1

Which protocol is used for AToM pseudowire control-plane signaling?

Answer:

LDP.

2

What are the three steps of AToM pseudowire setup between peer PE routers (assuming an LDP session has not yet been established between PE routers)?

Answer:

LDP discovery, LDP session initialization (establishment), and LDP Label Mapping exchange (VC/PW label bindings exchange).

   
3

An AToM data-plane packet typically consists of which elements?

Answer:

One or more tunnel labels, a PW/VC label, an optional control word, and a payload.

4

Can TDP be used to signal the tunnel LSP? Can TDP be used to signal AToM PW/VClabels?

Answers:

Yes, it can be used to signal the tunnel LSP. No, it cannot be used to signal PW/VC labels; these must be signaled using LDP.

5

If an AToM HDLC pseudowire is used to transport Frame Relay (Frame Relay portmode), in what way do PE routers participate in LMI?

Answer:

They do not participate at all in LMI.

6

How can Layer 2 traffic to be forwarded between attachment circuits on the same PE router?

Answer:

Using local switching.

7

What is one method of configuring RVSP-TE signaled tunnel LSPs to transport AToM pseudowires between PE routers?

Answer:

Tunnel selection.

8

When transporting ATM cells over an AToM cell relay pseudowire, how is it possible to transport more than one ATM cell per AToM data-plane packet?

Answer:

By using ATM cell relay with cell packing.

9

How is it possible to connect dissimilar attachment circuit types over AToM pseudowires?

Answer:

Using L2VPN interworking.

10

What are the two modes of L2VPN interworking?

Answer:

Ethernet mode and IP mode.


Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions



Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net