Summary

In this chapter, we showed examples for managing CE and core routers. Note that the MPLS security best practice and design guidelines discussed in the previous chapters must be part of the NOC policies.

In the next chapter, we summarize the MPLS security principles by reviewing case studies.