19.07.2013 Views

MPLS VPN Technology

MPLS VPN Technology

MPLS VPN Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Summary<br />

After completing this lesson, you should be able to perform the following tasks:<br />

■ Identify major Virtual Private network topologies, their characteristics and<br />

usage scenarios<br />

■ Describe the differences between overlay <strong>VPN</strong> and peer-to-peer <strong>VPN</strong><br />

■ List major technologies supporting overlay <strong>VPN</strong>s and peer-to-peer <strong>VPN</strong>s<br />

■ Position <strong>MPLS</strong> <strong>VPN</strong> in comparison with other peer-to-peer <strong>VPN</strong><br />

implementations<br />

■ Describe major architectural blocks of <strong>MPLS</strong> <strong>VPN</strong><br />

■ Describe <strong>MPLS</strong> <strong>VPN</strong> routing model and packet forwarding<br />

■ Describe the model for <strong>MPLS</strong> <strong>VPN</strong>s to span more than one autonomous<br />

system<br />

Copyright © 2002, Cisco Systems, Inc. <strong>MPLS</strong> <strong>VPN</strong> <strong>Technology</strong> 135

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!