Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC4778
Discuss this RFC: Send questions or comments to the mailing listopsec@ietf.org
Other actions:View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 4778
This document is a survey of the current practices used in today'slarge ISP operational networks to secure layer 2 and layer 3infrastructure devices. The information listed here is the result ofinformation gathered from people directly responsible for definingand implementing secure infrastructures in Internet Service Providerenvironments. This memo provides information for the Internet community.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.