Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] sample QoS policy template sample RFP table of contents scalability limiting factors of multicasting live events of routing protocols scavenger data traffic scheduling SCR (sustainable cell rate) security ACLs infrastructure ACLs receive ACLs attack mitigation techniques backscatter traceback 2nd Cisco Guard loose uRPF for source-based filtering remote-triggered black-hole filtering sinkholes strict uRPF 2nd authentication MD5 authentication mechanisms MD5 authentication plaintext password authentication connecting at Layer 3 to provider networks 2nd DoS attacks IETF drafts multi-VRF CE of two-label MPLS imposition comparing to Frame Relay operation 2nd password management per-customer firewalls within provider network premigration considerations spoofed packets, tracking security requirements SP-managed VPNs topology/design considerations segmentation requirements mapping VLANs to VPNs selecting best route to destination routing protocol service providers serialization delay 2nd effect on end-to-end latency service bundles quadruple-play triple-play service management as server provider selection criteria service models service provider convergence service provider network management fault management passive proactive fault management 2nd 3rd 4th proactive monitoring 2nd 3rd 4th 5th 6th reactive fault management provisioning reporting 2nd root cause analysis SLA monitoring 2nd 3rd service provider selection, considerations access convergence cooperation coverage customer edge router management customer reports enhanced SLAs financial strength of provider IPv6 2nd service management tiered arrangements transparency 2nd QoS 2nd service providers fault monitoring best practices provisioning best practices selecting service requirements Acme, Inc. case study 2nd congestion 2nd delay evaluation tools load testing 2nd post-transition results routing convergence TCCP transition issues vendor knowledge application/bandwidth requirements backup/resiliency requirements enterprise segmentation requirements mapping VLANs to VPNs extranets multiprovider considerations security SP-managed VPNs topological/design considerations service requirements for QoS bandwidth jitter packet delay packet loss service requirements for QoS at Layer 2 sham link shaping [See traffic shaping.] shared trees RP Auto-RP versus source trees Short-Pipe tunneling mode SID (Service Identifier) single-label MPLS imposition sinkholes site surveys required tasks Site Type A sites EIGRP/BGP deployment high-availability issues Site Type B sites EIGRP/BGP deployment Site Type C sites EIGRP/BGP deployment 2nd Site Type D sites EIGRP/BGP deployment site typification effect on topology Site Type A connection options topology Site Type B connection options topology Site Type C topology Site Type D connection options topology SLA monitoring 2nd SLAs 2nd CPN (Cisco Powered Network) IP Multiservice SLA performance characteristics, incorporating premigration considerations table of contents slow-speed leased lines recommended QoS design SNMP MIBs software deployment process pre-migration considerations software queuing SoO (Site of Origin) extended community source trees versus shared trees sourcing SP networks CoS requirements QoS transparency requirements SP-managed VPNs as service requirement SPD (Selective Packet Discard) punt limits exceeding "speeds and feeds" split tunneling in IPSec SPTs (shortest-path trees) SRST (Survivable Remote Site Telephony) SSD (Service Selection Dashboard) SSG (Service Selection Gateway) SSM enabling enabling on source server's first hop routers host-signaling methods SSM (Source-Specific Multicast) 2nd static routing when to use statistics QoS reporting streaming services performance targets strict uRPF 2nd subscriber network QoS design baselines, creating developing 2nd summarization effects of summary of DMVPN operation susceptibility of enterprise networks to black-hole filtering switches QoS configuring switching delay system administrators training course outlines Szigeti, Tim |