Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] E-LSP, MPLS QoS EAP (Extensible Authentication Protocol) EAPOL (Extensible Authentication Protocol over LAN) edge LSRs (label switching routers) EF PHB (expedited forwarding per-hop behaviors) EIGRP (Enhanced Interior Gateway Routing Protocol) 2nd employee access (networks) encapsulation (IPsec), WAN security encryption GRE tunnel-based L3VPN architectures Ipsec, WAN security enterprise networks campuses hierarchical design modular design virtualization centralized policies communication interfaces functional areas functionality of hub-and-spoke topologies VPN 2nd VRF 2nd definition of displaying FIB LR multiple VRF on routers resource allocation RIB routing table information sharing routes between traffic processing VR VRF awareness WAN aggregation routers branch-end routers dedicating routers at network core dual-circuit resiliency hierarchical architecture IP service with VPN overlay routing adjacencies IPsec/GRE ISDN backup resiliency multilayer switches point-to-cloud IP service routing adjacencies point-to-point service routing private point-to-cloud connectivity private point-to-point connectivity private spoke-to-spoke connectivity security tunnel overlay resiliency virtualization equal-cost paths, hierarchical campus design ESP headers (IPsec) EXCLUDE mode (IGMP) Extensible Authentication Protocol (EAP) Extensible Authentication Protocol over LAN (EAPOL) Extranet VPN, unprotected shared services |