| | Copyright |
| | About the Author |
| | | About the Technical Reviewers |
| | Acknowledgments |
| | Foreword |
| | Introduction |
| | | Objectives of This Book |
| | | Who Should Read This Book? |
| | | The Organization of This Book |
| | | Command Syntax Conventions |
| | | References and Additional Reading |
| | Part I. Remote Access Fundamentals |
| | | Chapter 1. Remote Access Overview |
| | | Management Considerations |
| | | Defining the Remote Access User Population |
| | | Remote Access Service Options |
| | | VPN Service Vehicles |
| | | Provisioning of Enterprise Remote Access Services |
| | | Summary |
| | | Review Questions |
| | | Chapter 2. Telecommunication Basics |
| | | Shannon's Capacity Theorem |
| | | Modulation and Line-Coding Techniques in Wired Networks |
| | | Modulation and Line-Coding Techniques in Wireless LANs |
| | | Modulation and Line-Coding Techniques in Hybrid Networks |
| | | Clocking, Line Coding, and Framing in Carrier Systems |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 3. The Cloud |
| | | Carriers, Service Providers, and How Traffic Is Carried |
| | | FDM |
| | | Digitalization of the Signal and Pulse Code Modulation |
| | | TDM |
| | | T-Carriers |
| | | SONET, Synchronous Transport Signal, and Synchronous Digital Hierarchy |
| | | Carrier's Facilities and Switching Systems |
| | | ISPs and ASPs |
| | | Data Centers and Internet Hosting Services |
| | | The Future of Service Providers |
| | | Summary |
| | | Review Questions |
| | | End Note |
| | | Chapter 4. Troubleshooting Approaches, Models, and Tools |
| | | Interconnection Models |
| | | Troubleshooting Models and the Baseline |
| | | Common and Cisco-Specific Tools |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | Part II. Dial |
| | | Chapter 5. Dial Technology Background |
| | | Overview of Modems |
| | | Telco Issues |
| | | Authentication Options |
| | | PPP |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 6. Dial Design and Configuration Solutions |
| | | Dial Design Solutions |
| | | Dial Configuration Solutions |
| | | Summary |
| | | Review Questions |
| | | Chapter 7. Dial Troubleshooting |
| | | Troubleshooting NAS WAN Links |
| | | Troubleshooting Dial-In Service |
| | | Troubleshooting Dial-Out Service |
| | | AS5x00 Specific Commands and Debugs |
| | | Summary |
| | | Review Questions |
| | | Chapter 8. Dial Troubleshooting Scenarios |
| | | Scenario 1: Authentication Time OutsPart I |
| | | Scenario 2: Authentication Time OutsPart II |
| | | Scenario 3: Frequent Retrains and Disconnects |
| | | Scenario 4: Dirty Phone Line |
| | | Scenario 5: Bad Modem |
| | | Frequently Asked Questions and Answers |
| | | Summary |
| | Part III. ISDN |
| | | Chapter 9. ISDN Technology Background |
| | | ISDN Standards |
| | | ISDN Channels |
| | | ISDN Planes: ISDN Layer Architecture |
| | | ISDN Switch Types |
| | | Summary |
| | | Review Questions |
| | | Chapter 10. ISDN Design Solutions |
| | | Enterprise and ISP Designs |
| | | IP Pool Design |
| | | NAT and PAT |
| | | Per-User (Per Function) Configuration |
| | | MLP |
| | | MMP |
| | | Summary |
| | | Review Questions |
| | | Chapter 11. Cisco ISDN Configuration Solutions |
| | | Cisco ISDN Cost-Effective Solutions |
| | | ISDN Security |
| | | Configuring the POTS (Telephone) Interfaces |
| | | Summary |
| | | Review Questions |
| | | Chapter 12. ISDN BRI Troubleshooting |
| | | Troubleshooting the Physical Layer |
| | | Troubleshooting the Data Link Layer |
| | | Troubleshooting the Network Layer |
| | | Troubleshooting PPP |
| | | Troubleshooting Telephone Interfaces |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 13. Troubleshooting Scenarios for ISDN BRI |
| | | Recommendations for Practical Troubleshooting of ISDN Remote Services |
| | | Scenario 1: New Install Problems |
| | | Scenario 2: Dial-Out Problems |
| | | Scenario 3: ISDN Performance Problems |
| | | Scenario 4: End-to-End Communication Problems |
| | | Scenario 5: Windows 2000 DDR Issue |
| | | Summary |
| | Part IV. Frame Relay |
| | | Chapter 14. Frame Relay Technology Background |
| | | Frame Relay Standards |
| | | Frame Relay Service Architecture |
| | | Frame Relay Protocols |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 15. Frame Relay Design Solutions |
| | | Design Parameters |
| | | Frame Relay Topologies and Congestion Control |
| | | Frame Relay and Upper-Layer Protocols |
| | | LMI |
| | | Address Resolution: ARP, Reverse ARP, and Inverse ARP |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 16. Basic and Advanced Frame Relay Configurations |
| | | Basic Frame Relay Configurations |
| | | Advanced Frame Relay Configurations |
| | | Summary |
| | | Review Questions |
| | | Chapter 17. Frame Relay Troubleshooting |
| | | Beginning the Frame Relay Troubleshooting Process |
| | | Physical Layer Troubleshooting |
| | | Data Link Layer Troubleshooting |
| | | Performance Problems |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 18. Frame Relay Troubleshooting Scenarios |
| | | Scenario 1: New Install Issues |
| | | Scenario 2: Mismatched DLCI Settings |
| | | Scenario 3: Performance Issues from Flapping Lines and Traffic Shaping Issues |
| | | Scenario 4: IP Multicast Issues in Frame Relay |
| | | Scenario 5: Frame Relay Host Migration |
| | | Summary |
| | Part V. VPN |
| | | Chapter 19. VPN Technology Background |
| | | Service Provider, Dedicated, and Access VPNs |
| | | Enterprise VPNs Overview |
| | | Enterprise VPN Categories |
| | | Network Layer (Layer 3) VPNs |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 20. Remote Access VPN Design and Configuration Solutions |
| | | Remote Access VPN Design Solutions |
| | | VPN Configuration Considerations |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 21. Remote Access VPN Troubleshooting |
| | | Troubleshooting Cisco Remote Access VPN Clients |
| | | Internet Technologies and Remote Access VPNs |
| | | LAN and General Networking Issues Affecting Remote Access VPNs |
| | | Summary |
| | | Review Questions |
| | | End Notes |
| | | Chapter 22. Remote Access VPN Troubleshooting Scenarios |
| | | Warming Up with Preliminary Troubleshooting Steps |
| | | Scenario 1: Cannot Authenticate |
| | | Scenario 2: Can Authenticate but Problems Passing Data |
| | | Scenario 3: PPPoE Software/Hardware Problems |
| | | Scenario 4: 3002 Connection Problems |
| | | Scenario 5: Extranet Issues |
| | | Summary |
| | | Appendix A. Answers to Review Questions |
| | | Chapter 1 |
| | | Chapter 2 |
| | | Chapter 3 |
| | | Chapter 4 |
| | | Chapter 5 |
| | | Chapter 6 |
| | | Chapter 7 |
| | | Chapter 9 |
| | | Chapter 10 |
| | | Chapter 11 |
| | | Chapter 12 |
| | | Chapter 14 |
| | | Chapter 15 |
| | | Chapter 16 |
| | | Chapter 17 |
| | | Chapter 19 |
| | | Chapter 20 |
| | | Chapter 21 |
| | Index |