Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Cisco and the Internet
Table 1-1: Cisco Acquisitions From 2001 Through 2005
Chapter 2: Networking Primer
Table 2-1: Subnet Masks Listed by Number of Network ID Bits
Table 2-2: Abbreviating IPv6 Addresses
Chapter 3: Router Overview
Table 3-1: Optical Networking Speeds
Table 3-2: How Network Administrators Access Routers
Table 3-3: Overview of Router Passwords and Their Uses
Table 3-4: Five Major Factors in Selecting a Router
Table 3-5: Cisco's Three Series of SOHO Routers
Table 3-6: Cisco's Midrange Routing Solutions
Table 3-7: Cisco's Series of Backbone Routers
Table 3-8: IOS Software Feature Categories
Table 3-9: IOS Feature Set Families
Chapter 4: Configuring Routers
Table 4-1: Three General Kinds of IOS Software Modes
Table 4-2: Config Modes and the Parts of the Router Targeted
Table 4-3: IOS Navigation Commands
Table 4-4: Interface Status Report Definitions
Table 4-5: Configuration Register Settings to Enter Factory Diagnostic Mode
Table 4-6: Cisco's Password Recovery Procedures for Legacy Router Protocols
Table 4-7: Color Keys That Track Configuration Status
Table 4-8: The Four Parts of Fast Step Configuration Tasks
Chapter 5: Switches
Table 5-1: Topology Design Factors (Besides Geography)
Table 5-2: TIE/EIA Twisted-Pair Specifications
Table 5-3: LAN Specifications with Cable Types and Distance Limits
Table 5-4: Key Switching Technologies
Table 5-5: Midrange Catalyst Switches With High Port Densities
Table 5-6: Mid-Range Catalyst Switches With Multilayer Switching
Table 5-7: Cisco's Two High-End Catalyst Switches With Gigabit, 10 Gigabit, and ATM Backbones
Chapter 6: Security Overview
Table 6-1: Authentication Methods in IOS
Table 6-2: Entity Types Secured by AAA Authentication Methods
Table 6-3: AAA's Eight Named Methods for User Authentication
Table 6-4: IOS's Five Authorization Types
Table 6-5: How AAA Accounting Methods Work per Security Protocol
Table 6-6: AAA Accounting Types That Track Asset Usage for Five Security Entity Types
Table 6-7: RADIUS Attributes Used to Enforce User-Based Security
Table 6-8: Cisco Extensions to the RADIUS Standard
Table 6-9: TACACS+ Authentication and Authorization AV Pairs
Chapter 7: Security Building Blocks
Table 7-1: Keywords in IOS Firewall's ip Inspect and Access-List Commands
Table 7-2: Cisco's Line of Cisco Secure PIX Firewalls
Table 7-3: Cisco's Line of Cisco Adaptive Security Appliances
Table 7-4: Some of Cisco's VPN-Enabled Hardware
Chapter 8: Cisco Wireless Solutions
Table 8-1: The Attributes of 802.11 a, b, g, and n Networks
Table 8-2: Cisco's Line of Access Points
Table 8-3: Cisco's Line of Wireless Client Adapters
Table 8-4: Authentication Methods for Client Types
Table 8-5: Wireless Client System Parameters
Chapter 9: Cisco Unified Contact Center
Table 9-1: VoIP Covdec Comparison
Table 9-2: SIP Functionality
Table 9-3: Comparison of Cisco Unified IP Phones
Table 9-4: Cisco Unified Communication's Call Processing Products
Table 9-5: Cisco Unified Communications Clients
Table 9-6: Cisco Unified Communications Voice and Messaging Components
Table 9-7: Cisco Unified Communications Media-Conferencing Products
Chapter 10: Storage Tools
Table 10-1: Layers in the Fibre Channel Stack
Table 10-2: Comparison of the Cisco MDS 9500 Series
Table 10-3: Several Configuration Commands Used in the CLI
Table 10-4: Comparison of Cisco FS 5500 Series Integrated NAS and Cisco FS 5700 Series Integrated NASs
Chapter 11: Cisco Content Networking and Video Solutions
Table 11-1: Components of an AVVID Solution
Chapter 12: Routing Protocols
Table 12-1: Initial Steps to Configure Cisco's Routing Protocols
Table 12-2: EIGRP's Command Set
Chapter 13: Network Management
Table 13-1: Basic Cisco MIB Objects Commonly Used in SNMP Implementations
Table 13-2: System Requirements for Cisco Network Assistant 4.0
Table 13-3: Maximum Number of Devices Allowed in a Community
Chapter 14: Network Design Process
Table 14-1: Typical Message Sizes and Types
Table 14-2: IETF Domain Name Suffixes
Chapter 15: Troubleshooting Cisco Networks
Table 15-1: Typical Host Access Problems and Causes
Table 15-2: Typical Router Problems and Causes
Table 15-3: Campus LAN Performance Problems and Causes
Table 15-4: Definitions of Useful Ethernet Statistics
Table 15-5: Input Errors Causes and Actions
Table 15-6: Dropped Packet Causes and Actions
Table 15-7: Serial Line Error Causes and Actions
Table 15-8: Typical Reboot Problems and Probable Causes
Table 15-9: The Number of Characters Needed in Various Key Lengths
Previous page
Table of content
Cisco: A Beginners Guide, Fourth Edition
ISBN: 0072263830
EAN: 2147483647
Year: 2006
Pages: 102
Authors:
Toby Velte
,
Anthony Velte
BUY ON AMAZON
High-Speed Signal Propagation[c] Advanced Black Magic
Discrete Time Mapping
Other Limitations of the FFT
UTP Transmission Example: 10BASE-T
Coaxial Cabling
Points to Remember
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Codes, Standards, and Safety Practices
Infrastructure Wiring Basics
Computer Network Basics
Troubleshooting a Home Communication System
Programming
Extending and Embedding PHP
Data Creation
The Resource Data Type
Declaring and Accessing INI Settings
Constants
Variables
Comparing, Designing, and Deploying VPNs
Summary
Designing MPLS Layer 3 Site-to-Site VPNs
Implementing Full Network Access Using the Cisco SSL VPN Client
Summary
Review Questions
DNS & BIND Cookbook
Asking Questions You Cant Find Answers To
Configuring a Name Server to Forward Dynamic Updates
Limiting Concurrent TCP Clients
Setting Prerequisites in a Dynamic Update
Changing the Resolvers Timeout
FileMaker 8 Functions and Scripts Desk Reference
Floor()
Get(ActiveSelectionStart)
Get(UserName)
Get(UseSystemFormatsState)
KanaZenkaku()
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies