Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] SA (security associations) Sarbanes-Oxley Act, security controls scalability, VLANs scalable enterprise networks campuses hierarchical design modular design virtualization hub-and-spoke topologies WAN aggregation routers branch-end routers dedicating routers at network core dual-circuit resiliency hierarchical architecture IP service with VPN overlay routing adjacencies IPsec/GRE headend routers IPsec/GRE stateful resiliency ISDN backup resiliency multilayer switches point-to-cloud IP service routing adjacencies point-to-point service routing private point-to-cloud connectivity private point-to-point connectivity private spoke-to-spoke connectivity security tunnel overlay resiliency virtualization secure service areas (convergent services) security controls firewalls 2nd network perimeters 2nd common services positioning firewalls fusion routers IDS unprotected services policies, enforcing with access switches ports, static clientless authentication WAN, scalable enterprise network design security associations (SA) Security Parameter Index (SPI) fields segmentation control-plane-based policy-based code points hub-and-spoke policy-based segmentation servers authentication servers (802.1x networks) server farms, virtualization services common services positioning firewalls shared services DHCP services protected services, firewalls 2nd unprotected services 2nd shared trees short pipes, MPLS QoS show ip cef forwarding vrf name detail command show ip route command show ip route vrf command single-hop data path virtualization source mVRFs source provider edge (PE) source trees Source-Specific Multicast (SSM) SP (service providers) Sparse mode (PIM-SM) SPF (shortest path first) CSPF MPLS-TE SPI (Security Parameter Index) fields spoke-to-spoke connectivity, WAN SSM (Source-Specific Multicast) stacking access switches static NAT, routed firewalls 2nd static network membership static routing, Layer 3 h2h architectures supplicants (802.1x networks) SVI (switch virtual interfaces) VLAN, h2h architectures VRF, assigning to switches, MAC table |