Flylib.com
List of Tables
Previous page
Table of content
Chapter 1: Cisco and the Internet
Table 1-1: Cisco Acquisitions From 2001 Through 2005
Chapter 2: Networking Primer
Table 2-1: Subnet Masks Listed by Number of Network ID Bits
Table 2-2: Abbreviating IPv6 Addresses
Chapter 3: Router Overview
Table 3-1: Optical Networking Speeds
Table 3-2: How Network Administrators Access Routers
Table 3-3: Overview of Router Passwords and Their Uses
Table 3-4: Five Major Factors in Selecting a Router
Table 3-5: Cisco's Three Series of SOHO Routers
Table 3-6: Cisco's Midrange Routing Solutions
Table 3-7: Cisco's Series of Backbone Routers
Table 3-8: IOS Software Feature Categories
Table 3-9: IOS Feature Set Families
Chapter 4: Configuring Routers
Table 4-1: Three General Kinds of IOS Software Modes
Table 4-2: Config Modes and the Parts of the Router Targeted
Table 4-3: IOS Navigation Commands
Table 4-4: Interface Status Report Definitions
Table 4-5: Configuration Register Settings to Enter Factory Diagnostic Mode
Table 4-6: Cisco's Password Recovery Procedures for Legacy Router Protocols
Table 4-7: Color Keys That Track Configuration Status
Table 4-8: The Four Parts of Fast Step Configuration Tasks
Chapter 5: Switches
Table 5-1: Topology Design Factors (Besides Geography)
Table 5-2: TIE/EIA Twisted-Pair Specifications
Table 5-3: LAN Specifications with Cable Types and Distance Limits
Table 5-4: Key Switching Technologies
Table 5-5: Midrange Catalyst Switches With High Port Densities
Table 5-6: Mid-Range Catalyst Switches With Multilayer Switching
Table 5-7: Cisco's Two High-End Catalyst Switches With Gigabit, 10 Gigabit, and ATM Backbones
Chapter 6: Security Overview
Table 6-1: Authentication Methods in IOS
Table 6-2: Entity Types Secured by AAA Authentication Methods
Table 6-3: AAA's Eight Named Methods for User Authentication
Table 6-4: IOS's Five Authorization Types
Table 6-5: How AAA Accounting Methods Work per Security Protocol
Table 6-6: AAA Accounting Types That Track Asset Usage for Five Security Entity Types
Table 6-7: RADIUS Attributes Used to Enforce User-Based Security
Table 6-8: Cisco Extensions to the RADIUS Standard
Table 6-9: TACACS+ Authentication and Authorization AV Pairs
Chapter 7: Security Building Blocks
Table 7-1: Keywords in IOS Firewall's ip Inspect and Access-List Commands
Table 7-2: Cisco's Line of Cisco Secure PIX Firewalls
Table 7-3: Cisco's Line of Cisco Adaptive Security Appliances
Table 7-4: Some of Cisco's VPN-Enabled Hardware
Chapter 8: Cisco Wireless Solutions
Table 8-1: The Attributes of 802.11 a, b, g, and n Networks
Table 8-2: Cisco's Line of Access Points
Table 8-3: Cisco's Line of Wireless Client Adapters
Table 8-4: Authentication Methods for Client Types
Table 8-5: Wireless Client System Parameters
Chapter 9: Cisco Unified Contact Center
Table 9-1: VoIP Covdec Comparison
Table 9-2: SIP Functionality
Table 9-3: Comparison of Cisco Unified IP Phones
Table 9-4: Cisco Unified Communication's Call Processing Products
Table 9-5: Cisco Unified Communications Clients
Table 9-6: Cisco Unified Communications Voice and Messaging Components
Table 9-7: Cisco Unified Communications Media-Conferencing Products
Chapter 10: Storage Tools
Table 10-1: Layers in the Fibre Channel Stack
Table 10-2: Comparison of the Cisco MDS 9500 Series
Table 10-3: Several Configuration Commands Used in the CLI
Table 10-4: Comparison of Cisco FS 5500 Series Integrated NAS and Cisco FS 5700 Series Integrated NASs
Chapter 11: Cisco Content Networking and Video Solutions
Table 11-1: Components of an AVVID Solution
Chapter 12: Routing Protocols
Table 12-1: Initial Steps to Configure Cisco's Routing Protocols
Table 12-2: EIGRP's Command Set
Chapter 13: Network Management
Table 13-1: Basic Cisco MIB Objects Commonly Used in SNMP Implementations
Table 13-2: System Requirements for Cisco Network Assistant 4.0
Table 13-3: Maximum Number of Devices Allowed in a Community
Chapter 14: Network Design Process
Table 14-1: Typical Message Sizes and Types
Table 14-2: IETF Domain Name Suffixes
Chapter 15: Troubleshooting Cisco Networks
Table 15-1: Typical Host Access Problems and Causes
Table 15-2: Typical Router Problems and Causes
Table 15-3: Campus LAN Performance Problems and Causes
Table 15-4: Definitions of Useful Ethernet Statistics
Table 15-5: Input Errors Causes and Actions
Table 15-6: Dropped Packet Causes and Actions
Table 15-7: Serial Line Error Causes and Actions
Table 15-8: Typical Reboot Problems and Probable Causes
Table 15-9: The Number of Characters Needed in Various Key Lengths
Previous page
Table of content
Cisco: A Beginners Guide, Fourth Edition
ISBN: 0072263830
EAN: 2147483647
Year: 2006
Pages: 102
Authors:
Toby Velte
,
Anthony Velte
BUY ON AMAZON
WebLogic: The Definitive Guide
Deployment Tools
Split Directory Development
Tuning the Application Server
JMX
SNMP
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Cisco Trunk Concepts
SIP and Cisco CallManager
PKI Revocation and Key Storage
Authentication and Encryption Configuration Overview
Data Structures and Algorithms in Java
The Java Collections Framework Revisited
Vocabulary
Graphs
C.1. Sum Notation
D.1. Data Structures and Algorithms
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity I
Unauthorized Activity II
Cisco Secure IDS
NFR Security
Incident Response
DNS & BIND Cookbook
Using a Single Data File for Multiple Zones
Making Your Services Easy to Find
Configuring a Name Server Not to Forward Certain Queries
Viewing a Name Servers Cache
Restarting a Name Server with the Same Arguments
VBScript in a Nutshell, 2nd Edition
Error Handling
Why Use WSH?
The WSH Object Model
Section A.9. File System Objects
Section B.3. Date and Time Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies