P



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

p2p (point-to-point), QoS
P2P GRE, WAN
packets
     forwarding
         MPLS networks
         shared trees
         source trees
     IGMP (Internet Group Management Protocol)
PAP (Password Authentication Protocol)
partner access (networks)
PBR (policy-based routing)
     failure detection in GRE tunnel-based L3VPN architectures
     h2h architectures
     Layer 3 h2h architectures
     tunnel-based L3VPN architectures, traffic mapping
PE (provider edges) 2nd 3rd 4th 5th 6th
peer-based L2VPN architectures
     Ethernet over MPLS
     VPLS
peer-based L3VPN architectures
     BGP best practices
     hub-and-spoke topologies
     iBGP multipaths
     IGP best practices
     migration recommendations
     RD 2nd
     RFC 2547 control-plane interaction
     RFC 2547bis
         GRE
         L2TPv3
         MPLS 2nd
     RR 2nd
penultimate hop popping (PHP)
Per VLAN Spanning Tree (PVST)
Per VLAN Spanning Tree Plus (PVST+)
per-VRF iBGP configuration
per-VRF RIP configuration
PHB (per-hop behaviors)
     AF PHB
     class selectors
     default
     EF PHB
     pipe tunnel mode (MPLS networks)
     QoS values
PHP (penultimate hop popping) 2nd
PIM (Protocol Independent Multicast)
pipes
     MPLS QoS
     tunnel mode (MPLS networks)
planes (control/forwarding)
point-to-cloud connectivity, WAN
point-to-point connectivity, WAN
policies
     centralized policies
     PBR
         failure detection in GRE tunnel-based L3VPN architectures
         h2h architectures
         Layer 3 h2h architectures
         tunnel-based L3VPN architectures, traffic mapping
     security policies, enforcing with access switches
Policing policy mechanism, QoS
     segmentation
ports
     security, static clientless authentication
     VLAN ID (PVID)
PPPoE (PPP over Ethernet)
private services, WAN
private VLANs
protected services
     routed firewalls
         advertising multiple routes into MP-iBGP
         asymmetric return paths
         multiple common services/internet edge site deployments
         NAT
         single common services/ internet edge site deployments
     shared services
     transparent firewalls 2nd
Protocol Independent Multicast (PIM)
provider edges (PE) 2nd 3rd
pseudowire command
Pseudowire topologies, peer-based L2VPN architectures
pseudowire-class command
PVID (port VLAN ID)
PVST (Per VLAN Spanning Tree)
PVST+ (Per VLAN Spanning Tree Plus)




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net