Cisco OverDrive 4.0 User Guide
Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - L - M - N - O - P - Q - R - S - T - U - V - W - Y -

Index

Numerics

802.1x 2-2

A

a A-5

access mechanisms 2-2

access switches 1-3, 2-2

ACLs

bounded 2-5

policy 2-4

active directory admins 3-6

active policies

viewing 4-5

addresses

managed space 2-2

pools 5-7

private 2-2

public 2-2

aggregation layer 3-3

aggregation switches 1-3

alerts

common E-1

informative E-1

serious E-1

authentication process 3-1

available VLANs 3-2

B

bounded ACLS 2-5

business policies

creating, refining A-7

multiple sites 1-5

business status view 7-2

C

cautions

significance of 3-ix

client.name C-1

client.siteID C-2

cloud configurator

metamodels 5-4

parameters 5-5

clouds

creating 5-3

in domain models 5-11

lists 5-10

scenario 5-13

coherent region 2-2

collections

adding A-7

of resources A-6

compliance reports B-1

configuration directives 4-4

configuring subnets 2-2

conventions 3-ix

creating

domains A-1

domain VLANs 2-4

network access policies 2-7

per-site devices and DSCs 1-2

customer.vlan.mask C-1

D

defined VLANs 3-6

deployment types 4-1

devices

creating 1-2

NAT 1-3

viewing configurations 4-5

VM manager 1-3

DHCP helper 2-5

distinguished names 2-6

distribution switches 1-3

domains

creating A-1

editing A-2

domain VLANs

creating and configuring 2-3

DSCs

defining 1-2

logs 4-1

E

editing

domains A-2

end-to-end interconnect mode 2-2

exclamation marks 1-5

F

FreeRADIUS 2-2

full-mesh connections 4-6

G

green connections 4-4

groups, adding A-7

H

hardware 1-3

hardware status

view 7-1

hub-and-spoke connections 4-6

I

infrastructure VLANs 2-8

interconnect modes

end-to-end 2-2

routed 2-2

interface 0 5-8

intra-site

business access 4-1

network access 2-1

L

LDAP

browser 3-4

directory 3-7

distinguished names 2-6

identities 2-1

in VLAN groups 2-6

logs 7-2

M

managed

address space 2-2

VLANs 2-3

metamodels

interaction with cloud configurator 5-4

introduction 5-3

VM 6-5

Microsoft Active Directory 2-6

Microsoft administrator 2-6, 3-6

N

NAT

devices 1-3

network access

802.1x 2-2

network identities 2-1

policies 2-7

network ID 3-7

network identities 2-1, 2-6, 3-5

network policy 4-2

network status

monitoring 7-1

view 7-1

network topology

changing 4-6

O

out-of-policy VLANs 2-4

overdrive.xml 3-4

P

parameters

in configurator 5-5

policies

ACL 2-4

site affiliation 2-4

policy server provisioning 4-4

ports, table of 4-7

ports and protocols A-6

primary network policy 4-2

private addresses 2-2

public addresses 2-2

Q

QoS Policy C-2

R

red connections 4-4

reports

compliance B-1

sample B-1

resources

collections of A-6

routed interconnect mode 2-2

routers 1-3

routing machanisms 2-2

S

sample reports B-1

scenarios

creating a business access policy 1-7

creating and configuring clouds 5-13

creating a network ID and access polic 3-7

creating VLANs for sites 2-7

modeling a site-to-site networks 1-1

moving servers from site to site 1-6

services

ports and protocols A-6

services.xml 3-4

unmanaged VLANs 2-4

site

affiliation policy 2-4

resources A-3

subnets A-4

VLAN properties 2-5

sites

working with A-2

site-to-site VPNs 1-1

staging VLAN 2-3, 2-4

static allocation 2-5

status view

business policies 7-2

hardware 7-1

submitting a service request 3-x

subnets

configuring 2-2

creating A-4

distributions 2-2

editing, etc. 2-3

switches

access 1-3

aggregation 1-3

distribution 1-3

VLAN assignments 3-3

T

tmpl.cloud.public.pool C-1

trueness, in policies 4-4

tunnel interface names 1-3

U

unbounded ACLs 2-5

unmanaged VLANs 2-3, 2-4

users

authentication 3-1

V

viewing

active policies 4-5

device configurations 4-5

VLANs

access-mode ports 2-4

automatic site allocation 2-5

available 3-2

creating domain 2-4

default 2-3

domain 2-3

infrastructure 2-8

managed 2-3

population of 2-4

site properties 2-5

switch assignments 3-3

unmanaged 2-3

vm.image C-2

VM manager device 1-3

VMs

adding 6-2

in command center 6-4

interfaces 2-1

metamodels 6-5

powering on 6-3

removing 6-3

VPNs

basics 1-1

site-to-site 1-1

W

warning flags 1-5

warnings, significance of 3-ix

Y

yellow triangles 1-5