This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
This document is a survey of the current practices used in today's large
ISP operational networks to secure layer 2 and layer 3 infrastructure devices. The
information listed here is the result of information gathered from people directly responsible
for defining and implementing secure infrastructures in Internet Service
Provider environments. This memo provides information for the Internet community.
Merike Kaeo <email@example.com>
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)