LDP RFC 3036 PDF

Since its inception more than a decade ago, multiprotocol label switching MPLS has become one of the fastest-growing telecommunications infrastructure technologies. The speed, flexibility, sophisticated traffic management and cost savings offered by MPLS have prompted service providers to converge existing and new technologies onto common MPLS backbones. The rapid adoption of MPLS raises significant concerns — primarily because of the dependence of critical communication services on a technology that has yet to undergo significant security testing. Our analysis has identified ten attacks that exploit weaknesses in the LDP specification: six attacks that disrupt service and four that divert traffic from intended routes. Details of the attacks are presented along with suggested mitigation strategies and security postures.

Author:Arashishura Maujas
Country:Libya
Language:English (Spanish)
Genre:Politics
Published (Last):10 December 2018
Pages:423
PDF File Size:18.87 Mb
ePub File Size:8.7 Mb
ISBN:722-6-35312-437-1
Downloads:64948
Price:Free* [*Free Regsitration Required]
Uploader:Gojind



Committed to connecting the world. ITU-T work programme. ITU-T A. Justification for the specific reference: Draft Rec. Relationship with other existing or emerging documents: References within the referenced RFC are listed under item 8. Feldman, B. Jamoussi, S. Andersson, A. Fredette, B. Jamoussi, R. Callon, P. Feldman, E. Gray, J. Halpern, J. Heinanen T. Kilty, A. Malis, M. Girish, K. Sundell, P. Worster, L.

Wu, R. Comments on RFCs and corresponding changes are accommodated through the existing standardization process. All RFCs always remain available on-line. Other for any supplementary information : All RFCs are available on-line. Feedback Contact Us Accessibility. Clear description of the referenced document:.

Justification for the specific reference:. Draft Rec. Current information, if any, about IPR issues:. Other useful information describing the "Quality" of the document:. The degree of stability or maturity of the document:. Relationship with other existing or emerging documents:. References within the referenced RFC are listed under item 8.

Any explicit references within that referenced document should also be listed:. Other for any supplementary information :. All RFCs are available on-line.

THE WATER PUZZLE AND THE HEXAGONAL KEY PDF

About This Network Configuration Example

.

LA SPARTIZIONE PIERO CHIARA PDF

Cisco Nexus 7000 Series NX-OS MPLS Configuration Guide

.

ARECONT AV8185DN PDF

ITU-T work programme

.

FROISSARTAGE PDF

Security Analysis of the MPLS Label Distribution Protocol

.

Related Articles