[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
back doors:unauthorized access
unauthorized access:back doors
backbone hubs
backbone routers
backup power supplies 2nd
BDRs (backup designated routers)
best effort services
UBR
BGP:administrative distance
administrative distance:BGP
metrics:administrative distance;EGPs:BGP:administrative distance
BGP:attributes
EGPs:BGP:attributes
attributes:BGP 2nd
BGP:communities
communities
BGP:confederations
confederations
EGPs:BGP:confederations
BGP:IBGP versus EBGP
EBGP:versus IBGP
IBGP:versus:EBGP
BGP:multihoming
multihoming
EGPs:BGP:multihoming 2nd
BGP:route reflectors
route reflectors
EGPs:BGP:route reflectors 2nd
BGP:timers
timers:BGP
EGPs:BGP:timers
BIAs (burned-in addresses)
burned-in addresses (BIAs)
binary representation of IP addresses 2nd
bit buckets
black-box-based VPNs
VPNs:black-box-based
remote access:VPNs:black-box-based
Blocking state (STP)
break-ins
security:data diddling
data diddling;data destruction;attacks:data destruction;security:data destruction
bridge clips
customer premise:66-block installation
bridged taps
bridges
broadcasting
brute-force attacks
attacks:brute-force
bus network termination points