Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Network Warrior
SPECIAL OFFER: Upgrade this ebook with O’Reilly
Preface
Who Should Read This Book
Conventions Used in This Book
Using Code Examples
We’d Like to Hear from You
Safari® Books Online
Acknowledgments
1. What Is a Network?
2. Hubs and Switches
Hubs
Switches
Switch Types
Planning a Chassis-Based Switch Installation
Rack space
Power
Cooling
Installing and removing modules
Routing cables
3. Autonegotiation
What Is Autonegotiation?
How Autonegotiation Works
When Autonegotiation Fails
Autonegotiation Best Practices
Configuring Autonegotiation
4. VLANs
Connecting VLANs
Configuring VLANs
CatOS
IOS Using VLAN Database
IOS Using Global Commands
Nexus and NX-OS
5. Trunking
How Trunks Work
ISL
802.1Q
Which Protocol to Use
Trunk Negotiation
Configuring Trunks
IOS
CatOS
Nexus and NX-OS
6. VLAN Trunking Protocol
VTP Pruning
Dangers of VTP
Configuring VTP
VTP Domains
IOS
CatOS
NX-OS
VTP Mode
IOS
CatOS
NX-OS
VTP Password
IOS
CatOS
NX-OS
VTP Pruning
IOS
CatOS
NX-OS
7. Link Aggregation
EtherChannel
EtherChannel Load Balancing
Configuring and Managing EtherChannel
EtherChannel protocols
CatOS example
IOS example
NX-OS example
Cross-Stack EtherChannel
Multichassis EtherChannel (MEC)
Virtual Port Channel
Initial vPC Configuration
Adding a vPC
8. Spanning Tree
Broadcast Storms
MAC Address Table Instability
Preventing Loops with Spanning Tree
How Spanning Tree Works
Managing Spanning Tree
Additional Spanning Tree Features
PortFast
BPDU Guard
UplinkFast
BackboneFast
Common Spanning Tree Problems
Duplex Mismatch
Unidirectional Links
Bridge Assurance
Designing to Prevent Spanning Tree Problems
Use Routing Instead of Switching for Redundancy
Always Configure the Root Bridge
9. Routing and Routers
Routing Tables
Route Types
The IP Routing Table
Host Route
Subnet
Summary (Group of Subnets)
Major Network
Supernet (Group of Major Networks)
Default Route
Virtual Routing and Forwarding
10. Routing Protocols
Communication Between Routers
Metrics and Protocol Types
Administrative Distance
Specific Routing Protocols
RIP
RIPv2
EIGRP
OSPF
BGP
11. Redistribution
Redistributing into RIP
Redistributing into EIGRP
Redistributing into OSPF
Mutual Redistribution
Redistribution Loops
Limiting Redistribution
Route Tags
A Real-World Example
Another method
12. Tunnels
GRE Tunnels
GRE Tunnels and Routing Protocols
GRE and Access Lists
13. First Hop Redundancy
HSRP
HSRP Interface Tracking
When HSRP Isn’t Enough
Nexus and HSRP
GLBP
Object Tracking in GLBP
14. Route Maps
Building a Route Map
Policy Routing Example
Monitoring Policy Routing
15. Switching Algorithms in Cisco Routers
Process Switching
Interrupt Context Switching
Fast Switching
Optimum Switching
CEF
Configuring and Managing Switching Paths
Process Switching
Fast Switching
CEF
16. Multilayer Switches
Configuring SVIs
IOS (4500, 6500, 3550, 3750, etc.)
Hybrid Mode (4500, 6500)
NX-OS (Nexus 7000, 5000)
Multilayer Switch Models
17. Cisco 6500 Multilayer Switches
Architecture
Buses
Enhanced Chassis
Vertical Enhanced Chassis
Supervisors
MSFC
PFC
Models
Modules
Module interaction
Module types
Ethernet modules
FWSMs
CSMs
NAM
Intrusion Detection System modules
FlexWAN modules
Communication Media Modules
CatOS Versus IOS
Installing VSS
Other Recommended VSS Commands
VSS dual-active detection
VSS Failover Commands
Miscellaneous VSS Commands
VSS Best Practices
18. Cisco Nexus
Nexus Hardware
Nexus 7000
Nexus 5000
Nexus 2000
Nexus 1000 Series
NX-OS
NX-OS Versus IOS
No more speed-related interface names
No hidden configuration in NX-OS
Interface status displays operational state along with a reason
The show interface brief command
No more write memory
No more do command
No more show arp
No more interface range command
Slash notation supported on all IPv4 and IPv6 commands
Two CLI help levels
Routing configuration mostly within interfaces
Many more pipe options
Nexus Iconography
Nexus Design Features
Virtual Routing and Forwarding
Virtual Device Contexts
Shared and Dedicated Rate-Mode
Configuring Fabric Extenders (FEXs)
Describing FEXs
Physical connection
Pinning
FEX fabric uplinks using vPC
Virtual Port Channel
Config-Sync
Configuration Rollback
Upgrading NX-OS
19. Catalyst 3750 Features
Stacking
Interface Ranges
Macros
Flex Links
Storm Control
Port Security
SPAN
Voice VLAN
QoS
20. Telecom Nomenclature
Telecom Glossary
21. T1
Understanding T1 Duplex
Types of T1
Encoding
AMI
B8ZS
Framing
D4/Superframe
Extended Super Frame
Performance Monitoring
Loss of Signal
Out of Frame
Bipolar Violation
CRC6
Errored Seconds
Extreme Errored Seconds
Alarms
Red Alarm
Yellow Alarm
Blue Alarm
Troubleshooting T1s
Loopback Tests
Integrated CSU/DSUs
Configuring T1s
CSU/DSU Configuration
CSU/DSU Troubleshooting
22. DS3
Framing
M13
C-Bits
Clear-Channel DS3 Framing
Line Coding
Configuring DS3s
Clear-Channel DS3
Channelized DS3
23. Frame Relay
Ordering Frame Relay Service
Frame Relay Network Design
Oversubscription
Local Management Interface
Congestion Avoidance in Frame Relay
Configuring Frame Relay
Basic Frame Relay with Two Nodes
Basic Frame Relay with More Than Two Nodes
Frame Relay Subinterfaces
Troubleshooting Frame Relay
24. MPLS
25. Access Lists
Designing Access Lists
Named Versus Numbered
Wildcard Masks
Where to Apply Access Lists
Naming Access Lists
Top-Down Processing
Most-Used on Top
Using Groups in ASA and PIX ACLs
Deleting ACLs
Turbo ACLs
Allowing Outbound Traceroute and Ping
Allowing MTU Path Discovery Packets
ACLs in Multilayer Switches
Configuring Port ACLs
Configuring Router ACLs
Configuring VLAN Maps
Reflexive Access Lists
Configuring Reflexive Access Lists
26. Authentication in Cisco Devices
Basic (Non-AAA) Authentication
Line Passwords
Configuring Local Users
PPP Authentication
PAP
One-way authentication
Two-way authentication
Debugging PPP authentication
CHAP
One-way authentication
Two-way authentication
Changing the sent hostname
AAA Authentication
Enabling AAA
Configuring Security Server Information
Default RADIUS and TACACS+ server groups
Custom groups
Creating Method Lists
IOS login authentication
NX-OS login authentication
PPP authentication
Applying Method Lists
27. Basic Firewall Theory
Best Practices
The DMZ
Another DMZ Example
Multiple DMZ Example
Alternate Designs
28. ASA Firewall Configuration
Contexts
Interfaces and Security Levels
Names
Object Groups
Inspects
Managing Contexts
Context Types
The Classifier
No shared interfaces
Shared outside interfaces
Shared inside interface
Sharing inside and outside interfaces
Cascading contexts
Configuring Contexts
Interfaces and Contexts
Write Mem Behavior
Failover
Failover Terminology
Understanding Failover
Configuring Failover—Active/Standby
Monitoring Failover
Configuring Failover—Active/Active
NAT
NAT Commands
NAT Examples
Simple PAT using the outside interface
Simple PAT using a dedicated IP address
Simple PAT with public servers on the inside
Port redirection
DMZ
Miscellaneous
Remote Access
Saving Configuration Changes
Logging
Troubleshooting
29. Wireless
Wireless Standards
Security
Configuring a WAP
MAC Address Filtering
Troubleshooting
30. VoIP
How VoIP Works
Protocols
Telephony Terms
Cisco Telephony Terms
Common Issues with VoIP
Latency
Packet loss
Jitter
Small-Office VoIP Example
VLANs
Switch Ports
QoS on the CME Router
DHCP for Phones
TFTP Service
Telephony Service
Dial Plan
Voice Ports
Configuring Phones
Ephone-DN
Paging
Ephone
PTT
Message waiting lamps
Dial Peers
POTS
VoIP
Dial-peer pattern matching
Outbound dial peers
Inbound dial peers
SIP
SIP and NAT
Troubleshooting
Phone Registration
TFTP
Dial Peer
SIP
31. Introduction to QoS
Types of QoS
QoS Mechanics
Priorities
Flavors of QoS
Traffic-shaping theory
Common QoS Misconceptions
QoS “Carves Up” a Link into Smaller Logical Links
QoS Limits Bandwidth
QoS Resolves a Need for More Bandwidth
QoS Prevents Packets from Being Dropped
QoS Will Make You More Attractive to the Opposite Sex
32. Designing QoS
LLQ Scenario
Protocols
Priorities
Determine Bandwidth Requirements
Configuring the Routers
Class Maps
Policy Maps
Service Policies
Traffic-Shaping Scenarios
Scenario 1: Ethernet Handoff
Scenario 2: Frame Relay Speed Mismatch
Traffic-shaping terminology
33. The Congested Network
Determining Whether the Network Is Congested
Resolving the Problem
34. The Converged Network
Configuration
Monitoring QoS
Troubleshooting a Converged Network
Incorrect Queue Configuration
Priority Queue Too Small
Priority Queue Too Large
Nonpriority Queue Too Small
Nonpriority Queue Too Large
Default Queue Too Small
Default Queue Too Large
35. Designing Networks
Documentation
Requirements Documents
Port Layout Spreadsheets
IP and VLAN Spreadsheets
Bay Face Layouts
Power and Cooling Requirements
Tips for Network Diagrams
Naming Conventions for Devices
Network Designs
Corporate Networks
Three-tiered architecture
Collapsed core—no distribution
Collapsed core—no distribution or access
Configuration concerns
Trunks
EtherChannels
Spanning tree
VTP
VLANs
Ecommerce Websites
Modern Virtual Server Environments
Small Networks
36. IP Design
Public Versus Private IP Space
VLSM
CIDR
Allocating IP Network Space
Allocating IP Subnets
Sequential
Divide by Half
Reverse Binary
IP Subnetting Made Easy
37. IPv6
Addressing
Subnet Masks
Address Types
Subnetting
NAT
Simple Router Configuration
38. Network Time Protocol
What Is Accurate Time?
NTP Design
Configuring NTP
NTP Client
NTP Server
39. Failures
Human Error
Multiple Component Failure
Disaster Chains
No Failover Testing
Troubleshooting
Remain Calm
Log Your Actions
Find Out What Changed
Check the Physical Layer First!
Assume Nothing; Prove Everything
Isolate the Problem
Don’t Look for Zebras
Do a Physical Audit
Escalate
Troubleshooting in a Team Environment
The Janitor Principle
40. GAD’s Maxims
Maxim #1
Politics
Money
The Right Way to Do It
Maxim #2
Simplify
Standardize
Stabilize
Maxim #3
Lower Costs
Increase Performance or Capacity
Increase Reliability
41. Avoiding Frustration
Why Everything Is Messed Up
How to Sell Your Ideas to Management
When to Upgrade and Why
The Dangers of Upgrading
Valid Reasons to Upgrade
Why Change Control Is Your Friend
How Not to Be a Computer Jerk
Behavioral
Environmental
Leadership and Mentoring
Index
About the Author
Colophon
SPECIAL OFFER: Upgrade this ebook with O’Reilly
← Prev
Back
Next →
← Prev
Back
Next →