SlideShare una empresa de Scribd logo
1 de 167
Descargar para leer sin conexión
ὺᾠᾪᾚᾦὗᾊᾬᾧᾧᾦᾩᾫὗὺᾦᾤᾤᾬᾥᾠᾫᾰ 
ὼᾯᾧᾜᾩᾫὗᾊᾜᾩᾠᾜᾪὗᾎᾜᾙᾚᾘᾪᾫά 
ᾅᾜᾯᾬᾪὗύᾘᾫᾘὺᾜᾥᾫᾜᾩὗᾊᾮᾠᾫᾚᾟὗᷥз෥ 
ᾐᾬᾠᾚᾟᾠὗᾀᾫᾦ 
ὺᾬᾪᾫᾦᾤᾜᾩὗᾊᾬᾧᾧᾦᾩᾫὗὼᾥᾞᾠᾥᾜᾜᾩ 
ὸᾬᾞὗὧὭὗὩὧὨὫ
ὸᾞᾜᾥᾛᾘ 
§ ᾅᾜᾯᾬᾪὗᷥз෥ 
§ ᾅᾜᾯᾬᾪὗᷟὗὺᾘᾫᾘᾣᾰᾪᾫὗᷥఞѕ 
§ ᾅᾜᾯᾬᾪὗᷥି੧ 
§ ᾅᾜᾯᾬᾪὗᷥṓḎṝḴḭṁ࡞Д 
§ ᾅᾜᾯᾬᾪὗᷥḲṓṀṕḡṏᴨḰḍṝḚ޺ೳ 
§ ḲṓṀṕḡṏᴨḰḍṝḚḮᴨṕ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗᷥ࡞Д 
§ ܤڃݣอᷥ࡞Д 
§ ޑӽτଘ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
ḣḾᴨḕᴨᷥ࡞Д 
̳ଟස͔ὗὟᾐᾬᾠᾚᾟᾠὗᾀᾫᾦὠ 
ὺᾠᾪᾚᾦὗᾊᾰᾪᾫᾜᾤᾪὣὗᾋὸὺὗὺᾊὼ 
ḱᴨḩḥṝḩḫᴨṊԘᷪᾊύᾅḫᴨṊᷢ࠘঴ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗԘᷪূᷥޢ୞ḮᴨṕᷥЭ௧ 
 
଼̽ಠඞ 
§ ᾃᾘᾰᾜᾩὩὦὪὗḷḭḲṙᴨḙ 
§ ᾅᾜᾯᾬᾪὗग़ఄ 
§ ḷḭḲṙᴨḙᷥḲṓṀṕḡṏᴨḰḍṝḚ 
§ ᾊύᾅḧṔṏᴨḡṑṝԘᷪṁṗḚṓṉṝḚ 
ίᾀᾥᾫᾜᾩᾦᾧὩὧὨὫὗᾊύᾅὗṀᴨḣ 
ὺὺᾀὼὗάὗὪὯὰὨὯ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
മḥḭḡṑṝᷢ᷁᷈Ḃࠢ੏̽ 
• ݰҶவಠ 
• ग़ὰὧಠᷥ෋પὟḔᴨḺᴨ᷎ᷖࡸڝᷦݻශЖܨὠ 
• ૱ੈᷢὨὧಠᷥԗ׀ 
• ۛؽᷢὨὧὗὤὗὨὬಠસ૷ᷥޑӽτଘݰҶ 
• ޑӽτଘ 
• ḫṍḭḲᷞࣙݰޑඔḉ߅᷈౫᷈ᴗޑӽτଘݰҶᷢЗଘ 
• ग़ޑඔᷢ৔τᷞ᷄ᷡᶻࡸڝᷦؽ୸ᷢЗଘ 
• ѐ஁Ϩ஗ᷡࡼ೧ὟḕḩṗḚḣṄḭḙᴖఆாݰӜଗὠᷦὺὺᾆ᷻಴ޢΊդᷢѐ஁ 
• ݣอ᷻வ౱ಞᷢᷛᶻᷝ 
• മݣอᴖԘᷪܤڃݣอᷦὗὺᾠᾪᾚᾦὗᾊᾬᾧᾧᾦᾩᾫὗὺᾦᾤᾤᾬᾥᾠᾫᾰὗِᷞЭ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
ᾅᾜᾯᾬᾪὗᷥз෥ 
• ḱᴨḩḥṝḩᴨٖ᷈ᷥḣḎḭḫ 
• ژᶻḣṕᴨṁḭḲᷟṉḭḡṑṝḙṔḰḍḕṕٖ᷈ᷥधב 
• ඌૈᷢτ᷏ᷖಓ٣ᶻṓḎṝḴḭṁ 
ᾀᾆଛڝֹ 
ḣḎḭḫ 
ḷḭḲṙᴨḙΪࢗෟḣḎḭḫ 
ὟࢰӟᷥṇᴨḲণधὠ 
վ෉դШٖ᷈ 
੶ણ਻ΪḣḎḭḫ 
὿ᾰᾧᾜᾩᾍᾠᾪᾦᾩෟ 
ϢঁḣḎḭḫ 
ḙṓḐḳӐఏ 
ٳ਽ෟḣḎḭḫ 
ḹḎḒṝḳḣḎḭḫ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
ᾅᾜᾯᾬᾪὗᷥз෥ 
• ৕࡯дࣵᷥژᶻधבᷥᾆᾊᷞᶹḂᾅᾏὤᾆᾊὗḉฆෟ 
• ḻḿḓᴨṈṝḣᷟϨෟࣵḉ߳෥ݝ᷎ᷖधב 
• ḱᴨḩḥṝḩٖ᷈ᷥӟ஗Ὗؽࠀὠᷢିϡ 
ژৗ͐ 
ᾅὼᾏᾌᾊ 
Ὗᾅᾏὤᾆᾊὠ 
ژϨෟࣵ 
ύὺ 
ӟ஗ 
ᾊὸᾅὤᾆᾊ 
ᾀᾆᾊ 
৕࡯дࣵ 
ᾅᾜᾫᾮᾦᾩᾢӹ߿ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
ὸᾞᾜᾥᾛᾘ 
§ ᾅᾜᾯᾬᾪὗᷥз෥ 
§ ᾅᾜᾯᾬᾪὗᷟὗὺᾘᾫᾘᾣᾰᾪᾫὗᷥఞѕ 
§ ᾅᾜᾯᾬᾪὗᷥି੧ 
§ ᾅᾜᾯᾬᾪὗᷥṓḎṝḴḭṁ࡞Д 
§ ᾅᾜᾯᾬᾪὗᷥḲṓṀṕḡṏᴨḰḍṝḚ޺ೳ 
§ ḲṓṀṕḡṏᴨḰḍṝḚḮᴨṕ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗᷥ࡞Д 
§ ܤڃݣอᷥ࡞Д 
§ ޑӽτଘ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
ఞѕअౠᷥṇḢḡṑḵṝḚ 
ḝḌॾ 
ḱḍḣḲṔ 
ḽṏᴨḡṑṝॾ 
Ḍḙḥḣॾ 
ᾅᾜᾯᾬᾪὗὬὧὧὧ 
ᾅᾜᾯᾬᾪὗὪὧὧὧ 
ᾅᾜᾯᾬᾪὗ 
Ὦὧὧὧ 
ᾅᾜᾯᾬᾪὗὩὧὧὧ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
ὭὬὧὧ 
ὫὬὧὧ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
ὩὰὭὧὣὪὮὬὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
ḧḿḲḐḑḌᷥఞѕ 
• ὺᾘᾫᾘᾣᾰᾪᾫ 
o ᾆᾊὗᷢὗᾀᾆᾊὗὟᾀᾥᾫᾜᾩᾥᾜᾫᾮᾦᾩᾢὗᾆᾊὠὗḉฆෟ 
o ḗṍṝḻḣḷḭḲṙᴨḙὟṐᴨḠߎ೉ὠᷞᷥฆෟḉঁપ 
o ὺᾠᾪᾚᾦ᷹ᷥۛṃᴨḡḭḙᷡḝṈṝḳṓḎṝḉળԽ 
o ି੧άὗ೿౯ᷡଉ۰ӟ஗ὗ 
• ᾅᾜᾯᾬᾪ 
o ᾆᾊὗᷢὗᾅᾏὤᾆᾊὗὟᾅᾜᾏᾫὤᾞᾜᾥᾜᾩᾘᾫᾠᾦᾥὗᾆᾊὠὗḉܺෟ 
o ḱᴨḩḥṝḩὟৃࣞᷥḟᴨḺߎ೉ὠᷞᷥฆෟḉঁપ 
o ᾀᾆᾊḉṃᴨḣ᷎ᷢᷖࢡ᷎ᶻḝṈṝḳṓḎṝḉળԽ 
o ି੧άὗژᶻḻḿḓᴨṈṝḣᷟژϨෟࣵὟ὿ὸάὗ὿ᾠᾞᾟὗὸᾭᾘᾠᾣᾘᾙᾠᾣᾠᾫᾰὠḉ߳ݝ 
ᴕᴕᴕᴕᴕᴕᴕᴕᴕḱᴨḩḥṝḩᴨᷢିϡ᷎ᷖӟ஗ḉଉ۰ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ఞѕ᷐ḂḡḴṔḔ 
ὺᾘᾫᾘᾣᾰᾪᾫὗὪὮὬὧὗᷟὗᾅᾜᾯᾬᾪὗὬὬὫὯὗᷥҶᷞὗᾇᾠᾥᾞὗḉઌ᷐धપ 
ὥὨὧὧὥὨὧὧ 
ὨὰὩὥὨὭὯὥὨὧὨὥὧὦὩὫὨὰὩὥὨὭὯὥὨὧὩὥὧὦὩὫ 
ὺᾘᾫᾘᾣᾰᾪᾫὗὪὮὬὧᾅᾜᾯᾬᾪὗὬὬὫὯ 
ᾞὨὦὧὦὨ 
ᾜὨὦὨᾭᾣᾘᾥὗὨὧὨὗὟᾘᾚᾚᾜᾪᾪὠᾭᾣᾘᾥὗὨὧὩὗὟᾘᾚᾚᾜᾪᾪὠ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
Ὗधપۥ᷶ὠ 
ὟὫὠὗᾅὮᾂὗᷟὗᾆᾊᾇώὗᾥᾜᾠᾞᾟᾙᾦᾩὗḉ੥Ḃ 
ὟὬὠὗᾪᾟᾦᾮḝṈṝḳᷥఞѕ 
ὟὭὠὗᾧᾠᾥᾞὗᷞଜਅࣵᷥѐ஁ 
ὟὨὠὗṗḚḎṝ᷎धપṌᴨḳᷢ୺Ḃ 
ὟὩὠὗᾍᾃὸᾅὗᷟὗᾊᾍᾀὗᷥधપ 
ὟὪὠὗᾀᾥᾫᾜᾩᾝᾘᾚᾜὗᷥधપ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὨὠὗᾣᾦᾞᾠᾥὗ᷎ᴖὗᾚᾦᾥᾝᾠᾞὗᾤᾦᾛᾜὗᷢ୺Ḃ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
User 
Access 
Verification 
Password: 
Catalystenable 
Password: 
Catalyst#conf 
t 
Catalyst(config)# 
ᾅᾜᾯᾬᾪ 
὚ὗṗḚḎṝᷢṐᴨḠ൮ᷦ౪෥ 
὚ὗᾜᾥᾘᾙᾣᾜὗṌᴨḳᷢ୺Ḃ 
User 
Access 
Verification 
Nexus 
login: 
admin 
Password: 
Nexus# 
conf 
t 
Nexus(config)# 
὚ὗḱḿḓṕḲᷞṗḚḎṝᷢṐᴨḠ൮᷃ూ෥ 
὚ὗᾜᾥᾘᾙᾣᾜὗṌᴨḳ়ᷦ۳᷎ᷡᶻ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὩὠὗᾍᾃὸᾅὗᷟὗᾊᾍᾀὗᷥधપ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
Catalyst(config)#vlan 
101 
Catalyst(config-vlan)#exit 
὚ὗᾪᾬᾙᾥᾜᾫὗᾤᾘᾪᾢὗᷦὗὩὬὬὗᷞधપ 
Catalyst(config)#interface 
vlan 
101 
Catalyst(config-if)#ip 
address 
192.168.101.100 
255.255.255.0 
Catalyst(config-if)#no 
shutdown 
ᾅᾜᾯᾬᾪ 
Nexus(config)# 
vlan 
102 
Nexus(config-vlan)# 
exit 
὚ὗᾝᾜᾘᾫᾬᾩᾜὗᷞὗᾊᾍᾀὗӟ஗ḉරْϡ 
Ὗᾝᾜᾘᾫᾬᾩᾜᷞܺᶽӟ஗ᷥ᷶රْϡὠ 
Nexus(config-if)# 
feature 
interface-vlan 
Nexus(config)# 
interface 
vlan 
102 
Nexus(config-if)# 
ip 
address 
192.168.102.100/24 
Nexus(config-if)# 
no 
shutdown 
὚ὗᾪᾬᾙᾥᾜᾫὗᾤᾘᾪᾢὗᷦὗὦᾏὗᷞधપ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὪὠὗᾀᾥᾫᾜᾩᾝᾘᾚᾜὗᷥधપ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
Catalyst(config)#interface 
g1/0/1 
Catalyst(config-if)#switchport 
Catalyst(config-if)#switchport 
mode 
access 
Catalyst(config-if)#switchport 
access 
vlan 
101 
ᾅᾜᾯᾬᾪ 
὚ὗᾠᾥᾫᾜᾩᾝᾘᾚᾜὗᷥ݊પᷦল૷ḉ݊પ 
Nexus(config)# 
interface 
e1/1 
Nexus(config-if)# 
switchport 
Nexus(config-if)# 
switchport 
mode 
access 
Nexus(config-if)# 
switchport 
access 
vlan 
102 
Nexus(config-if)# 
no 
shutdown 
὚ὗᾠᾥᾫᾜᾩᾝᾘᾚᾜὗᷥ݊પᷦग़ᷝὗᾜᾫᾟᾜᾩᾥᾜᾫ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὫὠὗᾆᾊᾇώὗᷥधપ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
὚ὗᾠᾧὗᾩᾦᾬᾫᾠᾥᾞὗᷞᾃὪḣḎḭḫṝḚḉරْϡ 
Catalyst(config)#ip 
routing 
Catalyst(config)#router 
ospf 
1 
Catalyst(config-router)#network 
192.168.101.0 
0.0.0.255 
area 
0 
Catalyst(config-router)#router-id 
0.0.0.2 
ᾅᾜᾯᾬᾪ 
὚ὗᾩᾦᾬᾫᾜᾩḝṈṝḳவϠᷞḷḭḲ݊પ 
὚ὗᾝᾜᾘᾫᾬᾩᾜὗᷞὗᾆᾊᾇώὗḉරْϡ 
Nexus(config)# 
feature 
ospf 
Nexus(config)# 
router 
ospf 
1 
Nexus(config-router)# 
router-id 
0.0.0.3 
὚ὗᾠᾥᾫᾜᾩᾝᾘᾚᾜὗவϠᷞᾆᾊᾇώᷢܤϧ᷌᷒Ḃ 
Nexus(config-if)# 
int 
vlan 
102 
Nexus(config-if)# 
ip 
router 
ospf 
1 
area 
0 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὬὠὗᾪᾟᾦᾮὗᾠᾧὗᾩᾦᾬᾫᾜὗᷥѐ஁ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
Catalyst(config-router)#show 
ip 
route 
% 
Invalid 
input 
detected 
at 
'^' 
marker. 
C3K-F09(config-router)#end 
C3K-F09#show 
ip 
route 
὚ὗᾚᾦᾥᾝᾠᾞὗᾤᾦᾛᾜὗᷞὗᾪᾟᾦᾮὗḉܺᶿᷡᶻ 
192.168.101.0/24 
is 
variably 
subnetted, 
2 
subnets, 
2 
masks 
C 
192.168.101.0/24 
is 
directly 
connected, 
Vlan101 
L 
192.168.101.100/32 
is 
directly 
connected, 
Vlan101 
O 
192.168.102.0/24 
[110/41] 
via 
192.168.101.1, 
00:18:57, 
Vlan101 
ᾅᾜᾯᾬᾪ 
^ 
Nexus(config-if)# 
show 
ip 
route 
192.168.101.0/24, 
ubest/mbest: 
1/0 
὚ὗᾚᾦᾥᾝᾠᾞὗᾤᾦᾛᾜὗᷞὗᾪᾟᾦᾮὗḉܺᶿḂ 
*via 
192.168.102.1, 
Vlan2102, 
[110/80], 
00:17:42, 
ospf-1, 
intra 
192.168.102.0/24, 
ubest/mbest: 
1/0, 
attached 
*via 
192.168.102.100, 
Vlan2102, 
[0/0], 
00:46:24, 
direct 
192.168.102.100/32, 
ubest/mbest: 
1/0, 
attached 
*via 
192.168.102.100, 
Vlan2102, 
[0/0], 
00:46:24, 
local 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
ᾀᾆᾊὗᷟὗᾅᾏᾆᾊὗᷥḝṈṝḳఞѕ 
ὟὭὠὗᾧᾠᾥᾞὗᷞଜਅࣵѐ஁ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
Catalyst#ping 
192.168.102.100 
Type 
escape 
sequence 
to 
abort. 
Sending 
5, 
100-byte 
ICMP 
Echos 
to 
192.168.102.100, 
timeout 
is 
2 
seconds: 
!!!!! 
Success 
rate 
is 
100 
percent 
(5/5), 
round-trip 
min/avg/max 
= 
1/2/9 
ms 
ᾅᾜᾯᾬᾪ 
὚ὗᾧᾠᾥᾞὗᷥଜਅࣵᷦᴺ὘ᴻᷞѐ஁ 
὚ὗᾃᾠᾥᾬᾯὗ᷿ᷥᶽᷡὗᾧᾠᾥᾞὗᷥ߾฻ 
Nexus(config-if)# 
ping 
192.168.101.100 
PING 
192.168.101.100 
(192.168.101.100): 
56 
data 
bytes 
64 
bytes 
from 
192.168.101.100: 
icmp_seq=0 
ttl=253 
time=8.283 
ms 
64 
bytes 
from 
192.168.101.100: 
icmp_seq=1 
ttl=253 
time=1.89 
ms 
64 
bytes 
from 
192.168.101.100: 
icmp_seq=2 
ttl=253 
time=2.479 
ms 
64 
bytes 
from 
192.168.101.100: 
icmp_seq=3 
ttl=253 
time=4.786 
ms 
64 
bytes 
from 
192.168.101.100: 
icmp_seq=4 
ttl=253 
time=12.35 
ms 
--- 
192.168.101.100 
ping 
statistics 
--- 
5 
packets 
transmitted, 
5 
packets 
received, 
0.00% 
packet 
loss 
round-trip 
min/avg/max 
= 
1.89/5.957/12.35 
ms 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
ṆḭḙḣֹᷥḻḿḓᴨṈṝḣఞѕ 
ὺᾘᾫᾘᾣᾰᾪᾫὗόᾦᾯὗᾋᾰᾧᾜᾅᾜᾯᾬᾪὗόᾦᾯὗᾋᾰᾧᾜ 
ᾎᾊὤὺὪὮὬὧᾏὤὫὯᾋὤᾃ 
Ὠ὾ὗᾯὗὫὯὗὢὗṹὟὨὧ὾ὗᾯὗὩὠ 
ᾅὬᾂὤὺὬὬὫὯᾌᾇ 
Ὠὧ὾ὗᾯὗὪὩὗὢὗṹὟὨὧ὾ὗᾯὗὨὭὠ 
ᾅὬᾂὤὺὬὭὮὩᾌᾇ 
Ὠὧ὾ὗᾯὗὫὯὗὢὗὫὧ὾ὗᾯὗὭ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
ḡṍᴨḡֹᷥḻḿḓᴨṈṝḣఞѕ 
ὺᾘᾫᾘᾣᾰᾪᾫὗὺᾟᾘᾪᾪᾠᾪὗᾋᾰᾧᾜᾅᾜᾯᾬᾪὗὺᾟᾘᾪᾪᾠᾪὗᾋᾰᾧᾜ 
ᾅὮᾂὤᾄὨὪὩᾏᾇὤὨὩ 
Ὠὧ὾ὗᾯὗὪὩὟὯὠ 
ᾅὮὮὤώὪὨὩὺᾂὤὩὭ 
Ὠὧὧ὾ὗᾯὗὨὩ 
ᾎᾊὤᾏὭὬὫὯὤ὾ὼὤᾋᾏ 
Ὠ὾ὗᾯὗὫὯ 
ᾎᾊὤᾏὭὯὨὭὤὨὧᾋὤὩᾋᾏᾃ 
Ὠὧ὾ὗᾯὗὨὭ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
ᾃὩὦᾃὪᾃὩὦᾃὪ 
ᾎὸᾅ 
अౠӟ஗ᷥఞѕ 
ᾊᾜᾚᾬᾩᾠᾫᾰ 
ᾃᾦᾘᾛὗόᾘᾣᾘᾥᾚᾜᾩ 
ύὺὗٖ᷈ӟ஗ 
Ὗؽࠀὠ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
ӟ஗᷃೿౯ 
ᾅᾜᾯᾬᾪ 
ύὺᷢିϡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
ᾃὩὦᾃὪᾃὩὦᾃὪ 
ᾎὸᾅ 
अౠӟ஗ᷥఞѕ 
ᾊᾜᾚᾬᾩᾠᾫᾰ 
ᾃᾦᾘᾛὗόᾘᾣᾘᾥᾚᾜᾩ 
ὺᾘᾫᾘᾣᾰᾪᾫ 
ӟ஗᷃೿౯ 
ᾅᾜᾯᾬᾪ 
ύὺᷢିϡ 
ύὺٖ᷈ӟ஗Ὗؽࠀὠ 
ᾍᾇὺ 
ᾍᾆᾈ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
ὸὺᾀ 
ᾀᾊᾊᾌᷔᷥূৃࣞ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
ὺᾘᾫᾘᾣᾰᾪᾫᾅᾜᾯᾬᾪ 
ᾆᾊᾀᾆᾊᾅᾏὤᾆᾊ 
ఞѕ᷸᷵ᷟ 
ঁપ᷌ḃḂ 
ฆෟҤՉ 
ḗṍṝḻḣ 
ḷḭḲṙᴨḙḱᴨḩḥṝḩ 
ḝṈṝḳᾀᾆᾊ౎ࠎᾀᾆᾊṃᴨḣᷥ 
ࢡ᷎ᶻ৒׉ 
ḻḿḓᴨṈṝḣὨὤὨὧ὾ὦᾧᾦᾩᾫὨὧὤὨὧὧ὾ὦᾧᾦᾩᾫ 
ӟ஗೿౯ύὺᷢିϡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
ὸᾞᾜᾥᾛᾘ 
§ ᾅᾜᾯᾬᾪὗᷥз෥ 
§ ᾅᾜᾯᾬᾪὗᷟὗὺᾘᾫᾘᾣᾰᾪᾫὗᷥఞѕ 
§ ᾅᾜᾯᾬᾪὗᷥି੧ 
§ ᾅᾜᾯᾬᾪὗᷥṓḎṝḴḭṁ࡞Д 
§ ᾅᾜᾯᾬᾪὗᷥḲṓṀṕḡṏᴨḰḍṝḚ޺ೳ 
§ ḲṓṀṕḡṏᴨḰḍṝḚḮᴨṕ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗᷥ࡞Д 
§ ܤڃݣอᷥ࡞Д 
§ ޑӽτଘ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
ᾅᾏὤᾆᾊὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
• ṁṗḥḣὟӟ஗ὠ᷋ᷟᷢṋṌṔ֑Ҷḉಠฑ 
• ṁṗḥḣ᷃ḙṓḭḡṏ᷎᷹ᷝḡḣḰṊᷦḙṓḭḡṏ᷎ᷡᶻ 
ὟᾎᾠᾥᾛᾦᾮᾪὗࡱᷞḌṁṔḛᴨḡṑṝ᷃ḙṓḭḡṏ᷎ᷖࢁ৚ᷢսᶻὠ 
• ḙṓḭḡṏ᷎ᷖṁṗḥḣᷦݻବᷞṔḣḩᴨḲ᷌ḃḂ 
ᾅᾏὤᾆᾊὗᷥḌᴨḗḰḙḫṍ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ᾍύὺὗὟᾍᾠᾩᾫᾬᾘᾣὗύᾜᾭᾠᾚᾜὗὺᾦᾥᾫᾜᾯᾫᾪὠ 
• ͔ᗵ৒ḉϢঁૈᷢಗࣞᗵ৒᷎̟ᷟᷝᶽ 
• ᾍᾉώὟᾉᾦᾬᾫᾠᾥᾞࡼ೧ᷥಠฑὠḉ௧૖᷌᷒ᷖḧḿḲḐḑḌṖṃṕᷥ 
ḡḣḰṊᷥಠฑ 
͔ᗵ৒ 
͔ᗵ৒ 
ᾍύὺὨὤὫὗᷢಠѦ 
ὟᾇᾦᾩᾫὗḉѦḁଔᷝὠ 
Ὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
ᾍύὺὗὟᾍᾠᾩᾫᾬᾘᾣὗύᾜᾭᾠᾚᾜὗὺᾦᾥᾫᾜᾯᾫᾪὠ 
• ͔ᗵ৒ḉϢঁૈᷢಗࣞᗵ৒᷎̟ᷟᷝᶽ 
• ᾍᾉώὟᾉᾦᾬᾫᾠᾥᾞࡼ೧ᷥಠฑὠḉ௧૖᷌᷒ᷖḧḿḲḐḑḌṖṃṕᷥ 
ḡḣḰṊᷥಠฑ 
͔ᗵ৒ 
͔ᗵ৒ 
ᾍύὺὨὤὫὗᷢಠѦ 
ὟᾇᾦᾩᾫὗḉѦḁଔᷝὠ 
Ὠ Ὡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
ᾍύὺὗὟᾍᾠᾩᾫᾬᾘᾣὗύᾜᾭᾠᾚᾜὗὺᾦᾥᾫᾜᾯᾫᾪὠ 
• ͔ᗵ৒ḉϢঁૈᷢಗࣞᗵ৒᷎̟ᷟᷝᶽ 
• ᾍᾉώὟᾉᾦᾬᾫᾠᾥᾞࡼ೧ᷥಠฑὠḉ௧૖᷌᷒ᷖḧḿḲḐḑḌṖṃṕᷥ 
ḡḣḰṊᷥಠฑ 
͔ᗵ৒ 
͔ᗵ৒ 
ᾍύὺὨὤὫὗᷢಠѦ 
ὟᾇᾦᾩᾫὗḉѦḁଔᷝὠ 
Ὠ Ὡ 
Ὢ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
ᾍύὺὗὟᾍᾠᾩᾫᾬᾘᾣὗύᾜᾭᾠᾚᾜὗὺᾦᾥᾫᾜᾯᾫᾪὠ 
• ͔ᗵ৒ḉϢঁૈᷢಗࣞᗵ৒᷎̟ᷟᷝᶽ 
• ᾍᾉώὟᾉᾦᾬᾫᾠᾥᾞࡼ೧ᷥಠฑὠḉ௧૖᷌᷒ᷖḧḿḲḐḑḌṖṃṕᷥ 
ḡḣḰṊᷥಠฑ 
͔ᗵ৒ 
͔ᗵ৒ 
ᾍύὺὨὤὫὗᷢಠѦ 
ὟᾇᾦᾩᾫὗḉѦḁଔᷝὠ 
Ὠ Ὡ 
Ὢ Ὣ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
ᾍύὺὗὟᾍᾠᾩᾫᾬᾘᾣὗύᾜᾭᾠᾚᾜὗὺᾦᾥᾫᾜᾯᾫᾪὠ 
• ͔ᗵ৒ḉϢঁૈᷢಗࣞᗵ৒᷎̟ᷟᷝᶽ 
• ᾍᾉώὟᾉᾦᾬᾫᾠᾥᾞࡼ೧ᷥಠฑὠḉ௧૖᷌᷒ᷖḧḿḲḐḑḌṖṃṕᷥ 
ḡḣḰṊᷥಠฑ 
͔ᗵ৒ 
͔ᗵ৒ 
ᾍύὺὨὤὫὗᷢಠѦ 
ὟᾇᾦᾩᾫὗḉѦḁଔᷝὠ 
商用系 社内 
Ὠ Ὡ 
開発 管理 
Ὢ Ὣ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
ᾀᾊᾊᾌὗὟᾀᾥᾊᾜᾩᾭᾠᾚᾜὗᾊᾦᾝᾫᾮᾘᾩᾜὗᾌᾧᾞᾩᾘᾛᾜὠ 
• ൥તݑᷞḧḿḲḐḑḌᷥḺᴨḢṑṝḌḭṁ᷃Ϩ஗ 
• ᾊᾫᾘᾥᾛᾙᾰὗপḉḺᴨḢṑṝḌḭṁ᷎ᴖݱᷢᾊᾫᾘᾥᾛᾙᾰὣὗὸᾚᾫᾠᾭᾜὗḉ 
ढḁড়ᶿᷝ؍ᴕὸᾚᾫᾠᾭᾜὗপḉḺᴨḢṑṝḌḭṁ 
ᾘᾚᾫᾠᾭᾜ 
ᾪᾫᾘᾥᾛᾙᾰ 
Ὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧὠ 
৘ӟࢁ৚Ὗᾪᾫᾘᾥᾛᾙᾰὠὗᷥ 
ᾪᾬᾧᾜᾩᾭᾠᾪᾦᾩὗḉὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ᾀᾊᾊᾌὗὟᾀᾥᾊᾜᾩᾭᾠᾚᾜὗᾊᾦᾝᾫᾮᾘᾩᾜὗᾌᾧᾞᾩᾘᾛᾜὠ 
• ൥તݑᷞḧḿḲḐḑḌᷥḺᴨḢṑṝḌḭṁ᷃Ϩ஗ 
• ᾊᾫᾘᾥᾛᾙᾰὗপḉḺᴨḢṑṝḌḭṁ᷎ᴖݱᷢᾊᾫᾘᾥᾛᾙᾰὣὗὸᾚᾫᾠᾭᾜὗḉ 
ढḁড়ᶿᷝ؍ᴕὸᾚᾫᾠᾭᾜὗপḉḺᴨḢṑṝḌḭṁ 
ᾘᾚᾫᾠᾭᾜ 
ᾪᾫᾘᾥᾛᾙᾰ 
Ὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧὠ 
ᾪᾫᾘᾥᾛᾙᾰ 
ᾘᾚᾫᾠᾭᾜ 
ᾘᾚᾫᾠᾭᾜὗᷟὗᾪᾫᾘᾥᾛᾙᾰὗḉ 
ढḁড়ᶿḂ 
৘ӟࢁ৚Ὗᾪᾫᾘᾥᾛᾙᾰὠὗᷥ 
ᾪᾬᾧᾜᾩᾭᾠᾪᾦᾩὗḉὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
ᾀᾊᾊᾌὗὟᾀᾥᾊᾜᾩᾭᾠᾚᾜὗᾊᾦᾝᾫᾮᾘᾩᾜὗᾌᾧᾞᾩᾘᾛᾜὠ 
• ൥તݑᷞḧḿḲḐḑḌᷥḺᴨḢṑṝḌḭṁ᷃Ϩ஗ 
• ᾊᾫᾘᾥᾛᾙᾰὗপḉḺᴨḢṑṝḌḭṁ᷎ᴖݱᷢᾊᾫᾘᾥᾛᾙᾰὣὗὸᾚᾫᾠᾭᾜὗḉ 
ढḁড়ᶿᷝ؍ᴕὸᾚᾫᾠᾭᾜὗপḉḺᴨḢṑṝḌḭṁ 
ᾘᾚᾫᾠᾭᾜ 
ᾪᾫᾘᾥᾛᾙᾰ 
Ὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧὠ 
ᾪᾫᾘᾥᾛᾙᾰ 
Ὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧὠ 
ᾪᾫᾘᾥᾛᾙᾰ 
ᾘᾚᾫᾠᾭᾜᾘᾚᾫᾠᾭᾜ 
ᾘᾚᾫᾠᾭᾜὗᷟὗᾪᾫᾘᾥᾛᾙᾰὗḉ 
ढḁড়ᶿḂ 
৘ӟࢁ৚Ὗᾪᾫᾘᾥᾛᾙᾰὠὗᷥ 
ᾪᾬᾧᾜᾩᾭᾠᾪᾦᾩὗḉὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧ 
৘ӟࢁ৚Ὗᾪᾫᾘᾥᾛᾙᾰὠὗᷥ 
ᾪᾬᾧᾜᾩᾭᾠᾪᾦᾩὗḉὗᾭᾜᾩᾪᾠᾦᾥὗᾬᾧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
ᾍᾇὺὗὟᾍᾠᾩᾫᾬᾘᾣὗᾇᾦᾩᾫὺᾟᾘᾥᾥᾜᾣὠ 
• Ὡ৪ᷥᗵ৒ḉϢঁૈ͔ᷢ৪ᷢ؃᷂᷒᷈Ḃ޺ೳ 
• ৗ͐ḉරْѪෟᷞ᷄ᴖ࡯дݰᷥߍযল૷᷹ٖࡱ᷌᷒Ḃ 
ᾊᾋᾇ 
ὤὗৗࣱؚ͐ 
ὤὗᾊᾋᾇߍয᷵ᷞ 
ὗὗḻḛḭḲḳṗḭṁ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
ᾍᾇὺὗὟᾍᾠᾩᾫᾬᾘᾣὗᾇᾦᾩᾫὺᾟᾘᾥᾥᾜᾣὠ 
• Ὡ৪ᷥᗵ৒ḉϢঁૈ͔ᷢ৪ᷢ؃᷂᷒᷈Ḃ޺ೳ 
• ৗ͐ḉරْѪෟᷞ᷄ᴖ࡯дݰᷥߍযল૷᷹ٖࡱ᷌᷒Ḃ 
ಞซὗὩ৪ 
ຊซὗὨ৪ 
ᾊᾋᾇᾍᾇὺ 
ὤὗৗࣱؚ͐ 
ὤὗᾊᾋᾇߍয᷵ᷞ 
ὗὗḻḛḭḲḳṗḭṁ 
ὤὗৗ͐රْѪෟ 
ὤὗߍয᷃౪෥ 
ὗὗὟ৕࡯дࣵژὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
ᾍᾇὺὗὟᾍᾠᾩᾫᾬᾘᾣὗᾇᾦᾩᾫὺᾟᾘᾥᾥᾜᾣὠ 
• Ὡ৪ᷥᗵ৒ḉϢঁૈ͔ᷢ৪ᷢ؃᷂᷒᷈Ḃ޺ೳ 
• ৗ͐ḉරْѪෟᷞ᷄ᴖ࡯дݰᷥߍযল૷᷹ٖࡱ᷌᷒Ḃ 
ಞซὗὩ৪ 
ຊซὗὨ৪ 
ᾊᾋᾇᾍᾇὺ 
ὤὗৗࣱؚ͐ 
ὤὗᾊᾋᾇߍয᷵ᷞ 
ὗὗḻḛḭḲḳṗḭṁ 
ὤὗৗ͐රْѪෟ 
ὤὗߍয᷃౪෥ 
ὗὗὟ৕࡯дࣵژὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
ᾍᾇὺὗᷟὗᾍᾊᾊὣὗᾊᾫᾘᾚᾢὗᷥఞѕ 
• ᾍᾇὺάὗḝṝḲṗᴨṕṁṖᴨṝᷦୄต 
• ᾍᾊᾊὟὺᾘᾫὭᾂὠάὗḝṝḲṗᴨṕṁṖᴨṝḉՂර 
• ᾊᾫᾘᾚᾢὟὺᾘᾫὪὮὬὧὠάὗᾊᾫᾘᾚᾢḛᴨṀṕḉܺᷚᷝḡṍᴨḡḉ᷸᷵ᷟḂὗ 
ᾇᾜᾜᾩ 
ᾃᾠᾥᾢ 
ᾊᾫᾘᾚᾢὗὺᾘᾙᾣᾜ 
ᾍᾊᾃ 
ᾍᾇὺὟᾅᾜᾯᾬᾪὠᾍᾊᾊὟὺᾘᾫὭᾂὠᾊᾫᾘᾚᾢὟὺᾘᾫὪᾂὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
ᾍᾇὺὗᷟὗᾍᾊᾊὣὗᾊᾫᾘᾚᾢὗᷥఞѕ 
• ᾍᾇὺάὗḝṝḲṗᴨṕṁṖᴨṝᷦୄตὗὟೆೱ᷃෼᷹ᷘᷝՂૻḃ᷎ᷡᶻὠ 
• ᾍᾊᾊὟὺᾘᾫὭᾂὠάὗḝṝḲṗᴨṕṁṖᴨṝḉՂර 
• ᾊᾫᾘᾚᾢὟὺᾘᾫὪὮὬὧὠάὗᾊᾫᾘᾚᾢḛᴨṀṕḉܺᷚᷝḡṍᴨḡḉ᷸᷵ᷟḂὗ 
ᾇᾜᾜᾩ 
ᾃᾠᾥᾢ 
ᾊᾫᾘᾚᾢὗὺᾘᾙᾣᾜ 
ᾍᾊᾃ 
ᾍᾇὺὟᾅᾜᾯᾬᾪὠᾍᾊᾊὟὺᾘᾫὭᾂὠᾊᾫᾘᾚᾢὟὺᾘᾫὪᾂὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ᾃᾘᾰᾜᾩὩḳṋḎṝ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ᾊᾋᾇᾊᾋᾇ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇ̠ᷥरᷦὪ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇ̠ᷥरᷦὪ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
ώᾇᾜᾫᾟ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇ̠ᷥरᷦὪ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
Ὠ 
Ὡ 
Ὢ 
̠ᷥरᷦύ 
ώᾇᾜᾫᾟ 
ᾜᾫᾟ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇ̠ᷥरᷦὪ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪࠪԬ 
Ὠ 
Ὡ 
Ὢ 
̠ᷥरᷦύ 
ώᾇᾜᾫᾟ 
ᾜᾫᾟ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟ 
• ᾃᾘᾰᾜᾩὩὗḥḚṋṝḲᷢὗᾉᾦᾬᾫᾠᾥᾞὗᷥзஊḉଯ୺ 
• ଭ͔ᾃὩḥḚṋṝḲᷥḟḎḤḉḣḛᴨṓṀṕᷢъ੥Ϩ஗᷐ᷢḂ 
ώᾇ̠ᷥरᷦὪ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪ౫෍ 
ώᾘᾙᾩᾠᾚᾇᾘᾫᾟὗආ 
ώᾇᾜᾫᾟ 
ώᾇṂḭḪࠪԬ 
Ὠ 
Ὡ 
Ὢ 
̠ᷥरᷦύ 
ώᾇᾜᾫᾟ 
ᾜᾫᾟ 
ᾊᾋᾇᾊᾋᾇ 
ᾜᾫᾟ̠ᷥरᷦὪ 
ᾜᾫᾟ 
ᾜᾫᾟ 
ᾊ ύ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
߾฻পᷞḺḭḿḋṔṝḚ᷐Ḃ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
ᾜᾫ୺ᾟὗ฻ὨὦপὪᷥḺḭḿḋᷦէ࠻ุ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
᥸᥷௧ऀੈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
᥸᥷௧ऀੈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
όᾃᾆὺᾂὗ௧ऀ᥸᥷௧ऀੈ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
όᾃᾆὺᾂὗ௧ऀ᥸᥷௧ऀੈ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
͖ḃᷖḻḛḭḲᷦ 
ḳṗḭṁ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ߬෶ᷥḗṏᴨḎṝḚᷦ߾฻পὟὼᾞᾩᾜᾪᾪὠᷞḺḭḿḋṔṝḚ 
• ߾฻প᷃ԋ᷵Ḃᷟۛߘૈᷢ୺฻প᷃όᾣᾦᾚᾢ᷌ḃᷝḳṗḭṁ௧ऀ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ᾜᾫᾟὗὨὦὨ 
ώᾘᾙᾩᾠᾚ 
όᾃᾆὺᾂὗ௧ऀ᥸᥷௧ऀੈ 
߬෶ᷥḗṏᴨḎṝḚೱހ 
Ὗ߾฻পᷞḺḭḿḋṔṝḚὠ 
͖ḃᷖḻḛḭḲᷦ 
ḳṗḭṁ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ᾅᾜᾯᾬᾪὗᷦḺḭḿḋṔṝḚḉ߾฻পᷞᷦᷡ᷆୺฻পᷞڊᶽ 
• ߾฻প᷹᷃ᷛ᷵ᷚᷝᴖᷔᷥṇᴨḲ̲вᷦΌ՝ḉ߅᷈ᷡᶻ 
ᾜᾫᾟὗὨὦὨ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ώᾘᾙᾩᾠᾚ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὩ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὪ 
ᾜᾫ୺ᾟὗ฻ὨὦṇὪᴨḲᷢᷦᴺ߾฻ṇᴨḲ 
᷋ᷟᷥḺḭḿḋᴻ়᷃۳ 
߾฻পᷥḺḭḿḋᷦէ࠻ุ 
ᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὗೱހ 
Ὗ୺฻পᷞḺḭḿḋṔṝḚὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ᾅᾜᾯᾬᾪὗᷦḺḭḿḋṔṝḚḉ߾฻পᷞᷦᷡ᷆୺฻পᷞڊᶽ 
• ߾฻প᷹᷃ᷛ᷵ᷚᷝᴖᷔᷥṇᴨḲ̲вᷦΌ՝ḉ߅᷈ᷡᶻ 
ᾜᾫᾟὗὨὦὨ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ώᾘᾙᾩᾠᾚ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὩ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὪ 
ᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὗೱހ 
Ὗ୺฻পᷞḺḭḿḋṔṝḚὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ᾅᾜᾯᾬᾪὗᷦḺḭḿḋṔṝḚḉ߾฻পᷞᷦᷡ᷆୺฻পᷞڊᶽ 
• ߾฻প᷹᷃ᷛ᷵ᷚᷝᴖᷔᷥṇᴨḲ̲вᷦΌ՝ḉ߅᷈ᷡᶻ 
ᾜᾫᾟὗὨὦὨ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ώᾘᾙᾩᾠᾚ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὩ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὪ 
ᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὗೱހ 
Ὗ୺฻পᷞḺḭḿḋṔṝḚὠ 
᥸᥷௧ऀੈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ᾅᾜᾯᾬᾪὗᷦḺḭḿḋṔṝḚḉ߾฻পᷞᷦᷡ᷆୺฻পᷞڊᶽ 
• ߾฻প᷹᷃ᷛ᷵ᷚᷝᴖᷔᷥṇᴨḲ̲вᷦΌ՝ḉ߅᷈ᷡᶻ 
ᾜᾫᾟὗὨὦὨ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ώᾘᾙᾩᾠᾚ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὩ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὪ 
όᾃᾆὺᾂὗ௧ऀ 
ᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὗೱހ 
Ὗ୺฻পᷞḺḭḿḋṔṝḚὠ 
᥸᥷௧ऀੈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
ᾍᾆᾈὗὟᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὠ 
• ᾅᾜᾯᾬᾪὗᷦḺḭḿḋṔṝḚḉ߾฻পᷞᷦᷡ᷆୺฻পᷞڊᶽ 
• ߾฻প᷹᷃ᷛ᷵ᷚᷝᴖᷔᷥṇᴨḲ̲вᷦΌ՝ḉ߅᷈ᷡᶻ 
ᾜᾫᾟὗὨὦὨ 
ᾜᾫᾟὗὨὦὩ 
ᾜᾫᾟὗὨὦὪ 
ώᾘᾙᾩᾠᾚ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὩ 
ᾍᾆᾈὗᾝᾦᾩὗᾜᾫᾟὗὨὦὪ 
όᾃᾆὺᾂὗ௧ऀ 
ᾍᾠᾩᾫᾬᾘᾣὗᾆᾬᾫᾧᾬᾫὗᾈᾬᾜᾬᾜὗೱހ 
Ὗ୺฻পᷞḺḭḿḋṔṝḚὠ 
᥸᥷௧ऀੈ 
͖ḃᷖḻḛḭḲᷦ 
ḳṗḭṁ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
ᾃᾦᾞᾞᾠᾥᾞ 
• ᾅᾜᾯᾬᾪὗᷥṗḚᷥି੧ 
o ṗḚᷥ޿์᷃ৃᶻ 
o шṗḚᷥὸᾞᾜὟ೑়ӜҶὠ᷃੹ᶻ 
 
• ṁṗḥḣᷥὗὼᾭᾜᾥᾫὗ὿ᾠᾪᾫᾦᾩᾰὗḉઉᶽ᷊ᷟᷞݨࡩ௧ऀݰᷢ 
᷿ᷠᷥᶽᷡḎṃṝḲ᷃௧ऀ᷎ᷝᶻ᷂ᷖḉੴێϨ஗ 
• ᾋὸὺὤᾇὸὺὟ̝ߺ᷌ḃᷖὙᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣὙὠὗᷞ޷෥ᷡṗḚḝṈṝḳḉ 
᷸᷵ᷟᷝ޸଼ᷞ᷄Ḃ 
• ᾆόώᾃὗᷢ౪Ә௧ࣵὟṔḥḭḲ᷎᷹ᷝܶḂὠᷥṗḚ᷃ӫ۰᷌ḃḂ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
ὸᾞᾜᾥᾛᾘ 
§ ᾅᾜᾯᾬᾪὗᷥз෥ 
§ ᾅᾜᾯᾬᾪὗᷟὗὺᾘᾫᾘᾣᾰᾪᾫὗᷥఞѕ 
§ ᾅᾜᾯᾬᾪὗᷥି੧ 
§ ᾅᾜᾯᾬᾪὗᷥṓḎṝḴḭṁ࡞Д 
§ ᾅᾜᾯᾬᾪὗᷥḲṓṀṕḡṏᴨḰḍṝḚ޺ೳ 
§ ḲṓṀṕḡṏᴨḰḍṝḚḮᴨṕ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗᷥ࡞Д 
§ ܤڃݣอᷥ࡞Д 
§ ޑӽτଘ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
ᾅᾜᾯᾬᾪὗḡṔᴨḤ͔ฅ 
• ḡṍᴨḡֹᷥᾃὩὦᾃὪὗᾊᾮᾠᾫᾚᾟ 
o ᾅᾜᾯᾬᾪὗὮὧὧὧ 
• ṆḭḙḣֹᷥᾃὩὦᾃὪὗᾊᾮᾠᾫᾚᾟ 
o ᾅᾜᾯᾬᾪὗὪὧὧὧ 
o ᾅᾜᾯᾬᾪὗὬὧὧὧ 
o ᾅᾜᾯᾬᾪὗὭὧὧὧ 
• ḷḭḲṙᴨḙΪࢗෟᷥӟӏ 
o ᾅᾜᾯᾬᾪὗὩὧὧὧ 
o ᾅᾜᾯᾬᾪὗὫὧὧὧ 
• ὿ᾰᾧᾜᾩᾍᾠᾪᾦᾩὗࡱᷥὗᾭᾊᾮᾠᾫᾚᾟ 
o ᾅᾜᾯᾬᾪὗὨὧὧὧᾭ 
• ḙṓḐḳٳ਽ෟᷥӟӏ 
o ᾅᾜᾯᾬᾪὗὰὧὧὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
ᾅᾜᾯᾬᾪὗḡṔᴨḤᷥṇḢḡṑḵṝḚ 
ḝḌॾ 
ḱḍḣḲṔ 
ḽṏᴨḡṑṝॾ 
Ḍḙḥḣॾ 
ᾅᾜᾯᾬᾪὗὭὧὧὧ 
ᾅᾜᾯᾬᾪὗὬὧὧὧ 
ᾅᾜᾯᾬᾪὗ 
Ὦὧὧὧ 
ᾅᾜᾯᾬᾪὗὪὧὧὧ 
Ὗણ਻ΪḣḎḭḫὠ 
ᾅᾜᾯᾬᾪὗὨὧὧὧᾭ 
ὟϢঁḣḎḭḫὠ 
ᾅᾜᾯᾬᾪὗὫὧὧὧ 
ᾅᾜᾯᾬᾪὗὩὧὧὧ 
ᾅᾜᾯᾬᾪὗὰὧὧὧ 
ᾘᾥᾛ 
ὸὺᾀὗᾊᾦᾣᾬᾫᾠᾦᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
ᾅᾜᾯᾬᾪḉܺᷚᷖḱᴨḩḥṝḩٳࣶ๏ 
ᾅᾜᾯᾬᾪὮὧὨὧ 
ᾅᾜᾯᾬᾪὬὬὫὯ 
ᾅᾜᾯᾬᾪὩὩὪὩ 
ᾊᾜᾩᾭᾜᾩ 
ḝḌॾ 
ḱḍḣḲṔ 
ḽṏᴨḡṑṝॾ 
Ḍḙḥḣॾ 
ᾍᾇὺ 
ᾍᾇὺ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥି੧ 
• ᾅᾜᾯᾬᾪὗḡṔᴨḤᷥۛࡱ̴ӟ޿ 
• ḡṍᴨḡֹᷞḝḌᴖḱḍḣḲṔḽṏᴨḡṑṝॾᷞฆෟ 
• ᾍύὺὣὗᾀᾊᾊᾌὗӟ஗ḉḟṇᴨḲ 
• ᾀᾆὗᾄᾦᾛᾬᾣᾜὗ᷋ᷟᷢӟ஗᷃̓ᷡḂ 
ᾅᾜᾯᾬᾪὗὮὮὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥି੧ 
• ᾅᾜᾯᾬᾪὗḡṔᴨḤᷥۛࡱ̴ӟ޿ 
• ḡṍᴨḡֹᷞḝḌᴖḱḍḣḲṔḽṏᴨḡṑṝॾᷞฆෟ 
• ᾍύὺὣὗᾀᾊᾊᾌὗӟ஗ḉḟṇᴨḲ 
• ᾀᾆὗᾄᾦᾛᾬᾣᾜὗ᷋ᷟᷢӟ஗᷃̓ᷡḂ 
ᾅᾜᾯᾬᾪὗὮὮὨὧ 
Nexus の Line Card の命名規則 
例) N7K-M 1 32XP-12L 
シリーズ名 世代 ポート数 テーブルサイズ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥି੧ 
• ᾅᾜᾯᾬᾪὗḡṔᴨḤᷥۛࡱ̴ӟ޿ 
• ḡṍᴨḡֹᷞḝḌᴖḱḍḣḲṔḽṏᴨḡṑṝॾᷞฆෟ 
• ᾍύὺὣὗᾀᾊᾊᾌὗӟ஗ḉḟṇᴨḲ 
• ᾀᾆὗᾄᾦᾛᾬᾣᾜὗ᷋ᷟᷢӟ஗᷃̓ᷡḂ 
ᾅᾜᾯᾬᾪὗὮὮὨὧ 
Nexus の Line Card の命名規則 
例) N7K-M 1 32XP-12L 
シリーズ名 世代 ポート数 テーブルサイズ 
通称「M1-32L」と呼ぶ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥି੧ 
• ᾅᾜᾯᾬᾪὗḡṔᴨḤᷥۛࡱ̴ӟ޿ 
• ḡṍᴨḡֹᷞḝḌᴖḱḍḣḲṔḽṏᴨḡṑṝॾᷞฆෟ 
• ᾍύὺὣὗᾀᾊᾊᾌὗӟ஗ḉḟṇᴨḲ 
• ᾀᾆὗᾄᾦᾛᾬᾣᾜὗ᷋ᷟᷢӟ஗᷃̓ᷡḂ 
型番 Interface 特徴 
M1-32 10G x 32(8) テーブルサイズ大 
高機能 
M1-48 1G x 48 Fiber or Copper 
M2-24 10G x 24 M1の後継機 
F1-32 1/10G x 32 L2 Only. FP対応 
F2-48 1/10G x 48 L2/L3. FP対応 
F3-24 40G x 24 次期主力 
ᾅᾜᾯᾬᾪὗὮὮὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥвұ 
• ḡṍᴨḡḩḎṁअౠᷞژᶻḻḿḓᴨṈṝḣᷟϨෟࣵḉݯᷛ 
• ḝḌॾᴖḱḍḣḲṔḽṏᴨḡṑṝॾᷞ޷ᷢฆෟ᷌ḃḂ 
ḣᴨḻᴨḺḎḠᴨὟᾊᾌᾇὠ 
Ὡὗᾪᾣᾦᾫᾪ 
ṓḎṝḕᴨḳὟᾀᾆὗᾄᾦᾛᾬᾣᾜὠ 
Ὧὗᾪᾣᾦᾫᾪ 
Fans 
- 2 System 
- 2 Fabric 
ファブリック (XBar) 
5 slots 
電源(PSU) 
3 slots 
前面 背面 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ώᾘᾙᾩᾠᾚ 
ώᾘᾙᾩᾠᾚ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ώᾘᾙᾩᾠᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾚᾣᾦᾚᾢὗᾪᾰᾥᾚ 
ώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜὗᷥ 
୞ಊзஊࣈ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾚᾣᾦᾚᾢὗᾪᾰᾥᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜὗᷥ 
ώᾘᾙᾩᾠᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
୞ಊзஊࣈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾚᾣᾦᾚᾢὗᾪᾰᾥᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜὗᷥ 
ώᾘᾙᾩᾠᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
୞ಊзஊࣈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾚᾣᾦᾚᾢὗᾪᾰᾥᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜὗᷥ 
ώᾘᾙᾩᾠᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
୞ಊзஊࣈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
ᾅᾜᾯᾬᾪὮὧὧὧὗṌḢṏᴨṕҶᷥतষзஊࣈ 
• ὼᾆόὺάὗᾊᾌᾇὗᷟὗᴺώᾘᾙᾩᾠᾚὗὺᾘᾩᾛὗԘᷪὗᾀᾆὗᾄᾦᾛᾬᾣᾜᴻὗҶḉ׌ࣱ᷇ؾෟᷥḻḣ 
• ώᾘᾙᾩᾠᾚάὗᾀᾆὗᾄᾦᾛᾬᾣᾜὗԘᷪᴕᾊᾌᾇὗҶᷥḱᴨḩઌ࢘ὟᾧᾬᾥᾫҾ᷷ὠᷥḻḣ 
ὼᾆόὺὟḡṍᴨḡ׊ශὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾃᾠᾥᾜὗὺᾘᾩᾛ 
ᾚᾣᾦᾚᾢὗᾪᾰᾥᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜὗᷥ 
ώᾘᾙᾩᾠᾚ 
ᾃᾠᾥᾜὗὺᾘᾩᾛὗὟᾃὺὠ 
ώᾘᾙᾩᾠᾚ 
ᾊᾌᾇ 
୞ಊзஊࣈ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ݻಠ̠ᷝὗὶ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ᾧᾬᾥᾫὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ઌุ࢘ᷦԴුఇ̷୞ὗὶ 
ᾧᾬᾥᾫὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ઌุ࢘ᷦԴුఇ̷୞ὗὶ 
ᾅᾆ 
ᾧᾬᾥᾫὗ὘὘ᾛᾩᾦᾧὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ᾐὼᾊ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ઌุ࢘ᷦԴුఇ̷୞ὗὶ 
ᾅᾆ 
ᾧᾬᾥᾫὗ὘὘ᾛᾩᾦᾧὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ᾐὼᾊ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ᷠᷥṁṗḥḣᶹᷝᷥઌ࢘ὗὶ 
ઌุ࢘ᷦԴුఇ̷୞ὗὶ 
ᾅᾆ 
ᾧᾬᾥᾫὗ὘὘ᾛᾩᾦᾧὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾬᾥᾫὗܷᷥ८᷶ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾫᾜᾣᾥᾜᾫὟᾭᾫᾰὠᾃὩὦᾃὪὗᾇᾩᾦᾫᾦᾚᾦᾣᾪᾪᾥᾤᾧὗᾜᾫᾚὥὗὥὗὥ 
ᾘᾩᾧὗᾜᾫᾚὗ 
ᾥᾜᾫᾪᾫᾘᾚᾢ 
ᾫᾜᾣᾥᾜᾫὗ 
ᾇᾘᾚᾢᾜᾫὗ૜ঝ 
ᾅᾆݻಠ̠ᷝὗὶ 
ᾐὼᾊ 
ώᾦᾩᾮᾘᾩᾛᾠᾥᾞ 
ὼᾥᾞᾠᾥᾜὺᾦᾇᾇ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥ 
ᾐὼᾊ 
ᷠᷥṁṗḥḣᶹᷝᷥઌ࢘ὗὶ 
ઌุ࢘ᷦԴුఇ̷୞ὗὶ 
ᾅᾆ 
ᾧᾬᾥᾫὗ὘὘ᾛᾩᾦᾧὗ὘὘ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ᾉᾀό 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ḧḿḲḐḑḌᷥḿḓṙᴨḱḍṝḚ 
ḰᴨṀṕὗὟᾉὸᾄࡱᷞҩซὠ 
ᶻḆ᷽ḂṕᴨḰḍṝḚḰᴨṀṕ 
ḹᴨḳḐḑḌᷥḿḓṙᴨḱḍṝḚ 
ḰᴨṀṕὗὟᾋὺὸᾄḉฆෟὠ 
ώᾀόώᾀόώᾀό 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ᾆᾊᾇώ 
ᾆᾊᾇώᾌώύᾄ 
ᾆᾊᾇώ 
ᾉᾀό 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ώᾀόώᾀόώᾀό 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ᾉᾀό 
ὟὩὠᴕᾇᾬᾥᾫὗ᷌ḃᷖḻḛḭḲḉ 
ὗὗὗὗὗὗὗ૊ढᷡṁṗḥḣᷢ৻᷐ 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾌώύᾄ 
ώᾀόώᾀόώᾀό 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ὟὪὠᴕṁṗḥḣ᷋ᷟᷢ׊๳ḉעપ 
ᾆᾊᾇώ 
ᾆᾊᾇώᾌώύᾄ 
ᾆᾊᾇώ 
ᾉᾀό 
ὟὩὠᴕᾇᾬᾥᾫὗ᷌ḃᷖḻḛḭḲḉ 
ὗὗὗὗὗὗὗ૊ढᷡṁṗḥḣᷢ৻᷐ 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ώᾀόώᾀόώᾀό 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ὟὫὠಗࣞᷥṁṗḲḝṕᷥࡼ೧ḉ 
ὗὗὗὗὗὗᾉᾀόὟḧḿḲὠ᷃ߦඣ᷐Ḃ 
ᾉᾀό 
ὟὩὠᴕᾇᾬᾥᾫὗ᷌ḃᷖḻḛḭḲḉ 
ὗὗὗὗὗὗὗ૊ढᷡṁṗḥḣᷢ৻᷐ 
ὥὗὥὗὥ 
ὟὪὠᴕṁṗḥḣ᷋ᷟᷢ׊๳ḉעપ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾌώύᾄ 
ώᾀόώᾀόώᾀό 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ὟὪὠᴕṁṗḥḣ᷋ᷟᷢ׊๳ḉעપὟὫὠಗࣞᷥṁṗḲḝṕᷥࡼ೧ḉ 
ὗὗὗὗὗὗᾉᾀόὟḧḿḲὠ᷃ߦඣ᷐Ḃ 
ᾉᾀό 
ὟὩὠᴕᾇᾬᾥᾫὗ᷌ḃᷖḻḛḭḲḉ 
ὗὗὗὗὗὗὗ૊ढᷡṁṗḥḣᷢ৻᷐ 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾌώύᾄ 
ώᾀόώᾀόώᾀό 
ὟὬὠᴕ׊๳ࡼ೧ḉᾃὺ᷋ᷟᷢ 
ὗὗὗὗὗὗὗ૊ֻ᷎ᷖᷢߒࣽ 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥ૜ঝḰᴨṀṕ܂ࣶ޺ࠕ 
ὟὪὠᴕṁṗḥḣ᷋ᷟᷢ׊๳ḉעપὟὫὠಗࣞᷥṁṗḲḝṕᷥࡼ೧ḉ 
ὗὗὗὗὗὗᾉᾀόὟḧḿḲὠ᷃ߦඣ᷐Ḃ 
ᾉᾀό 
ὟὩὠᴕᾇᾬᾥᾫὗ᷌ḃᷖḻḛḭḲḉ 
ὗὗὗὗὗὗὗ૊ढᷡṁṗḥḣᷢ৻᷐ 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾌώύᾄ 
ώᾀόώᾀόώᾀό 
ὟὬὠᴕ׊๳ࡼ೧ḉᾃὺ᷋ᷟᷢ 
ὗὗὗὗὗὗὗ૊ֻ᷎ᷖᷢߒࣽ 
ώᾘᾙᾩᾠὗ׊ශᷞᷦᷡ᷆ 
ὼᾆόὺὗ׊ශᷞṁṗḚ 
ṓṉṝḚ᷐Ḃ 
ὟὭὠᴕᾃὺᷦ׊๳ࡼ೧ḉ 
ὗὗὗὗὗὗὗώᾀόὟḹᴨḳὠᷞ೑ݯ 
ὟὨὠὗݻಠ̠ᷝᷥḻḛḭḲὟᾇᾩᾦᾫᾦᾚᾦᾣὗ 
ὗὗὗὗὗὗᷡᷠὠᷦὺᾇᾌὟὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὠὗᷯ 
ᴕὗὗᾇᾬᾥᾫὗ᷐Ḃ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾘᾚᾢᾜᾫὗώᾦᾩᾮᾘᾩᾛᾠᾥᾞὗೱހ 
ᾉᾀό 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ώᾀόώᾀόώᾀό 
ώᾀόὗᾋὺὸᾄ 
ὸύᾁὗᾋὸόᾃὼ 
ώᾀόὗᷥ୞ಊٳন 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾘᾚᾢᾜᾫὗώᾦᾩᾮᾘᾩᾛᾠᾥᾞὗೱހ 
ᾉᾀό 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ݻಠ̠ᷝᷥḻḛḭḲᷞᷡᶻ 
ώᾀόώᾀόώᾀό 
ώᾀόὗᾋὺὸᾄ 
ὸύᾁὗᾋὸόᾃὼ 
ᾇᾘᾚᾢᾜᾫὗᾀᾥώᾀόὗᷥ୞ಊٳন 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾘᾚᾢᾜᾫὗώᾦᾩᾮᾘᾩᾛᾠᾥᾞὗೱހ 
ᾉᾀό 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ḻḛḭḲḉ૊ढᷡ߾ٕᷯ૜ঝ 
ώᾀόώᾀόώᾀό 
ώᾀόὗᾋὺὸᾄ 
ὸύᾁὗᾋὸόᾃὼ 
ώᾀόὗᷥ୞ಊٳন 
ᾇᾘᾚᾢᾜᾫὗᾆᾬᾫᾇᾘᾚᾢᾜᾫὗᾀᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥὗᾇᾘᾚᾢᾜᾫὗώᾦᾩᾮᾘᾩᾛᾠᾥᾞὗೱހ 
ᾉᾀό 
ώᾘᾙᾩᾠᾚὗᷦḿṗᴨ᷋ᷟᷢḲṓḿḍḭḙḉṗᴨḳḺṓṝḣ 
ὥὗὥὗὥ 
ᾊᾌᾇ 
Ὗὺᾇᾌὠ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜᾪ 
ᾃᾠᾥᾜ 
ὺᾘᾩᾛ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
ᾆᾊᾇώ 
૜ঝᷢᾉᾀόὟὺᾇᾌὠᷦฆෟ᷎ᷡᶻ 
ḻḛḭḲḉ૊ढᷡ߾ٕᷯ૜ঝ 
ώᾀόώᾀόώᾀό 
ώᾀόὗᾋὺὸᾄ 
ὸύᾁὗᾋὸόᾃὼ 
ώᾀόὗᷥ୞ಊٳন 
ᾇᾘᾚᾢᾜᾫὗᾆᾬᾫᾇᾘᾚᾢᾜᾫὗᾀᾥ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
ᾅᾜᾯᾬᾪὮὧὧὧὗᷥṓḎṝḴḭṁ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
ὩὗᾊᾌᾇὣὗὯὗᾀᾆὗᾄᾦᾛᾬᾣᾜ 
ᾅᾜᾯᾬᾪὗὮὮὨὧ 
ὩὗᾊᾌᾇὣὗὯὗᾀᾆὗᾄᾦᾛᾬᾣᾜ 
ώὩ 
ᾊᾌᾇὩ 
ᾊᾬᾧᾜᾩὗᾍᾠᾪᾦᾩ 
ᾄᾦᾛᾬᾣᾜ 
ᾀᾆὗᾄᾦᾛᾬᾣᾜ 
ώᾘᾙᾩᾠᾚώᾘᾙὩ 
ᾄᾦᾛᾬᾣᾜ 
ࢡ᷎ᶻὗὺᾘᾩᾛ 
ࢡ᷎ᶻὗώᾘᾙᾩᾠᾚ 
ᾅᾜᾯᾬᾪὗὮὧᾏᾏ 
ᾅὮᾂὗఆாЭ݁ 
ᾅᾆᾎ὘὘ 
ᾅᾜᾯᾬᾪὗὮὮᾏᾏ 
ḡṍᴨḡ᷋ᷟܒࢡ 
ᾄὩ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
ᾅᾜᾯᾬᾪὬὧὧὧὗᷥି੧ 
• ṆḭḙḣḩḎṁᷞḱḍḣḲṔḽṏᴨḡṑṝॾᷞ޷ᷢฆෟ᷌ḃḂ 
• ӟ஗᷃ৃ᷆ḝḣḲḻḿḓᴨṈṝḣᷢඳḃḂ 
• ᾍύὺὣὗᾀᾊᾊᾌὟŢὠὗᷦḟṇᴨḲ᷎ᷡᶻ 
• ᾅᾜᾯᾬᾪὗὮὧὧὧὗᷟ̓ᷡḂ૞ 
o ᾃᾘᾰᾜᾩὪὗᾉᾦᾬᾫᾠᾥᾞὗᷦḳᴨḩḕᴨḳ᷃ూ෥Ὗؕ۳ᷦ౎ࠎছయὠ 
o ώᾇὣὗᾊὸᾅὗᷡᷠḉ͔ᗵ৒ᷞḟṇᴨḲ 
o ḟᴨḺϢঁϡӹ߿ᷢՋᶻ 
Ὗὺᾠᾪᾚᾦὗᾌὺᾊὗᷟ੾ץ᷎ᷖࡸڝὠ 
ᾅᾜᾯᾬᾪὗὬὬὫὯὗᾌᾇ 
Ţὗିપࡾש౫᷄ᷞᾀᾊᾊᾌḉḟṇᴨḲ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
ᾅᾜᾯᾬᾪὬὬὫὯὗᷥвұ 
• ṆḭḙḣḩḎṁᷞḱḍḣḲṔḽṏᴨḡṑṝॾᷞ޷ᷢฆෟ᷌ḃḂ 
• ᾃὪӟ஗ḉܺᶽᷢᷦḳᴨḩḕᴨḳ᷃ూ෥Ὗؕ۳ᷦ౎ࠎᷞḎṝḣḲᴨṕۥὠ 
ὨὦὨὧ὾ὗᾯὗὪὩὗᾬᾥᾠᾝᾠᾜᾛὗᾧᾦᾩᾫὗ 
Ὗὼᾫᾟᾜᾩᾥᾜᾫὣὗώὺὠ 
ᾚᾦᾥᾪᾦᾣᾜὣὗᾤᾘᾥᾘᾞᾜᾤᾜᾥᾫὗᾧᾦᾩᾫ 
ъ੥ṌḢṏᴨṕὗ 
ώᾘᾥὗᾄᾦᾛᾬᾣᾜ 
Ὗὸᾠᾩὗᾝᾣᾦᾮὗٖᷥ᷄ᷢ੏̽ὠ 
ᾇᾊᾌ 
லർ 
ࣽർ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗᾃὩὦὪὗḳᴨḩḕᴨḳ 
• ᾃὪӟ஗ḉܺᶽᷢᷦḳᴨḩḕᴨḳ᷃ూ෥Ὗؕ۳ᷦ౎ࠎᷞḎṝḣḲᴨṕۥὠ 
ᾃὩὦᾃὪὗḳᴨḩḕᴨḳ 
يҙϨ஗ 
ᾃὩὗḳᴨḩḕᴨḳᷢᷦ 
ᾃὪὗὸᾊᾀὺ᷃ᷡᶻ 
 
ᾃὪὗḳᴨḩḕᴨḳᷢᷦ 
ᾃὩὦᾃὪὗὸᾊᾀὺ᷃ᶹḂ 
 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ὟὨὠὗᾇᾌᾅᾋ 
ᾇᾩᾦᾫᾦᾚᾦᾣ 
ᾄὸὺњߚ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
ὟὩὠὗᾃὩὦὪὗᷥ૜ঝࡼ೧ḉעપ 
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ὟὨὠὗᾇᾌᾅᾋ 
ᾇᾩᾦᾫᾦᾚᾦᾣ 
ᾄὸὺњߚ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
ὟὩὠὗᾃὩὦὪὗᷥ૜ঝࡼ೧ḉעપ 
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ὟὪὠὗᾃὪὗࡼ೧ḉ 
ὗὗὗὗὗὗࠟ᷄ڴ᷶ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ὟὨὠὗᾇᾌᾅᾋ 
ᾇᾩᾦᾫᾦᾚᾦᾣ 
ᾄὸὺњߚ 
ὟὪὠὗᾃὩὗࡼ೧ḉ 
ὗὗὗὗὗὗὗࠟ᷄ڴ᷶ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὩὗ૜ঝᷦὗᾃὩὗὸᾊᾀὺὗᷞҐץ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
ᾃὪὗ૜ঝᷦὗᾃὪὗὸᾊᾀὺὗ᷃௵਩ 
߾ٕᷥὗᾃὩὗὸᾊᾀὺὗᷯ୞ಊ૜ঝ 
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜ 
Ὗὺᾇᾌὠ 
ᾅᾜᾯᾬᾪὬὬὧὧὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾃὩὗὸᾊᾀὺᾃὪὗḳᴨḩḕᴨḳ 
ᾃὪὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ώᾘᾙᾩᾠᾚ 
ᾃὪὗ૜ঝᷦὗᾃὪὗὸᾊᾀὺὗᷯ୾᷒Ḃ 
ᾃὩὗὸᾊᾀὺᾃὩὗὸᾊᾀὺ 
ᾅᾜᾯᾬᾪὬὬὫὯḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
ᾅᾜᾯᾬᾪὬὧὧὧὗᷥṓḎṝḴḭṁ 
ᾅᾜᾯᾬᾪὗὬὧὨὧ 
Ὠὧ὾ὗᾯὗὩὧὗᾧᾦᾩᾫ 
ᾅᾜᾯᾬᾪὗὬὧᾏᾏ 
ὟᾃὩὗᾦᾥᾣᾰὠ 
ᾅᾜᾯᾬᾪὗὬὬὫὯὗᾌᾇ 
Ὠὧ὾ὗᾯὗὪὩὗᾧᾦᾩᾫᾅᾜᾯᾬᾪὗὬὭὮὩὗᾌᾇ 
ᾅᾜᾯᾬᾪὗὬὬᾏᾏ 
ὟᾃὪᷢъ੥Ϩ஗ὠ 
ᾅᾆᾎ὘὘ 
Ὠὧ὾ὗᾯὗὫὯὗᾧᾦᾩᾫ 
Ὣὧ὾ὗᾯὗὭὗᾧᾦᾩᾫ 
ᾅᾜᾯᾬᾪὗὬὭᾏᾏ 
ὟᾃὪᷢ౎ࠎ৔τὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥି੧ 
• ώὼᾏὗὟώᾘᾙᾩᾠᾚὗὼᾏᾫᾜᾥᾛᾜᾩὠὗᷟ؞ᷧḃḂ᷊ᷟ᷃ৃᶻ 
• ᾅᾜᾯᾬᾪὮὧὧὧὦὬὧὧὧὗᷡᷠᷟ̓ᷡḁਓ৒ᷞᷦӟ஗᷎ᷡᶻ 
• ࡱ̴ᷥᾅᾜᾯᾬᾪḉΪࢗὟؽࠀὠ᷐Ḃ᷸ᷖᷢܺḆḃḂ 
Ὗв߾᷎ᷥṓḎṝḕᴨḳ᷿ᷥᶽ̟ᷡᶻᷗᷟ݉ᶽᷟಠ᷂ḁ᷐᷻ᶻὠ 
• ϥь̪᷃᷆ᴖᾋᾆᾉὟᾋᾦᾧὗᾆᾝὗᾉᾘᾚᾢὠᷥḣḎḭḫ᷎ᷟᷝḟᴨḺᷢ੾ץ 
• ᾅᾜᾯᾬᾪὩὧὧὧὗவϠᷯᷥḣḎḭḫᷥतষᷦఫḟṇᴨḲ 
ᾅᾜᾯᾬᾪὗὩὩὪὩὗᾋᾄ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106
ᾅᾜᾯᾬᾪὩὩὫὯᾋᾄὗᷥвұ 
• ਓ৒ᷞฆෟ᷌ḃᷡᶻ᷸ᷖḝṝḧᴨṕ᷻ᾤᾞᾤᾫὗᾀὦώὗ়᷃۳᷎ᷡᶻ 
• ṅḣḲतষෟᴖᾌᾧᾣᾠᾥᾢὗὟࢰӟᷟᷥतষὠෟᷥṇᴨḲᷦע᷵ᷚᷝᶻḂ 
὿ᾀώὟ὿ᾦᾪᾫὗᾀᾥᾫᾜᾩώᾘᾚᾜὠὗὨὦὨὧ὾ὗᾯὗὫὯᾅᾀώὟᾬᾧᾣᾠᾥᾢὠὗὨὧ὾ὗᾯὗὯ 
ώὸᾅᾇᾊᾌ 
ࣽർ 
லർ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107
ḝṝḲṗᴨṕ 
૜ঝࠖซṁṖᴨṝ 
धપ 
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥฆෟೱೳ 
ᾅᾜᾯᾬὬὬὫὯὗὟᾉᾇὗάὗᾉᾦᾬᾫᾜὗᾇᾩᾦᾚᾜᾪᾪᾦᾩὠ 
ᾃὩὦὪώᾎὺᾇᾌ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
ᾍᾠᾩᾫᾬᾘᾣὗὨὗόᾠᾞὗᾊᾮᾠᾫᾚᾟ 
तষ᷐Ḃᷗ᷈ᷞ 
ବ܂᷐Ḃ 
ᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠ 
὿ᾀώ὿ᾀώ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
὿ᾀώ὿ᾀώ 
Ὠὧ὾ὗᾜᾫᾟᴕᷥ 
ὺᾟᾘᾥᾥᾜᾣὗᷞ 
ώᾘᾙᾩᾠᾚḉ 
ὼᾏᾫᾜᾥᾛ 
ώὼᾏෟᷥ 
धપ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
धપ 
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥฆෟೱೳ 
ᾅᾜᾯᾬὬὬὫὯὗὟᾉᾇὗάὗᾉᾦᾬᾫᾜὗᾇᾩᾦᾚᾜᾪᾪᾦᾩὠ 
ᾃὩὦὪώᾎὺᾇᾌ 
૜ঝᷦࢰӟᷢ୾᷒Ḃ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
ᾍᾠᾩᾫᾬᾘᾣὗὨὗόᾠᾞὗᾊᾮᾠᾫᾚᾟ 
ᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠ 
὿ᾀώ὿ᾀώ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
὿ᾀώ὿ᾀώ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109
ḝṝḲṗᴨṕṁṖᴨṝ̠ᷥ 
ᾅᾜᾯᾬὬὬὫὯὗὟᾉᾇὗάὗᾉᾦᾬᾫᾜὗᾇᾩᾦᾚᾜᾪᾪᾦᾩὠઌ࢘ᷦࢰӟᷞࠖซ 
धપ 
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥฆෟೱೳ 
ᾃὩὦὪώᾎὺᾇᾌ 
૜ঝᷦࢰӟᷢ୾᷒Ḃ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
ᾍᾠᾩᾫᾬᾘᾣὗὨὗόᾠᾞὗᾊᾮᾠᾫᾚᾟ 
ᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠᾅᾜᾯᾬᾪὩὩὫὯὟᾃὺὠ 
὿ᾀώ὿ᾀώ 
ᾀὦώ 
ᾌᾇᾃᾀᾅᾂ 
὿ᾀώ὿ᾀώ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾅὬᾂὦᾅὮᾂ 
ᾃὩὦᾃὪὗᾊᾮᾠᾫᾚᾟᾠᾥᾞ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ᾅᾀώᾅᾀώᾅᾀώ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ώὼᾏ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ὸᾊᾀὺ 
὿ᾀώ὿ᾀώ὿ᾀώ 
ᾧᾘᾚᾢᾜᾫ 
ᾧᾘᾚᾢᾜᾫ 
ώᾜᾯὗᷢҸ᷐Ḃࡼ೧ 
ઌࡻᷥḻḛḭḲ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥὗὸᾩᾚᾟᾠᾫᾜᾚᾫᾬᾩᾜ 
ᾅὬᾂὦᾅὮᾂ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ᾃὩὦᾃὪὗᾊᾮᾠᾫᾚᾟᾠᾥᾞ 
ᾅᾀώᾅᾀώᾅᾀώ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ώὼᾏ 
ᾝᾜᾯᾧᾘᾚᾢᾜᾫᾝᾜᾯᾧᾘᾚᾢᾜᾫ 
ὸᾊᾀὺ 
὿ᾀώ὿ᾀώ὿ᾀώ 
ᾧᾘᾚᾢᾜᾫ 
ᾧᾘᾚᾢᾜᾫ 
ଭ͔࣬৩᷹ᷞὸᾊᾀὺ᷃̓ᷡḂ 
ࡸڝ᷃ᶹḂᴗ 
ὸᾊᾀὺὗ᷿ᷢḁḌᴨḗḰḙḫṍ᷻ 
Ḻḭḿḋᷥޒছ᷃৫᷄᷆̓Ḃ 
ᷥᷞ੏̽᷃ూ෥ᴗ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112
ᾅᾜᾯᾬᾪὩὧὧὧὟώὼᾏὠὗᷥṓḎṝḴḭṁ 
ᾅᾜᾯᾬᾪὗὩὩὫὯὗᾋᾇ 
Ὠ὾ὗᾯὗὫὯὗὢὗὨὧ὾ὟᾬᾧᾣᾠᾥᾢὠὗᾯὗὫ 
ᾅᾜᾯᾬᾪὗὩὩὪὩὗᾋᾄ 
ὨὦὨὧ὾ὗᾯὗὪὩὗὢὗὨὧ὾ὟᾬᾧᾣᾠᾥᾢὠὗᾯὗὯ 
ᾅᾆᾎ὘὘ 
ᾅᾜᾯᾬᾪὗὩὨᾏᾏᾅᾜᾯᾬᾪὗὩὩᾏᾏὗᾅᾜᾯᾬᾪὗὩὪᾏᾏὗ 
όᾣᾘᾛᾜᾊᾜᾩᾭᾜᾩὗᷢ঄᷐ώὼᾏ 
ᾌὺᾊὗᷞᶻᶽὗᾀᾆᾄὗᷢঐଔ 
ᾅᾜᾯᾬᾪὗὫὧὧὨὗᾊᾮᾠᾫᾚᾟὗᾄᾦᾛᾬᾣᾜὗᾝᾦᾩὗᾀόᾄ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
ᾅᾜᾯᾬᾪὰὧὧὧὗᷥି੧ 
• ḡṍᴨḡֹᷥὗὰὬὧὧὗᷟṆḭḙḣֹᷥᴕὰὪὧὧὗ᷃ᶹḂ 
• ઌࡻᷥḣḎḭḫὟᾪᾫᾘᾥᾛᾘᾣᾦᾥᾜὗᾤᾦᾛᾜὠὗᷟᴕὸὺᾀὗᾄᾦᾛᾜὗ᷃ᶹḂ 
• ᾊᾫᾘᾥᾛᾘᾣᾦᾥᾜὗᾄᾦᾛᾜ 
o ᾃὩὦᾃὪὗᾊᾮᾠᾫᾚᾟὗ᷎ᷟᷝବ܂᷐Ḃ 
o ᾅᾜᾯᾬᾪὗὮὧὧὧὣὗὬὧὧὧὗᷟ৫᷄ᷡ͋ᶻᷦᷡᶻ 
• ὸὺᾀὗᾄᾦᾛᾜ 
o ὸὺᾀᷞବ᷐᷂᷸ᷖᷥऴෟṌᴨḳ 
o ὸᾇᾀὺὟὸὺᾀὗᷥḝṝḲṗᴨṓὠᷥ݊ݸᷢ߬ᶻ 
ḙṓḐḳᷥḹᴨḳḐḑḌӐఏ᷎ᷟᷝବ܂ 
ᾅᾜᾯᾬᾪὗὰὬὧὯ 
ᾅᾜᾯᾬᾪὗὰὪὰὭ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114
ᾅᾜᾯᾬᾪὰὬὧὧὗᷥвұ 
• ḡṍᴨḡḩḎṁᷥὗᾅᾜᾯᾬᾪὗὰὧὧὧ 
ᾀᾆὗᾄᾦᾛᾬᾣᾜ 
Ὣὧ὾ὗᾯὗὪὭ 
Ὠὧ὾ὗᾯὗὫὯὗ 
ᾊᾌᾇ 
Ὡὗᾪᾣᾦᾫ 
ࣽർலർ 
ᾇᾊᾌ 
 
ώᾘᾥὗᾋᾩᾘᾰᾪ 
ώᾘᾙᾩᾠᾚ 
ᾄᾦᾛᾬᾣᾜ 
ᾊᾰᾪᾫᾜᾤὗ 
ὺᾦᾥᾫᾩᾦᾣ 
ὺᾘᾩᾛ 
ὟᾊᾌᾇᷥජѦḉ 
͔ಊ؂৩Ḇḁὠ 
ṉḭḳṁṖᴨṝᷦ 
়۳᷎ᷡᶻ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115
ᾅᾜᾯᾬᾪὰὬὧὧὗᷥḡṍᴨḡٳন 
ᾀᾆὗᾄᾦᾛᾬᾣᾜ 
ᾀᾆὗᾄᾦᾛᾬᾣᾜ 
ࣽർலർ 
ᾊᾬᾧᾜᾩᾍᾠᾪᾦᾩὗᾄᾦᾛᾬᾣᾜ 
ᾇᾊᾌ 
ώᾘᾙᾩᾠᾚὗᾄᾦᾛᾬᾣᾜ 
ᾊὺὺ 
ώᾘᾥὗᾄᾦᾛᾬᾣᾜ 
পർ 
Ӑ௼᷃ᷡ᷆ᴖ 
ᾃὺὗᷟὗώᾘᾙᾩᾠᾚὗ᷃ 
੾ץ᷐Ḃ 
Ӑ௼ḉД᷎ᷝ 
ᾃὺὗᷟὗώᾘᾙᾩᾠᾚὗ᷃ 
तষ᷐Ḃ 
ᾀᾆ 
ᾀᾆ 
ᾊᾌᾇ 
ώὸόᾉᾀὺ 
߬෶ᷥḡṍᴨḡ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116
ᾅᾜᾯᾬᾪὰὬὧὧὗᷥḡṍᴨḡٳন 
ḡṍᴨḡᷥ᷶ὟӐఏ᷃ᷡᶻὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117
ᾅᾜᾯᾬᾪὰὪὧὧὗᷥвұ 
• ṆḭḙḣḩḎṁᷥὗᾅᾜᾯᾬᾪὗὰὧὧὧ 
Ὠὧ὾ὗᾯὗὫὯъ੥ṌḢṏᴨṕὗὟὫὧ὾ὗᾯὗὨὩὠὗ 
ώᾘᾥὗᾄᾦᾛᾬᾣᾜᾇᾊᾌ 
ὺᾦᾥᾪᾦᾣᾜ 
ᾄᾞᾤᾫὗᾀὦώ 
ࣽർ 
லർ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118
ὸὺᾀз෥άὗᾎᾜᾙḟᴨḽḣᷟܢЮॾṌḱṕ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ώᾠᾩᾜᾎᾘᾣᾣ 
ᾈᾦᾊᾈᾦᾊ 
᷁Ԑෛ 
౓ݸḱᴨḩ܂ࣶḟᴨḽḣᷥṗḢḭḙΐষḱᴨḩ 
ṁṖḦṝḰᴨḡṑṝॾḌṁṔḛᴨḡṑṝॾḱᴨḩॾ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119
ὸὺᾀз෥άὗ߬෶ᷥᾎὼόḟᴨḽḣᷥḎṝḿṓٳ਽޺ࠕὟὨὠ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ᾈᾦᾊᾈᾦᾊ 
ώᾠᾩᾜᾎᾘᾣᾣ 
Ḏṝḿṓधב 
Ḏṝḿṓझ୾ޤ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120
ὸὺᾀз෥άὗ߬෶ᷥᾎὼόḟᴨḽḣᷥḎṝḿṓٳ਽޺ࠕὟὩὠ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ᾈᾦᾊᾈᾦᾊ 
ḟᴨḺᷟḣḎḭḫᷥधਸᷟधપḣḲṖᴨḢᷥѦḁଔᷝ 
ώᾠᾩᾜᾎᾘᾣᾣ 
὾ᾆ὘὘ 
ࣞ୸̲ࡱᷥ 
ṁṗḢḑḙḲ 
ḰḙḸṗḢᴨ᷋ᷟᷥḎṝḿṓḒṝḢḵḌ 
Ḏṝḿṓझ୾ޤ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121
ὸὺᾀз෥άᴕὸὺᾀὗ᷿ᷢḂᾎᾜᾙḟᴨḽḣᷥḎṝḿṓٳ਽ὟὨὠ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ᾈᾦᾊᾈᾦᾊ 
ώᾠᾩᾜᾎᾘᾣᾣ 
ḟᴨḽḣधב 
Ḏṝḿṓฆෟޤ 
ὺᾠᾪᾚᾦὗὸὺᾀ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122
ὸὺᾀз෥άὗὸὺᾀὗ᷿ᷢḂᾎᾜᾙḟᴨḽḣᷥḎṝḿṓٳ਽ὟὩὠ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ᾈᾦᾊᾈᾦᾊ 
ṀṓḐḠᷥ὾ᾌᾀᷞҪਓᷢ܂ࣶ 
ὟḎṝḿṓᷥࡨۭਰށᷦ౪෥ὠ 
ὺᾠᾪᾚᾦὗὸὺᾀ 
ώᾠᾩᾜᾎᾘᾣᾣ 
Ḏṝḿṓฆෟޤ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123
ὸὺᾀз෥άὗὸὺᾀὗ᷿ᷢḂᾎᾜᾙḟᴨḽḣᷥḎṝḿṓٳ਽ὟὪὠ 
ᾎὼό 
ᾍᾄ 
ᾍᾄ 
ὸᾇᾇύό 
ώᾎώᾎ 
ᾍᾄ 
ᾈᾦᾊᾈᾦᾊ 
ὺᾠᾪᾚᾦὗὸὺᾀ 
ώᾠᾩᾜᾎᾘᾣᾣ 
὾ᾆ὘὘ᾆᾂ὘὘ 
ṁṗḚṓṊḉܺᷚᷝݻବᷞḎṝḿṓḉٳ਽ 
Ὗଭෛᷥٳࣶḉᶻ᷐᷹᷆ᷛᷞ᷇ᷢ܂ḃḂὠ 
Ḏṝḿṓฆෟޤ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124
ᾅᾜᾯᾬᾪὰὧὧὧὗᷥṓḎṝḴḭṁ 
ᾅᾜᾯᾬᾪὗὰὬὧὯ 
ᾅᾆᾎ὘὘ 
ᾅᾜᾯᾬᾪὗὰὪὰὭ 
ᾅᾜᾯᾬᾪὗὰὬᾏᾏὣὗᾅᾜᾯᾬᾪὗὰὪᾏᾏ 
ᾊᾫᾘᾥᾛὗὸᾣᾦᾥᾜὗᾄᾦᾛᾜὗὟઌࡻᷥḣḎḭḫὠ 
ὸὺᾀὗᾄᾦᾛᾜ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125
ὸᾞᾜᾥᾛᾘ 
§ ᾅᾜᾯᾬᾪὗᷥз෥ 
§ ᾅᾜᾯᾬᾪὗᷟὗὺᾘᾫᾘᾣᾰᾪᾫὗᷥఞѕ 
§ ᾅᾜᾯᾬᾪὗᷥି੧ 
§ ᾅᾜᾯᾬᾪὗᷥṓḎṝḴḭṁ࡞Д 
§ ᾅᾜᾯᾬᾪὗᷥḲṓṀṕḡṏᴨḰḍṝḚ޺ೳ 
§ ḲṓṀṕḡṏᴨḰḍṝḚḮᴨṕ 
ὺᾠᾪᾚᾦὗᾃᾦᾞὗᾍᾠᾜᾮᾜᾩὗᷥ࡞Д 
§ ܤڃݣอᷥ࡞Д 
§ ޑӽτଘ 
ᾅᾜᾯᾬᾪὗὮὧὨὧ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126
ḲṓṀṕḡṏᴨḰḍṝḚḌṁṗᴨḫ 
• ࢞ٳᶿ 
o ὺὺᾅὸὦὺὺᾅᾇὗṖṃṕᷥਰށᷢ౪̪᷃ᷡᶻࢁ৚᷎ᷢᷝ᷁᷆ 
o ࡯д৔τᷞᷦᷡ᷆࡯д᷃ӭ᷄ᷡᶻೱೳḉڃᶿḂ 
o ḡḣṗḚᷥ௧ऀ᷐Ḃܷ८᷶ḉซЖ᷎ࢦઉᶻ᷐Ḃ 
o ࡯дӟӏᷥିપؽᷦḴṗᴨḪḐṝᷞ؎͠ḉढḁಠ᷈ḂὟࡱԧὠ 
• Ḱḙḵḭḙ 
o ѐ஁᷐ᷰ᷄ṗḚḉ؃ᷛ᷈ḂೱೳḉਰḂ 
o ὼὼᾄὣὗᾊᾚᾩᾠᾧᾫᾠᾥᾞὗᷥܺෟ 
o ౪֍ڝᷥϨ஗ࣵ᷃ژᶻࡸڝᷦὗᾢᾜᾰᾮᾦᾩᾛὗ׹܋Ὗᾙᾬᾞᾪᾜᾘᾩᾚᾟὗᾫᾦᾦᾣὠ 
o ḳḗṏṋṝḲ᷻ЅԬᷥ৔τḉ؜ࢷὟޢ୞ὠ᷸ᷞ᷵ᷟᷝ᷁᷆ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127
ḲṓṀṕ௧ऀݰᷥੴێఇ̷ 
• шṁṗḥḣᷦὗὼᾭᾜᾥᾫὗύᾩᾠᾭᾜᾥὟḎṃṝḲ֊ବὠᷞବᶻᷝᶻḂ 
ᾇᾩᾦᾚᾜᾪᾪὗᷥὗὼᾭᾜᾥᾫὗ᷃௧ऀ 
Ὗвಊᴖ୞ಊ᷿ḁὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128
ḲṓṀṕ௧ऀݰᷥੴێఇ̷ 
• шṁṗḥḣᷦὗὼᾭᾜᾥᾫὗύᾩᾠᾭᾜᾥὟḎṃṝḲ֊ବὠᷞବᶻᷝᶻḂ 
ᾇᾩᾦᾚᾜᾪᾪὗᷥὗὼᾭᾜᾥᾫὗ᷃௧ऀ 
Ὗвಊᴖ୞ಊ᷿ḁὠ 
ᾇᾩᾦᾚᾜᾪᾪὗ᷃ὗὼᾭᾜᾥᾫὗࠖซ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾪᾫᾘᾫᾜ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129
ḲṓṀṕ௧ऀݰᷥੴێఇ̷ 
• шṁṗḥḣᷦὗὼᾭᾜᾥᾫὗύᾩᾠᾭᾜᾥὟḎṃṝḲ֊ବὠᷞବᶻᷝᶻḂ 
ᾇᾩᾦᾚᾜᾪᾪὗᷥὗὼᾭᾜᾥᾫὗ᷃௧ऀ 
Ὗвಊᴖ୞ಊ᷿ḁὠ 
ᾇᾩᾦᾚᾜᾪᾪὗ᷃ὗὼᾭᾜᾥᾫὗࠖซ 
ିપࡾש 
ᾃᾦᾞὗᾣᾜᾭᾜᾣ 
ᾊᾰᾪᾣᾦᾞὗᷢ߾฻᷌ḃḂ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾪᾫᾘᾫᾜ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130
ḲṓṀṕ௧ऀݰᷥੴێఇ̷ 
• шṁṗḥḣᷦὗὼᾭᾜᾥᾫὗύᾩᾠᾭᾜᾥὟḎṃṝḲ֊ବὠᷞବᶻᷝᶻḂ 
ᾇᾩᾦᾚᾜᾪᾪὗᷥὗὼᾭᾜᾥᾫὗ᷃௧ऀ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾪᾫᾘᾫᾜ 
͔ఄૈᷡḷḭḲṙᴨḙḒṝḢḵḌᷥੴێఇ̷ 
Ὗвಊᴖ୞ಊ᷿ḁὠ 
ᾇᾩᾦᾚᾜᾪᾪὗ᷃ὗὼᾭᾜᾥᾫὗࠖซ 
ିપࡾש 
ᾃᾦᾞὗᾣᾜᾭᾜᾣ 
ᾊᾰᾪᾣᾦᾞὗᷢ߾฻᷌ḃḂ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131
• шṁṗḥḣᷦὗὼᾭᾜᾥᾫὗύᾩᾠᾭᾜᾥὟḎṃṝḲ֊ବὠᷞବᶻᷝᶻḂ 
ᾛᾜᾙᾬᾞ 
׹ࡦ 
ὗὤὗۚؕࣵ 
ὗὤὗࣽࡻݰᷟᷥఞѕ 
ᾮᾜᾙ 
ὗὤὗὺὺᾆ 
ὗὤὗᾙᾬᾞᾫᾦᾦᾣᾢᾠᾫ 
ὗὤὗᾞᾦᾦᾞᾣᾜ 
ḲṓṀṕ௧ऀݰᷥੴێఇ̷ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾪᾫᾘᾫᾜ 
ຝฆ᷄ḷḭḲṙᴨḙḒṝḢḵḌᷥੴێఇ̷ 
ᾇᾩᾦᾚᾜᾪᾪὗᷥὗὼᾭᾜᾥᾫὗ᷃௧ऀ 
Ὗвಊᴖ୞ಊ᷿ḁὠ 
ᾇᾩᾦᾚᾜᾪᾪὗ᷃ὗὼᾭᾜᾥᾫὗࠖซ 
ିપࡾש 
ᾃᾦᾞὗᾣᾜᾭᾜᾣ 
ᾊᾰᾪᾣᾦᾞὗᷢ߾฻᷌ḃḂ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132
ḲṓṀṕḡṏᴨḰḍṝḚḌṁṗᴨḫ 
• ࢞ٳᶿ 
o ὺὺᾅὸὦὺὺᾅᾇὗṖṃṕᷥਰށᷢ౪̪᷃ᷡᶻࢁ৚᷎ᷢᷝ᷁᷆ 
o ࡯д৔τᷞᷦᷡ᷆࡯д᷃ӭ᷄ᷡᶻೱೳḉڃᶿḂ 
o ḡḣṗḚᷥ௧ऀ᷐Ḃܷ८᷶ḉซЖ᷎ࢦઉᶻ᷐Ḃ 
o ࡯дӟӏᷥିપؽᷦḴṗᴨḪḐṝᷞ؎͠ḉढḁಠ᷈ḂὟࡱԧὠ 
• Ḱḙḵḭḙ 
o ѐ஁᷐ᷰ᷄ṗḚḉ؃ᷛ᷈ḂೱೳḉਰḂ 
o ὼὼᾄὣὗᾊᾚᾩᾠᾧᾫᾠᾥᾞὗᷥܺෟ 
o ౪֍ڝᷥϨ஗ࣵ᷃ژᶻࡸڝᷦὗᾢᾜᾰᾮᾦᾩᾛὗ׹܋Ὗᾙᾬᾞᾪᾜᾘᾩᾚᾟὗᾫᾦᾦᾣὠ 
o ḳḗṏṋṝḲ᷻ЅԬᷥ৔τḉ؜ࢷὟޢ୞ὠ᷸ᷞ᷵ᷟᷝ᷁᷆ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133
ѐ஁᷐ᷰ᷄ṗḚḉਰḂೱೳ 
ᾪᾫᾘᾫᾜ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾛᾜᾙᾬᾞ 
ὶ 
ὶ 
ὶ 
ὺᾇᾌܺෟดᷥඔ৮᷃ӭ᷄ᷖ᷈ᷠᴖ 
᷹᷹ᷔᷔ޸Ḃᷰ᷄ḝṈṝḳ᷃ಠ᷂Ḁ 
ᷡᶻᷡᴗᴗ 
ᷟḁᶹᶿ᷑োᷚᷝ᷶Ḃὗὶ 
 
ᾥὮᾢᾙ὚ὗᾪᾟᾦᾮὗᾚᾧᾬὗὶ 
ὗὗὗὗὗὗὗὗὗὗὗὗᾕ 
὜ὗᾀᾥᾭᾘᾣᾠᾛὗᾚᾦᾤᾤᾘᾥᾛὗᾘᾫὗ὞ᾕ὞ὗᾤᾘᾩᾢᾜᾩὥ 
 
Ḓṓᴨ᷃߾ᷖᴗᴗᴗ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134
ṋḢṍᴨᷡӟ஗ᷦὗὙᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾯᾯᾯὙὗḉฆෟϨ஗ 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗḝṈṝḳᷦᴺḝṈṝḳ֬ḉ᷸᷵ᷟᷝ޸ 
଼ᴻ᷐Ḃ᷸ᷖᷥḝṈṝḳᴗ 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾯᾯᾯὗ᷐ᷟḂᷟᴖᾯᾯᾯὗᷥӟ஗ᷢҸ๬᷎ 
ᷖḝṈṝḳḉ޸଼Ϩ஗ 
 
೘Ґӟ஗ᷞඌૈᷥḝṈṝḳᷥර൥ḉѐ஁ 
ᾅᾜᾯᾬᾪ὚ὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗὶ 
ὗὗᾘᾘᾘὗὗὗὗὗὗὗὗὗὗὗὗὗύᾠᾪᾧᾣᾘᾰὗᾘᾘᾘὗᾠᾥᾝᾦᾩᾤᾘᾫᾠᾦᾥ 
ὗὗᾘᾚᾣᾤᾞᾩὗὗὗὗὗὗὗὗὗὗὸὺᾃὗᾚᾦᾤᾤᾘᾥᾛᾪὥὥὥ 
ὗὗᾯᾯᾯὗὗὗὗ὚ὗέὤὗ᷊ᷥӟ஗ᷥࡼ೧᷃෭᷎ᶻ὘὘ 
ὗὗᾰᾰᾰὗὗὗὗᾰᾰᾰὗᷢᷛᶻᷝᷥࡼ೧ḉ޸଼᷐Ḃ 
 
ᾅᾜᾯᾬᾪ὚ὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾯᾯᾯ 
὞ὗᾪᾟᾦᾮὗᾠᾧὗᾯᾯᾯὗὥὥὥὗ὞ 
ὥὥὥὥὥ 
ᷟḁᶹᶿ᷑ὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗḉ 
؃ᷝ᷶Ḃ᷂ᴗ 
ᾪᾫᾘᾫᾜ 
ᾟᾠᾪᾫᾦᾩᾰ 
ᾛᾜᾙᾬᾞ 
ὶ 
ὶ 
ὶ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗ᷂Ḁ෭᷎ᶻḝṈṝḳḉὗᾞᾩᾜᾧὗὟὨὠ 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾚᾦᾤᾤᾘᾥᾛᾪ 
߾฻ᷥḿḍṕḩ 
ିપಬݬ๟ḉҾ᷷ 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾚᾦᾤᾤᾘᾥᾛᾪὗ̲ᷦϠᷥḝṈṝḳᷥṔḣḲḉ޸଼ 
ὗὤὗᾅὮᾂάὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾙᾩᾠᾜᾝ 
ὗὤὗᾅὬᾂάὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣ 
ᾅὮᾂᷦ޸଼ḝṈṝḳ᷃࠻ᷡᶻ᷸ᷖᴖὟὩὠᷥ޺ೳḉ࣎࠵ 
 
ḻḎṁὟὗᾳὗὠὗᷟὗᾠᾥᾚᾣᾬᾛᾜὟᾞᾩᾜᾧ᷹Ϩὠὗḉܺᷚᷝᴺ୾̽ᷥಬݬ๟ᴻ 
ḉҾ᷷ḝṈṝḳḉਗ᷐ᴗ 
 
ᾚᾧᾬὗḉҾ᷷ḝṈṝḳḉѐ஁᷐Ḃࡸڝ̲ᷦϠ᷿ᷥᶽ᷐ᷢḂ 
ᾅὬᾂ὚ὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾚᾦᾤᾤᾘᾥᾛᾪὗᾳὗᾠᾥᾚὗᾚᾧᾬ 
ᾪᾟᾦᾮὗᾧᾩᾦᾚᾜᾪᾪὗᾚᾧᾬ 
ᾪᾟᾦᾮὗᾧᾩᾦᾚᾜᾪᾪᾜᾪὗᾚᾧᾬὗᾟᾠᾪᾫᾦᾩᾰ 
ὥὥὥ 
ᾪᾟᾦᾮὗᾟᾘᾩᾛᾮᾘᾩᾜὗᾠᾥᾫᾜᾩᾥᾘᾣὗᾚᾧᾬὤᾤᾘᾚὗᾠᾥᾙᾘᾥᾛὗᾪᾫᾘᾫᾪ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗ᷂Ḁ෭᷎ᶻḝṈṝḳḉὗᾞᾩᾜᾧὗὟὩὠ 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣ 
ḝṈṝḳ൮ᷥ᷶ 
ḿḋḎṕᷢ߾฻ 
ᾅᾜᾯᾬᾪὗὮὧὧὧὗᷦὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾚᾦᾤᾤᾘᾥᾛᾪὗᷥץϰᷢ౪঱᷃ 
ᶹḂ᷸ᷖᴖ᷊ᷥೱೳḉ࣎࠵ 
 
ὨὥὗᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣὗᷥḝṈṝḳḉḿḋḎṕᷢ߾฻ 
ᾥὮᾢ὚ὗᾪᾟὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣᾪὗᾳὗᾠᾥᾚὗᾗᾪᾟᾦᾮὗήὗᾚᾦᾤᾤᾘᾥᾛᾪὥᾣᾦᾞ 
 
ὩὥὗὨὗᷥ߾฻ḿḋḎṕḉ߾฻᷎ᴖץϰḉḿḍṕḩṔṝḚ 
ᾥὮᾢ὚ὗᾪᾟᾦᾮὗᾝᾠᾣᾜὗᾚᾦᾤᾤᾘᾥᾛᾪὥᾣᾦᾞὗᾳὗᾠᾥᾚὗᾚᾧᾬ 
ᾗᾪᾟᾦᾮὗᾧᾩᾦᾚᾜᾪᾪᾜᾪὗᾚᾧᾬᾗ 
ᾗᾪᾟᾦᾮὗᾧᾩᾦᾚᾜᾪᾪᾜᾪὗᾚᾧᾬὗᾟᾠᾪᾫᾦᾩᾰᾗ 
ᾗᾪᾟᾦᾮὗᾟᾘᾩᾛᾮᾘᾩᾜὗᾠᾥᾫᾜᾩᾥᾘᾣὗᾚᾧᾬὤᾤᾘᾚὗᾠᾥᾙᾘᾥᾛὗᾪᾫᾘᾫᾪᾗ 
ὥὥὥ 
ᾗᾪᾟᾦᾮὗᾟᾘᾩᾛᾮᾘᾩᾜὗᾠᾥᾫᾜᾩᾥᾘᾣὗᾚᾧᾬὤᾤᾘᾚὗᾤᾞᾤᾫὗᾜᾭᾜᾥᾫᾪᾗ 
 
ᾪᾟᾦᾮὗᾫᾜᾚᾟὗᾛᾜᾫᾘᾠᾣὗᷥ߾฻ᷢᷦݰҶ᷂᷂᷃Ḃ᷸ᷖᴖḿḋḎṕ 
ᷯᷥ߾฻ḉ࣎࠵ᴗ͔૷᷎᷂᷻ḀᷡᶻᷥᷞᶹḃᷧṙṝṓḎḴᴨ 
᷹ᷞٳḆᷡᶻ 
ḿḋḎṕḉ౎ࠎ߾฻ 
߾฻ḉḗᴨṙᴨḳᷞ 
ḿḍṕḩṔṝḚ 
ŢὗᾅὮᾂᷞḝṈṝḳḉ޸଼᷎ᴖᾅὬᾂᷞฆෟ᷐Ḃ᷹ᷥีᶻ޺ೳ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137
ḲṓṀṕḡṏᴨḰḍṝḚḌṁṗᴨḫ 
• ࢞ٳᶿ 
o ὺὺᾅὸὦὺὺᾅᾇὗṖṃṕᷥਰށᷢ౪̪᷃ᷡᶻࢁ৚᷎ᷢᷝ᷁᷆ 
o ࡯д৔τᷞᷦᷡ᷆࡯д᷃ӭ᷄ᷡᶻೱೳḉڃᶿḂ 
o ḡḣṗḚᷥ௧ऀ᷐Ḃܷ८᷶ḉซЖ᷎ࢦઉᶻ᷐Ḃ 
o ࡯дӟӏᷥିપؽᷦḴṗᴨḪḐṝᷞ؎͠ḉढḁಠ᷈ḂὟࡱԧὠ 
• Ḱḙḵḭḙ 
o ѐ஁᷐ᷰ᷄ṗḚḉ؃ᷛ᷈ḂೱೳḉਰḂ 
o ὼὼᾄὣὗᾊᾚᾩᾠᾧᾫᾠᾥᾞὗᷥܺෟ 
o ౪֍ڝᷥϨ஗ࣵ᷃ژᶻࡸڝᷦὗᾢᾜᾰᾮᾦᾩᾛὗ׹܋Ὗᾙᾬᾞᾪᾜᾘᾩᾚᾟὗᾫᾦᾦᾣὠ 
o ḳḗṏṋṝḲ᷻ЅԬᷥ৔τḉ؜ࢷὟޢ୞ὠ᷸ᷞ᷵ᷟᷝ᷁᷆ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138
ࡱԧೈάᴕḌᴨḗḰḙḫṍḉਰḁᴖඔ৮ḉЖע 
• ӟӏᷥ୞ಊٳনḉڃฤ᷎ඔ৮Ϲ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ޷ᷢḝṝḲṗᴨṕṁṖᴨṝὟᾇᾩᾦᾫᾦᾚᾦᾣὠ׉ᷟ૜ঝ׉ᷥඔ৮ᷞܺᶽ޺ೳ 
• ݨ๏άὗᾅὬᾂὟ὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰὠὗᷢᷝὗᾍᾀᾇὗٖ᷈ᷥὗᾃὩὗᾇᾘᾚᾢᾜᾫὗ᷃ 
ᾊᾍᾀὗᷥὗὸὺᾃὗ᷂᷂ᷢᷚ͢ḁὗύᾩᾦᾧὗ᷐Ḃ 
὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰ 
὿ᾊᾉᾇὗᾍᾀᾇ 
ύ὾άᾍᾀᾇᾃὪὗ૜ঝ 
ᾃὩὗ૜ঝ 
὿ᾊᾉᾇὗὸᾚᾫᾠᾭᾜ 
ᾭᾣᾘᾥὗᾏᾭᾣᾘᾥὗᾐ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 139
ࡱԧೈάᴕḌᴨḗḰḙḫṍḉਰḁᴖඔ৮ḉЖע 
• ӟӏᷥ୞ಊٳনḉڃฤ᷎ඔ৮Ϲ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ޷ᷢḝṝḲṗᴨṕṁṖᴨṝὟᾇᾩᾦᾫᾦᾚᾦᾣὠ׉ᷟ૜ঝ׉ᷥඔ৮ᷞܺᶽ޺ೳ 
• ݨ๏άὗᾅὬᾂὟ὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰὠὗᷢᷝὗᾍᾀᾇὗٖ᷈ᷥὗᾃὩὗᾇᾘᾚᾢᾜᾫὗ᷃ 
ᾊᾍᾀὗᷥὗὸὺᾃὗ᷂᷂ᷢᷚ͢ḁὗύᾩᾦᾧὗ᷐Ḃ 
ᾊᾍᾀὗᾏὗᷥὗὸὺᾃὗᷞὗύᾉᾆᾇ 
ὟᾃὩ૜ঝᷞᷦᾊᾍᾀᷦܺḆᷡᶻὠ 
὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰ 
὿ᾊᾉᾇὗᾍᾀᾇ 
ύ὾άᾍᾀᾇᾃὪὗ૜ঝ 
ᾃὩὗ૜ঝ 
὿ᾊᾉᾇὗὸᾚᾫᾠᾭᾜ 
ᾭᾣᾘᾥὗᾏᾭᾣᾘᾥὗᾐ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140
ࡱԧೈάᴕḌᴨḗḰḙḫṍḉਰḁᴖඔ৮ḉЖע 
• ӟӏᷥ୞ಊٳনḉڃฤ᷎ඔ৮Ϲ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ޷ᷢḝṝḲṗᴨṕṁṖᴨṝὟᾇᾩᾦᾫᾦᾚᾦᾣὠ׉ᷟ૜ঝ׉ᷥඔ৮ᷞܺᶽ޺ೳ 
• ݨ๏άὗᾅὬᾂὟ὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰὠὗᷢᷝὗᾍᾀᾇὗٖ᷈ᷥὗᾃὩὗᾇᾘᾚᾢᾜᾫὗ᷃ 
ᾊᾍᾀὗᷥὗὸὺᾃὗ᷂᷂ᷢᷚ͢ḁὗύᾩᾦᾧὗ᷐Ḃ 
ώᾘᾙᾩᾠᾚὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὩ 
ὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὪ 
ὸᾊᾀὺ 
ঁપ᷎ᷝᶻᷖ 
୞ಊઌ࢘ḻḣ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 141
ࡱԧೈάᴕḌᴨḗḰḙḫṍḉਰḁᴖඔ৮ḉЖע 
• ӟӏᷥ୞ಊٳনḉڃฤ᷎ඔ৮Ϲ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ޷ᷢḝṝḲṗᴨṕṁṖᴨṝὟᾇᾩᾦᾫᾦᾚᾦᾣὠ׉ᷟ૜ঝ׉ᷥඔ৮ᷞܺᶽ޺ೳ 
• ݨ๏άὗᾅὬᾂὟ὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰὠὗᷢᷝὗᾍᾀᾇὗٖ᷈ᷥὗᾃὩὗᾇᾘᾚᾢᾜᾫὗ᷃ 
ᾊᾍᾀὗᷥὗὸὺᾃὗ᷂᷂ᷢᷚ͢ḁὗύᾩᾦᾧὗ᷐Ḃ 
ώᾘᾙᾩᾠᾚὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὩ 
ὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὪ 
ὸᾊᾀὺ 
ঁપ᷎ᷝᶻᷖ 
୞ಊઌ࢘ḻḣ 
ޒ۱ᷥઌ࢘ḻḣ 
ὟିપᾃὩḻḛḭḲᷦ 
ᾃὪὸᾊᾀὺḉ׊ශὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 142
ࡱԧೈάᴕḌᴨḗḰḙḫṍḉਰḁᴖඔ৮ḉЖע 
• ӟӏᷥ୞ಊٳনḉڃฤ᷎ඔ৮Ϲ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ޷ᷢḝṝḲṗᴨṕṁṖᴨṝὟᾇᾩᾦᾫᾦᾚᾦᾣὠ׉ᷟ૜ঝ׉ᷥඔ৮ᷞܺᶽ޺ೳ 
• ݨ๏άὗᾅὬᾂὟ὿ᾊᾉᾇὗᾊᾫᾘᾥᾛᾙᾰὠὗᷢᷝὗᾍᾀᾇὗٖ᷈ᷥὗᾃὩὗᾇᾘᾚᾢᾜᾫὗ᷃ 
ᾊᾍᾀὗᷥὗὸὺᾃὗ᷂᷂ᷢᷚ͢ḁὗύᾩᾦᾧὗ᷐Ḃ 
ώᾘᾙᾩᾠᾚὗὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὩ 
ὸᾊᾀὺ 
ᾃὩὗὸᾊᾀὺ 
ᾃὪ 
ὸᾊᾀὺ 
ঁપ᷎ᷝᶻᷖ 
୞ಊઌ࢘ḻḣ 
ޒ۱ᷥઌ࢘ḻḣ 
ὟିપᾃὩḻḛḭḲᷦ 
ᾃὪὸᾊᾀὺḉ׊ශὠ 
؎͠ 
὿ᾊᾉᾇὗᷥὗὸᾚᾫᾠᾭᾜὣὗᾊᾫᾘᾥᾛᾙᾰὗᷦ 
ὗᾃὩὗὸᾊᾀὺὗᷞ௵਩ᷞ᷄ᷡᶻ᷸ᷖ 
ὗᾃὪὗὸᾊᾀὺὗᷢଈ᷉Ḃᴗ 
ᾊᾫᾘᾥᾛᾙᾰὗ᷹᷊ᷞᷔᷞ෼᷎ᷘᷝ᷵ᶽᴗ 
Ὗؕݰ૞ᷥԱବᷦ͋ᶽϨ஗ࣵᶹḁὠ 
 
౪֍ڝᷟᷦ௵਩᷒᷑ᴖὸὺᾃᷢפḉ 
Э᷈Ḃᾎᾦᾩᾢὸᾩᾦᾬᾥᾛḉળݸ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 143
ࡱԧೈάᴕ׊๳њߚᷞ᷄ᷡᶻࡸڝᷥ޺ೳ๏ 
• ḻḛḭḲ᷃෼ᷘᷝᶻḂϹ࠘ḉṆḲṊḌḭṁᷞਗ᷐ 
• ṁṗḥḣ᷃ࣽࡻᷢḻḛḭḲḉࠖซᷞ᷄ᷝᶻḂ᷂ѐ஁ 
૮ຉ᷌ḃᷝᶻᷡᶻ 
ᾉᾦᾬᾫᾠᾥᾞὗᾋᾘᾙᾣᾜὗᷥḫḑḭḙ 
ᾀὦώᷢṁṗḲḝṕᷥḻḛḭḲ᷃෶ᷝᶻḂ᷂Ὗᾊᾇὸᾅὠ 
ὺᾦᾇᾇὗᷦઌᷚᷝᶻḂ᷂Ὗᾪᾟᾦᾮὠ 
ὺᾦᾥᾫᾩᾦᾣὗᾇᾣᾘᾥᾜὗᷢୋᶻᷝᶻḂ᷂ 
Ὗὼᾫᾟᾘᾥᾘᾣᾰᾱᾜᾩὗᷞὗᾧᾘᾚᾢᾜᾫὗᾚᾘᾧᾫᾬᾩᾜὠ 
ṁṗḥḣᷢḻḛḭḲᷦୋᶻᷝᴖࣽࡻ̟ᷢᶿᷝᶻḂ᷂ 
Ὗᾧᾩᾦᾚᾜᾪᾪὗᷥὗᾛᾜᾙᾬᾞὠ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144
ࡱԧೈάᴕ૜ঝᷞ᷄ᷡᶻࡸڝᷥ޺ೳ๏ 
• ḹᴨḳḐḑḌᷥ૜ঝḰᴨṀṕḉѐ஁ 
• ὸᾊᾀὺᷯᷥḻḛḭḲଜਅࣵᷟࠟ᷄ҙᶿᷖṂḭḪ᷎᷃ࣽᶻ᷂ѐ஁ 
᷹᷹ᷔᷔᾀὦώᷢḻḛḭḲ᷃෶ᷝᶻḂ᷂Ὗᾊᾇὸᾅὠ 
ḹᴨḳḐḑḌᷥ૜ঝḰᴨṀṕ᷎ᷦࣽᶻ᷂ 
ᾀᾥᾞᾩᾜᾪᾪὗὟ୺฻পὠᷥὸᾊᾀὺᷞḻḛḭḲ᷃؃ᶿḂ᷂ 
ṂḭḪᷥࠟ᷄ҙᶿᴖ୞ಊ̠रधપᷦᷞ᷄ᷝᶻḂ᷂ 
ὼᾞᾩᾜᾪᾪὟ߾฻পὠᷥὸᾊᾀὺᷞḻḛḭḲ᷃؃ᶿḂ᷂ 
૮ຉ᷌ḃᷝᶻḂ 
ᾉᾦᾬᾫᾠᾥᾞὗᾋᾘᾙᾣᾜὗᷥḫḑḭḙ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 145
ḲṓṀṕḡṏᴨḰḍṝḚḌṁṗᴨḫ 
• ࢞ٳᶿ 
o ὺὺᾅὸὦὺὺᾅᾇὗṖṃṕᷥਰށᷢ౪̪᷃ᷡᶻࢁ৚᷎ᷢᷝ᷁᷆ 
o ࡯д৔τᷞᷦᷡ᷆࡯д᷃ӭ᷄ᷡᶻೱೳḉڃᶿḂ 
o ḡḣṗḚᷥ௧ऀ᷐Ḃܷ८᷶ḉซЖ᷎ࢦઉᶻ᷐Ḃ 
o ࡯дӟӏᷥିપؽᷦḴṗᴨḪḐṝᷞ؎͠ḉढḁಠ᷈ḂὟࡱԧὠ 
• Ḱḙḵḭḙ 
o ѐ஁᷐ᷰ᷄ṗḚḉ؃ᷛ᷈ḂೱೳḉਰḂ 
o ὼὼᾄὣὗᾊᾚᾩᾠᾧᾫᾠᾥᾞὗᷥܺෟ 
o ౪֍ڝᷥϨ஗ࣵ᷃ژᶻࡸڝᷦὗᾢᾜᾰᾮᾦᾩᾛὗ׹܋Ὗᾙᾬᾞᾪᾜᾘᾩᾚᾟὗᾫᾦᾦᾣὠ 
o ḳḗṏṋṝḲ᷻ЅԬᷥ৔τḉ؜ࢷὟޢ୞ὠ᷸ᷞ᷵ᷟᷝ᷁᷆ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 146
ᾊᾚᾩᾠᾧᾫᾠᾥᾞὗḉܺᷚᷖ׹ࡦ܂դ 
• ᾊᾚᾩᾠᾧᾫὗḉܺᷚᷖݻବϡḉ׹ଠ᷐ᷰ᷄׹ࡦ܂դ 
o ഖ৫ุᷡᷥḝṝḿḍḚὟᾪᾫᾘᾫᾠᾚὗᾩᾦᾬᾫᾜὗ᷻ὗὸὺᾃὗᷡᷠὠᷥ܂ࣶ 
o ϣ૷᷹֥ḁೊ᷐धપḝṈṝḳὟᾪᾟᾬᾫὦᾥᾦὗᾪᾟᾬᾫὠ᷻ὗᾪᾟᾦᾮὗḝṈṝḳ 
ᾅᾜᾯᾬᾪࡱᷞޒڊ 
ὼὼᾄ 
ᾇᾰᾫᾟᾦᾥὗᾊᾚᾩᾠᾧᾫ 
ݻବϡᷢฆෟ᷎ᷝᶻḂḮᴨṕ֬ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 147
ᾊᾚᾩᾠᾧᾫᾠᾥᾞὗḉܺᷚᷖ׹ࡦ܂դ 
• ᾊᾚᾩᾠᾧᾫὗḉܺᷚᷖݻବϡḉ׹ଠ᷐ᷰ᷄׹ࡦ܂դ 
o ഖ৫ุᷡᷥḝṝḿḍḚὟᾪᾫᾘᾫᾠᾚὗᾩᾦᾬᾫᾜὗ᷻ὗὸὺᾃὗᷡᷠὠᷥ܂ࣶ 
o ϣ૷᷹֥ḁೊ᷐धપḝṈṝḳὟᾪᾟᾬᾫὦᾥᾦὗᾪᾟᾬᾫὠ᷻ὗᾪᾟᾦᾮὗḝṈṝḳ 
ᾅᾜᾯᾬᾪࡱᷞޒڊṗᴨḕṕᾇὺ᷻ḟᴨḺᷞޒڊ 
ὼὼᾄ 
ᾇᾰᾫᾟᾦᾥὗᾊᾚᾩᾠᾧᾫ 
ᾋᾜᾩᾘᾋᾜᾩᾤὗᾄᾘᾚᾩᾦ 
ὼᾯᾧᾜᾚᾫᾇᾜᾯᾧᾜᾚᾫ 
ᾚᾦᾥᾪᾦᾣᾜ 
ᾭᾫᾰ 
ᾪᾚᾩᾠᾧᾫᾠᾥᾞ 
ᾊᾚᾘᾧᾰ 
ᾪᾥᾤᾧᾞᾜᾫ 
ᾋᾜᾪᾫὗᾋᾩᾘᾝᾝᾠᾚ 
ᾊᾅᾄᾇὗᷡᷠ 
ݻବϡᷢฆෟ᷎ᷝᶻḂḮᴨṕ֬ᾃᾠᾥᾬᾯὗᾚᾤᾛ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 148
ὼὼᾄὗḉܺᷚᷖݨࡩ௧ऀݰᷥࢁ৚޸଼޺ೳ 
• ὼὼᾄὗᷦᴺӟӏᷥࢁ৚ḉҦݝᴻ᷎ᴖᴺधપ᷌ḃᷖࡾשᴻḉ൐᷎ᷖᷖ۱ᷢᴺधપ᷌ 
ḃᷖḌḙḡṑṝᴻḉڊᶽӟ஗ 
• ᴺὺᾇᾌܺෟด͔᷃પ࣏ᷥࠎḉ੶ᶿᷖ۱ᷢὗᾧᾩᾦᾚᾜᾪᾪὗܺෟดḉࠟ᷄߾᷐ᴻᷟ 
ᶻᷚᷖܺᶻೱ᷃ᷞ᷄Ḃ 
ݰҶ 
ὺᾇᾌὗܺෟด 
ᩆਯ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 149
ὼὼᾄὗḉܺᷚᷖݨࡩ௧ऀݰᷥࢁ৚޸଼޺ೳ 
• ὼὼᾄὗᷦᴺӟӏᷥࢁ৚ḉҦݝᴻ᷎ᴖᴺधપ᷌ḃᷖࡾשᴻḉ൐᷎ᷖᷖ۱ᷢᴺधપ᷌ 
ḃᷖḌḙḡṑṝᴻḉڊᶽӟ஗ 
• ᴺὺᾇᾌܺෟด͔᷃પ࣏ᷥࠎḉ੶ᶿᷖ۱ᷢὗᾧᾩᾦᾚᾜᾪᾪὗܺෟดḉࠟ᷄߾᷐ᴻᷟ 
ᶻᷚᷖܺᶻೱ᷃ᷞ᷄Ḃ 
ݰҶ 
ὺᾇᾌὗܺෟด 
ᩆਯ 
ᾚᾟᾜᾚᾢ 
੥ḁ౫ᶻᷝҦݝᷦ౿ਖ᷃ৃᶻ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 150
ὼὼᾄὗḉܺᷚᷖݨࡩ௧ऀݰᷥࢁ৚޸଼޺ೳ 
• ὼὼᾄὗᷦᴺӟӏᷥࢁ৚ḉҦݝᴻ᷎ᴖᴺधપ᷌ḃᷖࡾשᴻḉ൐᷎ᷖᷖ۱ᷢᴺधપ᷌ 
ḃᷖḌḙḡṑṝᴻḉڊᶽӟ஗ 
• ᴺὺᾇᾌܺෟด͔᷃પ࣏ᷥࠎḉ੶ᶿᷖ۱ᷢὗᾧᾩᾦᾚᾜᾪᾪὗܺෟดḉࠟ᷄߾᷐ᴻᷟ 
ᶻᷚᷖܺᶻೱ᷃ᷞ᷄Ḃ 
ݰҶ 
ὺᾇᾌὗܺෟด 
ᩆਯ 
ὺᾇᾌܺෟด᷃ᾏ὜ḉ੶ᶿᷖḀ 
ὺᾇᾌὗҸ๬ᷥṗḚḉࠟ᷄߾᷎ 
ὼὼᾄὟݻବὠ 
ᾃᾦᾞ 
ώᾠᾣᾜ 
ᾎᾩᾠᾫᾜ 
ᾉᾜᾧᾦᾩᾫ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 151
ὼὼᾄὗḉܺᷚᷖݨࡩ௧ऀݰᷥࢁ৚޸଼޺ೳ 
• ὼὼᾄὗᷦᴺӟӏᷥࢁ৚ḉҦݝᴻ᷎ᴖᴺधપ᷌ḃᷖࡾשᴻḉ൐᷎ᷖᷖ۱ᷢᴺधપ᷌ 
ḃᷖḌḙḡṑṝᴻḉڊᶽӟ஗ 
• ᴺὺᾇᾌܺෟด͔᷃પ࣏ᷥࠎḉ੶ᶿᷖ۱ᷢὗᾧᾩᾦᾚᾜᾪᾪὗܺෟดḉࠟ᷄߾᷐ᴻᷟ 
ᶻᷚᷖܺᶻೱ᷃ᷞ᷄Ḃ 
ݰҶ 
ὺᾇᾌὗܺෟด 
ᩆਯ 
ὺᾇᾌܺෟด᷃ᾏ὜ḉ੶ᶿᷖḀ 
ὺᾇᾌὗҸ๬ᷥṗḚḉࠟ᷄߾᷎ 
ᾃᾦᾞ 
ώᾠᾣᾜ 
ὼὼᾄὟݻବὠ 
ᾎᾩᾠᾫᾜ 
ᾉᾜᾧᾦᾩᾫ 
ᾚᾟᾜᾚᾢ 
ᾪᾤᾘᾩᾫὗᾜᾥᾞᾠᾥᾜᾜᾩ 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 152
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)

Más contenido relacionado

La actualidad más candente

Ccna security v2 instructor_ppt_ch11
Ccna  security v2 instructor_ppt_ch11Ccna  security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11SalmenHAJJI1
 
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1SalmenHAJJI1
 
Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3SalmenHAJJI1
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big BrotherPayment Village
 
Where are we with Securing the Routing System?
Where are we with Securing the Routing System?Where are we with Securing the Routing System?
Where are we with Securing the Routing System?APNIC
 
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsInfrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsDiego Kreutz
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
Internet Week 2006 - DNS Day - AS112 Report
Internet Week 2006 - DNS Day - AS112 ReportInternet Week 2006 - DNS Day - AS112 Report
Internet Week 2006 - DNS Day - AS112 ReportChika Yoshimura
 
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!シスコシステムズ合同会社
 
Spanning Tree Protocol Thesis - Aditya Bayu Putranto
Spanning Tree Protocol Thesis - Aditya Bayu PutrantoSpanning Tree Protocol Thesis - Aditya Bayu Putranto
Spanning Tree Protocol Thesis - Aditya Bayu PutrantoAditya Bayu Putranto
 
Cisco asa 5545 datasheet
Cisco asa 5545 datasheetCisco asa 5545 datasheet
Cisco asa 5545 datasheetMark Tsui
 

La actualidad más candente (13)

Ccna security v2 instructor_ppt_ch11
Ccna  security v2 instructor_ppt_ch11Ccna  security v2 instructor_ppt_ch11
Ccna security v2 instructor_ppt_ch11
 
Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1
 
Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3Ccna sv2 instructor_ppt_ch3
Ccna sv2 instructor_ppt_ch3
 
How to build Big Brother
How to build Big BrotherHow to build Big Brother
How to build Big Brother
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
Where are we with Securing the Routing System?
Where are we with Securing the Routing System?Where are we with Securing the Routing System?
Where are we with Securing the Routing System?
 
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsInfrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Internet Week 2006 - DNS Day - AS112 Report
Internet Week 2006 - DNS Day - AS112 ReportInternet Week 2006 - DNS Day - AS112 Report
Internet Week 2006 - DNS Day - AS112 Report
 
JCM STOCK LIST 2016
JCM STOCK LIST 2016JCM STOCK LIST 2016
JCM STOCK LIST 2016
 
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!
Cisco Connect Japan 2014:シスコのビデオ コミュニケーション環境を体験しよう!
 
Spanning Tree Protocol Thesis - Aditya Bayu Putranto
Spanning Tree Protocol Thesis - Aditya Bayu PutrantoSpanning Tree Protocol Thesis - Aditya Bayu Putranto
Spanning Tree Protocol Thesis - Aditya Bayu Putranto
 
Cisco asa 5545 datasheet
Cisco asa 5545 datasheetCisco asa 5545 datasheet
Cisco asa 5545 datasheet
 

Destacado

Python入門 : 4日間コース社内トレーニング
Python入門 : 4日間コース社内トレーニングPython入門 : 4日間コース社内トレーニング
Python入門 : 4日間コース社内トレーニングYuichi Ito
 
Protocol Buffers 入門
Protocol Buffers 入門Protocol Buffers 入門
Protocol Buffers 入門Yuichi Ito
 
Mk state in-programming-01
Mk state in-programming-01Mk state in-programming-01
Mk state in-programming-01Miya Kohno
 
Cloud stackユーザ会大阪 運用Tips 20130802
Cloud stackユーザ会大阪 運用Tips 20130802Cloud stackユーザ会大阪 運用Tips 20130802
Cloud stackユーザ会大阪 運用Tips 20130802hirokihojo
 
FlexPod Day 2016 - Cisco session (Publish edition)
FlexPod Day 2016 - Cisco session (Publish edition)FlexPod Day 2016 - Cisco session (Publish edition)
FlexPod Day 2016 - Cisco session (Publish edition)Takao Setaka
 
Tokyo meetup 20160224
Tokyo meetup 20160224Tokyo meetup 20160224
Tokyo meetup 20160224Takao Setaka
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)Motonori Shindo
 
OpenStack Congress and Datalog (English)
OpenStack Congress and Datalog (English)OpenStack Congress and Datalog (English)
OpenStack Congress and Datalog (English)Motonori Shindo
 
試してわかるSDN
試してわかるSDN試してわかるSDN
試してわかるSDNcloretsblack
 
中国にOpenflowを入れてきた話
中国にOpenflowを入れてきた話中国にOpenflowを入れてきた話
中国にOpenflowを入れてきた話cloretsblack
 
Node最新トピックス
Node最新トピックスNode最新トピックス
Node最新トピックスshigeki_ohtsu
 
自動でできるかな?
自動でできるかな?自動でできるかな?
自動でできるかな?_norin_
 
OpenStack Congress and Datalog (Japanese)
OpenStack Congress and Datalog (Japanese)OpenStack Congress and Datalog (Japanese)
OpenStack Congress and Datalog (Japanese)Motonori Shindo
 
10分で作るクラスライブラリ
10分で作るクラスライブラリ10分で作るクラスライブラリ
10分で作るクラスライブラリ_norin_
 
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...シスコシステムズ合同会社
 

Destacado (20)

Python入門 : 4日間コース社内トレーニング
Python入門 : 4日間コース社内トレーニングPython入門 : 4日間コース社内トレーニング
Python入門 : 4日間コース社内トレーニング
 
Protocol Buffers 入門
Protocol Buffers 入門Protocol Buffers 入門
Protocol Buffers 入門
 
Mk state in-programming-01
Mk state in-programming-01Mk state in-programming-01
Mk state in-programming-01
 
Korejanai Story
Korejanai StoryKorejanai Story
Korejanai Story
 
of_protocol_tremaday5
of_protocol_tremaday5of_protocol_tremaday5
of_protocol_tremaday5
 
Cloud stackユーザ会大阪 運用Tips 20130802
Cloud stackユーザ会大阪 運用Tips 20130802Cloud stackユーザ会大阪 運用Tips 20130802
Cloud stackユーザ会大阪 運用Tips 20130802
 
FlexPod Day 2016 - Cisco session (Publish edition)
FlexPod Day 2016 - Cisco session (Publish edition)FlexPod Day 2016 - Cisco session (Publish edition)
FlexPod Day 2016 - Cisco session (Publish edition)
 
Tokyo meetup 20160224
Tokyo meetup 20160224Tokyo meetup 20160224
Tokyo meetup 20160224
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)
 
OpenStack Congress and Datalog (English)
OpenStack Congress and Datalog (English)OpenStack Congress and Datalog (English)
OpenStack Congress and Datalog (English)
 
試してわかるSDN
試してわかるSDN試してわかるSDN
試してわかるSDN
 
中国にOpenflowを入れてきた話
中国にOpenflowを入れてきた話中国にOpenflowを入れてきた話
中国にOpenflowを入れてきた話
 
TLS, HTTP/2演習
TLS, HTTP/2演習TLS, HTTP/2演習
TLS, HTTP/2演習
 
Node最新トピックス
Node最新トピックスNode最新トピックス
Node最新トピックス
 
Loom openflow controller in 10 min
Loom openflow controller in 10 minLoom openflow controller in 10 min
Loom openflow controller in 10 min
 
自動でできるかな?
自動でできるかな?自動でできるかな?
自動でできるかな?
 
OpenStack Congress and Datalog (Japanese)
OpenStack Congress and Datalog (Japanese)OpenStack Congress and Datalog (Japanese)
OpenStack Congress and Datalog (Japanese)
 
10分で作るクラスライブラリ
10分で作るクラスライブラリ10分で作るクラスライブラリ
10分で作るクラスライブラリ
 
HTTP/2, QUIC入門
HTTP/2, QUIC入門HTTP/2, QUIC入門
HTTP/2, QUIC入門
 
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
【Interop Tokyo 2016】 Seminar - EA-14 : シスコ スイッチが標的型攻撃を食い止める ~新しい内部対策ソリューション「C...
 

Similar a Nexus DataCenter Switch の概要 (2014/8/06 webcast)

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8SalmenHAJJI1
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of TomorrowCisco Canada
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASACisco Russia
 
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?シスコシステムズ合同会社
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxRichardChecca1
 
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーション
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーションITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーション
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーションシスコシステムズ合同会社
 
Experiencias aumentadas por la red
Experiencias aumentadas por la redExperiencias aumentadas por la red
Experiencias aumentadas por la redschangan1
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkJeff Squyres
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7newbie2019
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8newbie2019
 
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsNetwork visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsYathiraj Udupi, Ph.D.
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9SalmenHAJJI1
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating Systemnewbie2019
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusRassul Ismailov
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002ccherel
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack OperationsDebojyoti Dutta
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5Babaa Naya
 
Cisco San switch troublehooting Guide
Cisco San switch troublehooting GuideCisco San switch troublehooting Guide
Cisco San switch troublehooting GuideDayal Ghosh
 

Similar a Nexus DataCenter Switch の概要 (2014/8/06 webcast) (20)

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
Creating the Workplace of Tomorrow
Creating the Workplace of TomorrowCreating the Workplace of Tomorrow
Creating the Workplace of Tomorrow
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
 
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?
Cisco Connect Japan 2014:安定した無線 LAN 上でビジネス クリティカルなアプリケーションを利用するには?
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
 
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーション
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーションITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーション
ITpro EXPO 2014: 【特別講演】シスコのもたらすITインフラ イノベーション
 
Experiencias aumentadas por la red
Experiencias aumentadas por la redExperiencias aumentadas por la red
Experiencias aumentadas por la red
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
 
Network visibility for efficient Openstack operations
Network visibility for efficient Openstack operationsNetwork visibility for efficient Openstack operations
Network visibility for efficient Openstack operations
 
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptxCCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack Operations
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
 
Cisco San switch troublehooting Guide
Cisco San switch troublehooting GuideCisco San switch troublehooting Guide
Cisco San switch troublehooting Guide
 

Último

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Último (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Nexus DataCenter Switch の概要 (2014/8/06 webcast)