[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] packet filtering access lists adding comments 2nd applying to interfaces 2nd 3rd configuring defining 2nd 3rd 4th verifying operation AppleTalk 2nd 3rd 4th 5th packet switching 2nd packet switching protocols Frame Relay 2nd packet-switching protocols X.25 2nd packets broadcast packets SNMP Get- Next -Request Get-Request Get-Response Set-Request parameter pool command partial commands completing passwords enable secret virtual terminal setting PBXs NT2 PCs terminal emulation connecting to devices 2nd peer associations peers BGP 2nd performance AppleTalk reporting 2nd periodic services SAP permit statements adding to access lists 2nd Phase 1 addressing requirements Phase 1 (AppleTalk) network numbers , assigning node numbers, assigning Phase 1 network segments (AppleTalk) Phase 2 addressing requirements cable ranges, assigning Phase 2 (AppleTalk) nonextended segments Phase 2 network segments (AppleTalk) physical layer Gigabit Ethernet physical layer (OSI model) physical topology Ethernet segments 2nd ping appletalk command commands ping appletalk ping command 2nd 3rd ping ipx command pings AppleTalk response characters placing a call ISDN spoofing X.25 PNNI (Private Network-to-Network Interface) point-to-point subinterfaces 2nd point-to-point WAN interfaces IP address configuration 2nd IPX network numbers, assigning point-to-point WANs AppleTalk configuring 2nd policing traffic political layer port adapters ports PPP ATCP dialup services configuration 2nd PPP (point-to-point protocol) 2nd PPP (Point-to-Point Protocol) ppp ipcp command Predictor compression preliminary configuration System Configuration Dialog configuration command script System Configuration dialog mode interface configuration interface summary 2nd 3rd protocol selection preliminary configuration procedures console port 2nd presentation layer (OSI reference model) presentation layer (OSI) preventing DoS attacks source IP address forgery 2nd 3rd 4th 5th SYN flooding PRI (Primary Rate Interface) primary ring (FDDI) 2nd privileged mode 2nd passwords prompt Help System prompts configuration mode config-if enable mode proprietary MIBs protocol-independent command 2nd 3rd protocols network layer selecting (System Configuration dialog) public key encryption RSA PVCs mapping to AppleTalk addresses PVCs (permanent virtual circuits) |