Layer 2 VPN Architectures
Wei Luo, Carlos Pignataro, Anthony Chan, Dmitry Bokotey
- 出版商: Cisco Press
- 出版日期: 2005-03-20
- 售價: $2,510
- 貴賓價: 9.5 折 $2,385
- 語言: 英文
- 頁數: 648
- 裝訂: Hardcover
- ISBN: 1587051680
- ISBN-13: 9781587051685
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$3,010$2,860 -
$1,400$1,330 -
$2,340$2,223 -
$2,840$2,698 -
$680$537 -
$1,670$1,587 -
$280$266 -
$750$675 -
$2,010$1,910 -
$560$504 -
$450$351 -
$850$723 -
$750$593 -
$490$382 -
$2,340$2,223 -
$890$703 -
$650$553 -
$650$507 -
$680$578 -
$590$460 -
$580$452 -
$620$527 -
$900Definitive MPLS Network Designs (Hardcvoer)
-
$480$408 -
$403MPLS 和 VPN 體系結構, 2/e (修訂版)
相關主題
商品描述
Description:
A complete guide to understanding, designing, and deploying Layer 2 VPN technologies and pseudowire emulation applications
- Evaluate market drivers for Layer 2 VPNs
- Understand the architectural frame-work and choices for Layer 2 VPNs, including AToM and L2TPv3
- Grasp the essentials of Layer 2 LAN and WAN technologies
- Examine the theoretical and operational details of MPLS and LDP as they pertain to AToM
- Understand the theoretical and operational details of Layer 2 protocols over L2TPv3 in IP networks
- Learn about Layer 2 VPN bridged and routed interworking and Layer 2 local switching
- Understand the operation and application of Virtual Private LAN Services (VPLS)
- Learn about foundation and advanced AToM and L2TPv3 topics through an extensive collection of case studies
The historical disconnect between legacy Layer 2 and Layer 3 VPN solutions has forced service providers to build, operate, and maintain separate infrastructures to accommodate various VPN access technologies. This costly proposition, however, is no longer necessary. As part of its new Unified VPN Suite, Cisco Systems® now offers next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco® Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs.
Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastruc-tures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. The case studies include both AToM and L2TPv3 and reveal real-world service provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability.
Layer 2 VPN Architectures is your practical guide to understanding, designing, and deploying Layer 2 VPNs.
Includes a FREE 45-Day Online Edition
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of Contents:
Introduction
Part I Foundation
Chapter 1 Understanding Layer 2 VPNs
Understanding Traditional VPNs
Legacy Layer 2 VPNs
Layer 3 VPNs
Challenges of Traditional VPNs
Introducing Enhanced Layer 2 VPNs
Summary
Chapter 2 Pseudowire Emulation Framework and Standards
Pseudowire Emulation Overview
Network Reference Model
Protocol Layer and System Architecture
Native Service Processing
Pseudowire Encapsulation Processing
Transporting over the PSN
Setting Up a Pseudowire
Pseudowire Emulation Standardization
IETF Working Groups
Layer 2 VPN Architectures on Pseudowire Emulation
draft-martini
draft-kompella
Other Layer 2 VPN Architectures
Summary
Chapter 3 Layer 2 VPN Architectures
Legacy Layer 2 VPNs
Frame Relay and ATM
Data Link Switching
Virtual Private Dial-Up Network
Any Transport over MPLS Overview
Using Label Stacking in AToM
Layer 2 Protocols Supported by AToM
Deciding Whether to Use AToM
Existing Network Installation Base
Advanced Network Services
Interoperability
Network Operation Complexity
Layer 2 Tunnel Protocol Version 3 Overview
L2TPv3 Operations
Layer 2 Protocols Supported by L2TPv3
Deciding Whether to Use L2TPv3
Existing Network Installation Base
Advanced Network Services
Interoperability
Network Operation Complexity
Summary
Part II Layer 2 Protocol Primer
Chapter 4 LAN Protocols
Ethernet Background and Encapsulation Overview
Metro Ethernet Overview
Metro Ethernet Service Architectures
Understanding Spanning Tree Protocol
Spanning-Tree Operation Overview
Drawbacks of a Spanning-Tree Implementation in Today’s Networks
Pure Layer 2 Implementation
802.1q Tunneling
802.1q and 802.1p Tagging
Understanding How 802.1q Tunneling Works
802.1q Tunneling Guidelines and Restrictions
Summary
Chapter 5 WAN Data-Link Protocols
Introducing HDLC Encapsulation
Introducing PPP Encapsulation
Understanding Frame Relay
Encapsulation
Frame Relay Link Management Interface Protocol
Status Enquiry Message Frame
Status Message Frame
Update Status Message Frame
Comparing Gang of Four LMI with Annex A and Annex D
Managing Traffic
Frame Relay Traffic Policing
Frame Relay Traffic Shaping
Understanding ATM
Encapsulation
ATM Adaptation Layer
ATM Cell Structure
ATM Management Protocols: ILMI and OAM
Managing Traffic
ATM Traffic Policing
ATM Traffic Shaping
Summary
Part III Any Transport over MPLS
Chapter 6 Understanding Any Transport over MPLS
Introducing the Label Distribution Protocol
LDP Protocol Components
Discovery Mechanisms
LDP Basic Discovery
LDP Extended Discovery
Session Establishment
Label Distribution and Management
Label Binding
LDP Advertisement Message
Label Advertisement Mode
Label Distribution Control Mode
Label Retention Mode
LDP Security
Understanding AToM Operations
Pseudowire Label Binding
Establishing AToM Pseudowires
Control Word Negotiation
Using Sequence Numbers
Pseudowire Encapsulation
ATM
Frame Relay
HDLC
PPP
Ethernet
Summary
Chapter 7 LAN Protocols over MPLS Case Studies
Understanding Ethernet over MPLS Technology
EoMPLS Label Stack
Packet Format
MTU Size Requirements
Supported VC Types
Label Imposition
Label Disposition
EoMPLS Transport Case Studies
Case Study 7-1: Router to Router—Port Based
Configuring Port Transparency
Verifying and Troubleshooting Port Transparency Operation
Case Study 7-2: Router to Router—VLAN Based
Configuring VLAN-Based EoMPLS on PE Routers
Configuring VLAN-Based EoMPLS on CE Routers
Verifying and Troubleshooting the Configuration
Case Study 7-3: VLAN Rewrite
Case Study 7-4: Switch to Switch—VLAN Based
Configuring VLAN-Based EoMPLS on PEs
Configuring VLAN-Based EoMPLS on the CE Switches
Verifying and Troubleshooting the Configuration
Case Study 7-5: Switch to Switch—Port Based
Configuring Port-Based EoMPLS on the SanFran Switch
Configuring Port-Based EoMPLS on the NewYork Switch
Case Study 7-6: VLAN Rewrite in Cisco 12000 Series Routers
Verifying and Troubleshooting the Configuration
Port VLAN ID Inconsistency Issue
Case Study 7-7: Map to Pseudowire
Common Troubleshooting Techniques
Troubleshooting EoMPLS on Routers
Debugging EoMPLS Operation on PE Routers
Troubleshooting EoMPLS on Switches
Summary
Chapter 8 WAN Protocols over MPLS Case Studies
Setting Up WAN over MPLS Pseudowires
Control Plane
Pseudowire Types Used
Data Plane Encapsulation
Usage of the Control Word
MTU Requirements
Introducing WAN Protocols over MPLS
HDLC over MPLS
PPP over MPLS
Frame Relay over MPLS
ATM over MPLS
Encapsulations and Packet Format for AAL5 Transport
Encapsulations and Packet Format for Cell Transport
Configuring WAN Protocols over MPLS Case Studies
Case Study 8-1: HDLC over MPLS
Configuring HDLCoMPLS
Verifying HDLCoMPLS
Troubleshooting HDLCoMPLS
Case Study 8-2: PPP over MPLS
Configuring PPPoMPLS
Verifying and Troubleshooting PPPoMPLS
Case Study 8-3: Frame Relay DLCI over MPLS
Configuring Frame Relay DLCI over MPLS
Verifying and Troubleshooting Frame Relay DLCI over MPLS
Case Study 8-4: ATM AAL5 SDU over MPLS
Configuring AAL5oMPLS
Verifying and Troubleshooting AAL5oMPLS
Case Study 8-5: ATM Cell over MPLS
Configuring CRoMPLS
Verifying CRoMPLS
Advanced WAN AToM Case Studies
Case Study 8-6: Decoding LDP Label Mapping and Pseudowire ID FEC Elements
Case Study 8-7: AToM Hardware Capabilities
Case Study 8-8: Packed Cell Relay over MPLS
Configuring Cell Packing
Verifying Cell Packing Configuration and Operation
Case Study 8-9: Understanding Different ATM Transfer Modes
AAL5 CPCS-SDU Mode
Single Cell Relay Mode
Packed Cell Relay Mode
Summary
Chapter 9 Advanced AToM Case Studies
Load Sharing
Case Study 9-1: Unequal-Cost Multipath
Case Study 9-2: Equal-Cost Multipath
Preferred Path
Case Study 9-3: Configuring Preferred Path Using IP Routing
Case Study 9-4: Configuring a Preferred Path Using MPLS Traffic Engineering Tunnels
Case Study 9-5: Protecting AToM Pseudowires with MPLS Traffic Engineering Fast Reroute
Case Study 9-6: Configuring AToM Pseudowire over GRE Tunnel
Pseudowire Emulation in Multi-AS Networks
Case Study 9-7: Interconnecting Pseudowires with Dedicated Circuits
Case Study 9-8: BGP IPv4 Label Distribution with IGP Redistribution
Case Study 9-9: BGP IPv4 Label Distribution with IBGP Peering
Case Study 9-10: Configuring LDP Authentication for Pseudowire Signaling
Verifying Pseudowire Data Connectivity
Case Study 9-11: Advertising the VCCV Capability
Case Study 9-12: Verifying Data Plane Connectivity
Quality of Service in AToM
Case Study 9-13: Traffic Marking
Case Study 9-14: Traffic Policing
Case Study 9-15: Queuing and Shaping
Case Study 9-16: Intermediate Markings
Case Study 9-17: Layer 2–Specific Matching and Setting
Ethernet over MPLS QoS
Frame Relay over MPLS QoS
ATM over MPLS QoS
Summary
Part IV Layer 2 Tunneling Protocol Version 3
Chapter 10 Understanding L2TPv3
Universal Transport Interface: L2TPv3’s Predecessor
Introducing L2TPv3
L2TPv3 Data Encapsulation
Packet-Switched Network Layer
Demultiplexing Sublayer
Encapsulation Sublayer
L2TPv3 Control Connection
Control Message Encapsulation
L2TPv3 Control Channel Signaling
Summary
Chapter 11 LAN Protocols over L2TPv3 Case Studies
Introducing the L2TPv3 Configuration Syntax
xconnect Command Syntax
pseudowire-class Command Syntax
l2tp-class Command Syntax
LAN Protocols over L2TPv3 Case Studies
Case Study 11-1: Ethernet Port-to-Port Manual Session
Ethernet Port-to-Port Manual Configuration
Verifying Ethernet Port-to-Port Manual Session
Ethernet Port-to-Port L2TPv3 Data Plane Details
Case Study 11-2: Ethernet Port-to-Port Manual Session with Keepalive
Ethernet Port-to-Port Manual Session with Keepalive Configuration
Ethernet Port-to-Port Manual Session with Keepalive Verification
Ethernet Port-to-Port Manual Session with Keepalive Control Plane Details
Case Study 11-3: Ethernet Port-to-Port Dynamic Session
Ethernet Port-to-Port Dynamic Configuration
Ethernet Port-to-Port Dynamic Session Verification
Ethernet Port-to-Port Dynamic Session Control Plane Details
Case Study 11-4: Ethernet VLAN-to-VLAN Dynamic Session
Ethernet VLAN-to-VLAN Dynamic Configuration
Ethernet VLAN-to-VLAN Dynamic Session Verification
Ethernet VLAN-to-VLAN Dynamic Session Control Plane Details
Ethernet VLAN-to-VLAN Frame Encapsulation
Summary
Chapter 12 WAN Protocols over L2TPv3 Case Studies
WAN Protocols over L2TPv3 Technology Overview
Control Plane
Data Plane
Using the Layer 2-Specific Sublayer
MTU Considerations
HDLC and PPP over L2TPv3
Frame Relay over L2TPv3
ATM over L2TPv3
Configuring WAN Protocols over L2TPv3 Case Studies
Case Study 12-1: HDLC over L2TPv3 with Static Session
Configuring HDLCoL2TPv3
Verifying HDLCoL2TPv3
Data Plane Details
Case Study 12-2: PPP over L2TPv3 with Dynamic Session
Configuring PPPoL2TPv3
Verifying PPPoL2TPv3
Control Plane Negotiation
Data Plane Details
Case Study 12-3: Frame Relay DLCI over L2TPv3 with Dynamic Session
Configuring FRoL2TPv3
Verifying FRoL2TPv3
Data Plane Details
Case Study 12-4: AAL5 SDU over L2TPv3 with Dynamic Session
Configuring AAL5_SDUoL2TPv3 with Dynamic Session
Verifying AAL5_SDUoL2TPv3
Control Plane Details
Data Plane Details
Case Study 12-5: ATM Cell Relay over L2TPv3 with Dynamic Session
Configuring ATM_CRoL2TPv3 with Dynamic Session
Verifying ATM_CRoL2TPv3
Cell Relay Details
Summary
Chapter 13 Advanced L2TPv3 Case Studies
Case Study 13-1: L2TPv3 Path MTU Discovery
The Problem: MTU and Fragmentation with L2TPv3
The Solution: Path MTU Discovery
Understanding PMTUD
Implementing PMTUD
Combining PMTUD with DF Bit
Advanced ATM Transport over L2TPv3
Case Study 13-2: ATM OAM Emulation
Case Study 13-3: ATM Cell Packing
Quality of Service
Case Study 13-4: Traffic Marking
ToS Setting
ToS Reflection
MQC IP Precedence or DSCP Setting
Case Study 13-5: Traffic Policing
Case Study 13-6: Queuing and Shaping
Case Study 13-7: Layer 2-Specific Matching and Setting
Summary
Part V Additional Layer 2 VPN Architectures
Chapter 14 Layer 2 Interworking and Local Switching
Layer 2 Interworking Technology Overview
Bridged Interworking
Routed Interworking
Interworking MTU Considerations
Layer 2 Interworking Case Studies
Ethernet (Bridged) Interworking Case Studies
Case Study 14-1: Ethernet-to-VLAN Using AToM
Case Study 14-2: Ethernet-to-VLAN Using L2TPv3
Case Study 14-3: ATM AAL5-to-VLAN Using AToM
Ethernet-VLAN IW Switch Environment Considerations
Routed Interworking
Case Study 14-4: Frame Relay-to-VLAN Using AToM
Case Study 14-5: Frame Relay-to-PPP Using L2TPv3
Case Study 14-6: IP L2-Transport MTU Considerations
Case Study 14-7: Frame Relay-to-ATM Interworking Best Practices
Layer 2 Local Switching
Case Study 14-8: Frame Relay-to-Frame Relay Local Switching
Case Study 14-9: ATM-to-ATM Local Switching
Case Study 14-10: Ethernet-to-Ethernet Local Switching
Layer 2 Local Switching with Interworking
Case Study 14-11: Ethernet-to-VLAN Local Switching
Case Study 14-12: ATM Attachment Circuits and Local Switching
Understanding Advanced Interworking and Local Switching
connect Command
Encapsulation
Encapsulation 1: Ethernet-to-VLAN Local Switching Ethernet IW
Encapsulation 2: Frame Relay-to-VLAN IP IW Using AToM
Encapsulation 3: VLAN-to-Ethernet Bridged IW Using L2TPv3
Encapsulation 4: Frame Relay-to-PPP IP-IW Using L2TPv3
Summary
Chapter 15 Virtual Private LAN Service
Understanding VPLS Fundamentals
Service Definitions
Virtual Switch
VPLS Forwarding and Flooding
VPLS Signaling
VPLS Deployment Models
Basic Topologic Models
Full Mesh
Hub and Spoke
Partial Mesh
Hierarchical VPLS
Hierarchical VPLS with MPLS Access Network
Hierarchical VPLS with QinQ Access Network
VPLS Redundancy
VPLS Configuration Case Studies
Case Study 15-1: Basic Configuration
Configuring Attachment Circuit
Configuring VFI
Associating Attachment Circuits to the VFI
Configuration Example
Case Study 15-2: Per-VLAN MAC Address Limiting
Case Study 15-3: Quality of Service
Case Study 15-4: Layer 2 Protocol Tunneling
Case Study 15-5: Multihoming
Summary
Appendix L2TPv3 AVP Attribute Types
Index
商品描述(中文翻譯)
描述:
這是一本完整的指南,幫助您理解、設計和部署 Layer 2 VPN 技術及偽線模擬應用。
- 評估 Layer 2 VPN 的市場驅動因素
- 理解 Layer 2 VPN 的架構框架及選擇,包括 AToM 和 L2TPv3
- 掌握 Layer 2 LAN 和 WAN 技術的基本要素
- 檢視 MPLS 和 LDP 在 AToM 中的理論及操作細節
- 理解 IP 網路中 L2TPv3 上的 Layer 2 協議的理論及操作細節
- 了解 Layer 2 VPN 的橋接和路由互通及 Layer 2 本地交換
- 理解虛擬私人 LAN 服務 (VPLS) 的運作和應用
- 通過大量案例研究學習基礎和進階的 AToM 和 L2TPv3 主題
歷史上,傳統的 Layer 2 和 Layer 3 VPN 解決方案之間的脫節,迫使服務提供商建立、運營和維護獨立的基礎設施,以適應各種 VPN 接入技術。然而,這種昂貴的做法現在已不再必要。作為其新的統一 VPN 套件的一部分,Cisco Systems® 現在提供下一代 Layer 2 VPN 服務,如 Layer 2 隧道協議版本 3 (L2TPv3) 和任何傳輸通過 MPLS (AToM),使服務提供商能夠在共同的 IP/MPLS 核心網路上提供 Frame Relay、ATM、以太網和租用線服務。通過統一多個網路層並在此基礎設施上提供一套集成的軟體服務和管理工具,Cisco® Layer 2 VPN 解決方案使得成熟的運營商、以 IP 為導向的 ISP/CLEC 及大型企業客戶 (LEC) 能夠接觸到更廣泛的潛在 VPN 客戶,並提供真正的全球 VPN。
《Layer 2 VPN Architectures》是一本全面的指南,幫助整合網路基礎設施並擴展 VPN 服務。本書首先討論利用 AToM 和 L2TPv3 協議的 Layer 2 VPN 應用,並比較 Layer 3 與 Layer 2 提供商提供的 VPN。除了描述與 Layer 2 VPN 相關的概念外,本書還提供了大量案例研究,展示這些技術和架構的運作方式。案例研究包括 AToM 和 L2TPv3,揭示了真實世界中服務提供商和企業設計問題及解決方案,並提供實際的配置範例和實施細節。案例研究涵蓋所有使用 AToM 和 L2TPv3 偽線傳輸的 Layer 2 技術,包括以太網、以太網 VLAN、HDLC、PPP、Frame Relay、ATM AAL5 和 ATM 單元,以及與 Layer 2 VPN 部署相關的進階主題,如 QoS 和可擴展性。
《Layer 2 VPN Architectures》是您理解、設計和部署 Layer 2 VPN 的實用指南。