S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

SA (security associations)
Sarbanes-Oxley Act, security controls
scalability, VLANs
scalable enterprise networks
     campuses
         hierarchical design
         modular design
         virtualization
     hub-and-spoke topologies
     WAN
         aggregation routers
         branch-end routers
         dedicating routers at network core
         dual-circuit resiliency
         hierarchical architecture
         IP service with VPN overlay routing adjacencies
         IPsec/GRE headend routers
         IPsec/GRE stateful resiliency
         ISDN backup resiliency
         multilayer switches
         point-to-cloud IP service routing adjacencies
         point-to-point service routing
         private point-to-cloud connectivity
         private point-to-point connectivity
         private spoke-to-spoke connectivity
         security
         tunnel overlay resiliency
         virtualization
secure service areas (convergent services)
security
     controls
     firewalls 2nd
     network perimeters 2nd
         common services positioning
         firewalls
         fusion routers
         IDS
         unprotected services
     policies, enforcing with access switches
     ports, static clientless authentication
     WAN, scalable enterprise network design
security associations (SA)
Security Parameter Index (SPI) fields
segmentation
     control-plane-based
     policy-based
         code points
         hub-and-spoke policy-based segmentation
servers
     authentication servers (802.1x networks)
     server farms, virtualization
services
     common services positioning
     firewalls
     shared services
         DHCP services
         protected services, firewalls 2nd
         unprotected services 2nd
shared trees
short pipes, MPLS QoS
show ip cef forwarding vrf name detail command
show ip route command
show ip route vrf command
single-hop data path virtualization
source mVRFs
source provider edge (PE)
source trees
Source-Specific Multicast (SSM)
SP (service providers)
Sparse mode (PIM-SM)
SPF (shortest path first)
     CSPF
     MPLS-TE
SPI (Security Parameter Index) fields
spoke-to-spoke connectivity, WAN
SSM (Source-Specific Multicast)
stacking access switches
static NAT, routed firewalls 2nd
static network membership
static routing, Layer 3 h2h architectures
supplicants (802.1x networks)
SVI (switch virtual interfaces)
     VLAN, h2h architectures
     VRF, assigning to
switches, MAC table




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net