12.07.2015 Views

BROCADE IP PRIMER

BROCADE IP PRIMER

BROCADE IP PRIMER

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ContentsChapter 12: Multi Protocol Label Switching (MPLS) .......................261What is MPLS? ................................................................................................. 261MPLS Concepts ........................................................................................ 261MPLS Operations ..................................................................................... 262Configuring MPLS Basics on Brocade .................................................... 263MPLS Virtual Leased Lines (VLL) .................................................................... 264How Virtual Leased Lines work ............................................................... 264Configuring VLL on Brocade .................................................................... 265MPLS Virtual Private LAN Segment (VPLS) .................................................... 266Configuring VPLS on Brocade ................................................................. 266MPLS Layer 3 VPNs ......................................................................................... 267Configuring MPLS Layer 3 VPNs ............................................................. 269Summary .......................................................................................................... 270Chapter 13: Border Gateway Protocol (BGP) ....................................271A Routing Protocol for the Internet ..................................................................271What is BGP? ................................................................................................... 272IGP vs. EGP ............................................................................................... 272eBGP ......................................................................................................... 273iBGP .......................................................................................................... 273The Autonomous System (AS) ..........................................................................274Stub AS ......................................................................................................276Neighbor Peering ..............................................................................................277Peering States .......................................................................................... 278Configuring BGP ............................................................................................... 279Configuring Neighbors (Peers) ................................................................ 279Advertising Routes ................................................................................... 280Loopback Interfaces (iBGP) .................................................................... 280iBGP - next-hop-self ................................................................................. 281eBGP - multihop ....................................................................................... 282BGP show Commands ............................................................................. 284Summary .......................................................................................................... 285Chapter Review Questions .............................................................................. 286Answers to Review Questions ......................................................................... 287Chapter 14: Security, Redundancy and More ...................................289Security: Access Control Lists (ACL) ............................................................... 289Subnet Mask vs. Wildcard (or Inverse) Mask ........................................ 289Numbered Access Lists ........................................................................... 291Named Access Lists ................................................................................ 293Creating Access Lists .............................................................................. 294Applying Access Lists ............................................................................... 299Strict Mode ............................................................................................... 301ACL Flow Counters ................................................................................... 302MAC Filters ............................................................................................... 303Access Control Lists: Not Just For Security .................................................... 304Policy-Based Routing (PBR) .................................................................... 304Network Address Translation (NAT) .........................................................307xBrocade <strong>IP</strong> Primer

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!