Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Network Warrior
Preface
Who Should Read This Book Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari® Enabled Acknowledgments
I. Hubs, Switches, and Switching
1. What Is a Network? 2. Hubs and Switches
2.1. Hubs 2.2. Switches
2.2.1. Switch Types 2.2.2. Planning a Chassis-Based Switch Installation
2.2.2.1. Rack space 2.2.2.2. Power 2.2.2.3. Cooling 2.2.2.4. Installing and removing modules 2.2.2.5. Routing cables
3. Auto-Negotiation
3.1. What Is Auto-Negotiation? 3.2. How Auto-Negotiation Works 3.3. When Auto-Negotiation Fails 3.4. Auto-Negotiation Best Practices 3.5. Configuring Auto-Negotiation
4. VLANs
4.1. Connecting VLANs 4.2. Configuring VLANs
4.2.1. CatOS 4.2.2. IOS Using VLAN Database 4.2.3. IOS Using Global Commands
5. Trunking
5.1. How Trunks Work
5.1.1. ISL 5.1.2. 802.1Q 5.1.3. Which Protocol to Use 5.1.4. Trunk Negotiation
5.2. Configuring Trunks
5.2.1. IOS 5.2.2. CatOS
6. VLAN Trunking Protocol
6.1. VTP Pruning 6.2. Dangers of VTP 6.3. Configuring VTP
6.3.1. VTP Domains
6.3.1.1. IOS 6.3.1.2. CatOS
6.3.2. VTP Mode
6.3.2.1. IOS 6.3.2.2. CatOS
6.3.3. VTP Password
6.3.3.1. IOS 6.3.3.2. CatOS
6.3.4. VTP Pruning
6.3.4.1. IOS 6.3.4.2. CatOS
7. EtherChannel
7.1. Load Balancing 7.2. Configuring and Managing EtherChannel
7.2.1. EtherChannel Protocols 7.2.2. CatOS Example 7.2.3. IOS Example
8. Spanning Tree
8.1. Broadcast Storms 8.2. MAC Address Table Instability 8.3. Preventing Loops with Spanning Tree
8.3.1. How Spanning Tree Works
8.4. Managing Spanning Tree 8.5. Additional Spanning Tree Features
8.5.1. PortFast 8.5.2. BPDU Guard 8.5.3. UplinkFast 8.5.4. BackboneFast
8.6. Common Spanning Tree Problems
8.6.1. Duplex Mismatch 8.6.2. Unidirectional Links
8.7. Designing to Prevent Spanning Tree Problems
8.7.1. Use Routing Instead of Switching for Redundancy 8.7.2. Always Configure the Root Bridge
II. Routers and Routing
9. Routing and Routers
9.1. Routing Tables 9.2. Route Types 9.3. The IP Routing Table
9.3.1. Host Route 9.3.2. Subnet 9.3.3. Summary (Group of Subnets) 9.3.4. Major Network 9.3.5. Supernet (Group of Major Networks) 9.3.6. Default Route
10. Routing Protocols
10.1. Communication Between Routers 10.2. Metrics and Protocol Types 10.3. Administrative Distance 10.4. Specific Routing Protocols
10.4.1. RIP 10.4.2. RIPv2 10.4.3. EIGRP 10.4.4. OSPF 10.4.5. BGP
11. Redistribution
11.1. Redistributing into RIP 11.2. Redistributing into EIGRP 11.3. Redistributing into OSPF 11.4. Mutual Redistribution 11.5. Redistribution Loops 11.6. Limiting Redistribution
11.6.1. Route Tags 11.6.2. A Real-World Example
11.6.2.1. Another method
12. Tunnels
12.1. GRE Tunnels 12.2. GRE Tunnels and Routing Protocols 12.3. GRE and Access Lists
13. Resilient Ethernet
13.1. HSRP 13.2. HSRP Interface Tracking 13.3. When HSRP Isn't Enough
14. Route Maps
14.1. Building a Route Map 14.2. Policy-Routing Example
14.2.1. Monitoring Policy Routing
15. Switching Algorithms in Cisco Routers
15.1. Process Switching 15.2. Interrupt Context Switching
15.2.1. Fast Switching 15.2.2. Optimum Switching 15.2.3. Cisco Express Forwarding
15.3. Configuring and Managing Switching Paths
15.3.1. Process Switching 15.3.2. Fast Switching 15.3.3. Cisco Express Forwarding
III. Multilayer Switches
16. Multilayer Switches
16.1. Configuring SVIs
16.1.1. Native Mode (4500, 6500, 3550, 3750) 16.1.2. Hybrid Mode (4500, 6500)
16.2. Multilayer Switch Models
17. Cisco 6500 Multilayer Switches
17.1. Architecture
17.1.1. Buses 17.1.2. Enhanced Chassis 17.1.3. Supervisors
17.1.3.1. MSFC 17.1.3.2. PFC 17.1.3.3. Models
17.1.4. Modules
17.1.4.1. Module interaction 17.1.4.2. Module types
17.1.4.2.1. Ethernet modules 17.1.4.2.2. Firewall Services Modules 17.1.4.2.3. Content Switch Modules 17.1.4.2.4. Network Analysis Modules 17.1.4.2.5. Intrusion Detection System Modules 17.1.4.2.6. FlexWAN modules 17.1.4.2.7. Communication Media Modules
17.2. CatOS Versus IOS
18. Catalyst 3750 Features
18.1. Stacking 18.2. Interface Ranges 18.3. Macros 18.4. Flex Links 18.5. Storm Control 18.6. Port Security 18.7. SPAN 18.8. Voice VLAN 18.9. QoS
IV. Telecom
19. Telecom Nomenclature
19.1. Introduction and History 19.2. Telecom Glossary
20. T1
20.1. Understanding T1 Duplex 20.2. Types of T1 20.3. Encoding
20.3.1. AMI 20.3.2. B8ZS
20.4. Framing
20.4.1. D4/Superframe 20.4.2. Extended Superframe (ESF)
20.5. Performance Monitoring
20.5.1. Loss of Signal (LOS) 20.5.2. Out of Frame (OOF) 20.5.3. Bipolar Violation (BPV) 20.5.4. CRC6 20.5.5. Errored Seconds (ES) 20.5.6. Extreme Errored Seconds (EES)
20.6. Alarms
20.6.1. Red Alarm 20.6.2. Yellow Alarm (RAI) 20.6.3. Blue Alarm (AIS)
20.7. Troubleshooting T1s
20.7.1. Loopback Tests 20.7.2. Integrated CSU/DSUs
20.8. Configuring T1s
20.8.1. CSU/DSU Configuration 20.8.2. CSU/DSU Troubleshooting
21. DS3
21.1. Framing
21.1.1. M13 21.1.2. C-Bits 21.1.3. Clear-Channel DS3 Framing
21.2. Line Coding 21.3. Configuring DS3s
21.3.1. Clear-Channel DS3 21.3.2. Channelized DS3
22. Frame Relay
22.1. Ordering Frame-Relay Service 22.2. Frame-Relay Network Design 22.3. Oversubscription 22.4. Local Management Interface (LMI)
22.4.1. Congestion Avoidance in Frame Relay
22.5. Configuring Frame Relay
22.5.1. Basic Frame Relay with Two Nodes 22.5.2. Basic Frame Relay with More Than Two Nodes 22.5.3. Frame-Relay Subinterfaces
22.6. Troubleshooting Frame Relay
V. Security and Firewalls
23. Access Lists
23.1. Designing Access Lists
23.1.1. Wildcard Masks 23.1.2. Where to Apply Access Lists 23.1.3. Naming Access Lists 23.1.4. Top-Down Processing 23.1.5. Most-Used on Top 23.1.6. Using Groups in PIX ACLs 23.1.7. Turbo ACLs 23.1.8. Allowing Outbound Traceroute and Ping 23.1.9. Allowing MTU Path Discovery Packets
23.2. ACLs in Multilayer Switches
23.2.1. Configuring Port ACLs 23.2.2. Configuring Router ACLs 23.2.3. Configuring VLAN Maps
23.3. Reflexive Access Lists
23.3.1. Configuring Reflexive Access Lists
24. Authentication in Cisco Devices
24.1. Basic (Non-AAA) Authentication
24.1.1. Line Passwords 24.1.2. Configuring Local Users 24.1.3. PPP Authentication
24.1.3.1. PAP
24.1.3.1.1. One-way authentication 24.1.3.1.2. Two-way authentication 24.1.3.1.3. Debugging PPP authentication
24.1.3.2. CHAP
24.1.3.2.1. One-way authentication 24.1.3.2.2. Two-way authentication 24.1.3.2.3. Changing the sent hostname
24.2. AAA Authentication
24.2.1. Enabling AAA 24.2.2. Configuring Security Server Information
24.2.2.1. Default RADIUS and TACACS+ server groups 24.2.2.2. Custom groups
24.2.3. Creating Method Lists
24.2.3.1. Login authentication 24.2.3.2. PPP authentication
24.2.4. Applying Method Lists
25. Firewall Theory
25.1. Best Practices 25.2. The DMZ
25.2.1. Another DMZ Example 25.2.2. Multiple DMZ Example
25.3. Alternate Designs
26. PIX Firewall Configuration
26.1. Interfaces and Priorities 26.2. Names 26.3. Object Groups 26.4. Fixups 26.5. Failover
26.5.1. Failover Terminology 26.5.2. Understanding Failover 26.5.3. Configuring Failover 26.5.4. Monitoring Failover
26.6. NAT
26.6.1. NAT Commands 26.6.2. NAT Examples
26.6.2.1. Simple PAT using the outside interface 26.6.2.2. Simple PAT using a dedicated IP address 26.6.2.3. Simple PAT with public servers on the inside 26.6.2.4. Port redirection 26.6.2.5. DMZ
26.7. Miscellaneous
26.7.1. Remote Access 26.7.2. Saving Configuration Changes 26.7.3. Logging
26.8. Troubleshooting
VI. Server Load Balancing
27. Server Load-Balancing Technology
27.1. Types of Load Balancing 27.2. How Server Load Balancing Works
27.2.1. Balancing Algorithms
27.3. Configuring Server Load Balancing
27.3.1. IOS SLB
27.3.1.1. Real servers 27.3.1.2. Server farms 27.3.1.3. Virtual servers 27.3.1.4. Port translation using SLB
27.3.2. Content Switch Modules
27.3.2.1. Real servers 27.3.2.2. Server farms 27.3.2.3. Virtual servers 27.3.2.4. Port redirection
28. Content Switch Modules in Action
28.1. Common Tasks 28.2. Upgrading the CSM
VII. Quality of Service
29. Introduction to QoS
29.1. Types of QoS 29.2. QoS Mechanics
29.2.1. Priorities 29.2.2. Flavors of QoS
29.3. Common QoS Misconceptions
30. Designing a QoS Scheme
30.1. Determining Requirements
30.1.1. Protocols 30.1.2. Priorities 30.1.3. Determine Bandwidth Requirements
30.2. Configuring the Routers
30.2.1. Class Maps 30.2.2. Policy Maps 30.2.3. Service Policies
31. The Congested Network
31.1. Determining Whether the Network Is Congested 31.2. Resolving the Problem
32. The Converged Network
32.1. Configuration 32.2. Monitoring QoS 32.3. Troubleshooting a Converged Network
32.3.1. Incorrect Queue Configuration 32.3.2. Priority Queue Too Small 32.3.3. Priority Queue Too Large 32.3.4. Nonpriority Queue Too Small 32.3.5. Nonpriority Queue Too Large 32.3.6. Default Queue Too Small 32.3.7. Default Queue Too Large
VIII. Designing Networks
33. Designing Networks
33.1. Documentation
33.1.1. Requirements Documents 33.1.2. Port Layout Spreadsheets 33.1.3. IP and VLAN Spreadsheets 33.1.4. Bay Face Layouts 33.1.5. Power and Cooling Requirements 33.1.6. Tips for Network Diagrams
33.2. Naming Conventions for Devices 33.3. Network Designs
33.3.1. Corporate Networks
33.3.1.1. Three-tiered architecture 33.3.1.2. Collapsed core—no distribution 33.3.1.3. Collapsed core—no distribution or access 33.3.1.4. Configuration concerns
33.3.1.4.1. Trunks 33.3.1.4.2. EtherChannels 33.3.1.4.3. Spanning Tree 33.3.1.4.4. VTP 33.3.1.4.5. VLANs
33.3.2. E-Commerce Web Sites 33.3.3. Small Networks
34. IP Design
34.1. Public Versus Private IP Space 34.2. VLSM 34.3. CIDR 34.4. Allocating IP Network Space 34.5. Allocating IP Subnets
34.5.1. Sequential 34.5.2. Divide by Half 34.5.3. Reverse Binary
34.6. IP Subnetting Made Easy
35. Network Time Protocol
35.1. What Is Accurate Time? 35.2. NTP Design 35.3. Configuring NTP
35.3.1. NTP Client 35.3.2. NTP Server
36. Failures
36.1. Human Error 36.2. Multiple Component Failure 36.3. Disaster Chains 36.4. No Failover Testing 36.5. Troubleshooting
36.5.1. Remain Calm 36.5.2. Log Your Actions 36.5.3. Find Out What Changed 36.5.4. Check the Physical Layer First! 36.5.5. Assume Nothing; Prove Everything 36.5.6. Isolate the Problem 36.5.7. Don't Look for Zebras 36.5.8. Do a Physical Audit 36.5.9. Escalate 36.5.10. Troubleshooting in a Team Environment 36.5.11. The Janitor Principle
37. GAD's Maxims
37.1. Maxim #1 37.2. Maxim #2 37.3. Maxim #3
38. Avoiding Frustration
38.1. Why Everything Is Messed Up 38.2. How to Sell Your Ideas to Management 38.3. When to Upgrade and Why
38.3.1. The Dangers of Upgrading 38.3.2. Valid Reasons to Upgrade
38.4. Why Change Control Is Your Friend 38.5. How Not to Be a Computer Jerk
Colophon
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion