1.

Record Nr.

UNISOBSOBE00076636

Autore

Leo, Maurizio

Titolo

2 / Maurizio Leo, Felice Monacchi, Mario Schiavo

Pubbl/distr/stampa

Milano, : Giuffrè, 1999

Edizione

[6. ed. completamente rifatta e aggiornata al 15 giugno 1999]

Descrizione fisica

P. 1340-2126 ; 24 cm

Altri autori (Persone)

Monacchi, Felice

Schiavo, Mario

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Segue: Appendice

2.

Record Nr.

UNINA9910696900303321

Autore

Kuhn D. Richard

Titolo

Border Gateway Protocol security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Rick Kuhn, Kotikalapudi Sriram, Doug Montgomery

Pubbl/distr/stampa

Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006]

Edizione

[Draft.]

Descrizione fisica

57 unnumbered pages : digital, PDF file

Collana

NIST special publication ; ; 800-54. Computer security

Altri autori (Persone)

SriramKotikalapudi

MontgomeryDoug (Computer scientist)

Soggetti

BGP (Computer network protocol) - Security measures - Standards - United States

Routers (Computer networks) - Security measures - Standards - United States

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed on July 17, 2008).



"September 2006."

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to greatly improved BGP security, they are not a complete defense against all threats. Security administrators and decision makers should select and apply these methods based on their unique needs.