1 |
Which protocol is used for AToM pseudowire control-plane signaling? |
Answer: |
LDP. |
2 |
What are the three steps of AToM pseudowire setup between peer PE routers (assuming an LDP session has not yet been established between PE routers)? |
Answer: |
LDP discovery, LDP session initialization (establishment), and LDP Label Mapping exchange (VC/PW label bindings exchange). |
3 |
An AToM data-plane packet typically consists of which elements? |
Answer: |
One or more tunnel labels, a PW/VC label, an optional control word, and a payload. |
4 |
Can TDP be used to signal the tunnel LSP? Can TDP be used to signal AToM PW/VClabels? |
Answers: |
Yes, it can be used to signal the tunnel LSP. No, it cannot be used to signal PW/VC labels; these must be signaled using LDP. |
5 |
If an AToM HDLC pseudowire is used to transport Frame Relay (Frame Relay portmode), in what way do PE routers participate in LMI? |
Answer: |
They do not participate at all in LMI. |
6 |
How can Layer 2 traffic to be forwarded between attachment circuits on the same PE router? |
Answer: |
Using local switching. |
7 |
What is one method of configuring RVSP-TE signaled tunnel LSPs to transport AToM pseudowires between PE routers? |
Answer: |
Tunnel selection. |
8 |
When transporting ATM cells over an AToM cell relay pseudowire, how is it possible to transport more than one ATM cell per AToM data-plane packet? |
Answer: |
By using ATM cell relay with cell packing. |
9 |
How is it possible to connect dissimilar attachment circuit types over AToM pseudowires? |
Answer: |
Using L2VPN interworking. |
10 |
What are the two modes of L2VPN interworking? |
Answer: |
Ethernet mode and IP mode. |
Part I: Understanding VPN Technology
What Is a Virtual Private Network?
Part II: Site-to-Site VPNs
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Designing and Implementing AToM-Based Layer 2 VPNs
Designing MPLS Layer 3 Site-to-Site VPNs
Advanced MPLS Layer 3 VPN Deployment Considerations
Deploying Site-to-Site IPsec VPNs
Scaling and Optimizing IPsec VPNs
Part III: Remote Access VPNs
Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs
Designing and Deploying IPsec Remote Access and Teleworker VPNs
Designing and Building SSL Remote Access VPNs (WebVPN)
Part IV: Appendixes
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix B. Answers to Review Questions