Flylib.com
Cisco Field Manual. Catalyst Switch Configuration
Cisco Field Manual. Catalyst Switch Configuration
ISBN: 1587050439
EAN: N/A
Year: 2001
Pages: 150
BUY ON AMAZON
Cisco Field Manual: Catalyst Switch Configuration
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
Command Syntax Conventions
Introduction
Features
How to Use This Book
Chapter1.CLI Usage
Section 1-1. Catalyst Operating System (COS)
Section 1-2. Cisco Internetwork Operating System (IOS) Software
Section 1-3. ROM Monitor
Chapter2.Switch Functionality
Section 2-1. Catalyst Switch Families
Section 2-2. Switched Campus Network Designs
Further Reading
Chapter3.Supervisor Engine Configuration
Section 3-1. Prompts and Banners
Section 3-2. IP Addressing Services
Section 3-3. Passwords and Password Recovery
Section 3-4. Managing Modules
Section 3-5. File Management and Boot Parameters
Section 3-6. Redundant Supervisors
Section 3-7. Cisco Discovery Protocol
Section 3-8. Time and Calendar
Further Reading
Chapter4.Layer 2 Interface Configuration
Section 4-1. Switching Table
Section 4-2. Port Selection
Section 4-3. Ethernet
Section 4-4. EtherChannel
Section 4-5. Token Ring
Section 4-6. ATM LANE
Further Reading
Chapter5.Layer 3 Interface Configuration
Section 5-1. Layer 3 Switching
Section 5-2. Layer 3 Ethernet Interfaces
Section 5-3. Layer 3 EtherChannels
Section 5-4. WAN Interfaces
Section 5-5. Virtual Interfaces
Section 5-6. Routing Tables
Further Reading
Chapter6.VLANs and Trunking
Section 6-1. VLAN Configuration
Section 6-2. VLAN Port Assignments
Section 6-3. Trunking
Section 6-4. VLAN Trunking Protocol
Section 6-5. GVRP
Section 6-6. Private VLANs
Further Reading
Chapter7.Spanning Tree Protocol (STP)
Section 7-1. STP Operation
Section 7-2. STP Configuration
Section 7-3. STP Convergence Tuning
Section 7-4. Navigating a Spanning-Tree Topology
Further Reading
Chapter8.Multilayer Switching
Section 8-1. Multilayer Switching
Section 8-2. Cisco Express Forwarding
Section 8-3. NetFlow Data Export
Section 8-4. MSFC Redundancy with Single Router Mode
Section 8-5. MSFC Redundancy with Configuration Synchronization
Section 8-6. Router Redundancy with HSRP
Further Reading
Chapter9.Multicast
Multicast Addressing
Section 9-1. IGMP Snooping
Section 9-2. CGMP
Section 9-3. GMRP
Section 9-4. RGMP
Further Reading
Chapter10.Server Load Balancing (SLB)
Section 10-1. SLB
Section 10-2. SLB Firewall Load Balancing
Section 10-3. SLB Probes
Further Reading
Chapter11.Controlling Traffic and Switch Access
Section 11-1. Broadcast Suppression
Section 11-2. Protocol Filtering
Section 11-3. Port Security
Section 11-4. VLAN Access Control Lists
Section 11-5. Switch Authentication
Section 11-6. Permit Lists
Section 11-7. SSH Telnet Configuration
Section 11-8. 802.1X Port Authentication
Further Reading
Chapter12.Switch Management
Section 12-1. Logging
Section 12-2. Simple Network Management Protocol
Section 12-3. Switched Port Analyzer
Section 12-4. Power Management
Section 12-5. Environmental Monitoring
Section 12-6. Packet Tracing
Further Reading
Chapter13.Quality of Service
Section 13-1. QoS Theory
Section 13-2. QoS Configuration
Section 13-3. QoS Data Export
Section 13-4. QoS Management
Further Reading
Chapter14.Voice
Section 14-1. Voice Ports
Section 14-2. Voice QoS
Section 14-3. Voice Modules
Further Reading
AppendixA.Cabling Quick Reference
Back-to-Back Connections
AppendixB.Well-known Protocol, Port, and Other Numbers
Section B-1. IP Protocol Numbers
Section B-2. ICMP Type and Code Numbers
Section B-3. Well-known IP Port Numbers
Section B-4. Well-Known IP Multicast Addresses
Section B-5. Ethernet Type Codes
AppendixC.Additional Catalyst Modules
Section C-1. Intrusion Detection System Module
Section C-2. 6000 Network Analysis Module
Section C-3. Catalyst 6000 Switch Fabric Module
Section C-4. Catalyst 6000 FlexWAN Module
AppendixD.Extending VLANs Within Layer 3 Switches
Using Integrated Routing and Bridging (IRB) to Extend a VLAN
Feature Example
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
T
U
V
W
Cisco Field Manual. Catalyst Switch Configuration
ISBN: 1587050439
EAN: N/A
Year: 2001
Pages: 150
BUY ON AMAZON
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Project Risk
Managing Project Risk
Conclusion
Appendix A Selected Detail From the PERIL Database
SQL Tips & Techniques (Miscellaneous)
Understanding SQL Basics and Creating Database Files
Using SQL Data Manipulation Language (DML) to Insert and Manipulate Data Within SQL Tables
Using Keys and Constraints to Maintain Database Integrity
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding Transaction Isolation Levels and Concurrent Processing
Managing Enterprise Systems with the Windows Script Host
Shell Operations
Logon Scripts and Scheduling
Networking Resources
Application Automation
Exchange Server
C++ How to Program (5th Edition)
Terminology
Essentials of Counter-Controlled Repetition
Wrap-Up
const_cast Operator
Appendix G. ATM Case Study Code
Data Structures and Algorithms in Java
Vocabulary
Projects
Heaps
Summary
B.1. Class Diagrams
Microsoft WSH and VBScript Programming for the Absolute Beginner
Constants, Variables, and Arrays
Conditional Logic
Using the Windows Registry to Configure Script Settings
Combining Different Scripting Languages
Appendix C Whats on the CD-ROM?
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies