Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Reddy K. — Building MPLS-Based Broadband Access VPNs
Reddy K. — Building MPLS-Based Broadband Access VPNs

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building MPLS-Based Broadband Access VPNs

Автор: Reddy K.

Аннотация:

Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks.
The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including:
How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs.
When a Virtual Home Gateway is necessary.
Why use dynamic address assignment
How routes should be summarized into the core.
This book is part of the Networking Technology Series from Cisco Press‚ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 408

Добавлена в каталог: 22.05.2005

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
"Advanced Topics in MPLS-TE Deployment"
"Deploying MPLS for Traffic Engineering"
"MPLS Architecture Overview"
802.1q      
802.1q headers      
AAA attribute      
AAA attribute (VRF)      
AAA control plane      
access cards      
access networks, DSL networks      
access requirements      2nd
access requirements, VPNs      
accounting      
address alignment      
address alignment, VPNs      
address allocation      
Address Assignment      
address assignments      
address management      
address management, MPLS-VPNs      
address routing      
address routing, MPLS-based wholesale services      
address space size      
address space size, IPv6      
Address spoofing      
address spoofing, bridged access networks      
address types      
Addresses      
addresses)      
addresses, MPLS_based wholesale services      
Addressing      
adress space size      
adressing      
advantages of      
aggregation routers, cost considerations      
aggregation, LNS      
AH header (IPSec)      
Alverstand, Harald      
Any Transport over MPLS (AToM)      
Anycast addresses (IPv6)      
Architecture      
Architectures      
assigning overlapping addresses      
ATM (Asynchronous Transfer Mode)      
atm pppatm passive      
atm pppatm passive command      
ATM, compared      
AToM (Any Transport over MPLS)      
attribute exchange      
Attributes      
Authentication      
Authorization      
authorizations      
autoconfiguration      
autoconfiguration, IPv6      
Availability      
availability, MPLS-VPNs      
bba-group      
bba-group commands      
BGP (Border Gateway Protocol)      
billing mechanisms      
billing mechanisms, DSL services      
Binding      
bindings, dynamic bindings      
BISDN (Broadband Integrated Services Digital Network)      
Border Gateway Protocol (BGP).      
BPG      
BRAS (Broadband Remote Access Server)      
bridged access networks      
bridged access networks, ETTX      
bridged access networks, RFC 2684      
bridges access networks      
Broadband access      
broadband access, bridged access networks      
Broadband Integrated Services Digital Network (BISDN)      
Broadband Remote Access Server (BRAS)      
broadcast traffic weaknesses, bridged access networks      
Building      
business subscribers, broadband      
Cable      
cable broadband networks      
cable dhcp-giaddr      
cable dhcp-giaddr command      
cable helper-address      
cable helper-address command      
cable modem standards      
cable source-verify      
cable source-verify command      
cable subscribers to VRFs      
cable subscribers, mapping to      
cable subscribers, VRFs, mapping to      
Cabling      
cabling, DOCSIS      
campus hop-to-hop topology, VRF-Lite PEs, routing between      
CAs (Certificate Authorities)      
case studies      
Case study      
CE
CE routers, MPLS-VPN architecture      
centralized architecture      
centralized architectures, VPNs      
certificate authorities (CAs)      
checking      
CIDR (classless interdomain routing)      
circuit aggregation      
circuit aggregation, LACs      
circuit-id field (Option 82)      
circuits, Layer 2 circuits, dynamically provisioning
Cisco IOS (Internetwork Operating System)      
classless interdomain routing (CIDR)      
cleaning up, VRs      
client-based service selection      
Clients      
Commands      
Confidentiality      
Configuration      
configuration cleanup      
configuration, PPP Termination      
configurations, cleaning up      
connecting      
connections, VRs (virtual routers)      
conservative retention mode      
conservative retention mode, LSRs      
control plane, AAA attribute      
control planes      
cost considerations      
CPE VPNs      
CPE-based      
CPE-based VPNs      2nd 3rd
CPE-based VPNs, compared      
crypto isakmp policy      
crypto isakmp policy command      
D/V/V over Ethernet      
D/V/V over Ethernet, adding      
D/V/V over Ethernet, case study      
data confidentiality      
data confidentiality, VPNs      2nd
Data Over Cable Service Interface Specification (DOCSIS).      
DBS (Dynamic Bandwidth Selection)      
DEBUG      
debug commands      
debug ip packet      
debug ip packet command      
debug pppoe      
debug pppoe command      
Deployment      
deployment scenarios      
deployment scenarios, IPv6      
Design      
design checks      
Destination Address field (IPv6 headers)      
Destination options (IPv6)      
device-level redundancies, VPNs      
device-local pools, overlapping device-local pools, assigning and managing      
DHCP servers      
DiffServ      
DiffServ-aware TE (DS-TE).      
direct PPP termination      
direct PPP termination, monitoring      
distributed architecture      
distributed architectures, VPNs      
distribution, MPLS      
DMVPNs      
DMVPNs (dynamic multicast VPNs), IPSec      
DOCSIS      
DOCSIS (Data Over Cable Service Interface Specification)      
DOCSIS configuration      
DOCSIS networks      
DOCSIS standard      
DOCSIS, IOS configuration      
DoS (denial of service) attacks, bridged access networks      
downloading at startup, PPPoA      
downloading PPPoA pools      
downstream traffic      
downstream traffic, RBE networks      
DS-TE
DS-TE (DiffServ-aware TE)      
DSL      
DSL (Digital Subscriber Line)      
DSL Access Multiplexers (DSLAMs)      
DSL broadband networks      
DSL Forum, broadband popularity statistics      
DSL networks      
DSL subscribers to VRFs      
DSL subscribers, mapping to      
DSL, RFC 2684      
DSLAMs (DSL Access Multiplexers)      
Dynamic allocation      
dynamic allocation, VRFs, VPNs      
Dynamic Bandwidth Selection (DBS)      
dynamic bindings      
dynamic multicast VPNs      
dynamic multicast VPNs, IPSec      
dynamic VRF allocation      
dynamically provisioning Layer 2 circuits
Edge LSR      
efficient operation      2nd
efficient routing      
EIGRP (Enhanced Interior Gateway Routing Protocol)      2nd
EMF (Ethernet in the First Mile)      
Encapsulation      
encrypted GRE      2nd
encrypted GRE, configuration      
Encryption      
Enhanced Interior Gateway Routing Protocol (EIGRP)      2nd
Enterprise      
Enterprise, IPv6, deployment      
ESP header (IPSec)      
Ethernet      
Ethernet in the First Mile (EFM)      
Ethernet networks      2nd
Ethernet subscribers to VRFs      
Ethernet subscribers, mapping to      
Ethernet subscribers, VRFs, mapping to      
Ethernet switches      
Ethernet, ETTX      
ETTX      
Extensions      
extensions, IPv6      2nd
Fields      
fields, IPv6 headers      
fish problems      
fish problems, TE (Traffic Engineering)      
Flow Label field (IPv6 headers)      
flow labeling      
Flow labeling, IPv6      
follows      
Fragmentation      2nd
Frame Relay networks, unnumbered interfaces      
frames      
Framework      
framework (VPNs)      
Global addresses (IPv6)      
GRE      
GRE (Generic Routing Encapsulation)      
Headers      
headers, fields      
Hop Limit field (IPv6 headers)      
Hop-by-Hop options (IPv6)      
host-route solution      
host-route solution, overlapping on-demand address pools      
HSRP      
hub-and-spoke systems      
hub-and-spoke systems, VPNs      
hub-and-spoke topology      
iBGP      
iBGP (internal Border Gateway Protocol)      2nd
identifications, remote-access networks      
IGP (Interior Gateway Protocol)      
IKE      
IKE (Internet Key Exchange), IPSec      
implementation      
implementation, Cisco IOS      
implementation, VRs (virtual routers), Cisco IOS      
Implementing      
independent delivery      
independent delivery, label distribution      
infrastructure VPNs      2nd
ink protection problems      
inter-exchange carriers (IXCs)      
interfaces, routed interfaces, VRF mapping      
Interior Gateway Protocol (IGP)      
internal Border Gateway Protocol (iBGP).      
Internet access      
Internet Key Exchange (IKE).      
Internet Protocol (IP).      
Internet Service Providers (ISPs).      [See ISPs (Internet Service Providers)]
IOS (Internetwork Operating System)      
IOS configuration      2nd
IP (Internet Protocol)      
IP Addressing      
IP aggregation      
ip helper-address      
Ip helper-address command      
ip rsvp      
ip rsvp command      
IP switching      
IP VPNs      2nd
IP-based VPNs      2nd
IPsec      
IPSec configuration      
IPSec, design requirements      
IPSec, requirements      
IPv4      
IPv6      
IPv6 (Internet Protocol version 6)      [See also IP (Internet Protocol)]
IPv6, autoconfiguration      
ipx routing      
ipx routing command      
ISP PE      
ISPs (Internet Service Providers)      
IXCs (inter-exchange carriers)      
keyring      
keyring command      
Kumaraswamy, Jay      
L2 services      
L2TP      2nd 3rd
L2TP Access Concentrator (LACs).      
L2TP Network Server (LNS).      
l2tp tunnel nosession-limit      
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2019
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте