This book tackles the subject of MPLS VPN security for network managers, CTOs, enterprise IT managers, and network service architects.<i>MPLS VPN Security</i>provides a thorough overview of MPLS security, with practical recommendations on how to securely implement and operate MPLS networks. It begin
MPLS VPN Security
โ Scribed by Michael H. Behringer, Monique J. Morrow
- Publisher
- Cisco Press
- Year
- 2005
- Tongue
- English
- Leaves
- 286
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Programmers are craftspeople trained to use a certain set of tools (editors, object managers, version trackers) to generate a certain kind of product (programs) that will operate in some environment (operating systems on hardware assemblies). Like any other craft, computer programming has spawned a body of wisdom, most of which isn't taught at universities or in certification classes. Most programmers arrive at the so-called tricks of the trade over time, through independent experimentation. In The Pragmatic Programmer, Andrew Hunt and David Thomas codify many of the truths they've discovered during their respective careers as designers of software and writers of code.Some of the authors' nuggets of pragmatism are concrete, and the path to their implementation is clear. They advise readers to learn one text editor, for example, and use it for everything. They also recommend the use of version-tracking software for even the smallest projects, and promote the merits of learning regular expression syntax and a text-manipulation language. Other (perhaps more valuable) advice is more light-hearted. In the debugging section, it is noted that, "if you see hoof prints think horses, not zebras. That is, suspect everything, but start looking for problems in the most obvious places. There are recommendations for making estimates of time and expense, and for integrating testing into the development process. You'll want a copy of The Pragmatic Programmer for two reasons: it displays your own accumulated wisdom more cleanly than you ever bothered to state it, and it introduces you to methods of work that you may not yet have considered. Working programmers will enjoy this book.
๐ SIMILAR VOLUMES
A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousan
<p>Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs</p><ul><li>Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions</li><li>Offers in-depth analysis of MPLS architecture</li><li>Helps you learn how MPLS scales t
This is a guide for those using and defining MPLS VPN services.
Multiprotocol Label Switching (MPLS) provides the mechanisms to perform label switching, which is an innovative technique for high-performance packet forwarding. This book provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, and case studies.
MPLS and VPN Architectures, Volume II , begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration ofservice provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSP