Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
About This eBook
Title Page
Copyright Page
About the Author
About the Technical Reviewer
Dedications
Acknowledgments
Contents at a Glance
Table of Contents
Command Syntax Conventions
Introduction
Networking Devices Used in the Preparation of This Book
Private Addressing Used in this Book
Who Should Read This Book
Optional Sections
Organization of This Book
Did I Miss Anything?
Part I: TCP/IP v4
Chapter 1. How to Subnet
Class A–E Addresses
Converting Between Decimal Numbers and Binary
Subnetting a Class C Network Using Binary
Subnetting a Class B Network Using Binary
Binary ANDing
The Enhanced Bob Maneuver for Subnetting (or How to Subnet Anything in Under a Minute)
Chapter 2. VLSM
IP Subnet Zero
VLSM Example
Chapter 3. Route Summarization
Example for Understanding Route Summarization
Route Summarization and Route Flapping
Requirements for Route Summarization
Part II: Introduction to Cisco Devices
Chapter 4. Cables and Connections
Connecting a Rollover Cable to Your Router or Switch
Using a USB Cable to Connect to Your Router or Switch
Terminal Settings
LAN Connections
Serial Cable Types
Which Cable to Use?
568A Versus 568B Cables
Chapter 5. The Command Line Interface
Shortcuts for Entering Commands
Using the Key to Complete Commands
Console Error Messages
Using the Question Mark for Help
enable Command
exit Command
disable Command
logout Command
Setup Mode
Keyboard Help
History Commands
terminal Commands
show Commands
Using the Pipe Parameter (|) with the show Command
Part III: Configuring a Router
Chapter 6. Configuring a Single Cisco Router
Router Modes
Entering Global Configuration Mode
Configuring a Router Name
Configuring Passwords
Password Encryption
Interface Names
Moving Between Interfaces
Configuring a Serial Interface
Configuring a Fast Ethernet Interface
Configuring a Gigabit Ethernet Interface
Creating a Message-of-the-Day Banner
Creating a Login Banner
Setting the Clock Time Zone
Assigning a Local Host Name to an IP Address
The no ip domain-lookup Command
The logging synchronous Command
The exec-timeout Command
Saving Configurations
Erasing Configurations
show Commands
EXEC Commands in Configuration Mode: The do Command
Configuration Example: Basic Router Configuration
Part IV: Routing
Chapter 7. Static Routing
Configuring a Static Route on a Router
The permanent Keyword (Optional)
Static Routes and Administrative Distance (Optional)
Configuring a Default Route on a Router
Verifying Static Routes
Configuration Example: Static Routes
Chapter 8. EIGRP
Configuring Enhanced Interior Gateway Routing Protocol (EIGRP)
EIGRP Auto-Summarization
EIGRP Manual Summarization
Passive EIGRP Interfaces
Equal-Cost Load Balancing: Maximum Paths
Unequal-Cost Load Balancing: Variance
Bandwidth Use
Authentication
Verifying EIGRP
Troubleshooting EIGRP
Configuration Example: EIGRP
Chapter 9. Single-Area OSPF
Configuring OSPF
Using Wildcard Masks with OSPF Areas
Loopback Interfaces
DR/BDR Elections
Modifying Cost Metrics
OSPF auto-cost reference-bandwidth
Authentication: Simple
Authentication: Using MD5 Encryption
Timers
Propagating a Default Route
Verifying OSPF Configuration
Troubleshooting OSPF
Configuration Example: Single Area OSPF
Chapter 10. Multi-Area OSPF
Configuring Multi-Area OSPF
Passive Interfaces
Configuration Example: Multi-Area OSPF
Part V: Switching
Chapter 11. Configuring a Switch
Help Commands
Command Modes
Verifying Commands
Resetting Switch Configuration
Setting Host Names
Setting Passwords
Setting IP Addresses and Default Gateways
Setting Interface Descriptions
The mdix auto Command
Setting Duplex Operation
Setting Operation Speed
Managing the MAC Address Table
Configuring Static MAC Addresses
Switch Port Security
Verifying Switch Port Security
Sticky MAC Addresses
Configuration Example
Chapter 12. VLANs
Creating Static VLANs
Assigning Ports to VLANs
Using the range Command
Verifying VLAN Information
Saving VLAN Configurations
Erasing VLAN Configurations
Configuration Example: VLANs
Chapter 13. VLAN Trunking Protocol and Inter-VLAN Communication
Dynamic Trunking Protocol
Dynamic Trunking Protocol (DTP)
Setting the Encapsulation Type
VLAN Trunking Protocol (VTP)
Verifying VTP
Inter-VLAN Communication Using an External Router: Router-on-a-Stick
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface
Inter-VLAN Communication Tips
Configuration Example: Inter-VLAN Communication
Chapter 14. Spanning Tree Protocol and EtherChannel
Spanning Tree Protocol
EtherChannel
Part VI: Layer Redundancy
Chapter 15. HSRP and GLBP
Hot Standby Router Protocol
Configuring HSRP on a Router
Configuring HSRP on an L3 Switch
Default HSRP Configuration Settings
Verifying HSRP
HSRP Optimization Options
Multiple HSRP
Debugging HSRP
Virtual Router Redundancy Protocol
Configuring VRRP
Verifying VRRP
Debugging VRRP
Gateway Load Balancing Protocol
Verifying GLBP
Debugging GLBP
Configuration Example: GLBP
Part VII: IPv6
Chapter 16. IPv6
Assigning IPv6 Addresses to Interfaces
IPv6 and RIPng
Configuration Example: IPv6 RIP
IPv6 Tunnels: Manual Overlay Tunnel
Static Routes in IPv6
Floating Static Routes in IPv6
Default Routes in IPv6
Verifying and Troubleshooting IPv6
IPv6 Ping
IPv6 Traceroute
Chapter 17. OSPFv3
IPv6 and OSPFv3
Enabling OSPF for IPv6 on an Interface
Enabling an OSPF for IPv6 Area Range
Enabling an IPv4 Router ID for OSPFv3
Forcing an SPF Calculation
Verifying and Troubleshooting IPv6 and OSPFv3
Configuration Example: OSPFv3
R3 Router
R2 Router
R1 Router
R4 Router
Chapter 18. EIGRP for IPv6
IPv6 and EIGRP
Configuring the Percentage of Link Bandwidth Used by EIGRP
Configuring Summary Addresses
Configuring EIGRP Route Authentication
Configuring EIGRP Timers
Logging EIGRP Neighbor Adjacency Changes
Adjusting the EIGRP for IPv6 Metric Weights
Verifying and Troubleshooting EIGRP for IPv6
Configuration Example: EIGRP for IPv6
R3 Router
R2 Router
R1 Router
Part VIII: Network Administration and Troubleshooting
Chapter 19. Backing Up and Restoring Cisco IOS Software and Configurations
Boot System Commands
The Cisco IOS File System
Viewing the Cisco IOS File System
Commonly Used URL Prefixes for Cisco Network Devices
Deciphering IOS Image Filenames
Backing Up Configurations to a TFTP Server
Restoring Configurations from a TFTP Server
Backing Up the Cisco IOS Software to a TFTP Server
Restoring/Upgrading the Cisco IOS Software from a TFTP Server
Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem
Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command
Chapter 20. Password-Recovery Procedures and the Configuration Register
The Configuration Register
Password-Recovery Procedures for Cisco Routers
Password Recovery for 2960 Series Switches
Chapter 21. Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol
Chapter 22. Remote Connectivity Using Telnet or SSH
Configuring a Device to Accept a Remote Telnet Connection
Using Telnet to Remotely Connect to Other Devices
Verifying Telnet
Configuring the Secure Shell Protocol (SSH)
Verifying SSH
Chapter 23. Verifying End-to-End Connectivity
ICMP Redirect Messages
The ping Command
Examples of Using the ping and the Extended ping Commands
The traceroute Command
Chapter 24. Configuring Network Management Protocols
Configuring SNMP
Configuring Syslog
Syslog Message Format
Syslog Severity Levels
Syslog Message Example
Configuring NetFlow
Verifying NetFlow
Chapter 25. Basic Troubleshooting
Viewing the Routing Table
Clearing the Routing Table
Determining the Gateway of Last Resort
Determining the Last Routing Update
OSI Layer 3 Testing
OSI Layer 7 Testing
Interpreting the show interface Command
Clearing Interface Counters
Using CDP to Troubleshoot
The traceroute Command
The show controllers Command
debug Commands
Using Time Stamps
Operating System IP Verification Commands
The ip http server Command
The netstat Command
The arp Command
Chapter 26. Cisco IOS Licensing
Cisco Licensing Earlier Than IOS 15.0
Cisco Licensing for the ISR G2 Platforms: IOS 15.0 and Later
Verifying Licenses
Cisco License Manager
Installing a Permanent License
Installing an Evaluation License
Backing Up a License
Uninstalling a License
Part IX: Managing IP Services
Chapter 27. Network Address Translation
Configuring Dynamic NAT: One Private to One Public Address Translation
Configuring PAT: Many Private to One Public Address Translation
Configuring Static NAT: One Private to One Permanent Public Address Translation
Verifying NAT and PAT Configurations
Troubleshooting NAT and PAT Configurations
Configuration Example: PAT
Chapter 28. Dynamic Host Configuration Protocol (DHCP)
Configuring a DHCP Server on an IOS Router
Verifying and Troubleshooting DHCP Configuration
Configuring a DHCP Helper Address
DHCP Client on a Cisco IOS Software Ethernet Interface
Configuration Example: DHCP
Part X: WANs
Chapter 29. Configuring Serial Encapsulation: HDLC and PPP
Configuring HDLC Encapsulation on a Serial Line
Configuring Point-to-Point Protocol (PPP) on a Serial Line (Mandatory Commands)
Configuring PPP on a Serial Line (Optional Commands): Compression
Configuring PPP on a Serial Line (Optional Commands): Link Quality
Configuring PPP on a Serial Line (Optional Commands): Multilink
Configuring PPP on a Serial Line (Optional Commands): Authentication
Verifying and Troubleshooting a Serial Link/PPP Encapsulation
Configuration Example: PPP with CHAP Authentication
Chapter 30. Establishing WAN Connectivity Using Frame Relay
Configuring Frame Relay
Verifying Frame Relay
Troubleshooting Frame Relay
Configuration Example: Point-to-Point Frame Relay Using Subinterfaces and OSPF
Configuration Example: Point-to-Multipoint Frame Relay Using Subinterfaces and EIGRP
Chapter 31. Configuring Generic Routing Encapsulation (GRE) Tunnels
Configuring a GRE Tunnel
Verifying a GRE Tunnel
Chapter 32. Configuring Point-to-Point Protocol over Ethernet (PPPoE)
Configuring a DSL Connection using PPPoE
Part XI: Network Security
Chapter 33. Managing Traffic Using Access Control Lists (ACL)
Access List Numbers
Using Wildcard Masks
ACL Keywords
Creating Standard ACLs
Applying Standard ACLs to an Interface
Verifying ACLs
Removing ACLs
Creating Extended ACLs
Applying Extended ACLs to an Interface
The established Keyword (Optional)
Creating Named ACLs
Using Sequence Numbers in Named ACLs
Removing Specific Lines in Named ACLs Using Sequence Numbers
Sequence Number Tips
Including Comments About Entries in ACLs
Restricting Virtual Terminal Access
Tips for Configuring ACLs
ACLs and IPv6
Configuration Examples: ACLs
Part XII: Appendixes
Appendix A. Binary/Hex/Decimal Conversion Chart
Appendix B. Create Your Own Journal Here
Steps to Configuring a Router
What Do You Want to Do Today?
← Prev
Back
Next →
← Prev
Back
Next →