Layer 2 Vpn Architectures [Electronic resources]

Carlos Pignataro, Dmitry Bokotey, Anthony Chan

نسخه متنی -صفحه : 101/ 3
نمايش فراداده

Table of Contents

Layer 2 VPN Architectures

By Wei Luo, - CCIE No. 13,291, Carlos Pignataro, - CCIE No. 4619, Dmitry Bokotey, - CCIE No. 4460, Anthony Chan, - CCIE No. 10,266

Publisher: Cisco Press

Pub Date: March 10, 2005

ISBN: 1-58705-168-0

Pages: 648

Copyright

About the Authors

About the Technical Reviewers

Acknowledgments

This Book Is Safari Enabled

Icons Used in This Book

Command Syntax Conventions

Introduction

Goals and Methods

How This Book Is Organized

Part I: Foundation

Chapter 1. Understanding Layer 2 VPNs

Understanding Traditional VPNs

Introducing Enhanced Layer 2 VPNs

Summary

Chapter 2. Pseudowire Emulation Framework and Standards

Pseudowire Emulation Overview

Pseudowire Emulation Standardization

Summary

Chapter 3. Layer 2 VPN Architectures

Legacy Layer 2 VPNs

Any Transport over MPLS Overview

Layer 2 Tunnel Protocol Version 3 Overview

Summary

Part II: Layer 2 Protocol Primer

Chapter 4. LAN Protocols

Ethernet Background and Encapsulation Overview

Metro Ethernet Overview

Metro Ethernet Service Architectures

Understanding Spanning Tree Protocol

Pure Layer 2 Implementation

802.1q Tunneling

Summary

Chapter 5. WAN Data-Link Protocols

Introducing HDLC Encapsulation

Introducing PPP Encapsulation

Understanding Frame Relay

Understanding ATM

ATM Management Protocols: ILMI and OAM

Summary

Part III: Any Transport over MPLS

Chapter 6. Understanding Any Transport over MPLS

Introducing the Label Distribution Protocol

Understanding AToM Operations

Summary

Chapter 7. LAN Protocols over MPLS Case Studies

Understanding Ethernet over MPLS Technology

EoMPLS Transport Case Studies

Common Troubleshooting Techniques

Summary

Chapter 8. WAN Protocols over MPLS Case Studies

Setting Up WAN over MPLS Pseudowires

Introducing WAN Protocols over MPLS

Configuring WAN Protocols over MPLS Case Studies

Advanced WAN AToM Case Studies

Summary

Chapter 9. Advanced AToM Case Studies

Load Sharing

Preferred Path

Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute

Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel

Pseudowire Emulation in Multi-AS Networks

Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling

Verifying Pseudowire Data Connectivity

Quality of Service in AToM

Summary

Part IV: Layer 2 Tunneling Protocol Version 3

Chapter 10. Understanding L2TPv3

Universal Transport Interface: L2TPv3''''''''''''''''''''''''''''''''s Predecessor

Introducing L2TPv3

Summary

Chapter 11. LAN Protocols over L2TPv3 Case Studies

Introducing the L2TPv3 Configuration Syntax

LAN Protocols over L2TPv3 Case Studies

Summary

Chapter 12. WAN Protocols over L2TPv3 Case Studies

WAN Protocols over L2TPv3 Technology Overview

Configuring WAN Protocols over L2TPv3 Case Studies

Summary

Chapter 13. Advanced L2TPv3 Case Studies

Case Study 13-1: L2TPv3 Path MTU Discovery

Advanced ATM Transport over L2TPv3

Quality of Service

Summary

Part V: Additional Layer 2 VPN Architectures

Chapter 14. Layer 2 Interworking and Local Switching

Layer 2 Interworking Technology Overview

Layer 2 Interworking Case Studies

Layer 2 Local Switching

Layer 2 Local Switching with Interworking

Understanding Advanced Interworking and Local Switching

Summary

Chapter 15. Virtual Private LAN Service

Understanding VPLS Fundamentals

VPLS Deployment Models

VPLS Configuration Case Studies

Summary

Appendix 1. L2TPv3 AVP Attribute Types