A guide to using and defining MPLS VPN servicesAnalyze strengths and weaknesses of TDM and Layer 2 WAN servicesUnderstand the primary business and technical issues when evaluating IP/MPLS VPN offeringsDescribe the IP addressing, routing, load balancing, convergence, and services capabilities of the
Selecting MPLS VPN Services
โ Scribed by Lewis, Chris
- Publisher
- Cisco Press
- Year
- 2006
- Tongue
- English
- Leaves
- 457
- Series
- Networking Technology
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This is a guide for those using and defining MPLS VPN services.
โฆ Table of Contents
Cover......Page 1
Contents......Page 10
Introduction......Page 23
Part I: Business Analysis and Requirements of IP/MPLS VPN......Page 26
Current State of Enterprise Networks......Page 28
Evolutionary Change of Enterprise Networks......Page 30
Acme, a Global Manufacturer......Page 33
New WAN Technologies for Consideration by Acme......Page 36
Convergence Services......Page 45
Summary......Page 46
Enterprise/Service Provider Relationship and Interface......Page 50
Investigation Required in Selecting a Service Provider......Page 51
Service Management......Page 64
Summary......Page 65
Application/Bandwidth Requirements......Page 68
Backup and Resiliency......Page 74
Enterprise Segmentation Requirements......Page 76
Access Technologies......Page 79
QoS Requirements......Page 85
Subscriber Network QoS Design......Page 91
Security Requirements......Page 93
Multiprovider Considerations......Page 96
Extranets......Page 97
Case Study: Analyzing Service Requirements for Acme, Inc.......Page 98
Summary......Page 110
References......Page 111
Part II: Deployment Guidelines......Page 114
Introduction to Routing for the Enterprise MPLS VPN......Page 116
Site Typifying WAN Access: Impact on Topology......Page 126
Case Study: BGP and EIGRP Deployment in Acme, Inc.......Page 145
Summary......Page 158
References......Page 159
Introduction to QoS......Page 162
QoS Tool Chest: Understanding the Mechanisms......Page 166
Building the Policy Framework......Page 177
IP/VPN QoS Strategy......Page 183
Identification of Traffic......Page 188
QoS Requirements for Voice, Video, and Data......Page 190
The LAN Edge: L2 Configurations......Page 194
Case Study: QoS in the Acme, Inc. Network......Page 202
QoS Reporting......Page 204
Summary......Page 205
References......Page 206
Introduction to Multicast for the Enterprise MPLS VPN......Page 210
Mechanics of IP Multicast......Page 213
Multicast Deployment Models......Page 226
Multicast in an MPLS VPN Environment: Transparency......Page 230
Case Study: Implementing Multicast over MPLS for Acme......Page 233
What Happens When There Is No MVPN Support?......Page 247
Summary......Page 249
References......Page 250
Chapter 7 Enterprise Security in an MPLS VPN Environment......Page 252
Setting the Playing Field......Page 253
Comparing MPLS VPN Security to Frame Relay Networks......Page 257
Issues for Enterprises to Resolve When Connecting at Layer 3 to Provider Networks......Page 267
Basic Security Techniques......Page 276
Distributed DoS, Botnets, and Worms......Page 286
Summary......Page 293
References......Page 294
Chapter 8 MPLS VPN Network Management......Page 300
The Enterprise: Evaluating Service Provider Management Capabilities......Page 302
The Enterprise: Managing the VPN......Page 312
The Service Provider: How to Meet and Exceed Customer Expectations......Page 323
Summary......Page 355
References......Page 356
Remote Access......Page 358
IPsec Access......Page 370
Supporting Internet Access in IP VPNs......Page 389
Case Study Selections......Page 392
Summary......Page 393
References......Page 394
Network Planning......Page 398
Implementation Planning......Page 411
On-Site Implementation......Page 413
Summary......Page 415
Part III: Appendix......Page 418
Appendix: Questions to Ask Your Provider Regarding Layer 3 IP/MPLS VPN Capability......Page 420
Customer Edge Router Management......Page 421
Network Access, Resiliency, and Load Balancing......Page 422
QoS Capability......Page 423
Multicast Capability......Page 425
Routing Protocol Capability......Page 426
Security......Page 428
IPv6......Page 429
Hosting Capability......Page 430
IP Telephony Hosted Call Agent......Page 431
Remote and Dial Access......Page 432
Other Network Services......Page 433
A......Page 436
C......Page 437
E......Page 439
F......Page 440
I......Page 441
M......Page 442
P......Page 444
R......Page 446
S......Page 447
V......Page 450
Z......Page 451
๐ SIMILAR VOLUMES
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backboneToday's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business ne
Programmers are craftspeople trained to use a certain set of tools (editors, object managers, version trackers) to generate a certain kind of product (programs) that will operate in some environment (operating systems on hardware assemblies). Like any other craft, computer programming has spawned a
<p>This book provides a comprehensive understanding of current and debated future networking technologies. It gives insight into building end-to-end networks and services with Carrier Ethernet, PBT, MPLS-TP, and VPLS while also shedding light on the pros and cons of these technologies for service pr
A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture Detailed discussion of the mechanisms and features that constitute the architecture Learn how MPLS scales to support tens of thousan
<p>Prepare for CCIP certification as you learn to design and deploy MPLS-based VPNs</p><ul><li>Assists in preparation for the CCIP MPLS elective exam with detailed technology coverage and review questions</li><li>Offers in-depth analysis of MPLS architecture</li><li>Helps you learn how MPLS scales t