North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

MPLS security book

  • From: Kim Onnel
  • Date: Sun Aug 28 08:29:26 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=Rp9A18BVKT+3wIOXT+og5t+iF4wmNoSEyG+8ovAbww/LDBel9SXfeALNl4QmoYa17qx0YO5TTfXCu/qObmO6G6Nvio7WNp41Jn+dHGqhyWsGgzSLaTOpc6YCnJRVaRMCw6g6DLh9cUa4YR1V14Ygwqod4KtroIF8naPvaI7gbcM=

Hello,

I've been reading through Cisco press MPLS VPN Security book, too many
assumtions about spoofing labels, getting access to core, PE, another
VPN,....

in security nothing should be taken for granted, but has there been
any real world incidents where such scenarios have been really
occuring ?

Regards