[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] validation pass-through authentication VCI (Virtual Channel Identifier) VCI (virtual channel identifier) velocity 2nd velocity of propagation (VOP) vendors guidelines for usage (network security) 2nd Verify Database Consistency option verifying corporate standards 2nd versions IP (Internet Protocol) 2nd IPP (Internet Printing Protocol) 2nd RIP (Routing Information Protocol) 2nd 3rd vertical-market software SOHO 2nd 3rd 4th 5th 6th 7th 8th 9th 10th video SOHO viewing Event Viewer. [See Event Viewer] permissions 2nd printing statistics 2nd virtual carrier sense Virtual Channel Identifier (VCI) virtual channel identifier (VCI) virtual LAN. [See VLAN] virtual loadable module (VLM) virtual local area networks (VLANs) 2nd Virtual Path Identifier (VPI) virtual path identifier (VPI) virtual private network. [See VPN]2nd [See VPN] Virtual Private Networking (VPN) Virtual Private Networking (VPNs) virtual private networks (VPNs) Virtual Private Networks. [See VPNs] viruses 2nd 3rd 4th 5th 6th 7th 8th occurrence of infections 2nd virus-checking applications VLAN (virtual LAN) VLAN (Virtual LAN) VLAN (virtual LAN) explicit tagging 2nd 3rd 4th 5th IEEE switch standards 2nd 3rd implicit tagging 2nd MAC addresses 2nd port-based 2nd protocol rule-based 2nd switches purchasing 2nd 3rd switching 2nd topologies 2nd 3rd 4th VLANs (Virtual LANs) VLANs (virtual local area networks) 2nd VLM (virtual loadable module) VMS (Virtual Memory System) volume traffic Gigabit Ethernets 2nd VOP (velocity of propagation) VPI (Virtual Path Identifier) VPI (virtual path identifier) VPN (virtual private network) VPN (virtual private network) 2nd protocols 2nd AH 2nd 3rd ESP 2nd 3rd 4th IKE 2nd IPSec 2nd L2TP 2nd 3rd 4th 5th 6th PPTP 2nd 3rd RAS (Remote Access Service) 2nd 3rd VPN (Virtual Private Networking) VPNs (Virtual Private Networking) VPNs (virtual private networks) VPNs (Virtual Private Networks) VRFY command |