Troubleshooting Remote Access Networks (CCIE Professional Development)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

V.21

V.32 standard

V.32b standard

V.90 calls

     limitations of

Van Jacobson

     path characterization model

Van Jacobson header compression 2nd 3rd

variable length framing

     Frame Relay

VCs (virtual circuits)

     Frame Relay

VDSL

verifying

     Cisco PIX VPN connectivity 2nd 3rd 4th 5th 6th 7th 8th 9th

     D channel functionality 2nd

     DHCP server reachability

     DLCI settings 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

     Frame Relay remote user router status

     Frame Relay serial interface configuration 2nd

     Frame Relay service operation 2nd 3rd 4th

     Frame Relay traffic shaping settings

    incoming connection type

         dial-in troubleshooting procedure 2nd 3rd 4th

     IP address configuration on Windows operating systems 2nd

     layer 1 status of PRI circuits

     layer 2 status of PRI circuits 2nd 3rd 4th

     line provision

     MMP configuration 2nd 3rd

    modem operability

         dial-in troubleshooting procedure 2nd 3rd

     out of order B channels (NFAS)

    PPP negotiation

         dial-in troubleshooting procedure 2nd 3rd 4th 5th 6th 7th 8th 9th

     VPN client installation

viewing

     captured Log Viewer results 2nd 3rd 4th 5th 6th 7th 8th 9th

     ISDN BRI service layers 2nd 3rd

virtual circuits

     compression

virtual connections

     MLP 2nd

virtual interface templates

virtual ports

virtual profiles

VoFR (Voice over Frame Relay)

voice

     digitalization

     priority over data 2nd

voice privacy

     ISDN configuration 2nd 3rd

VPN 3000 Concentrator

     configuring 2nd

    filters and rules

         configuring 2nd

     Group Lock

         configuring

    IKE peer identity validation

         configuring

    IKE proposals

         configuring 2nd 3rd

    IPSec SAs

         configuring

    load balancing

         configuring 2nd

    redundancy

         configuring

    reverse route injection

         configuring

    SAs

         configuring 2nd 3rd

VPNs 2nd 3rd 4th 5th

     ADSL

         PPoE 2nd 3rd 4th 5th 6th

    authentication

         client authentication

         DH algorithm 2nd 3rd 4th

         HMAC 2nd

         key management 2nd 3rd

         RADIUS 2nd 3rd

         user/identity authentication 2nd

     cable modem services 2nd

         limitations of

         standards

    CATV infrastructure

         data transmission 2nd 3rd 4th 5th 6th

         heartbeats

         two-way Internet connections

     Cisco 3002 HW client

         Event Log 2nd 3rd 4th

         initial troubleshooting checklist

     Cisco Easy VPN Client

         client status, displaying 2nd

         debugging IPSec key events 2nd

         initial troubleshooting checklist 2nd

         monitoring 2nd 3rd

         resetting connection

         restrictions 2nd

    Cisco PIX VPN

         connectivity, verifying 2nd 3rd 4th 5th 6th 7th 8th 9th

         restrictions

    Cisco Unity client

         Concentrator Event Log 2nd 3rd 4th 5th 6th 7th 8th

         Event Log Viewer 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         incompatible GINAs 2nd

         restrictions 2nd 3rd 4th

         troubleshooting checklist 2nd 3rd

    Cisco VPN 3002

         connection establishment 2nd 3rd 4th 5th 6th 7th

     data not passing, causes of

         bad ISP connections 2nd

         dropped connections

         inaccessible internal domain 2nd 3rd

         NAT

     enterprise VPNs 2nd

         categories of

         data link layer 2nd 3rd 4th 5th 6th 7th

         firewall-based VPNs 2nd

         network layer 2nd 3rd 4th 5th

         remote access VPNs

         site-to-site VPNs

     extranet issues

         dead peer detection 2nd

         ESP 50

         tunnel keepalives

         UDP 500 ISAKMP

    failed authentication, causes of

         bad group name 2nd

         DNE Miniport 2nd

         misconfigured firewalls 2nd

         MTU setting too high 2nd 3rd 4th 5th

         MTU setting too low

         RADIUS 2nd

    inaccessible internal domain, causes of

         WINS 2nd 3rd

    LAN-specific issues

         inability to log in

         MTU settings 2nd 3rd 4th 5th

         NAT, multiple client handling

         packet size 2nd 3rd

     latency

     limitations of

    PPPoE problems, causes of

         IOS configuration

         software 2nd 3rd 4th

    preliminary troubleshooting steps

         creating profiles

         verifying client installation

         verifying Internet connection 2nd 3rd

    remote access

         change management

         configuration management

         design objectives 2nd

         operations management

         security issues 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

         termination equipment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

     satellite services

         BST

         IPA

         LEO satellites

     satellite systems 2nd

         bandwidth

         BST protocol

         error control coding

         FITFEEL protocol

         IPSec 2nd

         manipulating TCP stack 2nd

         performance

         TCP efficiency 2nd 3rd

    site-to-site

         versus remote access VPNs 2nd

     wireless broadband services

         limitations of 2nd

         LMDS 2nd

         MMDS 2nd

         unlicensed frequencies

     wireless systems 2nd

         bandwidth

         error control coding

         TCP efficiency 2nd 3rd

     xDSL services 2nd

         ADSL

         CDSL

         FDIs 2nd

         HDSL

         IDSL

         RADSL

         SDSL

         TDRs 2nd

         VDSL

Категории