Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

h2h (hop-to-hop) architectures

     ACL

     constrained routing

     IP tunnels, VPN QoS models

     Layer 2 solutions

         complexity of

         scalability of

         user groups

         VLAN 2nd

     Layer 3 solutions

         ACL

         adding interfaces to VRF

         advantages of

         complexity

         converting core links to dotlq trunks

         creating VLAN

         creating VRF

         EIGRP address families

         hierarchy support

         network topologies

         PBR

         routed nodes

         scalability

         segmented campus networks

         static routing

         VLAN ID, creating for core data path virtualization

         VRF, assigning SVI to

         VRF-lite

     MTR

     PBR

headers

     GRE

     IPsec

hierarchical campus design (scalable enterprise networks)

     access switches

     distribution switches

     equal-cost paths

     failure-isolation features

     failures, effects of

     IGP

     Layer 2 (switched) connectivity

     Layer 3 (routed) technologies

     network layers, collapsing

     topology designs

     VLAN

     VPN

hierarchical QoS (Quality of Service)

hierarchical WAN architecture

HIPAA (Health Insurance Portability and Accountability Act), security controls

hub-and-spoke policy-based segmentation

hub-and-spoke topologies

     peer-based L3VPN architectures

     scalable enterprise network design

     tunnel-based L3VPN architectures

hub-and-spoke VPN, unprotected shared services

Категории