C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

CAM (content-addressable memory)
campuses
     hierarchical design
         access switches
         distribution switches
         equal-cost paths
         failure-isolation features
         failures, effects of
         IGP
         Layer 2 (switched) connectivity
         Layer 3 (routed) technologies
         network layers, collapsing
         topology designs
         VLAN
     modular design
car manufacturers, virtualization
CBR (constraint-based routing)
     MPLS-TE
     TE
CDP (Cisco Discovery Protocol)
CDPv2 (Cisco Discovery Protocol Version 2)
CE (customer edge)
centralized policies
CHAP (Challenge Handshake Authentication Protocol)
Class D addresses
Classification policy mechanism, QoS
client-based Layer 2 authentication
     802.1x protocols
     802.1x roles
     dot1x implementation
clientless authentication
     centralized dynamic clientless authentication
     Layer 3 clientless authentication
     MAC authentication
     static clientless authentication
collapsing network layers, hierarchical campus design
colleges, virtualization
communication interfaces, virtual enterprise networks
configuration
     dot1x client-based authentication
     GRE 2nd
     IPsec
     L2TPv3 2nd
     LSPs
     mVPN
         D1 BGP configuration
         MVRF and MDT configuration on D1
         native multicast configuration on C1
     OSPF
     per-VRF iBGP configuration
     per-VRF RIP configuration
     RP
Congestion avoidance policy mechanism, QoS
constrained routing, h2h architectures
consultant access (networks)
content-addressable memory (CAM)
contractors access (networks)
control-plane
     segmentation
     virtualization 2nd
         MTR
         OSPF
         per-VRF iBGP configuration
         per-VRF RIP configuration
         summary
         VRF-aware routing
convergent services, reasons for virtualization
core layer, hierarchical WAN architecture
core links, converting to dotlq trunks
crypto isakamp policy command
crypto maps
CsC (Carrier supporting Carrier)
     VPN
     WAN, VN extensions over
CSPF, MPLS-TE
CT (Class-Types)
     BC
         MAM
         RDM
     DS-TE
     guaranteed bandwidth
customer edge (CE)




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net