Layer 2 Vpn Architectures [Electronic resources] نسخه متنی
لطفا منتظر باشید ...

• Table of Contents
Layer 2 VPN Architectures
By
Wei Luo, - CCIE No. 13,291, Carlos Pignataro, - CCIE No. 4619, Dmitry Bokotey, - CCIE No. 4460, Anthony Chan, - CCIE No. 10,266
Publisher: Cisco Press
Pub Date: March 10, 2005
ISBN: 1-58705-168-0
Pages: 648
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
This Book Is Safari Enabled
Icons Used in This Book
Command Syntax Conventions
Introduction
Goals and Methods
How This Book Is Organized

Part I:
Foundation

Chapter 1.
Understanding Layer 2 VPNs
Understanding Traditional VPNs
Introducing Enhanced Layer 2 VPNs
Summary

Chapter 2.
Pseudowire Emulation Framework and Standards
Pseudowire Emulation Overview
Pseudowire Emulation Standardization
Summary

Chapter 3.
Layer 2 VPN Architectures
Legacy Layer 2 VPNs
Any Transport over MPLS Overview
Layer 2 Tunnel Protocol Version 3 Overview
Summary

Part II:
Layer 2 Protocol Primer

Chapter 4.
LAN Protocols
Ethernet Background and Encapsulation Overview
Metro Ethernet Overview
Metro Ethernet Service Architectures
Understanding Spanning Tree Protocol
Pure Layer 2 Implementation
802.1q Tunneling
Summary

Chapter 5.
WAN Data-Link Protocols
Introducing HDLC Encapsulation
Introducing PPP Encapsulation
Understanding Frame Relay
Understanding ATM
ATM Management Protocols: ILMI and OAM
Summary

Part III:
Any Transport over MPLS

Chapter 6.
Understanding Any Transport over MPLS
Introducing the Label Distribution Protocol
Understanding AToM Operations
Summary

Chapter 7.
LAN Protocols over MPLS Case Studies
Understanding Ethernet over MPLS Technology
EoMPLS Transport Case Studies
Common Troubleshooting Techniques
Summary

Chapter 8.
WAN Protocols over MPLS Case Studies
Setting Up WAN over MPLS Pseudowires
Introducing WAN Protocols over MPLS
Configuring WAN Protocols over MPLS Case Studies
Advanced WAN AToM Case Studies
Summary

Chapter 9.
Advanced AToM Case Studies
Load Sharing
Preferred Path
Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute
Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel
Pseudowire Emulation in Multi-AS Networks
Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling
Verifying Pseudowire Data Connectivity
Quality of Service in AToM
Summary

Part IV:
Layer 2 Tunneling Protocol Version 3

Chapter 10.
Understanding L2TPv3
Universal Transport Interface: L2TPv3''''''''''''''''''''''''''''''''s Predecessor
Introducing L2TPv3
Summary

Chapter 11.
LAN Protocols over L2TPv3 Case Studies
Introducing the L2TPv3 Configuration Syntax
LAN Protocols over L2TPv3 Case Studies
Summary

Chapter 12.
WAN Protocols over L2TPv3 Case Studies
WAN Protocols over L2TPv3 Technology Overview
Configuring WAN Protocols over L2TPv3 Case Studies
Summary

Chapter 13.
Advanced L2TPv3 Case Studies
Case Study 13-1: L2TPv3 Path MTU Discovery
Advanced ATM Transport over L2TPv3
Quality of Service
Summary

Part V:
Additional Layer 2 VPN Architectures

Chapter 14.
Layer 2 Interworking and Local Switching
Layer 2 Interworking Technology Overview
Layer 2 Interworking Case Studies
Layer 2 Local Switching
Layer 2 Local Switching with Interworking
Understanding Advanced Interworking and Local Switching
Summary

Chapter 15.
Virtual Private LAN Service
Understanding VPLS Fundamentals
VPLS Deployment Models
VPLS Configuration Case Studies
Summary

Appendix 1.
L2TPv3 AVP Attribute Types