Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of hijacking label switched networks in the cloud through this 31-minute conference talk from Takedowncon Rocketcity 2014. Delve into topics such as BGP hijacking, virtual private networks, MPLS architecture, and its relation to OSI and TCP/IP models. Examine MPLS label PCAP, CLI VRF configuration, and MPLS PE routing tables. Investigate MPLS network attack vectors, network management architecture for service providers, and transit between MPLS-VPN backbones. Gain insights into MPLS security recommendations and access valuable references to enhance your understanding of cloud network security.
Syllabus
THE ROCKET CITY
BGP Hijacking in the News
Virtual Private Networks
MPLS and the OSI and TCPAP Model
MPLS Label PCAP
MPLS Architecture Overview
CLI - VRF configuration
MPLS PE Routing Table
MPLS PE MP-BGP VPN
MPLS Network Attack Vectors
Network Management Architecture for a Service Provider
Service Provider MPLS Network
Transit Between MPLS-VPN backbones
MPLS Security Recommendations
References