Ccdp arch
-
Upload
hendra-mulyanto -
Category
Design
-
view
831 -
download
2
Transcript of Ccdp arch
![Page 1: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/1.jpg)
CCDP Arch
![Page 2: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/2.jpg)
Modular Network Design
![Page 3: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/3.jpg)
Distribution Layer
![Page 4: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/4.jpg)
Core Layer
![Page 5: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/5.jpg)
Is Core Layer Needed ?
![Page 6: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/6.jpg)
Optimal Redundancy
![Page 7: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/7.jpg)
Provide Alternate Paths
![Page 8: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/8.jpg)
Avoid Single Points of Failure
![Page 9: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/9.jpg)
Deterministic Design
![Page 10: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/10.jpg)
Layer 2 Hardening
![Page 11: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/11.jpg)
Topology for UDLD
![Page 12: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/12.jpg)
Etherchannels
![Page 13: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/13.jpg)
VSS Logical vs Physical Topology
![Page 14: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/14.jpg)
Access Distribution Block Design
![Page 15: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/15.jpg)
VSS and MEC
![Page 16: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/16.jpg)
VSS Logical Topology
![Page 17: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/17.jpg)
Build Redundant Triangle
![Page 18: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/18.jpg)
Use Passive Interfaces at the Access Layer Triangles
![Page 19: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/19.jpg)
Summarize at the Distribution Layer Triangles
![Page 20: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/20.jpg)
Gateway Load Balancing Protocol Triangles
![Page 21: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/21.jpg)
GLBP VLAN Spanning Triangles
![Page 22: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/22.jpg)
GLBP and STP Tuning Triangles
![Page 23: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/23.jpg)
Layer 2 Distribution Switch Interconnection
![Page 24: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/24.jpg)
Layer 3 Distribution Switch Interconnection Triangles
![Page 25: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/25.jpg)
Layer 3 Distribution Switch Interconnection with GLBP
![Page 26: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/26.jpg)
VSS Layer 3 Interconnect
![Page 27: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/27.jpg)
Layer 3 Access to Distribution Interconnection
![Page 28: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/28.jpg)
Daisy Chaining Layer Access Switches
![Page 29: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/29.jpg)
StackWise Technology
![Page 30: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/30.jpg)
Too Little Redundancy
![Page 31: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/31.jpg)
Impact of an Uplink Failure
![Page 32: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/32.jpg)
Impact on Return-Path Traffic
![Page 33: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/33.jpg)
Asymmetric Routing
![Page 34: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/34.jpg)
IP Telephony Extends the Network Edge
![Page 35: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/35.jpg)
Campus QoS Design Consideration
![Page 36: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/36.jpg)
Route Summarization
![Page 37: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/37.jpg)
Originating Default Routes
![Page 38: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/38.jpg)
Avoid Inappropiate Transit Traffic
![Page 39: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/39.jpg)
Defensive Filtering
![Page 40: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/40.jpg)
Scaling EIGRP with Multiple Autonomous System
![Page 41: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/41.jpg)
Example: External Route Redistribution Issue
![Page 42: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/42.jpg)
Filtering EIGRP Redistribution with Route Tags
![Page 43: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/43.jpg)
Filtering EIGRP Routing Updates with Inbound Route Tags
![Page 44: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/44.jpg)
Example: Queries with multiple EIGRP Autonomous System
![Page 45: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/45.jpg)
OSPF Hierarchy
![Page 46: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/46.jpg)
Area and Domain Summarization
![Page 47: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/47.jpg)
Number of Areas in Hub and Spoke Design
![Page 48: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/48.jpg)
Issues with Hub and Spoke Design
![Page 49: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/49.jpg)
OSPF Area Border Connection Behaviour
![Page 50: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/50.jpg)
IBGP Full Mesh Requirement
![Page 51: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/51.jpg)
BGP Route Reflectors
![Page 52: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/52.jpg)
BGP Route Reflector Definitions
![Page 53: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/53.jpg)
Route Reflector Basics
![Page 54: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/54.jpg)
Confederation Definitions
![Page 55: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/55.jpg)
IBGP Full Mesh Peering
![Page 56: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/56.jpg)
Confederations Reduce the Number of IBGP Peers
![Page 57: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/57.jpg)
Deploying Confederations
![Page 58: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/58.jpg)
CWDM Technical Overview
![Page 59: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/59.jpg)
DWDM Technical Overview
![Page 60: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/60.jpg)
RPR Customer View
![Page 61: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/61.jpg)
Metro Ethernet Architechture
![Page 62: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/62.jpg)
End to End QoS
![Page 63: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/63.jpg)
Hierarchical VPLS Overview
![Page 64: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/64.jpg)
Managed Router combined with Internal Routing
![Page 65: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/65.jpg)
Managed Router from two Service Provider
![Page 66: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/66.jpg)
Example of PfR in the Enterprise
![Page 67: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/67.jpg)
SAN Overview
![Page 68: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/68.jpg)
Direct-Attached Storage
![Page 69: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/69.jpg)
Network Attached Storage
![Page 70: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/70.jpg)
FICON
![Page 71: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/71.jpg)
SANTap
![Page 72: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/72.jpg)
Major SAN Design Factors
![Page 73: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/73.jpg)
Single-Switch Collapse-Core Design
![Page 74: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/74.jpg)
Small Scale Dual Fabric: Collapsed Core Design
![Page 75: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/75.jpg)
Medium Scale, Dual Fabric Collapse-Core Design
![Page 76: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/76.jpg)
Large Scale, Dual Fabric Core-Edge Design
![Page 77: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/77.jpg)
SAN Extension
![Page 78: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/78.jpg)
FCIP
![Page 79: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/79.jpg)
iSCSI
![Page 80: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/80.jpg)
SAN Extension Development
![Page 81: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/81.jpg)
High-Availability SAN Extension
![Page 82: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/82.jpg)
Before I/O Consolidation
![Page 83: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/83.jpg)
After I/O Consolidation
![Page 84: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/84.jpg)
Nexus in the Access Layer
![Page 85: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/85.jpg)
FCoE VLAN to VSAN Mapping and VLAN Trunking
![Page 86: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/86.jpg)
Typical Ecommerce Module Topology
![Page 87: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/87.jpg)
Logical Representation using a Server as an Application Gateway
![Page 88: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/88.jpg)
Implementing Virtualization with Firewall Context
![Page 89: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/89.jpg)
A Firewall runs in Either Transparent or Route Mode
![Page 90: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/90.jpg)
Example use of a Firewall in Transparent Mode
![Page 91: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/91.jpg)
A Server Load Balancer represents Multiple Servers
![Page 92: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/92.jpg)
A SLB in Route Mode Routes between Outside and Inside Subnets
![Page 93: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/93.jpg)
A SLB in Inline Bridge Mode Bridges Between VLAN in a Single Subnet
![Page 94: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/94.jpg)
A SLB in one armed mode isn’t inline with the Traffic
![Page 95: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/95.jpg)
Traffic Flow with Misconfiguration
![Page 96: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/96.jpg)
Traffic Flows Correctly when the One-Arm SLB is configured with Client NAT
![Page 97: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/97.jpg)
Using one Firewall per ISP
![Page 98: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/98.jpg)
Using Statefull Failover with a Common External Prefix
![Page 99: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/99.jpg)
Using Distributed Data Centers
![Page 100: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/100.jpg)
Data Center Services includes Statefull Firewall, SSL Offload, SLB, WAFs, IPS
![Page 101: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/101.jpg)
Base E-Commerce Module Design
![Page 102: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/102.jpg)
Base E-Commerce Module Design Routing Logic
![Page 103: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/103.jpg)
E-Commerce Module Design with Two Firewall Layers
![Page 104: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/104.jpg)
E-Commerce Module One Armed SLB Design with Two Firewall Layers
![Page 105: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/105.jpg)
E-Commerce module One-Armed SLB Design with Firewall Contexts
![Page 106: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/106.jpg)
E-Commerce Module one Armed Design with ACE
![Page 107: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/107.jpg)
Simple Zone Based Firewall with Three Zones
![Page 108: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/108.jpg)
Virtual Firewall Overview
![Page 109: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/109.jpg)
MSFC Placement
![Page 110: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/110.jpg)
Active/Active Firewall Topology
![Page 111: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/111.jpg)
Asymmetric Routing with ASR Group on a Single FWSM
![Page 112: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/112.jpg)
Asymmetric Routing with Active/Active Topology
![Page 113: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/113.jpg)
Load Balancing FWSM using PBR
![Page 114: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/114.jpg)
Load Balancing FWSM using ECMP Routing
![Page 115: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/115.jpg)
Isolated Ports on FWSM in Routed Mode
![Page 116: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/116.jpg)
Community Ports on FWSM in Routed Mode
![Page 117: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/117.jpg)
NAC Comparison
![Page 118: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/118.jpg)
Process Flow with the NAC Appliance
![Page 119: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/119.jpg)
Cisco NAS Gateway Modes
![Page 120: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/120.jpg)
Cisco NAC Appliance Redundancy Design
![Page 121: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/121.jpg)
Layer-2 in Band Design
![Page 122: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/122.jpg)
Layer 2 In-Band Virtual Gateway
![Page 123: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/123.jpg)
Layer 2 In-Band Real IP Gateway
![Page 124: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/124.jpg)
Layer 2 Out of Band Virtual Gateway
![Page 125: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/125.jpg)
Layer 3 In-Band Virtual Gateway
![Page 126: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/126.jpg)
Layer 3 In-Band with Multiple Remotes
![Page 127: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/127.jpg)
Layer 3 OOB with Addressing
![Page 128: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/128.jpg)
NAC Framework
![Page 129: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/129.jpg)
IDS and IPS Overview
![Page 130: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/130.jpg)
IPS Appliance Deployment Options
![Page 131: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/131.jpg)
Scaling Cisco Security MARS with Global Controller Deployment
![Page 132: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/132.jpg)
Remote Access VPN
![Page 133: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/133.jpg)
VPN Architechture
![Page 134: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/134.jpg)
WAN Replacement with VPN
![Page 135: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/135.jpg)
WAN Backup via VPN
![Page 136: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/136.jpg)
VPN Device Placement: Pararel with Firewall
![Page 137: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/137.jpg)
VPN Device on a Firewall DMZ
![Page 138: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/138.jpg)
Integrated VPN and Firewall
![Page 139: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/139.jpg)
IPSec VPN
![Page 140: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/140.jpg)
GRE over IPSec
![Page 141: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/141.jpg)
DMVPN Topology
![Page 142: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/142.jpg)
GET VPN Topology
![Page 143: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/143.jpg)
Unicast versus Multicast
![Page 144: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/144.jpg)
IP Multicast Groups Define who receives Multicast data
![Page 145: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/145.jpg)
Cisco Multicast Architechture
![Page 146: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/146.jpg)
IGMPv3: Joining a Group
![Page 147: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/147.jpg)
IGMP and CGMP inform Network Devices about Which host want which Multicast data
![Page 148: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/148.jpg)
Multicast Distribution Tree are created by Routers
![Page 149: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/149.jpg)
Source Distribution Tree for Source 1
![Page 150: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/150.jpg)
Separate Source Tree is build for Source 2 sending to the Group
![Page 151: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/151.jpg)
Sources send toward the RP and the RP Sends to the Receivers
![Page 152: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/152.jpg)
PIM-SM Shared Tree Join
![Page 153: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/153.jpg)
PIM-SM Sender Registration Process
![Page 154: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/154.jpg)
PIM-SM Source Tree Switchover
![Page 155: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/155.jpg)
Bidir-PIM is Efficient for Many to many Communication
![Page 156: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/156.jpg)
SSM Join Process
![Page 157: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/157.jpg)
SSM Source Path Tree Creation
![Page 158: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/158.jpg)
With Anycast RP, the RP Load Share and act as a Hot Backup for each other
![Page 159: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/159.jpg)
Auto-RP Announcement Go to 224.0.1.39
![Page 160: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/160.jpg)
Auto-RP Discovery Messages Go to 224.0.1.40
![Page 161: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/161.jpg)
To Elect an Active BSR, C-BSR send BSR Messages on All Interfaces
![Page 162: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/162.jpg)
The Active BSR sends the Entire List of C-RP in Periodic BSR Messages
![Page 163: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/163.jpg)
Multicast Replication Impacts where Access Control should be Applied
![Page 164: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/164.jpg)
Network for Packet Filter-Based Access Control
![Page 165: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/165.jpg)
Network for Host Receiver-Based Access Control
![Page 166: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/166.jpg)
Network for PIM-SM Source Control
![Page 167: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/167.jpg)
Application Optimization Technologies
![Page 168: Ccdp arch](https://reader036.fdocuments.in/reader036/viewer/2022062313/5575c75ed8b42a312a8b4ef2/html5/thumbnails/168.jpg)
Apply Netflow Monitoring