| | Copyright |
| | About the Author(s) |
| | Acknowledgments |
| | Icons Used in This Book |
| | Command Syntax Conventions |
| | Introduction |
| | Part I: A Network Architecture for the Virtual Enterprise |
| | | Chapter 1. Business Drivers Behind Enterprise Network Virtualization |
| | | Why Virtualize? |
| | | Business Requirements Drive Technical Requirements |
| | | Summary |
| | | Chapter 2. Designing Scalable Enterprise Networks |
| | | Hierarchical Campus Design |
| | | Virtualizing the Campus |
| | | WAN Design |
| | | Summary |
| | | Chapter 3. A Basic Virtualized Enterprise |
| | | The Virtual Enterprise |
| | | Transport VirtualizationVNs |
| | | Central Services Access: Virtual Network Perimeter |
| | | Summary |
| | | Chapter 4. A Virtualization Technologies Primer: Theory |
| | | Network Device Virtualization |
| | | Data-Path Virtualization |
| | | Control-Plane VirtualizationRouting Protocols |
| | | Summary |
| | | Chapter 5. Infrastructure Segmentation Architectures: Theory |
| | | Hop to Hop |
| | | Tunnel Overlay for L3VPN |
| | | Tunnel Overlay for Layer 2 VPNs |
| | | Peer-Based Model for Layer 3 VPNs |
| | | Inter-Autonomous System Connectivity: Another Application of Tunnels |
| | | Summary |
| | Part II: Enterprise Virtualization Techniques and Best Practices |
| | | Chapter 6. Infrastructure Segmentation Architectures: Practice |
| | | Hop-to-Hop VLANs |
| | | Single Address Space Solutions |
| | | Tunnel Overlay for Layer 3 VPNs |
| | | Layer 3 VPNs |
| | | Layer 2 VPNs |
| | | Summary |
| | | Chapter 7. Extending the Virtualized Enterprise over the WAN |
| | | WAN Services |
| | | Extending Segmentation over the WAN |
| | | MPLS over Layer 2 Circuits |
| | | Contracting Multiple IP VPNs |
| | | Carrier Supporting Carrier (CsC) |
| | | MPLS over GRE |
| | | RFC 2547 VPNs over L2TPv3 Tunnels |
| | | VRFs Interconnected by a GRE or DMVPN Overlay |
| | | RFC 2547 VPNs over DMVPN |
| | | Summary |
| | | Chapter 8. Traffic Steering and Service Centralization |
| | | Shared Services: Protected vs. Unprotected |
| | | Unprotected Services Access |
| | | Protected Services Access |
| | | Providing IP Services |
| | | Summary |
| | | Chapter 9. Multicast in a Virtualized Environment |
| | | Multicast Introduction |
| | | VRFs and Multicast |
| | | mVPN Transport |
| | | Connecting the WAN |
| | | Summary |
| | | Chapter 10. Quality of Service in a Virtualized Environment |
| | | QoS Models and Mechanisms: A Review |
| | | MPLS Quality of Service |
| | | MPLS Traffic Engineering and Guaranteed Bandwidth |
| | | QoS Models for Virtualized Networks |
| | | Summary |
| | | Chapter 11. The Virtualized Access Layer |
| | | Access Layer Switching |
| | | Implementing Dynamic Authentication and Authorization |
| | | Virtualizing the Access Layer |
| | | Summary |
| | Part III: Appendixes |
| | | Appendix A. L2TPv3 Expanded Coverage |
| | | L2TPv3 Control Channel |
| | | L2TPv3 Data Channel |
| | | Appendix B. MPLS QoS, Traffic Engineering, and Guaranteed Bandwidth |
| | | MPLS QoSUniform Tunnel and Pipe Modes |
| | | MPLS Traffic Engineering |
| | | MPLS Fast Reroute |
| | | Guaranteed Bandwidth |
| | | Appendix C. Recommended Reading |
| | | Chapter 1 |
| | | Chapter 4 |
| | | Chapter 5 |
| | | Chapter 7 |
| | | Chapter 8 |
| | | Chapter 9 |
| | | Chapter 10 |
| | | Chapter 11 |
| | | General technology references |
| | | Appendix D. RFCs and Internet Drafts |
| | | Chapter 4 |
| | | Chapter 5 |
| | | Chapter 6 |
| | | Chapter 9 |
| | | Chapter 10 |
| | | Chapter 11 |
| | Index |