 MPLS VPN SecurityA practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and... |  |  Virtual Private Networks, 2nd Edition (O'Reilly Nutshell)This book explains how to build a Virtual Private Network (VPN), a collection of technologies that creates secure collections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista... |  |  |