List of Figures

Figure 1: Applying Route Maps to Routes
Figure 2: Filtering with Access Lists
Figure 3: Filtering with AS-Path Access Lists
Figure 4: Route Map Filtering
Figure 5: Community Lists
Figure 6: NAPT Example
Figure 7: Bidirectional NAT Example
Figure 8: Twice NAT Example
Figure 9: Cross-VRF Example
Figure 10: PPTP Tunnels on an Inside Network
Figure 11: PPTP Tunnels on an Outside Network
Figure 12: IPsec Tunneling Stack
Figure 13: IPsec Tunneling Packet Encapsulation
Figure 14: IPsec Security Parameters in Relation to the Secure IP Interface
Figure 15: Customer A's Corporate Frame Relay Network
Figure 16: ISP-X Uses ERX Routers to Connect Corporate Offices over the Internet
Figure 17: Connecting Customers Who Use Similar Address Schemes
Figure 18: Using ANCP with an Access Node
Figure 19: IP Tunneling
Figure 20: Transport and Tunnel Networks Using Different Routing Protocols
Figure 21: Tunneling Through an IP Network That Fragments Packets
Figure 22: L2TP with IPsec Application
Figure 23: L2TP/IPsec Connection
Figure 24: L2TP Control Frame Encapsulated by IPsec
Figure 25: L2TP Data Frame Encapsulated by IPsec
Figure 26: L2TP Control Frame with NAT-T UDP Encapsulation
Figure 27: L2TP Data Frame with NAT-T UDP Encapsulation
Figure 28: IKE Packet with NAT-T UDP Encapsulation
Figure 29: GRE/IPsec Connection