|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910696900303321 |
|
|
Autore |
Kuhn D. Richard |
|
|
Titolo |
Border Gateway Protocol security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Rick Kuhn, Kotikalapudi Sriram, Doug Montgomery |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006] |
|
|
|
|
|
|
|
|
|
Edizione |
[Draft.] |
|
|
|
|
|
Descrizione fisica |
|
57 unnumbered pages : digital, PDF file |
|
|
|
|
|
|
Collana |
|
NIST special publication ; ; 800-54. Computer security |
|
|
|
|
|
|
Altri autori (Persone) |
|
SriramKotikalapudi |
MontgomeryDoug (Computer scientist) |
|
|
|
|
|
|
|
|
Soggetti |
|
BGP (Computer network protocol) - Security measures - Standards - United States |
Routers (Computer networks) - Security measures - Standards - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on July 17, 2008). |
"September 2006." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to greatly improved BGP security, they are not a complete defense against all threats. Security administrators and decision makers should select and apply these methods based on their unique needs. |
|
|
|
|
|
|
|