reklama - zainteresowany?

Cisco Cookbook - Helion

Cisco Cookbook
ebook
Autor: Kevin Dooley, Ian Brown
ISBN: 978-14-493-9095-2
stron: 912, Format: ebook
Data wydania: 2003-07-24
Księgarnia: Helion

Cena książki: 160,65 zł (poprzednio: 186,80 zł)
Oszczędzasz: 14% (-26,15 zł)

Dodaj do koszyka Cisco Cookbook

Tagi: Cisco

While several publishers (including O'Reilly) supply excellent documentation of router features, the trick is knowing when, why, and how to use these features There are often many different ways to solve any given networking problem using Cisco devices, and some solutions are clearly more effective than others. The pressing question for a network engineer is which of the many potential solutions is the most appropriate for a particular situation. Once you have decided to use a particular feature, how should you implement it? Unfortunately, the documentation describing a particular command or feature frequently does very little to answer either of these questions.Everybody who has worked with Cisco routers for any length of time has had to ask their friends and co-workers for example router configuration files that show how to solve a common problem. A good working configuration example can often save huge amounts of time and frustration when implementing a feature that you've never used before. The Cisco Cookbook gathers hundreds of example router configurations all in one place.As the name suggests, Cisco Cookbook is organized as a series of recipes. Each recipe begins with a problem statement that describes a common situation that you might face. After each problem statement is a brief solution that shows a sample router configuration or script that you can use to resolve this particular problem. A discussion section then describes the solution, how it works, and when you should or should not use it. The chapters are organized by the feature or protocol discussed. If you are looking for information on a particular feature such as NAT, NTP or SNMP, you can turn to that chapter and find a variety of related recipes. Most chapters list basic problems first, and any unusual or complicated situations last.The Cisco Cookbook will quickly become your "go to" resource for researching and solving complex router configuration issues, saving you time and making your network more efficient. It covers:

  • Router Configuration and File Management
  • Router Management
  • User Access and Privilege Levels
  • TACACS+
  • IP Routing
  • RIP
  • EIGRP
  • OSPF
  • BGP
  • Frame Relay
  • Queueing and Congestion
  • Tunnels and VPNs
  • Dial Backup
  • NTP and Time
  • DLSw
  • Router Interfaces and Media
  • Simple Network Management Protocol
  • Logging
  • Access Lists
  • DHCP
  • NAT
  • Hot Standby Router Protocol
  • IP Multicast

Dodaj do koszyka Cisco Cookbook

 

Osoby które kupowały "Cisco Cookbook", wybierały także:

  • Cisco Certified CyberOps Associate 200-201 Certification Guide
  • Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
  • CCNA Cyber Ops SECOPS  Certification Guide 210-255
  • Cisco CCNA 200-301. Kurs video. Administrowanie bezpieczeÅ„stwem sieci. Część 3
  • Cisco CCNA 200-301. Kurs video. Administrowanie urzÄ…dzeniami Cisco. Część 2

Dodaj do koszyka Cisco Cookbook

Spis treści

Cisco Cookbook eBook -- spis treści

  • Cisco Cookbook
  • A Note Regarding Supplemental Files
  • Preface
    • Organization
    • Whats in This Book
    • Conventions
    • Comments and Questions
    • Acknowledgments
      • Kevin Dooley
      • Ian J. Brown
  • 1. Router Configuration and File Management
    • 1.0. Introduction
    • 1.1. Configuring the Router via TFTP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.2. Saving Router Configuration to Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.3. Booting the Router Using a Remote Configuration File
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.4. Storing Configuration Files Larger than NVRAM
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.5. Clearing the Startup Configuration
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.6. Loading a New IOS Image
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.7. Booting a Different IOS Image
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.8. Booting Over the Network
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.9. Copying an IOS Image to a Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.10. Copying an IOS Image Through the Console
      • Problem
      • Solution
      • Discussion
    • 1.11. Deleting Files from Flash
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.12. Partitioning Flash
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.13. Using the Router as a TFTP Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.14. Using FTP from the Router
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.15. Generating Large Numbers of Router Configurations
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.16. Changing the Configurations of Many Routers at Once
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.17. Extracting Hardware Inventory Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 1.18. Backing Up Router Configurations
      • Problem
      • Solution
      • Discussion
      • See Also
  • 2. Router Management
    • 2.0. Introduction
    • 2.1. Creating Command Aliases
      • Problem
      • Solution
      • Discussion
    • 2.2. Managing the Routers ARP Cache
      • Problem
      • Solution
      • Discussion
    • 2.3. Tuning Router Buffers
      • Problem
      • Solution
      • Discussion
    • 2.4. Using the Cisco Discovery Protocol
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.5. Disabling the Cisco Discovery Protocol
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.6. Using the Small Servers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.7. Enabling HTTP Access to a Router
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.8. Using Static Hostname Tables
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.9. Enabling Domain Name Service
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.10. Disabling Domain Name Lookups
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.11. Specifying a Router Reload Time
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.12. Creating Exception Dump Files
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.13. Generating a Report of Interface Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.14. Generating a Report of Routing Table Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.15. Generating a Report of ARP Table Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 2.16. Generating a Server Host Table File
      • Problem
      • Solution
      • Discussion
      • See Also
  • 3. User Access and Privilege Levels
    • 3.0. Introduction
    • 3.1. Setting Up User IDs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.2. Encrypting Passwords
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.3. Using Better Encryption Techniques
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.4. Removing Passwords from a Router Configuration File
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.5. Deciphering Ciscos Weak Password Encryption
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.6. Displaying Active Users
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.7. Sending Messages to Other Users
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.8. Changing the Number of VTYs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.9. Changing VTY Timeouts
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.10. Restricting VTY Access by Protocol
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.11. Enabling Absolute Timeouts on VTY Lines
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.12. Implementing Banners
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.13. Disabling Banners on a Port
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.14. Disabling Router Lines
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.15. Reserving a VTY Port for Administrative Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.16. Restricting Inbound Telnet Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.17. Logging Telnet Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.18. Setting the Source Address for Telnet
      • Problem
      • Solution
      • Discussion
    • 3.19. Automating the Login Sequence
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.20. Using SSH for Secure Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.21. Changing the Privilege Level of IOS Commands
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.22. Defining Per-User Privileges
      • Problem
      • Solution
      • Discussion
      • See Also
    • 3.23. Defining Per-Port Privileges
      • Problem
      • Solution
      • Discussion
      • See Also
  • 4. TACACS+
    • 4.0. Introduction
    • 4.1. Authenticating Login IDs from a Central System
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.2. Restricting Command Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.3. Losing Access to the TACACS+ Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.4. Disabling TACACS+ Authentication on a Particular Line
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.5. Capturing User Keystrokes
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.6. Logging System Events
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.7. Setting the IP Source Address for TACACS+ Messages
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.8. Obtaining Free TACACS+ Server Software
      • Problem
      • Solution
      • Discussion
      • See Also
    • 4.9. Sample Server Configuration Files
      • Problem
      • Solution
      • Discussion
      • See Also
  • 5. IP Routing
    • 5.0. Introduction
      • Unregistered Addresses
    • 5.1. Finding an IP Route
      • Problem
      • Solution
      • Discussion
    • 5.2. Finding Types of IP Routes
      • Problem
      • Solution
      • Discussion
    • 5.3. Converting Different Mask Formats
      • Problem
      • Solution
      • Discussion
    • 5.4. Using Static Routing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 5.5. Floating Static Routes
      • Problem
      • Solution
      • Discussion
      • See also
    • 5.6. Using Policy-Based Routing to Route Based on Source Address
      • Problem
      • Solution
      • Discussion
      • See Also
    • 5.7. Using Policy-Based Routing to Route Based on Application Type
      • Problem
      • Solution
      • Discussion
      • See Also
    • 5.8. Examining Policy-Based Routing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 5.9. Changing Administrative Distances
      • Problem
      • Solution
      • Discussion
      • See Also
    • 5.10. Routing Over Multiple Paths with Equal Costs
      • Problem
      • Solution
      • Discussion
  • 6. RIP
    • 6.0. Introduction
    • 6.1. Configuring RIP Version 1
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.2. Filtering Routes with RIP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.3. Redistributing Static Routes into RIP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.4. Redistributing Routes Using Route Maps
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.5. Creating a Default Route in RIP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.6. Disabling RIP on an Interface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.7. Unicast Updates for RIP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.8. Applying Offsets to Routes
      • Problem
      • Solution
      • Discussion
    • 6.9. Adjusting Timers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.10. Configuring Interpacket Delay
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.11. Enabling Triggered Updates
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.12. Increasing the RIP Input Queue
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.13. Configuring RIP Version 2
      • Problem
      • Solution
      • Discussion
    • 6.14. Enabling RIP Authentication
      • Problem
      • Solution
      • Discussion
      • See Also
    • 6.15. RIP Route Summarization
      • Problem
      • Solution
      • Discussion
    • 6.16. Route Tagging
      • Problem
      • Solution
      • Discussion
      • See Also
  • 7. EIGRP
    • 7.0. Introduction
    • 7.1. Configuring EIGRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.2. Filtering Routes with EIGRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.3. Redistributing Routes into EIGRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.4. Redistributing Routes into EIGRP Using Route Maps
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.5. Creating a Default Route in EIGRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.6. Disabling EIGRP on an Interface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.7. EIGRP Route Summarization
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.8. Adjusting EIGRP Metrics
      • Problem
      • Solution
      • Discussion
    • 7.9. Adjusting Timers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.10. Enabling EIGRP Authentication
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.11. Logging EIGRP Neighbor State Changes
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.12. Limiting EIGRPs Bandwidth Utilization
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.13. EIGRP Stub Routing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.14. Route Tagging
      • Problem
      • Solution
      • Discussion
      • See Also
    • 7.15. Viewing EIGRP Status
      • Problem
      • Solution
      • Discussion
  • 8. OSPF
    • 8.0. Introduction
    • 8.1. Configuring OSPF
      • Problem
      • Solution
      • Discussion
    • 8.2. Filtering Routes in OSPF
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.3. Adjusting OSPF Costs
      • Problem
      • Solution
      • Discussion
    • 8.4. Creating a Default Route in OSPF
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.5. Redistributing Static Routes into OSPF
      • Problem
      • Solution
      • Discussion
    • 8.6. Redistributing External Routes into OSPF
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.7. Manipulating DR Selection
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.8. Setting the OSPF RID
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.9. Enabling OSPF Authentication
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.10. Selecting the Appropriate Area Types
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.11. Summarizing Routes in OSPF
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.12. Disabling OSPF on Certain Interfaces
      • Problem
      • Solution
      • Discussion
    • 8.13. OSPF Route Tagging
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.14. Logging OSPF Adjacency Changes
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.15. Adjusting OSPF Timers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.16. Viewing OSPF Status with Domain Names
      • Problem
      • Solution
      • Discussion
      • See Also
    • 8.17. Debugging OSPF
      • Problem
      • Solution
      • Discussion
  • 9. BGP
    • 9.0. Introduction
      • Basic Terminology
      • BGP Attributes
      • Route Selection
    • 9.1. Configuring BGP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.2. Using eBGP Multihop
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.3. Adjusting the Next-Hop Attribute
      • Problem
      • Solution
      • Discussion
    • 9.4. Connecting to Two ISPs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.5. Connecting to Two ISPs with Redundant Routers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.6. Restricting Networks Advertised to a BGP Peer
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.7. Adjusting Local Preference Values
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.8. Load Balancing
      • Problem
      • Solution
      • Discussion
    • 9.9. Removing Private ASNs from the AS Path
      • Problem
      • Solution
      • Discussion
    • 9.10. Filtering BGP Routes Based on AS Paths
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.11. Reducing the Size of the Received Routing Table
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.12. Summarizing Outbound Routing Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.13. Prepending ASNs to the AS Path
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.14. Redistributing Routes with BGP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.15. Using Peer Groups
      • Problem
      • Solution
      • Discussion
    • 9.16. Authenticating BGP Peers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 9.17. Putting It All Together
      • Problem
      • Solution
      • Discussion
      • See Also
  • 10. Frame Relay
    • 10.0. Introduction
      • Frame Relay QoS Features
    • 10.1. Setting Up Frame Relay with Point-to-Point Subinterfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.2. Adjusting LMI Options
      • Problem
      • Solution
      • Discussion
    • 10.3. Setting Up Frame Relay with Map Statements
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.4. Using Multipoint Subinterfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.5. Configuring Frame Relay SVCs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.6. Simulating a Frame Relay Cloud
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.7. Compressing Frame Relay Data on a Subinterface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.8. Compressing Frame Relay Data with Maps
      • Problem
      • Solution
      • Discussion
      • See Also
    • 10.9. Viewing Frame Relay Status Information
      • Problem
      • Solution
      • Discussion
  • 11. Queueing and Congestion
    • 11.0. Introduction
      • Queueing Algorithms
      • Fast Switching
    • 11.1. Fast Switching and CEF
      • Problem
      • Solution
      • Discussion
    • 11.2. Setting the DSCP or TOS Field
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.3. Using Priority Queueing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.4. Using Custom Queueing
      • Problem
      • Solution
      • Discussion
    • 11.5. Using Custom Queues with Priority Queues
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.6. Using Weighted Fair Queueing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.7. Using Class-Based Weighted Fair Queueing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.8. Controlling Congestion with WRED
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.9. Using RSVP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.10. Using Generic Traffic Shaping
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.11. Using Frame-Relay Traffic Shaping
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.12. Using Committed Access Rate
      • Problem
      • Solution
      • Discussion
    • 11.13. Implementing Standards-Based Per-Hop Behavior
      • Problem
      • Solution
      • Discussion
      • See Also
    • 11.14. Viewing Queue Parameters
      • Problem
      • Solution
      • Discussion
  • 12. Tunnels and VPNs
    • 12.0. Introduction
    • 12.1. Creating a Tunnel
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.2. Tunneling Foreign Protocols in IP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.3. Tunneling with Dynamic Routing Protocols
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.4. Viewing Tunnel Status
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.5. Creating an Encrypted Router-to-Router VPN
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.6. Generating RSA Keys
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.7. Creating a Router-to-Router VPN with RSA Keys
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.8. Creating a VPN Between a Workstation and a Router
      • Problem
      • Solution
      • Discussion
      • See Also
    • 12.9. Check IPSec Protocol Status
      • Problem
      • Solution
      • Discussion
  • 13. Dial Backup
    • 13.0. Introduction
      • Analog Modems
      • Switched 56Kbps Digital Service
      • ISDN
      • Estimating How Many Dialup Lines You Need
    • 13.1. Automating Dial Backup
      • Problem
      • Solution
      • Discussion
      • See Also
    • 13.2. Using Dialer Interfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 13.3. Using an Async Modem on the AUX Port
      • Problem
      • Solution
      • Discussion
      • See Also
    • 13.4. Using Backup Interfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 13.5. Using Dialer Watch
      • Problem
      • Solution
      • Discussion
      • See Also
    • 13.6. Ensuring Proper Disconnection
      • Problem
      • Solution
      • Discussion
    • 13.7. View Dial Backup Status
      • Problem
      • Solution
      • Discussion
    • 13.8. Debugging Dial Backup
      • Problem
      • Solution
      • Discussion
  • 14. NTP and Time
    • 14.0. Introduction
    • 14.1. Timestamping Router Logs
      • Problem
      • Solution
      • Discussion
    • 14.2. Setting the Time
      • Problem
      • Solution
      • Discussion
    • 14.3. Setting the Time Zone
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.4. Adjusting for Daylight Saving Time
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.5. Synchronizing the Time on All Routers (NTP)
      • Problem
      • Solution
      • Discussion
    • 14.6. Configuring NTP Redundancy
      • Problem
      • Solution
      • Discussion
    • 14.7. Setting the Router as the NTP Master for the Network
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.8. Changing NTP Synchronization Periods
      • Problem
      • Solution
      • Discussion
    • 14.9. Using NTP to Send Periodic Broadcast Time Updates
      • Problem
      • Solution
      • Discussion
      • See also
    • 14.10. Using NTP to Send Periodic Multicast Time Updates
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.11. Enabling and Disabling NTP Per Interface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.12. NTP Authentication
      • Problem
      • Solution
      • Discussion
    • 14.13. Limiting the Number of Peers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.14. Restricting Peers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 14.15. Setting the Clock Period
      • Problem
      • Solution
      • Discussion
    • 14.16. Checking the NTP Status
      • Problem
      • Solution
      • Discussion
    • 14.17. Debugging NTP
      • Problem
      • Solution
      • Discussion
  • 15. DLSw
    • 15.0. Introduction
      • Service Access Points (SAP and LSAP)
      • Explorers and RIFs
      • Cisco IOS Code Sets
    • 15.1. Configuring DLSw
      • Problem
      • Solution
      • Discussion
      • The peers
        • Ring groups, ring numbers, and bridge numbers
        • Explorer options
        • Other features
    • 15.2. Using DLSw to Bridge Between Ethernet and Token Ring
      • Problem
      • Solution
      • Discussion
        • Ethernet II or 802.3 framing
      • See Also
    • 15.3. Converting Ethernet and Token Ring MAC Addresses
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.4. Configuring SDLC
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.5. Configuring SDLC for Multidrop Connections
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.6. Using STUN
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.7. Using BSTUN
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.8. Controlling DLSw Packet Fragmentation
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.9. Tagging DLSw Packets for QoS
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.10. Supporting SNA Priorities
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.11. DLSw+ Redundancy and Fault Tolerance
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.12. Viewing DLSw Status Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.13. Viewing SDLC Status Information
      • Problem
      • Solution
      • Discussion
      • See Also
    • 15.14. Debugging DSLw
      • Problem
      • Solution
      • Discussion
      • See Also
  • 16. Router Interfaces and Media
    • 16.0. Introduction
    • 16.1. Viewing Interface Status
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.2. Configuring Serial Interfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.3. Using an Internal T1 CSU/DSU
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.4. Using an Internal ISDN PRI Module
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.5. Using an Internal 56Kbps CSU/DSU
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.6. Configuring an Async Serial Interface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.7. Configuring ATM Subinterfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.8. Setting Payload Scrambling on an ATM Circuit
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.9. Configuring Ethernet Interface Features
      • Problem
      • Solution
      • Discussion
    • 16.10. Configuring Token Ring Interface Features
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.11. Connecting VLAN Trunks With ISL
      • Problem
      • Solution
      • Discussion
      • See Also
    • 16.12. Connecting VLAN Trunks with 802.1Q
      • Problem
      • Solution
      • Discussion
      • See Also
  • 17. Simple Network Management Protocol
    • 17.0. Introduction
      • SNMP Management Model
      • MIBs and OIDs
    • 17.1. Configuring SNMP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.2. Extracting Router Information via SNMP Tools
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.3. Recording Important Router Information for SNMP Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.4. Extracting Inventory Information from a List of Routers with SNMP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.5. Using Access Lists to Protect SNMP Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.6. Logging Unauthorized SNMP Attempts
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.7. Limiting MIB Access
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.8. Using SNMP to Modify a Routers Running Configuration
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.9. Using SNMP to Copy a New IOS Image
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.10. Using SNMP to Perform Mass Configuration Changes
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.11. Preventing Unauthorized Configuration Modifications
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.12. Making Interface Table Numbers Permanent
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.13. Enabling SNMP Traps and Informs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.14. Sending syslog Messages as SNMP Traps and Informs
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.15. Setting SNMP Packet Size
      • Problem
      • Solution
      • Discussion
    • 17.16. Setting SNMP Queue Size
      • Problem
      • Solution
      • Discussion
    • 17.17. Setting SNMP Timeout Values
      • Problem
      • Solution
      • Discussion
    • 17.18. Disabling Link Up/Down Traps per Interface
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.19. Setting the IP Source Address for SNMP Traps
      • Problem
      • Solution
      • Discussion
    • 17.20. Using RMON to Send Traps
      • Problem
      • Solution
      • Discussion
      • See Also
    • 17.21. Enabling SNMPv3
      • Problem
      • Solution
      • Discussion
      • Using the SNMPv3 Security Levels
      • See Also
    • 17.22. Using SAA
      • Problem
      • Solution
      • Discussion
  • 18. Logging
    • 18.0. Introduction
    • 18.1. Enabling Local Router Logging
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.2. Setting the Log Size
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.3. Clearing the Routers Log
      • Problem
      • Solution
      • Discussion
    • 18.4. Sending Log Messages to Your Screen
      • Problem
      • Solution
      • Discussion
    • 18.5. Using a Remote Log Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.6. Enabling Syslog on a Unix Server
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.7. Changing the Default Log Facility
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.8. Restricting What Log Messages Are Sent to the Server
      • Problem
      • Solution
      • Discussion
    • 18.9. Setting the IP Source Address for Syslog Messages
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.10. Logging Router Syslog Messages in Different Files
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.11. Maintaining Syslog Files on the Server
      • Problem
      • Solution
      • Discussion
    • 18.12. Testing the Syslog Sever Configuration
      • Problem
      • Solution
      • Discussion
      • See Also
    • 18.13. Preventing the Most Common Messages from Being Logged
      • Problem
      • Solution
      • Discussion
    • 18.14. Rate-Limiting Syslog Traffic
      • Problem
      • Solution
      • Discussion
  • 19. Access Lists
    • 19.0. Introduction
    • 19.1. Filtering by Source or Destination IP Address
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.2. Adding a Comment to an ACL
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.3. Filtering by Application
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.4. Filtering Based on TCP Header Flags
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.5. Restricting TCP Session Direction
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.6. Filtering Multiport Applications
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.7. Filtering Based on DSCP and TOS
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.8. Logging when an Access List Is Used
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.9. Logging TCP Sessions
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.10. Analyzing ACL Log Entries
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.11. Using Named and Reflexive Access Lists
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.12. Dealing with Passive Mode FTP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 19.13. Using Context-Based Access Lists
      • Problem
      • Solution
      • Discussion
      • See Also
  • 20. DHCP
    • 20.0. Introduction
    • 20.1. Using IP Helper Addresses for DHCP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.2. Limiting the Impact of IP Helper Addresses
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.3. Using DHCP to Dynamically Configure Router IP Addresses
      • Problem
      • Solution
      • Discussion
    • 20.4. Dynamically Allocating Client IP Addresses via DHCP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.5. Defining DHCP Configuration Options
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.6. Defining DHCP Lease Periods
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.7. Allocating Static IP Addresses with DHCP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.8. Configuring a DHCP Database Client
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.9. Configuring Multiple DHCP Servers per Subnet
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.10. Showing DHCP Status
      • Problem
      • Solution
      • Discussion
      • See Also
    • 20.11. Debugging DHCP
      • Problem
      • Solution
      • Discussion
  • 21. NAT
    • 21.0. Introduction
    • 21.1. Configuring Basic NAT Functionality
      • Problem
      • Solution
      • Discussion
    • 21.2. Allocating External Addresses Dynamically
      • Problem
      • Solution
      • Discussion
      • See Also
    • 21.3. Allocating External Addresses Statically
      • Problem
      • Solution
      • Discussion
      • See Also
    • 21.4. Translating Some Addresses Statically and Others Dynamically
      • Problem
      • Solution
      • Discussion
      • See Also
    • 21.5. Translating in Both Directions Simultaneously
      • Problem
      • Solution
      • Discussion
      • See Also
    • 21.6. Rewriting the Network Prefix
      • Problem
      • Solution
      • Discussion
    • 21.7. Adjusting NAT Timers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 21.8. Changing TCP Ports for FTP
      • Problem
      • Solution
      • Discussion
    • 21.9. Checking NAT Status
      • Problem
      • Solution
      • Discussion
    • 21.10. Debugging NAT
      • Problem
      • Solution
      • Discussion
  • 22. Hot Standby Router Protocol
    • 22.0. Introduction
    • 22.1. Configuring Basic HSRP Functionality
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.2. Using HSRP Preempt
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.3. Making HSRP React to Problems on Other Interfaces
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.4. Load Balancing with HSRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.5. Redirecting ICMP with HSRP
      • Problem
      • Solution
      • Discussion
    • 22.6. Manipulating HSRP Timers
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.7. Using HSRP on a Token Ring Network
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.8. HSRP SNMP Support
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.9. Increasing HSRP Security
      • Problem
      • Solution
      • Discussion
      • See Also
    • 22.10. Showing HSRP State Information
      • Problem
      • Solution
      • Discussion
    • 22.11. Debugging HSRP
      • Problem
      • Solution
      • Discussion
  • 23. IP Multicast
    • 23.0. Introduction
      • IGMP and CGMP
      • Multicast Routing Protocols
      • PIM-DM and PIM-SM
      • DVMRP
      • MOSPF
      • MBGP
    • 23.1. Configuring Basic Multicast Functionality with PIM-DM
      • Problem
      • Solution
      • Discussion
    • 23.2. Routing Multicast Traffic with PIMSM and BSR
      • Problem
      • Solution
      • Discussion
    • 23.3. Routing Multicast Traffic with PIM-SM and Auto-RP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.4. Configuring Routing for a Low Frequency Multicast Application
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.5. Configuring CGMP
      • Problem
      • Solution
      • Discussion
    • 23.6. Static Multicast Routes and Group Memberships
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.7. Routing Multicast Traffic with MOSPF
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.8. Routing Multicast Traffic with DVMRP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.9. DVMRP Tunnels
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.10. Controlling Multicast Scope with TTL
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.11. Using Administratively Scoped Addressing
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.12. Exchanging Multicast Routing Information with MBGP
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.13. Using MSDP to Discover External Sources
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.14. Converting Broadcasts to Multicasts
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.15. Showing Multicast Status
      • Problem
      • Solution
      • Discussion
      • See Also
    • 23.16. Debugging Multicast Routing
      • Problem
      • Solution
      • Discussion
  • A. External Software Packages
    • A.1. Perl
    • A.2. Expect
    • A.3. NET-SNMP
    • A.4. PuTTY
    • A.5. OpenSSH
    • A.6. Ethereal
  • B. IP Precedence, TOS, and DSCP Classifications
    • B.1. Combining TOS and IP Precedence to Mimic DSCP
    • B.2. RSVP
    • B.3. Queueing Algorithms
      • Weighted Fair Queueing
      • Priority Queueing
      • Custom Queueing
    • B.4. Dropping Packets and Congestion Avoidance
  • Index
  • About the Authors
  • Colophon
  • Copyright

Dodaj do koszyka Cisco Cookbook

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.