Network Virtualization

by ;
Edition: 1st
Format: Hardcover
Pub. Date: 2006-07-19
Publisher(s): Cisco Press
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $73.50

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Share network resources and reduce costs while providing secure network services to diverse user communities Presents the business drivers for network virtualization and the major challenges facing network designers today Shows how to use virtualization designs with existing applications, such as VoIP and network services, such as quality of service and multicast Provides design alternatives for different real-world deployment scenarios, with configuration examples and case studies Today's enterprises have several groups of users with specific needs. The differences between these groups translate into specific network requirements. Within some organizations, these requirements are so dissimilar that the different groups need to be treated as totally separate customers by the enterprise's IT department. As the number of groups increases, keeping them separate and secure is a challenge to IT departments, particularly with the advent of wireless networks, the requirement for enterprise-wide user mobility, and the need for cross group collaboration with resource sharing on a per project basis.Network Virtualizationprovides design guidance for virtualized enterprise networks and arms network architects with the background necessary to make sound technological choices in the face of different business requirements. As a means of introduction,Network Virtualizationlays out the fundamentals of enterprise network design. The book builds upon these fundamental principles to introduce the different virtualization methods as the logical evolution of the enterprise network architecture. Detailed descriptions of the technology, design principles, network configurations, and real-world case studies are provided throughout the book, helping readers develop a pragmatic understanding of virtualized enterprise network architectures. Specific examples are included that tailor deployment advice to the small, medium, and large enterprise environment.

Author Biography

Kumar Reddy is a senior manager of Technical Marketing Engineering at Cisco Systems. Kumar has more than 15 years of industry experience. He has held a variety of roles at Cisco as a technical specialist for a range of products and technology, including Broadband DSL, LAN Switching and, most recently, designing end-to-end systems for small and medium businesses.

 

Victor Moreno, CCIE #6908, is a Technical Marketing Engineer at Cisco Systems. Victor is a CCIE and has more than 10 years of industry experience. Victor is a recognized expert in the field of virtual enterprise networks and has been involved with enterprise campus network virtualization since 2001. Victor resides in San Jose, CA.

Table of Contents

Introduction xviii
Part I A Network Architecture for the Virtual Enterprise 3(120)
Chapter 1 Business Drivers Behind Enterprise Network Virtualization
5(12)
Why Virtualize?
5(9)
Visitors, Partners, Contractors, and Quarantine Areas
7(1)
Regulatory Compliance
8(1)
Secure Service Areas
9(1)
Network Consolidation
10(1)
Acquisitions and Mergers
11(1)
Multitenant Enterprises
11(1)
Virtual Project Environment: Next-Generation Business Processes
12(2)
Business Requirements Drive Technical Requirements
14(1)
Summary
15(2)
Chapter 2 Designing Scalable Enterprise Networks
17(18)
Hierarchical Campus Design
17(5)
Virtualizing the Campus
22(1)
WAN Design
22(11)
WAN Provider Service Offerings
23(2)
WAN Architecture
25(2)
WAN Resiliency
27(2)
WAN Routing Considerations
29(2)
Securing the WAN
31(1)
WAN Virtualization
32(1)
Summary
33(2)
Chapter 3 Basic Virtualized Enterprise
35(20)
The Virtual Enterprise
37(3)
Transport Virtualization—VNs
40(9)
VLANs and Scalability
42(1)
Virtualizing the Routed Core
43(4)
Policy-Based Segmentation
43(2)
Control-Plane-Based Virtualization
45(2)
The LAN Edge: Authentication and Authorization
47(2)
Central Services Access: Virtual Network Perimeter
49(3)
Unprotected Services
51(1)
Summary
52(3)
Chapter 4 A Virtualization Technologies Primer: Theory
55(34)
Network Device Virtualization
55(11)
Layer 2: VLANs
56(1)
Layer 3: VRF Instances
57(6)
FIB s and RIBS
58(3)
Virtual and Logical Routers
61(1)
VRF Awareness
62(1)
Layer 2 Again: VFIs
63(1)
Virtual Firewall Contexts
64(1)
Network Device Virtualization Summary
65(1)
Data-Path Virtualization
66(17)
Layer 2: 802.1q Trunking
66(1)
Generic Routing Encapsulation
66(3)
GRE IOS Configuration
68(1)
UPsec
69(3)
Cisco IOS IPsec Configuration
71(1)
L2TPv3
72(3)
L2TPv3 IOS Configuration
73(2)
Label Switched Paths
75(8)
The FIB Revisited
79(1)
Cisco IOS LSP Example
80(3)
Data-Path Virtualization Summary
83(1)
Control-Plane Virtualization—Routing Protocols
83(4)
VRF-Aware Routing
83(2)
VRF per Process: OSPF
84(1)
VRF Address Families: EIGRP, RIP, and BGP
84(1)
Multi-Topology Routing
85(1)
Control-Plane Virtualization Summary
86(1)
Summary
87(2)
Chapter 5 Infrastructure Segmentation Architectures: Theory
89(34)
Hop to Hop
90(5)
Layer 3 H2H
92(1)
Single Address Space Alternatives
93(2)
H2H Summary
95(1)
Tunnel Overlay for L3VPN
95(7)
L3VPN Using GRE and IPsec Overlay
96(2)
Putting It All Together: DMVPN
98(3)
Layer 3 Tunnel Summary
101(1)
Tunnel Overlay for Layer 2 VPNs
102(6)
Layer 2 P2P Overlay Using L2TPv3
102(2)
Layer 2 P2P Overlay Using MPLS
104(2)
Layer 2 VPN MP2MP Using MPLS (VPLS)
106(1)
Layer 2 VPN Summary
107(1)
Peer-Based Model for Layer 3 VPNs
108(8)
RFC 2547bis the MPLS Way
112(2)
RFC 2547bis Forwarding-Plane Alternatives
114(2)
MPLS over mGRE
114(1)
MPLS over L2TPv3
115(1)
Inter-Autonomous System Connectivity: Another Application of Tunnels
116(5)
Carrier Supporting Carrier
116(3)
Inter-Autonomous System Routing
119(1)
Inter-Autonomous System Connectivity Summary
120(1)
Summary
121(2)
Part II Enterprise Virtualization Techniques and Best Practices 123(198)
Chapter 6 Infrastructure Segmentation Architectures: Practice
125(48)
Hop-to-Hop VLANs
125(13)
Layer 3 Hop to Hop
129(9)
Single Address Space Solutions
138(3)
Tunnel Overlay for Layer 3 VPNs
141(14)
GRE Tunnels
141(3)
Multipoint GRE Tunnels
144(3)
Hub mGRE Configuration
145(1)
Spoke GRE Configuration
146(1)
Mapping Traffic to Tunnels
147(2)
PBR
148(1)
VRFs
148(1)
Resiliency and Routing Considerations
149(6)
Encryption Considerations
155(1)
Layer 3 VPNs
155(10)
RFC 2547bis the MPLS Way
155(4)
Campus Network/MAN Deployment
155(4)
RFC 2547bis over L2TPv3
159(1)
RFC 2547bis over GRE
160(1)
IGP Best Practices
160(1)
BGP Best Practices: Route Reflectors
160(1)
BGP Best Practices: Route Distinguishers and ECMP Routing
161(3)
Migration Recommendations
164(1)
Layer 2 VPNs
165(6)
Ethernet over MPLS
166(4)
Providing Point-to-Point Connectivity
166(1)
Providing Multipoint Connectivity
167(1)
Resilient Pseudowire Topologies
168(2)
VPLS
170(1)
Summary
171(2)
Chapter 7 Extending the Virtualized Enterprise over the WAN
173(34)
WAN Services
173(5)
IP Services
173(2)
Layer 2 Circuits
175(1)
P2P GRE
176(1)
Multipoint GRE
177(1)
Dynamic Multipoint VPN
178(1)
Extending Segmentation over the WAN
178(2)
MPLS over Layer 2 Circuits
180(5)
VRF-to-VRF Connections at the Autonomous System Border Routers
182(1)
MP-eBGP Exchange of Labeled VPN-IPv4 Routes Between Adjacent ASBRs
182(1)
Multihop MP-eBGP Between Remote Autonomous Systems
182(1)
Using MPLS over Layer 2 Circuits for Segmented Branch Aggregation
182(2)
Benefits and Drawbacks
184(1)
Contracting Multiple IP VPNs
185(2)
Benefits and Drawbacks
187(1)
Carrier Supporting Carrier (CsC)
187(5)
Using CsC for Segmented Branch Aggregation
191(1)
Benefits and Drawbacks
192(1)
MPLS over GRE
192(3)
Benefits and Drawbacks
195(1)
RFC 2547 VPNs over L2TPv3 Tunnels
195(5)
Benefits and Drawbacks
199(1)
VRFs Interconnected by a GRE or DMVPN Overlay
200(2)
Benefits and Drawbacks
202(1)
RFC 2547 VPNs over DMVPN
202(3)
Benefits and Drawbacks
205(1)
Summary
205(2)
Chapter 8 Traffic Steering and Service Centralization
207(34)
Shared Services: Protected vs. Unprotected
207(1)
Unprotected Services
207(1)
Protected Services
207(1)
Unprotected Services Access
208(10)
Basic Import/Export Mechanism
210(2)
Multiplatform Deployment
210(1)
Single-Platform Deployment
211(1)
Any-to-Any and Hub-and-Spoke VPNs
212(1)
Extranet VPN
213(1)
Localized Inter-VPN Communication
214(3)
Leaking Traffic with the Global Table
217(1)
Protected Services Access
218(18)
Firewalling for Common Services
220(2)
Routed Firewalls and Transparent Firewalls
222(1)
Routed Firewall Deployments
222(12)
Single Common Services/Internet Edge Site
222(2)
Multiple Common Services/Internet Edge Sites
224(6)
Routing Considerations
230(1)
Network Address Translation (NAT)
231(3)
Transparent Firewall Deployments
234(2)
Providing IP Services
236(2)
DHCP
236(2)
Dedicated DHCP Services per VN
236(1)
Shared DHCP Services
237(1)
Domain Name System (DNS) Services
238(1)
Summary
238(3)
Chapter 9 Multicast in a Virtualized Environment
241(32)
Multicast Introduction
241(8)
Internet Group Management Protocol (IGMP)
243(2)
Multicast Routing
245(2)
Source Trees
246(1)
Shared Trees
247(1)
Protocol Independent Multicast (PIM)
247(2)
VRFs and Multicast
249(5)
Multicast Sourced from an External IP Network
250(3)
Multicast Across VRFs (mVPN Extranet)
253(1)
mVPN Transport
254(14)
Global
254(4)
Tunnel Overlay
258(3)
mVPN
261(7)
Connecting the WAN
268(3)
Summary
271(2)
Chapter 10 Quality of Service in a Virtualized Environment
273(16)
QoS Models and Mechanisms: A Review
273(4)
Differentiated Services
274(3)
MPLS Quality of Service
277(1)
Tunnels and Pipes
277(1)
MPLS Traffic Engineering and Guaranteed Bandwidth
278(2)
DS-TE and Guaranteed Bandwidth
279(1)
Do I Really Need This in an Enterprise Network?
280(1)
QoS Models for Virtualized Networks
280(6)
One Policy per Group
280(13)
Multiple Policies per Group—Hierarchical QoS
283(3)
Summary
286(3)
Chapter 11 The Virtualized Access Layer
289(32)
Access Layer Switching
289(4)
Implementing Dynamic Authentication and Authorization
293(18)
Clientless Authentication
295(6)
Static Clientless Implementation—Port Security
296(1)
Centralized Dynamic Clientless Authentication—VMPS
297(2)
Layer 3 Clientless Authentication—Web Clients
299(2)
Client-Based Layer 2
301(10)
802.1x Protocol Details
303(3)
dot1x Implementation
306(5)
Virtualizing the Access Layer
311(7)
Layer 3 Access
317(1)
Summary
318(3)
Part III Appendixes 321(28)
Appendix A L2TPv3 Expanded Coverage
323(6)
L2TPv3 Control Channel
324(3)
L2TPv3 Data Channel
327(2)
Appendix B MPLS QoS, Traffic Engineering, and Guaranteed Bandwidth
329(10)
MPLS QoS—Uniform Tunnel and Pipe Modes
329(2)
MPLS Traffic Engineering
331(2)
MPLS Fast Reroute
333(2)
Guaranteed Bandwidth
335(4)
Appendix C Recommended Reading
339(6)
Appendix D RFCs and Internet Drafts
345(4)
Index 349

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.