Amazing Books
Temporary Blank

Saturday, September 17, 2011

Layer 2 VPN Architectures

By Wei Luo, - CCIE No. 13,291, Carlos Pignataro, - CCIE No. 4619, Dmitry Bokotey, - CCIE No. 4460, Anthony Chan, - CCIE No. 10,266

Publisher : Cisco Press
Pub Date : March 10, 2005
ISBN : 1-58705-168-0
Pages : 648


This is the eBook version of the printed book.

A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications

Evaluate market drivers for Layer 2 VPNs
Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3
Grasp the essentials of Layer 2 LAN and WAN technologies
Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM
Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks
Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching
Understand the operation and application of Virtual Private LAN Services (VPLS)
Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies

The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs.

Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastructures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.

About the Authors
About the Technical Reviewers
This Book Is Safari Enabled
Icons Used in This Book
Command Syntax Conventions
Goals and Methods
How This Book Is Organized
Part I: Foundation
Chapter 1. Understanding Layer 2 VPNs
Understanding Traditional VPNs
Introducing Enhanced Layer 2 VPNs
Chapter 2. Pseudowire Emulation Framework and Standards
Pseudowire Emulation Overview
Pseudowire Emulation Standardization
Chapter 3. Layer 2 VPN Architectures
Legacy Layer 2 VPNs
Any Transport over MPLS Overview
Layer 2 Tunnel Protocol Version 3 Overview
Part II: Layer 2 Protocol Primer
Chapter 4. LAN Protocols
Ethernet Background and Encapsulation Overview
Metro Ethernet Overview
Metro Ethernet Service Architectures
Understanding Spanning Tree Protocol
Pure Layer 2 Implementation
802.1q Tunneling
Chapter 5. WAN Data-Link Protocols
Introducing HDLC Encapsulation
Introducing PPP Encapsulation
Understanding Frame Relay
Understanding ATM
ATM Management Protocols: ILMI and OAM
Part III: Any Transport over MPLS
Chapter 6. Understanding Any Transport over MPLS
Introducing the Label Distribution Protocol
Understanding AToM Operations
Chapter 7. LAN Protocols over MPLS Case Studies
Understanding Ethernet over MPLS Technology
EoMPLS Transport Case Studies
Common Troubleshooting Techniques
Chapter 8. WAN Protocols over MPLS Case Studies
Setting Up WAN over MPLS Pseudowires
Introducing WAN Protocols over MPLS
Configuring WAN Protocols over MPLS Case Studies
Advanced WAN AToM Case Studies
Chapter 9. Advanced AToM Case Studies
Load Sharing
Preferred Path
Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute
Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel
Pseudowire Emulation in Multi-AS Networks
Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling
Verifying Pseudowire Data Connectivity
Quality of Service in AToM
Part IV: Layer 2 Tunneling Protocol Version 3
Chapter 10. Understanding L2TPv3
Universal Transport Interface: L2TPv3's Predecessor
Introducing L2TPv3
Chapter 11. LAN Protocols over L2TPv3 Case Studies
Introducing the L2TPv3 Configuration Syntax
LAN Protocols over L2TPv3 Case Studies
Chapter 12. WAN Protocols over L2TPv3 Case Studies
WAN Protocols over L2TPv3 Technology Overview
Configuring WAN Protocols over L2TPv3 Case Studies
Chapter 13. Advanced L2TPv3 Case Studies
Case Study 13-1: L2TPv3 Path MTU Discovery
Advanced ATM Transport over L2TPv3
Quality of Service
Part V: Additional Layer 2 VPN Architectures
Chapter 14. Layer 2 Interworking and Local Switching
Layer 2 Interworking Technology Overview
Layer 2 Interworking Case Studies
Layer 2 Local Switching
Layer 2 Local Switching with Interworking
Understanding Advanced Interworking and Local Switching
Chapter 15. Virtual Private LAN Service
Understanding VPLS Fundamentals
VPLS Deployment Models
VPLS Configuration Case Studies
Appendix 1. L2TPv3 AVP Attribute Types

Another VPN Books

No comments:

Post a Comment

Related Posts with Thumbnails

Put Your Ads Here!