Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] h2h (hop-to-hop) architectures ACL constrained routing IP tunnels, VPN QoS models Layer 2 solutions complexity of scalability of user groups VLAN 2nd Layer 3 solutions ACL adding interfaces to VRF advantages of complexity converting core links to dotlq trunks creating VLAN creating VRF EIGRP address families hierarchy support network topologies PBR routed nodes scalability segmented campus networks static routing VLAN ID, creating for core data path virtualization VRF, assigning SVI to VRF-lite MTR PBR headers GRE IPsec hierarchical campus design (scalable enterprise networks) access switches distribution switches equal-cost paths failure-isolation features failures, effects of IGP Layer 2 (switched) connectivity Layer 3 (routed) technologies network layers, collapsing topology designs VLAN VPN hierarchical QoS (Quality of Service) hierarchical WAN architecture HIPAA (Health Insurance Portability and Accountability Act), security controls hub-and-spoke policy-based segmentation hub-and-spoke topologies peer-based L3VPN architectures scalable enterprise network design tunnel-based L3VPN architectures hub-and-spoke VPN, unprotected shared services |