Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Cisco and the Internet
Table 1-1: Cisco Acquisitions From 2001 Through 2005
Chapter 2: Networking Primer
Table 2-1: Subnet Masks Listed by Number of Network ID Bits
Table 2-2: Abbreviating IPv6 Addresses
Chapter 3: Router Overview
Table 3-1: Optical Networking Speeds
Table 3-2: How Network Administrators Access Routers
Table 3-3: Overview of Router Passwords and Their Uses
Table 3-4: Five Major Factors in Selecting a Router
Table 3-5: Cisco's Three Series of SOHO Routers
Table 3-6: Cisco's Midrange Routing Solutions
Table 3-7: Cisco's Series of Backbone Routers
Table 3-8: IOS Software Feature Categories
Table 3-9: IOS Feature Set Families
Chapter 4: Configuring Routers
Table 4-1: Three General Kinds of IOS Software Modes
Table 4-2: Config Modes and the Parts of the Router Targeted
Table 4-3: IOS Navigation Commands
Table 4-4: Interface Status Report Definitions
Table 4-5: Configuration Register Settings to Enter Factory Diagnostic Mode
Table 4-6: Cisco's Password Recovery Procedures for Legacy Router Protocols
Table 4-7: Color Keys That Track Configuration Status
Table 4-8: The Four Parts of Fast Step Configuration Tasks
Chapter 5: Switches
Table 5-1: Topology Design Factors (Besides Geography)
Table 5-2: TIE/EIA Twisted-Pair Specifications
Table 5-3: LAN Specifications with Cable Types and Distance Limits
Table 5-4: Key Switching Technologies
Table 5-5: Midrange Catalyst Switches With High Port Densities
Table 5-6: Mid-Range Catalyst Switches With Multilayer Switching
Table 5-7: Cisco's Two High-End Catalyst Switches With Gigabit, 10 Gigabit, and ATM Backbones
Chapter 6: Security Overview
Table 6-1: Authentication Methods in IOS
Table 6-2: Entity Types Secured by AAA Authentication Methods
Table 6-3: AAA's Eight Named Methods for User Authentication
Table 6-4: IOS's Five Authorization Types
Table 6-5: How AAA Accounting Methods Work per Security Protocol
Table 6-6: AAA Accounting Types That Track Asset Usage for Five Security Entity Types
Table 6-7: RADIUS Attributes Used to Enforce User-Based Security
Table 6-8: Cisco Extensions to the RADIUS Standard
Table 6-9: TACACS+ Authentication and Authorization AV Pairs
Chapter 7: Security Building Blocks
Table 7-1: Keywords in IOS Firewall's ip Inspect and Access-List Commands
Table 7-2: Cisco's Line of Cisco Secure PIX Firewalls
Table 7-3: Cisco's Line of Cisco Adaptive Security Appliances
Table 7-4: Some of Cisco's VPN-Enabled Hardware
Chapter 8: Cisco Wireless Solutions
Table 8-1: The Attributes of 802.11 a, b, g, and n Networks
Table 8-2: Cisco's Line of Access Points
Table 8-3: Cisco's Line of Wireless Client Adapters
Table 8-4: Authentication Methods for Client Types
Table 8-5: Wireless Client System Parameters
Chapter 9: Cisco Unified Contact Center
Table 9-1: VoIP Covdec Comparison
Table 9-2: SIP Functionality
Table 9-3: Comparison of Cisco Unified IP Phones
Table 9-4: Cisco Unified Communication's Call Processing Products
Table 9-5: Cisco Unified Communications Clients
Table 9-6: Cisco Unified Communications Voice and Messaging Components
Table 9-7: Cisco Unified Communications Media-Conferencing Products
Chapter 10: Storage Tools
Table 10-1: Layers in the Fibre Channel Stack
Table 10-2: Comparison of the Cisco MDS 9500 Series
Table 10-3: Several Configuration Commands Used in the CLI
Table 10-4: Comparison of Cisco FS 5500 Series Integrated NAS and Cisco FS 5700 Series Integrated NASs
Chapter 11: Cisco Content Networking and Video Solutions
Table 11-1: Components of an AVVID Solution
Chapter 12: Routing Protocols
Table 12-1: Initial Steps to Configure Cisco's Routing Protocols
Table 12-2: EIGRP's Command Set
Chapter 13: Network Management
Table 13-1: Basic Cisco MIB Objects Commonly Used in SNMP Implementations
Table 13-2: System Requirements for Cisco Network Assistant 4.0
Table 13-3: Maximum Number of Devices Allowed in a Community
Chapter 14: Network Design Process
Table 14-1: Typical Message Sizes and Types
Table 14-2: IETF Domain Name Suffixes
Chapter 15: Troubleshooting Cisco Networks
Table 15-1: Typical Host Access Problems and Causes
Table 15-2: Typical Router Problems and Causes
Table 15-3: Campus LAN Performance Problems and Causes
Table 15-4: Definitions of Useful Ethernet Statistics
Table 15-5: Input Errors Causes and Actions
Table 15-6: Dropped Packet Causes and Actions
Table 15-7: Serial Line Error Causes and Actions
Table 15-8: Typical Reboot Problems and Probable Causes
Table 15-9: The Number of Characters Needed in Various Key Lengths
Previous page
Table of content
Cisco: A Beginners Guide, Fourth Edition
ISBN: 0072263830
EAN: 2147483647
Year: 2006
Pages: 102
Authors:
Toby Velte
,
Anthony Velte
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
The Business Aspects of Penetration Testing
Apply Your Knowledge
Trojans and Backdoors
Web Server Hacking, Web Applications, and Database Attacks
Physical Security
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Preprocessing
Function
Union
Problems in Strings
InDesign Type: Professional Typography with Adobe InDesign CS2
Less is More, Maybe
See Also
Stylistic Sets
Up Next
Object Styles
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Quick Lesson in Cron
Using Persistent JobStores
Working with Jobs
Configuring JobStoreCMT
Configuring a Datasource Using a Custom ConnectionProvider
Comparing, Designing, and Deploying VPNs
Implementing QoS for MPLS Layer 3 VPNs
Review Questions
Benefits and Drawbacks of L2TP Remote Access VPNs
Review Questions
Designing and Building SSL Remote Access VPNs (WebVPN)
MPLS Configuration on Cisco IOS Software
Command Reference
MPLS TE Theory
Configuring L2TPv3 Tunnels for Layer 2 VPN
Any Transport over MPLS (AToM)
Case Study 10: BGP Site of Origin
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies