Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] packet classification 2nd packet delay QoS service requirement packet loss causes of QoS service requirement packets out-of-sequence reordering with spoofed bogon addresses tracking PAP (Password Authentication Protocol) passive fault management customer traffic monitoring network events, capturing password management PE automated configuration PE routers route limiting PE-CE links monitoring PE-PE links monitoring PE-to-CE routing with EIGRP metric propagation multiple VRF support per-customer firewalls within provider network per-destination load balancing per-packet load balancing performance characteristics incorporating into SLAs performance issues troubleshooting performance targets for conversational/realtime services for interactive services for streaming services performance-reporting portals performing site surveys required tasks PIM Bidir-PIM default interface configuration mode SSM PIM-DM PIM-SM 2nd RP Pipe mode MPLS tunneling Pipe tunneling mode plaintext password authentication point-to-point technologies policing policing traffic policy-based routing positioning multicast boundaries PPP (Point-to-Point Protocol) PPPoA (Point-to-Point Protocol over Ethernet) PPPoE (Point-to-Point Protocol over Ethernet) prefragmentation premigration considerations relating to coverage and topology relating to customer edge route management relating to hosting capability relating to inter-provider IP/VPN implementation relating to Internet access relating to IP telephony call agenet relating to IP telephony PSTN integration relating to IPv6 relating to MTU relating to multicast capability relating to network access relating to QoS capability 2nd relating to remote access relating to routign protocol capability relating to routing protocol capability SLAs relating to security relating to software deployment process preparing for attacks proactive fault management on service provider network 2nd case study 2nd proactive monitoring 2nd 3rd 4th 5th of PE-PE LSPs 2nd project management methods propagation delay protecting against Internet worms 2nd provider WAN infrastructure susceptibility to attacks provisioning CE provisioning PE configuration zero-touch deployment provisioning VoIP bandwidth provisionless VPWS-based services public Frame Relay networks bandwidth sharing pull model push model |