Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction Part I: TCP/IP Version 4 Chapter 1. How to Subnet
Class A–E Addresses Converting Between Decimal Numbers and Binary Subnetting a Class C Network Using Binary Subnetting a Class B Network Using Binary Binary ANDing
So Why AND? Shortcuts in Binary ANDing
The Enhanced Bob Maneuver for Subnetting
Chapter 2. VLSM
IP Subnet Zero VLSM Example
Step 1 Determine How Many H Bits Will Be Needed to Satisfy the Largest Network Step 2 Pick a Subnet for the Largest Network to Use Step 3 Pick the Next Largest Network to Work With Step 4 Pick the Third Largest Network to Work With Step 5 Determine Network Numbers for Serial Links
Chapter 3. Route Summarization
Example for Understanding Route Summarization
Step 1: Summarize Winnipeg's Routes Step 2: Summarize Calgary's Routes Step 3: Summarize Edmonton's Routes Step 4: Summarize Vancouver's Routes
Route Summarization and Route Flapping Requirements for Route Summarization
Part II: Introduction to Cisco Devices Chapter 4. Cables and Connections
Connecting a Rollover Cable to Your Router or Switch Terminal Settings LAN Connections Serial Cable Types Which Cable to Use? 568A Versus 568B Cables
Chapter 5. The Command-Line Interface
Shortcuts for Entering Commands Using the Key to Complete Commands Using the Question Mark for Help enable Command exit Command disable Command logout Command Setup Mode Keyboard Help History Commands show Commands
Part III: Configuring a Router Chapter 6. Configuring a Single Cisco Router
Router Modes Entering Global Configuration Mode Configuring a Router Name Configuring Passwords Password Encryption Interface Names Moving Between Interfaces Configuring a Serial Interface Configuring a Fast Ethernet Interface Creating a Message-of-the-Day Banner Creating a Login Banner Setting the Clock Time Zone Assigning a Local Host Name to an IP Address The no ip domain-lookup Command The logging synchronous Command The exec-timeout Command Saving Configurations Erasing Configurations show Commands EXEC Commands in Configuration Mode: The do Command Configuration Example: Basic Router Configuration
Part IV: Routing Chapter 7. Static Routing
Configuring a Static Route on a Router The permanent Keyword (Optional) Static Routes and Administrative Distance (Optional) Configuring a Default Route on a Router Verifying Static Routes Configuration Example: Static Routes
Chapter 8. RIP
The ip classless Command RIP Routing: Mandatory Commands RIP Routing: Optional Commands Troubleshooting RIP Issues Configuration Example: RIPv2 Routing
Chapter 9. EIGRP
Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) EIGRP Auto-Summarization Load Balancing: variance Bandwidth Use Authentication Verifying EIGRP Troubleshooting EIGRP Configuration Example: EIGRP
Chapter 10. Single Area OSPF
Configuring OSPF: Mandatory Commands Using Wildcard Masks with OSPF Areas Configuring OSPF: Optional Commands
Loopback Interfaces Router ID DR/BDR Elections Modifying Cost Metrics Authentication: Simple Authentication: Using MD5 Encryption Timers Propagating a Default Route
Verifying OSPF Configuration Troubleshooting OSPF Configuration Example: Single Area OSPF
Part V: Switching Chapter 11. Configuring a Switch
Help Commands Command Modes Verifying Commands Resetting Switch Configuration Setting Host Names Setting Passwords Setting IP Addresses and Default Gateways Setting Interface Descriptions Setting Duplex Operation Setting Operation Speed Managing the MAC Address Table Configuring Static MAC Addresses Switch Port Security Verifying Switch Port Security Sticky MAC Addresses Configuration Example
Chapter 12. VLANs
Creating Static VLANs
Using VLAN Configuration Mode Using VLAN Database Mode
Assigning Ports to VLANs Using the range Command Verifying VLAN Information Saving VLAN Configurations Erasing VLAN Configurations Configuration Example: VLANs
Chapter 13. VLAN Trunking Protocol and Inter-VLAN Routing
Dynamic Trunking Protocol (DTP) Setting the Encapsulation Type VLAN Trunking Protocol (VTP)
Using Global Configuration Mode Using VLAN Database Mode
Verifying VTP Inter-VLAN Communication Using an External Router: Router-on-a-Stick Inter-VLAN Communication Tips Configuration Example: Inter-VLAN Communication
Chapter 14. STP and EtherChannel
Spanning Tree Protocol
Enabling Spanning Tree Protocol Configuring the Root Switch Configuring a Secondary Root Switch Configuring Port Priority Configuring the Path Cost Configuring the Switch Priority of a VLAN Configuring STP Timers Verifying STP Optional STP Configurations Changing the Spanning-Tree Mode Extended System ID Enabling Rapid Spanning Tree Troubleshooting Spanning Tree Configuration Example: STP
EtherChannel
Interface Modes in EtherChannel Guidelines for Configuring EtherChannel Configuring Layer 2 EtherChannel Verifying EtherChannel Configuration Example: EtherChannel
Part VI: Extending the LAN Chapter 15. Implementing a Wireless LAN
Wireless Access Point Configuration: Linksys 300N Access Point Wireless Client Configuration: Linksys Wireless-N Notebook Adapter
Part VII: Network Administration and Troubleshooting Chapter 16. Backing Up and Restoring Cisco IOS Software and Configurations
Boot System Commands The Cisco IOS File System Backing Up Configurations to a TFTP Server Restoring Configurations from a TFTP Server Backing Up the Cisco IOS Software to a TFTP Server Restoring/Upgrading the Cisco IOS Software from a TFTP Server Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command
Chapter 17. Password-Recovery Procedures and the Configuration Register
The Configuration Register
A Visual Representation What the Bits Mean The Boot Field Console Terminal Baud Rate Settings Changing the Console Line Speed: CLI Changing the Console Line Speed: ROM Monitor Mode
Password-Recovery Procedures for Cisco Routers Password Recovery for 2960 Series Switches
Chapter 18. Cisco Discovery Protocol (CDP)
Cisco Discovery Protocol
Chapter 19. Telnet and SSH
Using Telnet to Remotely Connect to Other Devices Configuring the Secure Shell Protocol (SSH)
Chapter 20. The ping and traceroute Commands
ICMP Redirect Messages The ping Command Examples of Using the ping and the Extended ping Commands The traceroute Command
Chapter 21. SNMP and Syslog
Configuring SNMP Configuring Syslog
Chapter 22. Basic Troubleshooting
Viewing the Routing Table Determining the Gateway of Last Resort Determining the Last Routing Update OSI Layer 3 Testing OSI Layer 7 Testing Interpreting the show interface Command Clearing Interface Counters Using CDP to Troubleshoot The traceroute Command The show controllers Command debug Commands Using Time Stamps Operating System IP Verification Commands The ip http server Command The netstat Command
Part VIII: Managing IP Services Chapter 23. Network Address Translation
Private IP Addresses: RFC 1918 Configuring Dynamic NAT: One Private to One Public Address Translation Configuring PAT: Many Private to One Public Address Translation Configuring Static NAT: One Private to One Permanent Public Address Translation Verifying NAT and PAT Configurations Troubleshooting NAT and PAT Configurations Configuration Example: PAT
Chapter 24. DHCP
Configuring DHCP Verifying and Troubleshooting DHCP Configuration Configuring a DHCP Helper Address DHCP Client on a Cisco IOS Software Ethernet Interface Configuration Example: DHCP
Chapter 25. IPv6
Assigning IPv6 Addresses to Interfaces IPv6 and RIPng Configuration Example: IPv6 RIP IPv6 Tunnels: Manual Overlay Tunnel Static Routes in IPv6 Floating Static Routes in IPv6 Verifying and Troubleshooting IPv6 IPv6 Ping
Part IX: WANs Chapter 26. HDLC and PPP
Configuring HDLC Encapsulation on a Serial Line Configuring PPP on a Serial Line (Mandatory Commands) Configuring PPP on a Serial Line (Optional Commands): Compression Configuring PPP on a Serial Line (Optional Commands): Link Quality Configuring PPP on a Serial Line (Optional Commands): Multilink Configuring PPP on a Serial Line (Optional Commands): Authentication Verifying or Troubleshooting a Serial Link/PPP Encapsulation Configuration Example: PPP
Chapter 27. Frame Relay
Configuring Frame Relay
Setting the Frame Relay Encapsulation Type Setting the Frame Relay Encapsulation LMI Type Setting the Frame Relay DLCI Number Configuring a Frame Relay map Statement Configuring a Description of the Interface (Optional) Configuring Frame Relay Using Subinterfaces
Verifying Frame Relay Troubleshooting Frame Relay Configuration Examples: Frame Relay
Part X: Network Security Chapter 28. IP Access Control List Security
Access List Numbers Using Wildcard Masks ACL Keywords Creating Standard ACLs Applying Standard ACLs to an Interface Verifying ACLs Removing ACLs Creating Extended ACLs Applying Extended ACLs to an Interface The established Keyword (Optional) Creating Named ACLs Using Sequence Numbers in Named ACLs Removing Specific Lines in Named ACLs Using Sequence Numbers Sequence Number Tips Including Comments About Entries in ACLs Restricting Virtual Terminal Access Configuration Examples: ACLs
Chapter 29. Security Device Manager
Security Device Manager: Connecting with CLI Security Device Manager: Connecting with GUI SDM Express Wizard with No CLI Preconfiguration Resetting the Router to Factory Defaults Using SDM SDM User Interfaces
Configuring Interfaces Using SDM Configuring Routing Using SDM
SDM Monitor Mode Using SDM to Configure a Router to Act as a DHCP Server Using SDM to Configure an Interface as a DHCP Client Using SDM to Configure NAT/PAT What to Do If You Lose SDM Connectivity Because of an erase startup-config Command
Part XI: Appendixes Appendix A. Binary/Hex/Decimal Conversion Chart Appendix B. Create Your Own Journal Here
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion