V



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

VFI (Virtual Forwarding Instances)
virtual firewall contexts
virtual project environments
virtual routed interfaces, Layer 2 h2h architectures
virtual teams
virtualization
     acquisitions/mergers
     benefits of
     business requirements
     covergent services
     multitenant enterprises
     networks
         consolidation
         restricting access
     reasons for
     regulatory compliance
     secure service areas
     server farms
     virtual project environments
     WAN, scalable enterprise network design
viruses, quarantine VN segments
visitor access (networks)
VLAN (Virtual Local Area Networks)
     access switches
     device virtualization
     guest VLANs
     hierarchical campus design 2nd
     Layer 2 h2h architectures 2nd
         access-distribution blocks
         access-distribution data path virtualization
         access-distribution segmentation
         assigning access ports
         virtual routed interfaces
     Layer 3 h2h architectures, creating VLAN
     private VLANs
     scalability
     SVI, h2h architectures
     switch MAC table
     VLAN ID, creating for core data path virtualization
VMPS (VLAN Management Project Servers)
VNs (virtual networks) 2nd
     authentication
     authorization
     control-plane virtualization
         MTR
         OSPF
         per-VRF iBGP configuration
         per-VRF RIP configuration
         summary
         VRF-aware routing
     data-path virtualization
         802.1q trunking
         GRE
         IPsec
         L2TPv3
         LSP
         summary
     device virtualization
         definition of
         network infrastructure requirements
         summary
         VFIs
         virtual firewall contexts
         VLAN
         VRF
     enterprise networks
         centralized policies
         communication interfaces
         functional areas
         functional blocks
         functionality of
         VRF 2nd
     network perimeters
         common services positioning
         firewalls
         fusion routers
         IDS
         unprotected services
     transport virtualization
         control plane
         control-plane-based segmentation
         data-path virtualization
         device virtualization
         forwarding plane
         levels of virtualization
         policy-based segmentation
         scalability
         VLAN
     VPN 2nd
     VRF
         definition of
         displaying
         FIB
         LR
         multiple VRF on routers
         resource allocation
         RIB
         routing table information
         sharing routes between
         traffic processing
         VR
         VRF awareness
     WAN, extensions over
         contracting multiple IP VPN
         CsC
         MPLS over GRE
         MPLS over Layer 2 circuits
         RFC 2547 VPN over DMVPN
         RFC 2547 VPN over L2TPv3 tunnels
         VRF interconnected by GRE or DMVPN overlay
voice virtual LAN (VVLAN)
VoIP (Voice-over Internet Protocol)
VPLS (Virtual Private LAN Services) 2nd
VPN (Virtual Private Networks)
     any-to-any VPN, unprotected shared services
     compared to VN
     CsC
     dedicated DHCP services
     DMVPN, WAN
     Extranet VPN, unprotected shared services
     h2h architectures
         ACL
         constrained routing
         Layer 2 solutions 2nd
         Layer 3 solutions 2nd
         MTR
         PBR
     hierarchical campus design
     hub-and-spoke VPN, unprotected shared services
     inter-autonomous system routing
     localized inter-VPN communication, unprotected shared services
     peer-based L2VPN architectures
         Ethernet over MPLS
         VPLS
     peer-based L3VPN architectures
         BGP best practices
         hub-and-spoke topologies
         iBGP multipaths
         IGP best practices
         migration recommendations
         RD
         RFC 2547 control-plane interaction
         RFC 2547bis 2nd
         RR 2nd
     QoS models
         h2h IP tunnels
         hierarchical QoS
         LAN rules
         MPLS VPN
         multiple policies per group 2nd
         one policy per group
         point-to-cloud models
         point-to-service models
         WAN rules
     RFC 2547 VPN
         over DMVPN (WAN, VN extensions over)
         over L2TPv3 (WAN, VN extensions over)
     tunnel-based L2VPN architectures
         auto-discovery
         auto-provisioning
         L2TPv3
         MP2MP using MPLS
         MPLS
         multicast support
     tunnel-based L3VPN architectures
         DMVPN
         GRE and IPsec tunnel configuration
         GRE tunnels 2nd
         hub-and-spoke topologies
         mGRE tunnels
         traffic mapping
     WAN, VN extensions over
VR (virtual routers)
VRF (VPN routing and forwarding) 2nd 3rd
     definition of
     displaying
     FIB
     global tables, leaking traffic (unprotected services)
     Layer 3 h2h architectures
         adding interfaces to VRF
         assigning SVI to
         creating VRF
         network topologies
         segmented campus networks
         VRF-lite
     LR
     mGRE tunnel-based L3VPN architectures, mapping subnets to VRF
     multicast
         external IP network sources
         hop-to-hop layer 3 VPNs
         mVPN extranet
         mVRFs
     multiple VRFs on routers
     resource allocation
     RIB
     routing table information
     sharing routes between
     traffic processing
     tunnel-based L3VPN architectures, traffic mapping
     VR
     VRF awareness
VRF-lite
     L3VPN architecture deployments
     Layer 3 h2h architectures
VSA (vendor-specific attribute)
VSI (virtual switched interfaces)
VVLAN (voice virtual LAN)




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net