Network Sales and Services Handbook (Cisco Press Networking Technology)
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Variable Length Subnet Masks (VLSM)
VLSM (Variable Length Subnet Masks)
VBR
VBRnrt
VBRrt
VCs (virtual circuits)
VDSL (Very-High-Data-Rate Digital Subscriber Line)
virtual addresses
logical addresses 2nd 3rd
virtual circuits:DLCIs:global addresses
global DLCI addresses
universal significance;DLCIs:universal significance
virtual circuits:SVCs:DLCIs
DLCIs
Frame Relay:SVCs:DLCIs;SVCs:DLCIs 2nd
virtual circuits:SVCs:E.164 addressing
DLCIs
Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing
virtual circuits:SVCs:X.121 addressing
DLCIs
Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing
viruses
VLANs
VLANs (Virtual LANs)
VLANs:WAN integration
WANs:VLAN integration
VoFr (Voice over Frame Relay)
voice networks:lines
lines
CO:lines;PBX (private branch exchange):lines;lines
voice networks:PSTN:dedicated access
PSTN:dedicated access
dedicated PSTN access
voice networks:PSTN:switched access
PSTN:switched access
switched PSTN access
VPNs:tunneling protocols
tunneling protocols
remote access:VPNs:tunneling protocols
VPNs:tunneling protocols:L2F
tunneling protocols:L2F
remote access:VPNs:L2F;L2F (Layer 2 Forwarding)
VPNs:tunneling protocols:L2TP
tunneling protocols:L2TP
remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol)
VPNs:tunneling protocols:PPTP
tunneling protocols:PPTP
remote access:VPNs:PPTP;PPTP
VRML (Virtual Reality Modeling Language)
vulnerability to WinNuke attack:testing
WinNuke attack
Категории