图书介绍

Cisco高级路由器配置技术 英文版PDF|Epub|txt|kindle电子书版本网盘下载

Cisco高级路由器配置技术 英文版
  • Laura Chappell编 著
  • 出版社: 北京:清华大学出版社
  • ISBN:7302010943
  • 出版时间:2000
  • 标注页数:644页
  • 文件大小:36MB
  • 文件页数:665页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

Cisco高级路由器配置技术 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

PART 1 OVERVIEW OF SCALABLE INTERNETWORKS3

Chapter 1 Overview of Scalable Internetworks3

Scaling Large Internetworks3

Defining the Router s Role in a Hierarchy5

Key Characteristics of Scalable Internetworks7

Making the Network Reliable and Available7

Making the Network Responsive9

Making the Network Efficient11

Making the Network Adaptable14

Making the Network Accessible but Secure15

Summary18

PART 2 INTRODUCTION TO MANAGING TRAFFIC AND ACCESS23

Chapter 2 Introduction to Managing Traffic and Congestion23

Congestion Overview23

Traffic in an IP Network24

Traffic in an IPX Network25

Other Traffic in a Multiprotocol Network26

Managing Traffic Congestion26

Adjusting Timers on Periodic Announcements27

Providing Static Entries in Tables27

Filtering Broadcast Traffic27

Filtering User and Application Traffic27

Prioritizing Traffic28

Summary28

Chapter 3 Managing IP Traffic31

Traffic Management Techniques32

IP Access Lists32

Helper Addressing34

Configuring IP Standard Access Lists34

Inbound Access List Processing35

Outbound Access List Processing36

IP Addressing Review37

Access Lists Use Wildcard Mask39

Access List Configuration Tasks40

Standard Access List Commands40

Implicit Masks42

Configuring Principles for Access Lists43

Standard Access List Example45

Location of Standard Access Lists46

Restricting Virtual Terminal Access47

How to Control vty Access47

Virtual Terminal Line Commands48

Virtual Terminal Access Example49

Configuring Extended Access Lists49

Extended Access List Processing50

Extended IP Access List Command51

Extended Access List Examples60

Configuring Named Access Lists61

Implementation Considerations62

Named Access List Example63

Location of Extended Access Lists64

Verifying Access List Configurations64

Using an Alternative to Access Lists65

Configuring Null Interface66

Null Interface Command66

Using Helper Addresses68

Server Location69

IP Helper Address Commands70

Helper Address Examples72

Summary75

Chapter 4 Managing Novell IPX/SPX Traffic83

Novell IPX/SPX Overview83

IPX Addressing85

Managing IPX/SPX Traffic86

IPX Traffic Filtering88

IPX Traffic Filtering Overview88

IPX Access List Commands89

IPX SAP Overview92

SAP Operation94

SAP Filters95

SAP Filter Configuration95

SAP Filtering Examples97

Filtering RIP Traffic101

SAP/GNS Operation102

Connecting IPX Networks Using IP Tunnels108

Configuring and IP Tunnel Interface108

IP Tunnel Configuration Example110

Verifying IPX Traffic Operation111

Summary112

Chapter 5 Configuring Queuing to Manage Traffic117

Queuing Overview117

Traffic Prioritization118

Establishing a Queuing Policy119

Choosing a Cisco IOS Queuing Option120

Primary Differences Between the Queuing Options122

Weighted Fair Queuing Overview123

Weighted Fair Queuing Operation124

Weighted Fair Queue Example125

Priority Queuing Overview126

Priority Queuing Operation127

Priority Queuing Configuration Tasks129

Priority List Configuration Commands130

Priority Queuing Example133

Custom Queuing Overview135

Custom Queuing Operation137

Custom Queuing Configuration Tasks138

Custom Queue Configuration Commands139

Custom Queuing Examples143

Verifying Queuing Operation145

Summary146

What Is Routing?151

Chapter 6 Routing Protocol Overview151

PART 3 CONFIGURING SCALABLE ROUTING PROTOCOLS151

Comparing Routing Protocols152

Using Convergence153

Discovering Routes154

Selecting a Route156

Maintaining Routing Information157

Summary158

Chapter 7 Extending IP Addresses Using VLSMs (Variable-Length Subnet Masks)161

IP Address Issues and Solutions161

Using Addressing Hierarchies162

Slowing IP Address Depletion163

Variable-Length Subnet Masks164

Variable-Length Subnet Mask Overview165

Classless and Classful Updates165

Calculating VLSMs167

VLSM Example170

Route Summarization Overview171

What Is Route Summarization?171

Summarizing Within an Octer172

Summarizing Addresses in a VLSM-Designed Network173

Route Summarization Implementation Considerations174

Using Private Addressing177

Other Addressing Considerations177

Translating Inside Local Addresses179

Summary181

Chapter 8 Configuring OSPF in a Single Area185

OSPF Overview185

Steps to OSPF Operation188

Step 1:Establishing Router Adjacencies188

Step 2: Electing the DR and BDR192

Step 3:Discovering Routes194

Step 4:Choosing Routes195

Step 5:Maintaining Routing Information197

Configuring OSPF on Routers Within a Single Area199

Basic Configuration Steps200

Optional Configuration Commands201

Verifying OSPF Operation203

Summary205

Chapter 9 Interconnecting Multiple OSPF Areas209

Creating Multiple OSPF Areas209

OSPF Hierarchical Routing210

OSPF Multi-Area Components211

Configuring OSPF Operation Across Multiple Areas216

Forwarding Packets in a Multi-Area Network218

Flooding LSUs to Multiple Areas219

Updating the Routing Table220

Using and Configuring OSPF Multi-Area Components221

Configuring OSPF ABRs221

Using Route Summarization222

Configuring Route Summarization224

Using Stub and Totally Stubby Areas226

Meeting the Backbone Area Requirements232

Creating a Virtual Link232

Configuring Virtual Links234

OSPF Virtual Link Configuration Example235

Verifying OSPF Operation236

Summary237

Enhanced IGRP Overview241

Chapter 10 Configuring Enhanced IGRP241

EIGRP Support for Novell IPX RIP and SAP242

EIGRP Support for AppleTalk243

EIGRP Terminology244

Enhanced IGRP Operation244

Building the Neighbor Table245

Discovering Routes246

Choosing Routes247

Maintaining Routes250

Configuring EIGRP for IP253

Configuring EIGRP253

Configuring EIGRP Support for IPX255

Summarizing EIGRP Routes for IP258

Verifying Enhanced IGRP Operation259

Summary261

Chapter 11 Optimizing Routing Update Operation263

Controlling Routing Update Traffic263

Using and Configuring the passive-interface Command265

Using and Configuring Default Routes265

Using and Configuring Static Routes267

Using and Configuring Route Filters270

IPX Route Filtering Configuration Example272

Using Multiple Routing Protocols273

What Is Redistribution?274

Redistribution Implementation Considerations275

Selecting the Best Path276

What Protocol to Believe?276

Redistribution Guidelines278

Redistribution and EIGRP280

Using and Configuring Redistribution280

Modifying Administrative Distance (Optional)284

IP Route Filtering Configuration Example285

IP Static Route Filtering Configuration Example286

Redistribution Example Using ip default-network287

Redistribution Example Using distance290

Verifying Redistribution Operation297

Summary297

Chapter 12 Connecting Enterprises to an Internet Service Provider301

BGP and ISP Connectivity Basics301

When Not to Use BGP302

Policy Drives BGP Requirements303

BGP Sessions304

Static Route Command Review305

Connecting to an ISP Using BGP and Alternatives305

BGP Operation305

RIP Static Route Example306

OSPF Example307

BGP Configuration Commands307

BGP Configuration Example309

Verifying BGP Operation With the Show Commands310

Summary310

Integrated Services Digital Network (ISDN) BRI311

PART 4 CONFIGURING DIALUP CONNECTIVITY315

Chapter 13 WAN Connectivity Overview315

WAN Connectivity Options315

Dedicated Connectivity316

Asynchronous Dial-In Connectivity317

Dial-on-Demand Routing318

Packet-Switched Services320

WAN Encapsulation Protocols324

Connection Considerations326

Summary327

Chapter 14 Configuring Dial-on-Demand Routing331

ISDN Standards332

ISDN Access Options333

ISDN Encapsulation Options334

ISDN Functions335

Selecting a Cisco Router: Considerations338

ISDN Switch Types339

Configuring ISDN BRI340

Dial-on-Demand Routing341

Generic DDR Operation343

Selecting a DDR Implementation344

Legacy DDR346

Configuring Legacy DDR346

Task 1: Specifying Interesting Traffic (What Enables the Connection?)346

Task 2: Defining Static Routes (Route to Destination)348

Task 3: Configuring the Dialer Information350

Legacy DDR Configuration Tasks Summarized352

Legacy DDR Optional Commands353

Legacy DDR Using ACLs Configuration Example355

Verifying and Troubleshooting Legacy DDR Operation356

Dialer Profiles Overview357

Configuring Dialer Profiles360

Dialer Profiles Configuration Tasks Summarized365

Dialer Profiles Configuration Example367

Verifying Dialer Profiles Operation370

DDR Using Rotary Group Overview370

Configuring Dialer Rotary Groups371

Dialer Rotary Group Configuration Example374

PPP Authentication Overview377

Selecting a PPP Authentication Protocol378

Configuring PPP Authentication381

Optional PPP Authentication Commands382

Summary383

Chapter 15 Customizing DDR Operation387

Dial Backup for Dedicated Connections387

Configuring Dial Backup for Primary Links388

Configuring Dial Backup for Excessive Traffic Load390

MultiLink PPP Operation392

MultiLink PPP Overview392

Configuring MultiLink PPP394

MultiLink PPP Configuration Example394

Verifying MultiLink PPP Operation398

Disabling Overhead Traffic399

Snapshot Routing400

IPX Spoofing408

Summary411

PART 5 INTEGRATING NONROUTED SERVICES417

Chapter 16 Bridging Overview417

Introduction to Bridging417

Nonrouted Protocol Support418

Routing Versus Bridging419

Basic Router/Bridge Operation420

Cisco-Supported Bridging Types420

Transparent Bridging421

Encapsulated Bridging421

Integrated Routing and Bridging422

Source-Route Bridging422

Source-Route Transparent Bridging423

Source-Route Translational Bridging424

Summary425

Transparent Bridging Operation429

Transparent Bridging429

Chapter 17 Configuring Transparent Bridging and Integrated Routing and Bridging429

Transparent Bridging Configuration Tasks435

Verifying Transparent Bridging439

Verifying Spanning Tree Operation440

Integrated Routing and Bridging441

IRB Operation443

BVI Addressing444

Making Bridging or Routing Decisions444

IRB Configuration Tasks446

Configuration Example: IRB and the BVI447

Enabling Routing on a Bridge Group448

IRB Configuration Considerations449

Verifying IRB Operation450

Summary452

Chapter 18 Configuring Source-Route Bridging455

Source-Router Bridging (SRB) Overview455

Source-Route Bridging Operation457

Routing Information Indicator459

Source-Router Bridging Configuration460

SRB Manual Spanning-Tree Configuration Example462

SRB Automatic Spanning-Tree Configuration Example463

Multiport Configuration464

Proxy Explorer Configuration466

Multiring Configuration466

Multiring Configuration Example468

Source-Route Transparent Bridging (SRT) Overview468

SRT Operation469

SRT Configuration Example470

Source-Route Translational Bridging (SR/TLB) Overview470

SR/TLB Configuration Example472

Verifying Source-Route Bridging Operation474

SR/TLB Configuration477

Summary478

Appendix A Chapter Test Answer Key485

Appendixes485

Appendix B Managing AppleTalk Traffic499

AppleTalk Traffic Overview499

AppleTalk Protocol Stack500

AppleTalk Services500

Nonextended/Extended Networks501

Extended AppleTalk Internetwork502

AppleTalk Zones503

AppleTalk Filtering Options503

GetZoneList Filtering505

ZIP Reply Filtering509

RTMP Filtering513

NBP Filtering518

Summary522

Appendix C Configuring NetWare Link Services Protocol523

Configuring NLSP523

NLSP Operation524

NLSP Configuration Commands527

NLSP Configuration Example530

Verifying NLSP Operation531

Summary533

Configuring T1 and E1535

Appendix D Configuring T1/E1 and ISDN PRI Options535

Channelized T1/E1 Configuration Commands538

Channelized T1 Configuration Example540

Channelized E1 Configuration542

Channelized E1 Configuration Example542

Configuring Primary Rate Interface544

ISDN PRI Configuration Commands545

T1/E1 Controller Options for PRI546

ISDN PRI Configuration547

PRI Configuration Example548

Summary549

Overview of Switched Multimegabit Data Service (SMDS)551

Appendix E Configuring SMDS551

SMDS Configuration Tasks553

SMDS Configuration Commands554

SMDS Configuration Example555

Summary556

Appendix F Password Recovery557

Theory of Password Recovery557

Password Recovery Technique #1558

Password Recovery Technique #2561

Summary563

Appendix G Glossary565

Index613

热门推荐