Router Security Strategies: Securing IP Network Traffic Planes 1st Edition

4.7 out of 5 stars 10 ratings
ISBN-13: 978-1587053368
ISBN-10: 1587053365
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell?
<Embed>
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Used: Like New | Details
Condition: Used: Like New
Comment: Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less
Access codes and supplements are not guaranteed with used items.
12 used from $23.94
& FREE Shipping
FREE delivery: May 10 - 14
Fastest delivery: May 4 - 6
Temporarily out of stock.
Order now and we'll deliver when available.
Order now and we'll deliver when available. We'll e-mail you with an estimated delivery date as soon as we have more information. Your account will only be charged when we ship the item.
Details
Ships from and sold by Amazon.com.
Available at a lower price from other sellers that may not offer free Prime shipping.
List Price: $79.99 Details
Save: $8.00 (10%)
8 new from $71.99
Router Security Strategie... has been added to your Cart
Available at a lower price from other sellers that may not offer free Prime shipping.

Yo-Yo Ma: Beginner's Mind
Hear an icon's life story, timeless music, and message. Listen free

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Frequently bought together

  • Router Security Strategies: Securing IP Network Traffic Planes
  • +
  • Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security (Networking Technology)
Total price: $121.48
Buy the selected items together

Special offers and product promotions

Editorial Reviews

From the Back Cover

Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking. 

 

The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section.

 

The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture.

 

“Understanding and securing IP traffic planes are critical to the overall security posture of the IP infrastructure.  The techniques detailed in this book provide protection and instrumentation enabling operators to understand and defend against attacks. As the vulnerability economy continues to mature, it is critical for both vendors and network providers to collaboratively deliver these protections to the IP infrastructure.”

–Russell Smoak, Director, Technical Services, Security Intelligence Engineering, Cisco

 

Gregg Schudel, CCIE® No. 9591, joined Cisco in 2000 as a consulting system engineer supporting the U.S. service provider organization. Gregg focuses on IP core network security architectures and technology for interexchange carriers and web services providers.

 

David J. Smith, CCIE No. 1986, joined Cisco in 1995 and is a consulting system engineer supporting the service provider organization. David focuses on IP core and edge architectures including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry.

 

  • Understand the operation of IP networks and routers
  • Learn about the many threat models facing IP networks, Layer 2 Ethernet switching environments, and IPsec and MPLS VPN services
  • Learn how to segment and protect each IP traffic plane by applying defense in depth and breadth principles
  • Use security techniques such as ACLs, rate limiting, IP Options filtering, uRPF, QoS, RTBH, QPPB, and many others to protect the data plane of IP and switched Ethernet networks
  • Secure the IP control plane with rACL, CoPP, GTSM, MD5, BGP and ICMP techniques and Layer 2 switched Ethernet-specific techniques
  • Protect the IP management plane with password management, SNMP, SSH, NTP, AAA, as well as other VPN management, out-of-band management, and remote access management techniques
  • Secure the IP services plane using recoloring, IP fragmentation control, MPLS label control, and other traffic classification and process control techniques

 This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

 

 

About the Author

Gregg Schudel,CCIE No. 9591 (Security), joined Cisco in 2000 as a consulting system engineer supporting the U.S. Service Provider Organization. Gregg focuses on IP core network and services security architectures and technology for inter-exchange carriers, web services providers, and mobile providers. Gregg is also part of a team of Corporate and Field resources focused on driving Cisco Service Provider Security Strategy. Prior to joining Cisco, Gregg worked for many years with BBN Technologies, where he supported network security research and development, most notably in conjunction with DARPA and other federal agencies involved in security research. Gregg holds an MS in engineering from George Washington University, and a BS in engineering from Florida Institute of Technology. Gregg can be contacted through e-mail at gschudel@cisco.com.

 

David J. Smith, CCIE No. 1986 (Routing and Switching), joined Cisco in 1995 and is a consulting system engineer supporting the Service Provider Organization. Since 1999 David has focused on service provider IP core and edge architectures, including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry. Between 1995 and 1999, David supported enterprise customers designing campus and global WANs. Prior to joining Cisco, David worked at Bellcore developing systems software and experimental ATM switches. David holds an MS in information networking from Carnegie Mellon University, and a BS in computer engineering from Lehigh University. David can be contacted through e-mail at dasmith@cisco.com.


Yo-Yo Ma: Beginner's Mind
Hear an icon's life story, timeless music, and message. Listen free

Product details

  • Publisher : Cisco Press; 1st edition (December 29, 2007)
  • Language : English
  • Paperback : 672 pages
  • ISBN-10 : 1587053365
  • ISBN-13 : 978-1587053368
  • Item Weight : 3.53 ounces
  • Dimensions : 7.2 x 1.5 x 9 inches
  • Customer Reviews:
    4.7 out of 5 stars 10 ratings

Customer reviews

4.7 out of 5 stars
4.7 out of 5
10 global ratings
5 star
75%
4 star
25%
3 star 0% (0%) 0%
2 star 0% (0%) 0%
1 star 0% (0%) 0%
How are ratings calculated?

Top reviews from the United States

Reviewed in the United States on January 4, 2018
Verified Purchase
Reviewed in the United States on August 9, 2016
Verified Purchase
Reviewed in the United States on February 11, 2008
7 people found this helpful
Report abuse
Reviewed in the United States on March 25, 2008
Pages with related products. See and discover other items: cisco security, tcp/ip protocols, tcp ip protocols