reklama - zainteresowany?

Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition - Helion

Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition
ebook
Autor: Gary A. Donahue
ISBN: 978-14-493-0935-0
stron: 788, Format: ebook
Data wydania: 2011-05-13
Księgarnia: Helion

Cena książki: 186,15 zł (poprzednio: 216,45 zł)
Oszczędzasz: 14% (-30,30 zł)

Dodaj do koszyka Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.

Topics include:

  • An in-depth view of routers and routing
  • Switching, using Cisco Catalyst and Nexus switches as examples
  • SOHO VoIP and SOHO wireless access point design and configuration
  • Introduction to IPv6 with configuration examples
  • Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS
  • Security, firewall theory, and configuration, as well as ACL and authentication
  • Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ)
  • IP address allocation, Network Time Protocol (NTP), and device failures

Dodaj do koszyka Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition

 

Osoby które kupowały "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition

Spis treści

Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition eBook -- spis treści

  • Network Warrior
    • SPECIAL OFFER: Upgrade this ebook with OReilly
    • Preface
      • Who Should Read This Book
      • Conventions Used in This Book
      • Using Code Examples
      • Wed Like to Hear from You
      • Safari Books Online
      • Acknowledgments
    • 1. What Is a Network?
    • 2. Hubs and Switches
      • Hubs
      • Switches
        • Switch Types
        • Planning a Chassis-Based Switch Installation
          • Rack space
          • Power
          • Cooling
          • Installing and removing modules
          • Routing cables
    • 3. Autonegotiation
      • What Is Autonegotiation?
      • How Autonegotiation Works
      • When Autonegotiation Fails
      • Autonegotiation Best Practices
      • Configuring Autonegotiation
    • 4. VLANs
      • Connecting VLANs
      • Configuring VLANs
        • CatOS
        • IOS Using VLAN Database
        • IOS Using Global Commands
        • Nexus and NX-OS
    • 5. Trunking
      • How Trunks Work
        • ISL
        • 802.1Q
        • Which Protocol to Use
        • Trunk Negotiation
      • Configuring Trunks
        • IOS
        • CatOS
        • Nexus and NX-OS
    • 6. VLAN Trunking Protocol
      • VTP Pruning
      • Dangers of VTP
      • Configuring VTP
        • VTP Domains
          • IOS
          • CatOS
          • NX-OS
        • VTP Mode
          • IOS
          • CatOS
          • NX-OS
        • VTP Password
          • IOS
          • CatOS
          • NX-OS
        • VTP Pruning
          • IOS
          • CatOS
          • NX-OS
    • 7. Link Aggregation
      • EtherChannel
        • EtherChannel Load Balancing
        • Configuring and Managing EtherChannel
          • EtherChannel protocols
          • CatOS example
          • IOS example
          • NX-OS example
      • Cross-Stack EtherChannel
      • Multichassis EtherChannel (MEC)
      • Virtual Port Channel
        • Initial vPC Configuration
        • Adding a vPC
    • 8. Spanning Tree
      • Broadcast Storms
      • MAC Address Table Instability
      • Preventing Loops with Spanning Tree
        • How Spanning Tree Works
      • Managing Spanning Tree
      • Additional Spanning Tree Features
        • PortFast
        • BPDU Guard
        • UplinkFast
        • BackboneFast
      • Common Spanning Tree Problems
        • Duplex Mismatch
        • Unidirectional Links
        • Bridge Assurance
      • Designing to Prevent Spanning Tree Problems
        • Use Routing Instead of Switching for Redundancy
        • Always Configure the Root Bridge
    • 9. Routing and Routers
      • Routing Tables
      • Route Types
      • The IP Routing Table
        • Host Route
        • Subnet
        • Summary (Group of Subnets)
        • Major Network
        • Supernet (Group of Major Networks)
        • Default Route
      • Virtual Routing and Forwarding
    • 10. Routing Protocols
      • Communication Between Routers
      • Metrics and Protocol Types
      • Administrative Distance
      • Specific Routing Protocols
        • RIP
        • RIPv2
        • EIGRP
        • OSPF
        • BGP
    • 11. Redistribution
      • Redistributing into RIP
      • Redistributing into EIGRP
      • Redistributing into OSPF
      • Mutual Redistribution
      • Redistribution Loops
      • Limiting Redistribution
        • Route Tags
        • A Real-World Example
          • Another method
    • 12. Tunnels
      • GRE Tunnels
      • GRE Tunnels and Routing Protocols
      • GRE and Access Lists
    • 13. First Hop Redundancy
      • HSRP
      • HSRP Interface Tracking
      • When HSRP Isnt Enough
      • Nexus and HSRP
      • GLBP
        • Object Tracking in GLBP
    • 14. Route Maps
      • Building a Route Map
      • Policy Routing Example
        • Monitoring Policy Routing
    • 15. Switching Algorithms in Cisco Routers
      • Process Switching
      • Interrupt Context Switching
        • Fast Switching
        • Optimum Switching
        • CEF
      • Configuring and Managing Switching Paths
        • Process Switching
        • Fast Switching
        • CEF
    • 16. Multilayer Switches
      • Configuring SVIs
        • IOS (4500, 6500, 3550, 3750, etc.)
        • Hybrid Mode (4500, 6500)
        • NX-OS (Nexus 7000, 5000)
      • Multilayer Switch Models
    • 17. Cisco 6500 Multilayer Switches
      • Architecture
        • Buses
        • Enhanced Chassis
        • Vertical Enhanced Chassis
        • Supervisors
          • MSFC
          • PFC
          • Models
        • Modules
          • Module interaction
          • Module types
            • Ethernet modules
            • FWSMs
            • CSMs
            • NAM
            • Intrusion Detection System modules
            • FlexWAN modules
            • Communication Media Modules
      • CatOS Versus IOS
      • Installing VSS
        • Other Recommended VSS Commands
          • VSS dual-active detection
        • VSS Failover Commands
        • Miscellaneous VSS Commands
        • VSS Best Practices
    • 18. Cisco Nexus
      • Nexus Hardware
        • Nexus 7000
        • Nexus 5000
        • Nexus 2000
        • Nexus 1000 Series
      • NX-OS
        • NX-OS Versus IOS
          • No more speed-related interface names
          • No hidden configuration in NX-OS
          • Interface status displays operational state along with a reason
          • The show interface brief command
          • No more write memory
          • No more do command
          • No more show arp
          • No more interface range command
          • Slash notation supported on all IPv4 and IPv6 commands
          • Two CLI help levels
          • Routing configuration mostly within interfaces
          • Many more pipe options
      • Nexus Iconography
      • Nexus Design Features
        • Virtual Routing and Forwarding
        • Virtual Device Contexts
        • Shared and Dedicated Rate-Mode
        • Configuring Fabric Extenders (FEXs)
          • Describing FEXs
          • Physical connection
          • Pinning
          • FEX fabric uplinks using vPC
        • Virtual Port Channel
        • Config-Sync
        • Configuration Rollback
        • Upgrading NX-OS
    • 19. Catalyst 3750 Features
      • Stacking
      • Interface Ranges
      • Macros
      • Flex Links
      • Storm Control
      • Port Security
      • SPAN
      • Voice VLAN
      • QoS
    • 20. Telecom Nomenclature
      • Telecom Glossary
    • 21. T1
      • Understanding T1 Duplex
      • Types of T1
      • Encoding
        • AMI
        • B8ZS
      • Framing
        • D4/Superframe
        • Extended Super Frame
      • Performance Monitoring
        • Loss of Signal
        • Out of Frame
        • Bipolar Violation
        • CRC6
        • Errored Seconds
        • Extreme Errored Seconds
      • Alarms
        • Red Alarm
        • Yellow Alarm
        • Blue Alarm
      • Troubleshooting T1s
        • Loopback Tests
        • Integrated CSU/DSUs
      • Configuring T1s
        • CSU/DSU Configuration
        • CSU/DSU Troubleshooting
    • 22. DS3
      • Framing
        • M13
        • C-Bits
        • Clear-Channel DS3 Framing
      • Line Coding
      • Configuring DS3s
        • Clear-Channel DS3
        • Channelized DS3
    • 23. Frame Relay
      • Ordering Frame Relay Service
      • Frame Relay Network Design
      • Oversubscription
      • Local Management Interface
        • Congestion Avoidance in Frame Relay
      • Configuring Frame Relay
        • Basic Frame Relay with Two Nodes
        • Basic Frame Relay with More Than Two Nodes
        • Frame Relay Subinterfaces
      • Troubleshooting Frame Relay
    • 24. MPLS
    • 25. Access Lists
      • Designing Access Lists
        • Named Versus Numbered
        • Wildcard Masks
        • Where to Apply Access Lists
        • Naming Access Lists
        • Top-Down Processing
        • Most-Used on Top
        • Using Groups in ASA and PIX ACLs
        • Deleting ACLs
        • Turbo ACLs
        • Allowing Outbound Traceroute and Ping
        • Allowing MTU Path Discovery Packets
      • ACLs in Multilayer Switches
        • Configuring Port ACLs
        • Configuring Router ACLs
        • Configuring VLAN Maps
      • Reflexive Access Lists
        • Configuring Reflexive Access Lists
    • 26. Authentication in Cisco Devices
      • Basic (Non-AAA) Authentication
        • Line Passwords
        • Configuring Local Users
        • PPP Authentication
          • PAP
            • One-way authentication
            • Two-way authentication
            • Debugging PPP authentication
          • CHAP
            • One-way authentication
            • Two-way authentication
            • Changing the sent hostname
      • AAA Authentication
        • Enabling AAA
        • Configuring Security Server Information
          • Default RADIUS and TACACS+ server groups
          • Custom groups
        • Creating Method Lists
          • IOS login authentication
          • NX-OS login authentication
          • PPP authentication
        • Applying Method Lists
    • 27. Basic Firewall Theory
      • Best Practices
      • The DMZ
        • Another DMZ Example
        • Multiple DMZ Example
      • Alternate Designs
    • 28. ASA Firewall Configuration
      • Contexts
      • Interfaces and Security Levels
      • Names
      • Object Groups
      • Inspects
      • Managing Contexts
        • Context Types
        • The Classifier
          • No shared interfaces
          • Shared outside interfaces
          • Shared inside interface
          • Sharing inside and outside interfaces
          • Cascading contexts
        • Configuring Contexts
        • Interfaces and Contexts
        • Write Mem Behavior
      • Failover
        • Failover Terminology
        • Understanding Failover
        • Configuring FailoverActive/Standby
        • Monitoring Failover
        • Configuring FailoverActive/Active
      • NAT
        • NAT Commands
        • NAT Examples
          • Simple PAT using the outside interface
          • Simple PAT using a dedicated IP address
          • Simple PAT with public servers on the inside
          • Port redirection
          • DMZ
      • Miscellaneous
        • Remote Access
        • Saving Configuration Changes
        • Logging
      • Troubleshooting
    • 29. Wireless
      • Wireless Standards
      • Security
      • Configuring a WAP
        • MAC Address Filtering
      • Troubleshooting
    • 30. VoIP
      • How VoIP Works
        • Protocols
        • Telephony Terms
        • Cisco Telephony Terms
        • Common Issues with VoIP
          • Latency
          • Packet loss
          • Jitter
      • Small-Office VoIP Example
        • VLANs
        • Switch Ports
        • QoS on the CME Router
        • DHCP for Phones
        • TFTP Service
        • Telephony Service
        • Dial Plan
        • Voice Ports
        • Configuring Phones
          • Ephone-DN
          • Paging
          • Ephone
          • PTT
          • Message waiting lamps
        • Dial Peers
          • POTS
          • VoIP
          • Dial-peer pattern matching
            • Outbound dial peers
            • Inbound dial peers
        • SIP
          • SIP and NAT
      • Troubleshooting
        • Phone Registration
        • TFTP
        • Dial Peer
        • SIP
    • 31. Introduction to QoS
      • Types of QoS
      • QoS Mechanics
        • Priorities
        • Flavors of QoS
          • Traffic-shaping theory
      • Common QoS Misconceptions
        • QoS Carves Up a Link into Smaller Logical Links
        • QoS Limits Bandwidth
        • QoS Resolves a Need for More Bandwidth
        • QoS Prevents Packets from Being Dropped
        • QoS Will Make You More Attractive to the Opposite Sex
    • 32. Designing QoS
      • LLQ Scenario
        • Protocols
        • Priorities
        • Determine Bandwidth Requirements
      • Configuring the Routers
        • Class Maps
        • Policy Maps
        • Service Policies
      • Traffic-Shaping Scenarios
        • Scenario 1: Ethernet Handoff
        • Scenario 2: Frame Relay Speed Mismatch
          • Traffic-shaping terminology
    • 33. The Congested Network
      • Determining Whether the Network Is Congested
      • Resolving the Problem
    • 34. The Converged Network
      • Configuration
      • Monitoring QoS
      • Troubleshooting a Converged Network
        • Incorrect Queue Configuration
        • Priority Queue Too Small
        • Priority Queue Too Large
        • Nonpriority Queue Too Small
        • Nonpriority Queue Too Large
        • Default Queue Too Small
        • Default Queue Too Large
    • 35. Designing Networks
      • Documentation
        • Requirements Documents
        • Port Layout Spreadsheets
        • IP and VLAN Spreadsheets
        • Bay Face Layouts
        • Power and Cooling Requirements
        • Tips for Network Diagrams
      • Naming Conventions for Devices
      • Network Designs
        • Corporate Networks
          • Three-tiered architecture
          • Collapsed coreno distribution
          • Collapsed coreno distribution or access
          • Configuration concerns
            • Trunks
            • EtherChannels
            • Spanning tree
            • VTP
            • VLANs
        • Ecommerce Websites
        • Modern Virtual Server Environments
        • Small Networks
    • 36. IP Design
      • Public Versus Private IP Space
      • VLSM
      • CIDR
      • Allocating IP Network Space
      • Allocating IP Subnets
        • Sequential
        • Divide by Half
        • Reverse Binary
      • IP Subnetting Made Easy
    • 37. IPv6
      • Addressing
        • Subnet Masks
        • Address Types
        • Subnetting
        • NAT
      • Simple Router Configuration
    • 38. Network Time Protocol
      • What Is Accurate Time?
      • NTP Design
      • Configuring NTP
        • NTP Client
        • NTP Server
    • 39. Failures
      • Human Error
      • Multiple Component Failure
      • Disaster Chains
      • No Failover Testing
      • Troubleshooting
        • Remain Calm
        • Log Your Actions
        • Find Out What Changed
        • Check the Physical Layer First!
        • Assume Nothing; Prove Everything
        • Isolate the Problem
        • Dont Look for Zebras
        • Do a Physical Audit
        • Escalate
        • Troubleshooting in a Team Environment
        • The Janitor Principle
    • 40. GADs Maxims
      • Maxim #1
        • Politics
        • Money
        • The Right Way to Do It
      • Maxim #2
        • Simplify
        • Standardize
        • Stabilize
      • Maxim #3
        • Lower Costs
        • Increase Performance or Capacity
        • Increase Reliability
    • 41. Avoiding Frustration
      • Why Everything Is Messed Up
      • How to Sell Your Ideas to Management
      • When to Upgrade and Why
        • The Dangers of Upgrading
        • Valid Reasons to Upgrade
      • Why Change Control Is Your Friend
      • How Not to Be a Computer Jerk
        • Behavioral
        • Environmental
        • Leadership and Mentoring
    • Index
    • About the Author
    • Colophon
    • SPECIAL OFFER: Upgrade this ebook with OReilly

Dodaj do koszyka Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.