- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 798
- Dostępne formaty:
-
ePubMobi
Opis
książki
:
Cisco IOS in a Nutshell. 2nd Edition
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.
If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly.
Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly.
This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks.
The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
Wybrane bestsellery
-
Promocja
MikroTik, łotewska firma z siedzibą w Rydze, od lat produkuje sprzęt sieciowy. Przystępna cena i świetna jakość sprawiły, że urządzenia sygnowane logo MikroTik zdobyły niezwykłą popularność - po produkty łotewskiej marki sięga się coraz częściej. Jeśli planujesz zmodernizować lub zbudować sieć i chcesz w tym celu użyć urządzeń MikroTik, ta książka Ci w tym pomoże.- PDF + ePub + Mobi
- Druk 39 pkt
(37,89 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł (-50%) -
Promocja
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux powstał z myślą o administratorach rozpoczynających przygodę z bezpieczeństwem w sieciach komputerowych. Zapewnia on praktyczną wiedzę o bezpieczeństwie sieci. Jeśli chcesz wejść w świat technologii Cisco Security i nauczyć się blokować ataki hakerów podczas tego szkolenia zyskasz solidne podstawy praktyczne oraz teoretyczne.- Videokurs 266 pkt
(39,90 zł najniższa cena z 30 dni)
266.00 zł
760.00 zł (-65%) -
Promocja
Description This simple, well organized book provides the theory as well as the practical aspects of computer network. It covers the pillars of a computer network, like transmission, data transfer, and communication. It covers foundational concepts, explaining the OSI and TCP/IP models, digital transmission, interfaces, modems, and media characteri- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] jest certyfikatem, który odzwierciedla szeroką wiedzę zdającego – zarówno teoretyczną, jak i praktyczną. Trzeba się bowiem legitymować naprawdę szerokimi umiejętnościami, by zdobyć ten certyfikat. Ze względu na obszerność tematu kurs przygotowujący do egzaminu został podzielony na kilka części – to szkolenie jest ósmą odsłoną cyklu. Tym razem skupiamy się na kwestiach związanych z programowaniem i automatyzacją sieci komputerowych, istotnych przede wszystkim dla osób, które nadzorują pracę urządzeń sieciowych i konfigurują sprzęt sieciowy, opierając się na poszczególnych warstwach modelu OSI – czyli dla administratorów sieci komputerowych.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
Kurs stworzony z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR] został – ze względu na dużą objętość materiału – podzielony na kilka części. Wynika to ze specyfiki samego egzaminu, który obejmuje niezwykle szeroki zakres tematyczny – zarówno w części teoretycznej, jak i praktycznej. Certyfikat zaświadcza więc o tym, że jego posiadacz dysponuje naprawdę zaawansowaną wiedzą na temat zagadnień związanych z administrowaniem sieciami komputerowymi i ich budową. Doceniają to także pracodawcy, a ponieważ bez sieci komputerowych trudno wyobrazić sobie w XXI wieku jakąkolwiek działalność, prawdziwi specjaliści mogą przebierać w ofertach.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Po omówieniu w poprzednich częściach serii kursów zagadnień dotyczących redundancji, routingu EIGRP, zabezpieczania sieci, konfiguracji protokołu routingu OSPF i sieci WAN w ramach tego szkolenia przedstawiamy tajniki działania, konfiguracji i testowania sieci Wi-Fi w przedsiębiorstwie. Cisco CCNP Enterprise (350-401 ENCOR). Kurs video. Część 6. Sieci bezprzewodowe i przeprowadzanie testów przygotowaliśmy przede wszystkim z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale z zawartej tu wiedzy z powodzeniem skorzystają wszyscy zainteresowani tematyką sieci komputerowych. A ponieważ technologia nieustannie ewoluuje, zdobywanie na bieżąco nowych wiadomości jest konieczne, aby nie zostać z tyle i nadążać za dynamicznie zmieniającą się rzeczywistością. Nie maleje zatem na rynku pracy zapotrzebowanie na wykwalifikowanych specjalistów – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem. Do szczególnie cenionych certyfikatów należy właśnie Cisco CCNP Enterprise [350-401 ENCOR], którego otrzymanie jest poprzedzone niezwykle obszernym egzaminem, obejmującym zarówno liczne zagadnienia teoretyczne, jak i – przede wszystkim – wiedzę dotyczącą sieciowej praktyki. Właśnie ta obfitość zagadnień jest powodem, dla którego kurs przygotowawczy został podzielony na kilka części.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise 350-401 ENCOR. Kurs video. Sieci WLAN i routing pomiędzy oddziałami jest kolejnym z serii szkoleń przeznaczonych dla administratorów sieci. W poprzednich omówione zostały zagadnienia związane między innymi z redundancją w warstwach drugiej i trzeciej, routingiem EIGRP, zabezpieczaniem sieci i konfiguracją protokołu routingu OSPF. Kurs został przygotowany głównie z myślą o osobach zainteresowanych uzyskaniem certyfikatu Cisco CCNP Enterprise [350-401 ENCOR], ale zawarta w nim wiedza przyda się wszystkim zajmującym się zagadnieniem sieci komputerowych. A jest to wiedza bardzo szeroka, co więcej, jej obszar szybko się powiększa, bo sieci podlegają nieustannym zmianom, związanym choćby z wprowadzaniem nowych technologii. Stąd nieustanne zapotrzebowanie na specjalistów na rynku pracy – w ofertach mogą przebierać zwłaszcza ci, których wiedza i umiejętności są poparte certyfikatem.- Videokurs 245 pkt
(39,90 zł najniższa cena z 30 dni)
245.00 zł
490.00 zł (-50%) -
Promocja
CCNP Enterprise (350-401 ENCOR). Kurs video. Część 4. Zaawansowana konfiguracja protokołu routingu OSPF to kolejna część szkolenia przeznaczonego dla administratorów sieci i osób zainteresowanych zdobyciem certyfikatu Cisco CCNP Enterprise. W poprzednich omówione zostały między innymi zagadnienia redundancji w warstwie trzeciej i drugiej, list dostępu, budowy i zabezpieczania sieci. Ta część natomiast skupia się na kwestii konfiguracji protokołu routingu OSPF, któremu poświęca się sporo miejsca na egzaminie certyfikującym. Jest to także niezwykle popularny protokół, często stosowany w sieciach komputerowych – nie tylko tych używających sprzętu firmy Cisco.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Umiejętność budowy sieci komputerowych i zarządzania nimi jest niezwykle ceniona na rynku pracy. Specjaliści w tej dziedzinie mogą przebierać w ofertach i nic nie wskazuje, by miało się to w najbliższym czasie zmienić. Nic dziwnego – sieci komputerowe mają dla sprawnego funkcjonowania organizacji fundamentalne znaczenie. Tym bardziej w czasach, w których szybki przepływ informacji i sprawna komunikacja są ważniejsze niż kiedykolwiek. Jednak sieć sieci nierówna – a ponieważ płyną przez nią dane wrażliwe i poufne, niebywale istotne jest, by powierzyć ją wykwalifikowanemu i godnemu zaufania specjaliście, który zadba należycie o jej bezpieczeństwo. Dobrze więc posiadać twarde umiejętności potwierdzone odpowiednim certyfikatem – a Cisco CCNP Enterprise [350-401 ENCOR] jest jednym z najbardziej znanych i renomowanych.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%) -
Promocja
Cisco CCNP Enterprise [350-401 ENCOR] to bardzo ceniony na rynku egzamin certyfikacyjny poświadczający znajomość konstruowania sieci z wykorzystaniem sprzętu renomowanej firmy Cisco. Egzamin jest niebywale obszerny i obejmuje zarówno zagadnienia praktyczne, jak i teoretyczne; kładzie nacisk na umiejętność kojarzenia faktów i wyciągania logicznych wniosków, a nie tylko mechaniczne zapamiętywanie określonych czynności. Aby móc z dumą nazywać się prawdziwym sieciowcem, nie można jedynie wiedzieć, gdzie i jak podłączyć router, trzeba jeszcze mieć świadomość, dlaczego należy to zrobić właśnie tak.- Videokurs 220 pkt
(39,90 zł najniższa cena z 30 dni)
220.50 zł
490.00 zł (-55%)
Ebooka "Cisco IOS in a Nutshell. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Cisco IOS in a Nutshell. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Cisco IOS in a Nutshell. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5311-1, 9780596553111
- Data wydania ebooka :
- 2005-08-22 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 3.2MB
- Rozmiar pliku Mobi:
- 3.2MB
Spis treści książki
- Cisco IOS in a Nutshell, 2nd Edition
- Preface
- Organization
- Whats New in This Edition
- Conventions
- Safari Enabled
- Wed Like to Hear from You
- Acknowledgments
- 1. Getting Started
- 1.1. IOS User Modes
- 1.2. Command-Line Completion
- 1.3. Get to Know the Question Mark
- 1.4. Command-Line Editing Keys
- 1.5. Pausing Output
- 1.6. show Commands
- 2. IOS Images and Configuration Files
- 2.1. IOS Image Filenames
- 2.1.1. Platform Identifier
- 2.1.2. Feature Set
- 2.1.3. Image Execution Location
- 2.2. The New Cisco IOS Packaging Model
- 2.2.1. Example of New Image Name
- 2.2.2. Status of the Release
- 2.2.3. Finding the Release on Ciscos Web Site
- 2.3. Loading Image Files Through the Network
- 2.3.1. Using TFTP to Download Files
- 2.3.2. Using RCP to Download Files
- 2.3.3. Using SCP to Download Files
- 2.4. Using the IOS Filesystem for Images
- 2.4.1. Upgrading Flash Memory Using the Filesystem Commands
- 2.5. The Routers Configuration
- 2.6. Loading Configuration Files
- 2.6.1. Loading the running-config
- 2.6.2. Loading the startup-config
- 2.6.3. Saving running-config to startup-config
- 2.6.4. Viewing a Configuration
- 2.6.4.1. Options for the show config command
- 2.6.4.2. Stopping the More prompt
- 2.6.5. Erasing a Stored Configuration
- 2.6.6. Saving a Configuration to a Network Server
- 2.1. IOS Image Filenames
- 3. Basic Router Configuration
- 3.1. Setting the Router Name
- 3.2. Setting the System Prompt
- 3.3. Configuration Comments
- 3.4. The Enable Password
- 3.5. Mapping Hostnames to IP Addresses
- 3.5.1. IP Host Tables
- 3.5.2. Enabling DNS
- 3.6. Setting the Routers Time
- 3.6.1. The Calendar Versus the Clock
- 3.6.2. Configuring NTP
- 3.7. Enabling SNMP
- 3.8. Cisco Discovery Protocol
- 3.9. System Banners
- 3.9.1. Creating Banners
- 3.9.2. Disabling Banners
- 4. Line Commands
- 4.1. The line Command
- 4.1.1. Absolute and Relative Line Numbering
- 4.2. The Console Port
- 4.3. Virtual Terminals (VTYs)
- 4.4. Asynchronous Ports (TTYs)
- 4.5. The Auxiliary (AUX) Port
- 4.6. show line
- 4.7. Reverse Telnet
- 4.8. Common Configuration Items
- 4.8.1. Communication Parameters
- 4.8.2. Transport Type
- 4.8.3. Session Limits and Timeouts
- 4.8.4. Special Characters and Key Sequences
- 4.1. The line Command
- 5. Interface Commands
- 5.1. Naming and Numbering Interfaces
- 5.1.1. Subinterfaces
- 5.2. Basic Interface Configuration Commands
- 5.2.1. shutdown
- 5.2.2. Interface Descriptions
- 5.2.3. Setting the IP Address and Subnet Mask
- 5.2.3.1. Secondary IP address(es)
- 5.2.4. Other Common Interface Commands
- 5.3. The Loopback Interface
- 5.4. The Null Interface
- 5.5. Ethernet, Fast Ethernet, and Gigabit Ethernet Interfaces
- 5.6. Token Ring Interfaces
- 5.7. ISDN Interfaces
- 5.7.1. A Simple ISDN Configuration
- 5.8. Serial Interfaces
- 5.8.1. Serial Encapsulation
- 5.8.2. Serial T1 Connection
- 5.8.3. T1 Configuration on a 2524 with a CSU/DSU Card
- 5.8.4. Channelized T1
- 5.9. Asynchronous Interfaces
- 5.9.1. Using the group-async Command
- 5.9.2. Specifying an IP Address Pool
- 5.9.3. Using BOOTP Configuration Items for Dial-in Connections
- 5.9.4. Using DHCP for IP Addresses and Dial-in Configuration Items
- 5.10. Interface show Commands
- 5.10.1. Clearing the show Command Counters
- 5.10.2. Listing All Interfaces
- 5.10.3. Using the show interface Commands
- 5.10.3.1. show interface accounting
- 5.10.3.2. show ip interface
- 5.1. Naming and Numbering Interfaces
- 6. Networking Technologies
- 6.1. Frame Relay
- 6.1.1. Important Frame Relay Terminology
- 6.1.2. Frame Relay Configuration
- 6.1.3. Mapping IP Addresses to DLCIs
- 6.1.3.1. Explicitly mapping DLCIs
- 6.1.3.2. Configuring a multipoint connection
- 6.1.4. Frame Relay Traffic Shaping
- 6.1.4.1. Enabling traffic-shaping on a frame relay link
- 6.1.4.2. Adaptive shaping
- 6.1.5. Frame Relay show Commands
- 6.2. ATM
- 6.2.1. ATM Terminology
- 6.2.2. Configuring Permanent Virtual Circuits
- 6.2.2.1. Configuring an ATM interface with static IP mapping
- 6.2.2.2. Configuring an ATM interface with dynamic IP mapping
- 6.2.3. Configuring Switched Virtual Circuits
- 6.2.3.1. ATM ARP server
- 6.2.4. Configuring with DXI
- 6.2.5. ATM show Commands
- 6.2.6. LAN Emulation (LANE)
- 6.2.6.1. LANE configuration notes
- 6.2.6.2. Configuring the LECS
- 6.2.6.3. Configuring the LES/BUS
- 6.2.6.4. Configuring the LEC
- 6.2.6.5. LANE show commands
- 6.3. DSL
- 6.3.1. Configuring Our DSL Client Router
- 6.3.2. Troubleshooting a DSL Connection
- 6.4. Cable
- 6.5. VoIP
- 6.5.1. VoIP Protocols
- 6.5.1.1. H.323
- 6.5.1.2. MGCP
- 6.5.1.3. SIP
- 6.5.2. VoIP Terminology
- 6.5.3. Examples
- 6.5.3.1. FXO Gateway to PSTN
- 6.5.3.2. H.323 call routing
- 6.5.3.3. MGCP call routing
- 6.5.3.4. SIP Configuration for VoIP
- 6.5.1. VoIP Protocols
- 6.1. Frame Relay
- 7. Access Lists
- 7.1. How Packets Match a List Entry
- 7.1.1. Address/Mask Pairs (Wildcards)
- 7.1.2. Computing a Wildcard for a Given Subnet Mask
- 7.1.3. Access List Processing
- 7.1.4. Implicit Deny
- 7.1.5. Access Lists Are Additive
- 7.1.6. Outbound Access Lists Are More Efficient Than Inbound
- 7.2. Types of Access Lists
- 7.2.1. Extended Access Lists
- 7.2.1.1. Specifying ports
- 7.2.1.2. Established connections
- 7.2.1.3. ICMP protocol entries
- 7.2.1.4. Applying an access list to an interface or line
- 7.2.2. Named Access Lists
- 7.2.2.1. Entering noncontiguous ports
- 7.2.3. Reflexive Access Lists
- 7.2.3.1. Creating the outbound reflexive list
- 7.2.3.2. Creating the inbound reflexive list
- 7.2.3.3. Applying the inbound and outbound reflexive lists to an interface
- 7.2.3.4. Setting the reflexive timeout
- 7.2.3.5. Reflexive list notes
- 7.2.1. Extended Access Lists
- 7.3. Specific Topics
- 7.3.1. Adding Comments to an Access List
- 7.3.2. Timed Access Lists
- 7.3.3. Building a Gateway Router
- 7.3.3.1. IP address spoofing
- 7.3.3.2. Permitting FTP through an access list
- 7.3.3.3. Passive FTP
- 7.3.3.4. The actual access list
- 7.3.4. Optimizing Your Access Lists
- 7.3.5. Emulating a Packet Sniffer
- 7.3.6. Logging Access List Violations
- 7.3.7. Securely Updating Access Lists
- 7.3.8. Getting the List to a Router with TFTP, RCP, or SCP
- 7.1. How Packets Match a List Entry
- 8. IP Routing Topics
- 8.1. Autonomous System (AS) Numbers
- 8.2. Interior and Exterior Gateway Protocols
- 8.3. Distance-Vector and Link-State Routing Protocols
- 8.3.1. Distance-Vector Protocols
- 8.3.2. Link-State Routing Protocols
- 8.3.3. Administrative Distance
- 8.3.4. Variable-Length Subnet Masks (VLSM) and Classless Routing
- 8.3.5. Protocol Comparison
- 8.4. Static Routes
- 8.4.1. Default Static Routes
- 8.4.2. A Static Route to the Null Interface
- 8.4.3. Backup Static Routes
- 8.5. Split Horizon
- 8.6. Passive Interfaces
- 8.6.1. Route Redistribution
- 8.6.2. Filtering Routes
- 8.6.2.1. Filtering incoming routes
- 8.6.2.2. Filtering outgoing routes
- 8.6.2.3. Filtering updates during redistribution
- 8.6.2.4. Revisiting the example
- 8.6.3. Route Maps
- 8.6.3.1. Enforcing routing policy with route maps
- 8.6.3.2. Enforcing routing policy with the ip policy command
- 8.7. Fast Switching and Process Switching
- 8.7.1. Fast Switching
- 8.7.2. Process Switching
- 8.7.3. Useful show Commands
- 8.7.3.1. show ip route summary
- 8.7.3.2. clear ip route
- 8.7.3.3. show ip protocols
- 9. Interior Routing Protocols
- 9.1. RIP
- 9.1.1. Basic RIP Configuration
- 9.1.2. Enabling RIPv2 on the Network
- 9.1.3. Redistributing Other Routing Protocols into RIP
- 9.1.4. RIPv2 Authentication
- 9.2. IGRP
- 9.2.1. Basic IGRP Configuration
- 9.2.1.1. IGRPs metric
- 9.2.1.2. Packet size
- 9.2.1.3. Modifying the range of the network
- 9.2.1.4. IGRPs load balancing
- 9.2.2. Redistributing Other Protocols into IGRP
- 9.2.1. Basic IGRP Configuration
- 9.3. EIGRP
- 9.3.1. Enabling EIGRP on the Network
- 9.3.2. EIGRP and Route Summarization
- 9.3.2.1. Enabling route summarization on a specific interface
- 9.3.3. EIGRP Authentication
- 9.3.4. EIGRP Metrics
- 9.3.5. Tuning EIGRP
- 9.3.6. EIGRP show Commands
- 9.3.6.1. show ip eigrp neighbors
- 9.3.6.2. show ip eigrp topology
- 9.3.6.3. show ip eigrp traffic
- 9.3.7. EIGRP Redistribution
- 9.3.7.1. RIP
- 9.3.7.2. IGRP
- 9.3.8. Converting an IGRP Network to EIGRP
- 9.4. OSPF
- 9.4.1. OSPF Concepts
- 9.4.1.1. Areas
- 9.4.1.2. Router types
- 9.4.1.3. Link-state advertisements (LSAs)
- 9.4.1.4. Area types
- 9.4.1.5. Router ID
- 9.4.1.6. Designated router (DR)
- 9.4.2. Enabling OSPF on the Network
- 9.4.3. Sample OSPF Configurations
- 9.4.4. Route Summarization in OSPF
- 9.4.4.1. Inter-area summarization
- 9.4.4.2. External summarization
- 9.4.5. Virtual Backbone Links
- 9.4.6. Interoperability with Other Vendors
- 9.4.7. Default Routes in OSPF
- 9.4.8. NSSAs (Not-So-Stubby Areas)
- 9.4.9. OSPF Configuration Example
- 9.4.9.1. Putting route summarization to use
- 9.4.10. Redistributing Other Protocols into OSPF
- 9.4.11. OSPF show Commands
- 9.4.11.1. show ip ospf border routers
- 9.4.11.2. show ip ospf neighbor
- 9.4.11.3. show ip ospf database
- 9.4.11.4. show ip ospf interface
- 9.4.1. OSPF Concepts
- 9.5. IS-IS
- 9.5.1. IS-IS Concepts
- 9.5.1.1. Level 1 and level 2
- 9.5.1.2. NSAP addressing
- 9.5.1.3. Enabling an interface for IS-IS
- 9.5.2. IS-IS configuration example
- 9.5.3. Show Commands
- 9.5.4. Authentication
- 9.5.5. Metric Tuning
- 9.5.6. Injecting a Default Route
- 9.5.7. IS-IS Route Leaking
- 9.5.1. IS-IS Concepts
- 9.1. RIP
- 10. Border Gateway Protocol
- 10.1. Introduction to BGP
- 10.1.1. How BGP Selects Routes
- 10.1.2. Basic Configuration Commands
- 10.1.2.1. The router and network commands
- 10.1.2.2. The neighbor command
- 10.1.2.3. Local-AS numbers
- 10.1.2.4. Synchronization
- 10.1.2.5. Automatic summary
- 10.1.2.6. default-originate
- 10.1.2.7. next-hop-self
- 10.1.2.8. BGP route dampening
- 10.1.2.9. iBGP checklist
- 10.2. A Simple BGP Configuration
- 10.3. Route Filtering
- 10.3.1. AS Path Filters
- 10.3.2. Community Filters
- 10.3.3. Aggregate Filters
- 10.4. An Advanced BGP Configuration
- 10.4.1. Adding a Preference
- 10.5. Neighbor Authentication
- 10.6. Peer Groups
- 10.7. Route Reflectors
- 10.8. BGP Confederacies
- 10.9. BGP TTL Security
- 10.1. Introduction to BGP
- 11. Quality of Service
- 11.1. Marking
- 11.1.1. Different Types of ToS
- 11.1.1.1. IPv4 ToS Byte
- 11.1.1.2. Differentiated Services Codepoint (DSCP)
- 11.1.1.3. Assured Forwarding
- 11.1.1.4. Expedited Forwarding
- 11.1.1.5. DSCP example
- 11.1.1. Different Types of ToS
- 11.2. Older Queuing Methods
- 11.2.1. FIFO
- 11.2.2. Priority Queuing
- 11.2.2.1. Monitoring priority queueing
- 11.2.3. Custom Queuing
- 11.2.3.1. Setting the queue size
- 11.2.3.2. Applying a queue to an interface
- 11.2.3.3. Assigning packets to queues by protocol type
- 11.2.4. Weighted Fair Queuing (WFQ)
- 11.2.4.1. Monitoring WFQ
- 11.3. Modern IOS QoS Tools
- 11.3.1. Network-Based Application Recognition (NBAR)
- 11.3.1.1. NBAR in action
- 11.3.1.2. NBAR protocol discovery
- 11.3.2. Modular QoS CLI (MQC)
- 11.3.2.1. Step One: Defining the class maps
- 11.3.2.2. Step Two: Defining the QoS policy
- 11.3.2.3. Step 3: Defining where to apply the service policy
- 11.3.3. Implementing Class-Based Weighted Fair Queuing with MQC
- 11.3.4. Low-Latency Queuing (LLQ)
- 11.3.1. Network-Based Application Recognition (NBAR)
- 11.4. Congestion Avoidance
- 11.4.1. Weighted Random Early Detection (WRED)
- 11.4.1.1. Configuring WRED on an interface
- 11.4.1.2. Using WRED instead of Tail-drop in CBWFQ
- 11.4.1. Weighted Random Early Detection (WRED)
- 11.5. Traffic Policing
- 11.5.1. MQC Policing
- 11.5.2. Committed Access Rate (CAR)
- 11.5.2.1. Rate-limit example
- 11.6. Traffic Shaping
- 11.6.1. Traffic Shaping Example
- 11.6.2. Frame-Relay Shaping
- 11.7. AutoQoS
- 11.7.1. What Does AutoQoS Enable?
- 11.7.2. AutoQoS Command Usage
- 11.7.2.1. Command syntax
- 11.7.2.2. AutoQoS discovery
- 11.7.2.3. AutoQoS show command
- 11.8. QoS Device Manager
- 11.1. Marking
- 12. Dial-on-Demand Routing
- 12.1. Configuring a Simple DDR Connection
- 12.2. Sample Legacy DDR Configurations
- 12.2.1. DDR Backup Links
- 12.2.1.1. Backup interface commands
- 12.2.1.2. DDR bandwidth on demand with backup interface commands
- 12.2.1.3. DDR backup with floating static routes
- 12.2.2. Dialer Maps
- 12.2.2.1. The most basic form of this command
- 12.2.2.2. A more complicated use of dialer maps
- 12.2.1. DDR Backup Links
- 12.3. Dialer Interfaces (Dialer Profiles)
- 12.3.1. Rotary Groups
- 12.3.2. Dialer Pools
- 12.4. Multilink PPP
- 12.5. Snapshot DDR
- 12.5.1. Useful show Commands
- 12.5.1.1. show dialer
- 12.5.1.2. show dialer map
- 12.5.1.3. show isdn active
- 12.5.1.4. show snapshot
- 12.5.1. Useful show Commands
- 13. Specialized Networking Topics
- 13.1. Bridging
- 13.1.1. Concurrent Routing and Bridging (CRB)
- 13.1.2. Integrated Routing and Bridging (IRB)
- 13.1.3. Bridging show Commands
- 13.1.3.1. show bridge
- 13.1.3.2. show bridge group
- 13.1.4. DLSw+
- 13.2. Hot Standby Routing Protocol (HSRP)
- 13.2.1. Tracking Another Interface
- 13.2.2. Naming Our HSRP Configuration
- 13.2.3. Multiple-Group Hot Standby Routing
- 13.2.4. Load Sharing with Hot Standby
- 13.2.5. HSRP show Commands
- 13.3. Network Address Translation (NAT)
- 13.3.1. Overloading NAT Address Space
- 13.3.1.1. Mapping incoming ports to different NAT addresses
- 13.3.2. NAT show Commands
- 13.3.3. Stateful NAT (SNAT)
- 13.3.3.1. Configuring SNAT with HSRP
- 13.3.3.2. Configuring SNAT without HSRP
- 13.3.1. Overloading NAT Address Space
- 13.4. Tunnels
- 13.4.1. show Commands for Tunnels
- 13.5. Encrypted Tunnels
- 13.5.1. Tunnel Encryption with DSS and DES
- 13.5.1.1. Generating keys
- 13.5.1.2. Configuring encryption on the tunnel
- 13.5.2. DES Tunnel show Commands
- 13.5.2.1. show crypto engine connections active
- 13.5.2.2. show crypto engine configuration
- 13.5.3. IPSec Tunneling
- 13.5.4. Dynamic Multipoint VPN
- 13.5.4.1. Configuring DMVPN
- 13.5.4.1.1. Configuring an IPSec profile
- 13.5.4.1.2. Configuring the hub for DMVPN
- 13.5.4.1.3. Configuring a spoke router for DMVPN
- 13.5.4.1.4. Verifying DMVPN configuration
- 13.5.4.1. Configuring DMVPN
- 13.5.1. Tunnel Encryption with DSS and DES
- 13.6. Multicast Routing
- 13.6.1. IGMP
- 13.6.2. Reverse Path Forwarding
- 13.6.3. Dense Mode
- 13.6.3.1. Configuring multicast for dense mode
- 13.6.4. Sparse Mode
- 13.6.4.1. Configuring multicast for sparse mode
- 13.6.4.2. Auto-RP configuration and sparse-dense mode
- 13.6.4.3. BSR
- 13.6.5. Cisco Group Management Protocol (CGMP)
- 13.7. Multiprotocol Label Switching (MPLS)
- 13.7.1. MPLS Terminology
- 13.7.2. How Does It Work?
- 13.7.3. Configuring MPLS
- 13.7.3.1. Incrementally deploying MPLS
- 13.7.3.2. Verifying the MPLS configuration
- 13.7.4. MPLS VPN
- 13.1. Bridging
- 14. Switches and VLANs
- 14.1. Switch Terminology
- 14.1.1. Layer-2 and Layer-3 Switching
- 14.1.2. Learning MAC Addresses
- 14.1.3. VLAN
- 14.1.4. Broadcast Domain
- 14.1.5. Collision Domain
- 14.1.6. Spanning Tree Protocol
- 14.1.6.1. Spanning Tree Port States
- 14.1.6.2. Bridge Protocol Data Units
- 14.1.6.3. STP selects the root bridge
- 14.1.6.4. Selecting a root port and a designated port
- 14.1.6.5. Convergence in STP
- 14.1.6.6. Speeding up STP convergence
- 14.1.6.7. show spanning-tree
- 14.2. IOS on Switches
- 14.3. Basic Switch Configuration
- 14.3.1. Configuring the Management Port (VLAN 1)
- 14.3.2. Simple Switch Configuration
- 14.3.3. Auto Detection
- 14.3.4. Sample VLAN Configuration
- 14.3.5. VLAN Interface Commands
- 14.4. Trunking
- 14.4.1. Restricting VLANs on a Trunk
- 14.4.2. Finishing Our Previous Network
- 14.4.3. Added Port Security
- 14.4.4. VLAN Trunking Protocol
- 14.4.5. VTP Modes
- 14.4.6. VLAN Database
- 14.4.7. Configuring VTP
- 14.4.7.1. Setting the VTP mode
- 14.4.7.2. Setting the VTP domain
- 14.4.7.3. Setting the VTP password
- 14.4.7.4. Creating a VLAN
- 14.4.7.5. Configuration example
- 14.4.8. Backing Up the VLAN Database
- 14.5. Switch Monitor Port for IDS or Sniffers
- 14.6. Troubleshooting Switches
- 14.1. Switch Terminology
- 15. Router Security
- 15.1. Securing Enable Mode Access
- 15.1.1. Setting the Enable Password
- 15.1.2. The More Secure enable secret Command
- 15.1.3. Privilege Levels for enable access
- 15.2. Routine Security Measures
- 15.2.1. Features to Disable
- 15.2.2. Features to Enable
- 15.2.2.1. Deny local IP addresses coming from outside
- 15.2.2.2. Use a warning banner
- 15.2.3. AutoSecure: Letting the Router Do the Work
- 15.3. Restricting Access to Your Router
- 15.3.1. Virtual Terminal Access
- 15.3.1.1. Protecting VTY with an access list
- 15.3.1.2. Allowing SSH connections to the router
- 15.3.1.3. Enabling SSH
- 15.3.2. Users and Authentication
- 15.3.2.1. Adding users with the user command
- 15.3.2.2. Using the AAA framework
- 15.3.2.3. User management with AAA
- 15.3.2.4. Restricting dial-in user access with AAA
- 15.3.1. Virtual Terminal Access
- 15.1. Securing Enable Mode Access
- 16. Troubleshooting and Logging
- 16.1. ping
- 16.1.1. Ping the Broadcast Address
- 16.1.2. Extended ping
- 16.1.2.1. What can we test with the source address?
- 16.2. trace
- 16.3. Debugging
- 16.3.1. Using Debugging in Practice
- 16.3.1.1. The debug list command
- 16.3.1. Using Debugging in Practice
- 16.4. Logging
- 16.4.1. Configuring Logging
- 16.4.2. Severity Levels
- 16.4.3. Buffering Logging and Debug Output
- 16.4.4. XML Output of Logging Messages
- 16.1. ping
- 17. Quick Reference
- aaa accounting
- aaa accounting delay-start
- aaa accounting gigawords
- aaa accounting nested
- aaa accounting resource
- aaa accounting send stop-record authentication failure
- aaa accounting session-duration ntp-adjusted
- aaa accounting suppress null-username
- aaa accounting update
- aaa authentication attempts login
- aaa authentication banner
- aaa authentication enable default
- aaa authentication fail-message
- aaa authentication local-override
- aaa authentication login
- aaa authentication password-prompt
- aaa authentication ppp
- aaa authentication username-prompt
- aaa authorization
- aaa authorization config-commands
- aaa authorization reverse-access
- aaa authorization template
- aaa configuration route
- aaa group server radius
- aaa group server tacacs+
- aaa new-model
- absolute-timeout
- access-class
- access-enable
- access-list
- access-list rate-limit
- access-template
- activation-character
- aggregate-address
- alias
- area authentication
- area default-cost
- area nssa
- area-password
- area range
- area stub
- area virtual-link
- arp (global)
- arp (interface)
- arp timeout
- async-bootp
- async default ip address
- async default routing
- async dynamic address
- async dynamic routing
- async mode
- atm address
- atm arp-server
- atm esi-address
- atm lecs-address
- atm lecs-address-default
- atm nsap-address
- atm pvc
- atm-vc
- autobaud
- autocommand
- autodetect encapsulation
- autohangup
- auto discovery qos
- auto qos voip
- auto secure
- autoselect
- auto-summary
- backup
- bandwidth (interface)
- bandwidth (policy-map)
- banner exec
- banner incoming
- banner login
- banner motd
- bgp always-compare-med
- bgp bestpath as-path ignore
- bgp bestpath med-confed
- bgp bestpath missing-as-worst
- bgp client-to-client reflection
- bgp cluster-id
- bgp confederation identifier
- bgp confederation peers
- bgp dampening
- bgp default local-preference
- bgp default route-target filter
- bgp deterministic med
- bgp fast-external-fallover
- bgp log-neighbor-changes
- bgp-policy
- bridge acquire
- bridge address
- bridge cmf
- bridge crb
- bridge forward-time
- bridge-group
- bridge-group aging-time
- bridge-group circuit-group
- bridge-group input-address-list
- bridge-group input-lsap-list
- bridge-group input-pattern
- bridge-group input-type-list
- bridge-group output-address-list
- bridge-group output-lsap-list
- bridge-group output-pattern
- bridge-group output-type-list
- bridge-group path-cost
- bridge-group priority
- bridge-group spanning-disabled
- bridge hello-time
- bridge irb
- bridge max-age
- bridge multicast-source
- bridge priority
- bridge protocol
- bridge route
- busy-message
- cable helper-address
- calendar set
- callback forced-wait
- cd
- cdp advertise-v2
- cdp enable
- cdp holdtime
- cdp run
- cdp timer
- channel-group (controller)
- channel-group (interface)
- chat-script
- class (frame-relay)
- class (MPLS)
- class (policy-map)
- class-map
- clear
- client-atm-address name
- clock calendar-valid
- clock rate
- clock read-calendar
- clock set
- clock summer-time
- clock timezone
- clock update-calendar
- compress
- config-register
- configure
- controller
- copy
- crc
- custom-queue-list
- databits
- data-character-bits
- dce-terminal-timing enable
- debug
- default-information
- default-information originate
- default-metric
- default-name
- delay
- delete
- description
- dialer aaa
- dialer callback-secure
- dialer callback-server
- dialer caller
- dialer dtr
- dialer enable-timeout
- dialer fast-idle
- dialer-group
- dialer hold-queue
- dialer idle-timeout
- dialer in-band
- dialer isdn
- dialer-list
- dialer load-threshold
- dialer map
- dialer map snapshot
- dialer max-link
- dialer pool
- dialer pool-member
- dialer priority
- dialer remote-name
- dialer rotary-group
- dialer rotor
- dialer string
- dialer wait-for-carrier-time
- dialer watch-disable
- dialer watch-group
- dialer watch-list
- dir
- disable
- disconnect
- disconnect-character
- disconnect ssh
- dispatch-character
- distance
- distance bgp
- distance eigrp
- distribute-list in
- distribute-list out
- domain-password
- downward-compatible-config
- down-when-looped
- drop
- dte-invert-txc
- early-token-release
- editing
- eigrp log-neighbor-changes
- enable
- enable last-resort
- enable password
- enable secret
- enable use-tacacs
- encapsulation (ATM/MPLS)
- encapsulation (interface)
- end
- erase
- escape-character
- exception core-file
- exception dump
- exception memory
- exception protocol
- exception spurious-interrupt
- exec
- exec-timeout
- exit
- fair-queue (policy-map class)
- fair-queue (interface)
- fair-queue aggregate-limit
- fair-queue individual-limit
- fair-queue limit
- fair-queue qos-group
- fair-queue tos
- fair-queue weight
- fddi burst-count
- fddi c-min
- fddi cmt-signal-bits
- fddi duplicate-address-check
- fddi encapsulate
- fddi frames-per-token
- fddi smt-frames
- fddi tb-min
- fddi tl-min-time
- fddi token-rotation-time
- fddi t-out
- fddi valid-transmission-time
- flowcontrol
- format
- frame-relay adaptive-shaping
- frame-relay [ bc | be]
- frame-relay becn-response-enable
- frame-relay broadcast-queue
- frame-relay cir
- frame-relay class
- frame-relay custom-queue-list
- frame-relay de-group
- frame-relay de-list
- frame-relay idle-timer
- frame-relay interface-dlci
- frame-relay intf-type
- frame-relay inverse-arp
- frame-relay ip rtp header-compression
- frame-relay ip tcp header-compression
- frame-relay lmi-type
- frame-relay local-dlci
- frame-relay map
- frame-relay map bridge
- frame-relay map clns
- frame-relay map ip compress
- frame-relay map ip rtp header-compression
- frame-relay map ip tcp header-compression
- frame-relay mincir
- frame-relay multicast-dlci
- frame-relay payload-compress packet-by-packet
- frame-relay priority-dlci-group
- frame-relay priority-group
- frame-relay route
- frame-relay svc
- frame-relay switching
- frame-relay traffic-rate
- frame-relay traffic-shaping
- fsck
- ftp-server enable
- ftp-server topdir
- full-duplex
- full-help
- group-range
- half-duplex
- half-duplex controlled-carrier
- help
- history
- hold-character
- hold-queue
- hostname
- hssi external-loop-request
- hssi internal-clock
- hub
- ignore-dcd
- interface
- interface bvi
- interface dialer
- interface group-async
- ip access-group
- ip access-list
- ip accounting
- ip accounting-list
- ip accounting-threshold
- ip accounting-transits
- ip address
- ip address negotiated
- ip address-pool
- ip alias
- ip as-path access-list
- ip authentication
- ip bandwidth-percent eigrp
- ip bgp-community new-format
- ip bootp server
- ip broadcast-address
- ip cef
- ip cef traffic-statistics
- ip cgmp
- ip classless
- ip community-list
- ip default-gateway
- ip default-network
- ip dhcp-server
- ip directed-broadcast
- ip domain-list
- ip domain-lookup
- ip domain-name
- ip dvmrp accept-filter
- ip dvmrp auto-summary
- ip dvmrp default-information
- ip dvmrp metric
- ip dvmrp metric-offset
- ip dvmrp output-report-delay
- ip dvmrp reject-non-pruners
- ip dvmrp routehog-notification
- ip dvmrp route-limit
- ip dvmrp summary-address
- ip dvmrp unicast-routing
- ip forward-protocol
- ip ftp passive
- ip ftp password
- ip ftp source-interface
- ip ftp username
- ip hello-interval eigrp
- ip helper-address
- ip hold-time eigrp
- ip host
- ip http
- ip identd
- ip igmp access-group
- ip igmp explicit-tracking
- ip igmp helper-address
- ip igmp join-group
- ip igmp query-interval
- ip igmp query-max-response-time
- ip igmp query-timeout
- ip igmp static-group
- ip igmp version
- ip irdp
- ip load-sharing
- ip local policy route-map
- ip local pool
- ip mask-reply
- ip mroute
- ip mroute-cache
- ip mtu
- ip multicast boundary
- ip multicast cache-headers
- ip multicast helper-map
- ip multicast rate-limit
- ip multicast-routing
- ip multicast ttl-threshold
- ip name-server
- ip nat
- ip nat inside destination
- ip nat inside source
- ip nat outside source
- ip nat pool
- ip nat stateful id
- ip nat translation
- ip nbar pdlm
- ip nbar port-map
- ip nbar protocol-discovery
- ip netmask-format
- ip nhrp authentication
- ip nhrp holdtime
- ip nhrp interest
- ip nhrp map
- ip nhrp map multicast
- ip nhrp max-send
- ip nhrp network-id
- ip nhrp nhs
- ip nhrp record
- ip nhrp responder
- ip nhrp server-only
- ip nhrp trigger-svc
- ip nhrp use
- ip ospf authentication
- ip ospf authentication-key
- ip ospf cost
- ip ospf dead-interval
- ip ospf demand-circuit
- ip ospf hello-interval
- ip ospf message-digest-key
- ip ospf name-lookup
- ip ospf network
- ip ospf priority
- ip ospf retransmit-interval
- ip ospf transmit-delay
- ip pim
- ip pim accept-rp
- ip pim message-interval
- ip pim minimum-vc-rate
- ip pim multipoint-signalling
- ip pim nbma-mode
- ip pim neighbor-filter
- ip pim query-interval
- ip pim rp-address
- ip pim rp-announce-filter
- ip pim send-rp-announce
- ip pim send-rp-discovery
- ip pim vc-count
- ip pim version
- ip policy-list
- ip policy route-map
- ip proxy-arp
- ip radius source-interface
- ip rarp-server
- ip rcmd rcp-enable
- ip rcmd remote-host
- ip rcmd remote-username
- ip rcmd rsh-enable
- ip redirects
- ip rip authentication
- ip rip receive version
- ip rip send version
- ip rip triggered
- ip rip v2-broadcast
- ip route
- ip route-cache
- ip route-cache policy
- ip route priority high
- ip route profile
- ip router isis
- ip routing
- ip rtp compression-connections
- ip rtp header-compression
- ip rtp priority
- ip scp server enable
- ip source-route
- ip split-horizon
- ip ssh
- ip subnet-zero
- ip summary-address eigrp
- ip summary-address rip
- ip tcp chunk-size
- ip tcp compression-connections
- ip tcp header-compression
- ip tcp mtu-path-discovery
- ip tcp queuemax
- ip tcp synwait-time
- ip tcp window-size
- ip telnet source-interface
- ip tftp source-interface
- ip unnumbered
- ip unreachables
- isdn answer1, isdn answer2
- isdn autodetect
- isdn bchan-number-order
- isdn busy
- isdn caller
- isdn call interface
- isdn calling-number
- isdn conference-code
- isdn disconnect interface
- isdn fast-rollover-delay
- isdn incoming-voice
- isdn leased-line bri 128
- isdn not-end-to-end
- isdn nsf-service
- isdn outgoing-voice
- isdn overlap-receiving
- isdn send-alerting
- isdn sending-complete
- isdn service
- isdn spid1 (spid2)
- isdn switch-type
- isdn tei
- isdn tei-negotiation
- isdn transfer-code
- isdn twait-disable
- isdn voice-priority
- isis advertise-prefix
- isis authentication key-chain
- isis authentication mode
- isis authentication send-only
- isis circuit-type
- isis csnp-interval
- isis hello-interval
- isis hello-multiplier
- isis lsp-interval
- isis metric
- isis password
- isis priority
- isis retransmit-interval
- isis retransmit-throttle-interval
- is-type
- keepalive
- key
- key chain
- key config-key
- key-string
- lane auto-config-atm-address
- lane bus-atm-address
- lane client
- lane client-atm-address
- lane config-atm-address
- lane config database
- lane database
- lane fixed-config-atm-address
- lane global-lecs-address
- lane le-arp
- lane server-atm-address
- lane server-bus
- line
- linecode
- link-test
- location
- logging
- logging buffered
- logging buffered xml
- logging console
- logging console xml
- logging count
- logging facility
- logging history
- logging history size
- logging host
- logging monitor
- logging on
- logging source-interface
- logging synchronous
- logging trap
- login
- login authentication
- logout-warning
- loopback
- mac-address-table aging-time
- mac-address-table dynamic
- mac-address-table secure
- mac-address-table static
- map-class dialer
- map-class frame-relay
- map-group
- map-list
- match access-group
- match any
- match as-path
- match class-map
- match community-list
- match cos
- match destination-address mac
- match discard-class
- match dscp
- match fr-dlci
- match input-interface
- match interface
- match ip address
- match ip dscp
- match ip next-hop
- match ip precedence
- match ip route-source
- match ip rtp
- match length
- match metric
- match mpls experimental
- match mpls-label
- match not
- match packet length
- match precedence
- match protocol
- match qos-group
- match route-type
- match source-address mac
- match tag
- maximum-paths
- max-reserved-bandwidth
- media-type
- member
- menu
- menu command
- menu text
- menu title
- metric holddown
- metric maximum-hops
- metric weights
- mkdir
- modem
- monitor session
- more
- motd-banner
- mpls atm control-vc
- mpls atm cos
- mpls atm disable-headend-vc
- mpls atm multi-vc
- mpls atm vpi
- mpls atm vp-tunnel
- mpls cos-map
- mpls ip
- mpls ip default-route
- mpls ip encapsulate explicit-null
- mpls ip ttl-expiration pop
- mpls label protocol
- mpls label range
- mpls mtu
- mpls prefix-map
- mpls request-labels for
- mrinfo
- mstat
- mtrace
- mtu
- name elan-id
- name local-seg-id
- name preempt
- name server-atm-address
- neighbor
- neighbor advertisement-interval
- neighbor database-filter
- neighbor default-originate
- neighbor description
- neighbor distribute-list
- neighbor filter-list
- neighbor maximum-prefix
- neighbor next-hop-self
- neighbor password
- neighbor peer-group
- neighbor prefix-list
- neighbor remote-as
- neighbor route-map
- neighbor route-reflector-client
- neighbor send-community
- neighbor send-label
- neighbor shutdown
- neighbor soft-reconfiguration inbound
- neighbor ttl-security
- neighbor timers
- neighbor ttl-security
- neighbor update-source
- neighbor version
- neighbor weight
- net
- network
- network backdoor
- network weight
- nrzi-encoding
- ntp access-group
- ntp authenticate
- ntp authentication-key
- ntp broadcast
- ntp broadcast client
- ntp broadcastdelay
- ntp disable
- ntp master
- ntp peer
- ntp server
- ntp source
- ntp trusted-key
- ntp update-calendar
- offset-list
- ospf auto-cost reference-bandwidth
- ospf log-adj-changes
- output-delay
- padding
- parity
- passive-interface
- password
- peer default ip address
- peer neighbor-route
- physical-layer
- ping
- police
- policy-map
- ppp
- ppp authentication
- ppp bridge ip
- ppp chap
- ppp compress
- ppp multilink
- ppp quality
- ppp reliable-link
- ppp use-tacacs
- priority-group
- priority-list
- privilege level (global)
- privilege level (line)
- prompt
- pulse-time
- pvc
- qos pre-classify
- queue-limit
- queue-list
- radius-server
- random-detect
- random-detect discard-class
- random-detect discard-class-based
- random-detect dscp
- random-detect ecn
- random-detect exponential-weighting-constant
- random-detect flow
- rate-limit
- redistribute
- refuse-message
- reload
- rename
- ring-speed
- rlogin
- rmdir
- route-map
- router
- rsh
- rxspeed
- send
- service
- service compress-config
- service linenumber
- service-module 56k
- service-module t1
- service-policy (interface)
- service-policy (policy-map)
- service timestamps
- session-limit
- session-timeout
- set as-path
- set atm-clp
- set automatic-tag
- set community
- set cos
- set default interface
- set discard-class
- set dscp
- set fr-de
- set interface
- set ip default next-hop
- set ip next-hop
- set ip precedence
- set ip tos
- set level
- set local-preference
- set metric
- set metric-type
- set metric-type internal
- set mpls-label
- set origin
- set ospf router-id
- set-overload-bit
- set precedence
- set qos-group
- set tag
- setup
- set weight
- shape
- show
- shutdown
- smt-queue-threshold
- snapshot
- snmp-server
- snmp-server chassis-id
- snmp-server community
- snmp-server contact
- snmp-server enable traps
- snmp-server engine-id
- snmp-server group
- snmp-server host
- snmp-server location
- snmp-server packetsize
- snmp-server queue-length
- snmp-server system-shutdown
- snmp-server tftp-server-list
- snmp-server trap-source
- snmp-server trap-timeout
- snmp-server user
- snmp-server view
- snmp trap link-status
- source-address
- spanning-tree backbonefast
- spanning-tree cost
- spanning-tree port-priority
- spanning-tree vlan
- speed
- squeeze
- squelch
- sscop cc-timer
- sscop keepalive-timer
- sscop max-cc
- sscop poll-timer
- sscop rcv-window
- sscop send-window
- standby authentication
- standby ip
- standby preempt
- standby priority
- standby timers
- standby track
- stopbits
- summary-address
- synchronization
- table-map
- tacacs-server attempts
- tacacs-server authenticate
- tacacs-server directed-request
- tacacs-server extended
- tacacs-server host
- tacacs-server key
- tacacs-server last-resort
- tacacs-server notify
- tacacs-server optional-passwords
- tacacs-server retransmit
- tacacs-server timeout
- tag-switching
- terminal editing
- terminal escape-character
- terminal history
- terminal length
- terminal monitor
- tftp-server
- timers basic
- timers bgp
- timers spf
- trace, traceroute
- traffic-shape adaptive
- traffic-shape fecn-adapt
- traffic-shape group
- traffic-shape rate
- traffic-share
- transport
- tunnel checksum
- tunnel destination
- tunnel key
- tunnel mode
- tunnel sequence-datagrams
- tunnel source
- txspeed
- undebug
- undelete
- username
- vacant-message
- validate-update-source
- variance
- verify
- version
- vlan
- vlan database
- vtp client
- vtp domain
- vtp password
- vtp server
- vtp transparent
- vtp v2-mode
- vty-async
- vty-async dynamic-routing
- vty-async header-compression
- vty-async keepalive
- vty-async mtu
- vty-async ppp authentication
- vty-async ppp use-tacacs
- width
- write
- A. Appendix: Network Basics
- A.1. IPv4 Subnetting
- A.1.1. Classless Inter-Domain Routing
- A.1.1.1. CIDR notation
- A.1.2. Subnet Math
- A.1.2.1. Subnet zero reminder
- A.1.2.2. Calculating a network address from a host address
- A.1.2.3. Calculating the broadcast address of a subnet
- A.1.2.4. Calculating available subnets
- A.1.2.5. Calculating the number of hosts per subnet
- A.1.3. More about Subnets
- A.1.3.1. Private address space
- A.1.3.2. Changing the way the router displays subnet information
- A.1.3.3. Variable Length Subnet Masks (VLSM)
- A.1.1. Classless Inter-Domain Routing
- A.2. OSI Reference Model
- A.2.1. Application Layer
- A.2.2. Presentation Layer
- A.2.3. Session Layer
- A.2.4. Transport Layer
- A.2.5. Network Layer
- A.2.6. Data Link Layer
- A.2.7. Physical Layer
- A.3. IPv6
- A.3.1. IPv6 Notation
- A.3.1.1. Shorthand rule one
- A.3.1.2. Shorthand rule two
- A.3.2. Important IPv6 Addresses
- A.3.3. Enabling IPv6 on a Router
- A.3.4. Using an IPv6 Address in a URL
- A.3.1. IPv6 Notation
- A.1. IPv4 Subnetting
- 18. About the Author
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
Nowość Promocja
Business decisions in any context—operational, tactical, or strategic—can have considerable consequences. Whether the outcome is positive and rewarding or negative and damaging to the business, its employees, and stakeholders is unknown when action is approved. These decisions are usually made under the proverbial cloud of uncertainty.With this pra- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Nowość Promocja
If you're a developer looking to build a distributed, resilient, scalable, high-performance application, you may be evaluating distributed SQL and NoSQL solutions. Perhaps you're considering the Aerospike database.This practical book shows developers, architects, and engineers how to get the highly scalable and extremely low-latency Aerospike datab- ePub + Mobi 254 pkt
Aerospike: Up and Running. Developing on a Modern Operational Database for Globally Distributed Apps
(228,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%) -
Nowość Promocja
Reinforcement learning (RL) has led to several breakthroughs in AI. The use of the Q-learning (DQL) algorithm alone has helped people develop agents that play arcade games and board games at a superhuman level. More recently, RL, DQL, and similar methods have gained popularity in publications related to financial research.This book is among the fir- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Nowość Promocja
Learn how to use Go's strengths to develop services that are scalable and resilient even in an unpredictable environment. With this book's expanded second edition, Go developers will explore the composition and construction of cloud native applications, from lower-level Go features and mid-level patterns to high-level architectural considerations.E- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
To ensure that applications are reliable and always available, more businesses today are moving applications to AWS. But many companies still struggle to design and build these cloud applications effectively, thinking that because the cloud is resilient, their applications will be too. With this practical guide, software, DevOps, and cloud engineer- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Performance tuning is an experimental science, but that doesn't mean engineers should resort to guesswork and folklore to get the job done. Yet that's often the case. With this practical book, intermediate to advanced Java technologists working with complex platforms will learn how to tune Java cloud applications for performance using a quantitativ- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Today, investment in financial technology and digital transformation is reshaping the financial landscape and generating many opportunities. Too often, however, engineers and professionals in financial institutions lack a practical and comprehensive understanding of the concepts, problems, techniques, and technologies necessary to build a modern, r- ePub + Mobi 228 pkt
(220,15 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
Promocja
Until recently, infrastructure was the backbone of organizations operating software they developed in-house. But now that cloud vendors run the computers, companies can finally bring the benefits of agile custom-centricity to their own developers. Adding product management to infrastructure organizations is now all the rage.But how's that possible- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
Promocja
Cloud services and SaaS software permeate every company's IT landscape, requiring a shift from manually provisioned services to a more structured approach, with codification at its core. Terraform provides tools to manage the lifecycle of your IT landscape across thousands of different cloud providers and SaaS platforms.By defining your infrastruct- ePub + Mobi 211 pkt
(194,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
Promocja
Using machine learning for products, services, and critical business processes is quite different from using ML in an academic or research setting—especially for recent ML graduates and those moving from research to a commercial environment. Whether you currently work to create products and services that use ML, or would like to in the future, this- ePub + Mobi 254 pkt
(245,65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł (-15%)
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Książka drukowana
Oceny i opinie klientów: Cisco IOS in a Nutshell. 2nd Edition James Boney (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.