Layer 2 Vpn Architectures [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Layer 2 Vpn Architectures [Electronic resources] - نسخه متنی

Carlos Pignataro, Dmitry Bokotey, Anthony Chan

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید


















Table of Contents





Layer 2 VPN Architectures



By
Wei Luo, - CCIE No. 13,291, Carlos Pignataro, - CCIE No. 4619, Dmitry Bokotey, - CCIE No. 4460, Anthony Chan, - CCIE No. 10,266




Publisher: Cisco Press



Pub Date: March 10, 2005



ISBN: 1-58705-168-0



Pages: 648














Copyright



About the Authors



About the Technical Reviewers



Acknowledgments



This Book Is Safari Enabled




Icons Used in This Book




Command Syntax Conventions



Introduction




Goals and Methods




How This Book Is Organized




Part I:
Foundation






Chapter 1.
Understanding Layer 2 VPNs




Understanding Traditional VPNs




Introducing Enhanced Layer 2 VPNs




Summary






Chapter 2.
Pseudowire Emulation Framework and Standards




Pseudowire Emulation Overview




Pseudowire Emulation Standardization




Summary






Chapter 3.
Layer 2 VPN Architectures




Legacy Layer 2 VPNs




Any Transport over MPLS Overview




Layer 2 Tunnel Protocol Version 3 Overview




Summary




Part II:
Layer 2 Protocol Primer






Chapter 4.
LAN Protocols




Ethernet Background and Encapsulation Overview




Metro Ethernet Overview




Metro Ethernet Service Architectures




Understanding Spanning Tree Protocol




Pure Layer 2 Implementation




802.1q Tunneling




Summary






Chapter 5.
WAN Data-Link Protocols




Introducing HDLC Encapsulation




Introducing PPP Encapsulation




Understanding Frame Relay




Understanding ATM




ATM Management Protocols: ILMI and OAM




Summary




Part III:
Any Transport over MPLS






Chapter 6.
Understanding Any Transport over MPLS




Introducing the Label Distribution Protocol




Understanding AToM Operations




Summary






Chapter 7.
LAN Protocols over MPLS Case Studies




Understanding Ethernet over MPLS Technology




EoMPLS Transport Case Studies




Common Troubleshooting Techniques




Summary






Chapter 8.
WAN Protocols over MPLS Case Studies




Setting Up WAN over MPLS Pseudowires




Introducing WAN Protocols over MPLS




Configuring WAN Protocols over MPLS Case Studies




Advanced WAN AToM Case Studies




Summary






Chapter 9.
Advanced AToM Case Studies




Load Sharing




Preferred Path




Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute




Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel




Pseudowire Emulation in Multi-AS Networks




Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling




Verifying Pseudowire Data Connectivity




Quality of Service in AToM




Summary




Part IV:
Layer 2 Tunneling Protocol Version 3






Chapter 10.
Understanding L2TPv3




Universal Transport Interface: L2TPv3''''''''''''''''''''''''''''''''s Predecessor




Introducing L2TPv3




Summary






Chapter 11.
LAN Protocols over L2TPv3 Case Studies




Introducing the L2TPv3 Configuration Syntax




LAN Protocols over L2TPv3 Case Studies




Summary






Chapter 12.
WAN Protocols over L2TPv3 Case Studies




WAN Protocols over L2TPv3 Technology Overview




Configuring WAN Protocols over L2TPv3 Case Studies




Summary






Chapter 13.
Advanced L2TPv3 Case Studies




Case Study 13-1: L2TPv3 Path MTU Discovery




Advanced ATM Transport over L2TPv3




Quality of Service




Summary




Part V:
Additional Layer 2 VPN Architectures






Chapter 14.
Layer 2 Interworking and Local Switching




Layer 2 Interworking Technology Overview




Layer 2 Interworking Case Studies




Layer 2 Local Switching




Layer 2 Local Switching with Interworking




Understanding Advanced Interworking and Local Switching




Summary






Chapter 15.
Virtual Private LAN Service




Understanding VPLS Fundamentals




VPLS Deployment Models




VPLS Configuration Case Studies




Summary





Appendix 1.
L2TPv3 AVP Attribute Types






/ 101