Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] TE (traffic engineering) CBR MPLS QoS 2nd Time To Live (TTL) topologies design hierarchical campus design hub-and-spoke peer-based L3VPN architectures scalable enterprise network design tunnel-based L3VPN architectures network topologies, Layer 3 h2h architectures Pseudowire, peer-based L2VPN architectures transform sets (IPsec) transparent firewalls 2nd transparent mode (firewalls) transport mode (IPsec) transport virtualization control plane control-plane-based segmentation data-path virtualization device virtualization forwarding plane levels of virtualization policy-based segmentation scalability VLANs tree structure (IP multicast) shared trees source trees tunnel mode (IPsec) tunnel overlay advantages/disadvantages GRE configuration GRE tunnel overlay mGRE multicast configuration resiliency (WAN), scalable enterprise network design RP configuration tunnel-based L2VPN architectures auto-discovery auto-provisioning L2TPv3 MP2MP using MPLS MPLS multicast support tunnel-based L3VPN architectures DMVPN GRE tunnels 2nd failovers failure detection hub configurations hub routes in hub-and-spoke mGRE overlays IGP load balancing OSPF overlay encryption resiliency spoke configurations hub-and-spoke topologies IPsec tunnel configuration mGRE tunnels hub configurations hubconfigurations mapping subnets to VRF NHRP spoke configurations traffic mapping tunnels h2h IP tunnels, VPN QoS models MPLS QoS |