Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Network Warrior
Preface
Who Should Read This Book
Conventions Used in This Book
Using Code Examples
We'd Like to Hear from You
Safari® Enabled
Acknowledgments
I. Hubs, Switches, and Switching
1. What Is a Network?
2. Hubs and Switches
2.1. Hubs
2.2. Switches
2.2.1. Switch Types
2.2.2. Planning a Chassis-Based Switch Installation
2.2.2.1. Rack space
2.2.2.2. Power
2.2.2.3. Cooling
2.2.2.4. Installing and removing modules
2.2.2.5. Routing cables
3. Auto-Negotiation
3.1. What Is Auto-Negotiation?
3.2. How Auto-Negotiation Works
3.3. When Auto-Negotiation Fails
3.4. Auto-Negotiation Best Practices
3.5. Configuring Auto-Negotiation
4. VLANs
4.1. Connecting VLANs
4.2. Configuring VLANs
4.2.1. CatOS
4.2.2. IOS Using VLAN Database
4.2.3. IOS Using Global Commands
5. Trunking
5.1. How Trunks Work
5.1.1. ISL
5.1.2. 802.1Q
5.1.3. Which Protocol to Use
5.1.4. Trunk Negotiation
5.2. Configuring Trunks
5.2.1. IOS
5.2.2. CatOS
6. VLAN Trunking Protocol
6.1. VTP Pruning
6.2. Dangers of VTP
6.3. Configuring VTP
6.3.1. VTP Domains
6.3.1.1. IOS
6.3.1.2. CatOS
6.3.2. VTP Mode
6.3.2.1. IOS
6.3.2.2. CatOS
6.3.3. VTP Password
6.3.3.1. IOS
6.3.3.2. CatOS
6.3.4. VTP Pruning
6.3.4.1. IOS
6.3.4.2. CatOS
7. EtherChannel
7.1. Load Balancing
7.2. Configuring and Managing EtherChannel
7.2.1. EtherChannel Protocols
7.2.2. CatOS Example
7.2.3. IOS Example
8. Spanning Tree
8.1. Broadcast Storms
8.2. MAC Address Table Instability
8.3. Preventing Loops with Spanning Tree
8.3.1. How Spanning Tree Works
8.4. Managing Spanning Tree
8.5. Additional Spanning Tree Features
8.5.1. PortFast
8.5.2. BPDU Guard
8.5.3. UplinkFast
8.5.4. BackboneFast
8.6. Common Spanning Tree Problems
8.6.1. Duplex Mismatch
8.6.2. Unidirectional Links
8.7. Designing to Prevent Spanning Tree Problems
8.7.1. Use Routing Instead of Switching for Redundancy
8.7.2. Always Configure the Root Bridge
II. Routers and Routing
9. Routing and Routers
9.1. Routing Tables
9.2. Route Types
9.3. The IP Routing Table
9.3.1. Host Route
9.3.2. Subnet
9.3.3. Summary (Group of Subnets)
9.3.4. Major Network
9.3.5. Supernet (Group of Major Networks)
9.3.6. Default Route
10. Routing Protocols
10.1. Communication Between Routers
10.2. Metrics and Protocol Types
10.3. Administrative Distance
10.4. Specific Routing Protocols
10.4.1. RIP
10.4.2. RIPv2
10.4.3. EIGRP
10.4.4. OSPF
10.4.5. BGP
11. Redistribution
11.1. Redistributing into RIP
11.2. Redistributing into EIGRP
11.3. Redistributing into OSPF
11.4. Mutual Redistribution
11.5. Redistribution Loops
11.6. Limiting Redistribution
11.6.1. Route Tags
11.6.2. A Real-World Example
11.6.2.1. Another method
12. Tunnels
12.1. GRE Tunnels
12.2. GRE Tunnels and Routing Protocols
12.3. GRE and Access Lists
13. Resilient Ethernet
13.1. HSRP
13.2. HSRP Interface Tracking
13.3. When HSRP Isn't Enough
14. Route Maps
14.1. Building a Route Map
14.2. Policy-Routing Example
14.2.1. Monitoring Policy Routing
15. Switching Algorithms in Cisco Routers
15.1. Process Switching
15.2. Interrupt Context Switching
15.2.1. Fast Switching
15.2.2. Optimum Switching
15.2.3. Cisco Express Forwarding
15.3. Configuring and Managing Switching Paths
15.3.1. Process Switching
15.3.2. Fast Switching
15.3.3. Cisco Express Forwarding
III. Multilayer Switches
16. Multilayer Switches
16.1. Configuring SVIs
16.1.1. Native Mode (4500, 6500, 3550, 3750)
16.1.2. Hybrid Mode (4500, 6500)
16.2. Multilayer Switch Models
17. Cisco 6500 Multilayer Switches
17.1. Architecture
17.1.1. Buses
17.1.2. Enhanced Chassis
17.1.3. Supervisors
17.1.3.1. MSFC
17.1.3.2. PFC
17.1.3.3. Models
17.1.4. Modules
17.1.4.1. Module interaction
17.1.4.2. Module types
17.1.4.2.1. Ethernet modules
17.1.4.2.2. Firewall Services Modules
17.1.4.2.3. Content Switch Modules
17.1.4.2.4. Network Analysis Modules
17.1.4.2.5. Intrusion Detection System Modules
17.1.4.2.6. FlexWAN modules
17.1.4.2.7. Communication Media Modules
17.2. CatOS Versus IOS
18. Catalyst 3750 Features
18.1. Stacking
18.2. Interface Ranges
18.3. Macros
18.4. Flex Links
18.5. Storm Control
18.6. Port Security
18.7. SPAN
18.8. Voice VLAN
18.9. QoS
IV. Telecom
19. Telecom Nomenclature
19.1. Introduction and History
19.2. Telecom Glossary
20. T1
20.1. Understanding T1 Duplex
20.2. Types of T1
20.3. Encoding
20.3.1. AMI
20.3.2. B8ZS
20.4. Framing
20.4.1. D4/Superframe
20.4.2. Extended Superframe (ESF)
20.5. Performance Monitoring
20.5.1. Loss of Signal (LOS)
20.5.2. Out of Frame (OOF)
20.5.3. Bipolar Violation (BPV)
20.5.4. CRC6
20.5.5. Errored Seconds (ES)
20.5.6. Extreme Errored Seconds (EES)
20.6. Alarms
20.6.1. Red Alarm
20.6.2. Yellow Alarm (RAI)
20.6.3. Blue Alarm (AIS)
20.7. Troubleshooting T1s
20.7.1. Loopback Tests
20.7.2. Integrated CSU/DSUs
20.8. Configuring T1s
20.8.1. CSU/DSU Configuration
20.8.2. CSU/DSU Troubleshooting
21. DS3
21.1. Framing
21.1.1. M13
21.1.2. C-Bits
21.1.3. Clear-Channel DS3 Framing
21.2. Line Coding
21.3. Configuring DS3s
21.3.1. Clear-Channel DS3
21.3.2. Channelized DS3
22. Frame Relay
22.1. Ordering Frame-Relay Service
22.2. Frame-Relay Network Design
22.3. Oversubscription
22.4. Local Management Interface (LMI)
22.4.1. Congestion Avoidance in Frame Relay
22.5. Configuring Frame Relay
22.5.1. Basic Frame Relay with Two Nodes
22.5.2. Basic Frame Relay with More Than Two Nodes
22.5.3. Frame-Relay Subinterfaces
22.6. Troubleshooting Frame Relay
V. Security and Firewalls
23. Access Lists
23.1. Designing Access Lists
23.1.1. Wildcard Masks
23.1.2. Where to Apply Access Lists
23.1.3. Naming Access Lists
23.1.4. Top-Down Processing
23.1.5. Most-Used on Top
23.1.6. Using Groups in PIX ACLs
23.1.7. Turbo ACLs
23.1.8. Allowing Outbound Traceroute and Ping
23.1.9. Allowing MTU Path Discovery Packets
23.2. ACLs in Multilayer Switches
23.2.1. Configuring Port ACLs
23.2.2. Configuring Router ACLs
23.2.3. Configuring VLAN Maps
23.3. Reflexive Access Lists
23.3.1. Configuring Reflexive Access Lists
24. Authentication in Cisco Devices
24.1. Basic (Non-AAA) Authentication
24.1.1. Line Passwords
24.1.2. Configuring Local Users
24.1.3. PPP Authentication
24.1.3.1. PAP
24.1.3.1.1. One-way authentication
24.1.3.1.2. Two-way authentication
24.1.3.1.3. Debugging PPP authentication
24.1.3.2. CHAP
24.1.3.2.1. One-way authentication
24.1.3.2.2. Two-way authentication
24.1.3.2.3. Changing the sent hostname
24.2. AAA Authentication
24.2.1. Enabling AAA
24.2.2. Configuring Security Server Information
24.2.2.1. Default RADIUS and TACACS+ server groups
24.2.2.2. Custom groups
24.2.3. Creating Method Lists
24.2.3.1. Login authentication
24.2.3.2. PPP authentication
24.2.4. Applying Method Lists
25. Firewall Theory
25.1. Best Practices
25.2. The DMZ
25.2.1. Another DMZ Example
25.2.2. Multiple DMZ Example
25.3. Alternate Designs
26. PIX Firewall Configuration
26.1. Interfaces and Priorities
26.2. Names
26.3. Object Groups
26.4. Fixups
26.5. Failover
26.5.1. Failover Terminology
26.5.2. Understanding Failover
26.5.3. Configuring Failover
26.5.4. Monitoring Failover
26.6. NAT
26.6.1. NAT Commands
26.6.2. NAT Examples
26.6.2.1. Simple PAT using the outside interface
26.6.2.2. Simple PAT using a dedicated IP address
26.6.2.3. Simple PAT with public servers on the inside
26.6.2.4. Port redirection
26.6.2.5. DMZ
26.7. Miscellaneous
26.7.1. Remote Access
26.7.2. Saving Configuration Changes
26.7.3. Logging
26.8. Troubleshooting
VI. Server Load Balancing
27. Server Load-Balancing Technology
27.1. Types of Load Balancing
27.2. How Server Load Balancing Works
27.2.1. Balancing Algorithms
27.3. Configuring Server Load Balancing
27.3.1. IOS SLB
27.3.1.1. Real servers
27.3.1.2. Server farms
27.3.1.3. Virtual servers
27.3.1.4. Port translation using SLB
27.3.2. Content Switch Modules
27.3.2.1. Real servers
27.3.2.2. Server farms
27.3.2.3. Virtual servers
27.3.2.4. Port redirection
28. Content Switch Modules in Action
28.1. Common Tasks
28.2. Upgrading the CSM
VII. Quality of Service
29. Introduction to QoS
29.1. Types of QoS
29.2. QoS Mechanics
29.2.1. Priorities
29.2.2. Flavors of QoS
29.3. Common QoS Misconceptions
30. Designing a QoS Scheme
30.1. Determining Requirements
30.1.1. Protocols
30.1.2. Priorities
30.1.3. Determine Bandwidth Requirements
30.2. Configuring the Routers
30.2.1. Class Maps
30.2.2. Policy Maps
30.2.3. Service Policies
31. The Congested Network
31.1. Determining Whether the Network Is Congested
31.2. Resolving the Problem
32. The Converged Network
32.1. Configuration
32.2. Monitoring QoS
32.3. Troubleshooting a Converged Network
32.3.1. Incorrect Queue Configuration
32.3.2. Priority Queue Too Small
32.3.3. Priority Queue Too Large
32.3.4. Nonpriority Queue Too Small
32.3.5. Nonpriority Queue Too Large
32.3.6. Default Queue Too Small
32.3.7. Default Queue Too Large
VIII. Designing Networks
33. Designing Networks
33.1. Documentation
33.1.1. Requirements Documents
33.1.2. Port Layout Spreadsheets
33.1.3. IP and VLAN Spreadsheets
33.1.4. Bay Face Layouts
33.1.5. Power and Cooling Requirements
33.1.6. Tips for Network Diagrams
33.2. Naming Conventions for Devices
33.3. Network Designs
33.3.1. Corporate Networks
33.3.1.1. Three-tiered architecture
33.3.1.2. Collapsed core—no distribution
33.3.1.3. Collapsed core—no distribution or access
33.3.1.4. Configuration concerns
33.3.1.4.1. Trunks
33.3.1.4.2. EtherChannels
33.3.1.4.3. Spanning Tree
33.3.1.4.4. VTP
33.3.1.4.5. VLANs
33.3.2. E-Commerce Web Sites
33.3.3. Small Networks
34. IP Design
34.1. Public Versus Private IP Space
34.2. VLSM
34.3. CIDR
34.4. Allocating IP Network Space
34.5. Allocating IP Subnets
34.5.1. Sequential
34.5.2. Divide by Half
34.5.3. Reverse Binary
34.6. IP Subnetting Made Easy
35. Network Time Protocol
35.1. What Is Accurate Time?
35.2. NTP Design
35.3. Configuring NTP
35.3.1. NTP Client
35.3.2. NTP Server
36. Failures
36.1. Human Error
36.2. Multiple Component Failure
36.3. Disaster Chains
36.4. No Failover Testing
36.5. Troubleshooting
36.5.1. Remain Calm
36.5.2. Log Your Actions
36.5.3. Find Out What Changed
36.5.4. Check the Physical Layer First!
36.5.5. Assume Nothing; Prove Everything
36.5.6. Isolate the Problem
36.5.7. Don't Look for Zebras
36.5.8. Do a Physical Audit
36.5.9. Escalate
36.5.10. Troubleshooting in a Team Environment
36.5.11. The Janitor Principle
37. GAD's Maxims
37.1. Maxim #1
37.2. Maxim #2
37.3. Maxim #3
38. Avoiding Frustration
38.1. Why Everything Is Messed Up
38.2. How to Sell Your Ideas to Management
38.3. When to Upgrade and Why
38.3.1. The Dangers of Upgrading
38.3.2. Valid Reasons to Upgrade
38.4. Why Change Control Is Your Friend
38.5. How Not to Be a Computer Jerk
Colophon
← Prev
Back
Next →
← Prev
Back
Next →