Flylib.com
Cisco Field Manual[c] Router Configuration
Cisco Field Manual[c] Router Configuration
ISBN: 1587050242
EAN: N/A
Year: 2005
Pages: 185
BUY ON AMAZON
Cisco Field Manual: Router Configuration
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Introduction
Features and Organization
How to Use This Book
Further Reading
Icons Used in This Book
Command Syntax Conventions
Part I: Configuration Fundamentals
Chapter 1. Configuration Basics
1-1 User Interfaces
1-2 File Management
1-3 Cisco Discovery Protocol (CDP)
1-4 System Time
1-5 Logging
1-6 System Monitoring
1-7 Service Assurance Agent (SAA)
1-8 Buffer Management
1-9 Some Troubleshooting Tools
Chapter 2. Interface Configuration
2-1 Ethernet Interfaces
2-2 FDDI Interfaces
2-3 Token Ring Interfaces
2-4 Loopback and Null Interfaces
2-5 VLAN Interfaces
2-6 Tunnel Interfaces
2-7 Synchronous Serial Interfaces
2-8 Packet-Over-SONET Interfaces
2-9 Frame Relay Interfaces
2-10 Frame Relay Switching
2-11 ATM Interfaces
2-12 ATM LANE
Further Reading
Chapter 3. Dial Solutions
3-1 Modems
3-2 ISDN
3-3 Dial-on-Demand Routing (DDR)
3-4 Dial Backup
3-5 Routing Over Dialup Networks
3-6 Point-to-Point Protocol (PPP)
Further Reading
Part II: Layer 2 Networking
Chapter 4. Bridging
4-1 Transparent Bridging
4-2 Concurrent Routing and Bridging (CRB)
4-3 Integrated Routing and Bridging (IRB)
Further Reading
Chapter 5. IBM Networking
Feature Selection
5-1 Source-Route Bridging (SRB)
5-2 Remote Source-Route Bridging (RSRB)
5-3 Data-Link Switching Plus (DLSw)
5-4 Serial Tunnel (STUN)
Further Reading
Part III: Network Protocols
Chapter 6. IP Addressing and Services
6-1 IP Addressing and Resolution
6-2 IP Broadcast Handling
6-3 Hot Standby Router Protocol (HSRP)
6-4 Dynamic Host Configuration Protocol (DHCP)
6-5 Mobile IP
6-6 Network Address Translation (NAT)
6-7 Server Load Balancing (SLB)
Further Reading
Chapter 7. IP Routing Protocols
7-1 Routing Information Protocol (RIP)
7-2 Interior Gateway Routing Protocol (IGRP)
7-3 Enhanced Interior Gateway Routing Protocol (EIGRP)
7-4 Open Shortest Path First (OSPF)
7-5 Integrated IS-IS
7-6 Border Gateway Protocol (BGP)
7-7 IP Multicast Routing
7-8 Multiprotocol BGP (MBGP)
Further Reading
Chapter 8. IP Route Processing
8-1 Manually Configuring Routes
8-2 Policy Routing
8-3 Redistributing Routing Information
8-4 Filtering Routing Information
Further Reading
Chapter 9. Non-IP Routing Protocols
9-1 Novell IPX Routing
9-2 AppleTalk Routing
Further Reading
Part IV: Packet Processing
Chapter 10. Quality of Service
10-1 Modular QoS Command-Line Interface (MQC)
10-2 Network-Based Application Recognition (NBAR)
10-3 Policy-Based Routing (PBR)
10-4 Quality of Service for VPNs
10-5 QoS Policy Propagation via BGP
10-6 Priority Queuing (PQ)
10-7 Custom Queuing (CQ)
10-8 Weighted Fair Queuing (WFQ)
10-9 Weighted Random Early Detection (WRED)
10-10 Committed Access Rate (CAR)
10-11 Generic Traffic Shaping (GTS)
10-12 Frame Relay Traffic Shaping (FRTS)
10-13 Use RSVP for QoS Signaling
10-14 Link Efficiency Mechanisms
Further Reading
Chapter 11. Cisco IOS Software Switching Services
11-1 Fast Switching
11-2 Cisco Express Forwarding
11-3 NetFlow Switching
11-4 Multilayer Switching
Further Reading
Part V: Voice Telephony
Chapter 12. Voice and Telephony
12-1 Quality of Service for Voice
12-2 Voice Ports
12-3 Dialing
12-4 H.323 Gateways
12-5 H.323 Gatekeepers
12-6 Interactive Voice Response (IVR)
12-7 Survivable Remote Site (SRS) Telephony
Further Reading
Part VI: Security
Chapter 13. Security and VPNs
13-1 Suggested Ways to Secure a Router
13-2 Authentication, Authorization, and Accounting (AAA)
13-3 Dynamically Authenticate and Authorize Users with Authentication Proxy
13-4 Controlling Access with Lock and Key Security
13-5 Filtering IP Sessions with Reflexive Access Lists
13-6 Prevent DoS Attacks with TCP Intercept
13-7 Intelligent Filtering with Context-Based Access Control (CBAC)
13-8 Detect Attacks and Threats with the IOS Intrusion Detection System
13-9 Using Internet Key Exchange (IKE) for VPNs
13-10 IPSec VPN Tunnels
Further Reading
Chapter 14. Access Lists and Regular Expressions
14-1 IP Access Lists
14-2 MAC Address and Protocol Type Code Access Lists
14-3 IPX Access Lists
14-4 AppleTalk Access Lists
14-5 Regular Expressions
Part VII: Appendixes
Appendix A. Cisco IOS Software Release and Filename Conventions
Cisco IOS Software Releases
The Cisco IOS Software Filenaming Convention
Further Reading
Appendix B. Cabling Quick Reference
Back-to-Back Router Connections
Appendix C. SNMP MIB Structure
Appendix D. Password Recovery
The Password Recovery Process
Appendix E. Configuration Register Settings
The Virtual Configuration Register
Appendix F. Well-Known IP Protocol Numbers
Appendix G. Well-Known IP Port Numbers
Appendix H. ICMP Type and Code Numbers
Appendix I. Well-Known IP Multicast Addresses
Appendix J. IPX SAP Type Codes
Appendix K. Ethernet Type Codes
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_Z
Cisco Field Manual[c] Router Configuration
ISBN: 1587050242
EAN: N/A
Year: 2005
Pages: 185
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Looping Commands
Basic Graphics Commands
Programming the Keyboard, Mouse, and Joystick
Loading and Saving Information Using Files
Fundamentals of 3D Graphics Programming
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Metrics and Models in Software Quality Engineering (2nd Edition)
The Defect Prevention Process
Ishikawas Seven Basic Tools
Keep It Simple or Face Decomplexification
Celebrate the Journey, Not Just the Destination
Getting Started with a Software Metrics Program
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Appendix C Two-Bin Kanban Systems
Appendix G Intra-Cell Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Appendix J Abbreviations and Acronyms
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Finding the nth Instance of a Substring
Converting Between Time Zones
Introduction
Introduction
Writing and Reading Currency
Network Security Architectures
Attacker Types
References
High-End Resilient Campus Security Design
Expected Threats
Introduction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies