| |
| |
Acknowledgments | |
| |
| |
| |
About This Book | |
| |
| |
Introduction | |
| |
| |
Integrating Switching and Routing | |
| |
| |
Advantages of BGP/MPLS VPNs | |
| |
| |
Privacy and Security | |
| |
| |
Customer Independence | |
| |
| |
Scalability and Stability | |
| |
| |
Management | |
| |
| |
Who should Read This Book | |
| |
| |
| |
Label Switching Alternatives | |
| |
| |
Overlay Models | |
| |
| |
Classical IP over ATM | |
| |
| |
Scalability | |
| |
| |
Integration Models | |
| |
| |
IP Switching | |
| |
| |
Data-Driven IP Switching | |
| |
| |
Topology-Driven IP Switching | |
| |
| |
Multiprotocol Label Switching (MPLS) | |
| |
| |
| |
MPLS Architecture and Operation | |
| |
| |
Simplicity of Operation--Labels | |
| |
| |
Decoupling Control and Forwarding | |
| |
| |
Forwarding Equivalency Classes (FECs) and Label Imposition | |
| |
| |
Advantages of MPLS over Legacy Network Layer Forwarding | |
| |
| |
MPLS Architecture Examples | |
| |
| |
MPLS Data Structures | |
| |
| |
Penultimate Hop Popping | |
| |
| |
Label Encapsulation | |
| |
| |
The Label Stack (Generic Label Encapsulation/Shim Header) | |
| |
| |
Encoding the Label Stack | |
| |
| |
Label-Switched Paths (LSPs) | |
| |
| |
Tunnels and Hierarchy | |
| |
| |
Determining the Network Layer Protocol | |
| |
| |
Processing the TTL Field | |
| |
| |
IP-Dependent Rules | |
| |
| |
Translating between Different Encapsulations | |
| |
| |
Case 1 (Figure 3-12) | |
| |
| |
Case 2 (Figure 3-13) | |
| |
| |
Case 3 (Figure 3-14) | |
| |
| |
Fragmentation and Path MTU Discovery | |
| |
| |
Transporting Labeled Packets over PPP | |
| |
| |
Transporting Labeled Packets over LAN Media | |
| |
| |
Alternative Label Encapsulation Techniques | |
| |
| |
Overlay vs. Label-Encoded | |
| |
| |
Encapsulating Top Labels with ATM | |
| |
| |
Using the VPI/VCI Field on Different Connection Types | |
| |
| |
Direct Connection | |
| |
| |
Connection via a VP Tunnel | |
| |
| |
Connection via SVC | |
| |
| |
Label Binding Procedures with ATM-LSRs | |
| |
| |
Encapsulation | |
| |
| |
VC-Merge | |
| |
| |
Manipulating the TTL Field | |
| |
| |
Labels and Label Distribution Methods | |
| |
| |
LDP--The Label Distribution Protocol | |
| |
| |
LDP Operation | |
| |
| |
LDP Protocol Structure | |
| |
| |
Label Distribution--Downstream vs. Downstream-on-Demand | |
| |
| |
Ordered vs. Independent LSP Control | |
| |
| |
Loop Detection | |
| |
| |
LDP Extended Discovery | |
| |
| |
Label Distribution Protocols for TE | |
| |
| |
Why Use MPLS TE? | |
| |
| |
Distributing Labels with RSVP | |
| |
| |
Introduction to RSVP | |
| |
| |
Augmenting RSVP with MPLS Features (MPLS-RSVP) | |
| |
| |
Summary of RSVP Attributes | |
| |
| |
Extensions to LDP (CR-LDP) | |
| |
| |
| |
Introduction to Virtual Private Networks | |
| |
| |
It's All about Connectivity | |
| |
| |
A Taxonomy of VPNs | |
| |
| |
Hub-and-Spoke vs. Fully-Meshed | |
| |
| |
IPSec | |
| |
| |
Other VPN Technologies | |
| |
| |
MPLS VPN | |
| |
| |
Feature Matrix | |
| |
| |
Overlay Model--Layer 2 VPNs | |
| |
| |
The Peer Model--Layer 3 VPNs | |
| |
| |
| |
Components of MPLS VPNs | |
| |
| |
Introduction to the Border Gateway Protocol (BGP-4) | |
| |
| |
Why Use Multiprotocol BGP-4 for MPLS VPNs? | |
| |
| |
| |
Details of MPLS VPNs | |
| |
| |
Definition of BGP/MPLS VPNs | |
| |
| |
Terminology | |
| |
| |
Route Distribution | |
| |
| |
RDs and the VPN-IPv4 Address Family | |
| |
| |
Route Targets (RTs) | |
| |
| |
Route Distribution among PE Routers | |
| |
| |
Route Exchange between PE and CE Routers | |
| |
| |
Topologies | |
| |
| |
VPN Sites with Optimal Inter-VPN Routing | |
| |
| |
VPN Sites with Hub-and-Spoke Routing | |
| |
| |
Internet Routing | |
| |
| |
Internet Access at Customer Site | |
| |
| |
Internet Access handled by Service Provider | |
| |
| |
Network Address Translation (NAT) | |
| |
| |
Scalability | |
| |
| |
Route Reflectors (RRs) | |
| |
| |
Adding New Sites to a VPN | |
| |
| |
BGP Update Filtering | |
| |
| |
Outbound Route Filters (ORFs) | |
| |
| |
Carrier's Carrier (CsC) | |
| |
| |
| |
MPLS VPN Applications | |
| |
| |
Enterprise VPN Services | |
| |
| |
ADSL VPNs | |
| |
| |
DSL Technology Overview | |
| |
| |
Connection Paradigm | |
| |
| |
ADSL IP VPNs | |
| |
| |
Routing | |
| |
| |
Cable Access VPNs | |
| |
| |
Cable Technology Overview | |
| |
| |
Connection Paradigm | |
| |
| |
Cable IP VPNs | |
| |
| |
Mobile Wireless VPNs | |
| |
| |
GPRS Technology Overview | |
| |
| |
Dial Access IP VPNs | |
| |
| |
| |
LDP Protocol Structure--Examples | |
| |
| |
Glossary | |
| |
| |
Notes | |
| |
| |
Index | |