Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers Th
Mpls And Vpn Architectures (Volume Ii) (642-611)
β Scribed by Apcar, Jeff; Guichard, Jim; Pepelnjak, Ivan
- Publisher
- Cisco Press; Pearson Education Inc
- Year
- 2003
- Tongue
- English
- Leaves
- 501
- Series
- Networking Technology
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks
With MPLS and VPN Architectures, Volume II, you'll learn: How to integrate various remote access technologies into the backbone providing VPN service to many different types of customersThe new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)How VRFs can be extended into a customer site to provide separation inside the customer networkThe latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backboneHow to carry customer multicast traffic inside a VPNThe latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN servicesAdvanced troubleshooting techniques including router outputs to ensure high availability
"MPLS and VPN Architectures, Volume II," builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.
"MPLS and VPN Architectures, Volume II," begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.
"MPLS and VPN Architectures, Volume II," also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.
This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
β¦ Table of Contents
Cover......Page 1
Contents......Page 10
Introduction......Page 16
Part I: Introduction......Page 22
MPLS VPN Terminology......Page 24
Connection-Oriented VPNs......Page 26
Connectionless VPNs......Page 27
MPLS-Based VPNs......Page 28
New MPLS VPN Developments......Page 35
Summary......Page 37
Part II: Advanced PE-CE Connectivity......Page 40
Chapter 2 Remote Access to an MPLS VPN......Page 42
Feature Enhancements for MPLS VPN Remote Access......Page 44
Overview of Access Protocols and Procedures......Page 46
Providing Dial-In Access to an MPLS VPN......Page 58
Providing Dial-Out Access via LSDO......Page 81
Providing Dial-Out Access Without LSDO (Direct ISDN)......Page 92
Providing Dial Backup for MPLS VPN Access......Page 94
Providing DSL Access to an MPLS VPN......Page 96
Providing Cable Access to an MPLS VPN......Page 112
Advanced Features for MPLS VPN Remote Access......Page 118
Summary......Page 134
Chapter 3 PE-CE Routing Protocol Enhancements and Advanced Features......Page 136
PE-CE Connectivity: OSPF......Page 138
PE-CE Connectivity: Integrated IS-IS......Page 155
PE-CE Connectivity: EIGRP......Page 171
Summary......Page 178
Configuring Virtual Routers on CE Routers......Page 180
Linking the Virtual Router with the MPLS VPN Backbone......Page 201
VRF Selection Based on Source IP Address......Page 214
Performing NAT in a Virtual Router Environment......Page 218
Summary......Page 237
Part III: Advanced Deployment Scenarios......Page 240
Chapter 5 Protecting the MPLS-VPN Backbone......Page 242
Inherent Security Capabilities......Page 243
Neighbor Authentication......Page 249
CE-to-CE Authentication......Page 257
Control of Routes That Are Injected into a VRF......Page 260
PE to CE Circuits......Page 271
Extranet Access......Page 275
Internet Access......Page 278
IPSec over MPLS......Page 283
Summary......Page 284
Chapter 6 Large-Scale Routing and Multiple Service Provider Connectivity......Page 286
Large Scale Routing: Carrierβs Carrier Solution Overview......Page 287
Carrier Backbone Connectivity......Page 290
Label Distribution Protocols on PE-CE Links......Page 299
BGP-4 Between PE/CE Routers......Page 308
Hierarchical VPNs: Carrierβs Carrier MPLS VPNs......Page 313
VPN Connectivity Between Different Service Providers......Page 315
Summary......Page 349
Introduction to IP Multicast......Page 352
Enterprise Multicast in a Service Provider Environment......Page 362
mVPN Architecture......Page 364
MDTs......Page 371
Case Study of mVPN Operation in SuperCom......Page 385
Summary......Page 406
IPv6 Business Drivers......Page 408
Deployment of IPv6 in Existing Networks......Page 410
Quick Introduction to IPv6......Page 413
In-Depth 6PE Operation and Configuration......Page 419
Complex 6PE Deployment Scenarios......Page 434
Summary......Page 440
Part IV: Troubleshooting......Page 442
Introduction to Troubleshooting of MPLS-Based Solutions......Page 444
Troubleshooting the MPLS Backbone......Page 446
Other Quick Checks......Page 448
MPLS Control Plane Troubleshooting......Page 451
MPLS Data Plane Troubleshooting......Page 456
MPLS VPN Troubleshooting......Page 458
In-Depth MPLS VPN Troubleshooting......Page 462
Summary......Page 472
A......Page 476
C......Page 477
D......Page 479
E......Page 480
I......Page 481
M......Page 483
N......Page 484
P......Page 485
R......Page 487
T......Page 488
U-V-W-X-Y-Z......Page 489
π SIMILAR VOLUMES
Great FOLLOW on to Volume I. This isn't another Volume II that ONLY corrects things and adds one meaningless chapter! This book is a follow-on to Volume 1. If you have not read Volume I, buy that book first! This book is advanced topics starting where volume I left off.
A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousan
<p>Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs</p><ul><li>Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions</li><li>Offers in-depth analysis of MPLS architecture</li><li>Helps you learn how MPLS scales t
Multiprotocol Label Switching (MPLS) provides the mechanisms to perform label switching, which is an innovative technique for high-performance packet forwarding. This book provides an in-depth study of MPLS technology, including MPLS theory and configuration, network design issues, and case studies.