Flylib.com
Cisco Field Manual[c] Router Configuration
Cisco Field Manual[c] Router Configuration
ISBN: 1587050242
EAN: N/A
Year: 2005
Pages: 185
BUY ON AMAZON
Cisco Field Manual: Router Configuration
Table of Contents
Copyright
About the Authors
About the Technical Reviewers
Acknowledgments
Introduction
Features and Organization
How to Use This Book
Further Reading
Icons Used in This Book
Command Syntax Conventions
Part I: Configuration Fundamentals
Chapter 1. Configuration Basics
1-1 User Interfaces
1-2 File Management
1-3 Cisco Discovery Protocol (CDP)
1-4 System Time
1-5 Logging
1-6 System Monitoring
1-7 Service Assurance Agent (SAA)
1-8 Buffer Management
1-9 Some Troubleshooting Tools
Chapter 2. Interface Configuration
2-1 Ethernet Interfaces
2-2 FDDI Interfaces
2-3 Token Ring Interfaces
2-4 Loopback and Null Interfaces
2-5 VLAN Interfaces
2-6 Tunnel Interfaces
2-7 Synchronous Serial Interfaces
2-8 Packet-Over-SONET Interfaces
2-9 Frame Relay Interfaces
2-10 Frame Relay Switching
2-11 ATM Interfaces
2-12 ATM LANE
Further Reading
Chapter 3. Dial Solutions
3-1 Modems
3-2 ISDN
3-3 Dial-on-Demand Routing (DDR)
3-4 Dial Backup
3-5 Routing Over Dialup Networks
3-6 Point-to-Point Protocol (PPP)
Further Reading
Part II: Layer 2 Networking
Chapter 4. Bridging
4-1 Transparent Bridging
4-2 Concurrent Routing and Bridging (CRB)
4-3 Integrated Routing and Bridging (IRB)
Further Reading
Chapter 5. IBM Networking
Feature Selection
5-1 Source-Route Bridging (SRB)
5-2 Remote Source-Route Bridging (RSRB)
5-3 Data-Link Switching Plus (DLSw)
5-4 Serial Tunnel (STUN)
Further Reading
Part III: Network Protocols
Chapter 6. IP Addressing and Services
6-1 IP Addressing and Resolution
6-2 IP Broadcast Handling
6-3 Hot Standby Router Protocol (HSRP)
6-4 Dynamic Host Configuration Protocol (DHCP)
6-5 Mobile IP
6-6 Network Address Translation (NAT)
6-7 Server Load Balancing (SLB)
Further Reading
Chapter 7. IP Routing Protocols
7-1 Routing Information Protocol (RIP)
7-2 Interior Gateway Routing Protocol (IGRP)
7-3 Enhanced Interior Gateway Routing Protocol (EIGRP)
7-4 Open Shortest Path First (OSPF)
7-5 Integrated IS-IS
7-6 Border Gateway Protocol (BGP)
7-7 IP Multicast Routing
7-8 Multiprotocol BGP (MBGP)
Further Reading
Chapter 8. IP Route Processing
8-1 Manually Configuring Routes
8-2 Policy Routing
8-3 Redistributing Routing Information
8-4 Filtering Routing Information
Further Reading
Chapter 9. Non-IP Routing Protocols
9-1 Novell IPX Routing
9-2 AppleTalk Routing
Further Reading
Part IV: Packet Processing
Chapter 10. Quality of Service
10-1 Modular QoS Command-Line Interface (MQC)
10-2 Network-Based Application Recognition (NBAR)
10-3 Policy-Based Routing (PBR)
10-4 Quality of Service for VPNs
10-5 QoS Policy Propagation via BGP
10-6 Priority Queuing (PQ)
10-7 Custom Queuing (CQ)
10-8 Weighted Fair Queuing (WFQ)
10-9 Weighted Random Early Detection (WRED)
10-10 Committed Access Rate (CAR)
10-11 Generic Traffic Shaping (GTS)
10-12 Frame Relay Traffic Shaping (FRTS)
10-13 Use RSVP for QoS Signaling
10-14 Link Efficiency Mechanisms
Further Reading
Chapter 11. Cisco IOS Software Switching Services
11-1 Fast Switching
11-2 Cisco Express Forwarding
11-3 NetFlow Switching
11-4 Multilayer Switching
Further Reading
Part V: Voice Telephony
Chapter 12. Voice and Telephony
12-1 Quality of Service for Voice
12-2 Voice Ports
12-3 Dialing
12-4 H.323 Gateways
12-5 H.323 Gatekeepers
12-6 Interactive Voice Response (IVR)
12-7 Survivable Remote Site (SRS) Telephony
Further Reading
Part VI: Security
Chapter 13. Security and VPNs
13-1 Suggested Ways to Secure a Router
13-2 Authentication, Authorization, and Accounting (AAA)
13-3 Dynamically Authenticate and Authorize Users with Authentication Proxy
13-4 Controlling Access with Lock and Key Security
13-5 Filtering IP Sessions with Reflexive Access Lists
13-6 Prevent DoS Attacks with TCP Intercept
13-7 Intelligent Filtering with Context-Based Access Control (CBAC)
13-8 Detect Attacks and Threats with the IOS Intrusion Detection System
13-9 Using Internet Key Exchange (IKE) for VPNs
13-10 IPSec VPN Tunnels
Further Reading
Chapter 14. Access Lists and Regular Expressions
14-1 IP Access Lists
14-2 MAC Address and Protocol Type Code Access Lists
14-3 IPX Access Lists
14-4 AppleTalk Access Lists
14-5 Regular Expressions
Part VII: Appendixes
Appendix A. Cisco IOS Software Release and Filename Conventions
Cisco IOS Software Releases
The Cisco IOS Software Filenaming Convention
Further Reading
Appendix B. Cabling Quick Reference
Back-to-Back Router Connections
Appendix C. SNMP MIB Structure
Appendix D. Password Recovery
The Password Recovery Process
Appendix E. Configuration Register Settings
The Virtual Configuration Register
Appendix F. Well-Known IP Protocol Numbers
Appendix G. Well-Known IP Port Numbers
Appendix H. ICMP Type and Code Numbers
Appendix I. Well-Known IP Multicast Addresses
Appendix J. IPX SAP Type Codes
Appendix K. Ethernet Type Codes
Index
index_SYMBOL
index_A
index_B
index_C
index_D
index_E
index_F
index_G
index_H
index_I
index_J
index_K
index_L
index_M
index_N
index_O
index_P
index_Q
index_R
index_S
index_T
index_U
index_V
index_W
index_Z
Cisco Field Manual[c] Router Configuration
ISBN: 1587050242
EAN: N/A
Year: 2005
Pages: 185
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Structures
Oracle SQL
Optimizing: The Crystal Reports Side
Data Dictionary Report
Appendix B Functions
Lotus Notes and Domino 6 Development (2nd Edition)
Understanding the Action Pane
Putting Your Agent to Work
Other Uses for Java
The External Data Source
The Role of the Domino Directory in Application Security
VBScript Programmers Reference
Control of Flow
Classes in VBScript (Writing Your Own COM Objects)
Super-Charged Client-Side Scripting
Appendix D Visual Basic Constants Supported in VBScript
Appendix H Regular Expressions
Building Web Applications with UML (2nd Edition)
Summary
Types of Security Risk
Server-Side Risks
Mapping Web Elements to UML, and Vice Versa
Sample Screen Shots
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Cron Triggers and More
Uses of the Quartz Listeners
What Is a Plug-In?
Using the RMI Registry
Configuring a TriggerListener
Digital Character Animation 3 (No. 3)
Conclusion
The Mechanics of Walking
Chapter Seven. Facial and Dialogue Animation
Acting Vs. Animating
Characters and Story
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies