MPLS and VPN Architectures

Hardcover (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $40.53
Usually ships in 1-2 business days
(Save 43%)
Other sellers (Hardcover)
  • All (5) from $40.53   
  • New (2) from $42.00   
  • Used (3) from $40.53   

Overview

Master the latest MPLS VPN solutions to design, deploy, and troubleshoot advanced or large-scale networks

With MPLS and VPN Architectures, Volume II, you'll learn:

  • How to integrate various remote access technologies into the backbone providing VPN service to many different types of customers
  • The new PE-CE routing options as well as other advanced features, including per-VPN Network Address Translation (PE-NAT)
  • How VRFs can be extended into a customer site to provide separation inside the customer network
  • The latest MPLS VPN security features and designs aimed at protecting the MPLS VPN backbone
  • How to carry customer multicast traffic inside a VPN
  • The latest inter-carrier enhancements to allow for easier and more scalable deployment of inter-carrier MPLS VPN services
  • Advanced troubleshooting techniques including router outputs to ensure high availability

MPLS and VPN Architectures, Volume II, builds on the best-selling MPLS and VPN Architectures, Volume I (1-58705-002-1), from Cisco Press. Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.

MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.

MPLS and VPN Architectures, Volume II, also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.

This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Read More Show Less

Product Details

  • ISBN-13: 9781587051128
  • Publisher: Cisco Press
  • Publication date: 6/6/2003
  • Series: Networking Technology Series
  • Pages: 470
  • Sales rank: 1,204,381
  • Product dimensions: 7.50 (w) x 9.50 (h) x 1.25 (d)

Meet the Author

Ivan Pepelnjak, CCIE No. 1354, has more than 10 years experience in designing, installing, troubleshooting, and operating large service provider and enterprise WAN and LAN networks and is currently chief technologies advisor at NIL Data Communications. He is the architect of NIL's Service Provider Academy program, one of the architects of the Cisco Systems(r) Service Provider curriculum, and the lead developer of several service provider-focused courses covering MPLS, Border Gateway Protocol (BGP), and IP quality of service. Ivan is one of the Cisco(r) Routing authorities in Europe and is the author of EIGRP Network Design Solutions and co-author of MPLS and VPN Architectures, both published by Cisco Press.

Jim Guichard, CCIE No. 2069, is a technical leader for MPLS and IP backbone technologies at Cisco Systems and is the co-author of the highly successful book MPLS and VPN Architectures, published by Cisco Press. He has extensive experience with designing, migrating, and deploying large-scale IP networks and has assisted many of the largest Cisco customers with the integration of MPLS-related technologies into their networks.

Jeff Apcar is a senior consulting engineer in the Advanced Services group at Cisco Systems and has been working with MPLS technologies for more than three years. Jeff's focus is the Asia-Pacific theatre where he has provided detailed designs and design consulting for nearly every major service provider MPLS rollout in the region.

Read More Show Less

Table of Contents

Introduction.

I. INTRODUCTION.

1. MPLS VPN Architecture Overview.

MPLS VPN Terminology. Connection-Oriented VPNs. Connectionless VPNs. MPLS-Based VPNs. New MPLS VPN Developments. Summary.

II. ADVANCED PE-CE CONNECTIVITY.

2. Remote Access to an MPLS VPN.

Feature Enhancements for MPLS VPN Remote Access. Overview of Access Protocols and Procedures. Providing Dial-In Access to an MPLS VPN. Providing Dial-Out Access via LSDO. Providing Dial-Out Access Without LSDO (Direct ISDN). Providing Dial Backup for MPLS VPN Access. Providing DSL Access to an MPLS VPN. Providing Cable Access to an MPLS VPN. Advanced Features for MPLS VPN Remote Access. Summary.

3. PE-CE Routing Protocol Enhancements and Advanced Features.

PE-CE Connectivity: OSPF. PE-CE Connectivity: Integrated IS-IS. PE-CE Connectivity: EIGRP. Summary.

4. Virtual Router Connectivity.

Configuring Virtual Routers on CE Routers. Linking the Virtual Router with the MPLS VPN Backbone. VRF Selection Based on Source IP Address. Performing NAT in a Virtual Router Environment. Summary.

III. ADVANCED DEPLOYMENT SCENARIOS.

5. Protecting the MPLS-VPN Backbone.

Inherent Security Capabilities. Neighbor Authentication. CE-to-CE Authentication. Control of Routes That Are Injected into a VRF. PE to CE Circuits. Extranet Access. Internet Access. IPSec over MPLS. Summary.

6. Large-Scale Routing and Multiple Service Provider Connectivity.

Large Scale Routing: Carrier's Carrier Solution Overview. Carrier Backbone Connectivity. Label Distribution Protocols on PE-CE Links. BGP-4 Between PE/CE Routers. Hierarchical VPNs: Carrier's Carrier MPLS VPNs. VPN Connectivity Between Different Service Providers. Summary.

7. Multicast VPN.

Introduction to IP Multicast. Enterprise Multicast in a Service Provider Environment. mVPN Architecture. MDTs. Case Study of mVPN Operation in SuperCom. Summary.

8. IP Version 6 Transport Across an MPLS Backbone.

IPv6 Business Drivers. Deployment of IPv6 in Existing Networks. Quick Introduction to IPv6. In-Depth 6PE Operation and Configuration. Complex 6PE Deployment Scenarios. Summary.

IV. TROUBLESHOOTING.

9. Troubleshooting of MPLS-Based Solutions.

Introduction to Troubleshooting of MPLS-Based Solutions. Troubleshooting the MPLS Backbone. Other Quick Checks. MPLS Control Plane Troubleshooting. MPLS Data Plane Troubleshooting. MPLS VPN Troubleshooting. In-Depth MPLS VPN Troubleshooting. Summary. Index.

Read More Show Less

Customer Reviews

Average Rating 4
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted March 24, 2011

    No text was provided for this review.

Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)