Главная
Study mode:
on
1
THE ROCKET CITY
2
BGP Hijacking in the News
3
Virtual Private Networks
4
MPLS and the OSI and TCPAP Model
5
MPLS Label PCAP
6
MPLS Architecture Overview
7
CLI - VRF configuration
8
MPLS PE Routing Table
9
MPLS PE MP-BGP VPN
10
MPLS Network Attack Vectors
11
Network Management Architecture for a Service Provider
12
Service Provider MPLS Network
13
Transit Between MPLS-VPN backbones
14
MPLS Security Recommendations
15
References
Description:
Explore the intricacies of hijacking label switched networks in the cloud through this 31-minute conference talk from Takedowncon Rocketcity 2014. Delve into topics such as BGP hijacking, virtual private networks, MPLS architecture, and its relation to OSI and TCP/IP models. Examine MPLS label PCAP, CLI VRF configuration, and MPLS PE routing tables. Investigate MPLS network attack vectors, network management architecture for service providers, and transit between MPLS-VPN backbones. Gain insights into MPLS security recommendations and access valuable references to enhance your understanding of cloud network security.

Hijacking Label Switched Networks in the Cloud

Add to list
0:00 / 0:00