Software Development Home
Software Development Articles
Software Development Links
Software Development Books
Software Development Tools
Software Development Keywords
|
Software Development
ActionScript Cookbook
|
|
See more Amazon Details
|
|
Contents Listing
Preface
1. Router Configuration and File Management
1.1 Configuring the Router via TFTP
1.2 Saving Router Configuration to Server
1.3 Booting the Router Using a Remote Configuration File
1.4 Storing Configuration Files Larger than NVRAM
1.5 Clearing the Startup Configuration
1.6 Loading a New IOS Image
1.7 Booting a Different IOS Image
1.8 Booting Over the Network
1.9 Copying an IOS Image to a Server
1.10 Copying an IOS Image Through the Console
1.11 Deleting Files from Flash
1.12 Partitioning Flash
1.13 Using the Router as a TFTP Server
1.14 Using FTP from the Router
1.15 Generating Large Numbers of Router Configurations
1.16 Changing the Configurations of Many Routers at Once
1.17 Extracting Hardware Inventory Information
1.18 Backing Up Router Configurations
2. Router Management
2.1 Creating Command Aliases
2.2 Managing the Router's ARP Cache
2.3 Tuning Router Buffers
2.4 Using the Cisco Discovery Protocol
2.5 Disabling the Cisco Discovery Protocol
2.6 Using the Small Servers
2.7 Enabling HTTP Access to a Router
2.8 Using Static Hostname Tables
2.9 Enabling Domain Name Services
2.10 Disabling Domain Name Lookups
2.11 Specifying a Router Reload Time
2.12 Creating Exception Dump Files
2.13 Generating a Report of Interface Information
2.14 Generating a Report of Routing Table Information
2.15 Generating a Report of ARP Table Information
2.16 Generating a Server Host Table File
3. User Access and Privilege Levels
3.1 Setting Up User IDs
3.2 Encrypting Passwords
3.3 Using Better Encryption Techniques
3.4 Removing Passwords from a Router Configuration File
3.5 Deciphering Cisco's Weak Password Encryption
3.6 Displaying Active Users
3.7 Sending Messages to Other Users
3.8 Changing the Number of VTYs
3.9 Changing VTY Timeouts
3.10 Restricting VTY Access by Protocol
3.11 Enabling Absolute Timeouts on VTY Lines
3.12 Implementing Banners
3.13 Disabling Banners on a Port
3.14 Disabling Router Lines
3.15 Reserving a VTY Port for Administrative Access
3.16 Restricting Inbound Telnet Access
3.17 Logging Telnet Access
3.18 Setting the Source Address for Telnet
3.19 Automating the Login Sequence
3.20 Using SSH for Secure Access
3.21 Changing the Privilege Level of IOS Commands
3.22 Defining Per-User Privileges
3.23 Defining Per-Port Privileges
4. TACACS+
4.1 Authenticating Login IDs from a Central System
4.2 Restricting Command Access
4.3 Losing Access to the TACACS+ Server
4.4 Disabling TACACS+ Authentication on a Particular Line
4.5 Capturing User Keystrokes
4.6 Logging System Events
4.7 Setting the IP Source Address for TACACS+ Messages
4.8 Obtaining Free TACACS+ Server Software
4.9 Sample Server Configuration Files
5. IP Routing
5.1 Finding an IP Route
5.2 Finding Types of IP Routes
5.3 Converting Different Mask Formats
5.4 Using Static Routing
5.5 Floating Static Routes
5.6 Using Policy-Based Routing to Route Based on Source Address
5.7 Using Policy-Based Routing to Route Based on Application Type
5.8 Examining Policy-Based Routing
5.9 Changing Administrative Distances
5.10 Routing Over Multiple Paths with Equal Costs
6. RIP
6.1 Configuring RIP Version 1
6.2 Filtering Routes with RIP
6.3 Redistributing Static Routes into RIP
6.4 Redistributing Routes Using Route Maps
6.5 Creating a Default Route in RIP
6.6 Disabling RIP on an Interface
6.7 Unicast Updates for RIP
6.8 Applying Offsets to Routes
6.9 Adjusting Timers
6.10 Configuring Interpacket Delay
6.11 Enabling Triggered Updates
6.12 Increasing the RIP Input Queue
6.13 Configuring RIP Version 2
6.14 Enabling RIP Authentication
6.15 RIP Route Summarization
6.16 Route Tagging
7. EIGRP
7.1 Configuring EIGRP
7.2 Filtering Routes with EIGRP
7.3 Redistributing Routes into EIGRP
7.4 Redistributing Routes into EIGRP Using Route Maps
7.5 Creating a Default Route in EIGRP
7.6 Disabling EIGRP on an Interface
7.7 EIGRP Route Summarization
7.8 Adjusting EIGRP Metrics
7.9 Adjusting Timers
7.10 Enabling EIGRP Authentication
7.11 Logging EIGRP Neighbor State Changes
7.12 Limiting EIGRP's Bandwidth Utilization
7.13 EIGRP Stub Routing
7.14 Route Tagging
7.15 Viewing EIGRP Status
8. OSPF
8.1 Configuring OSPF
8.2 Filtering Routes in OSPF
8.3 Adjusting OSPF Costs
8.4 Creating a Default Route in OSPF
8.5 Redistributing Static Routes into OSPF
8.6 Redistributing External Routes into OSPF
8.7 Manipulating DR Selection
8.8 Setting the OSPF RID
8.9 Enabling OSPF Authentication
8.10 Selecting the Appropriate Area Types
8.11 Summarizing Routes in OSPF
8.12 Disabling OSPF on Certain Interfaces
8.13 OSPF Route Tagging
8.14 Logging OSPF Adjacency Changes
8.15 Adjusting OSPF Timers
8.16 Viewing OSPF Status with Domain Names
8.17 Debugging OSPF
9. BGP
9.1 Configuring BGP
9.2 Using eBGP Multihop
9.3 Adjusting the Next-Hop Attribute
9.4 Connecting to Two ISPs
9.5 Connecting to Two ISPs with Redundant Routers
9.6 Restricting Networks Advertised to a BGP Peer
9.7 Adjusting Local Preference Values
9.8 Load Balancing
9.9 Removing Private ASNs from the AS Path
9.10 Filtering BGP Routes Based on AS Paths
9.11 Reducing the Size of the Received Routing Table
9.12 Summarizing Outbound Routing Information
9.13 Prepending ASNs to the AS Path
9.14 Redistributing Routes with BGP
9.15 Using Peer Groups
9.16 Authenticating BGP Peers
9.17 Putting It All Together
10. Frame Relay
10.1 Setting Up Frame Relay with Point-to-Point Subinterfaces
10.2 Adjusting LMI Options
10.3 Setting Up Frame Relay with Map Statements
10.4 Using Multipoint Subinterfaces
10.5 Configuring Frame Relay SVCs
10.6 Simulating a Frame Relay Cloud
10.7 Compressing Frame Relay Data on a Subinterface
10.8 Compressing Frame Relay Data with Maps
10.9 Viewing Frame Relay Status Information
11. Queueing and Congestion
11.1 Fast Switching and CEF
11.2 Setting the DSCP or TOS Field
11.3 Using Priority Queueing
11.4 Using Custom Queueing
11.5 Using Custom Queues with Priority Queues
11.6 Using Weighted Fair Queueing
11.7 Using Class-Based Weighted Fair Queueing
11.8 Controlling Congestion with WRED
11.9 Using RSVP
11.10 Using Generic Traffic Shaping
11.11 Using Frame-Relay Traffic Shaping
11.12 Using Committed Access Rate
11.13 Implementing Standards-Based Per-Hop Behavior
11.14 Viewing Queue Parameters
12. Tunnels and VPNs
12.1 Creating a Tunnel
12.2 Tunneling Foreign Protocols in IP
12.3 Tunneling with Dynamic Routing Protocols
12.4 Viewing Tunnel Status
12.5 Creating an Encrypted Router-to-Router VPN
12.6 Generating RSA Keys
12.7 Creating a Router-to-Router VPN with RSA Keys
12.8 Creating a VPN Between a Workstation and a Router
12.9 Check IPSec Protocol Status
13. Dial Backup
13.1 Automating Dial Backup
13.2 Using Dialer Interfaces
13.3 Using an Async Modem on the AUX Port
13.4 Using Backup Interfaces
13.5 Using Dialer Watch
13.6 Ensuring Proper Disconnection
13.7 View Dial Backup Status
13.8 Debugging Dial Backup
14. NTP and Time
14.1 Timestamping Router Logs
14.2 Setting the Time
14.3 Setting the Time Zone
14.4 Adjusting for Daylight Saving Time
14.5 Synchronizing the Time on All Routers (NTP)
14.6 Configuring NTP Redundancy
14.7 Setting the Router as the NTP Master for the Network
14.8 Changing NTP Synchronization Periods
14.9 Using NTP to Send Periodic Broadcast Time Updates
14.10 Using NTP to Send Periodic Multicast Time Updates
14.11 Enabling and Disabling NTP Per Interface
14.12 NTP Authentication
14.13 Limiting the Number of Peers
14.14 Restricting Peers
14.15 Setting the Clock Period
14.16 Checking the NTP Status
14.17 Debugging NTP
15. DLSw
15.1 Configuring DLSw
15.2 Using DLSw to Bridge Between Ethernet and Token Ring
15.3 Converting Ethernet and Token Ring MAC Addresses
15.4 Configuring SDLC
15.5 Configuring SDLC for Multidrop Connections
15.6 Using STUN
15.7 Using BSTUN
15.8 Controlling DLSw Packet Fragmentation
15.9 Tagging DLSw Packets for QoS
15.10 Supporting SNA Priorities
15.11 DLSw+ Redundancy and Fault Tolerance
15.12 Viewing DLSw Status Information
15.13 Viewing SDLC Status Information
15.14 Debugging DSLw
16. Router Interfaces and Media
16.1 Viewing Interface Status
16.2 Configuring Serial Interfaces
16.3 Using an Internal T1 CSU/DSU
16.4 Using an Internal ISDN PRI Module
16.5 Using an Internal 56Kbps CSU/DSU
16.6 Configuring an Async Serial Interface
16.7 Configuring ATM Subinterfaces
16.8 Setting Payload Scrambling on an ATM Circuit
16.9 Configuring Ethernet Interface Features
16.10 Configuring Token Ring Interface Features
16.11 Connecting VLAN Trunks With ISL
16.12 Connecting VLAN Trunks with 802.1Q
17. Simple Network Management Protocol
17.1 Configuring SNMP
17.2 Extracting Router Information via SNMP Tools
17.3 Recording Important Router Information for SNMP Access
17.4 Extracting Inventory Information from a List of Routerswith SNMP
17.5 Using Access Lists to Protect SNMP Access
17.6 Logging Unauthorized SNMP Attempts
17.7 Limiting MIB Access
17.8 Using SNMP to Modify a Router's Running Configuration
17.9 Using SNMP to Copy a New IOS Image
17.10 Using SNMP to Perform Mass Configuration Changes
17.11 Preventing Unauthorized Configuration Modifications
17.12 Making Interface Table Numbers Permanent
17.13 Enabling SNMP Traps and Informs
17.14 Sending syslog Messages as SNMP Traps and Informs
17.15 Setting SNMP Packet Size
17.16 Setting SNMP Queue Size
17.17 Setting SNMP Timeout Values
17.18 Disabling Link Up/Down Traps per Interface
17.19 Setting the IP Source Address for SNMP Traps
17.20 Using RMON to Send Traps
17.21 Enabling SNMPv3
17.22 Using SAA
18. Logging
18.1 Enabling Local Router Logging
18.2 Setting the Log Size
18.3 Clearing the Router's Log
18.4 Sending Log Messages to Your Screen
18.5 Using a Remote Log Server
18.6 Enabling Syslog on a Unix Server
18.7 Changing the Default Log Facility
18.8 Restricting What Log Messages Are Sent to the Server
18.9 Setting the IP Source Address for Syslog Messages
18.10 Logging Router Syslog Messages in Different Files
18.11 Maintaining Syslog Files on the Server
18.12 Testing the Syslog Sever Configuration
18.13 Preventing the Most Common Messages from Being Logged
18.14 Rate-Limiting Syslog Traffic
19. Access Lists
19.1 Filtering by Source or Destination IP Address
19.2 Adding a Comment to an ACL
19.3 Filtering by Application
19.4 Filtering Based on TCP Header Flags
19.5 Restricting TCP Session Direction
19.6 Filtering Multiport Applications
19.7 Filtering Based on DSCP and TOS
19.8 Logging when an Access List Is Used
19.9 Logging TCP Sessions
19.10 Analyzing ACL Log Entries
19.11 Using Named and Reflexive Access Lists
19.12 Dealing with Passive Mode FTP
19.13 Using Context-Based Access Lists
20. DHCP
20.1 Using IP Helper Addresses for DHCP
20.2 Limiting the Impact of IP Helper Addresses
20.3 Using DHCP to Dynamically Configure Router IP Addresses
20.4 Dynamically Allocating Client IP Addresses via DHCP
20.5 Defining DHCP Configuration Options
20.6 Defining DHCP Lease Periods
20.7 Allocating Static IP Addresses with DHCP
20.8 Configuring a DHCP Database Client
20.9 Configuring Multiple DHCP Servers per Subnet
20.10 Showing DHCP Status
20.11 Debugging DHCP
21. NAT
21.1 Configuring Basic NAT Functionality
21.2 Allocating External Addresses Dynamically
21.3 Allocating External Addresses Statically
21.4 Translating Some Addresses Statically and Others Dynamically
21.5 Translating in Both Directions Simultaneously
21.6 Rewriting the Network Prefix
21.7 Adjusting NAT Timers
21.8 Changing TCP Ports for FTP
21.9 Checking NAT Status
21.10 Debugging NAT
22. Hot Standby Router Protocol
22.1 Configuring Basic HSRP Functionality
22.2 Using HSRP Preempt
22.3 Making HSRP React to Problems on Other Interfaces
22.4 Load Balancing with HSRP
22.5 Redirecting ICMP with HSRP
22.6 Manipulating HSRP Timers
22.7 Using HSRP on a Token Ring Network
22.8 HSRP SNMP Support
22.9 Increasing HSRP Security
22.10 Showing HSRP State Information
22.11 Debugging HSRP
23. IP Multicast
23.1 Configuring Basic Multicast Functionality with PIM-DM
23.2 Routing Multicast Traffic with PIMSM and BSR
23.3 Routing Multicast Traffic with PIM-SM and Auto-RP
23.4 Configuring Routing for a Low Frequency Multicast Application
23.5 Configuring CGMP
23.6 Static Multicast Routes and Group Memberships
23.7 Routing Multicast Traffic with MOSPF
23.8 Routing Multicast Traffic with DVMRP
23.9 DVMRP Tunnels
23.10 Controlling Multicast Scope with TTL
23.11 Using Administratively Scoped Addressing
23.12 Exchanging Multicast Routing Information with MBGP
23.13 Using MSDP to Discover External Sources
23.14 Converting Broadcasts to Multicasts
23.15 Showing Multicast Status
23.16 Debugging Multicast Routing
A. External Software Packages
B. IP Precedence, TOS, and DSCP Classifications
Index
|
|
Contents
View a contents listing.
Short
Short Description.
Keyword Pages
Keyword Bestsellers
Software Development Bestsellers The bestselling books on Amazon.
Articles
SAP and Windows Integration Move
Next Gen Java Code posted
Longhorn Shorn
Microgen Pursues AFA Systems
Virus Types
Visit our site of the month Load Testing at loadtesting.force9.co.uk
|