Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] VFI (Virtual Forwarding Instances) virtual firewall contexts virtual project environments virtual routed interfaces, Layer 2 h2h architectures virtual teams virtualization acquisitions/mergers benefits of business requirements covergent services multitenant enterprises networks consolidation restricting access reasons for regulatory compliance secure service areas server farms virtual project environments WAN, scalable enterprise network design viruses, quarantine VN segments visitor access (networks) VLAN (Virtual Local Area Networks) access switches device virtualization guest VLANs hierarchical campus design 2nd Layer 2 h2h architectures 2nd access-distribution blocks access-distribution data path virtualization access-distribution segmentation assigning access ports virtual routed interfaces Layer 3 h2h architectures, creating VLAN private VLANs scalability SVI, h2h architectures switch MAC table VLAN ID, creating for core data path virtualization VMPS (VLAN Management Project Servers) VNs (virtual networks) 2nd authentication authorization control-plane virtualization MTR OSPF per-VRF iBGP configuration per-VRF RIP configuration summary VRF-aware routing data-path virtualization 802.1q trunking GRE IPsec L2TPv3 LSP summary device virtualization definition of network infrastructure requirements summary VFIs virtual firewall contexts VLAN VRF enterprise networks centralized policies communication interfaces functional areas functional blocks functionality of VRF 2nd network perimeters common services positioning firewalls fusion routers IDS unprotected services transport virtualization control plane control-plane-based segmentation data-path virtualization device virtualization forwarding plane levels of virtualization policy-based segmentation scalability VLAN VPN 2nd VRF definition of displaying FIB LR multiple VRF on routers resource allocation RIB routing table information sharing routes between traffic processing VR VRF awareness WAN, extensions over contracting multiple IP VPN CsC MPLS over GRE MPLS over Layer 2 circuits RFC 2547 VPN over DMVPN RFC 2547 VPN over L2TPv3 tunnels VRF interconnected by GRE or DMVPN overlay voice virtual LAN (VVLAN) VoIP (Voice-over Internet Protocol) VPLS (Virtual Private LAN Services) 2nd VPN (Virtual Private Networks) any-to-any VPN, unprotected shared services compared to VN CsC dedicated DHCP services DMVPN, WAN Extranet VPN, unprotected shared services h2h architectures ACL constrained routing Layer 2 solutions 2nd Layer 3 solutions 2nd MTR PBR hierarchical campus design hub-and-spoke VPN, unprotected shared services inter-autonomous system routing localized inter-VPN communication, unprotected shared services peer-based L2VPN architectures Ethernet over MPLS VPLS peer-based L3VPN architectures BGP best practices hub-and-spoke topologies iBGP multipaths IGP best practices migration recommendations RD RFC 2547 control-plane interaction RFC 2547bis 2nd RR 2nd QoS models h2h IP tunnels hierarchical QoS LAN rules MPLS VPN multiple policies per group 2nd one policy per group point-to-cloud models point-to-service models WAN rules RFC 2547 VPN over DMVPN (WAN, VN extensions over) over L2TPv3 (WAN, VN extensions over) tunnel-based L2VPN architectures auto-discovery auto-provisioning L2TPv3 MP2MP using MPLS MPLS multicast support tunnel-based L3VPN architectures DMVPN GRE and IPsec tunnel configuration GRE tunnels 2nd hub-and-spoke topologies mGRE tunnels traffic mapping WAN, VN extensions over VR (virtual routers) VRF (VPN routing and forwarding) 2nd 3rd definition of displaying FIB global tables, leaking traffic (unprotected services) Layer 3 h2h architectures adding interfaces to VRF assigning SVI to creating VRF network topologies segmented campus networks VRF-lite LR mGRE tunnel-based L3VPN architectures, mapping subnets to VRF multicast external IP network sources hop-to-hop layer 3 VPNs mVPN extranet mVRFs multiple VRFs on routers resource allocation RIB routing table information sharing routes between traffic processing tunnel-based L3VPN architectures, traffic mapping VR VRF awareness VRF-lite L3VPN architecture deployments Layer 3 h2h architectures VSA (vendor-specific attribute) VSI (virtual switched interfaces) VVLAN (voice virtual LAN) |