Foreword |
|
xxvii | |
Introduction |
|
xxviii | |
|
Part I Introduction to Scalable Networks |
|
|
3 | (54) |
|
|
5 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
5 | (5) |
|
|
10 | (21) |
|
Building Scalable Networks |
|
|
10 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Hierarchical Design Model |
|
|
13 | (2) |
|
Enterprise Composite Network Model |
|
|
15 | (3) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
Phase 1: Integrated Transport |
|
|
22 | (1) |
|
Phase 2: Integrated Services |
|
|
22 | (1) |
|
Phase 3: Integrated Applications |
|
|
23 | (1) |
|
Services-Oriented Network Architecture |
|
|
23 | (2) |
|
Comparing Routing Protocols |
|
|
25 | (1) |
|
Distance Vector and Link State Routing Protocols |
|
|
25 | (1) |
|
Classless and Glassful Routing |
|
|
26 | (1) |
|
Interior and Exterior Gateway Protocols |
|
|
27 | (1) |
|
|
28 | (1) |
|
Proprietary and Open Protocols |
|
|
28 | (1) |
|
Summarizing Routing Protocol Characteristics |
|
|
29 | (2) |
|
|
31 | (4) |
|
|
35 | (2) |
|
IP Address Planning and Summarization |
|
|
37 | (20) |
|
``Do I Know This Already?'' Quiz |
|
|
37 | (4) |
|
|
41 | (11) |
|
Understanding IP Addresses |
|
|
41 | (1) |
|
|
41 | (1) |
|
Reviewing Binary Numbering Fundamentals |
|
|
41 | (2) |
|
Calculating Classfully Assumed Network Ranges |
|
|
43 | (1) |
|
Calculating Network Ranges Using Subnet Masks |
|
|
44 | (2) |
|
Understanding Summarization |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (2) |
|
|
50 | (2) |
|
|
52 | (2) |
|
|
54 | (3) |
|
|
57 | (64) |
|
|
59 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
59 | (4) |
|
|
63 | (20) |
|
EIGRP Features and Advantages |
|
|
63 | (1) |
|
Neighborship and Reliable Incremental Updates |
|
|
63 | (1) |
|
Neighbor Discovery and Recovery |
|
|
64 | (1) |
|
|
64 | (2) |
|
|
66 | (4) |
|
|
70 | (1) |
|
Additional EIGRP Advantages |
|
|
70 | (1) |
|
|
71 | (1) |
|
Multicast Addressing for Updates |
|
|
71 | (1) |
|
Unequal-Cost Load Sharing |
|
|
71 | (1) |
|
Understanding EIGRP Tables |
|
|
72 | (1) |
|
Creating the Neighbor Table |
|
|
72 | (1) |
|
Contents of the Neighbor Table |
|
|
72 | (1) |
|
|
73 | (1) |
|
Creating the Topology Table |
|
|
73 | (1) |
|
Maintaining the Topology Table |
|
|
74 | (1) |
|
Adding a Network to the Topology Table |
|
|
75 | (1) |
|
Removing a Path or Router from the Topology Table |
|
|
76 | (1) |
|
Finding an Alternative Path to a Remote Network |
|
|
76 | (1) |
|
Creating the Routing Table |
|
|
77 | (1) |
|
|
77 | (1) |
|
Updating the Routing Table in Passive Mode with DUAL |
|
|
78 | (1) |
|
Updating the Routing Table in Active Mode with DUAL |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Guideline to Address Scaling Issues |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (34) |
|
``Do I Know This Already?'' Quiz |
|
|
87 | (4) |
|
|
91 | (19) |
|
|
91 | (1) |
|
Required Commands for Configuring EIGRP |
|
|
91 | (3) |
|
Optional Commands for Configuring EIGRP |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
Optional EIGRP Commands over WANs |
|
|
102 | (1) |
|
EIGRP Defaults in Bandwidth Utilization |
|
|
102 | (2) |
|
Configuring the Pure Point-to-Point Network |
|
|
104 | (1) |
|
Verifying the EIGRP Operation |
|
|
105 | (1) |
|
The show ip eigrp neighbors Command |
|
|
105 | (1) |
|
The show ip eigrp topology Command |
|
|
106 | (2) |
|
The show ip eigrp traffic Command |
|
|
108 | (1) |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (2) |
|
|
114 | (4) |
|
|
114 | (1) |
|
|
115 | (3) |
|
|
118 | (3) |
|
|
118 | (1) |
|
|
119 | (2) |
|
|
121 | (126) |
|
Understanding Simple Single-Area OSPF |
|
|
123 | (40) |
|
``Do I Know This Already?'' Quiz |
|
|
123 | (5) |
|
|
128 | (28) |
|
Understanding OSPF Fundamentals |
|
|
128 | (1) |
|
|
128 | (2) |
|
Neighbors and Adjacencies |
|
|
130 | (3) |
|
Designated Router and Backup Designated Router |
|
|
133 | (4) |
|
|
137 | (1) |
|
Problems with OSPF in a Single Area |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
Configuring OSPF in a Single Area |
|
|
139 | (1) |
|
Required Commands for Configuring OSPF Within a Single Area |
|
|
139 | (1) |
|
Enabling the OSPF Routing Protocol |
|
|
139 | (1) |
|
|
140 | (1) |
|
Configuration Options for an Internal Router |
|
|
141 | (1) |
|
Defining the Router ID and Loopback Interfaces |
|
|
141 | (1) |
|
Changing the Default Cost |
|
|
142 | (1) |
|
Determining the Designated Router Using the priority Command |
|
|
143 | (1) |
|
A Working Configuration of OSPF on a Single Router |
|
|
143 | (1) |
|
Checking the Configuration of Single-Area OSPF |
|
|
144 | (1) |
|
|
144 | (2) |
|
The show ip ospf database Command |
|
|
146 | (1) |
|
The show ip ospf interface Command |
|
|
147 | (3) |
|
The show ip ospf neighbor Command |
|
|
150 | (2) |
|
The show ip protocols Command |
|
|
152 | (2) |
|
The show ip route Command |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (3) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (2) |
|
|
161 | (2) |
|
|
163 | (16) |
|
``Do I Know This Already?'' Quiz |
|
|
163 | (5) |
|
|
168 | (8) |
|
OSPF Network Topology Options |
|
|
168 | (1) |
|
Understanding the Differences Between OSPF Network Types |
|
|
169 | (1) |
|
Designated Routers and Topology Support |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
Configuring OSPF in a Nonbroadcast Environment |
|
|
172 | (1) |
|
Configuring OSPF with the Nonbroadcast OSPF Network Type |
|
|
173 | (1) |
|
Configuring the OSPF Point-to-Multipoint Network Type |
|
|
174 | (1) |
|
Configuring OSPF with the Broadcast Network Type |
|
|
174 | (1) |
|
Configuring OSPF with the Point-to-Point Network Type on a Frame Relay Subinterface |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
Using OSPF Across Multiple Areas |
|
|
179 | (52) |
|
``Do I Know This Already?'' Quiz |
|
|
179 | (7) |
|
|
186 | (30) |
|
The Purpose of Multi-area OSPF |
|
|
186 | (1) |
|
The Features of Multi-area OSPF |
|
|
186 | (1) |
|
|
187 | (1) |
|
Link-State Advertisements |
|
|
187 | (1) |
|
|
188 | (1) |
|
The Operation of Multi-area OSPF |
|
|
189 | (1) |
|
|
189 | (1) |
|
OSPF Path Selection Between Areas |
|
|
190 | (1) |
|
Calculating the Cost of a Path to Another Area |
|
|
191 | (1) |
|
Design Considerations in Multi-area OSPF |
|
|
192 | (1) |
|
Capacity Planning in OSPF |
|
|
192 | (2) |
|
Number of Neighbors per Router |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (2) |
|
Multi-area OSPF Over an NBMA Network |
|
|
196 | (1) |
|
Required Configuration Commands for a Multi-area OSPF Network |
|
|
196 | (1) |
|
Enabling the OSPF Routing Protocol |
|
|
196 | (1) |
|
Enabling the network Command |
|
|
197 | (1) |
|
Optional Configuration Commands for a Multi-area OSPF Network |
|
|
198 | (1) |
|
|
199 | (1) |
|
The summary-address Command |
|
|
200 | (1) |
|
|
201 | (1) |
|
The area area-id stub no-summary Command |
|
|
202 | (2) |
|
The area default-cost Command |
|
|
204 | (1) |
|
The area virtual-link Command |
|
|
205 | (2) |
|
Working Configuration of Multi-area OSPF |
|
|
207 | (1) |
|
Verifying the Configuration of OSPF in a Multi-area Network |
|
|
208 | (1) |
|
The show ip ospf border-routers Command |
|
|
208 | (1) |
|
The show ip route Command |
|
|
209 | (1) |
|
The show ip ospf virtual-links Command |
|
|
210 | (1) |
|
The show ip ospf database Command |
|
|
211 | (1) |
|
Troubleshooting a Multi-area OSPF Network |
|
|
212 | (1) |
|
The log-adjacency-changes Command |
|
|
213 | (1) |
|
|
214 | (1) |
|
The debug ip packet Command |
|
|
214 | (1) |
|
The debug ip ospf events Command |
|
|
214 | (1) |
|
Common Problems with Adjacencies |
|
|
215 | (1) |
|
|
216 | (2) |
|
|
218 | (2) |
|
|
220 | (5) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (3) |
|
|
225 | (6) |
|
|
225 | (1) |
|
|
225 | (3) |
|
|
228 | (3) |
|
|
231 | (16) |
|
``Do I Know This Already?' Quiz |
|
|
231 | (3) |
|
|
234 | (10) |
|
|
234 | (2) |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
Configuring OSPF Authentication |
|
|
241 | (1) |
|
Plaintext Password Authentication |
|
|
242 | (1) |
|
Message Digest Authentication |
|
|
242 | (2) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (72) |
|
Fundamentals of the Integrated IS-IS Protocol |
|
|
249 | (32) |
|
``Do I Know This Already?''Quiz |
|
|
249 | (6) |
|
|
255 | (19) |
|
Introduction to Integrated IS-IS |
|
|
255 | (1) |
|
|
255 | (1) |
|
Network Layer Protocols Used in Integrated IS-IS |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
261 | (1) |
|
ISO Addressing for Integrated IS-IS |
|
|
261 | (2) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
263 | (1) |
|
Basic Principles of Area Routing |
|
|
264 | (1) |
|
|
264 | (2) |
|
Establishing Adjacencies on a Point-to-Point Link |
|
|
266 | (1) |
|
Establishing Adjacencies on a Broadcast Link |
|
|
266 | (1) |
|
Establishing Adjacencies on an NBMA Link |
|
|
266 | (1) |
|
Integrated IS-IS Operation |
|
|
267 | (1) |
|
|
267 | (1) |
|
Sending and Receiving LSPs |
|
|
267 | (2) |
|
Determining Whether the LSP in the Database Is Valid |
|
|
269 | (1) |
|
|
270 | (1) |
|
Integrated IS-IS Design Considerations |
|
|
271 | (1) |
|
Area Design of Integrated IS-IS Routers |
|
|
271 | (1) |
|
|
272 | (1) |
|
Integrated IS-IS NBMA Design Solutions |
|
|
273 | (1) |
|
|
274 | (4) |
|
|
278 | (3) |
|
Configuring Integrated IS-IS |
|
|
281 | (38) |
|
``Do I Know This Already?'' Quiz |
|
|
281 | (4) |
|
|
285 | (22) |
|
Basic Configuration of Integrated IS-IS |
|
|
285 | (1) |
|
Optional Integrated IS-IS Commands |
|
|
286 | (1) |
|
Changing the Router from Level 1-2 |
|
|
286 | (2) |
|
Configuring Summarization |
|
|
288 | (2) |
|
|
290 | (1) |
|
Broadcast Configuration over NBMA |
|
|
290 | (2) |
|
Point-to-Point Configuration over NBMA |
|
|
292 | (2) |
|
Verifying the Integrated IS-IS Operation |
|
|
294 | (1) |
|
The show clns neighbors Command |
|
|
295 | (2) |
|
The show clns interface Command |
|
|
297 | (3) |
|
The show isis database Command |
|
|
300 | (1) |
|
The show isis database detail Command |
|
|
301 | (3) |
|
Troubleshooting the Integrated IS-IS Operation |
|
|
304 | (1) |
|
The show isis spf-log Command |
|
|
304 | (2) |
|
|
306 | (1) |
|
|
307 | (2) |
|
|
309 | (1) |
|
|
310 | (4) |
|
|
310 | (1) |
|
|
311 | (3) |
|
|
314 | (5) |
|
|
314 | (2) |
|
|
316 | (3) |
|
Part V Cisco IOS Routing Features |
|
|
319 | (74) |
|
Implementing Redistribution and Controlling Routing Updates |
|
|
321 | (46) |
|
``Do I Know This Already?'' Quiz |
|
|
321 | (5) |
|
|
326 | (32) |
|
Understanding Redistribution Fundamentals |
|
|
326 | (3) |
|
Understanding the Routing Decisions That Affect Redistribution |
|
|
329 | (1) |
|
Routing Metrics and Redistribution |
|
|
329 | (1) |
|
Path Selection Between Routing Protocols |
|
|
330 | (1) |
|
Potential Problems with Redistribution |
|
|
330 | (1) |
|
Avoiding Routing Loops When Redistributing |
|
|
331 | (2) |
|
Avoiding Suboptimal Routing Decisions When Redistributing |
|
|
333 | (1) |
|
Avoiding Problems with Network Convergence When Redistributing |
|
|
334 | (1) |
|
Exchange of Routing Protocol-Specific Parameters |
|
|
334 | (1) |
|
Controlling Routing Updates During Redistribution |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
338 | (1) |
|
Configuring Redistribution |
|
|
339 | (1) |
|
Redistribution Configuration Syntax |
|
|
340 | (1) |
|
Configuring the Default Metric |
|
|
341 | (1) |
|
Configuring the Default Metric for OSPF, IS-IS, RIP, or BGP |
|
|
342 | (1) |
|
Configuring the Default Metric for EIGRP |
|
|
343 | (1) |
|
Configuring the Administrative Distance |
|
|
344 | (1) |
|
Configuration Commands to Control Routing Updates in Redistribution |
|
|
345 | (1) |
|
Configuring the Passive Interface |
|
|
346 | (1) |
|
Configuring Static Routes |
|
|
346 | (2) |
|
Configuring Default Routes |
|
|
348 | (1) |
|
Redistribution Case Studies |
|
|
348 | (1) |
|
Example 1: Route Redistribution Without Redundant Paths |
|
|
348 | (2) |
|
Example 2: Route Redistribution with Redundant Paths |
|
|
350 | (3) |
|
Example 3: A Default Network in a Redistributed Environment |
|
|
353 | (1) |
|
Controlling Routing Updates with Filtering |
|
|
354 | (2) |
|
Verifying, Maintaining, and Troubleshooting the Redistribution and Filtering Implementation |
|
|
356 | (1) |
|
|
357 | (1) |
|
The Extended ping Command |
|
|
357 | (1) |
|
Using traceroute and Extended ping |
|
|
357 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (2) |
|
|
361 | (2) |
|
|
363 | (4) |
|
|
363 | (4) |
|
Controlling Redistribution with Route Maps |
|
|
367 | (14) |
|
``Do I Know This Already?'' Quiz |
|
|
367 | (4) |
|
|
371 | (6) |
|
|
371 | (1) |
|
Route Map Characteristics |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
The match Commands for Redistribution with Route-Maps |
|
|
374 | (1) |
|
The set Commands for Redistributing with Route-Maps |
|
|
375 | (1) |
|
Monitoring the Configuration of Eoute Maps and Redistribution |
|
|
376 | (1) |
|
|
377 | (2) |
|
|
379 | (2) |
|
Dynamic Host Control Protocol |
|
|
381 | (12) |
|
``Do I Know This Already?'' Quiz |
|
|
381 | (4) |
|
|
385 | (5) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (2) |
|
|
393 | (64) |
|
|
395 | (16) |
|
``Do I Know This Already?'' Quiz |
|
|
395 | (4) |
|
|
399 | (8) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (2) |
|
|
401 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
Connecting to the Internet with BGP |
|
|
402 | (1) |
|
Redundant Connections to the Internet---Multihoming |
|
|
402 | (1) |
|
Receiving Routing Information from the Internet |
|
|
403 | (2) |
|
|
405 | (1) |
|
|
405 | (2) |
|
|
407 | (2) |
|
|
409 | (2) |
|
|
411 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
411 | (4) |
|
|
415 | (9) |
|
Basic BGP Configuration Commands |
|
|
415 | (1) |
|
|
415 | (1) |
|
Identifying Neighbors and Defining Peer Groups |
|
|
415 | (3) |
|
|
418 | (1) |
|
Forcing the Next-Hop Address |
|
|
419 | (1) |
|
Defining the Networks to Be Advertised |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
Managing and Verifying the BGP Configuration |
|
|
421 | (1) |
|
|
422 | (2) |
|
|
424 | (2) |
|
|
426 | (1) |
|
|
427 | (5) |
|
|
427 | (1) |
|
|
428 | (1) |
|
|
429 | (3) |
|
|
432 | (5) |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (3) |
|
Controlling BGP Route Selection |
|
|
437 | (20) |
|
``Do I Know This Already?'' Quiz |
|
|
437 | (5) |
|
|
442 | (9) |
|
|
442 | (1) |
|
Controlling BGP Path Selection |
|
|
443 | (1) |
|
Using the Weight Attribute |
|
|
444 | (1) |
|
Using the Local-Preference Attribute |
|
|
444 | (3) |
|
|
447 | (1) |
|
Verifying the Configuration of Attributes |
|
|
448 | (3) |
|
|
451 | (2) |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
|
455 | (2) |
|
|
455 | (2) |
|
|
457 | (58) |
|
|
459 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
459 | (4) |
|
|
463 | (11) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
465 | (3) |
|
|
468 | (1) |
|
|
468 | (3) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
474 | (1) |
|
|
475 | (2) |
|
|
477 | (16) |
|
``Do I Know This Already?'' Quiz |
|
|
477 | (4) |
|
|
481 | (8) |
|
Data Link Layer Support for Multicast |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
Determining the Current IGMP Version |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (2) |
|
|
489 | (2) |
|
|
491 | (2) |
|
|
493 | (22) |
|
``Do I Know This Already?'' Quiz |
|
|
493 | (5) |
|
|
498 | (13) |
|
The Central Multicast Problem |
|
|
498 | (1) |
|
Routing Multicast Traffic |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
Dense and Sparse Multicast Routing Protocols |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
502 | (2) |
|
|
504 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
Enabling PIM Sparse-Dense Mode |
|
|
505 | (1) |
|
Setting Up Multicast Networking |
|
|
506 | (1) |
|
Enabling Multicast Routing |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
506 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
Verifying Rendezvous Points |
|
|
509 | (1) |
|
Verifying Multicast Routing |
|
|
510 | (1) |
|
|
511 | (2) |
|
|
513 | (2) |
|
|
515 | (56) |
|
Introduction to IPv6 and IPv6 Addressing |
|
|
517 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
517 | (4) |
|
|
521 | (14) |
|
|
521 | (1) |
|
The Need for a Larger Address Space |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
Representing IPv6 Addresses |
|
|
526 | (1) |
|
|
526 | (1) |
|
IPv6 Interface Identifiers |
|
|
527 | (1) |
|
|
528 | (1) |
|
IPv6 Global Aggregatable Unicast Addresses |
|
|
528 | (1) |
|
IPv6 Link-Local Unicast Addresses |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
Stateless Autoconfiguration |
|
|
532 | (1) |
|
DHCPv6 and Stateless DHCPv6 |
|
|
533 | (1) |
|
|
533 | (2) |
|
|
535 | (3) |
|
|
538 | (1) |
|
|
539 | (4) |
|
|
539 | (1) |
|
|
540 | (3) |
|
IPv6 Routing Protocols, Configuration, and Transitioning from IPv4 |
|
|
543 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
543 | (4) |
|
|
547 | (17) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
OSPFv2 and OSPFv3 Similarities |
|
|
548 | (1) |
|
OSPFv2 and OSPFv3 Differences |
|
|
549 | (1) |
|
|
550 | (1) |
|
Configuring and Verifying IPv6 and OSPFv3 |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (2) |
|
Verifying IPv6 and OSPFv3 Configuration |
|
|
554 | (1) |
|
shcav ipv6 route, clear ipv6, and ping ipv6 Commands |
|
|
554 | (1) |
|
show ipv6 interface Command |
|
|
555 | (1) |
|
show ipv6 ospf interface Command |
|
|
555 | (1) |
|
|
556 | (1) |
|
show ipv6 ospf neighbor Command |
|
|
557 | (1) |
|
show ipv6 ospf database Command |
|
|
557 | (2) |
|
Transitioning from IPv4 to IPv6 |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
560 | (1) |
|
|
560 | (1) |
|
IPv6-to-IPv4 (6-W-4) Tunnels |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
564 | (3) |
|
|
567 | (1) |
|
|
568 | (3) |
|
|
568 | (1) |
|
|
569 | (2) |
Appendix A Answers to Chapter ``Do I Know This Already?'' Quizzes and Q&A Sections |
|
571 | (47) |
Index |
|
618 | |
Foreword |
|
xxi | |
Introduction |
|
xxii | |
|
Part I Remote Connectivity Best Practices |
|
|
3 | (162) |
|
Describing Network Requirements |
|
|
5 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
5 | (4) |
|
|
9 | (1) |
|
Describing Network Requirements |
|
|
9 | (1) |
|
Intelligent Information Network |
|
|
9 | (2) |
|
|
11 | (4) |
|
Networked Infrastructure Layer |
|
|
13 | (1) |
|
Interactive Services Layer |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
15 | (12) |
|
Cisco Hierarchical Network Model |
|
|
16 | (1) |
|
Campus Network Architecture |
|
|
17 | (2) |
|
Branch Network Architecture |
|
|
19 | (2) |
|
|
21 | (2) |
|
Enterprise Edge Architecture |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
Remote Connection Requirements in a Converged Network |
|
|
27 | (3) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Integrated Services for Secure Remote Access |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
31 | (2) |
|
Topologies for Teleworker Connectivity |
|
|
33 | (16) |
|
``Do I Know This Already?'' Quiz |
|
|
33 | (3) |
|
|
36 | (1) |
|
Facilitating Remote Connections |
|
|
36 | (4) |
|
|
36 | (1) |
|
Enterprise Architecture Framework |
|
|
37 | (1) |
|
Remote Connection Options |
|
|
38 | (1) |
|
Traditional Layer 2 Connections |
|
|
38 | (1) |
|
Service Provider MPLS VPN |
|
|
39 | (1) |
|
Site-to-Site VPN over Public Internet |
|
|
39 | (1) |
|
Challenges of Connecting Teleworkers |
|
|
40 | (6) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (2) |
|
Traditional Teleworker versus Business-Ready Teleworker |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (2) |
|
Using Cable to Connect to a Central Site |
|
|
49 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
49 | (5) |
|
|
54 | (1) |
|
Cable Access Technologies |
|
|
54 | (5) |
|
Cable Technology Terminology |
|
|
54 | (2) |
|
|
56 | (1) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (3) |
|
Digital Signals over RF Channels |
|
|
61 | (1) |
|
|
62 | (4) |
|
Hybrid Fiber-Coaxial Networks |
|
|
63 | (1) |
|
|
64 | (2) |
|
|
66 | (1) |
|
Provisioning Cable Modems |
|
|
67 | (3) |
|
|
70 | (2) |
|
|
72 | (3) |
|
Using DSL to Connect to a Central Site |
|
|
75 | (34) |
|
``Do I Know This Already?'' Quiz |
|
|
75 | (6) |
|
|
81 | (1) |
|
|
81 | (4) |
|
|
83 | (2) |
|
|
85 | (2) |
|
|
87 | (2) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (4) |
|
|
90 | (1) |
|
|
91 | (2) |
|
Data Transmission over ADSL |
|
|
93 | (3) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
96 | (5) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (3) |
|
|
104 | (2) |
|
|
106 | (3) |
|
Configuring DSL Access with PPPoE |
|
|
109 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
109 | (4) |
|
|
113 | (1) |
|
Configure a Cisco Router as a PPPoE Client |
|
|
113 | (1) |
|
Configure an Ethernet/ATM Interface for PPPoE |
|
|
114 | (1) |
|
Configure the PPPoE DSL Dialer Interface |
|
|
115 | (1) |
|
Configure Port Address Translation' |
|
|
116 | (2) |
|
Configure DHCP for DSL Router Users |
|
|
118 | (1) |
|
Configure Static Default Route on a DSL Router |
|
|
119 | (1) |
|
The Overall CPE Router Configuration |
|
|
120 | (3) |
|
|
123 | (1) |
|
|
124 | (3) |
|
Configuring DSL Access with PPPoA |
|
|
127 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
127 | (3) |
|
|
130 | (1) |
|
Configure a Cisco Router as a PPPoA Client |
|
|
130 | (4) |
|
PPP over AAL5 Connections |
|
|
131 | (1) |
|
VCMultiplexed PPP over AAL5 |
|
|
132 | (1) |
|
LLC Encapsulated PPP over AAL5 |
|
|
132 | (2) |
|
|
134 | (1) |
|
Configure an ATM Interface for PPPoA |
|
|
134 | (1) |
|
Configure the PPPoA DSL Dialer and Virtual-Template Interfaces |
|
|
135 | (1) |
|
Configure Additional PPPoA Elements |
|
|
136 | (1) |
|
The Overall CPE Router Configuration |
|
|
136 | (5) |
|
|
141 | (1) |
|
|
142 | (3) |
|
Verifying and Troubleshooting ADSL Configurations |
|
|
145 | (20) |
|
``Do I Know This Already?'' Quiz |
|
|
145 | (4) |
|
|
149 | (1) |
|
DSL Connection Troubleshooting |
|
|
149 | (1) |
|
Layers of Trouble to Shoot |
|
|
149 | (1) |
|
Isolating Physical Layer Issues |
|
|
150 | (6) |
|
|
151 | (1) |
|
ADSL Physical Connectivity |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
154 | (1) |
|
Keeping the Head on Straight |
|
|
154 | (1) |
|
|
155 | (1) |
|
Isolating Data Link Layer Issues |
|
|
156 | (5) |
|
|
157 | (4) |
|
|
161 | (1) |
|
|
162 | (3) |
|
Part II Implementing Frame Mode MPLS |
|
|
165 | (84) |
|
The MPLS Conceptual Model |
|
|
167 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
167 | (3) |
|
|
170 | (1) |
|
Introducing MPLS Networks |
|
|
170 | (9) |
|
Traditional WAN Connections |
|
|
170 | (4) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
Router Switching Mechanisms |
|
|
179 | (2) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (3) |
|
|
185 | (22) |
|
``Do I Know This Already?'' Quiz |
|
|
185 | (4) |
|
|
189 | (1) |
|
|
189 | (1) |
|
|
190 | (4) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Label Allocation in Frame Mode MPLS Networks |
|
|
195 | (4) |
|
|
195 | (4) |
|
|
199 | (4) |
|
|
200 | (1) |
|
Interim Packet Propagation |
|
|
201 | (1) |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (3) |
|
Configuring Frame Mode MPLS |
|
|
207 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
207 | (3) |
|
|
210 | (1) |
|
|
211 | (3) |
|
Configuring MPLS on a Frame Mode Interface |
|
|
214 | (3) |
|
|
217 | (4) |
|
|
221 | (1) |
|
|
222 | (3) |
|
|
225 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
225 | (4) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (4) |
|
|
234 | (1) |
|
|
234 | (2) |
|
|
236 | (9) |
|
|
237 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (3) |
|
|
242 | (1) |
|
End-to-End Routing Update Flow |
|
|
242 | (1) |
|
MPLS VPN Packet Forwarding |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (3) |
|
|
249 | (180) |
|
|
251 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
251 | (5) |
|
|
256 | (1) |
|
|
256 | (7) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
262 | (1) |
|
Internet Key Exchange (IKE) |
|
|
263 | (3) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (4) |
|
|
267 | (1) |
|
|
267 | (3) |
|
Public Key Infrastructure |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
273 | (2) |
|
Site-to-Site VPN Operations |
|
|
275 | (52) |
|
``Do I Know This Already?'' Quiz |
|
|
275 | (7) |
|
|
282 | (1) |
|
Site-to-Site VPN Overview |
|
|
282 | (1) |
|
Creating a Site-to-Site IPsec VPN |
|
|
283 | (10) |
|
Step 1: Specify Interesting Traffic |
|
|
284 | (1) |
|
|
284 | (2) |
|
|
286 | (1) |
|
Diffie-Hellman Key Exchange |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
292 | (1) |
|
Step 4: Secure Data Transfer |
|
|
292 | (1) |
|
Step 5: IPsec Tunnel Termination |
|
|
292 | (1) |
|
Site-to-Site IPsec Configuration Steps |
|
|
293 | (7) |
|
Step 1: Configure the ISAKMP Policy |
|
|
293 | (2) |
|
Step 2: Configure the IPsec Transform Sets |
|
|
295 | (2) |
|
Step 3: Configure the Crypto ACL |
|
|
297 | (1) |
|
Step 4: Configure the Crypto Map |
|
|
297 | (1) |
|
Step 5: Apply the Crypto Map to the Interface |
|
|
298 | (1) |
|
Step 6: Configure the Interface ACL |
|
|
299 | (1) |
|
Security Device Manager Features and Interface |
|
|
300 | (3) |
|
Configuring a Site-to-Site VPN in SDM |
|
|
303 | (11) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
307 | (7) |
|
Testing the IPsec VPN Tunnel |
|
|
314 | (1) |
|
Monitoring the IPsec VPN Tunnel |
|
|
314 | (3) |
|
|
317 | (6) |
|
|
323 | (4) |
|
|
327 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
327 | (5) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
336 | (3) |
|
Configure GRE over IPsec Using SDM |
|
|
339 | (8) |
|
Launch the GRE over IPsec Wizard |
|
|
339 | (1) |
|
Step 1: Create the GRE Tunneh |
|
|
340 | (1) |
|
Step 2: Create a Backup GRE Tunnel |
|
|
341 | (1) |
|
Steps 3-5: IPsec VPN Information |
|
|
342 | (1) |
|
Step 6: Routing Information |
|
|
343 | (3) |
|
Step 7: Validate the GRE over IPsec Configuration |
|
|
346 | (1) |
|
|
347 | (3) |
|
|
350 | (3) |
|
IPsec High Availability Options |
|
|
353 | (22) |
|
``Do I Know This Already?'' Quiz |
|
|
353 | (5) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (9) |
|
|
360 | (1) |
|
|
360 | (2) |
|
IGP Within a GRE over IPsec Tunnel |
|
|
362 | (1) |
|
|
363 | (3) |
|
|
366 | (2) |
|
WAN Backed Up by an IPsec VPN |
|
|
368 | (2) |
|
|
370 | (3) |
|
|
373 | (2) |
|
Configuring Cisco Easy VPN |
|
|
375 | (36) |
|
``Do I Know This Already?'' Quiz |
|
|
375 | (4) |
|
|
379 | (1) |
|
Cisco Easy VPN Components |
|
|
379 | (3) |
|
|
379 | (2) |
|
Easy VPN Server Requirements |
|
|
381 | (1) |
|
Easy VPN Connection Establishment |
|
|
382 | (3) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Easy VPN User Authentication |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
|
385 | (1) |
|
Easy VPN Server Configuration |
|
|
385 | (11) |
|
|
388 | (1) |
|
|
389 | (7) |
|
Monitoring the Easy VPN Server |
|
|
396 | (2) |
|
Troubleshooting the Easy VPN Server |
|
|
398 | (9) |
|
|
407 | (1) |
|
|
408 | (3) |
|
Implementing the Cisco VPN Client |
|
|
411 | (18) |
|
``Do I Know This Already?'' Quiz |
|
|
411 | (3) |
|
|
414 | (1) |
|
Cisco VPN Client Installation and Configuration Overview |
|
|
414 | (1) |
|
Cisco VPN Client Installation |
|
|
414 | (4) |
|
Cisco VPN Client Configuration |
|
|
418 | (7) |
|
|
419 | (1) |
|
|
419 | (1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
|
422 | (1) |
|
Finish the Connection Configuration |
|
|
423 | (2) |
|
|
425 | (1) |
|
|
426 | (3) |
|
|
429 | (160) |
|
|
431 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
431 | (4) |
|
|
435 | (1) |
|
|
435 | (6) |
|
Vulnerable Router Services |
|
|
436 | (1) |
|
Unnecessary Services and Interfaces |
|
|
436 | (2) |
|
Common Management Services |
|
|
438 | (1) |
|
Path Integrity Mechanisms |
|
|
439 | (1) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
Using AutoSecure to Secure a Router |
|
|
441 | (2) |
|
Using SDM to Secure a Router |
|
|
443 | (9) |
|
SDM Security Audit Wizard |
|
|
444 | (3) |
|
SDM One-Step Lockdown Wizard |
|
|
447 | (1) |
|
AutoSecure Default Configurations |
|
|
448 | (2) |
|
SDM One-Step Lockdown Default Configurations |
|
|
450 | (2) |
|
|
452 | (4) |
|
|
456 | (3) |
|
Securing Administrative Access |
|
|
459 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
459 | (7) |
|
|
466 | (1) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
468 | (3) |
|
|
471 | (1) |
|
|
472 | (1) |
|
Additional Line Protections |
|
|
473 | (1) |
|
Password Length Restrictions |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
Provide Individual Logins |
|
|
477 | (1) |
|
Create Multiple Privilege Levels |
|
|
478 | (2) |
|
|
480 | (3) |
|
Prevent Physical Router Compromise |
|
|
483 | (2) |
|
|
485 | (3) |
|
|
488 | (3) |
|
Using AAA to Scale Access Control |
|
|
491 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
491 | (4) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
Understanding the TACACS+ and RADIUS Protocols |
|
|
496 | (2) |
|
|
496 | (1) |
|
|
497 | (1) |
|
Authentication and Authorization |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (1) |
|
Configuring AAA Using the CLI |
|
|
498 | (6) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
radius-server host Command |
|
|
499 | (1) |
|
tacacs-server host Command |
|
|
500 | (1) |
|
radius-server key and tacacs-server key Commands |
|
|
501 | (1) |
|
username root password Command |
|
|
501 | (1) |
|
aaa authentication ppp Command |
|
|
501 | (1) |
|
aaa authorization Command |
|
|
502 | (1) |
|
|
503 | (1) |
|
Configuring AAA Using SDM |
|
|
504 | (6) |
|
|
510 | (4) |
|
debug aaa authentication Command |
|
|
511 | (1) |
|
debug aaa authorization Command |
|
|
511 | (1) |
|
debug aaa accounting Command |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (2) |
|
|
516 | (3) |
|
Cisco IOS Threat Defense Features |
|
|
519 | (17) |
|
``Do I Know This Already?'' Quiz |
|
|
519 | (4) |
|
|
523 | (1) |
|
|
523 | (1) |
|
Firewall Technology Basics |
|
|
524 | (4) |
|
|
525 | (1) |
|
Application Layer Gateway |
|
|
526 | (1) |
|
Stateful Packet Filtering |
|
|
526 | (2) |
|
Cisco IOS Firewall Feature Set |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
529 | (1) |
|
Cisco IOS Firewall Operation |
|
|
529 | (1) |
|
Cisco IOS Firewall Packet Inspection and Proxy Firewalls |
|
|
530 | (2) |
|
|
532 | (2) |
|
|
534 | (2) |
|
Implementing Cisco IOS Firewalls |
|
|
536 | (27) |
|
``Do I Know This Already?'' Quiz |
|
|
536 | (4) |
|
|
540 | (1) |
|
Configure a Cisco IOS Firewall Using the CLI |
|
|
540 | (4) |
|
Step 1: Choose an Interface and Packet Direction to Inspect |
|
|
540 | (1) |
|
Step 2: Configure an IP A CLfor the Interface |
|
|
540 | (1) |
|
Step 3: Define the Inspection Rules |
|
|
541 | (1) |
|
Step 4: Apply the Inspection Rules and the ACL to the Interface |
|
|
542 | (1) |
|
Step 5: Verify the Configuration |
|
|
543 | (1) |
|
Configure a Basic Firewall Using SDM |
|
|
544 | (3) |
|
Configure an Advanced Firewall Using SDM |
|
|
547 | (10) |
|
|
557 | (3) |
|
|
560 | (3) |
|
Implementing Cisco IDS and IPS |
|
|
563 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
563 | (4) |
|
|
567 | (1) |
|
IDS and IPS Functions and Operations |
|
|
567 | (1) |
|
Categories of IDS and IPS |
|
|
568 | (2) |
|
|
570 | (1) |
|
|
571 | (1) |
|
Cisco IOS IPS Configuration |
|
|
571 | (5) |
|
|
576 | (7) |
|
|
583 | (4) |
|
|
587 | (2) |
Appendix A Answers to the ``Do I Know This Already?'' Quizzes and Q&A Sections |
|
589 | (41) |
Index |
|
630 | |
Foreword |
|
xxiv | |
Introduction |
|
xxv | |
|
Part I Overview and Design of a Campus Network |
|
|
3 | (52) |
|
|
5 | (22) |
|
``Do I Know This Already?'' Quiz |
|
|
5 | (4) |
|
|
9 | (4) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (7) |
|
|
13 | (2) |
|
|
15 | (3) |
|
|
18 | (1) |
|
Predictable Network Model |
|
|
19 | (1) |
|
Hierarchical Network Design |
|
|
20 | (7) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (5) |
|
|
27 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
27 | (4) |
|
|
31 | (10) |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Core Size in a Campus Network |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
Service Provider Edge Block |
|
|
41 | (1) |
|
Can I Use Layer 2 Distribution Switches? |
|
|
41 | (1) |
|
Evaluating an Existing Network |
|
|
42 | (13) |
|
Discovering the Network Topology |
|
|
43 | (4) |
|
Migrating to a Hierarchical Design |
|
|
47 | (8) |
|
Part II Building a Campus Network |
|
|
55 | (230) |
|
|
57 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
57 | (4) |
|
|
61 | (4) |
|
|
61 | (2) |
|
|
63 | (2) |
|
Multilayer Switch Operation |
|
|
65 | (4) |
|
Types of Multilayer Switching |
|
|
65 | (1) |
|
|
66 | (2) |
|
Multilayer Switching Exceptions |
|
|
68 | (1) |
|
|
69 | (5) |
|
Content Addressable Memory |
|
|
69 | (1) |
|
Ternary Content Addressable Memory |
|
|
70 | (1) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Troubleshooting Switching Tables |
|
|
74 | (7) |
|
|
74 | (1) |
|
|
75 | (6) |
|
Switch Port Configuration |
|
|
81 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
81 | (4) |
|
|
85 | (7) |
|
|
85 | (1) |
|
|
86 | (1) |
|
Full-Duplex Fast Ethernet |
|
|
87 | (2) |
|
|
89 | (1) |
|
|
90 | (2) |
|
Connecting Switch Block Devices |
|
|
92 | (2) |
|
Console Port Cables/Connectors |
|
|
92 | (1) |
|
Ethernet Port Cables and Connectors |
|
|
92 | (1) |
|
Gigabit Ethernet Port Cables and Connectors |
|
|
93 | (1) |
|
Switch Port Configuration |
|
|
94 | (15) |
|
Selecting Ports to Configure |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
Managing Error Conditions on a Switch Port |
|
|
97 | (1) |
|
Detecting Error Conditions |
|
|
98 | (1) |
|
Automatically Recover from Error Conditions |
|
|
99 | (1) |
|
Enable and Use the Switch Port |
|
|
99 | (1) |
|
Troubleshooting Port Connectivity |
|
|
100 | (1) |
|
Looking for the Port State |
|
|
100 | (1) |
|
Looking for Speed and Duplex Mismatches |
|
|
100 | (9) |
|
|
109 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
109 | (4) |
|
|
113 | (6) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (2) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (5) |
|
VLAN Frame Identification |
|
|
121 | (1) |
|
Inter-Switch Link Protocol |
|
|
121 | (1) |
|
|
122 | (1) |
|
Dynamic Trunking Protocol |
|
|
123 | (1) |
|
|
124 | (11) |
|
|
124 | (2) |
|
Trunk Configuration Example |
|
|
126 | (2) |
|
Troubleshooting VLANs and Trunks |
|
|
128 | (7) |
|
|
135 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
135 | (4) |
|
|
139 | (5) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (4) |
|
|
144 | (5) |
|
Configuring a VTP Management Domain |
|
|
145 | (1) |
|
|
145 | (1) |
|
Configuring the VTP Version |
|
|
146 | (2) |
|
VTP Configuration Example |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (3) |
|
|
151 | (1) |
|
|
152 | (7) |
|
|
159 | (22) |
|
``Do I Know This Already?'' Quiz |
|
|
159 | (5) |
|
Switch Port Aggregation with EtherChannel |
|
|
164 | (5) |
|
Bundling Ports with EtherChannel |
|
|
165 | (1) |
|
Distributing Traffic in EtherChannel |
|
|
165 | (2) |
|
Configuring EtherChannel Load Balancing |
|
|
167 | (2) |
|
EtherChannel Negotiation Protocols |
|
|
169 | (1) |
|
Port Aggregation Protocol |
|
|
169 | (1) |
|
Link Aggregation Control Protocol |
|
|
169 | (1) |
|
EtherChannel Configuration |
|
|
170 | (2) |
|
Configuring a PAgP EtherChannel |
|
|
170 | (1) |
|
Configuring a LACP EtherChannel |
|
|
171 | (1) |
|
Troubleshooting an EtherChannel |
|
|
172 | (9) |
|
Traditional Spanning Tree Protocol |
|
|
181 | (34) |
|
``Do I Know This Already?'' Quiz |
|
|
181 | (4) |
|
|
185 | (21) |
|
|
185 | (4) |
|
Preventing Loops with Spanning Tree Protocol |
|
|
189 | (1) |
|
Spanning-Tree Communication: Bridge Protocol Data Units |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (3) |
|
Electing Designated Ports |
|
|
195 | (2) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Indirect Topology Changes |
|
|
202 | (2) |
|
Insignificant Topology Changes |
|
|
204 | (2) |
|
|
206 | (9) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Per-VLAN Spanning Tree Plus |
|
|
207 | (8) |
|
Spanning Tree Configuration |
|
|
215 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
215 | (4) |
|
|
219 | (10) |
|
|
219 | (4) |
|
Root Bridge Configuration |
|
|
223 | (3) |
|
Spanning-Tree Customization |
|
|
226 | (1) |
|
Tuning the Root Path Cost |
|
|
227 | (1) |
|
|
228 | (1) |
|
Tuning Spanning-Tree Convergence |
|
|
229 | (3) |
|
|
230 | (1) |
|
Manually Configuring STP Timers |
|
|
230 | (1) |
|
Automatically Configuring STP Timers |
|
|
231 | (1) |
|
Redundant Link Convergence |
|
|
232 | (5) |
|
PortFast: Access-Layer Nodes |
|
|
233 | (1) |
|
UplinkFast: Access-Layer Uplinks |
|
|
234 | (2) |
|
BackboneFast: Redundant Backbone Paths |
|
|
236 | (1) |
|
|
237 | (6) |
|
Protecting the Spanning Tree Protocol Topology |
|
|
243 | (16) |
|
``Do I Know This Already?'' Quiz |
|
|
243 | (4) |
|
Protecting Against Unexpected BPDUs |
|
|
247 | (3) |
|
|
247 | (1) |
|
|
248 | (2) |
|
Protecting Against Sudden Loss of BPDUs |
|
|
250 | (4) |
|
|
250 | (1) |
|
|
251 | (3) |
|
Using BPDU Filtering to Disable STP on a Port |
|
|
254 | (1) |
|
Troubleshooting STP Protection |
|
|
254 | (5) |
|
Advanced Spanning Tree Protocol |
|
|
259 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
259 | (4) |
|
Rapid Spanning Tree Protocol |
|
|
263 | (7) |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (2) |
|
Topology Changes and RSTP |
|
|
269 | (1) |
|
|
270 | (1) |
|
Rapid Per-VLAN Spanning Tree Protocol |
|
|
270 | (2) |
|
Multiple Spanning Tree Protocol |
|
|
272 | (13) |
|
|
274 | (1) |
|
|
274 | (1) |
|
Spanning Tree Instances Within MST |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
275 | (2) |
|
|
277 | (8) |
|
Part III Layer 3 Switching |
|
|
285 | (66) |
|
|
287 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
287 | (4) |
|
|
291 | (4) |
|
|
292 | (1) |
|
Configuring InterVLAN Routing |
|
|
292 | (1) |
|
Layer 2 Port Configuration |
|
|
292 | (1) |
|
Layer 3 Port Configuration |
|
|
293 | (1) |
|
|
294 | (1) |
|
Multilayer Switching with CEF |
|
|
295 | (9) |
|
|
295 | (1) |
|
|
295 | (1) |
|
Forwarding Information Base |
|
|
296 | (3) |
|
|
299 | (3) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
Verifying Multilayer Switching |
|
|
304 | (9) |
|
Verifying InterVLAN Routing |
|
|
304 | (3) |
|
|
307 | (1) |
|
Verifying Fallback Bridging |
|
|
308 | (5) |
|
Router, Supervisor, and Power Redundancy |
|
|
313 | (38) |
|
``Do I Know This Already?'' Quiz |
|
|
313 | (4) |
|
Router Redundancy in Multilayer Switching |
|
|
317 | (21) |
|
|
317 | (1) |
|
Hot Standby Router Protocol |
|
|
318 | (1) |
|
|
318 | (3) |
|
|
321 | (1) |
|
|
322 | (2) |
|
|
324 | (3) |
|
Virtual Router Redundancy Protocol |
|
|
327 | (3) |
|
Gateway Load Balancing Protocol |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (2) |
|
|
333 | (1) |
|
|
334 | (4) |
|
Verifying Gateway Redundancy |
|
|
338 | (1) |
|
Redundancy Within a Switch Chassis |
|
|
339 | (12) |
|
Redundant Switch Supervisors |
|
|
339 | (1) |
|
Configuring the Redundancy Mode |
|
|
340 | (2) |
|
Configuring Supervisor Synchronization |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
343 | (8) |
|
Part IV Campus Network Services |
|
|
351 | (78) |
|
|
353 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
353 | (4) |
|
Power over Ethernet (PoE) |
|
|
357 | (4) |
|
How Power over Ethernet Works |
|
|
357 | (1) |
|
Detecting a Powered Device |
|
|
358 | (1) |
|
Supplying Power to a Device |
|
|
359 | (1) |
|
Configuring Power over Ethernet |
|
|
360 | (1) |
|
Verifying Power over Ethernet |
|
|
360 | (1) |
|
|
361 | (5) |
|
|
362 | (2) |
|
Verifying Voice VLAN Operation |
|
|
364 | (2) |
|
|
366 | (3) |
|
|
366 | (1) |
|
|
367 | (1) |
|
Integrated Services Model |
|
|
368 | (1) |
|
Differentiated Services Model |
|
|
368 | (1) |
|
|
369 | (16) |
|
Layer 2 QoS Classification |
|
|
369 | (1) |
|
Layer 3 QoS Classification with DSCP |
|
|
370 | (2) |
|
Implementing QoS for Voice |
|
|
372 | (2) |
|
Configuring a Trust Boundary |
|
|
374 | (1) |
|
Using Auto-QoS to Simplify a Configuration |
|
|
375 | (3) |
|
|
378 | (7) |
|
|
385 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
385 | (4) |
|
|
389 | (3) |
|
Port-Based Authentication |
|
|
392 | (3) |
|
|
393 | (1) |
|
802.1x Port-Based Authentication Example |
|
|
394 | (1) |
|
Mitigating Spoofing Attacks |
|
|
395 | (6) |
|
|
395 | (2) |
|
|
397 | (2) |
|
|
399 | (2) |
|
Best Practices for Securing Switches |
|
|
401 | (8) |
|
|
409 | (20) |
|
``Do I Know This Already?'' Quiz |
|
|
409 | (4) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
414 | (6) |
|
Private VLAN Configuration |
|
|
416 | (1) |
|
Configure the Private VLANs |
|
|
417 | (1) |
|
Associate Ports with Private VLANs |
|
|
417 | (2) |
|
Associate Secondary VLANs to a Primary VLAN SVI |
|
|
419 | (1) |
|
|
420 | (9) |
|
|
420 | (2) |
|
|
422 | (7) |
|
|
429 | (104) |
|
|
431 | (40) |
|
``Do I Know This Already?'' Quiz |
|
|
431 | (4) |
|
|
435 | (3) |
|
Comparing Wireless and Wired LANs |
|
|
435 | (1) |
|
Avoiding Collisions in a WLAN |
|
|
436 | (2) |
|
|
438 | (7) |
|
|
441 | (1) |
|
|
442 | (3) |
|
An Introduction to Wireless LAN RF |
|
|
445 | (14) |
|
|
445 | (2) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
449 | (1) |
|
|
450 | (2) |
|
RF Signal Strength Terminology |
|
|
452 | (2) |
|
|
454 | (1) |
|
|
455 | (1) |
|
Wireless Path Performance |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Semi-Directional Antennas |
|
|
458 | (1) |
|
Highly Directional Antennas |
|
|
458 | (1) |
|
|
459 | (12) |
|
|
459 | (1) |
|
WLAN Frame Types and Sizes |
|
|
460 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
463 | (1) |
|
Additional 802.11 Standards |
|
|
464 | (7) |
|
Wireless Architecture and Design |
|
|
471 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
471 | (4) |
|
|
475 | (6) |
|
|
476 | (1) |
|
EAP-Based Security Methods |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
479 | (1) |
|
|
480 | (1) |
|
Wireless Client Operation |
|
|
481 | (1) |
|
AP Association and Roaming |
|
|
482 | (5) |
|
|
484 | (2) |
|
|
486 | (1) |
|
Cell Layout and Channel Usage |
|
|
487 | (10) |
|
|
488 | (1) |
|
|
489 | (8) |
|
Cisco Unified Wireless Network |
|
|
497 | (36) |
|
``Do I Know This Already?'' Quiz |
|
|
497 | (4) |
|
Traditional WLAN Architecture |
|
|
501 | (2) |
|
Cisco Unified Wireless Network Architecture |
|
|
503 | (5) |
|
|
506 | (2) |
|
|
508 | (3) |
|
Traffic Patterns in a Cisco Unified Wireless Network |
|
|
509 | (2) |
|
Lightweight AP Association and Roaming |
|
|
511 | (7) |
|
|
513 | (1) |
|
|
514 | (4) |
|
|
518 | (1) |
|
Basic Wireless LAN Configuration |
|
|
518 | (15) |
|
|
519 | (2) |
|
Initial WLC Configuration |
|
|
521 | (1) |
|
Further WLC Configuration |
|
|
522 | (2) |
|
|
524 | (1) |
|
Supplying Power to an LAP |
|
|
525 | (1) |
|
Switch Port Configuration for LAP |
|
|
525 | (1) |
|
Initial LAP Configuration |
|
|
526 | (7) |
|
Part VI Scenarios for Final Preparation |
|
|
533 | (20) |
|
Scenarios for Final Preparation |
|
|
535 | (18) |
|
Scenario 1: Trunking and DTP |
|
|
535 | (1) |
|
Scenario 2: VLANs, Trunking, and VTP |
|
|
536 | (1) |
|
Scenario 3: EtherChannels |
|
|
537 | (1) |
|
Scenario 4: Traditional STP |
|
|
538 | (1) |
|
|
539 | (1) |
|
Scenario 6: Router Redundancy with HSRP, VRRP, and GLBP |
|
|
540 | (1) |
|
Scenario 7: IP Telephony in a Switched Network |
|
|
541 | (1) |
|
Scenario 8: Securing Access and Managing Traffic in a Switched Network |
|
|
541 | (1) |
|
Scenario 9: Implementing a Wireless LAN |
|
|
542 | (2) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (2) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (2) |
|
|
551 | (2) |
|
|
553 | (2) |
|
Appendix A Answers to Chapter `Do I Know This Already?' Quizzes and Q&A Sections |
|
|
555 | (55) |
|
|
555 | (2) |
|
``Do I Know This Already?'' |
|
|
555 | (1) |
|
|
555 | (2) |
|
|
557 | (2) |
|
``Do I Know This Already?'' |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
559 | (3) |
|
``Do I Know This Already?'' |
|
|
559 | (1) |
|
|
560 | (2) |
|
|
562 | (5) |
|
``Do I Know This Already?'' |
|
|
562 | (1) |
|
|
563 | (4) |
|
|
567 | (3) |
|
``Do I Know This Already?'' |
|
|
567 | (1) |
|
|
567 | (3) |
|
|
570 | (3) |
|
``Do I Know This Already?'' |
|
|
570 | (1) |
|
|
570 | (3) |
|
|
573 | (4) |
|
``Do I Know This Already?'' |
|
|
573 | (1) |
|
|
573 | (4) |
|
|
577 | (4) |
|
``Do I Know This Already?'' |
|
|
577 | (1) |
|
|
577 | (4) |
|
|
581 | (5) |
|
``Do I Know This Already?'' |
|
|
581 | (1) |
|
|
582 | (4) |
|
|
586 | (3) |
|
``Do I Know This Already?'' |
|
|
586 | (1) |
|
|
587 | (2) |
|
|
589 | (3) |
|
``Do I Know This Already?'' |
|
|
589 | (1) |
|
|
589 | (3) |
|
|
592 | (2) |
|
``Do I Know This Already?'' |
|
|
592 | (1) |
|
|
592 | (2) |
|
|
594 | (3) |
|
``Do I Know This Already?'' |
|
|
594 | (1) |
|
|
595 | (2) |
|
|
597 | (2) |
|
``Do I Know This Already?'' |
|
|
597 | (1) |
|
|
597 | (2) |
|
|
599 | (2) |
|
``Do I Know This Already'?'' |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
601 | (2) |
|
``Do I Know This Already?'' |
|
|
601 | (1) |
|
|
602 | (1) |
|
|
603 | (3) |
|
``Do I Know This Already?'' |
|
|
603 | (1) |
|
|
604 | (2) |
|
|
606 | (2) |
|
``Do I Know This Already?'' |
|
|
606 | (1) |
|
|
607 | (1) |
|
|
608 | (2) |
|
``Do I Know This Already?'' |
|
|
608 | (1) |
|
|
609 | (1) |
Index |
|
610 | |
Foreword |
|
xvii | |
Introduction |
|
xviii | |
|
|
3 | (52) |
|
Cisco VoIP Implementations |
|
|
5 | (50) |
|
``Do I Know This Already?'' Quiz |
|
|
5 | (5) |
|
|
10 | (1) |
|
Introduction to VoIP Networks |
|
|
10 | (9) |
|
Benefits of Packet Telephony Networks |
|
|
10 | (1) |
|
Packet Telephony Components |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Distributed Versus Centralized Call Control |
|
|
16 | (3) |
|
Digitizing and Packetizing Voice |
|
|
19 | (8) |
|
Basic Voice Encoding: Converting Analog to Digital |
|
|
19 | (1) |
|
Basic Voice Encoding: Converting Digital to Analog |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
Compression Bandwidth Requirements and Their Comparative Qualities |
|
|
24 | (1) |
|
Digital Signal Processors |
|
|
25 | (2) |
|
Encapsulating Voice Packets |
|
|
27 | (7) |
|
End-to-End Delivery of Voice |
|
|
27 | (3) |
|
Protocols Used in Voice Encapsulation |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (8) |
|
Impact of Voice Samples and Packet Size on Bandwidth |
|
|
34 | (3) |
|
|
37 | (1) |
|
Security and Tunneling Overhead |
|
|
37 | (2) |
|
Calculating the Total Bandwidth for a VoIP Call |
|
|
39 | (2) |
|
Effects of VAD on Bandwidth |
|
|
41 | (1) |
|
Implementing VoIP Support in an Enterprise Network |
|
|
42 | (8) |
|
Enterprise Voice Implementations |
|
|
42 | (2) |
|
Voice Gateway Functions on a Cisco Router |
|
|
44 | (1) |
|
Cisco Unified CallManager Functions |
|
|
45 | (1) |
|
Enterprise IP Telephony Deployment Models |
|
|
46 | (1) |
|
|
46 | (1) |
|
Multisite with Centralized Call Processing Model |
|
|
46 | (1) |
|
Multisite with Distributed Call Processing Model |
|
|
47 | (1) |
|
Clustering over WAN Model |
|
|
48 | (1) |
|
Identifying Voice Commands in IOS Configurations |
|
|
48 | (1) |
|
Call Admission Control (CAC) |
|
|
49 | (1) |
|
|
50 | (2) |
|
|
52 | (3) |
|
Part II Quality of Service |
|
|
55 | (174) |
|
|
57 | (36) |
|
``Do I Know This Already?'' Quiz |
|
|
57 | (5) |
|
|
62 | (1) |
|
|
62 | (10) |
|
Converged Network Issues Related to QoS |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (2) |
|
Definition of QoS and the Three Steps to Implementing It |
|
|
68 | (1) |
|
|
69 | (3) |
|
Identifying and Comparing QoS Models |
|
|
72 | (4) |
|
|
72 | (1) |
|
Integrated Services Model |
|
|
73 | (1) |
|
Differentiated Services Model |
|
|
74 | (2) |
|
QoS Implementation Methods |
|
|
76 | (13) |
|
Legacy Command-Line Interface (CLI) |
|
|
76 | (1) |
|
Modular QoS Command-Line Interface (MQC) |
|
|
76 | (3) |
|
|
79 | (2) |
|
Router and Security Device Manager (SDM) QoS Wizard |
|
|
81 | (8) |
|
|
89 | (2) |
|
|
91 | (2) |
|
Classification, Marking, and NBAR |
|
|
93 | (30) |
|
``Do I Know This Already?'' Quiz |
|
|
93 | (4) |
|
|
97 | (1) |
|
Classification and Marking |
|
|
97 | (3) |
|
Layer 2 QoS: CoS on 802.1Q/P Ethernet Frame |
|
|
98 | (1) |
|
Layer 2 QoS: DE and CLP on Frame Relay and ATM (Cells) |
|
|
99 | (1) |
|
Layer 2 1/2 QoS: MPLS EXP Field |
|
|
100 | (1) |
|
The DiffServ Model, Differentiated Services Code Point (DSCP), and Per-Hop Behavior (PHB) |
|
|
100 | (6) |
|
|
102 | (4) |
|
|
106 | (2) |
|
|
108 | (2) |
|
Network Based Application Recognition (NBAR) |
|
|
110 | (2) |
|
Cisco IOS Commands to Configure NBAR |
|
|
112 | (6) |
|
|
118 | (2) |
|
|
120 | (3) |
|
Congestion Management and Queuing |
|
|
123 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
123 | (4) |
|
|
127 | (1) |
|
Introduction to Congestion Management and Queuing |
|
|
127 | (3) |
|
First-In-First-Out, Priority Queuing, Round-Robin, and Weighted Round-Robin Queuing |
|
|
130 | (2) |
|
|
132 | (6) |
|
WFQ Classification and Scheduling |
|
|
133 | (2) |
|
WFQ Insertion and Drop Policy |
|
|
135 | (1) |
|
Benefits, and Drawbacks of WFQ |
|
|
135 | (1) |
|
Configuring and Monitoring WFQ |
|
|
135 | (3) |
|
Class-Based Weighted Fair Queuing |
|
|
138 | (4) |
|
Classification, Scheduling, and Bandwidth Guarantee |
|
|
139 | (1) |
|
Benefits and Drawbacks of CBWFQ |
|
|
140 | (1) |
|
Configuring and Monitoring CBWFQ |
|
|
141 | (1) |
|
|
142 | (4) |
|
|
144 | (1) |
|
Configuring and Monitoring LLQ |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
147 | (2) |
|
Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms |
|
|
149 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
149 | (4) |
|
|
153 | (1) |
|
|
153 | (10) |
|
Tail Drop and Its Limitations |
|
|
153 | (1) |
|
|
154 | (2) |
|
Weighted Random Early Detection |
|
|
156 | (2) |
|
Class-Based Weighted Random Early Detection |
|
|
158 | (1) |
|
|
158 | (5) |
|
Traffic Shaping and Policing |
|
|
163 | (4) |
|
|
165 | (2) |
|
Cisco IOS Policing and Shaping Mechanisms |
|
|
167 | (1) |
|
Link Efficiency Mechanisms |
|
|
167 | (5) |
|
Layer 2 Payload Compression |
|
|
168 | (1) |
|
|
169 | (2) |
|
Link Fragmentation and Interleaving |
|
|
171 | (1) |
|
Applying Link Efficiency Mechanisms |
|
|
171 | (1) |
|
|
172 | (3) |
|
|
175 | (2) |
|
Implementing QoS Pre-Classify and Deploying End-to-End QoS |
|
|
177 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
177 | (3) |
|
|
180 | (1) |
|
Implementing QoS Pre-Classify |
|
|
180 | (5) |
|
Virtual Private Networks (VPN) |
|
|
180 | (1) |
|
QoS Pre- Classify Applications |
|
|
181 | (2) |
|
QoS Pre-Classification Deployment Options |
|
|
183 | (2) |
|
|
185 | (9) |
|
QoS Service Level Agreements SLAs) |
|
|
186 | (2) |
|
Enterprise Campus QoS Implementations |
|
|
188 | (2) |
|
WAN Edge QoS Implementations |
|
|
190 | (2) |
|
Control Plane Policing (CoPP) |
|
|
192 | (2) |
|
|
194 | (4) |
|
|
198 | (3) |
|
|
201 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
201 | (4) |
|
|
205 | (1) |
|
|
205 | (2) |
|
Implementing and Verifying AutoQoS |
|
|
207 | (8) |
|
Two-Step Deployment of AutoQoS Enterprise on Routers |
|
|
209 | (1) |
|
Deploying AutoQoS VoIP on IOS-Based Catalyst Switches |
|
|
210 | (2) |
|
Verifying AutoQoS on Cisco Routers and IOS-Based Catalyst Switches |
|
|
212 | (3) |
|
AutoQoS Shortcomings and Remedies |
|
|
215 | (7) |
|
Automation with Cisco AutoQoS |
|
|
215 | (3) |
|
|
218 | (1) |
|
Interpreting and Modifying AutoQoS Configurations |
|
|
219 | (3) |
|
|
222 | (5) |
|
|
227 | (2) |
|
|
229 | (90) |
|
Wireless LAN QoS Implementation |
|
|
231 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
231 | (4) |
|
|
235 | (1) |
|
The Need for Wireless LAN QoS |
|
|
235 | (4) |
|
|
237 | (1) |
|
Split MAC Architecture and Light Weight Access Point |
|
|
238 | (1) |
|
Current Wireless LAN QoS Implementation |
|
|
239 | (4) |
|
Configuring Wireless LAN QoS |
|
|
243 | (4) |
|
|
247 | (5) |
|
|
252 | (3) |
|
Introducing >802.1x and Configuring Encryption and Authentication on Lightweight Access Points |
|
|
255 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
255 | (3) |
|
|
258 | (1) |
|
Overview of WLAN Security |
|
|
258 | (2) |
|
|
258 | (1) |
|
Evolution of WLAN Security Solutions |
|
|
259 | (1) |
|
802.1x and EAP Authentication Protocols |
|
|
260 | (12) |
|
EAP Authentication Protocols |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (2) |
|
|
269 | (3) |
|
Configuring Encryption and Authentication on Lightweight Access Points |
|
|
272 | (9) |
|
|
272 | (1) |
|
Static WEP Authentication |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (2) |
|
|
278 | (3) |
|
|
281 | (4) |
|
|
285 | (2) |
|
|
287 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
287 | (4) |
|
|
291 | (1) |
|
The Need for WLAN Management |
|
|
291 | (4) |
|
Cisco Unified Wireless Networks |
|
|
291 | (1) |
|
Cisco WLAN Implementation |
|
|
292 | (2) |
|
|
294 | (1) |
|
Cisco Works Wireless LAN Solution Engine |
|
|
295 | (4) |
|
|
295 | (1) |
|
|
296 | (1) |
|
CiscoWorks WLSE and WLSE Express |
|
|
296 | (1) |
|
Simplified WLSE Express Setup |
|
|
297 | (1) |
|
WLSE Configuration Templates |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
Cisco Wireless Control System |
|
|
299 | (15) |
|
WCS Location Tracking Options |
|
|
300 | (1) |
|
WCS Base Software Features |
|
|
300 | (1) |
|
WCS Location Software Features |
|
|
301 | (1) |
|
WCS Location + 2700 Series Wireless Location Appliance Features |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Cisco WCS System Requirements |
|
|
302 | (1) |
|
|
303 | (1) |
|
Wireless Location Appliance |
|
|
304 | (1) |
|
Wireless Location Appliance Architecture |
|
|
305 | (1) |
|
Wireless Location Appliance Applications |
|
|
305 | (1) |
|
WCS Configuration Examples |
|
|
306 | (1) |
|
|
306 | (1) |
|
Changing the Root Password |
|
|
306 | (1) |
|
Adding a Wireless LAN Controller |
|
|
307 | (1) |
|
Configuring Access Points |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (2) |
|
Rogue Access Point Detection |
|
|
312 | (1) |
|
Rogue Access Point Alarms |
|
|
312 | (1) |
|
Rogue Access Point Location |
|
|
313 | (1) |
|
|
314 | (3) |
|
|
317 | (2) |
|
|
319 | (35) |
|
Appendix A Answers to the ``Do I Know This Already?'' Quizzes and Q&A Sections |
|
|
321 | (33) |
Index |
|
354 | |