图书介绍
Cisco高级路由器配置技术 英文版PDF|Epub|txt|kindle电子书版本网盘下载
![Cisco高级路由器配置技术 英文版](https://www.shukui.net/cover/19/31455199.jpg)
- Laura Chappell编 著
- 出版社: 北京:清华大学出版社
- ISBN:7302010943
- 出版时间:2000
- 标注页数:644页
- 文件大小:36MB
- 文件页数:665页
- 主题词:
PDF下载
下载说明
Cisco高级路由器配置技术 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
PART 1 OVERVIEW OF SCALABLE INTERNETWORKS3
Chapter 1 Overview of Scalable Internetworks3
Scaling Large Internetworks3
Defining the Router s Role in a Hierarchy5
Key Characteristics of Scalable Internetworks7
Making the Network Reliable and Available7
Making the Network Responsive9
Making the Network Efficient11
Making the Network Adaptable14
Making the Network Accessible but Secure15
Summary18
PART 2 INTRODUCTION TO MANAGING TRAFFIC AND ACCESS23
Chapter 2 Introduction to Managing Traffic and Congestion23
Congestion Overview23
Traffic in an IP Network24
Traffic in an IPX Network25
Other Traffic in a Multiprotocol Network26
Managing Traffic Congestion26
Adjusting Timers on Periodic Announcements27
Providing Static Entries in Tables27
Filtering Broadcast Traffic27
Filtering User and Application Traffic27
Prioritizing Traffic28
Summary28
Chapter 3 Managing IP Traffic31
Traffic Management Techniques32
IP Access Lists32
Helper Addressing34
Configuring IP Standard Access Lists34
Inbound Access List Processing35
Outbound Access List Processing36
IP Addressing Review37
Access Lists Use Wildcard Mask39
Access List Configuration Tasks40
Standard Access List Commands40
Implicit Masks42
Configuring Principles for Access Lists43
Standard Access List Example45
Location of Standard Access Lists46
Restricting Virtual Terminal Access47
How to Control vty Access47
Virtual Terminal Line Commands48
Virtual Terminal Access Example49
Configuring Extended Access Lists49
Extended Access List Processing50
Extended IP Access List Command51
Extended Access List Examples60
Configuring Named Access Lists61
Implementation Considerations62
Named Access List Example63
Location of Extended Access Lists64
Verifying Access List Configurations64
Using an Alternative to Access Lists65
Configuring Null Interface66
Null Interface Command66
Using Helper Addresses68
Server Location69
IP Helper Address Commands70
Helper Address Examples72
Summary75
Chapter 4 Managing Novell IPX/SPX Traffic83
Novell IPX/SPX Overview83
IPX Addressing85
Managing IPX/SPX Traffic86
IPX Traffic Filtering88
IPX Traffic Filtering Overview88
IPX Access List Commands89
IPX SAP Overview92
SAP Operation94
SAP Filters95
SAP Filter Configuration95
SAP Filtering Examples97
Filtering RIP Traffic101
SAP/GNS Operation102
Connecting IPX Networks Using IP Tunnels108
Configuring and IP Tunnel Interface108
IP Tunnel Configuration Example110
Verifying IPX Traffic Operation111
Summary112
Chapter 5 Configuring Queuing to Manage Traffic117
Queuing Overview117
Traffic Prioritization118
Establishing a Queuing Policy119
Choosing a Cisco IOS Queuing Option120
Primary Differences Between the Queuing Options122
Weighted Fair Queuing Overview123
Weighted Fair Queuing Operation124
Weighted Fair Queue Example125
Priority Queuing Overview126
Priority Queuing Operation127
Priority Queuing Configuration Tasks129
Priority List Configuration Commands130
Priority Queuing Example133
Custom Queuing Overview135
Custom Queuing Operation137
Custom Queuing Configuration Tasks138
Custom Queue Configuration Commands139
Custom Queuing Examples143
Verifying Queuing Operation145
Summary146
What Is Routing?151
Chapter 6 Routing Protocol Overview151
PART 3 CONFIGURING SCALABLE ROUTING PROTOCOLS151
Comparing Routing Protocols152
Using Convergence153
Discovering Routes154
Selecting a Route156
Maintaining Routing Information157
Summary158
Chapter 7 Extending IP Addresses Using VLSMs (Variable-Length Subnet Masks)161
IP Address Issues and Solutions161
Using Addressing Hierarchies162
Slowing IP Address Depletion163
Variable-Length Subnet Masks164
Variable-Length Subnet Mask Overview165
Classless and Classful Updates165
Calculating VLSMs167
VLSM Example170
Route Summarization Overview171
What Is Route Summarization?171
Summarizing Within an Octer172
Summarizing Addresses in a VLSM-Designed Network173
Route Summarization Implementation Considerations174
Using Private Addressing177
Other Addressing Considerations177
Translating Inside Local Addresses179
Summary181
Chapter 8 Configuring OSPF in a Single Area185
OSPF Overview185
Steps to OSPF Operation188
Step 1:Establishing Router Adjacencies188
Step 2: Electing the DR and BDR192
Step 3:Discovering Routes194
Step 4:Choosing Routes195
Step 5:Maintaining Routing Information197
Configuring OSPF on Routers Within a Single Area199
Basic Configuration Steps200
Optional Configuration Commands201
Verifying OSPF Operation203
Summary205
Chapter 9 Interconnecting Multiple OSPF Areas209
Creating Multiple OSPF Areas209
OSPF Hierarchical Routing210
OSPF Multi-Area Components211
Configuring OSPF Operation Across Multiple Areas216
Forwarding Packets in a Multi-Area Network218
Flooding LSUs to Multiple Areas219
Updating the Routing Table220
Using and Configuring OSPF Multi-Area Components221
Configuring OSPF ABRs221
Using Route Summarization222
Configuring Route Summarization224
Using Stub and Totally Stubby Areas226
Meeting the Backbone Area Requirements232
Creating a Virtual Link232
Configuring Virtual Links234
OSPF Virtual Link Configuration Example235
Verifying OSPF Operation236
Summary237
Enhanced IGRP Overview241
Chapter 10 Configuring Enhanced IGRP241
EIGRP Support for Novell IPX RIP and SAP242
EIGRP Support for AppleTalk243
EIGRP Terminology244
Enhanced IGRP Operation244
Building the Neighbor Table245
Discovering Routes246
Choosing Routes247
Maintaining Routes250
Configuring EIGRP for IP253
Configuring EIGRP253
Configuring EIGRP Support for IPX255
Summarizing EIGRP Routes for IP258
Verifying Enhanced IGRP Operation259
Summary261
Chapter 11 Optimizing Routing Update Operation263
Controlling Routing Update Traffic263
Using and Configuring the passive-interface Command265
Using and Configuring Default Routes265
Using and Configuring Static Routes267
Using and Configuring Route Filters270
IPX Route Filtering Configuration Example272
Using Multiple Routing Protocols273
What Is Redistribution?274
Redistribution Implementation Considerations275
Selecting the Best Path276
What Protocol to Believe?276
Redistribution Guidelines278
Redistribution and EIGRP280
Using and Configuring Redistribution280
Modifying Administrative Distance (Optional)284
IP Route Filtering Configuration Example285
IP Static Route Filtering Configuration Example286
Redistribution Example Using ip default-network287
Redistribution Example Using distance290
Verifying Redistribution Operation297
Summary297
Chapter 12 Connecting Enterprises to an Internet Service Provider301
BGP and ISP Connectivity Basics301
When Not to Use BGP302
Policy Drives BGP Requirements303
BGP Sessions304
Static Route Command Review305
Connecting to an ISP Using BGP and Alternatives305
BGP Operation305
RIP Static Route Example306
OSPF Example307
BGP Configuration Commands307
BGP Configuration Example309
Verifying BGP Operation With the Show Commands310
Summary310
Integrated Services Digital Network (ISDN) BRI311
PART 4 CONFIGURING DIALUP CONNECTIVITY315
Chapter 13 WAN Connectivity Overview315
WAN Connectivity Options315
Dedicated Connectivity316
Asynchronous Dial-In Connectivity317
Dial-on-Demand Routing318
Packet-Switched Services320
WAN Encapsulation Protocols324
Connection Considerations326
Summary327
Chapter 14 Configuring Dial-on-Demand Routing331
ISDN Standards332
ISDN Access Options333
ISDN Encapsulation Options334
ISDN Functions335
Selecting a Cisco Router: Considerations338
ISDN Switch Types339
Configuring ISDN BRI340
Dial-on-Demand Routing341
Generic DDR Operation343
Selecting a DDR Implementation344
Legacy DDR346
Configuring Legacy DDR346
Task 1: Specifying Interesting Traffic (What Enables the Connection?)346
Task 2: Defining Static Routes (Route to Destination)348
Task 3: Configuring the Dialer Information350
Legacy DDR Configuration Tasks Summarized352
Legacy DDR Optional Commands353
Legacy DDR Using ACLs Configuration Example355
Verifying and Troubleshooting Legacy DDR Operation356
Dialer Profiles Overview357
Configuring Dialer Profiles360
Dialer Profiles Configuration Tasks Summarized365
Dialer Profiles Configuration Example367
Verifying Dialer Profiles Operation370
DDR Using Rotary Group Overview370
Configuring Dialer Rotary Groups371
Dialer Rotary Group Configuration Example374
PPP Authentication Overview377
Selecting a PPP Authentication Protocol378
Configuring PPP Authentication381
Optional PPP Authentication Commands382
Summary383
Chapter 15 Customizing DDR Operation387
Dial Backup for Dedicated Connections387
Configuring Dial Backup for Primary Links388
Configuring Dial Backup for Excessive Traffic Load390
MultiLink PPP Operation392
MultiLink PPP Overview392
Configuring MultiLink PPP394
MultiLink PPP Configuration Example394
Verifying MultiLink PPP Operation398
Disabling Overhead Traffic399
Snapshot Routing400
IPX Spoofing408
Summary411
PART 5 INTEGRATING NONROUTED SERVICES417
Chapter 16 Bridging Overview417
Introduction to Bridging417
Nonrouted Protocol Support418
Routing Versus Bridging419
Basic Router/Bridge Operation420
Cisco-Supported Bridging Types420
Transparent Bridging421
Encapsulated Bridging421
Integrated Routing and Bridging422
Source-Route Bridging422
Source-Route Transparent Bridging423
Source-Route Translational Bridging424
Summary425
Transparent Bridging Operation429
Transparent Bridging429
Chapter 17 Configuring Transparent Bridging and Integrated Routing and Bridging429
Transparent Bridging Configuration Tasks435
Verifying Transparent Bridging439
Verifying Spanning Tree Operation440
Integrated Routing and Bridging441
IRB Operation443
BVI Addressing444
Making Bridging or Routing Decisions444
IRB Configuration Tasks446
Configuration Example: IRB and the BVI447
Enabling Routing on a Bridge Group448
IRB Configuration Considerations449
Verifying IRB Operation450
Summary452
Chapter 18 Configuring Source-Route Bridging455
Source-Router Bridging (SRB) Overview455
Source-Route Bridging Operation457
Routing Information Indicator459
Source-Router Bridging Configuration460
SRB Manual Spanning-Tree Configuration Example462
SRB Automatic Spanning-Tree Configuration Example463
Multiport Configuration464
Proxy Explorer Configuration466
Multiring Configuration466
Multiring Configuration Example468
Source-Route Transparent Bridging (SRT) Overview468
SRT Operation469
SRT Configuration Example470
Source-Route Translational Bridging (SR/TLB) Overview470
SR/TLB Configuration Example472
Verifying Source-Route Bridging Operation474
SR/TLB Configuration477
Summary478
Appendix A Chapter Test Answer Key485
Appendixes485
Appendix B Managing AppleTalk Traffic499
AppleTalk Traffic Overview499
AppleTalk Protocol Stack500
AppleTalk Services500
Nonextended/Extended Networks501
Extended AppleTalk Internetwork502
AppleTalk Zones503
AppleTalk Filtering Options503
GetZoneList Filtering505
ZIP Reply Filtering509
RTMP Filtering513
NBP Filtering518
Summary522
Appendix C Configuring NetWare Link Services Protocol523
Configuring NLSP523
NLSP Operation524
NLSP Configuration Commands527
NLSP Configuration Example530
Verifying NLSP Operation531
Summary533
Configuring T1 and E1535
Appendix D Configuring T1/E1 and ISDN PRI Options535
Channelized T1/E1 Configuration Commands538
Channelized T1 Configuration Example540
Channelized E1 Configuration542
Channelized E1 Configuration Example542
Configuring Primary Rate Interface544
ISDN PRI Configuration Commands545
T1/E1 Controller Options for PRI546
ISDN PRI Configuration547
PRI Configuration Example548
Summary549
Overview of Switched Multimegabit Data Service (SMDS)551
Appendix E Configuring SMDS551
SMDS Configuration Tasks553
SMDS Configuration Commands554
SMDS Configuration Example555
Summary556
Appendix F Password Recovery557
Theory of Password Recovery557
Password Recovery Technique #1558
Password Recovery Technique #2561
Summary563
Appendix G Glossary565
Index613