- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 1192
- Dostępne formaty:
-
ePubMobi
Opis
książki
:
Cisco IOS Cookbook. 2nd Edition
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly.
That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right.
Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:
- Configuring interfaces of many types, from serial to ATM and Frame Relay
- Configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)
- Configuring authentication
- Configuring other services, including DHCP and NTP
- Setting up backup links, and using HSRP to configure backup routers
- Managing the router, including SNMP and other solutions
- Using access lists to control the traffic through the router
If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.
Wybrane bestsellery
-
Dlatego właśnie napisano tę książkę. Na szczęście większość zadań konfiguracyjnych może zostać podzielona na kilka niezależnych etapów -- konfigurację interfejsu, mechanizmów obsługi protokołów routingu, łączy zapasowych, implementację algorytmów, filtrowania pakietów i włączanie innych systemów kontroli dostępu.
- Druk 149 pkt
Czasowo niedostępna
-
Promocja
While several publishers (including O'Reilly) supply excellent documentation of router features, the trick is knowing when, why, and how to use these features There are often many different ways to solve any given networking problem using Cisco devices, and some solutions are clearly more effective than others. The pressing question for a network e- ePub + Mobi 169 pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
Promocja
This unique book offers a vendor-neutral approach for designing large local area networks according to business or organizational needs, rather than from a product perspective. Author and independent network design consultant Kevin Dooley outlines "top-down network design" for building a technological infrastructure to fit your organization's requi- ePub + Mobi 169 pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
Promocja
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux powstał z myślą o administratorach rozpoczynających przygodę z bezpieczeństwem w sieciach komputerowych. Zapewnia on praktyczną wiedzę o bezpieczeństwie sieci. Jeśli chcesz wejść w świat technologii Cisco Security i nauczyć się blokować ataki hakerów podczas tego szkolenia zyskasz solidne podstawy praktyczne oraz teoretyczne.- Videokurs 266 pkt
(39,90 zł najniższa cena z 30 dni)
266.00 zł
760.00 zł (-65%) -
Promocja
Description This simple, well organized book provides the theory as well as the practical aspects of computer network. It covers the pillars of a computer network, like transmission, data transfer, and communication. It covers foundational concepts, explaining the OSI and TCP/IP models, digital transmission, interfaces, modems, and media characteri- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
MikroTik, łotewska firma z siedzibą w Rydze, od lat produkuje sprzęt sieciowy. Przystępna cena i świetna jakość sprawiły, że urządzenia sygnowane logo MikroTik zdobyły niezwykłą popularność - po produkty łotewskiej marki sięga się coraz częściej. Jeśli planujesz zmodernizować lub zbudować sieć i chcesz w tym celu użyć urządzeń MikroTik, ta książka Ci w tym pomoże.- PDF + ePub + Mobi
- Druk 39 pkt
(37,89 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł (-50%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] jest certyfikatem, który odzwierciedla szeroką wiedzę zdającego – zarówno teoretyczną, jak i praktyczną. Trzeba się bowiem legitymować naprawdę szerokimi umiejętnościami, by zdobyć ten certyfikat. Ze względu na obszerność tematu kurs przygotowujący do egzaminu został podzielony na kilka części – to szkolenie jest ósmą odsłoną cyklu. Tym razem skupiamy się na kwestiach związanych z programowaniem i automatyzacją sieci komputerowych, istotnych przede wszystkim dla osób, które nadzorują pracę urządzeń sieciowych i konfigurują sprzęt sieciowy, opierając się na poszczególnych warstwach modelu OSI – czyli dla administratorów sieci komputerowych.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
Kurs stworzony z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR] został – ze względu na dużą objętość materiału – podzielony na kilka części. Wynika to ze specyfiki samego egzaminu, który obejmuje niezwykle szeroki zakres tematyczny – zarówno w części teoretycznej, jak i praktycznej. Certyfikat zaświadcza więc o tym, że jego posiadacz dysponuje naprawdę zaawansowaną wiedzą na temat zagadnień związanych z administrowaniem sieciami komputerowymi i ich budową. Doceniają to także pracodawcy, a ponieważ bez sieci komputerowych trudno wyobrazić sobie w XXI wieku jakąkolwiek działalność, prawdziwi specjaliści mogą przebierać w ofertach.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Po omówieniu w poprzednich częściach serii kursów zagadnień dotyczących redundancji, routingu EIGRP, zabezpieczania sieci, konfiguracji protokołu routingu OSPF i sieci WAN w ramach tego szkolenia przedstawiamy tajniki działania, konfiguracji i testowania sieci Wi-Fi w przedsiębiorstwie. Cisco CCNP Enterprise (350-401 ENCOR). Kurs video. Część 6. Sieci bezprzewodowe i przeprowadzanie testów przygotowaliśmy przede wszystkim z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale z zawartej tu wiedzy z powodzeniem skorzystają wszyscy zainteresowani tematyką sieci komputerowych. A ponieważ technologia nieustannie ewoluuje, zdobywanie na bieżąco nowych wiadomości jest konieczne, aby nie zostać z tyle i nadążać za dynamicznie zmieniającą się rzeczywistością. Nie maleje zatem na rynku pracy zapotrzebowanie na wykwalifikowanych specjalistów – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem. Do szczególnie cenionych certyfikatów należy właśnie Cisco CCNP Enterprise [350-401 ENCOR], którego otrzymanie jest poprzedzone niezwykle obszernym egzaminem, obejmującym zarówno liczne zagadnienia teoretyczne, jak i – przede wszystkim – wiedzę dotyczącą sieciowej praktyki. Właśnie ta obfitość zagadnień jest powodem, dla którego kurs przygotowawczy został podzielony na kilka części.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise 350-401 ENCOR. Kurs video. Sieci WLAN i routing pomiędzy oddziałami jest kolejnym z serii szkoleń przeznaczonych dla administratorów sieci. W poprzednich omówione zostały zagadnienia związane między innymi z redundancją w warstwach drugiej i trzeciej, routingiem EIGRP, zabezpieczaniem sieci i konfiguracją protokołu routingu OSPF. Kurs został przygotowany głównie z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale zawarta w nim wiedza przyda się wszystkim zajmującym się zagadnieniem sieci komputerowych. A jest to wiedza bardzo szeroka, co więcej, jej obszar szybko się powiększa, bo sieci podlegają nieustannym zmianom, związanym choćby z wprowadzaniem nowych technologii. Stąd nieustanne zapotrzebowanie na specjalistów na rynku pracy – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
CCNP Enterprise (350-401 ENCOR). Kurs video. Część 4. Zaawansowana konfiguracja protokołu routingu OSPF to kolejna część szkolenia przeznaczonego dla administratorów sieci i osób zainteresowanych zdobyciem certyfikatu Cisco CCNP Enterprise. W poprzednich omówione zostały między innymi zagadnienia redundancji w warstwie trzeciej i drugiej, list dostępu, budowy i zabezpieczania sieci. Ta część natomiast skupia się na kwestii konfiguracji protokołu routingu OSPF, któremu poświęca się sporo miejsca na egzaminie certyfikującym. Jest to także niezwykle popularny protokół, często stosowany w sieciach komputerowych – nie tylko tych używających sprzętu firmy Cisco.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Umiejętność budowy sieci komputerowych i zarządzania nimi jest niezwykle ceniona na rynku pracy. Specjaliści w tej dziedzinie mogą przebierać w ofertach i nic nie wskazuje, by miało się to w najbliższym czasie zmienić. Nic dziwnego – sieci komputerowe mają dla sprawnego funkcjonowania organizacji fundamentalne znaczenie. Tym bardziej w czasach, w których szybki przepływ informacji i sprawna komunikacja są ważniejsze niż kiedykolwiek. Jednak sieć sieci nierówna – a ponieważ płyną przez nią dane wrażliwe i poufne, niebywale istotne jest, by powierzyć ją wykwalifikowanemu i godnemu zaufania specjaliście, który zadba należycie o jej bezpieczeństwo. Dobrze więc posiadać twarde umiejętności potwierdzone odpowiednim certyfikatem – a Cisco CCNP Enterprise [350-401 ENCOR] jest jednym z najbardziej znanych i renomowanych.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] to bardzo ceniony na rynku egzamin certyfikacyjny poświadczający znajomość konstruowania sieci z wykorzystaniem sprzętu renomowanej firmy Cisco. Egzamin jest niebywale obszerny i obejmuje zarówno zagadnienia praktyczne, jak i teoretyczne; kładzie nacisk na umiejętność kojarzenia faktów i wyciągania logicznych wniosków, a nie tylko mechaniczne zapamiętywanie określonych czynności. Aby móc z dumą nazywać się prawdziwym sieciowcem, nie można jedynie wiedzieć, gdzie i jak podłączyć router, trzeba jeszcze mieć świadomość, dlaczego należy to zrobić właśnie tak.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%)
Ebooka "Cisco IOS Cookbook. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Cisco IOS Cookbook. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Cisco IOS Cookbook. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5482-8, 9780596554828
- Data wydania ebooka :
- 2006-12-22 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2.2MB
- Rozmiar pliku Mobi:
- 8.7MB
Spis treści książki
- Cisco IOS Cookbook
- SPECIAL OFFER: Upgrade this ebook with OReilly
- A Note Regarding Supplemental Files
- Preface
- Whats New in This Edition
- Organization
- Whats in This Book
- Conventions Used in This Book
- Using Code Examples
- Wed Like Your Feedback!
- Safari Enabled
- Acknowledgments
- Kevin Dooley
- Ian J. Brown
- 1. Router Configuration and File Management
- Introduction
- IOS
- Configuring the Router via TFTP
- Problem
- Solution
- Discussion
- See Also
- Saving Router Configuration to Server
- Problem
- Solution
- Discussion
- See Also
- Booting the Router Using a Remote Configuration File
- Problem
- Solution
- Discussion
- See Also
- Storing Configuration Files Larger Than NVRAM
- Problem
- Solution
- Discussion
- See Also
- Clearing the Startup Configuration
- Problem
- Solution
- Discussion
- See Also
- Loading a New IOS Image
- Problem
- Solution
- Discussion
- See Also
- Booting a Different IOS Image
- Problem
- Solution
- Discussion
- See Also
- Booting over the Network
- Problem
- Solution
- Discussion
- See Also
- Copying an IOS Image to a Server
- Problem
- Solution
- Discussion
- See Also
- Copying an IOS Image Through the Console
- Problem
- Solution
- Discussion
- Deleting Files from Flash
- Problem
- Solution
- Discussion
- See Also
- Partitioning Flash
- Problem
- Solution
- Discussion
- See Also
- Using the Router as a TFTP Server
- Problem
- Solution
- Discussion
- See Also
- Using FTP from the Router
- Problem
- Solution
- Discussion
- See Also
- Generating Large Numbers of Router Configurations
- Problem
- Solution
- Discussion
- See Also
- Changing the Configurations of Many Routers at Once
- Problem
- Solution
- Discussion
- See Also
- Extracting Hardware Inventory Information
- Problem
- Solution
- Discussion
- See Also
- Backing Up Router Configurations
- Problem
- Solution
- Discussion
- See Also
- Warm Reload
- Problem
- Solution
- Discussion
- See Also
- Warm Upgrade
- Problem
- Solution
- Discussion
- See Also
- Configuration Archiving
- Problem
- Solution
- Discussion
- See Also
- Locking Configuration Access
- Problem
- Solution
- Discussion
- Introduction
- 2. Router Management
- Introduction
- Creating Command Aliases
- Problem
- Solution
- Discussion
- Managing the Routers ARP Cache
- Problem
- Solution
- Discussion
- Tuning Router Buffers
- Problem
- Solution
- Discussion
- Auto Tuning Buffers
- Problem
- Solution
- Discussion
- See Also
- Using the Cisco Discovery Protocol
- Problem
- Solution
- Discussion
- See Also
- Disabling the Cisco Discovery Protocol
- Problem
- Solution
- Discussion
- See Also
- Using the Small Servers
- Problem
- Solution
- Discussion
- See Also
- Enabling HTTP Access to a Router
- Problem
- Solution
- Discussion
- See Also
- Enabling Secure HTTP (HTTPS) Access to a Router
- Problem
- Solution
- Discussion
- See Also
- Using Static Hostname Tables
- Problem
- Solution
- Discussion
- See Also
- Enabling Domain Name Services
- Problem
- Solution
- Discussion
- See Also
- Disabling Domain Name Lookups
- Problem
- Solution
- Discussion
- See Also
- Specifying a Router Reload Time
- Problem
- Solution
- Discussion
- See Also
- Scheduling of Router Commands
- Problem
- Solution
- Discussion
- See Also
- Displaying Historical CPU Values
- Problem
- Solution
- Discussion
- Creating Exception Dump Files
- Problem
- Solution
- Discussion
- See Also
- Generating a Report of Interface Information
- Problem
- Solution
- Discussion
- See Also
- Generating a Report of Routing Table Information
- Problem
- Solution
- Discussion
- See Also
- Generating a Report of ARP Table Information
- Problem
- Solution
- Discussion
- See Also
- Generating a Server Host Table File
- Problem
- Solution
- Discussion
- See Also
- 3. User Access and Privilege Levels
- Introduction
- Setting Up User IDs
- Problem
- Solution
- Discussion
- See Also
- Encrypting Passwords
- Problem
- Solution
- Discussion
- See Also
- Using Better Password-Encryption Techniques
- Problem
- Solution
- Discussion
- See Also
- Removing Passwords from a Router Configuration File
- Problem
- Solution
- Discussion
- See Also
- Deciphering Ciscos Weak Password Encryption
- Problem
- Solution
- Discussion
- See Also
- Displaying Active Users
- Problem
- Solution
- Discussion
- See Also
- Sending Messages to Other Users
- Problem
- Solution
- Discussion
- See Also
- Changing the Number of VTYs
- Problem
- Solution
- Discussion
- See Also
- Changing VTY Timeouts
- Problem
- Solution
- Discussion
- See Also
- Restricting VTY Access by Protocol
- Problem
- Solution
- Discussion
- See Also
- Enabling Absolute Timeouts on VTY Lines
- Problem
- Solution
- Discussion
- See Also
- Implementing Banners
- Problem
- Solution
- Discussion
- See Also
- Disabling Banners on a Port
- Problem
- Solution
- Discussion
- See Also
- Disabling Router Lines
- Problem
- Solution
- Discussion
- See Also
- Reserving a VTY Port for Administrative Access
- Problem
- Solution
- Discussion
- See Also
- Restricting Inbound Telnet Access
- Problem
- Solution
- Discussion
- See Also
- Logging Telnet Access
- Problem
- Solution
- Discussion
- See Also
- Setting the Source Address for Telnet
- Problem
- Solution
- Discussion
- Automating the Login Sequence
- Problem
- Solution
- Discussion
- See Also
- Using SSH for Secure Access
- Problem
- Solution
- Discussion
- See Also
- Changing Privilege Level of IOS Commands
- Problem
- Solution
- Discussion
- See Also
- Defining Per User Privileges
- Problem
- Solution
- Discussion
- See Also
- Defining Per Port Privileges
- Problem
- Solution
- Discussion
- See Also
- 4. TACACS+
- Introduction
- Authenticating Login IDs from a Central System
- Problem
- Solution
- Discussion
- See Also
- Restricting Command Access
- Problem
- Solution
- Discussion
- See Also
- Losing Access to the TACACS+ Server
- Problem
- Solution
- Discussion
- See Also
- Disabling TACACS+ Authentication on a Particular Line
- Problem
- Solution
- Discussion
- See Also
- Capturing User Keystrokes
- Problem
- Solution
- Discussion
- See Also
- Logging System Events
- Problem
- Solution
- Discussion
- See Also
- Setting the IP Source Address for TACACS+ Messages
- Problem
- Solution
- Discussion
- See Also
- Sample Server Configuration Files
- Problem
- Solution
- Discussion
- See Also
- 5. IP Routing
- Introduction
- Unregistered Addresses
- Finding an IP Route
- Problem
- Solution
- Discussion
- Finding Types of IP Routes
- Problem
- Solution
- Discussion
- Converting Different Mask Formats
- Problem
- Solution
- Discussion
- Using Static Routing
- Problem
- Solution
- Discussion
- See Also
- Floating Static Routes
- Problem
- Solution
- Discussion
- See Also
- Using Policy-Based Routing to Route Based on Source Address
- Problem
- Solution
- Discussion
- See Also
- Using Policy-Based Routing to Route Based on Application Type
- Problem
- Solution
- Discussion
- See Also
- Examining Policy-Based Routing
- Problem
- Solution
- Discussion
- See Also
- Changing Administrative Distances
- Problem
- Solution
- Discussion
- See Also
- Routing Over Multiple Paths with Equal Costs
- Problem
- Solution
- Discussion
- See Also
- Static Routes That Track Interfaces or Other Routes
- Problem
- Solution
- Discussion
- See Also
- Keeping Statistics on Routing Table Changes
- Problem
- Solution
- Discussion
- Introduction
- 6. RIP
- Introduction
- Configuring RIP Version 1
- Problem
- Solution
- Discussion
- See Also
- Filtering Routes with RIP
- Problem
- Solution
- Discussion
- See Also
- Redistributing Static Routes into RIP
- Problem
- Solution
- Discussion
- See Also
- Redistributing Routes Using Route Maps
- Problem
- Solution
- Discussion
- See Also
- Creating a Default Route in RIP
- Problem
- Solution
- Discussion
- See Also
- Disabling RIP on an Interface
- Problem
- Solution
- Discussion
- See Also
- Default Passive Interface
- Problem
- Solution
- Discussion
- See Also
- Unicast Updates for RIP
- Problem
- Solution
- Discussion
- See Also
- Applying Offsets to Routes
- Problem
- Solution
- Discussion
- Adjusting Timers
- Problem
- Solution
- Discussion
- See Also
- Configuring Interpacket Delay
- Problem
- Solution
- Discussion
- See Also
- Enabling Nonperiodic Updates
- Problem
- Solution
- Discussion
- See Also
- Increasing the RIP Input Queue
- Problem
- Solution
- Discussion
- See Also
- Configuring RIP Version 2
- Problem
- Solution
- Discussion
- Enabling RIP Authentication
- Problem
- Solution
- Discussion
- See Also
- RIP Route Summarization
- Problem
- Solution
- Discussion
- Route Tagging
- Problem
- Solution
- Discussion
- See Also
- 7. EIGRP
- Introduction
- Configuring EIGRP
- Problem
- Solution
- Discussion
- See Also
- Filtering Routes with EIGRP
- Problem
- Solution
- Discussion
- See Also
- Redistributing Routes into EIGRP
- Problem
- Solution
- Discussion
- See Also
- Redistributing Routes into EIGRP Using Route Maps
- Problem
- Solution
- Discussion
- See Also
- Disabling EIGRP on an Interface
- Problem
- Solution
- Discussion
- See Also
- Adjusting EIGRP Metrics
- Problem
- Solution
- Discussion
- Adjusting Timers
- Problem
- Solution
- Discussion
- See Also
- Enabling EIGRP Authentication
- Problem
- Solution
- Discussion
- See Also
- EIGRP Route Summarization
- Problem
- Solution
- Discussion
- See Also
- Logging EIGRP Neighbor State Changes
- Problem
- Solution
- Discussion
- See Also
- Limiting EIGRPs Bandwidth Utilization
- Problem
- Solution
- Discussion
- See Also
- EIGRP Stub Routing
- Problem
- Solution
- Discussion
- See Also
- Route Tagging
- Problem
- Solution
- Discussion
- See Also
- Viewing EIGRP Status
- Problem
- Solution
- Discussion
- 8. OSPF
- Introduction
- Configuring OSPF
- Problem
- Solution
- Discussion
- Filtering Routes in OSPF
- Problem
- Solution
- Discussion
- See Also
- Adjusting OSPF Costs
- Problem
- Solution
- Discussion
- Creating a Default Route in OSPF
- Problem
- Solution
- Discussion
- See Also
- Redistributing Static Routes into OSPF
- Problem
- Solution
- Discussion
- Redistributing External Routes into OSPF
- Problem
- Solution
- Discussion
- See Also
- Manipulating DR Selection
- Problem
- Solution
- Discussion
- See Also
- Setting the OSPF RID
- Problem
- Solution
- Discussion
- See Also
- Enabling OSPF Authentication
- Problem
- Solution
- Discussion
- See Also
- Selecting the Appropriate Area Types
- Problem
- Solution
- Discussion
- See Also
- Using OSPF on Dial Interfaces
- Problem
- Solution
- Discussion
- See Also
- Summarizing Routes in OSPF
- Problem
- Solution
- Discussion
- See Also
- Disabling OSPF on Certain Interfaces
- Problem
- Solution
- Discussion
- Changing the Network Type on an Interface
- Problem
- Solution
- Discussion
- See Also
- OSPF Route Tagging
- Problem
- Solution
- Discussion
- See Also
- Logging OSPF Adjacency Changes
- Problem
- Solution
- Discussion
- See Also
- Adjusting OSPF Timers
- Problem
- Solution
- Discussion
- See Also
- Reducing OSPF Traffic in Stable Networks
- Problem
- Solution
- Discussion
- OSPF Virtual Links
- Problem
- Solution
- Discussion
- Viewing OSPF Status with Domain Names
- Problem
- Solution
- Discussion
- See Also
- Debugging OSPF
- Problem
- Solution
- Discussion
- 9. BGP
- Introduction
- Basic Terminology
- BGP Attributes
- Route Selection
- Configuring BGP
- Problem
- Solution
- Discussion
- See Also
- Using eBGP Multihop
- Problem
- Solution
- Discussion
- See Also
- Adjusting the Next-Hop Attribute
- Problem
- Solution
- Discussion
- Connecting to Two ISPs
- Problem
- Solution
- Discussion
- See Also
- Connecting to Two ISPs with Redundant Routers
- Problem
- Solution
- Discussion
- See Also
- Restricting Networks Advertised to a BGP Peer
- Problem
- Solution
- Discussion
- See Also
- Adjusting Local Preference Values
- Problem
- Solution
- Discussion
- See Also
- Load-Balancing
- Problem
- Solution
- Discussion
- Removing Private ASNs from the AS Path
- Problem
- Solution
- Discussion
- Filtering BGP Routes Based on AS Paths
- Problem
- Solution
- Discussion
- See Also
- Reducing the Size of the Received Routing Table
- Problem
- Solution
- Discussion
- See Also
- Summarizing Outbound Routing Information
- Problem
- Solution
- Discussion
- See Also
- Prepending ASNs to the AS Path
- Problem
- Solution
- Discussion
- See Also
- Redistributing Routes with BGP
- Problem
- Solution
- Discussion
- See Also
- Using Peer Groups
- Problem
- Solution
- Discussion
- Authenticating BGP Peers
- Problem
- Solution
- Discussion
- See Also
- Using BGP Communities
- Problem
- Solution
- Discussion
- See Also
- Using BGP Route Reflectors
- Problem
- Solution
- Discussion
- See Also
- Putting It All Together
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 10. Frame Relay
- Introduction
- Frame Relay QoS Features
- Setting Up Frame Relay with Point-to-Point Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- Adjusting LMI Options
- Problem
- Solution
- Discussion
- Setting Up Frame Relay with Map Statements
- Problem
- Solution
- Discussion
- See Also
- Using Multipoint Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- Configuring Frame Relay SVCs
- Problem
- Solution
- Discussion
- See Also
- Simulating a Frame Relay Cloud
- Problem
- Solution
- Discussion
- See Also
- Compressing Frame Relay Data on a Subinterface
- Problem
- Solution
- Discussion
- See Also
- Compressing Frame Relay Data with Maps
- Problem
- Solution
- Discussion
- See Also
- PPP over Frame Relay
- Problem
- Solution
- Discussion
- See Also
- Viewing Frame Relay Status Information
- Problem
- Solution
- Discussion
- Introduction
- 11. Handling Queuing and Congestion
- Introduction
- Queuing Algorithms
- Fast Switching and CEF
- Fast Switching and CEF
- Problem
- Solution
- Discussion
- See Also
- Setting the DSCP or TOS Field
- Problem
- Solution
- Discussion
- See Also
- Using Priority Queuing
- Problem
- Solution
- Discussion
- See Also
- Using Custom Queuing
- Problem
- Solution
- Discussion
- Using Custom Queues with Priority Queues
- Problem
- Solution
- Discussion
- See Also
- Using Weighted Fair Queuing
- Problem
- Solution
- Discussion
- See Also
- Using Class-Based Weighted Fair Queuing
- Problem
- Solution
- Discussion
- See Also
- Using NBAR Classification
- Problem
- Solution
- Discussion
- Controlling Congestion with WRED
- Problem
- Solution
- Discussion
- See Also
- Using RSVP
- Problem
- Solution
- Discussion
- See Also
- Manual RSVP Reservations
- Problem
- Solution
- Discussion
- RESV and PATH messages
- Two service types
- The examples
- See Also
- Aggregating RSVP Reservations
- Problem
- Solution
- Discussion
- See Also
- Using Generic Traffic Shaping
- Problem
- Solution
- Discussion
- See Also
- Using Frame-Relay Traffic Shaping
- Problem
- Solution
- Discussion
- See Also
- Using Committed Access Rate
- Problem
- Solution
- Discussion
- See Also
- Implementing Standards-Based Per-Hop Behavior
- Problem
- Solution
- Discussion
- See Also
- AutoQoS
- Problem
- Solution
- Discussion
- See Also
- Viewing Queue Parameters
- Problem
- Solution
- Discussion
- Introduction
- 12. Tunnels and VPNs
- Introduction
- Creating a Tunnel
- Problem
- Solution
- Discussion
- See Also
- Tunneling Foreign Protocols in IP
- Problem
- Solution
- Discussion
- See Also
- Tunneling with Dynamic Routing Protocols
- Problem
- Solution
- Discussion
- See Also
- Viewing Tunnel Status
- Problem
- Solution
- Discussion
- See Also
- Creating an Encrypted Router-to-Router VPN in a GRE Tunnel
- Problem
- Solution
- Discussion
- See Also
- Creating an Encrypted VPN Between the LAN Interfaces of Two Routers
- Problem
- Solution
- Discussion
- See Also
- Generating RSA Keys
- Problem
- Solution
- Discussion
- See Also
- Creating a Router-to-Router VPN with RSA Keys
- Problem
- Solution
- Discussion
- See Also
- Creating a VPN Between a Workstation and a Router
- Problem
- Solution
- Discussion
- See Also
- Creating an SSL VPN
- Problem
- Solution
- Discussion
- See Also
- Checking IPSec Protocol Status
- Problem
- Solution
- Discussion
- 13. Dial Backup
- Introduction
- Analog Modems
- Switched 56 Kbps Digital Service
- ISDN
- Estimating How Many Dialup Lines You Need
- Automating Dial Backup
- Problem
- Solution
- Discussion
- See Also
- Using Dialer Interfaces
- Problem
- Solution
- Discussion
- See Also
- Using an Async Modem on the AUX Port
- Problem
- Solution
- Discussion
- See Also
- Using Backup Interfaces
- Problem
- Solution
- Discussion
- See Also
- Using Dialer Watch
- Problem
- Solution
- Discussion
- See Also
- Using Virtual Templates
- Problem
- Solution
- Discussion
- See Also
- Ensuring Proper Disconnection
- Problem
- Solution
- Discussion
- View Dial Backup Status
- Problem
- Solution
- Discussion
- See Also
- Debugging Dial Backup
- Problem
- Solution
- Discussion
- Introduction
- 14. NTP and Time
- Introduction
- Time-Stamping Router Logs
- Problem
- Solution
- Discussion
- See Also
- Setting the Time
- Problem
- Solution
- Discussion
- See Also
- Setting the Time Zone
- Problem
- Solution
- Discussion
- See Also
- Adjusting for Daylight Saving Time
- Problem
- Solution
- Discussion
- See Also
- Synchronizing the Time on All Routers (NTP)
- Problem
- Solution
- Discussion
- See Also
- Configuring NTP Redundancy
- Problem
- Solution
- Discussion
- See Also
- Setting the Router As the NTP Master for the Network
- Problem
- Solution
- Discussion
- See Also
- Changing NTP Synchronization Periods
- Problem
- Solution
- Discussion
- See Also
- Using NTP to Send Periodic Broadcast Time Updates
- Problem
- Solution
- Discussion
- See Also
- Using NTP to Send Periodic Multicast Time Updates
- Problem
- Solution
- Discussion
- See Also
- Enabling and Disabling NTP Per Interface
- Problem
- Solution
- Discussion
- See Also
- NTP Authentication
- Problem
- Solution
- Discussion
- Limiting the Number of Peers
- Problem
- Solution
- Discussion
- See Also
- Restricting Peers
- Problem
- Solution
- Discussion
- See Also
- Setting the Clock Period
- Problem
- Solution
- Discussion
- Checking the NTP Status
- Problem
- Solution
- Discussion
- Debugging NTP
- Problem
- Solution
- Discussion
- NTP Logging
- Problem
- Solution
- Discussion
- See Also
- Extended Daylight Saving Time
- Problem
- Solution
- Discussion
- See Also
- NTP Server Configuration
- Problem
- Solution
- Discussion
- See Also
- 15. DLSw
- Introduction
- Service Access Points (SAP and LSAP)
- Explorers and RIFs
- Cisco IOS Code Sets
- Simple Bridging
- Problem
- Solution
- Discussion
- Configuring DLSw
- Problem
- Solution
- Discussion
- The peers
- Ring groups, ring numbers, and bridge numbers
- Explorer options
- Other features
- Using DLSw to Bridge Between Ethernet and Token Ring
- Problem
- Solution
- Discussion
- Ethernet II or 802.3 framing
- See Also
- Converting Ethernet and Token Ring MAC Addresses
- Problem
- Solution
- Discussion
- See Also
- Configuring SDLC
- Problem
- Solution
- Discussion
- See Also
- Configuring SDLC for Multidrop Connections
- Problem
- Solution
- Discussion
- See Also
- Using STUN
- Problem
- Solution
- Discussion
- See Also
- Using BSTUN
- Problem
- Solution
- Discussion
- Controlling DLSw Packet Fragmentation
- Problem
- Solution
- Discussion
- Tagging DLSw Packets for QoS
- Problem
- Solution
- Discussion
- See Also
- Supporting SNA Priorities
- Problem
- Solution
- Discussion
- See Also
- DLSw+ Redundancy and Fault Tolerance
- Problem
- Solution
- Discussion
- See Also
- Viewing DLSw Status Information
- Problem
- Solution
- Discussion
- Viewing SDLC Status Information
- Problem
- Solution
- Discussion
- See Also
- Debugging DSLw
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 16. Router Interfaces and Media
- Introduction
- Viewing Interface Status
- Problem
- Solution
- Discussion
- See Also
- Configuring Serial Interfaces
- Problem
- Solution
- Discussion
- See Also
- Using an Internal T1 CSU/DSU
- Problem
- Solution
- Discussion
- See Also
- Using an Internal ISDN PRI Module
- Problem
- Solution
- Discussion
- See Also
- Using an Internal 56 Kbps CSU/DSU
- Problem
- Solution
- Discussion
- See Also
- Configuring an Async Serial Interface
- Problem
- Solution
- Discussion
- See Also
- Configuring ATM Subinterfaces
- Problem
- Solution
- Discussion
- See Also
- Setting Payload Scrambling on an ATM Circuit
- Problem
- Solution
- Discussion
- See Also
- Classical IP Over ATM
- Problem
- Solution
- Discussion
- See Also
- Configuring Ethernet Interface Features
- Problem
- Solution
- Discussion
- Configuring Token Ring Interface Features
- Problem
- Solution
- Discussion
- See Also
- Connecting VLAN Trunks with ISL
- Problem
- Solution
- Discussion
- See Also
- Connecting VLAN Trunks with 802.1Q
- Problem
- Solution
- Discussion
- See Also
- LPD Printer Support
- Problem
- Solution
- Discussion
- See Also
- 17. Simple Network Management Protocol
- Introduction
- SNMP Management Model
- MIBs and OIDs
- Configuring SNMP
- Problem
- Solution
- Discussion
- See Also
- Extracting Router Information via SNMP Tools
- Problem
- Solution
- Discussion
- See Also
- Recording Important Router Information for SNMP Access
- Problem
- Solution
- Discussion
- Using SNMP to Extract Inventory Information from a List of Routers
- Problem
- Solution
- Discussion
- See Also
- Using Access Lists to Protect SNMP Access
- Problem
- Solution
- Discussion
- See Also
- Logging Unauthorized SNMP Attempts
- Problem
- Solution
- Discussion
- See Also
- Limiting MIB Access
- Problem
- Solution
- Discussion
- See Also
- Using SNMP to Modify a Routers Running Configuration
- Problem
- Solution
- Discussion
- See Also
- Using SNMP to Copy a New IOS Image
- Problem
- Solution
- Discussion
- See Also
- Using SNMP to Perform Mass Configuration Changes
- Problem
- Solution
- Discussion
- See Also
- Preventing Unauthorized Configuration Modifications
- Problem
- Solution
- Discussion
- See Also
- Making Interface Table Numbers Permanent
- Problem
- Solution
- Discussion
- See Also
- Enabling SNMP Traps and Informs
- Problem
- Solution
- Discussion
- See Also
- Sending Syslog Messages As SNMP Traps and Informs
- Problem
- Solution
- Discussion
- See Also
- Setting SNMP Packet Size
- Problem
- Solution
- Discussion
- Setting SNMP Queue Size
- Problem
- Solution
- Discussion
- Setting SNMP Timeout Values
- Problem
- Solution
- Discussion
- Disabling Link Up/Down Traps per Interface
- Problem
- Solution
- Discussion
- See Also
- Setting the IP Source Address for SNMP Traps
- Problem
- Solution
- Discussion
- Using RMON to Send Traps
- Problem
- Solution
- Discussion
- See Also
- Enabling SNMPv3
- Problem
- Solution
- Discussion
- Using the SNMPv3 security levels
- See Also
- Strong SNMPv3 Encryption
- Problem
- Solution
- Discussion
- See Also
- Using SAA
- Problem
- Solution
- Discussion
- Introduction
- 18. Logging
- Introduction
- Enabling Local Router Logging
- Problem
- Solution
- Discussion
- See Also
- Setting the Log Size
- Problem
- Solution
- Discussion
- See Also
- Clearing the Routers Log
- Problem
- Solution
- Discussion
- Sending Log Messages to Your Screen
- Problem
- Solution
- Discussion
- Using a Remote Log Server
- Problem
- Solution
- Discussion
- See Also
- Enabling Syslog on a Unix Server
- Problem
- Solution
- Discussion
- See Also
- Changing the Default Log Facility
- Problem
- Solution
- Discussion
- See Also
- Restricting What Log Messages Are Sent to the Server
- Problem
- Solution
- Discussion
- Setting the IP Source Address for Syslog Messages
- Problem
- Solution
- Discussion
- See Also
- Logging Router Syslog Messages in Different Files
- Problem
- Solution
- Discussion
- See Also
- Maintaining Syslog Files on the Server
- Problem
- Solution
- Discussion
- Testing the Syslog Sever Configuration
- Problem
- Solution
- Discussion
- Preventing the Most Common Messages from Being Logged
- Problem
- Solution
- Discussion
- Rate-Limiting Syslog Traffic
- Problem
- Solution
- Discussion
- Enabling Error Log Counting
- Problem
- Solution
- Discussion
- XML-Formatted Log Messages
- Problem
- Solution
- Discussion
- See Also
- Modifying Log Messages
- Problem
- Solution
- Discussion
- See Also
- 19. Access-Lists
- Introduction
- Filtering by Source or Destination IP Address
- Problem
- Solution
- Discussion
- See Also
- Adding a Comment to an ACL
- Problem
- Solution
- Discussion
- See Also
- Filtering by Application
- Problem
- Solution
- Discussion
- See Also
- Filtering Based on TCP Header Flags
- Problem
- Solution
- Discussion
- See Also
- Restricting TCP Session Direction
- Problem
- Solution
- Discussion
- Filtering Multiport Applications
- Problem
- Solution
- Discussion
- See Also
- Filtering Based on DSCP and TOS
- Problem
- Solution
- Discussion
- See Also
- Logging When an Access-List Is Used
- Problem
- Solution
- Discussion
- See Also
- Logging TCP Sessions
- Problem
- Solution
- Discussion
- See Also
- Analyzing ACL Log Entries
- Problem
- Solution
- Discussion
- See Also
- Using Named and Reflexive Access-Lists
- Problem
- Solution
- Discussion
- See Also
- Dealing with Passive Mode FTP
- Problem
- Solution
- Discussion
- See Also
- Using Time-Based Access-Lists
- Problem
- Solution
- Discussion
- See Also
- Filtering Based on Noncontiguous Ports
- Problem
- Solution
- Discussion
- See Also
- Advanced Access-List Editing
- Problem
- Solution
- Discussion
- See Also
- Filtering IPv6
- Problem
- Solution
- Discussion
- See Also
- 20. DHCP
- Introduction
- Using IP Helper Addresses for DHCP
- Problem
- Solution
- Discussion
- See Also
- Limiting the Impact of IP Helper Addresses
- Problem
- Solution
- Discussion
- See Also
- Using DHCP to Dynamically Configure Router IP Addresses
- Problem
- Solution
- Discussion
- Dynamically Allocating Client IP Addresses via DHCP
- Problem
- Solution
- Discussion
- See Also
- Defining DHCP Configuration Options
- Problem
- Solution
- Discussion
- See Also
- Defining DHCP Lease Periods
- Problem
- Solution
- Discussion
- See Also
- Allocating Static IP Addresses with DHCP
- Problem
- Solution
- Discussion
- See Also
- Configuring a DHCP Database Client
- Problem
- Solution
- Discussion
- See Also
- Configuring Multiple DHCP Servers per Subnet
- Problem
- Solution
- Discussion
- See Also
- DHCP Static Mapping
- Problem
- Solution
- Discussion
- See Also
- DHCP-Secured IP Address Assignment
- Problem
- Solution
- Discussion
- Showing DHCP Status
- Problem
- Solution
- Discussion
- See Also
- Debugging DHCP
- Problem
- Solution
- Discussion
- 21. NAT
- Introduction
- Configuring Basic NAT Functionality
- Problem
- Solution
- Discussion
- Allocating External Addresses Dynamically
- Problem
- Solution
- Discussion
- See Also
- Allocating External Addresses Statically
- Problem
- Solution
- Discussion
- See Also
- Translating Some Addresses Statically and Others Dynamically
- Problem
- Solution
- Discussion
- See Also
- Using Route Maps to Refine Static Translation Rules
- Problem
- Solution
- Discussion
- See Also
- Translating in Both Directions Simultaneously
- Problem
- Solution
- Discussion
- See Also
- Rewriting the Network Prefix
- Problem
- Solution
- Discussion
- Using NAT for Server Load Distribution
- Problem
- Solution
- Discussion
- Stateful NAT Failover
- Problem
- Solution
- Discussion
- See Also
- Adjusting NAT Timers
- Problem
- Solution
- Discussion
- See Also
- Changing TCP Ports for FTP
- Problem
- Solution
- Discussion
- Checking NAT Status
- Problem
- Solution
- Discussion
- Debugging NAT
- Problem
- Solution
- Discussion
- 22. First Hop Redundancy Protocols
- Introduction
- Configuring Basic HSRP Functionality
- Problem
- Solution
- Discussion
- See Also
- Using HSRP Preempt
- Problem
- Solution
- Discussion
- See Also
- Making HSRP React to Problems on Other Interfaces
- Problem
- Solution
- Discussion
- See Also
- Load-Balancing with HSRP
- Problem
- Solution
- Discussion
- See Also
- Redirecting ICMP with HSRP
- Problem
- Solution
- Discussion
- Manipulating HSRP Timers
- Problem
- Solution
- Discussion
- Using HSRP on Token Ring
- Problem
- Solution
- Discussion
- See Also
- HSRP SNMP Support
- Problem
- Solution
- Discussion
- See Also
- Increasing HSRP Security
- Problem
- Solution
- Discussion
- See Also
- Showing HSRP State Information
- Problem
- Solution
- Discussion
- Debugging HSRP
- Problem
- Solution
- Discussion
- HSRP Version 2
- Problem
- Solution
- Discussion
- See Also
- VRRP
- Problem
- Solution
- Discussion
- See Also
- Gateway Load-Balancing Protocol
- Problem
- Solution
- Discussion
- See Also
- 23. IP Multicast
- Introduction
- IGMP and CGMP
- Multicast Routing Protocols
- PIM-DM, PIM-SM, and Bidirectional PIM
- DVMRP
- MOSPF
- MBGP
- Configuring Basic Multicast Functionality with PIM-DM
- Problem
- Solution
- Discussion
- Routing Multicast Traffic with PIM-SM and BSR
- Problem
- Solution
- Discussion
- Routing Multicast Traffic with PIM-SM and Auto-RP
- Problem
- Solution
- Discussion
- See Also
- Filtering PIM Neighbors
- Problem
- Solution
- Discussion
- Configuring Routing for a Low-Frequency Multicast Application
- Problem
- Solution
- Discussion
- See Also
- Multicast over Frame Relay or ATM WANs
- Problem
- Solution
- Discussion
- See Also
- Configuring CGMP
- Problem
- Solution
- Discussion
- Using IGMP Version 3
- Problem
- Solution
- Discussion
- See Also
- Static Multicast Routes and Group Memberships
- Problem
- Solution
- Discussion
- Routing Multicast Traffic with MOSPF
- Problem
- Solution
- Discussion
- Routing Multicast Traffic with DVMRP
- Problem
- Solution
- Discussion
- See Also
- DVMRP Tunnels
- Problem
- Solution
- Discussion
- See Also
- Configuring Bidirectional PIM
- Problem
- Solution
- Discussion
- See Also
- Controlling Multicast Scope with TTL
- Problem
- Solution
- Discussion
- See Also
- Controlling Multicast Scope with Administratively Scoped Addressing
- Problem
- Solution
- Discussion
- Exchanging Multicast Routing Information with MBGP
- Problem
- Solution
- Discussion
- See Also
- Using MSDP to Discover External Sources
- Problem
- Solution
- Discussion
- See Also
- Configuring Anycast RP
- Problem
- Solution
- Discussion
- See Also
- Converting Broadcasts to Multicasts
- Problem
- Solution
- Discussion
- See also
- Showing Multicast Status
- Problem
- Solution
- Discussion
- Debugging Multicast Routing
- Problem
- Solution
- Discussion
- Introduction
- 24. IP Mobility
- Introduction
- Terminology
- Local Area Mobility
- Local Area Mobility
- Problem
- Solution
- Discussion
- See Also
- Home Agent Configuration
- Problem
- Solution
- Discussion
- See Also
- Foreign Agent Configuration
- Problem
- Solution
- Discussion
- Authenticating the Foreign Agent
- See Also
- Making a Router a Mobile Node
- Problem
- Solution
- Discussion
- Authenticating with the Foreign Agent
- See Also
- Reverse-Tunnel Forwarding
- Problem
- Solution
- Discussion
- See Also
- Using HSRP for Home Agent Redundancy
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 25. IPv6
- Introduction
- IPv6 Addressing
- Addressing Standards
- IEEE EUI-64 Identifiers
- Routing Protocols
- Automatically Generating IPv6 Addresses for an Interface
- Problem
- Solution
- Discussion
- See Also
- Manually Configuring IPv6 Addresses on an Interface
- Problems
- Solution
- Discussion
- See Also
- Configuring DHCP for IPv6
- Problem
- Solution
- Discussion
- See Also
- Dynamic Routing with RIP
- Problem
- Solution
- Discussion
- See Also
- Modifying the Default RIP Parameters
- Problem
- Solution
- Discussion
- See Also
- IPv6 Route Filtering and Metric Manipulation in RIP
- Problem
- Solution
- Discussion
- See Also
- Using OSPF for IPv6
- Problem
- Solution
- Discussion
- See Also
- IPv6 Route Filtering and Metric Manipulation in OSPF
- Problem
- Solution
- Discussion
- See Also
- Route Redistribution
- Problem
- Solution
- Discussion
- See Also
- Dynamic Routing with MBGP
- Problem
- Solution
- Discussion
- See Also
- Tunneling IPv6 Through an Existing IPv4 Network
- Problem
- Solution
- Discussion
- See Also
- Translating Between IPv6 and IPv4
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 26. MPLS
- Introduction
- Some Terminology
- Benefits of MPLS
- IOS Versions and Feature Sets
- Structure of This Chapter
- Configuring a Basic MPLS P Router
- Problem
- Solution
- Discussion
- See Also
- Configuring a Basic MPLS PE Router
- Problem
- Solution
- Discussion
- See Also
- Configuring Basic MPLS CE Routers
- Problem
- Solution
- Discussion
- See Also
- Configuring MPLS over ATM
- Problem
- Solution
- Discussion
- PE-CE Communication via RIP
- Problem
- Solution
- Discussion
- See Also
- PE-CE Communication via OSPF
- Problem
- Solution
- Discussion
- See Also
- PE-CE Communication via EIGRP
- Problem
- Solution
- Discussion
- See Also
- PE-CE Communication via BGP
- Problem
- Solution
- Discussion
- See Also
- QoS over MPLS
- Problem
- Solution
- Discussion
- See Also
- MPLS Traffic Engineering with Autoroute
- Problem
- Solution
- Discussion
- See Also
- Multicast Over MPLS
- Problem
- Solution
- Discussion
- See Also
- Your Service Provider Doesnt Do What You Want
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 27. Security
- Introduction
- CBAC
- PAM
- Authentication Proxy
- TCP Intercept
- Intrusion Prevention
- AutoSecure
- Using AutoSecure
- Problem
- Solution
- Discussion
- Using Context-Based Access-Lists
- Problem
- Solution
- Discussion
- See Also
- Transparent Cisco IOS Firewall
- Problem
- Solution
- Discussion
- See Also
- Stopping Denial of Service Attacks
- Problem
- Solution
- Discussion
- Inspecting Applications on Different Port Numbers
- Problem
- Solution
- Discussion
- See Also
- Intrusion Detection and Prevention
- Problem
- Solution
- Discussion
- Intrusion detection
- Intrusion prevention
- See Also
- Login Password Retry Lockout
- Problem
- Solution
- Discussion
- See Also
- Authentication Proxy
- Problem
- Solution
- Discussion
- See Also
- Introduction
- 1. External Software Packages
- Perl
- Expect
- NET-SNMP
- PuTTY
- OpenSSH
- Ethereal
- 2. IP Precedence, TOS, and DSCP Classifications
- IP Precedence, TOS, and DSCP Classifications
- Combining TOS and IP Precedence to Mimic DSCP
- RSVP
- Queueing Algorithms
- Weighted Fair Queueing
- Priority Queueing
- Custom Queueing
- Dropping Packets and Congestion Avoidance
- IP Precedence, TOS, and DSCP Classifications
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Nowość Promocja
Business decisions in any context—operational, tactical, or strategic—can have considerable consequences. Whether the outcome is positive and rewarding or negative and damaging to the business, its employees, and stakeholders is unknown when action is approved. These decisions are usually made under the proverbial cloud of uncertainty.With this pra- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Nowość Promocja
If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike datab- ePub + Mobi 254 pkt
Aerospike: Up and Running. Developing on a Modern Operational Database for Globally Distributed Apps
(228,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Nowość Promocja
Reinforcement learning (RL) has led to several breakthroughs in AI. The use of the Q-learning (DQL) algorithm alone has helped people develop agents that play arcade games and board games at a superhuman level. More recently, RL, DQL, and similar methods have gained popularity in publications related to financial research.This book is among the fir- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Nowość Promocja
Learn how to use Go's strengths to develop services that are scalable and resilient even in an unpredictable environment. With this book's expanded second edition, Go developers will explore the composition and construction of cloud native applications, from lower-level Go features and mid-level patterns to high-level architectural considerations.E- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
To ensure that applications are reliable and always available, more businesses today are moving applications to AWS. But many companies still struggle to design and build these cloud applications effectively, thinking that because the cloud is resilient, their applications will be too. With this practical guide, software, DevOps, and cloud engineer- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Performance tuning is an experimental science, but that doesn't mean engineers should resort to guesswork and folklore to get the job done. Yet that's often the case. With this practical book, intermediate to advanced Java technologists working with complex platforms will learn how to tune Java cloud applications for performance using a quantitativ- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Today, investment in financial technology and digital transformation is reshaping the financial landscape and generating many opportunities. Too often, however, engineers and professionals in financial institutions lack a practical and comprehensive understanding of the concepts, problems, techniques, and technologies necessary to build a modern, r- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of agile custom-centricity to their own developers. Adding product management to infrastructure organizations is now all the rage.But how's that possible- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja
Cloud services and SaaS software permeate every company's IT landscape, requiring a shift from manually provisioned services to a more structured approach, with codification at its core. Terraform provides tools to manage the lifecycle of your IT landscape across thousands of different cloud providers and SaaS platforms.By defining your infrastruct- ePub + Mobi 211 pkt
(194,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
Promocja
Using machine learning for products, services, and critical business processes is quite different from using ML in an academic or research setting—especially for recent ML graduates and those moving from research to a commercial environment. Whether you currently work to create products and services that use ML, or would like to in the future, this- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%)
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Książka drukowana
Oceny i opinie klientów: Cisco IOS Cookbook. 2nd Edition Kevin Dooley, Ian Brown (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.