Campus Network Design Fundamentals

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

SAFE blueprint

     Cisco Enterprise Composite Network Model

         Enterprise Campus Functional Area

         Enterprise Edge Functional Area

         Service Provider Edge Functional Area

SAN (storage area networking)

script-kiddies

security

     802.1x standard

     assessing

    attacks

         access attacks

         DoS attacks

         information disclosure attacks

         reconnaissance attacks

     best practices

         network management

         security policies, implementing

     Catalyst hardware security

     Catalyst native security

     CIS

     on voice networks

    on wireless networks

         802.11i standard

         AirDefense

         Fast Secure Roaming

         MAC address verification

         SSIDs

         threat mitigation

         WEP

     policies, implementing

     vulnerabilities

     WPA

security management

segments

self-defending networks

sequencing

serialization delay

Server module

services provided by CN

shaping traffic

shared trees

shared-key authentication

signaling traffic bandwidth

single-site IP telephony design

site surveys for wireless networks

site-local unicast addresses

Slammer worm

SLAs (service-level agreements)

SLB (Server Load Balancing)

snapshot routing

sniffing

SNMP (Simple Network Management Protocol)

SoBig.F worm

social engineering

source trees

sparse mode (PIM)

split-horizon rule

SSIDs (Service Set Identifiers)

SSL (secure sockets layer)

SSO (Stateful Switchover)

stacks

stateful firewalling

stateless autoconfiguration process (IPv6)

static packet filtering

static port membership

static routes 2nd

sticky-learning addresses

storage networking

storage networking models

STP (Spanning Tree Protocol) 2nd 3rd

     blocking state

     learning state

     link cost

     PVST

     RSTP

strategies for network management

strong authentication

subnet addresses

     available host addresses, calculating 2nd

     calculating

     device addresses, calculating

     summary routes, calculating

subnet masks

     prefixes

     VLSMs

         calculating

summarization

summary routes, calculating

SWAN (Cisco Structured Wireless-Aware Network)

switches 2nd

switching 2nd

     comparing to bridging

     Layer 2

         MAC addresses

         redundancy

     Layer 3

     learning process

         versus STP learning state

     MLS

     security

     trunks, VTP

    VLANs

         membership

         PVST

         trunks

switching the packet

SYN requests

syslog

Категории