MPLS and VPN Architectures, Volume II / Networking Technology (PDF)
Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks...
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.
Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks
With MPLS and VPN Architectures, Volume II, you'll learn:
- How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers
- The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)
- How VRFs can be extended into a customer site to provide separation inside the customer network
- The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone
- How to carry customer multicast traffic inside a VPN
- The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services
- Advanced troubleshooting techniques including router outputs to ensure high availability
MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.
MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.
MPLS and VPN Architectures, Volume II, also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.
This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Jim Guichard, CCIE No. 2069, is a technical leader for MPLS and IP backbone technologies at Cisco Systems and is the co-author of the highly successful book MPLS and VPN Architectures, published by Cisco Press. He has extensive experience with designing, migrating, and deploying large-scale IP networks and has assisted many of the largest Cisco customers with the integration of MPLS-related technologies into their networks.
Jeff Apcar is a senior consulting engineer in the Advanced Services group at Cisco Systems and has been working with MPLS technologies for more than three years. Jeff's focus is the Asia-Pacific theatre where he has provided detailed designs and design consulting for nearly every major service provider MPLS rollout in the region.
- Autoren: Ivan Pepelnjak , Jim Guichard , Jeff Apcar
- 2003, 1. Auflage, 504 Seiten, Englisch
- Verlag: Pearson ITP
- ISBN-10: 158705437X
- ISBN-13: 9781587054372
- Erscheinungsdatum: 06.06.2003
Abhängig von Bildschirmgröße und eingestellter Schriftgröße kann die Seitenzahl auf Ihrem Lesegerät variieren.
- Dateiformat: PDF
- Größe: 9.45 MB
- Mit Kopierschutz
- Vorlesefunktion
Schreiben Sie einen Kommentar zu "MPLS and VPN Architectures, Volume II / Networking Technology".
Kommentar verfassen