C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C-plane (control) 2nd
C-plane (ISDN)
C/R (Command/Response) bit (Frame Relay Address field)
cable lengths
     long versus short
cable modem services 2nd
     limitations of
     standards
cable modems
cables
    shorts
         detecting
calculating
     CIR
     ISDN BRI load at full utilization
     maximum DLCIs per interface
     RER
call clearing messages
Call Reference field (Q.931 messages)
callback
     PPP callback 2nd 3rd 4th 5th 6th
callback function of PPP
     ISDN configuration 2nd 3rd 4th
called-party number verification
caller ID screening
calling
     IOS routers from IOS 77x routers 2nd 3rd
CAP (carrierless amplitude/phase modulation)
Capacity Theorem
     s Capacity Theorem nopage
captured Log Viewer results
     viewing 2nd 3rd 4th 5th 6th 7th 8th 9th
carrierless amplitude/phase modulation
carriers
     CO 2nd
     first- tier exchange carriers
     IXCs
     switching systems 2nd 3rd
     T-carriers 2nd
         E1
         T1 2nd
     tandem office 2nd
categories of ISDN network designs 2nd
CATV
     cable modems
     data transmission
         standards 2nd 3rd 4th 5th
     heartbeats
     two-way Internet connections
Cause messages (ISDN BRI) 2nd 3rd 4th
CCITT (Comit Consultatif International T l phonique et T l graphique)
CCP (Compression Control Protocol) 2nd
CCS (common channel signaling)
CDMA2000 1xEV
CDP (Cisco Discovery Protocol)
     discovering network topology
CDSL
cell switching
CERT (Computer Emergency Response Team)
change management
     of remote access VPNs
channel banks
channels
     ISDN
CHAP (Challenge Handshake Authentication Protocol)
charge backs
Chinese Remainder Theorem
CIR (committed information rate)
     aggregate CIR 2nd
     asymmetrical CIR
     flexible CIR
     zero CIR
circuit switching
Cisco Discovery Protocol
Cisco Easy VPN client
     client status, displaying 2nd
     debugging IPSec key events 2nd
         VPNs:Cisco Easy VPN Client:debugging IPSec key events;debugging:Cisco Easy VPN client connection:IPSec key events
     initial troubleshooting checklist 2nd
     monitoring 2nd 3rd
     resetting connection
     restrictions 2nd
Cisco IOS
    77x routers
         accessing ISDN routers 2nd 3rd
     commands
         short format 2nd
    ISDN
         available phone services 2nd
    ISDN voice privacy
         configuring 2nd 3rd
     NFAS groups
Cisco Mobile Office initiative 2nd
Cisco PIX 501 VPN Client
     configuring 2nd
Cisco PIX 506 VPN Client
     configuring 2nd
Cisco PIX VPN client
     connectivity, verifying 2nd 3rd 4th 5th 6th 7th 8th 9th
     restrictions
Cisco ubr7200 Series routers
Cisco uBR7246 Universal Broadband Router
Cisco VPN 3000 Concentrator
     IPSec over UDP
Cisco VPN 3002
     connection establishment 2nd
         verifying group name /password 2nd
         verifying interface status 2nd 3rd
Cisco VPN 3002 HW client
Cisco VPN 3002 HW Client
     configuring 2nd
Cisco VPN 3002 HW client
     Event Log 2nd 3rd 4th
     initial troubleshooting checklist
Cisco VPN IOS Client
     configuring 2nd 3rd
Cisco VPN Unity client
     Concentrator Event Log 2nd 3rd
         event classes 2nd 3rd
         event security levels 2nd
Cisco VPN Unity Client
     configuring
Cisco VPN Unity client
     Event Log Viewer
         Client Log Viewer, starting
         ISAKMP
         reviewing captured data 2nd 3rd 4th 5th 6th 7th 8th 9th
     incompatible GINAs 2nd
     restrictions 2nd 3rd 4th
     troubleshooting checklist 2nd 3rd
classifying
     enterprise VPNs 2nd 3rd
         data link layer VPNs 2nd 3rd 4th 5th 6th 7th
         firewall-based VPNs 2nd
         network VPNs 2nd 3rd 4th 5th
         remote access VPNs
         site-to-site VPNs
     troubleshooting tools
clear interface bri0 command
CLECs
CLECs (competitive LECs)
client authentication
Client mode configuration
     Cisco 3002 HW clients
CLLM
CLLM (consolidated link-layer management)
clocking
     SCTE
clocking issues
    Frame Relay
         isolating 2nd
         troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
CO 2nd
code values for LMIs 2nd
codecs
coded orthogonal FDM
coding schemes
     AMI
     B8ZS 2nd
     DSL 2nd
     HDB3
     pseudo-ternary signaling 2nd
coding techniques
     2B1Q 2nd 3rd
     AMI
     WLANs
         COFDM
     zero-suppression 2nd
COFDM (coded orthogonal FDM)
Comit Consultatif International T l phonique et T l graphique
commands
     AS5200 series routers 2nd
     AS5300 series routers 2nd 3rd 4th 5th 6th 7th
     AS5400 series routers
     clear interface bri0
     debug bri 2nd
     debug interface serial 2nd 3rd
     debug isdn q931 2nd 3rd
     debug ppp negotiation 2nd 3rd
     deub ppp authentication
     extended ping
     isdn autodetect
     isdn timeout signaling
     logging console
    loopback
         troubleshooting T1 circuits
     mtrace
     ping 2nd 3rd 4th
         replies
         syntax
     service timestamps
     show cdp neighbors
     show controllers bri0 2nd
     show dialer 2nd
     show interface serial 0 2nd
     show isdn active
     show isdn status 2nd 3rd 4th 5th 6th
     show modem operational status 2nd 3rd
     traceroute 2nd
commands (Cisco IOS)
     short format 2nd
committed burst rate (Bc)
committed interval (Tc)
     Frame Relay 2nd
comparing
     remote access and site-to-site VPNs 2nd
     X.25 and Frame Relay features 2nd
components of Frame Relay networks
compression
     Frame Relay 2nd 3rd 4th 5th 6th 7th 8th
         hardware compression 2nd
         payload compression 2nd 3rd
         software compression 2nd 3rd
         Van Jacobson header compression 2nd 3rd
Concentrator Event Log 2nd 3rd
     event classes 2nd 3rd
     event security levels 2nd
configuration management
     of remote access VPNs
configuration negotiation phase (LCP) 2nd
configuration solutions
    ISDN
         DDR 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
         PPP callback 2nd 3rd 4th
         snapshot routing 2nd
         spoofing 2nd 3rd
configuring
    DDR
         with backup interfaces
         with dialer watch
         with floating static routes
     DDR backup 2nd 3rd 4th 5th 6th
    dial-in
         large-scale dial-in 2nd 3rd 4th 5th 6th 7th 8th 9th
         PPP dial-in 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th
         text dial-in 2nd 3rd
    dial-out
         large-scale dial-out 2nd 3rd 4th
         PPP dial-out 2nd 3rd 4th 5th
         text dial-out 2nd 3rd 4th 5th 6th 7th 8th
     dialer profiles 2nd 3rd 4th 5th 6th 7th 8th
    Frame Relay
         bridging 2nd 3rd
         broadcast queues 2nd
         compression 2nd
         frame switching 2nd
         generic traffic shaping 2nd 3rd
         IP multicast 2nd
         IP unnumbered 2nd
         ISDN backup 2nd 3rd
         payload compression 2nd
         point-to-multipoint 2nd
         point-to-multipoint connections 2nd
         point-to-point connections 2nd 3rd 4th 5th 6th
         routing protocol overhead estimates 2nd
         traffic shaping 2nd 3rd 4th 5th 6th
         Van Jacobson header compression 2nd 3rd
    ISDN
         IP pools 2nd 3rd 4th 5th
         MMP 2nd 3rd 4th 5th 6th 7th 8th 9th
         per- user configuration 2nd 3rd 4th
         POTS interfaces 2nd 3rd 4th
         SPIDs 2nd 3rd
         switch type 2nd
         voice privacy 2nd 3rd
    ISDN BRI
         bandwidth on demand
    ISND
         NAT 2nd 3rd 4th 5th 6th 7th
         PAT 2nd 3rd 4th
     PPP callback 2nd 3rd
    remote access VPNs
         Cisco PIX 501 VPN Client 2nd
         Cisco PIX 506 VPN Client 2nd
         Cisco VPN 3002 HW Client 2nd
         Cisco VPN IOSClient 2nd 3rd
         Cisco VPN Unity Client
     VPN 3000 Concentrator 2nd
         filters and rules 2nd
         Group Lock
         IKE peer identity validation
         IKE proposals 2nd 3rd
         IPSec SAs
         load balancing 2nd
         redundancy
         reverse route injection
         SAs 2nd 3rd
congestion
    Frame Relay
         BECNs 2nd
congestion control mechanisms
     Frame Relay
         CLLM
         rate adoption algorithm 2nd
         windowing
connection speeds
     increasing 2nd
     limitations of
     of modems
connection termination phase (PPP) 2nd
connectionless data integrity 2nd
connectivity
    of Cisco PIX VPN client
         verifying 2nd 3rd 4th 5th 6th 7th 8th 9th
     testing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th
console
     logging
Consortium LMI 2nd
     Status Enquiry message format 2nd
     Status message format
constellations
contention resolution
Control field (LAPD frames ) 2nd
Control field (LAPF control protocol) 2nd
Control field (PPP frames)
control LAPF
Control plane
core aspects of Frame Relay
core LAPF
core routers
    DLCI settings
         verifying 2nd 3rd 4th 5th
     Frame Relay point-to-multipoint configuration 2nd
     NFAS groups
     point-to-point Frame Relay configuration 2nd 3rd 4th
core routers (ISDN)
     IP pool assignment 2nd 3rd 4th 5th
corporate managed services 2nd
cost-effective ISDN solutions
     DDR 2nd
         dialer profiles 2nd 3rd 4th 5th 6th 7th 8th 9th
     PPP callback
         configuring 2nd 3rd
     snapshot routing 2nd
     spoofing 2nd 3rd
costs of remote access
     budgeting
counter parameters for LMIs 2nd 3rd
CPE (customer premises equipment)
creating
     dial peers 2nd
     VPN client profiles
CSU/DSU
     pinouts 2nd
custom design switches
     ISDN
customer premises equipment




Troubleshooting Remote Access Networks CCIE Professional Development
Troubleshooting Remote Access Networks (CCIE Professional Development)
ISBN: 1587050765
EAN: 2147483647
Year: 2002
Pages: 235

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net