Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] CAM (content-addressable memory) campuses hierarchical design access switches distribution switches equal-cost paths failure-isolation features failures, effects of IGP Layer 2 (switched) connectivity Layer 3 (routed) technologies network layers, collapsing topology designs VLAN modular design car manufacturers, virtualization CBR (constraint-based routing) MPLS-TE TE CDP (Cisco Discovery Protocol) CDPv2 (Cisco Discovery Protocol Version 2) CE (customer edge) centralized policies CHAP (Challenge Handshake Authentication Protocol) Class D addresses Classification policy mechanism, QoS client-based Layer 2 authentication 802.1x protocols 802.1x roles dot1x implementation clientless authentication centralized dynamic clientless authentication Layer 3 clientless authentication MAC authentication static clientless authentication collapsing network layers, hierarchical campus design colleges, virtualization communication interfaces, virtual enterprise networks configuration dot1x client-based authentication GRE 2nd IPsec L2TPv3 2nd LSPs mVPN D1 BGP configuration MVRF and MDT configuration on D1 native multicast configuration on C1 OSPF per-VRF iBGP configuration per-VRF RIP configuration RP Congestion avoidance policy mechanism, QoS constrained routing, h2h architectures consultant access (networks) content-addressable memory (CAM) contractors access (networks) control-plane segmentation virtualization 2nd MTR OSPF per-VRF iBGP configuration per-VRF RIP configuration summary VRF-aware routing convergent services, reasons for virtualization core layer, hierarchical WAN architecture core links, converting to dotlq trunks crypto isakamp policy command crypto maps CsC (Carrier supporting Carrier) VPN WAN, VN extensions over CSPF, MPLS-TE CT (Class-Types) BC MAM RDM DS-TE guaranteed bandwidth customer edge (CE) |