Deploying MPLS Layer 3 VPNs

Table of contents:

Review Questions


In an MPLS Layer 3 VPN, do CE routers exchange routing update directly with other CE routers, or with connected PE routers?


How do PE routers store customer routing and forwarding information?


How is customer routing information exchanged between PE routers?


In a simple MPLS Layer 3 VPN, with an MPLS-enabled backbone network where PE routers are not directly connected, how many labels are in the label stack of customer packets as they cross the backbone? What are the functions of those labels?


How can IGP labels be signaled in an MPLS network?


What is the function of the Route Distinguisher (RD)?


What is the function of the Route Target (RT)?


Typically, which two IGPs are used in MPLS networks?


Which BGP attribute can be used to prevent routing loops when customer sites are multihomed to the service provider MPLS VPN backbone?


What are three common methods of provisioning Internet access for MPLS Layer 3 VPN customers?

Part I: Understanding VPN Technology

What Is a Virtual Private Network?

Part II: Site-to-Site VPNs

Designing and Deploying L2TPv3-Based Layer 2 VPNs

Designing and Implementing AToM-Based Layer 2 VPNs

Designing MPLS Layer 3 Site-to-Site VPNs

Advanced MPLS Layer 3 VPN Deployment Considerations

Deploying Site-to-Site IPsec VPNs

Scaling and Optimizing IPsec VPNs

Part III: Remote Access VPNs

Designing and Implementing L2TPv2 and L2TPv3 Remote Access VPNs

Designing and Deploying IPsec Remote Access and Teleworker VPNs

Designing and Building SSL Remote Access VPNs (WebVPN)

Part IV: Appendixes

Designing and Building SSL Remote Access VPNs (WebVPN)

Appendix B. Answers to Review Questions

Comparing, Designing, and Deploying VPHs
Comparing, Designing, and Deploying VPNs
ISBN: 1587051796
EAN: 2147483647
Year: 2007
Pages: 124
Authors: Mark Lewis © 2008-2020.
If you may any questions please contact us: