Network Virtualization

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

VFI (Virtual Forwarding Instances)

virtual firewall contexts

virtual project environments

virtual routed interfaces, Layer 2 h2h architectures

virtual teams

virtualization

     acquisitions/mergers

     benefits of

     business requirements

     covergent services

     multitenant enterprises

     networks

         consolidation

         restricting access

     reasons for

     regulatory compliance

     secure service areas

     server farms

     virtual project environments

     WAN, scalable enterprise network design

viruses, quarantine VN segments

visitor access (networks)

VLAN (Virtual Local Area Networks)

     access switches

     device virtualization

     guest VLANs

     hierarchical campus design 2nd

     Layer 2 h2h architectures 2nd

         access-distribution blocks

         access-distribution data path virtualization

         access-distribution segmentation

         assigning access ports

         virtual routed interfaces

     Layer 3 h2h architectures, creating VLAN

     private VLANs

     scalability

     SVI, h2h architectures

     switch MAC table

     VLAN ID, creating for core data path virtualization

VMPS (VLAN Management Project Servers)

VNs (virtual networks) 2nd

     authentication

     authorization

     control-plane virtualization

         MTR

         OSPF

         per-VRF iBGP configuration

         per-VRF RIP configuration

         summary

         VRF-aware routing

     data-path virtualization

         802.1q trunking

         GRE

         IPsec

         L2TPv3

         LSP

         summary

     device virtualization

         definition of

         network infrastructure requirements

         summary

         VFIs

         virtual firewall contexts

         VLAN

         VRF

     enterprise networks

         centralized policies

         communication interfaces

         functional areas

         functional blocks

         functionality of

         VRF 2nd

     network perimeters

         common services positioning

         firewalls

         fusion routers

         IDS

         unprotected services

     transport virtualization

         control plane

         control-plane-based segmentation

         data-path virtualization

         device virtualization

         forwarding plane

         levels of virtualization

         policy-based segmentation

         scalability

         VLAN

     VPN 2nd

     VRF

         definition of

         displaying

         FIB

         LR

         multiple VRF on routers

         resource allocation

         RIB

         routing table information

         sharing routes between

         traffic processing

         VR

         VRF awareness

     WAN, extensions over

         contracting multiple IP VPN

         CsC

         MPLS over GRE

         MPLS over Layer 2 circuits

         RFC 2547 VPN over DMVPN

         RFC 2547 VPN over L2TPv3 tunnels

         VRF interconnected by GRE or DMVPN overlay

voice virtual LAN (VVLAN)

VoIP (Voice-over Internet Protocol)

VPLS (Virtual Private LAN Services) 2nd

VPN (Virtual Private Networks)

     any-to-any VPN, unprotected shared services

     compared to VN

     CsC

     dedicated DHCP services

     DMVPN, WAN

     Extranet VPN, unprotected shared services

     h2h architectures

         ACL

         constrained routing

         Layer 2 solutions 2nd

         Layer 3 solutions 2nd

         MTR

         PBR

     hierarchical campus design

     hub-and-spoke VPN, unprotected shared services

     inter-autonomous system routing

     localized inter-VPN communication, unprotected shared services

     peer-based L2VPN architectures

         Ethernet over MPLS

         VPLS

     peer-based L3VPN architectures

         BGP best practices

         hub-and-spoke topologies

         iBGP multipaths

         IGP best practices

         migration recommendations

         RD

         RFC 2547 control-plane interaction

         RFC 2547bis 2nd

         RR 2nd

     QoS models

         h2h IP tunnels

         hierarchical QoS

         LAN rules

         MPLS VPN

         multiple policies per group 2nd

         one policy per group

         point-to-cloud models

         point-to-service models

         WAN rules

     RFC 2547 VPN

         over DMVPN (WAN, VN extensions over)

         over L2TPv3 (WAN, VN extensions over)

     tunnel-based L2VPN architectures

         auto-discovery

         auto-provisioning

         L2TPv3

         MP2MP using MPLS

         MPLS

         multicast support

     tunnel-based L3VPN architectures

         DMVPN

         GRE and IPsec tunnel configuration

         GRE tunnels 2nd

         hub-and-spoke topologies

         mGRE tunnels

         traffic mapping

     WAN, VN extensions over

VR (virtual routers)

VRF (VPN routing and forwarding) 2nd 3rd

     definition of

     displaying

     FIB

     global tables, leaking traffic (unprotected services)

     Layer 3 h2h architectures

         adding interfaces to VRF

         assigning SVI to

         creating VRF

         network topologies

         segmented campus networks

         VRF-lite

     LR

     mGRE tunnel-based L3VPN architectures, mapping subnets to VRF

     multicast

         external IP network sources

         hop-to-hop layer 3 VPNs

         mVPN extranet

         mVRFs

     multiple VRFs on routers

     resource allocation

     RIB

     routing table information

     sharing routes between

     traffic processing

     tunnel-based L3VPN architectures, traffic mapping

     VR

     VRF awareness

VRF-lite

     L3VPN architecture deployments

     Layer 3 h2h architectures

VSA (vendor-specific attribute)

VSI (virtual switched interfaces)

VVLAN (voice virtual LAN)

Категории