Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] acceptance testing access as server provider selection criteria access technologies ATM QoS characteristics ATM PVC from CE to PE dedicated circuit from CE to PE Frame Relay Frame Relay PVC from CE to PE metro Ethernet ACLs boundary ACLs configuring effectiveness against attacks infrastructure ACLs receive ACLs Acme backbone WAN global span IT applications base IT communications infrastructure management's business needs new technology considerations Layer 2 IP/MPLS VPN services 2nd Layer 3 IP/MPLS VPN services 2nd regional WANs Acme, Inc. case studies remote user access Acme, Inc. case study analysing service requirements 2nd congestion 2nd delay evaluation tools load testing 2nd post-transition results routing convergence TCCP transition issues vendor knowledge QoS for low-speed links 2nd activing QoS on switch devices address resolution NHRP, configuring addressing addressing schemes for multicast administratively scoped addresses well-known group address ranges administratively scoped multicast addresses anatomy of DDoS attacks 2nd anycast address anycast sinkholes application trust applying multicast boundaries to router interface QoS to backup WAN circuits architecture of botnets areas ASICs (application-specific integrated circuits) ASM (Any Source Multicast) ASM (Any-Source Multicast) assigning metrics async default ip address command ATM QoS characteristics ATM PVC from CE to PE attacks automating with botnets DDoS anatomy of 2nd identifying mitigating mitigation techniques backscatter traceback 2nd Cisco Guard loose uRPF for source-based filtering remote-triggered black-hole filtering sinkholes strict uRPF 2nd preparing for via worms mitigating 2nd authentication MD5 2nd MD5 authentication plaintext password authentication Auto-RP automated CE provisioning automated PE provisioning automating attacks with botnets availability five-nines |