Section Provides Case Studies From
Both The Enterprise Network And The Service Provider Network
Perspectives. In This Way, The Individual Ip Traffic Plane
Security Techniques Reviewed In The Second Section Of The Book
Are Brought Together To Help You Create An Integrated,
Comprehensive Defense In Depth And Breadth Security
Architecture./P P Style="Margin: 0Px"A/P P Style="Margin:
0Px"Aunderstanding And Securing Ip Traffic Planes Are Critical To
The Overall Security Posture Of The Ip Infrastructure.A The
Techniques Detailed In This Book Provide Protection And
Instrumentation Enabling Operators To Understand And Defend
Against Attacks. As The Vulnerability Economy Continues To
Mature, It Is Critical For Both Vendors And Network Providers To
Collaboratively Deliver These Protections To The Ip
Infrastructure.A/P P Style="Margin: 0Px"Arussell Smoak, Director,
Technical Services, Security Intelligence Engineering, Cisco/P P
Style="Margin: 0Px"A/P P Style="Margin: 0Px"Gregg Schudel, Ccie
No. 9591, Joined Cisco In 2000 As A Consulting System Engineer
Supporting The U.S. Service Provider Organization. Gregg Focuses
On Ip Core Network Security Architectures And Technology For
Interexchange Carriers And Web Services Providers./P P
Style="Margin: 0Px"A/P P Style="Margin: 0Px"David J. Smith, Ccie
No. 1986, Joined Cisco In 1995 And Is A Consulting System
Engineer Supporting The Service Provider Organization. David
Focuses On Ip Core And Edge Architectures Including Ip Routing,
Mpls Technologies, Qos, Infrastructure Security, And Network
Telemetry./P P Style="Margin: 0Px"A/P Ul Liunderstand The
Operation Of Ip Networks And Routers/Li Lilearn About The Many
Threat Models Facing Ip Networks, Layer 2 Ethernet Sw
Environments, And Ipsec And Mpls Vpn Services/Li /Ul Ul Lilearn
How To Segment And Protect Each Ip Traffic Plane By Applying
Defense In Depth And Breadth Principles/Li /Ul Ul Liuse Security
Techniques Such As Acls, Rate Limiting, Ip Options Filtering,
Urpf, Qos, Rtbh, Qppb, And Many Others To Protect The Data Plane
Of Ip And Switched Ethernet Networks/Li /Ul Ul Lisecure The Ip
Control Plane With Racl, Copp, Gtsm, Md5, Bgp And Icmp Techniques
And Layer 2 Switched Ethernet-Specific Techniques/Li Liprotect
The Ip Management Plane With Pas Management, Snmp, Ssh, Ntp,
Aaa, As Well As Other Vpn Management, Out-Of-Band Management, And
Remote Access Management Techniques/Li /Ul Ul Lisecure The Ip
Services Plane Using Recoloring, Ip Fragmentation Control, Mpls
Label Control, And Other Traffic Classification And Process
Control Techniques/Li /Ul P Style="Margin: 0Px"Athis Security
Book Is Part Of The Cisco Press Networking Technology Series.
Security Titles From Cisco Press Help Networking Professionals
Secure Critical Data And Resources, Prevent And Mitigate Network
Attacks, And Build End-To-End Self-Defending Networks./P P
Style="Margin: 0Px"A/P P Style="Margin: 0Px"A/P
- Used Book In Good Condition.