Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Network Warrior
SPECIAL OFFER: Upgrade this ebook with O’Reilly Preface
Who Should Read This Book Conventions Used in This Book Using Code Examples We’d Like to Hear from You Safari® Books Online Acknowledgments
1. What Is a Network? 2. Hubs and Switches
Hubs Switches
Switch Types Planning a Chassis-Based Switch Installation
Rack space Power Cooling Installing and removing modules Routing cables
3. Autonegotiation
What Is Autonegotiation? How Autonegotiation Works When Autonegotiation Fails Autonegotiation Best Practices Configuring Autonegotiation
4. VLANs
Connecting VLANs Configuring VLANs
CatOS IOS Using VLAN Database IOS Using Global Commands Nexus and NX-OS
5. Trunking
How Trunks Work
ISL 802.1Q Which Protocol to Use Trunk Negotiation
Configuring Trunks
IOS CatOS Nexus and NX-OS
6. VLAN Trunking Protocol
VTP Pruning Dangers of VTP Configuring VTP
VTP Domains
IOS CatOS NX-OS
VTP Mode
IOS CatOS NX-OS
VTP Password
IOS CatOS NX-OS
VTP Pruning
IOS CatOS NX-OS
7. Link Aggregation
EtherChannel
EtherChannel Load Balancing Configuring and Managing EtherChannel
EtherChannel protocols CatOS example IOS example NX-OS example
Cross-Stack EtherChannel Multichassis EtherChannel (MEC) Virtual Port Channel
Initial vPC Configuration Adding a vPC
8. Spanning Tree
Broadcast Storms MAC Address Table Instability Preventing Loops with Spanning Tree
How Spanning Tree Works
Managing Spanning Tree Additional Spanning Tree Features
PortFast BPDU Guard UplinkFast BackboneFast
Common Spanning Tree Problems
Duplex Mismatch Unidirectional Links Bridge Assurance
Designing to Prevent Spanning Tree Problems
Use Routing Instead of Switching for Redundancy Always Configure the Root Bridge
9. Routing and Routers
Routing Tables Route Types The IP Routing Table
Host Route Subnet Summary (Group of Subnets) Major Network Supernet (Group of Major Networks) Default Route
Virtual Routing and Forwarding
10. Routing Protocols
Communication Between Routers Metrics and Protocol Types Administrative Distance Specific Routing Protocols
RIP RIPv2 EIGRP OSPF BGP
11. Redistribution
Redistributing into RIP Redistributing into EIGRP Redistributing into OSPF Mutual Redistribution Redistribution Loops Limiting Redistribution
Route Tags A Real-World Example
Another method
12. Tunnels
GRE Tunnels GRE Tunnels and Routing Protocols GRE and Access Lists
13. First Hop Redundancy
HSRP HSRP Interface Tracking When HSRP Isn’t Enough Nexus and HSRP GLBP
Object Tracking in GLBP
14. Route Maps
Building a Route Map Policy Routing Example
Monitoring Policy Routing
15. Switching Algorithms in Cisco Routers
Process Switching Interrupt Context Switching
Fast Switching Optimum Switching CEF
Configuring and Managing Switching Paths
Process Switching Fast Switching CEF
16. Multilayer Switches
Configuring SVIs
IOS (4500, 6500, 3550, 3750, etc.) Hybrid Mode (4500, 6500) NX-OS (Nexus 7000, 5000)
Multilayer Switch Models
17. Cisco 6500 Multilayer Switches
Architecture
Buses Enhanced Chassis Vertical Enhanced Chassis Supervisors
MSFC PFC Models
Modules
Module interaction Module types
Ethernet modules FWSMs CSMs NAM Intrusion Detection System modules FlexWAN modules Communication Media Modules
CatOS Versus IOS Installing VSS
Other Recommended VSS Commands
VSS dual-active detection
VSS Failover Commands Miscellaneous VSS Commands VSS Best Practices
18. Cisco Nexus
Nexus Hardware
Nexus 7000 Nexus 5000 Nexus 2000 Nexus 1000 Series
NX-OS
NX-OS Versus IOS
No more speed-related interface names No hidden configuration in NX-OS Interface status displays operational state along with a reason The show interface brief command No more write memory No more do command No more show arp No more interface range command Slash notation supported on all IPv4 and IPv6 commands Two CLI help levels Routing configuration mostly within interfaces Many more pipe options
Nexus Iconography Nexus Design Features
Virtual Routing and Forwarding Virtual Device Contexts Shared and Dedicated Rate-Mode Configuring Fabric Extenders (FEXs)
Describing FEXs Physical connection Pinning FEX fabric uplinks using vPC
Virtual Port Channel Config-Sync Configuration Rollback Upgrading NX-OS
19. Catalyst 3750 Features
Stacking Interface Ranges Macros Flex Links Storm Control Port Security SPAN Voice VLAN QoS
20. Telecom Nomenclature
Telecom Glossary
21. T1
Understanding T1 Duplex Types of T1 Encoding
AMI B8ZS
Framing
D4/Superframe Extended Super Frame
Performance Monitoring
Loss of Signal Out of Frame Bipolar Violation CRC6 Errored Seconds Extreme Errored Seconds
Alarms
Red Alarm Yellow Alarm Blue Alarm
Troubleshooting T1s
Loopback Tests Integrated CSU/DSUs
Configuring T1s
CSU/DSU Configuration CSU/DSU Troubleshooting
22. DS3
Framing
M13 C-Bits Clear-Channel DS3 Framing
Line Coding Configuring DS3s
Clear-Channel DS3 Channelized DS3
23. Frame Relay
Ordering Frame Relay Service Frame Relay Network Design Oversubscription Local Management Interface
Congestion Avoidance in Frame Relay
Configuring Frame Relay
Basic Frame Relay with Two Nodes Basic Frame Relay with More Than Two Nodes Frame Relay Subinterfaces
Troubleshooting Frame Relay
24. MPLS 25. Access Lists
Designing Access Lists
Named Versus Numbered Wildcard Masks Where to Apply Access Lists Naming Access Lists Top-Down Processing Most-Used on Top Using Groups in ASA and PIX ACLs Deleting ACLs Turbo ACLs Allowing Outbound Traceroute and Ping Allowing MTU Path Discovery Packets
ACLs in Multilayer Switches
Configuring Port ACLs Configuring Router ACLs Configuring VLAN Maps
Reflexive Access Lists
Configuring Reflexive Access Lists
26. Authentication in Cisco Devices
Basic (Non-AAA) Authentication
Line Passwords Configuring Local Users PPP Authentication
PAP
One-way authentication Two-way authentication Debugging PPP authentication
CHAP
One-way authentication Two-way authentication Changing the sent hostname
AAA Authentication
Enabling AAA Configuring Security Server Information
Default RADIUS and TACACS+ server groups Custom groups
Creating Method Lists
IOS login authentication NX-OS login authentication PPP authentication
Applying Method Lists
27. Basic Firewall Theory
Best Practices The DMZ
Another DMZ Example Multiple DMZ Example
Alternate Designs
28. ASA Firewall Configuration
Contexts Interfaces and Security Levels Names Object Groups Inspects Managing Contexts
Context Types The Classifier
No shared interfaces Shared outside interfaces Shared inside interface Sharing inside and outside interfaces Cascading contexts
Configuring Contexts Interfaces and Contexts Write Mem Behavior
Failover
Failover Terminology Understanding Failover Configuring Failover—Active/Standby Monitoring Failover Configuring Failover—Active/Active
NAT
NAT Commands NAT Examples
Simple PAT using the outside interface Simple PAT using a dedicated IP address Simple PAT with public servers on the inside Port redirection DMZ
Miscellaneous
Remote Access Saving Configuration Changes Logging
Troubleshooting
29. Wireless
Wireless Standards Security Configuring a WAP
MAC Address Filtering
Troubleshooting
30. VoIP
How VoIP Works
Protocols Telephony Terms Cisco Telephony Terms Common Issues with VoIP
Latency Packet loss Jitter
Small-Office VoIP Example
VLANs Switch Ports QoS on the CME Router DHCP for Phones TFTP Service Telephony Service Dial Plan Voice Ports Configuring Phones
Ephone-DN Paging Ephone PTT Message waiting lamps
Dial Peers
POTS VoIP Dial-peer pattern matching
Outbound dial peers Inbound dial peers
SIP
SIP and NAT
Troubleshooting
Phone Registration TFTP Dial Peer SIP
31. Introduction to QoS
Types of QoS QoS Mechanics
Priorities Flavors of QoS
Traffic-shaping theory
Common QoS Misconceptions
QoS “Carves Up” a Link into Smaller Logical Links QoS Limits Bandwidth QoS Resolves a Need for More Bandwidth QoS Prevents Packets from Being Dropped QoS Will Make You More Attractive to the Opposite Sex
32. Designing QoS
LLQ Scenario
Protocols Priorities Determine Bandwidth Requirements
Configuring the Routers
Class Maps Policy Maps Service Policies
Traffic-Shaping Scenarios
Scenario 1: Ethernet Handoff Scenario 2: Frame Relay Speed Mismatch
Traffic-shaping terminology
33. The Congested Network
Determining Whether the Network Is Congested Resolving the Problem
34. The Converged Network
Configuration Monitoring QoS Troubleshooting a Converged Network
Incorrect Queue Configuration Priority Queue Too Small Priority Queue Too Large Nonpriority Queue Too Small Nonpriority Queue Too Large Default Queue Too Small Default Queue Too Large
35. Designing Networks
Documentation
Requirements Documents Port Layout Spreadsheets IP and VLAN Spreadsheets Bay Face Layouts Power and Cooling Requirements Tips for Network Diagrams
Naming Conventions for Devices Network Designs
Corporate Networks
Three-tiered architecture Collapsed core—no distribution Collapsed core—no distribution or access Configuration concerns
Trunks EtherChannels Spanning tree VTP VLANs
Ecommerce Websites Modern Virtual Server Environments Small Networks
36. IP Design
Public Versus Private IP Space VLSM CIDR Allocating IP Network Space Allocating IP Subnets
Sequential Divide by Half Reverse Binary
IP Subnetting Made Easy
37. IPv6
Addressing
Subnet Masks Address Types Subnetting NAT
Simple Router Configuration
38. Network Time Protocol
What Is Accurate Time? NTP Design Configuring NTP
NTP Client NTP Server
39. Failures
Human Error Multiple Component Failure Disaster Chains No Failover Testing Troubleshooting
Remain Calm Log Your Actions Find Out What Changed Check the Physical Layer First! Assume Nothing; Prove Everything Isolate the Problem Don’t Look for Zebras Do a Physical Audit Escalate Troubleshooting in a Team Environment The Janitor Principle
40. GAD’s Maxims
Maxim #1
Politics Money The Right Way to Do It
Maxim #2
Simplify Standardize Stabilize
Maxim #3
Lower Costs Increase Performance or Capacity Increase Reliability
41. Avoiding Frustration
Why Everything Is Messed Up How to Sell Your Ideas to Management When to Upgrade and Why
The Dangers of Upgrading Valid Reasons to Upgrade
Why Change Control Is Your Friend How Not to Be a Computer Jerk
Behavioral Environmental Leadership and Mentoring
Index About the Author Colophon SPECIAL OFFER: Upgrade this ebook with O’Reilly
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion