Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

SA (security associations)

Sarbanes-Oxley Act, security controls

scalability, VLANs

scalable enterprise networks

     campuses

         hierarchical design

         modular design

         virtualization

     hub-and-spoke topologies

     WAN

         aggregation routers

         branch-end routers

         dedicating routers at network core

         dual-circuit resiliency

         hierarchical architecture

         IP service with VPN overlay routing adjacencies

         IPsec/GRE headend routers

         IPsec/GRE stateful resiliency

         ISDN backup resiliency

         multilayer switches

         point-to-cloud IP service routing adjacencies

         point-to-point service routing

         private point-to-cloud connectivity

         private point-to-point connectivity

         private spoke-to-spoke connectivity

         security

         tunnel overlay resiliency

         virtualization

secure service areas (convergent services)

security

     controls

     firewalls 2nd

     network perimeters 2nd

         common services positioning

         firewalls

         fusion routers

         IDS

         unprotected services

     policies, enforcing with access switches

     ports, static clientless authentication

     WAN, scalable enterprise network design

security associations (SA)

Security Parameter Index (SPI) fields

segmentation

     control-plane-based

     policy-based

         code points

         hub-and-spoke policy-based segmentation

servers

     authentication servers (802.1x networks)

     server farms, virtualization

services

     common services positioning

     firewalls

     shared services

         DHCP services

         protected services, firewalls 2nd

         unprotected services 2nd

shared trees

short pipes, MPLS QoS

show ip cef forwarding vrf name detail command

show ip route command

show ip route vrf command

single-hop data path virtualization

source mVRFs

source provider edge (PE)

source trees

Source-Specific Multicast (SSM)

SP (service providers)

Sparse mode (PIM-SM)

SPF (shortest path first)

     CSPF

     MPLS-TE

SPI (Security Parameter Index) fields

spoke-to-spoke connectivity, WAN

SSM (Source-Specific Multicast)

stacking access switches

static NAT, routed firewalls 2nd

static network membership

static routing, Layer 3 h2h architectures

supplicants (802.1x networks)

SVI (switch virtual interfaces)

     VLAN, h2h architectures

     VRF, assigning to

switches, MAC table

Категории