Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
About This eBook Title Page Copyright Page About the Author About the Technical Reviewer Dedications Acknowledgments Contents at a Glance Table of Contents Command Syntax Conventions Introduction
Networking Devices Used in the Preparation of This Book Private Addressing Used in this Book Who Should Read This Book Optional Sections Organization of This Book Did I Miss Anything?
Part I: TCP/IP v4
Chapter 1. How to Subnet
Class A–E Addresses Converting Between Decimal Numbers and Binary Subnetting a Class C Network Using Binary Subnetting a Class B Network Using Binary Binary ANDing The Enhanced Bob Maneuver for Subnetting (or How to Subnet Anything in Under a Minute)
Chapter 2. VLSM
IP Subnet Zero VLSM Example
Chapter 3. Route Summarization
Example for Understanding Route Summarization Route Summarization and Route Flapping Requirements for Route Summarization
Part II: Introduction to Cisco Devices
Chapter 4. Cables and Connections
Connecting a Rollover Cable to Your Router or Switch Using a USB Cable to Connect to Your Router or Switch Terminal Settings LAN Connections Serial Cable Types Which Cable to Use? 568A Versus 568B Cables
Chapter 5. The Command Line Interface
Shortcuts for Entering Commands Using the Key to Complete Commands Console Error Messages Using the Question Mark for Help enable Command exit Command disable Command logout Command Setup Mode Keyboard Help History Commands terminal Commands show Commands Using the Pipe Parameter (|) with the show Command
Part III: Configuring a Router
Chapter 6. Configuring a Single Cisco Router
Router Modes Entering Global Configuration Mode Configuring a Router Name Configuring Passwords Password Encryption Interface Names Moving Between Interfaces Configuring a Serial Interface Configuring a Fast Ethernet Interface Configuring a Gigabit Ethernet Interface Creating a Message-of-the-Day Banner Creating a Login Banner Setting the Clock Time Zone Assigning a Local Host Name to an IP Address The no ip domain-lookup Command The logging synchronous Command The exec-timeout Command Saving Configurations Erasing Configurations show Commands EXEC Commands in Configuration Mode: The do Command Configuration Example: Basic Router Configuration
Part IV: Routing
Chapter 7. Static Routing
Configuring a Static Route on a Router The permanent Keyword (Optional) Static Routes and Administrative Distance (Optional) Configuring a Default Route on a Router Verifying Static Routes Configuration Example: Static Routes
Chapter 8. EIGRP
Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) EIGRP Auto-Summarization EIGRP Manual Summarization Passive EIGRP Interfaces Equal-Cost Load Balancing: Maximum Paths Unequal-Cost Load Balancing: Variance Bandwidth Use Authentication Verifying EIGRP Troubleshooting EIGRP Configuration Example: EIGRP
Chapter 9. Single-Area OSPF
Configuring OSPF Using Wildcard Masks with OSPF Areas Loopback Interfaces DR/BDR Elections Modifying Cost Metrics OSPF auto-cost reference-bandwidth Authentication: Simple Authentication: Using MD5 Encryption Timers Propagating a Default Route Verifying OSPF Configuration Troubleshooting OSPF Configuration Example: Single Area OSPF
Chapter 10. Multi-Area OSPF
Configuring Multi-Area OSPF Passive Interfaces Configuration Example: Multi-Area OSPF
Part V: Switching
Chapter 11. Configuring a Switch
Help Commands Command Modes Verifying Commands Resetting Switch Configuration Setting Host Names Setting Passwords Setting IP Addresses and Default Gateways Setting Interface Descriptions The mdix auto Command Setting Duplex Operation Setting Operation Speed Managing the MAC Address Table Configuring Static MAC Addresses Switch Port Security Verifying Switch Port Security Sticky MAC Addresses Configuration Example
Chapter 12. VLANs
Creating Static VLANs Assigning Ports to VLANs Using the range Command Verifying VLAN Information Saving VLAN Configurations Erasing VLAN Configurations Configuration Example: VLANs
Chapter 13. VLAN Trunking Protocol and Inter-VLAN Communication
Dynamic Trunking Protocol Dynamic Trunking Protocol (DTP) Setting the Encapsulation Type VLAN Trunking Protocol (VTP) Verifying VTP Inter-VLAN Communication Using an External Router: Router-on-a-Stick Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface Inter-VLAN Communication Tips Configuration Example: Inter-VLAN Communication
Chapter 14. Spanning Tree Protocol and EtherChannel
Spanning Tree Protocol EtherChannel
Part VI: Layer Redundancy
Chapter 15. HSRP and GLBP
Hot Standby Router Protocol Configuring HSRP on a Router Configuring HSRP on an L3 Switch Default HSRP Configuration Settings Verifying HSRP HSRP Optimization Options Multiple HSRP Debugging HSRP Virtual Router Redundancy Protocol Configuring VRRP Verifying VRRP Debugging VRRP Gateway Load Balancing Protocol Verifying GLBP Debugging GLBP Configuration Example: GLBP
Part VII: IPv6
Chapter 16. IPv6
Assigning IPv6 Addresses to Interfaces IPv6 and RIPng Configuration Example: IPv6 RIP IPv6 Tunnels: Manual Overlay Tunnel Static Routes in IPv6 Floating Static Routes in IPv6 Default Routes in IPv6 Verifying and Troubleshooting IPv6 IPv6 Ping IPv6 Traceroute
Chapter 17. OSPFv3
IPv6 and OSPFv3 Enabling OSPF for IPv6 on an Interface Enabling an OSPF for IPv6 Area Range Enabling an IPv4 Router ID for OSPFv3 Forcing an SPF Calculation Verifying and Troubleshooting IPv6 and OSPFv3 Configuration Example: OSPFv3 R3 Router R2 Router R1 Router R4 Router
Chapter 18. EIGRP for IPv6
IPv6 and EIGRP Configuring the Percentage of Link Bandwidth Used by EIGRP Configuring Summary Addresses Configuring EIGRP Route Authentication Configuring EIGRP Timers Logging EIGRP Neighbor Adjacency Changes Adjusting the EIGRP for IPv6 Metric Weights Verifying and Troubleshooting EIGRP for IPv6 Configuration Example: EIGRP for IPv6 R3 Router R2 Router R1 Router
Part VIII: Network Administration and Troubleshooting
Chapter 19. Backing Up and Restoring Cisco IOS Software and Configurations
Boot System Commands The Cisco IOS File System Viewing the Cisco IOS File System Commonly Used URL Prefixes for Cisco Network Devices Deciphering IOS Image Filenames Backing Up Configurations to a TFTP Server Restoring Configurations from a TFTP Server Backing Up the Cisco IOS Software to a TFTP Server Restoring/Upgrading the Cisco IOS Software from a TFTP Server Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command
Chapter 20. Password-Recovery Procedures and the Configuration Register
The Configuration Register Password-Recovery Procedures for Cisco Routers Password Recovery for 2960 Series Switches
Chapter 21. Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol
Chapter 22. Remote Connectivity Using Telnet or SSH
Configuring a Device to Accept a Remote Telnet Connection Using Telnet to Remotely Connect to Other Devices Verifying Telnet Configuring the Secure Shell Protocol (SSH) Verifying SSH
Chapter 23. Verifying End-to-End Connectivity
ICMP Redirect Messages The ping Command Examples of Using the ping and the Extended ping Commands The traceroute Command
Chapter 24. Configuring Network Management Protocols
Configuring SNMP Configuring Syslog Syslog Message Format Syslog Severity Levels Syslog Message Example Configuring NetFlow Verifying NetFlow
Chapter 25. Basic Troubleshooting
Viewing the Routing Table Clearing the Routing Table Determining the Gateway of Last Resort Determining the Last Routing Update OSI Layer 3 Testing OSI Layer 7 Testing Interpreting the show interface Command Clearing Interface Counters Using CDP to Troubleshoot The traceroute Command The show controllers Command debug Commands Using Time Stamps Operating System IP Verification Commands The ip http server Command The netstat Command The arp Command
Chapter 26. Cisco IOS Licensing
Cisco Licensing Earlier Than IOS 15.0 Cisco Licensing for the ISR G2 Platforms: IOS 15.0 and Later Verifying Licenses Cisco License Manager Installing a Permanent License Installing an Evaluation License Backing Up a License Uninstalling a License
Part IX: Managing IP Services
Chapter 27. Network Address Translation
Configuring Dynamic NAT: One Private to One Public Address Translation Configuring PAT: Many Private to One Public Address Translation Configuring Static NAT: One Private to One Permanent Public Address Translation Verifying NAT and PAT Configurations Troubleshooting NAT and PAT Configurations Configuration Example: PAT
Chapter 28. Dynamic Host Configuration Protocol (DHCP)
Configuring a DHCP Server on an IOS Router Verifying and Troubleshooting DHCP Configuration Configuring a DHCP Helper Address DHCP Client on a Cisco IOS Software Ethernet Interface Configuration Example: DHCP
Part X: WANs
Chapter 29. Configuring Serial Encapsulation: HDLC and PPP
Configuring HDLC Encapsulation on a Serial Line Configuring Point-to-Point Protocol (PPP) on a Serial Line (Mandatory Commands) Configuring PPP on a Serial Line (Optional Commands): Compression Configuring PPP on a Serial Line (Optional Commands): Link Quality Configuring PPP on a Serial Line (Optional Commands): Multilink Configuring PPP on a Serial Line (Optional Commands): Authentication Verifying and Troubleshooting a Serial Link/PPP Encapsulation Configuration Example: PPP with CHAP Authentication
Chapter 30. Establishing WAN Connectivity Using Frame Relay
Configuring Frame Relay Verifying Frame Relay Troubleshooting Frame Relay Configuration Example: Point-to-Point Frame Relay Using Subinterfaces and OSPF Configuration Example: Point-to-Multipoint Frame Relay Using Subinterfaces and EIGRP
Chapter 31. Configuring Generic Routing Encapsulation (GRE) Tunnels
Configuring a GRE Tunnel Verifying a GRE Tunnel
Chapter 32. Configuring Point-to-Point Protocol over Ethernet (PPPoE)
Configuring a DSL Connection using PPPoE
Part XI: Network Security
Chapter 33. Managing Traffic Using Access Control Lists (ACL)
Access List Numbers Using Wildcard Masks ACL Keywords Creating Standard ACLs Applying Standard ACLs to an Interface Verifying ACLs Removing ACLs Creating Extended ACLs Applying Extended ACLs to an Interface The established Keyword (Optional) Creating Named ACLs Using Sequence Numbers in Named ACLs Removing Specific Lines in Named ACLs Using Sequence Numbers Sequence Number Tips Including Comments About Entries in ACLs Restricting Virtual Terminal Access Tips for Configuring ACLs ACLs and IPv6 Configuration Examples: ACLs
Part XII: Appendixes
Appendix A. Binary/Hex/Decimal Conversion Chart Appendix B. Create Your Own Journal Here
Steps to Configuring a Router
What Do You Want to Do Today?
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion