Selecting MPLS VPN Services (Hardcover)
暫譯: 選擇 MPLS VPN 服務 (精裝版)
Chris Lewis, Steve Pickavance
- 出版商: Cisco Press
- 出版日期: 2006-02-23
- 售價: $2,030
- 貴賓價: 9.5 折 $1,929
- 語言: 英文
- 頁數: 456
- 裝訂: Hardcover
- ISBN: 1587051915
- ISBN-13: 9781587051913
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$490$382 -
$2,275$2,161 -
$2,540$2,413 -
$299$254 -
$2,710$2,575 -
$490$382 -
$880$695 -
$3,220$3,059 -
$450$383 -
$780$663 -
$680$578 -
$650$507 -
$680$578 -
$980$774 -
$580$458 -
$880$695 -
$680$537 -
$450$356 -
$620$527 -
$680$449 -
$1,800$1,710 -
$720$569 -
$1,575$1,496 -
$3,010$2,860 -
$650$514
相關主題
商品描述
Description:
A guide to using and defining MPLS VPN services
- Analyze strengths and weaknesses of TDM and Layer 2 WAN services
- Understand the primary business and technical issues when evaluating IP/MPLS VPN offerings
- Describe the IP addressing, routing, load balancing, convergence, and services capabilities of the IP VPN
- Develop enterprise quality of service (QoS) policies and implementation guidelines
- Achieve scalable support for multicast services
- Learn the benefits and drawbacks of various security and encryption mechanisms
- Ensure proper use of services and plan for future growth with monitoring and reporting services
- Provide remote access, Internet access, and extranet connectivity to the VPN supported intranet
- Provide a clear and concise set of steps to plan and execute a network migration from existing ATM/Frame Relay/leased line networks to an IP VPN
IP/MPLS VPNs are compelling for many reasons. For enterprises, they enable right-sourcing of WAN services and yield generous operational cost savings. For service providers, they offer a higher level of service to customers and lower costs for service deployment.
Migration comes with challenges, however. Enterprises must understand key migration issues, what the realistic benefits are, and how to optimize new services. Providers must know what aspects of their services give value to enterprises and how they can provide the best value to customers.
Selecting MPLS VPN Services helps you analyze migration options, anticipate migration issues, and properly deploy IP/MPLS VPNs. Detailed configurations illustrate effective deployment while case studies present available migration options and walk you through the process of selecting the best option for your network. Part I addresses the business case for moving to an IP/MPLS VPN network, with a chapter devoted to the business and technical issues you should review when evaluating IP/MPLS VPN offerings from major providers. Part II includes detailed deployment guidelines for the technologies used in the IP/MPLS VPN.
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of Contents:
Part I Business Analysis and Requirements of IP/MPLS VPN
Chapter 1 Assessing Enterprise Legacy WANs and IP/VPN Migration
Current State of Enterprise NetworksEvolutionary Change of Enterprise Networks
Acme, a Global Manufacturer
Acme’s Global Span
Business Desires of Acme’s Management
Acme’s IT Applications Base
Acme’s IT Communications Infrastructure
New WAN Technologies for Consideration by Acme
Layer 3 IP/MPLS VPN Services
Layer 2 IP/MPLS VPN Services
Convergence Services
Internet Access
Mobile Access and Teleworker Access
Voice Services: Service Provider Hosted PSTN Gateway
Voice Services: Service Provider Hosted IP Telephony
Summary
Chapter 2 Assessing Service Provider WAN Offerings
Enterprise/Service Provider Relationship and Interface
Investigation Required in Selecting a Service Provider
Coverage, Access, and IP
Financial Strength of the Service Provider
Convergence
Transparency
IP Version 6
Provider Cooperation/Tiered Arrangements
Enhanced Service-Level Agreement
Customer Edge Router Management
Service Management
Customer Reports and SLA Validation
Summary
Chapter 3 Analyzing Service Requirements
Application/Bandwidth Requirements
Backup and Resiliency
Enterprise Segmentation Requirements
Mapping VLANs to VPNs in the Campus
Access Technologies
Frame Relay
ATM
Dedicated Circuit from CE to PE
ATM PVC from CE to PE
Frame Relay PVC from CE to PE
Metro Ethernet
QoS Requirements
Bandwidth
Packet Delay and Jitter
Packet Loss
Enterprise Loss, Latency, and Jitter Requirements
QoS at Layer 2
Subscriber Network QoS Design
Baseline New Applications
Develop the Network
Security Requirements
Topological and Network Design Considerations
SP-Managed VPNs
Multiprovider Considerations
Extranets
Case Study: Analyzing Service Requirements for Acme, Inc.
Layer 2 Description
Existing Customer Characteristics That Are Required in the New Network
DefenseCo’s Backbone Is a Single Autonomous System
Reasons for Migrating to MPLS
Evaluation Testing Phase
Routing Convergence
Jitter and Delay
Congestion, QoS, and Load Testing
Vendor Knowledge and Technical Performance
Evaluation Tools
TTCP
Lessons Learned
Transition and Implementation Concerns and Issues
Post-Transition Results
Summary
References
Part II Deployment Guidelines
Chapter 4 IP Routing with IP/MPLS VPNs
Introduction to Routing for the Enterprise MPLS VPN
Implementing Routing Protocols
Network Topology
Addressing and Route Summarization
Route Selection
Convergence
Network Scalability
Memory
CPU
Security
Site Typifying WAN Access: Impact on Topology
Site Type: Topology
WAN Connectivity Standards
Site Type A Attached Sites: Dual CE and Dual PE
Site Type B/3 Dual-Attached Site–Single CE, Dual PE
Site Type B/3 Dual-Attached Site–Single CE, Single PE
Site Type D Single-Attached Site–Single CE with Backup
Convergence: Optimized Recovery
IP Addressing
Routing Between the Enterprise and the Service Provider
Using EIGRP Between the CE and PE
How EIGRP MPLS VPN PE-to-CE Works
PE Router: Non-EIGRP-Originated Routes
PE Router: EIGRP-Originated Internal Routes
PE Router: EIGRP-Originated External Routes
Multiple VRF Support
Extended Communities Defined for EIGRP VPNv4
Metric Propagation
Configuring EIGRP for CE-to-PE Operation
Using BGP Between the CE and PE
Securing CE-PE Peer Sessions
Improving BGP Convergence
Case Study: BGP and EIGRP Deployment in Acme, Inc.
Small Site–Single-Homed, No Backup
Medium Site–Single-Homed with Backup
Medium Site–Single CE Dual-Homed to a Single PE
Large Site–Dual-Homed (Dual CE, Dual PE)
Load Sharing Across Multiple Connections
Very Large Site/Data Center–Dual Service Provider MPLS VPN
Site Typifying Site Type A Failures
Solutions Assessment
Summary
References
Cisco Press
Chapter 5 Implementing Quality of Service
Introduction to QoS
Building a QoS Policy: Framework Considerations
QoS Tool Chest: Understanding the Mechanisms
Classes of Service
Hardware Queuing
Software Queuing
QoS Mechanisms Defined
Pulling It Together: Build the Trust
Building the Policy Framework
Classification and Marking of Traffic
Trusted Edge
Device Trust
Application Trust
CoS and DSCP
Strategy for Classifying Voice Bearer Traffic
QoS on Backup WAN Connections
Shaping/Policing Strategy
Queuing/Link Efficiency Strategy
IP/VPN QoS Strategy
Approaches for QoS Transparency Requirements for the Service Provider
Network
QoS CoS Requirements for the SP Network
WRED Implementations
Identification of Traffic
What Would Constitute This Real-Time Traffic?
QoS Requirements for Voice, Video, and Data
QoS Requirements for Voice
QoS Requirements for Video
QoS Requirements for Data
The LAN Edge: L2 Configurations
Classifying Voice on the WAN Edge
Classifying Video on the WAN Edge
Classifying Data on the WAN Edge
Case Study: QoS in the Acme, Inc. Network
QoS for Low-Speed Links: 64 kbps to 1024 kbps
QoS Reporting
Summary
References
Chapter 6 Multicast in an MPLS VPN
Introduction to Multicast for the Enterprise MPLS VPN
Multicast Considerations
Mechanics of IP Multicast
RPF
Source Trees Versus Shared Trees
Protocol-Independent Multicast
Interdomain Multicast Protocols
Source-Specific Multicast
Multicast Addressing
Administratively Scoped Addresses
Deploying the IP Multicast Service
Default PIM Interface Configuration Mode
Host Signaling
Sourcing
Multicast Deployment Models
Any-Source Multicast
Source-Specific Multicast
Enabling SSM 206
Multicast in an MPLS VPN Environment: TransparencyMulticast Routing Inside the VPN
Case Study: Implementing Multicast over MPLS for Acme
Multicast Addressing
Multicast Address Management
Predeployment Considerations
MVPN Configuration Needs on the CE
Boundary ACL
Positioning of Multicast Boundaries
Configuration to Apply a Boundary Access List
Rate Limiting
MVPN Deployment Plan
Preproduction User Test Sequence
What Happens When There Is No MVPN Support?
Other Considerations and Challenges
Summary
References
Chapter 7 Enterprise Security in an MPLS VPN Environment
Setting the Playing Field
Comparing MPLS VPN Security to Frame Relay Networks
Security Concerns Specific to MPLS VPNs
Issues for Enterprises to Resolve When Connecting at Layer 3 to Provider Networks
History of IP Network Attacks
Strong Password Protection
Preparing for an Attack
Identifying an Attack
Initial Precautions
Basic Attack Mitigation
Basic Security Techniques
Remote-Triggered Black-Hole Filtering
Loose uRPF for Source-Based Filtering
Strict uRPF and Source Address Validation
Sinkholes and Anycast Sinkholes
Backscatter Traceback
Cisco Guard
Distributed DoS, Botnets, and Worms
Anatomy of a DDoS Attack
Botnets
Worm Mitigation
Case Study Selections
Summary
References
Comparing MPLS VPN to Frame Relay Security
ACL Information
Miscellaneous Security Tools
Cisco Reference for MPLS Technology and Operation
Cisco Reference for Cisco Express Forwarding
Public Online ISP Security Bootcamp
Tutorials, Workshops, and Bootcamps
Original Backscatter Traceback and Customer-Triggered Remote- Triggered Black-Hole Techniques
Source for Good Papers on Internet Technologies and Security
Security Work Definitions
NANOG SP Security Seminars and Talks
Birds of a Feather and General Security Discussion Sessions at NANOG
Chapter 8 MPLS VPN Network Management
The Enterprise: Evaluating Service Provider Management Capabilities
Provisioning
SLA Monitoring
Fault Management
Reporting
Root Cause Analysis
The Enterprise: Managing the VPN
Planning
Ordering
Provisioning
Monitoring
Optimization
The Service Provider: How to Meet and Exceed Customer Expectations
Provisioning
Fault Monitoring
OAM and Troubleshooting
Fault Management
SLA Monitoring
Reporting
Summary
References
Chapter 9 Off-Net Access to the VPN
Remote Access
Dial Access via RAS
Dial Access via L2TP
Connecting L2TP Solutions to VRFs
DSL Considerations
Cable Considerations
IPsec Access
GRE + IPsec on the CPE
CE-to-CE IPsec
The Impact of Transporting Multiservice Traffic over IPsec
Split Tunneling in IPsec
Supporting Internet Access in IP VPNs
Case Study Selections
Summary
References
General PPP Information
Configuring Dial-In Ports
L2TP
Layer 2 Tunnel Protocol Fact Sheet
Layer 2 Tunnel Protocol
VPDN Configuration Guide
VPDN Configuration and Troubleshooting
Security Configuration Guide
RADIUS Configuration Guide
Broadband Aggregation to MPLS VPN
Remote Access to MPLS VPN
Network-Based IPsec VPN Solutions
IPsec
GRE + IPsec
DMVPN
Split Tunneling
Prefragmentation 373
Chapter 10 Migration Strategies
Network Planning
Writing the RFP
Architecture and Design Planning with the Service Providers
Project Management
SLAs with the Service Providers
Network Operations Training
Implementation Planning
Phase 1
Phase 2
Phase 3
Phase 4
On-Site Implementation
Case Study Selections
Summary
Part III Appendix
Appendix Questions to Ask Your Provider Regarding Layer 3 IP/MPLS VPN Capability
商品描述(中文翻譯)
**描述:**
一本使用和定義 MPLS VPN 服務的指南
- 分析 TDM 和 Layer 2 WAN 服務的優缺點
- 理解評估 IP/MPLS VPN 產品時的主要商業和技術問題
- 描述 IP VPN 的 IP 位址、路由、負載平衡、收斂和服務能力
- 制定企業服務品質 (QoS) 政策和實施指導方針
- 實現可擴展的多播服務支持
- 學習各種安全和加密機制的優缺點
- 確保服務的正確使用,並通過監控和報告服務規劃未來增長
- 提供遠端訪問、網際網路訪問和外部網路連接到 VPN 支持的內部網路
- 提供一套清晰簡潔的步驟,以計劃和執行從現有 ATM/Frame Relay/租用線路網路到 IP VPN 的網路遷移
IP/MPLS VPN 之所以吸引人,有很多原因。對於企業來說,它們能夠正確地選擇 WAN 服務並帶來可觀的運營成本節省。對於服務提供商來說,它們為客戶提供了更高的服務水平,並降低了服務部署的成本。
然而,遷移也伴隨著挑戰。企業必須了解關鍵的遷移問題、現實的好處以及如何優化新服務。提供商必須知道其服務的哪些方面為企業帶來價值,以及如何為客戶提供最佳價值。
《選擇 MPLS VPN 服務》幫助您分析遷移選項、預測遷移問題並正確部署 IP/MPLS VPN。詳細的配置說明有效的部署,而案例研究則展示可用的遷移選項並引導您選擇最適合您網路的選項。第一部分針對轉向 IP/MPLS VPN 網路的商業案例,並專門有一章討論在評估主要提供商的 IP/MPLS VPN 產品時應檢視的商業和技術問題。第二部分包括 IP/MPLS VPN 中使用的技術的詳細部署指導方針。
本書是 Cisco Press® 的網路技術系列的一部分,為網路專業人士提供有價值的信息,以構建高效的網路、理解新技術並建立成功的職業生涯。
**目錄:**
**第一部分** 商業分析與 IP/MPLS VPN 的需求
**第 1 章** 評估企業舊有 WAN 和 IP/VPN 遷移
當前企業網路的狀態
企業網路的演變
Acme,一家全球製造商
Acme 的全球範圍
Acme 管理層的商業需求
Acme 的 IT 應用基礎
Acme 的 IT 通信基礎設施
Acme 考慮的新 WAN 技術
Layer 3 IP/MPLS VPN 服務
Layer 2 IP/MPLS VPN 服務
收斂服務
網際網路訪問
行動訪問和遠端工作者訪問
語音服務:服務提供商托管的 PSTN 閘道
語音服務:服務提供商托管的 IP 電話
摘要
**第 2 章** 評估服務提供商的 WAN 產品
企業/服務提供商的關係與介面
選擇服務提供商所需的調查
覆蓋範圍、接入和 IP
服務提供商的財務實力
收斂
透明度
IP 版本 6
提供商合作/分層安排
增強的服務水平協議
客戶邊緣路由器管理
服務管理
客戶報告和 SLA 驗證
摘要
**第 3 章** 分析服務需求
應用/帶寬需求
備份和韌性
企業分段需求
在校園中將 VLAN 映射到 VPN
接入技術
Frame Relay
ATM
從 CE 到 PE 的專用電路
從 CE 到 PE 的 ATM PVC
從 CE 到 PE 的 Frame Relay PVC
Metro Ethernet
QoS 需求
帶寬
封包延遲和抖動
封包丟失
企業損失、延遲和抖動需求
Layer 2 的 QoS
訂閱者網路 QoS 設計
基線新應用
發展網路
安全需求
拓撲和網路設計考量
SP 管理的 VPN
多提供商考量
外部網路
案例研究:分析 Acme, Inc. 的服務需求
Layer 2 描述
新網路中所需的現有客戶特徵
DefenseCo 的骨幹是單一自治系統
遷移到 MPLS 的原因
評估測試階段
路由收斂
抖動和延遲
擁塞、QoS 和負載測試
供應商知識和技術性能
評估工具
TTCP
獲得的經驗教訓
過渡和實施的考量與問題
過渡後的結果
摘要
參考文獻
**第二部分** 部署指導方針
**第 4 章** 使用 IP/MPLS VPN 的 IP 路由
企業 MPLS VPN 的路由介紹
實施路由協議
網路拓撲
位址和路由摘要
路由選擇
收斂
網路可擴展性
記憶體
CPU
安全性