Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

CAM (content-addressable memory)

campuses

     hierarchical design

         access switches

         distribution switches

         equal-cost paths

         failure-isolation features

         failures, effects of

         IGP

         Layer 2 (switched) connectivity

         Layer 3 (routed) technologies

         network layers, collapsing

         topology designs

         VLAN

     modular design

car manufacturers, virtualization

CBR (constraint-based routing)

     MPLS-TE

     TE

CDP (Cisco Discovery Protocol)

CDPv2 (Cisco Discovery Protocol Version 2)

CE (customer edge)

centralized policies

CHAP (Challenge Handshake Authentication Protocol)

Class D addresses

Classification policy mechanism, QoS

client-based Layer 2 authentication

     802.1x protocols

     802.1x roles

     dot1x implementation

clientless authentication

     centralized dynamic clientless authentication

     Layer 3 clientless authentication

     MAC authentication

     static clientless authentication

collapsing network layers, hierarchical campus design

colleges, virtualization

communication interfaces, virtual enterprise networks

configuration

     dot1x client-based authentication

     GRE 2nd

     IPsec

     L2TPv3 2nd

     LSPs

     mVPN

         D1 BGP configuration

         MVRF and MDT configuration on D1

         native multicast configuration on C1

     OSPF

     per-VRF iBGP configuration

     per-VRF RIP configuration

     RP

Congestion avoidance policy mechanism, QoS

constrained routing, h2h architectures

consultant access (networks)

content-addressable memory (CAM)

contractors access (networks)

control-plane

     segmentation

     virtualization 2nd

         MTR

         OSPF

         per-VRF iBGP configuration

         per-VRF RIP configuration

         summary

         VRF-aware routing

convergent services, reasons for virtualization

core layer, hierarchical WAN architecture

core links, converting to dotlq trunks

crypto isakamp policy command

crypto maps

CsC (Carrier supporting Carrier)

     VPN

     WAN, VN extensions over

CSPF, MPLS-TE

CT (Class-Types)

     BC

         MAM

         RDM

     DS-TE

     guaranteed bandwidth

customer edge (CE)

Категории