Selecting MPLS VPN Services

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]

acceptance testing

access

     as server provider selection criteria

access technologies

     ATM

         QoS characteristics

     ATM PVC from CE to PE

     dedicated circuit from CE to PE

     Frame Relay

     Frame Relay PVC from CE to PE

     metro Ethernet

ACLs

     boundary ACLs

         configuring

     effectiveness against attacks

     infrastructure ACLs

     receive ACLs

Acme

     backbone WAN

     global span

     IT applications base

     IT communications infrastructure

     management's business needs

     new technology considerations

         Layer 2 IP/MPLS VPN services 2nd

         Layer 3 IP/MPLS VPN services 2nd

     regional WANs

Acme, Inc. case studies

     remote user access

Acme, Inc. case study

     analysing service requirements 2nd

         congestion 2nd

         delay

         evaluation tools

         load testing 2nd

         post-transition results

         routing convergence

         TCCP

         transition issues

         vendor knowledge

     QoS for low-speed links 2nd

activing

     QoS on switch devices

address resolution

     NHRP, configuring

addressing

addressing schemes for multicast

     administratively scoped addresses

     well-known group address ranges

administratively scoped multicast addresses

anatomy of DDoS attacks 2nd

anycast address

anycast sinkholes

application trust

applying

     multicast boundaries to router interface

     QoS to backup WAN circuits

architecture of botnets

areas

ASICs (application-specific integrated circuits)

ASM (Any Source Multicast)

ASM (Any-Source Multicast)

assigning

     metrics

async default ip address command

ATM

     QoS characteristics

ATM PVC from CE to PE

attacks

     automating with botnets

    DDoS

         anatomy of 2nd

     identifying

     mitigating

    mitigation techniques

         backscatter traceback 2nd

         Cisco Guard

         loose uRPF for source-based filtering

         remote-triggered black-hole filtering

         sinkholes

         strict uRPF 2nd

     preparing for

    via worms

         mitigating 2nd

authentication

     MD5 2nd

     MD5 authentication

     plaintext password authentication

Auto-RP

automated CE provisioning

automated PE provisioning

automating attacks with botnets

availability

     five-nines

Категории