Summary

This chapter provided a detailed reference with respect to security best practices for organizations that either implement Layer 2 MPL VPNs as a service offering or for consumers of such services.

We examined security considerations?both service provider and customer perspectives. This chapter addressed current practices for protecting the network elements, network services, and the data itself from compromises ensuing from unintentional errors as well as deliberate attacks. Finally, we focused on Ethernet over MPLS deployments because these are most complex for Layer 2 constructs.