Term
Number 22 (1 of 6)
Core, Distribution, or Access
High level of availability, scalability, and fast convergence. |
|
Definition
|
|
Term
Number 22 (2 of 6)
Core, Distribution, Access
Enforces policy within the network. |
|
Definition
|
|
Term
Number 22 (3 of 6)
Core, Distribution, or Access
Routing boundary
(dynamic, summarization, static) |
|
Definition
|
|
Term
Number 22 (4 of 6)
Core, Distribution, or Access)
Provides security, QoS, and IP multicast to network. |
|
Definition
|
|
Term
Number 22 (5 of 6)
Core, Distribution, or Access
Provides a limited set of services. |
|
Definition
|
|
Term
Number 22 (6 of 6)
Core, Distribution, or Access
The most feature-rich parts of the company network. |
|
Definition
|
|
Term
Number 26
Leased or Shared
Frame-Relay |
|
Definition
|
|
Term
Number 26 (2 of 4)
Leased or Shared
TDM |
|
Definition
|
|
Term
NUmber 26 (3 of 4)
Leased or Shared
SONET |
|
Definition
|
|
Term
Number 26 (4 of 4)
Leased or Shared
MPLS |
|
Definition
|
|
Term
Number 28 (1 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
"What" of computing load, computing power, and memory requirements. |
|
Definition
|
|
Term
Number 28 (2 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
Disasters, fire suppression, and alarm systems. |
|
Definition
|
|
Term
Number 28 (3 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
Abundant, variable, well-organized, and easy to maintain. |
|
Definition
|
|
Term
Number 28 (4 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
Amount of racks, equipment, cabling, people. |
|
Definition
|
|
Term
Number 28 (5 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
Arranging equioment racks face-to-face or back-to-back. |
|
Definition
|
|
Term
Number 28 (6 of 6)
Cabling, Cooling, Power, Security, Space, or Weight Load
Rack servers vs. blade servers. |
|
Definition
|
|
Term
Number 32 (1 of 6)
Small, Medium, or Large
Redundant links. |
|
Definition
|
|
Term
Number 32 (2 of 6)
Small, Medium, or Large
MPLS deployment model. |
|
Definition
|
|
Term
Number 32 (3 of 6)
Small, Medium, or Large
Redundant links and devices. |
|
Definition
|
|
Term
Number 32 (4 of 6)
Small, Medium, or Large
Redundant links and devices. |
|
Definition
|
|
Term
Number 32 (5 of 6)
Small, Medium, or Large
Private WAN deployment. |
|
Definition
|
|
Term
Number 32 (6 of 6)
Small, Medium, or Large
Internet deployment model. |
|
Definition
|
|
Term
Number 35 (1 of 6)
Core, Distribution, or Access
Protects the endpoints using network-based intrusion prevention. |
|
Definition
|
|
Term
Number 35 (2 of 6)
Core, Distribution, or Access
Filter and rate limit control-plane traffic. |
|
Definition
|
|
Term
Number 35 (3 of 6)
Core, Distribution, or Access
Protect against inadvertent loops. |
|
Definition
|
|
Term
Number 35 (4 of 6)
Core, Distribution, or Access
Does not perform security functions to mitigate transit threats. |
|
Definition
|
|
Term
Number 35 (5 of 6)
Core, Distribution, or Access
Protect the infrastructure using NFP best practices. |
|
Definition
|
|
Term
Number 35 (6 of 6)
Core, Distribution, or Access
Protect network services including DHCP, ARP, and IP spoofing protection. |
|
Definition
|
|
Term
Number 36 (1 of 6)
Device or Network Virtualization
ASA firewall context. |
|
Definition
|
|
Term
Number 36 (2 of 6)
Device or Network Virtualization
IPS |
|
Definition
|
|
Term
Number 36 (3 of 6)
Device or Network Virtualization
VPC |
|
Definition
|
|
Term
Number 36 (4 of 6)
Device or Network Virtualization
VLAN |
|
Definition
|
|
Term
Number 36 (5 of 6)
Device or Network Virtualization
VDC |
|
Definition
|
|
Term
Number 36 (6 of 6)
Device or Network Virtualization
VRF |
|
Definition
|
|
Term
Number 53 (1 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Aggregates connectivity to voice, video, and data outside the enterprise with QoS and security.
|
|
Definition
|
|
Term
Number 53 (2 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Provides internal users with external HTTP, ARP, SMTP, and DNS connectivity. |
|
Definition
|
|
Term
Number 53 (3 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Enables service-oriented architectures, virtualization, and secure computing with load balancing. |
|
Definition
|
|
Term
Number 53 (4 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Enables intelligent route and switch, high availability, resilient multi-layer design, and integrated security. |
|
Definition
|
|
Term
Number 53 (5 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Supports application traffic through the Internet, initiated outside the enterprise network. |
|
Definition
|
|
Term
Number 53 (6 of 6)
Data Center, E-Commerce, Enterprise Campus, Enterprise Edge, Internet Connectivty, or Remote Access and VPN
Terminates traffic that is forwarded by the Internet Connectivity module. |
|
Definition
|
|
Term
Number 55 (1 of 3)
Complex text
Support Layer 2 VLANs spanning multiple access layer switches across the distribution switches. |
|
Definition
Layer 2 between distribution and access layers, with a Layer 3 link between the distribution switches. |
|
|
Term
Number 55 (2 of 3)
Complex text
Convergence (FHRP) is not an issue. |
|
Definition
|
|
Term
Number 55 (3 of 3)
Complex text
FHRP for convergence, no VLANs span between the access layer switches across the distribution switches. |
|
Definition
Layer 2 between distribution and access layers, with a Layer 2 link between the distribution switches. |
|
|
Term
Number 28 (1 of 4)
Agent, MIB, SNMP, Manager
Periodically collects object information. |
|
Definition
|
|
Term
Number 28 (2 of 4)
Agent, MIB, SNMP, Manager
Management transport mechanism |
|
Definition
|
|
Term
Number 28 (3 of 4)
Agent, MIB, SNMP, Manager
Generate traps of events. |
|
Definition
|
|
Term
Number 28 (4 of 4)
Agent, MIB, SNMP, Manager
Store information about network objects. |
|
Definition
|
|
Term
Number 108 (1 of 5)
Protects the endpoints (laptops, desktops and servers) |
|
Definition
|
|
Term
Number 108 (2 of 5)
Provides multiple functions as a high performance security appliance. |
|
Definition
|
|
Term
Number 108 (3 of 5)
Prevents DDoS attacks. |
|
Definition
Anamoly Guard and Protector |
|
|
Term
Number 108 (4 of 5)
Provides Web-based VPN services. |
|
Definition
|
|
Term
Number 108 (5 of 5)
Prevents attacks inline. |
|
Definition
|
|