Index[A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] label-switched paths, Layer 3 services labels BGP signaling Layer 3 VPNs LDP signaling Layer 2 services, MPLS future ATM-MPLS interworking multiple provider network VPNs VPLS forwarding at remote node Layer 2 virtual private networks [See Layer 2 VPNs (Layer 2 virtual private networks).] Layer 2 VPNs (Layer 2 virtual private networks) 2nd AToM packet forwarding pseudowire systems benefits inter-AS interworking modes transport combinations like-to-like transport ATM service Ethernet service Frame Relay service link layer service pseudowire configuration provisioning BGP LDP reasons for building scalability density grades of service management security CE router security CsC networks design options services Ethernet NGN basics supported IETF standards taxonomy technologies VPLS Layer 3 services, MPLS future content-based services dynamic encrypted VPNs label-switched paths security enhancements voice and video integration Layer 3 VPNs corporate extranets corporate intranets enterprise motivations for migration heterogeneous networks IETF drafts Internet access 2nd dedicated PE dedicated per-VPN managed central services shared PE IPv6 VPNs coexistence managed central services address management VRF awareness meeting enterprise challenges reasons for building scaling to network elements hierarchical VPNs inter-AS VPNs services 2nd technologies constrained distribution of routing information label stack role packet flow through network packet forwarding peer-to-peer model separation of routing information topologies VRF value-added services LDP, Layer 2 VPN provisioning like-to-like relationships like-to-like transport Layer 2 VPNs ATM service Ethernet service Frame Relay service link layer service pseudowire configuration link layer services, like-to-like transport links, tunnel protection LSR self-test, multipaths |