Flylib.com
index_V
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
Variable Length Subnet Masks (VLSM)
VLSM (Variable Length Subnet Masks)
VBR
VBRnrt
VBRrt
VCs (virtual circuits)
VDSL (Very-High-Data-Rate Digital Subscriber Line)
virtual addresses
logical addresses 2nd 3rd
virtual circuits:DLCIs:global addresses
global DLCI addresses
universal significance;DLCIs:universal significance
virtual circuits:SVCs:DLCIs
DLCIs
Frame Relay:SVCs:DLCIs;SVCs:DLCIs 2nd
virtual circuits:SVCs:E.164 addressing
DLCIs
Frame Relay:SVCs:E.164 addressing;SVCs:E.164 addressing;E.164 addressing
virtual circuits:SVCs:X.121 addressing
DLCIs
Frame Relay:SVCs:X.121 addressing;SVCs:X.121 addressing;X.121 addressing
viruses
VLANs
VLANs (Virtual LANs)
VLANs:WAN integration
WANs:VLAN integration
VoFr (Voice over Frame Relay)
voice networks:lines
lines
CO:lines;PBX (private branch exchange):lines;lines
voice networks:PSTN:dedicated access
PSTN:dedicated access
dedicated PSTN access
voice networks:PSTN:switched access
PSTN:switched access
switched PSTN access
VPNs:tunneling protocols
tunneling protocols
remote access:VPNs:tunneling protocols
VPNs:tunneling protocols:L2F
tunneling protocols:L2F
remote access:VPNs:L2F;L2F (Layer 2 Forwarding)
VPNs:tunneling protocols:L2TP
tunneling protocols:L2TP
remote access:VPNs:L2TP;L2TP (Layer 2 Tunneling Protocol)
VPNs:tunneling protocols:PPTP
tunneling protocols:PPTP
remote access:VPNs:PPTP;PPTP
VRML (Virtual Reality Modeling Language)
vulnerability to WinNuke attack:testing
WinNuke attack
Previous page
Table of content
Next page
Network Sales and Services Handbook (Cisco Press Networking Technology)
ISBN: 1587050900
EAN: 2147483647
Year: 2005
Pages: 269
Authors:
Matthew J Castelli
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
What Security Is and Isnt
Four Ways in Which You Can Respond to Risk
The Policy Framework
Reducing the Risk of an Attack
IT Security Architecture and Framework
Software Configuration Management
A Practical Approach to Configuration Verification and Audit
Configuration Management and Data Management
Appendix D Problem Change Report
Appendix U Acronyms and Glossary
Appendix V Functional Configuration Audit (FCA) Checklist
The Complete Cisco VPN Configuration Guide
Configuring the Windows VPN Client
Summary
ISAKMP/IKE Phase 1 Connections
Summary
Troubleshooting PIX and ASA Connections
The Java Tutorial: A Short Course on the Basics, 4th Edition
Code Samples
Managing Inheritance
Grouping Threads
Code Samples
Using the Streams
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Naming Design Elements
What Is a Formula?
Using Formula Language in LotusScript Code
Change Document to Edit Mode
Migrating Data
Mapping Hacks: Tips & Tools for Electronic Cartography
How GPS Works
Hack 49. Get Your Tracklogs in Windows or Linux
Hack 65. Extract Data from Maps with Manifold
Hack 67. Seamless Data Download from the USGS
Hack 100. Map Imaginary Places
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies