Cisco Field Manual: Router Configuration

Paperback
from $0.00

Author: David Hucaby

ISBN-10: 1587050242

ISBN-13: 9781587050244

Category: Network & Telecommunication Hardware

Cisco Field Manual: Router Configuration is the ultimate command reference that shows readers how to configure routers and switches with Cisco IOS software. Complete with shaded tab sections for different IOS software feature families for easy reference. Each section provides a succinct background of the group, configuration information and example components. With information on the most recent IOS releases as well as on previous releases in simple to read tables, Cisco Field Manual: Router...

Search in google:

Cisco Field Manual: Router Configuration is the ultimate command reference that shows readers how to configure routers and switches with Cisco IOS software. Complete with shaded tab sections for different IOS software feature families for easy reference. Each section provides a succinct background of the group, configuration information and example components. With information on the most recent IOS releases as well as on previous releases in simple to read tables, Cisco Field Manual: Router Configuration is designed to be an invaluable workplace tool.Presents the common elements of complex configurations for Cisco routers, switches, and firewalls in an intuitive, easy-to-reference format. Each feature includes concise background information, configuration notes, port numbers, and examples.Describes actual configuration commands and options in the order they should be used.Saves time spent searching for pertinent information in the Cisco IOS documentation.Useful as a hands-on command reference in the field or as a part of any candidate¿s Cisco Career Certifications preparation.

IntroductionxiHow to Use This BookxiiFurther ReadingxiiiIcons Used in This BookxiiiCommand Syntax ConventionsxivPart IConfiguration Fundamentals3Chapter 1Configuration Basics51-1User Interfaces51-2File Management221-3Cisco Discovery Protocol (CDP)291-4System Time311-5Logging351-6System Monitoring401-7Service Assurance Agent (SAA)491-8Buffer Management591-9Some Troubleshooting Tools63Chapter 2Interface Configuration772-1Ethernet Interfaces772-2FDDI Interfaces792-3Token Ring Interfaces802-4Loopback and Null Interfaces812-5VLAN Interfaces822-6Tunnel Interfaces842-7Synchronous Serial Interfaces862-8Packet-Over-SONET Interfaces962-9Frame Relay Interfaces992-10Frame Relay Switching1102-11ATM Interfaces1152-12ATM LANE123Further Reading130Chapter 3Dial Solutions1333-1Modems1343-2ISDN1403-3Dial-on-Demand Routing (DDR)1453-4Dial Backup1533-5Routing Over Dialup Networks1563-6Point-to-Point Protocol (PPP)160Further Reading165Part IILayer 2 Networking167Chapter 4Bridging1694-1Transparent Bridging1694-2Concurrent Routing and Bridging (CRB)1734-3Integrated Routing and Bridging (IRB)176Further Reading178Chapter 5IBM Networking181Feature Selection1815-1Source-Route Bridging (SRB)1835-2Remote Source-Route Bridging (RSRB)1915-3Data-Link Switching Plus (DLSw+)1965-4Serial Tunnel (STUN)206Further Reading212Part IIINetwork Protocols215Chapter 6IP Addressing and Services2176-1IP Addressing and Resolution2186-2IP Broadcast Handling2216-3Hot Standby Router Protocol (HSRP)2236-4Dynamic Host Configuration Protocol (DHCP)2276-5Mobile IP2316-6Network Address Translation (NAT)2376-7Server Load Balancing (SLB)244Further Reading250Chapter 7IP Routing Protocols2537-1Routing Information Protocol (RIP)2537-2Interior Gateway Routing Protocol (IGRP)2597-3Enhanced Interior Gateway Routing Protocol (EIGRP)2627-4Open Shortest Path First (OSPF)2667-5Integrated IS-IS2757-6Border Gateway Protocol (BGP)2797-7IP Multicast Routing2917-8Multiprotocol BGP (MBGP)297Further Reading300Chapter 8IP Route Processing3058-1Manually Configuring Routes3058-2Policy Routing3088-3Redistributing Routing Information3108-4Filtering Routing Information318Further Reading321Chapter 9Non-IP Routing Protocols3239-1Novell IPX Routing3239-2AppleTalk Routing331Further Reading335Part IVPacket Processing337Chapter 10Quality of Service33910-1Modular QoS Command-Line Interface (MQC)34210-2Network-Based Application Recognition (NBAR)35010-3Policy-Based Routing (PBR)35710-4Quality of Service for VPNs35910-5QoS Policy Propagation via BGP36010-6Priority Queuing (PQ)36210-7Custom Queuing (CQ)36410-8Weighted Fair Queuing (WFQ)36710-9Weighted Random Early Detection (WRED)37010-10Committed Access Rate (CAR)37210-11Generic Traffic Shaping (GTS)37410-12Frame Relay Traffic Shaping (FRTS)37510-13Use RSVP for QoS Signaling37710-14Link Efficiency Mechanisms381Further Reading383Chapter 11Cisco IOS Software Switching Services38511-1Fast Switching38511-2Cisco Express Forwarding38611-3NetFlow Switching38811-4Multilayer Switching389Further Reading392Part VVoice & Telephony395Chapter 12Voice and Telephony39712-1Quality of Service for Voice39812-2Voice Ports40212-3Dialing41612-4H.323 Gateways42612-5H.323 Gatekeepers42912-6Interactive Voice Response (IVR)43612-7Survivable Remote Site (SRS) Telephony438Further Reading443Part VISecurity445Chapter 13Security and VPNs44713-1Suggested Ways to Secure a Router44813-2Authentication, Authorization, and Accounting (AAA)45313-3Dynamically Authenticate and Authorize Users with Authentication Proxy46213-4Controlling Access with Lock and Key Security46613-5Filtering IP Sessions with Reflexive Access Lists47013-6Prevent DoS Attacks with TCP Intercept47213-7Intelligent Filtering with Context-Based Access Control (CBAC)47513-8Detect Attacks and Threats with the IOS Intrusion Detection System48113-9Using Internet Key Exchange (IKE) for VPNs49213-10IPSec VPN Tunnels499Further Reading509Chapter 14Access Lists and Regular Expressions51114-1IP Access Lists51214-2MAC Address and Protocol Type Code Access Lists51714-3IPX Access Lists51914-4AppleTalk Access Lists52314-5Regular Expressions525Part VIIAppendixes529Appendix ACisco IOS Software Release and Filename Conventions531Cisco IOS Software Releases531The Cisco IOS Software Filenaming Convention536Further Reading538Appendix BCabling Quick Reference541Back-to-Back Router Connections543Appendix CSNMP MIB Structure549Appendix DPassword Recovery553The Password Recovery Process553Appendix EConfiguration Register Settings563The Virtual Configuration Register563Appendix FWell-Known IP Protocol Numbers571Appendix GWell-Known IP Port Numbers585Appendix HICMP Type and Code Numbers599Appendix IWell-Known IP Multicast Addresses603Appendix JIPX SAP Type Codes617Appendix KEthernet Type Codes625