References


The following sections list publicly available resources that detail the best recommendations for securing networks. Barry Greene, a corporate consulting engineer at Cisco Systems and an Internet security expert, supplied many of these links.

Comparing MPLS VPN to Frame Relay Security

Mier Report on security comparison on MPLS VPN and Frame Relay networks

Cisco MPLS-based VPNs: Equivalent to the security of Frame Relay and ATM

http://www.miercom.com/?url=reports/&v=16&tf=-3&st=v

ACL Information

Cisco Reference for IP Receive ACLs http://www.cisco.com/en/US/products/sw/iosswrel/ps1829/products_feature_guide09186a00800a8531.html

Team CYMRU provides configuration templates, security templates, and other services to help make the Internet a safer place to network. These can be found at http://www.cymru.com/.

Miscellaneous Security Tools

Cisco reference for uRPF
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter09186a00800ca7d4.html

Cisco Reference for MPLS Technology and Operation

http://www.cisco.com/pcgi-bin/Support/browse/index.pl?i=Technologies&f=3694

Cisco Reference for Cisco Express Forwarding

http://www.cisco.com/en/US/tech/tk827/tk831/tk102/tech_protocol_home.html

Public Online ISP Security Bootcamp

Singapore Summer 2003
http://palomar.getitmm.com/bootcamp/

Barry Raveendran Greene, Philip Smith. Cisco ISP Essentials. Cisco Press, 2002.

Tutorials, Workshops, and Bootcamps

ftp://ftp-eng.cisco.com/cons/

http://www.ispbook.com

Barry Raveendran Greene and Philip Smith. Cisco ISP Essentials. Cisco Press, 2002.

Original Backscatter Traceback and Customer-Triggered Remote-Triggered Black-Hole Techniques

http://www.secsup.org/Tracking/

http://www.secsup.org/CustomerBlackHole/

Source for Good Papers on Internet Technologies and Security

http://www.caida.org/

Security Work Definitions

What Is a BOTNET?
http://swatit.org/bots/index.html

Keeping track of vulnerabilities in network elements
http://www.securitytracker.com/startup/index.html

NANOG SP Security Seminars and Talks

Tutorial: Implementing a Secure Network Infrastructure (Part I)
http://www.nanog.org/mtg-0310/kaeo.html

Tutorial: ISP SecurityReal World Techniques I: Remote Triggered Black Hole Filtering and Backscatter Traceback
http://www.nanog.org/mtg-0110/greene.html

Tutorial: ISP SecurityReal World Techniques II: Secure the CPE Edge
http://www.nanog.org/mtg-0210/ispsecure.html

Tutorial: ISP Security: Deploying and Using Sinkholes
http://www.nanog.org/mtg-0306/sink.html

Tutorial: Deploying IP Anycast
http://www.nanog.org/mtg-0310/miller.html

Watching Your Router Configurations and Detecting Those Exciting Little Changes
http://www.nanog.org/mtg-0310/rancid.html

Building a Web of Trust
http://www.nanog.org/mtg-0310/abley.html

The Relationship Between Network Security and Spam
http://www.nanog.org/mtg-0310/spam.html

Simple Router Security: What Every ISP Router Engineer Should Know and Practice
http://www.nanog.org/mtg-0310/routersec.html

Flawed Routers Flood University of Wisconsin Internet Time Server
http://www.nanog.org/mtg-0310/plonka.html

Trends in Denial of Service Attack Technology
http://www.nanog.org/mtg-0110/cert.html

Recent Internet Worms: Who Are the Victims, and How Good Are We at Getting the Word Out?
http://www.nanog.org/mtg-0110/moore.html

DoS Attacks in the Real World
http://www.nanog.org/mtg-0110/irc.html

Diversion & Sieving Techniques to Defeat DDoS
http://www.nanog.org/mtg-0110/afek.html

DNS DamageMeasurements at a Root Server
http://www.nanog.org/mtg-0202/evi.html

Protecting the BGP Routes to Top Level DNS Servers
http://www.nanog.org/mtg-0206/bush.html

BGP Security Update
http://www.nanog.org/mtg-0206/barry.html

Industry/Government Infrastructure Vulnerability Assessment: Background and Recommendations
http://www.nanog.org/mtg-0206/avi.html

A National Strategy to Secure Cyberspace
http://www.nanog.org/mtg-0210/sachs.html

How to Own the Internet in Your Spare Time
http://www.nanog.org/mtg-0210/vern.html

Birds of a Feather and General Security Discussion Sessions at NANOG

ISP Security BOF I
http://www.nanog.org/mtg-0210/securebof.html

The Spread of the Sapphire/Slammer Worm
http://www.nanog.org/mtg-0302/weaver.html

ISP Security BOF II
http://www.nanog.org/mtg-0302/securebof.html

The BGP TTL Security Hack
http://www.nanog.org/mtg-0302/hack.html

Security Considerations for Network Architecture
http://www.nanog.org/mtg-0302/avi.html

Lack of Priority Queuing on Route Processors Considered Harmful
http://www.nanog.org/mtg-0302/gill.html

Interception Technology: The Good, The Bad, and The Ugly!
http://www.nanog.org/mtg-0306/schiller.html

The NIAC Vulnerability Disclosure Framework and What It Might Mean to the ISP Community
http://www.nanog.org/mtg-0306/duncan.html

Inter-Provider Coordination for Real-Time Tracebacks
http://www.nanog.org/mtg-0306/moriarity.html

ISP Security BOF III
http://www.nanog.org/mtg-0306/securitybof.html

S-BGP/soBGP Panel: What Do We Really Need and How Do We Architect a Compromise to Get It?
http://www.nanog.org/mtg-0306/sbgp.html

BGP Vulnerability Testing: Separating Fact from FUD
http://www.nanog.org/mtg-0306/franz.html

BGP Attack TreesReal World Examples
http://www.nanog.org/mtg-0306/hares.html

NRIC Best Practices for ISP Security
http://www.nanog.org/mtg-0306/callon.html

RIPE-46 BoF: NSP-SEC (Hank Nussbacher)
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-nspbof-nsp-sec.pdf

IRT Object in the RIPE Database (Ulrich Kiermayr)
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-nspbof-irt.pdf

Operational Security Requirements (George M. Jones)
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-techsec-ops-security.pdf

Infrastructure Security (Nicholas Fischbach)
http://www.ripe.net/ripe/meetings/ripe-46/presentations/ripe46-nspbof-fischbach.pdf

Sean Convery. Network Security Architectures. Cisco Press, 2004.

Barry Greene. Cisco ISP Essentials. Cisco Press, 2002.

Saadat Malik. Network Security Principles and Practices. Cisco Press, 2002.

CCSP Study Guides by Cisco Press.




Selecting MPLS VPN Services
Selecting MPLS VPN Services
ISBN: 1587051915
EAN: 2147483647
Year: 2004
Pages: 136

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net