did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780596003678

Cisco Cookbook

by
  • ISBN13:

    9780596003678

  • ISBN10:

    0596003676

  • Format: Paperback
  • Copyright: 2003-07-01
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.95 Save up to $5.46
  • Digital
    $49.49
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Everybody who has worked with Cisco routers for any length of time has had to ask their friends and co-workers for example router configuration files that show how to solve a common problem. A good working configuration example can often save huge amounts of time and frustration when implementing a feature that you've never used before. The "Cisco Cookbook gathers hundreds of example router configurations all in one place. As the name suggests, "Cisco Cookbook is organized as a series of recipes. Each recipe begins with a problem statement that describes a common situation that you might face. After each problem statement is a brief solution that shows a sample router configuration or script that you can use to resolve this particular problem. A discussion section then describes the solution, how it works, and when you should or should not use it. The chapters are organized by the feature or protocol discussed. If you are looking for information on a particular feature such as NAT, NTP or SNMP, you can turn,to that chapter and find a variety of related recipes. Most chapters list basic problems first, and any unusual or complicated situations last. The "Cisco Cookbook will quickly become your "go to" resource for researching and solving complex router configuration issues, saving you time and making your network more efficient.

Author Biography

Kevin Dooley is an independent networking consultant who has been designing and implementing networks for more than ten years. In that time he has built large scale Local and Wide Area Networks for several of Canada's largest companies. He holds a PhD in physics from the University of Toronto and is the author of Designing Large-Scale LANs.

Table of Contents

Prefacep. xv
Router Configuration and File Managementp. 1
Configuring the Router via TFTPp. 4
Saving Router Configuration to Serverp. 5
Booting the Router Using a Remote Configuration Filep. 7
Storing Configuration Files Larger than NVRAMp. 10
Clearing the Startup Configurationp. 12
Loading a New IOS Imagep. 15
Booting a Different IOS Imagep. 18
Booting Over the Networkp. 22
Copying an IOS Image to a Serverp. 24
Copying an IOS Image Through the Consolep. 25
Deleting Files from Flashp. 27
Partitioning Flashp. 29
Using the Router as a TFTP Serverp. 31
Using FTP from the Routerp. 33
Generating Large Numbers of Router Configurationsp. 34
Changing the Configurations of Many Routers at Oncep. 37
Extracting Hardware Inventory Informationp. 41
Backing Up Router Configurationsp. 43
Router Managementp. 47
Creating Command Aliasesp. 47
Managing the Router's ARP Cachep. 50
Tuning Router Buffersp. 52
Using the Cisco Discovery Protocolp. 57
Disabling the Cisco Discovery Protocolp. 60
Using the Small Serversp. 62
Enabling HTTP Access to a Routerp. 66
Using Static Hostname Tablesp. 68
Enabling Domain Name Servicesp. 70
Disabling Domain Name Lookupsp. 72
Specifying a Router Reload Timep. 75
Creating Exception Dump Filesp. 77
Generating a Report of Interface Informationp. 80
Generating a Report of Routing Table Informationp. 83
Generating a Report of ARP Table Informationp. 85
Generating a Server Host Table Filep. 87
User Access and Privilege Levelsp. 90
Setting Up User IDsp. 91
Encrypting Passwordsp. 94
Using Better Encryption Techniquesp. 96
Removing Passwords from a Router Configuration Filep. 97
Deciphering Cisco's Weak Password Encryptionp. 99
Displaying Active Usersp. 102
Sending Messages to Other Usersp. 104
Changing the Number of VTYsp. 106
Changing VTY Timeoutsp. 108
Restricting VTY Access by Protocolp. 109
Enabling Absolute Timeouts on VTY Linesp. 111
Implementing Bannersp. 112
Disabling Banners on a Portp. 115
Disabling Router Linesp. 116
Reserving a VTY Port for Administrative Accessp. 118
Restricting Inbound Telnet Accessp. 120
Logging Telnet Accessp. 121
Setting the Source Address for Telnetp. 122
Automating the Login Sequencep. 123
Using SSH for Secure Accessp. 126
Changing the Privilege Level of IOS Commandsp. 129
Defining Per-User Privilegesp. 132
Defining Per-Port Privilegesp. 135
TACACS+p. 137
Authenticating Login IDs from a Central Systemp. 139
Restricting Command Accessp. 142
Losing Access to the TACACS+ Serverp. 143
Disabling TACACS+ Authentication on a Particular Linep. 145
Capturing User Keystrokesp. 147
Logging System Eventsp. 148
Setting the IP Source Address for TACACS+ Messagesp. 150
Obtaining Free TACACS+ Server Softwarep. 151
Sample Server Configuration Filesp. 152
IP Routingp. 156
Finding an IP Routep. 159
Finding Types of IP Routesp. 160
Converting Different Mask Formatsp. 162
Using Static Routingp. 167
Floating Static Routesp. 170
Using Policy-Based Routing to Route Based on Source Addressp. 172
Using Policy-Based Routing to Route Based on Application Typep. 176
Examining Policy-Based Routingp. 179
Changing Administrative Distancesp. 180
Routing Over Multiple Paths with Equal Costsp. 183
RIPp. 186
Configuring RIP Version 1p. 187
Filtering Routes with RIPp. 190
Redistributing Static Routes into RIPp. 194
Redistributing Routes Using Route Mapsp. 197
Creating a Default Route in RIPp. 199
Disabling RIP on an Interfacep. 201
Unicast Updates for RIPp. 203
Applying Offsets to Routesp. 205
Adjusting Timersp. 207
Configuring Interpacket Delayp. 210
Enabling Triggered Updatesp. 212
Increasing the RIP Input Queuep. 214
Configuring RIP Version 2p. 215
Enabling RIP Authenticationp. 217
RIP Route Summarizationp. 220
Route Taggingp. 223
EIGRPp. 225
Configuring EIGRPp. 226
Filtering Routes with EIGRPp. 230
Redistributing Routes into EIGRPp. 234
Redistributing Routes into EIGRP Using Route Mapsp. 238
Creating a Default Route in EIGRPp. 239
Disabling EIGRP on an Interfacep. 241
EIGRP Route Summarizationp. 243
Adjusting EIGRP Metricsp. 245
Adjusting Timersp. 248
Enabling EIGRP Authenticationp. 249
Logging EIGRP Neighbor State Changesp. 251
Limiting EIGRP's Bandwidth Utilizationp. 253
EIGRP Stub Routingp. 254
Route Taggingp. 255
Viewing EIGRP Statusp. 257
OSPFp. 261
Configuring OSPFp. 266
Filtering Routes in OSPFp. 268
Adjusting OSPF Costsp. 270
Creating a Default Route in OSPFp. 272
Redistributing Static Routes into OSPFp. 275
Redistributing External Routes into OSPFp. 277
Manipulating DR Selectionp. 279
Setting the OSPF RIDp. 281
Enabling OSPF Authenticationp. 283
Selecting the Appropriate Area Typesp. 288
Summarizing Routes in OSPFp. 296
Disabling OSPF on Certain Interfacesp. 299
OSPF Route Taggingp. 300
Logging OSPF Adjacency Changesp. 302
Adjusting OSPF Timersp. 303
Viewing OSPF Status with Domain Namesp. 305
Debugging OSPFp. 306
BGPp. 307
Configuring BGPp. 315
Using eBGP Multihopp. 321
Adjusting the Next-Hop Attributep. 322
Connecting to Two ISPsp. 324
Connecting to Two ISPs with Redundant Routersp. 327
Restricting Networks Advertised to a BGP Peerp. 330
Adjusting Local Preference Valuesp. 333
Load Balancingp. 338
Removing Private ASNs from the AS Pathp. 339
Filtering BGP Routes Based on AS Pathsp. 341
Reducing the Size of the Received Routing Tablep. 345
Summarizing Outbound Routing Informationp. 347
Prepending ASNs to the AS Pathp. 351
Redistributing Routes with BGPp. 353
Using Peer Groupsp. 357
Authenticating BGP Peersp. 358
Putting It All Togetherp. 360
Frame Relayp. 364
Setting Up Frame Relay with Point-to-Point Subinterfacesp. 367
Adjusting LMI Optionsp. 371
Setting Up Frame Relay with Map Statementsp. 373
Using Multipoint Subinterfacesp. 376
Configuring Frame Relay SVCsp. 377
Simulating a Frame Relay Cloudp. 380
Compressing Frame Relay Data on a Subinterfacep. 382
Compressing Frame Relay Data with Mapsp. 385
Viewing Frame Relay Status Informationp. 386
Queueing and Congestionp. 389
Fast Switching and CEFp. 393
Setting the DSCP or TOS Fieldp. 396
Using Priority Queueingp. 400
Using Custom Queueingp. 402
Using Custom Queues with Priority Queuesp. 406
Using Weighted Fair Queueingp. 407
Using Class-Based Weighted Fair Queueingp. 409
Controlling Congestion with WREDp. 411
Using RSVPp. 415
Using Generic Traffic Shapingp. 418
Using Frame-Relay Traffic Shapingp. 419
Using Committed Access Ratep. 421
Implementing Standards-Based Per-Hop Behaviorp. 426
Viewing Queue Parametersp. 429
Tunnels and VPNsp. 432
Creating a Tunnelp. 437
Tunneling Foreign Protocols in IPp. 441
Tunneling with Dynamic Routing Protocolsp. 442
Viewing Tunnel Statusp. 446
Creating an Encrypted Router-to-Router VPNp. 447
Generating RSA Keysp. 454
Creating a Router-to-Router VPN with RSA Keysp. 458
Creating a VPN Between a Workstation and a Routerp. 461
Check IPSec Protocol Statusp. 464
Dial Backupp. 469
Automating Dial Backupp. 473
Using Dialer Interfacesp. 479
Using an Async Modem on the AUX Portp. 483
Using Backup Interfacesp. 485
Using Dialer Watchp. 488
Ensuring Proper Disconnectionp. 490
View Dial Backup Statusp. 492
Debugging Dial Backupp. 496
NTP and Timep. 498
Timestamping Router Logsp. 500
Setting the Timep. 502
Setting the Time Zonep. 504
Adjusting for Daylight Saving Timep. 505
Synchronizing the Time on All Routers (NTP)p. 507
Configuring NTP Redundancyp. 510
Setting the Router as the NTP Master for the Networkp. 513
Changing NTP Synchronization Periodsp. 514
Using NTP to Send Periodic Broadcast Time Updatesp. 515
Using NTP to Send Periodic Multicast Time Updatesp. 517
Enabling and Disabling NTP Per Interfacep. 519
NTP Authenticationp. 520
Limiting the Number of Peersp. 522
Restricting Peersp. 523
Setting the Clock Periodp. 524
Checking the NTP Statusp. 525
Debugging NTPp. 527
DLSwp. 530
Configuring DLSwp. 535
Using DLSw to Bridge Between Ethernet and Token Ringp. 542
Converting Ethernet and Token Ring MAC Addressesp. 544
Configuring SDLCp. 547
Configuring SDLC for Multidrop Connectionsp. 551
Using STUNp. 553
Using BSTUNp. 556
Controlling DLSw Packet Fragmentationp. 558
Tagging DLSw Packets for QoSp. 559
Supporting SNA Prioritiesp. 560
DLSw+ Redundancy and Fault Tolerancep. 562
Viewing DLSw Status Informationp. 563
Viewing SDLC Status Informationp. 564
Debugging DSLwp. 567
Router Interfaces and Mediap. 572
Viewing Interface Statusp. 572
Configuring Serial Interfacesp. 581
Using an Internal T1 CSU/DSUp. 585
Using an Internal ISDN PRI Modulep. 587
Using an Internal 56Kbps CSU/DSUp. 589
Configuring an Async Serial Interfacep. 591
Configuring ATM Subinterfacesp. 592
Setting Payload Scrambling on an ATM Circuitp. 595
Configuring Ethernet Interface Featuresp. 596
Configuring Token Ring Interface Featuresp. 599
Connecting VLAN Trunks With ISLp. 600
Connecting VLAN Trunks with 802.1Qp. 604
Simple Network Management Protocolp. 607
Configuring SNMPp. 611
Extracting Router Information via SNMP Toolsp. 614
Recording Important Router Information for SNMP Accessp. 617
Extracting Inventory Information from a List of Routerswith SNMPp. 619
Using Access Lists to Protect SNMP Accessp. 621
Logging Unauthorized SNMP Attemptsp. 623
Limiting MIB Accessp. 625
Using SNMP to Modify a Router's Running Configurationp. 628
Using SNMP to Copy a New IOS Imagep. 631
Using SNMP to Perform Mass Configuration Changesp. 633
Preventing Unauthorized Configuration Modificationsp. 636
Making Interface Table Numbers Permanentp. 638
Enabling SNMP Traps and Informsp. 640
Sending syslog Messages as SNMP Traps and Informsp. 643
Setting SNMP Packet Sizep. 645
Setting SNMP Queue Sizep. 646
Setting SNMP Timeout Valuesp. 648
Disabling Link Up/Down Traps per Interfacep. 649
Setting the IP Source Address for SNMP Trapsp. 649
Using RMON to Send Trapsp. 651
Enabling SNMPv3p. 656
Using SAAp. 661
Loggingp. 667
Enabling Local Router Loggingp. 669
Setting the Log Sizep. 670
Clearing the Router's Logp. 672
Sending Log Messages to Your Screenp. 673
Using a Remote Log Serverp. 674
Enabling Syslog on a Unix Serverp. 676
Changing the Default Log Facilityp. 677
Restricting What Log Messages Are Sent to the Serverp. 680
Setting the IP Source Address for Syslog Messagesp. 682
Logging Router Syslog Messages in Different Filesp. 683
Maintaining Syslog Files on the Serverp. 683
Testing the Syslog Server Configurationp. 685
Preventing the Most Common Messages from Being Loggedp. 688
Rate-Limiting Syslog Trafficp. 689
Access Listsp. 691
Filtering by Source or Destination IP Addressp. 693
Adding a Comment to an ACLp. 697
Filtering by Applicationp. 698
Filtering Based on TCP Header Flagsp. 704
Restricting TCP Session Directionp. 705
Filtering Multiport Applicationsp. 707
Filtering Based on DSCP and TOSp. 709
Logging when an Access List Is Usedp. 710
Logging TCP Sessionsp. 712
Analyzing ACL Log Entriesp. 714
Using Named and Reflexive Access Listsp. 718
Dealing with Passive Mode FTPp. 720
Using Context-Based Access Listsp. 721
DHCPp. 728
Using IP Helper Addresses for DHCPp. 729
Limiting the Impact of IP Helper Addressesp. 731
Using DHCP to Dynamically Configure Router IP Addressesp. 733
Dynamically Allocating Client IP Addresses via DHCPp. 735
Defining DHCP Configuration Optionsp. 737
Defining DHCP Lease Periodsp. 740
Allocating Static IP Addresses with DHCPp. 741
Configuring a DHCP Database Clientp. 743
Configuring Multiple DHCP Servers per Subnetp. 745
Showing DHCP Statusp. 747
Debugging DHCPp. 748
NATp. 750
Configuring Basic NAT Functionalityp. 752
Allocating External Addresses Dynamicallyp. 754
Allocating External Addresses Staticallyp. 756
Translating Some Addresses Statically and Others Dynamicallyp. 757
Translating in Both Directions Simultaneouslyp. 758
Rewriting the Network Prefixp. 761
Adjusting NAT Timersp. 762
Changing TCP Ports for FTPp. 763
Checking NAT Statusp. 764
Debugging NATp. 767
Hot Standby Router Protocolp. 768
Configuring Basic HSRP Functionalityp. 773
Using HSRP Preemptp. 777
Making HSRP React to Problems on Other Interfacesp. 779
Load Balancing with HSRPp. 782
Redirecting ICMP with HSRPp. 785
Manipulating HSRP Timersp. 786
Using HSRP on a Token Ring Networkp. 788
HSRP SNMP Supportp. 790
Increasing HSRP Securityp. 791
Showing HSRP State Informationp. 795
Debugging HSRPp. 796
IP Multicastp. 798
Configuring Basic Multicast Functionality with PIM-DMp. 806
Routing Multicast Traffic with PIMSM and BSRp. 808
Routing Multicast Traffic with PIM-SM and Auto-RPp. 812
Configuring Routing for a Low Frequency Multicast Applicationp. 815
Configuring CGMPp. 818
Static Multicast Routes and Group Membershipsp. 819
Routing Multicast Traffic with MOSPFp. 820
Routing Multicast Traffic with DVMRPp. 821
DVMRP Tunnelsp. 824
Controlling Multicast Scope with TTLp. 826
Using Administratively Scoped Addressingp. 828
Exchanging Multicast Routing Information with MBGPp. 830
Using MSDP to Discover External Sourcesp. 833
Converting Broadcasts to Multicastsp. 835
Showing Multicast Statusp. 837
Debugging Multicast Routingp. 846
External Software Packagesp. 851
IP Precedence, TOS, and DSCP Classificationsp. 855
Indexp. 869
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program