10.01.2023 Views

Designing Cisco Network Service Architectures

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VPN Gestionada por el Proveedor de Servicios ..................................................................................... 189

Cómo elegir su conexión WAN ....................................................................................................................... 190

VPN de MPLS de capa 3 ..................................................................................................................................... 193

Arquitectura MPLS VPN .................................................................................................................................... 195

Consideraciones sobre el enrutamiento empresarial ......................................................................... 197

Provider Edge (PE) Arquitectura del enrutador ................................................................................... 198

Protocolo de enrutamiento PE-CE ............................................................................................................... 202

Virtual Private Wire Service (VPWS).......................................................................................................... 215

Servicio de LAN Privada Virtual (VPLS) .................................................................................................... 217

VPLS Versus VPWS .............................................................................................................................................. 223

WAN Gestionada por la Empresa.................................................................................................................. 225

Vista general de la VPN Gestionada por la Empresa ........................................................................... 226

Descripción de GRE ............................................................................................................................................. 227

Descripción de Multipoint GRE ...................................................................................................................... 229

Comparación punto a punto y multipunto GRE ..................................................................................... 230

Descripción de IPsec ........................................................................................................................................... 232

IPsec y GRE .............................................................................................................................................................. 234

IPsec y la interfaz de túnel virtual ................................................................................................................ 236

IPsec y VTI dinámico ........................................................................................................................................... 237

Descripción de DMVPN ...................................................................................................................................... 238

DMVPN Fase 1 ........................................................................................................................................................ 242

DMVPN Fase 2 ........................................................................................................................................................ 245

DMVPN Fase 3 ........................................................................................................................................................ 248

DMVPN Fase 1-3 Resumen .............................................................................................................................. 250

DMVPN y redundancia ....................................................................................................................................... 252

Descripción general de VPN SSL ................................................................................................................... 253

Descripción general de FlexVPN ................................................................................................................... 254

Arquitectura de FlexVPN .................................................................................................................................. 255

Capacidades FlexVPN ......................................................................................................................................... 256

Bloques de configuración FlexVPN .............................................................................................................. 257

GETVPN ..................................................................................................................................................................... 258

Diseño de la Resiliencia de la WAN Empresarial .................................................................................. 262

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!