L



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X]

L-LSP, MPLS QoS
L2TP access concentrator / L2TP network server (LAC/LNS)
l2tp-class command
L2TPv3 (Layer 2 Tunnel Protocol version 3)
     authentication
     compared to GRE
     control channel
     cookies
     data channel
     deployment models
     IOS configuration
     peer-based L3VPN architectures, RFC 2547bis
     session ID
     session setup
         control messages
         handshakes
         nonces
     tunnels
         L2VPN architectures
         RFC 2547 VPN over (WAN, VN extensions over)
         tunnel teardown control messages
L2VPN architectures
     peer-based architectures
         Ethernet over MPLS
         VPLS
     tunnel-based architectures
         auto-discovery
         auto-provisioning
         L2TPv3
         MP2MP using MPLS
         MPLS
         multicast support
L3VPN architectures
     peer-based architectures
         BGP best practices
         hub-and-spoke topologies
         iBGP multipaths
         IGP best practices
         migration recommendations
         RD
         RFC 2547 control-plane interaction
         RFC 2547bis 2nd
         RR
     tunnel-based architectures
         DMVPN
         GRE and IPsec tunnel configuration
         GRE tunnels 2nd
         hub-and-spoke topologies
         mGRE tunnels
         traffic mapping
Label Distribution Protocol (LDP)
label switched paths (LSPs)
     CE
     edge LSR
     FIBs
     IOS configuration
     LDP
     LSR
     MPLS packet forwarding
label switching routers (LSR)
LAC/LNS (L2TP access concentrator/L2TP network server)
LAN (local-area networks), VPN QoS models
Layer 2 (switched) connectivity, hierarchical campus design
Layer 2 circuits, WAN 2nd
Layer 2 client-based authentication
     802.1x
         protocols
         roles
     dot1x implementation
Layer 2 h2h architectures
     complexity of
     scalability of
     user groups
     VLAN 2nd
         access-distribution blocks
         access-distribution data path virtualization
         access-distribution segmentation
         assigning access ports
         virtual routed interfaces
Layer 3 (routed) technologies, hierarchical campus design 2nd
Layer 3 access
Layer 3 clientless authentication
Layer 3 h2h architectures
     ACL
     advantages of
     complexity
     core links, converting to dotlq trunks
     EIGRP address families
     hierarchy support
     network topologies
     PBR
     routed nodes
     scalability
     segmented campus networks
     static routing
     VLAN
     VLAN ID, creating for core data path virtualization
     VRF
         adding interfaces to
         assigning SVI
         creating
     VRF-lite
LDP (Label Distribution Protocol)
link congestion, MPLS QoS
Link optimization policy mechanism, QoS
link protection
     FRR
     MPLS QoS
load balancing
     GRE tunnel-based L3VPN architectures
     MPLS QoS
LR (logical routers)
LSP (label switched paths) 2nd
     CE
     edge LSR
     FIB
     IOS configuration
     LDP
     LSR
     MPLS
         packet forwarding
         QoS
     MPLS-TE, link protection
LSR (label switching routers)
     edge LSR
     MPLS QoS




Network Virtualization
Network Virtualization
ISBN: 1587052482
EAN: 2147483647
Year: 2006
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net