Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

TE (traffic engineering)

     CBR

     MPLS QoS 2nd

Time To Live (TTL)

topologies

     design

     hierarchical campus design

     hub-and-spoke

         peer-based L3VPN architectures

         scalable enterprise network design

         tunnel-based L3VPN architectures

     network topologies, Layer 3 h2h architectures

     Pseudowire, peer-based L2VPN architectures

transform sets (IPsec)

transparent firewalls 2nd

transparent mode (firewalls)

transport mode (IPsec)

transport virtualization

     control plane

     control-plane-based segmentation

     data-path virtualization

     device virtualization

     forwarding plane

     levels of virtualization

     policy-based segmentation

     scalability

     VLANs

tree structure (IP multicast)

     shared trees

     source trees

tunnel mode (IPsec)

tunnel overlay

     advantages/disadvantages

     GRE configuration

     GRE tunnel overlay

     mGRE

     multicast configuration

     resiliency (WAN), scalable enterprise network design

     RP configuration

tunnel-based L2VPN architectures

     auto-discovery

     auto-provisioning

     L2TPv3

     MP2MP using MPLS

     MPLS

     multicast support

tunnel-based L3VPN architectures

     DMVPN

     GRE tunnels 2nd

         failovers

         failure detection

         hub configurations

         hub routes in hub-and-spoke mGRE overlays

         IGP

         load balancing

         OSPF

         overlay encryption

         resiliency

         spoke configurations

     hub-and-spoke topologies

     IPsec tunnel configuration

     mGRE tunnels

         hub configurations

         hubconfigurations

         mapping subnets to VRF

         NHRP

         spoke configurations

     traffic mapping

tunnels

     h2h IP tunnels, VPN QoS models

     MPLS QoS

Категории