Abstract
As a result of globalization, companies are striving to reach out to their customers, suppliers and partners thus extending their enterprise to provide access to critical information and offer their services upon whom their business is dependent. The bedrock of far reaching enterprise is IP network. Researchers have developed core network technology like MPLS with promising features of flexibility, scalability and security to enable enterprises to extend their businesses and transact successfully. As a result, MPLS is widely used in supporting applications like data, voice and video on the internet. It has been highly competitive from its predecessors Frame relay and ATM in terms of providing supports services. Notwithstanding its attributes, there are vulnerabilities and risks associated with MPLS. Recent papers and research reports have highlighted such issues. This paper represents a further contribution in identifying MPLS vulnerabilities and risks. In addition to discussing conventional approach of mitigating those risks, the paper also proposes IPSEC over MPLS VPN and its benefit over conventional approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Meta switch Network, http://www.metaswitch.com/MPLS/what-is-MPLS.aspx
Cramsession articles what you need when you need, http://www.cramsession.com/articles/get-article.asp?aid=329
Fischer, T.: MPLS security Overview. IRM PLC (December 2007)
Raza: Online routing of bandwidth guaranteed paths with local restoration using optimized aggregate usage information. In: IEEE-ICC (2005)
Li, L.: Routing bandwidth guaranteed paths with local restoration in label switched networks. IEEE journal on selected areas in communications (2006)
Harrell, R.: Carrier MPLS support for VOIP
Palmieri, F.: VPN scalability over high performance backbones evaluating MPLS VPN against traditional approaches. In: Proceeding of the Eighth IEEE international symposium on computers and communication (2003)
Behringer, M.H., Morrow, M.J.: How IPSEC complements MPLS. Cisco press, Networkworld (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shirazi, S.NuH., Asim, M., Irfan, M., Ikram, N. (2010). MPLS Unleashed: Remedy Using IPSEC over MPLS VPN. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)