Network Sales and Services Handbook (Cisco Press Networking Technology)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

back doors:unauthorized access

    unauthorized access:back doors 

backbone hubs 

backbone routers 

backup power supplies  2nd 

BDRs (backup designated routers) 

best effort services

    UBR 

BGP:administrative distance

    administrative distance:BGP

        metrics:administrative distance;EGPs:BGP:administrative distance 

BGP:attributes

    EGPs:BGP:attributes

        attributes:BGP  2nd 

BGP:communities

    communities 

BGP:confederations

    confederations

        EGPs:BGP:confederations 

BGP:IBGP versus EBGP

    EBGP:versus IBGP

        IBGP:versus:EBGP 

BGP:multihoming

    multihoming

        EGPs:BGP:multihoming  2nd 

BGP:route reflectors

    route reflectors

        EGPs:BGP:route reflectors  2nd 

BGP:timers

    timers:BGP

        EGPs:BGP:timers 

BIAs (burned-in addresses)

    burned-in addresses (BIAs) 

binary representation of IP addresses  2nd 

bit buckets 

black-box-based VPNs

    VPNs:black-box-based

        remote access:VPNs:black-box-based 

Blocking state (STP) 

break-ins

    security:data diddling

        data diddling;data destruction;attacks:data destruction;security:data destruction 

bridge clips

    customer premise:66-block installation 

bridged taps 

bridges 

broadcasting 

brute-force attacks

    attacks:brute-force 

bus network termination points 

Категории