Network Sales and Services Handbook (Cisco Press Networking Technology)

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

Variable Length Subnet Masks (VLSM)

    VLSM (Variable Length Subnet Masks) 

VBR 

VBRnrt 

VBRrt 

VCs (virtual circuits) 

VDSL (Very-High-Data-Rate Digital Subscriber Line) 

virtual addresses

    logical addresses  2nd  3rd 

virtual circuits:DLCIs:global addresses

    global DLCI addresses

        universal significance;DLCIs:universal significance 

virtual circuits:SVCs:DLCIs

    DLCIs

        Frame Relay:SVCs:DLCIs;SVCs:DLCIs  2nd 

virtual circuits:SVCs:E.164 addressing

    DLCIs

        Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing 

virtual circuits:SVCs:X.121 addressing

    DLCIs

        Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing 

viruses 

VLANs 

VLANs (Virtual LANs) 

VLANs:WAN integration

    WANs:VLAN integration 

VoFr (Voice over Frame Relay) 

voice networks:lines

    lines

        CO:lines;PBX (private branch exchange):lines;lines 

voice networks:PSTN:dedicated access

    PSTN:dedicated access

        dedicated PSTN access 

voice networks:PSTN:switched access

    PSTN:switched access

        switched PSTN access 

VPNs:tunneling protocols

    tunneling protocols

        remote access:VPNs:tunneling protocols 

VPNs:tunneling protocols:L2F

    tunneling protocols:L2F

        remote access:VPNs:L2F;L2F (Layer 2 Forwarding) 

VPNs:tunneling protocols:L2TP

    tunneling protocols:L2TP

        remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol) 

VPNs:tunneling protocols:PPTP

    tunneling protocols:PPTP

        remote access:VPNs:PPTP;PPTP 

VRML (Virtual Reality Modeling Language) 

vulnerability to WinNuke attack:testing

    WinNuke attack 

Категории