Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

L-LSP, MPLS QoS

L2TP access concentrator / L2TP network server (LAC/LNS)

l2tp-class command

L2TPv3 (Layer 2 Tunnel Protocol version 3)

     authentication

     compared to GRE

     control channel

     cookies

     data channel

     deployment models

     IOS configuration

     peer-based L3VPN architectures, RFC 2547bis

     session ID

     session setup

         control messages

         handshakes

         nonces

     tunnels

         L2VPN architectures

         RFC 2547 VPN over (WAN, VN extensions over)

         tunnel teardown control messages

L2VPN architectures

     peer-based architectures

         Ethernet over MPLS

         VPLS

     tunnel-based architectures

         auto-discovery

         auto-provisioning

         L2TPv3

         MP2MP using MPLS

         MPLS

         multicast support

L3VPN architectures

     peer-based architectures

         BGP best practices

         hub-and-spoke topologies

         iBGP multipaths

         IGP best practices

         migration recommendations

         RD

         RFC 2547 control-plane interaction

         RFC 2547bis 2nd

         RR

     tunnel-based architectures

         DMVPN

         GRE and IPsec tunnel configuration

         GRE tunnels 2nd

         hub-and-spoke topologies

         mGRE tunnels

         traffic mapping

Label Distribution Protocol (LDP)

label switched paths (LSPs)

     CE

     edge LSR

     FIBs

     IOS configuration

     LDP

     LSR

     MPLS packet forwarding

label switching routers (LSR)

LAC/LNS (L2TP access concentrator/L2TP network server)

LAN (local-area networks), VPN QoS models

Layer 2 (switched) connectivity, hierarchical campus design

Layer 2 circuits, WAN 2nd

Layer 2 client-based authentication

     802.1x

         protocols

         roles

     dot1x implementation

Layer 2 h2h architectures

     complexity of

     scalability of

     user groups

     VLAN 2nd

         access-distribution blocks

         access-distribution data path virtualization

         access-distribution segmentation

         assigning access ports

         virtual routed interfaces

Layer 3 (routed) technologies, hierarchical campus design 2nd

Layer 3 access

Layer 3 clientless authentication

Layer 3 h2h architectures

     ACL

     advantages of

     complexity

     core links, converting to dotlq trunks

     EIGRP address families

     hierarchy support

     network topologies

     PBR

     routed nodes

     scalability

     segmented campus networks

     static routing

     VLAN

     VLAN ID, creating for core data path virtualization

     VRF

         adding interfaces to

         assigning SVI

         creating

     VRF-lite

LDP (Label Distribution Protocol)

link congestion, MPLS QoS

Link optimization policy mechanism, QoS

link protection

     FRR

     MPLS QoS

load balancing

     GRE tunnel-based L3VPN architectures

     MPLS QoS

LR (logical routers)

LSP (label switched paths) 2nd

     CE

     edge LSR

     FIB

     IOS configuration

     LDP

     LSR

     MPLS

         packet forwarding

         QoS

     MPLS-TE, link protection

LSR (label switching routers)

     edge LSR

     MPLS QoS

Категории