infrastructure security


My coauthors and I are looking for more input on a draft that we wrote on infrastructure security. The draft is intended to document methods that providers can refer to and implement to harden their network. The draft is broken up into several different areas, Edge Infrastructure ACLs, Edge rewriting/remarking, Device/element protection, and Infrastructure hiding. We are very interested in getting more feedback from network operators.

The draft can be found at:


Peter Schoenmaker