What is included with this book?
Kevin Dooley is an independent networking consultant who has been designing and implementing networks for more than ten years. In that time he has built large scale Local and Wide Area Networks for several of Canada's largest companies. He holds a PhD in physics from the University of Toronto and is the author of Designing Large-Scale LANs.
Preface | p. xv |
Router Configuration and File Management | p. 1 |
Configuring the Router via TFTP | p. 4 |
Saving Router Configuration to Server | p. 5 |
Booting the Router Using a Remote Configuration File | p. 7 |
Storing Configuration Files Larger than NVRAM | p. 10 |
Clearing the Startup Configuration | p. 12 |
Loading a New IOS Image | p. 15 |
Booting a Different IOS Image | p. 18 |
Booting Over the Network | p. 22 |
Copying an IOS Image to a Server | p. 24 |
Copying an IOS Image Through the Console | p. 25 |
Deleting Files from Flash | p. 27 |
Partitioning Flash | p. 29 |
Using the Router as a TFTP Server | p. 31 |
Using FTP from the Router | p. 33 |
Generating Large Numbers of Router Configurations | p. 34 |
Changing the Configurations of Many Routers at Once | p. 37 |
Extracting Hardware Inventory Information | p. 41 |
Backing Up Router Configurations | p. 43 |
Router Management | p. 47 |
Creating Command Aliases | p. 47 |
Managing the Router's ARP Cache | p. 50 |
Tuning Router Buffers | p. 52 |
Using the Cisco Discovery Protocol | p. 57 |
Disabling the Cisco Discovery Protocol | p. 60 |
Using the Small Servers | p. 62 |
Enabling HTTP Access to a Router | p. 66 |
Using Static Hostname Tables | p. 68 |
Enabling Domain Name Services | p. 70 |
Disabling Domain Name Lookups | p. 72 |
Specifying a Router Reload Time | p. 75 |
Creating Exception Dump Files | p. 77 |
Generating a Report of Interface Information | p. 80 |
Generating a Report of Routing Table Information | p. 83 |
Generating a Report of ARP Table Information | p. 85 |
Generating a Server Host Table File | p. 87 |
User Access and Privilege Levels | p. 90 |
Setting Up User IDs | p. 91 |
Encrypting Passwords | p. 94 |
Using Better Encryption Techniques | p. 96 |
Removing Passwords from a Router Configuration File | p. 97 |
Deciphering Cisco's Weak Password Encryption | p. 99 |
Displaying Active Users | p. 102 |
Sending Messages to Other Users | p. 104 |
Changing the Number of VTYs | p. 106 |
Changing VTY Timeouts | p. 108 |
Restricting VTY Access by Protocol | p. 109 |
Enabling Absolute Timeouts on VTY Lines | p. 111 |
Implementing Banners | p. 112 |
Disabling Banners on a Port | p. 115 |
Disabling Router Lines | p. 116 |
Reserving a VTY Port for Administrative Access | p. 118 |
Restricting Inbound Telnet Access | p. 120 |
Logging Telnet Access | p. 121 |
Setting the Source Address for Telnet | p. 122 |
Automating the Login Sequence | p. 123 |
Using SSH for Secure Access | p. 126 |
Changing the Privilege Level of IOS Commands | p. 129 |
Defining Per-User Privileges | p. 132 |
Defining Per-Port Privileges | p. 135 |
TACACS+ | p. 137 |
Authenticating Login IDs from a Central System | p. 139 |
Restricting Command Access | p. 142 |
Losing Access to the TACACS+ Server | p. 143 |
Disabling TACACS+ Authentication on a Particular Line | p. 145 |
Capturing User Keystrokes | p. 147 |
Logging System Events | p. 148 |
Setting the IP Source Address for TACACS+ Messages | p. 150 |
Obtaining Free TACACS+ Server Software | p. 151 |
Sample Server Configuration Files | p. 152 |
IP Routing | p. 156 |
Finding an IP Route | p. 159 |
Finding Types of IP Routes | p. 160 |
Converting Different Mask Formats | p. 162 |
Using Static Routing | p. 167 |
Floating Static Routes | p. 170 |
Using Policy-Based Routing to Route Based on Source Address | p. 172 |
Using Policy-Based Routing to Route Based on Application Type | p. 176 |
Examining Policy-Based Routing | p. 179 |
Changing Administrative Distances | p. 180 |
Routing Over Multiple Paths with Equal Costs | p. 183 |
RIP | p. 186 |
Configuring RIP Version 1 | p. 187 |
Filtering Routes with RIP | p. 190 |
Redistributing Static Routes into RIP | p. 194 |
Redistributing Routes Using Route Maps | p. 197 |
Creating a Default Route in RIP | p. 199 |
Disabling RIP on an Interface | p. 201 |
Unicast Updates for RIP | p. 203 |
Applying Offsets to Routes | p. 205 |
Adjusting Timers | p. 207 |
Configuring Interpacket Delay | p. 210 |
Enabling Triggered Updates | p. 212 |
Increasing the RIP Input Queue | p. 214 |
Configuring RIP Version 2 | p. 215 |
Enabling RIP Authentication | p. 217 |
RIP Route Summarization | p. 220 |
Route Tagging | p. 223 |
EIGRP | p. 225 |
Configuring EIGRP | p. 226 |
Filtering Routes with EIGRP | p. 230 |
Redistributing Routes into EIGRP | p. 234 |
Redistributing Routes into EIGRP Using Route Maps | p. 238 |
Creating a Default Route in EIGRP | p. 239 |
Disabling EIGRP on an Interface | p. 241 |
EIGRP Route Summarization | p. 243 |
Adjusting EIGRP Metrics | p. 245 |
Adjusting Timers | p. 248 |
Enabling EIGRP Authentication | p. 249 |
Logging EIGRP Neighbor State Changes | p. 251 |
Limiting EIGRP's Bandwidth Utilization | p. 253 |
EIGRP Stub Routing | p. 254 |
Route Tagging | p. 255 |
Viewing EIGRP Status | p. 257 |
OSPF | p. 261 |
Configuring OSPF | p. 266 |
Filtering Routes in OSPF | p. 268 |
Adjusting OSPF Costs | p. 270 |
Creating a Default Route in OSPF | p. 272 |
Redistributing Static Routes into OSPF | p. 275 |
Redistributing External Routes into OSPF | p. 277 |
Manipulating DR Selection | p. 279 |
Setting the OSPF RID | p. 281 |
Enabling OSPF Authentication | p. 283 |
Selecting the Appropriate Area Types | p. 288 |
Summarizing Routes in OSPF | p. 296 |
Disabling OSPF on Certain Interfaces | p. 299 |
OSPF Route Tagging | p. 300 |
Logging OSPF Adjacency Changes | p. 302 |
Adjusting OSPF Timers | p. 303 |
Viewing OSPF Status with Domain Names | p. 305 |
Debugging OSPF | p. 306 |
BGP | p. 307 |
Configuring BGP | p. 315 |
Using eBGP Multihop | p. 321 |
Adjusting the Next-Hop Attribute | p. 322 |
Connecting to Two ISPs | p. 324 |
Connecting to Two ISPs with Redundant Routers | p. 327 |
Restricting Networks Advertised to a BGP Peer | p. 330 |
Adjusting Local Preference Values | p. 333 |
Load Balancing | p. 338 |
Removing Private ASNs from the AS Path | p. 339 |
Filtering BGP Routes Based on AS Paths | p. 341 |
Reducing the Size of the Received Routing Table | p. 345 |
Summarizing Outbound Routing Information | p. 347 |
Prepending ASNs to the AS Path | p. 351 |
Redistributing Routes with BGP | p. 353 |
Using Peer Groups | p. 357 |
Authenticating BGP Peers | p. 358 |
Putting It All Together | p. 360 |
Frame Relay | p. 364 |
Setting Up Frame Relay with Point-to-Point Subinterfaces | p. 367 |
Adjusting LMI Options | p. 371 |
Setting Up Frame Relay with Map Statements | p. 373 |
Using Multipoint Subinterfaces | p. 376 |
Configuring Frame Relay SVCs | p. 377 |
Simulating a Frame Relay Cloud | p. 380 |
Compressing Frame Relay Data on a Subinterface | p. 382 |
Compressing Frame Relay Data with Maps | p. 385 |
Viewing Frame Relay Status Information | p. 386 |
Queueing and Congestion | p. 389 |
Fast Switching and CEF | p. 393 |
Setting the DSCP or TOS Field | p. 396 |
Using Priority Queueing | p. 400 |
Using Custom Queueing | p. 402 |
Using Custom Queues with Priority Queues | p. 406 |
Using Weighted Fair Queueing | p. 407 |
Using Class-Based Weighted Fair Queueing | p. 409 |
Controlling Congestion with WRED | p. 411 |
Using RSVP | p. 415 |
Using Generic Traffic Shaping | p. 418 |
Using Frame-Relay Traffic Shaping | p. 419 |
Using Committed Access Rate | p. 421 |
Implementing Standards-Based Per-Hop Behavior | p. 426 |
Viewing Queue Parameters | p. 429 |
Tunnels and VPNs | p. 432 |
Creating a Tunnel | p. 437 |
Tunneling Foreign Protocols in IP | p. 441 |
Tunneling with Dynamic Routing Protocols | p. 442 |
Viewing Tunnel Status | p. 446 |
Creating an Encrypted Router-to-Router VPN | p. 447 |
Generating RSA Keys | p. 454 |
Creating a Router-to-Router VPN with RSA Keys | p. 458 |
Creating a VPN Between a Workstation and a Router | p. 461 |
Check IPSec Protocol Status | p. 464 |
Dial Backup | p. 469 |
Automating Dial Backup | p. 473 |
Using Dialer Interfaces | p. 479 |
Using an Async Modem on the AUX Port | p. 483 |
Using Backup Interfaces | p. 485 |
Using Dialer Watch | p. 488 |
Ensuring Proper Disconnection | p. 490 |
View Dial Backup Status | p. 492 |
Debugging Dial Backup | p. 496 |
NTP and Time | p. 498 |
Timestamping Router Logs | p. 500 |
Setting the Time | p. 502 |
Setting the Time Zone | p. 504 |
Adjusting for Daylight Saving Time | p. 505 |
Synchronizing the Time on All Routers (NTP) | p. 507 |
Configuring NTP Redundancy | p. 510 |
Setting the Router as the NTP Master for the Network | p. 513 |
Changing NTP Synchronization Periods | p. 514 |
Using NTP to Send Periodic Broadcast Time Updates | p. 515 |
Using NTP to Send Periodic Multicast Time Updates | p. 517 |
Enabling and Disabling NTP Per Interface | p. 519 |
NTP Authentication | p. 520 |
Limiting the Number of Peers | p. 522 |
Restricting Peers | p. 523 |
Setting the Clock Period | p. 524 |
Checking the NTP Status | p. 525 |
Debugging NTP | p. 527 |
DLSw | p. 530 |
Configuring DLSw | p. 535 |
Using DLSw to Bridge Between Ethernet and Token Ring | p. 542 |
Converting Ethernet and Token Ring MAC Addresses | p. 544 |
Configuring SDLC | p. 547 |
Configuring SDLC for Multidrop Connections | p. 551 |
Using STUN | p. 553 |
Using BSTUN | p. 556 |
Controlling DLSw Packet Fragmentation | p. 558 |
Tagging DLSw Packets for QoS | p. 559 |
Supporting SNA Priorities | p. 560 |
DLSw+ Redundancy and Fault Tolerance | p. 562 |
Viewing DLSw Status Information | p. 563 |
Viewing SDLC Status Information | p. 564 |
Debugging DSLw | p. 567 |
Router Interfaces and Media | p. 572 |
Viewing Interface Status | p. 572 |
Configuring Serial Interfaces | p. 581 |
Using an Internal T1 CSU/DSU | p. 585 |
Using an Internal ISDN PRI Module | p. 587 |
Using an Internal 56Kbps CSU/DSU | p. 589 |
Configuring an Async Serial Interface | p. 591 |
Configuring ATM Subinterfaces | p. 592 |
Setting Payload Scrambling on an ATM Circuit | p. 595 |
Configuring Ethernet Interface Features | p. 596 |
Configuring Token Ring Interface Features | p. 599 |
Connecting VLAN Trunks With ISL | p. 600 |
Connecting VLAN Trunks with 802.1Q | p. 604 |
Simple Network Management Protocol | p. 607 |
Configuring SNMP | p. 611 |
Extracting Router Information via SNMP Tools | p. 614 |
Recording Important Router Information for SNMP Access | p. 617 |
Extracting Inventory Information from a List of Routerswith SNMP | p. 619 |
Using Access Lists to Protect SNMP Access | p. 621 |
Logging Unauthorized SNMP Attempts | p. 623 |
Limiting MIB Access | p. 625 |
Using SNMP to Modify a Router's Running Configuration | p. 628 |
Using SNMP to Copy a New IOS Image | p. 631 |
Using SNMP to Perform Mass Configuration Changes | p. 633 |
Preventing Unauthorized Configuration Modifications | p. 636 |
Making Interface Table Numbers Permanent | p. 638 |
Enabling SNMP Traps and Informs | p. 640 |
Sending syslog Messages as SNMP Traps and Informs | p. 643 |
Setting SNMP Packet Size | p. 645 |
Setting SNMP Queue Size | p. 646 |
Setting SNMP Timeout Values | p. 648 |
Disabling Link Up/Down Traps per Interface | p. 649 |
Setting the IP Source Address for SNMP Traps | p. 649 |
Using RMON to Send Traps | p. 651 |
Enabling SNMPv3 | p. 656 |
Using SAA | p. 661 |
Logging | p. 667 |
Enabling Local Router Logging | p. 669 |
Setting the Log Size | p. 670 |
Clearing the Router's Log | p. 672 |
Sending Log Messages to Your Screen | p. 673 |
Using a Remote Log Server | p. 674 |
Enabling Syslog on a Unix Server | p. 676 |
Changing the Default Log Facility | p. 677 |
Restricting What Log Messages Are Sent to the Server | p. 680 |
Setting the IP Source Address for Syslog Messages | p. 682 |
Logging Router Syslog Messages in Different Files | p. 683 |
Maintaining Syslog Files on the Server | p. 683 |
Testing the Syslog Server Configuration | p. 685 |
Preventing the Most Common Messages from Being Logged | p. 688 |
Rate-Limiting Syslog Traffic | p. 689 |
Access Lists | p. 691 |
Filtering by Source or Destination IP Address | p. 693 |
Adding a Comment to an ACL | p. 697 |
Filtering by Application | p. 698 |
Filtering Based on TCP Header Flags | p. 704 |
Restricting TCP Session Direction | p. 705 |
Filtering Multiport Applications | p. 707 |
Filtering Based on DSCP and TOS | p. 709 |
Logging when an Access List Is Used | p. 710 |
Logging TCP Sessions | p. 712 |
Analyzing ACL Log Entries | p. 714 |
Using Named and Reflexive Access Lists | p. 718 |
Dealing with Passive Mode FTP | p. 720 |
Using Context-Based Access Lists | p. 721 |
DHCP | p. 728 |
Using IP Helper Addresses for DHCP | p. 729 |
Limiting the Impact of IP Helper Addresses | p. 731 |
Using DHCP to Dynamically Configure Router IP Addresses | p. 733 |
Dynamically Allocating Client IP Addresses via DHCP | p. 735 |
Defining DHCP Configuration Options | p. 737 |
Defining DHCP Lease Periods | p. 740 |
Allocating Static IP Addresses with DHCP | p. 741 |
Configuring a DHCP Database Client | p. 743 |
Configuring Multiple DHCP Servers per Subnet | p. 745 |
Showing DHCP Status | p. 747 |
Debugging DHCP | p. 748 |
NAT | p. 750 |
Configuring Basic NAT Functionality | p. 752 |
Allocating External Addresses Dynamically | p. 754 |
Allocating External Addresses Statically | p. 756 |
Translating Some Addresses Statically and Others Dynamically | p. 757 |
Translating in Both Directions Simultaneously | p. 758 |
Rewriting the Network Prefix | p. 761 |
Adjusting NAT Timers | p. 762 |
Changing TCP Ports for FTP | p. 763 |
Checking NAT Status | p. 764 |
Debugging NAT | p. 767 |
Hot Standby Router Protocol | p. 768 |
Configuring Basic HSRP Functionality | p. 773 |
Using HSRP Preempt | p. 777 |
Making HSRP React to Problems on Other Interfaces | p. 779 |
Load Balancing with HSRP | p. 782 |
Redirecting ICMP with HSRP | p. 785 |
Manipulating HSRP Timers | p. 786 |
Using HSRP on a Token Ring Network | p. 788 |
HSRP SNMP Support | p. 790 |
Increasing HSRP Security | p. 791 |
Showing HSRP State Information | p. 795 |
Debugging HSRP | p. 796 |
IP Multicast | p. 798 |
Configuring Basic Multicast Functionality with PIM-DM | p. 806 |
Routing Multicast Traffic with PIMSM and BSR | p. 808 |
Routing Multicast Traffic with PIM-SM and Auto-RP | p. 812 |
Configuring Routing for a Low Frequency Multicast Application | p. 815 |
Configuring CGMP | p. 818 |
Static Multicast Routes and Group Memberships | p. 819 |
Routing Multicast Traffic with MOSPF | p. 820 |
Routing Multicast Traffic with DVMRP | p. 821 |
DVMRP Tunnels | p. 824 |
Controlling Multicast Scope with TTL | p. 826 |
Using Administratively Scoped Addressing | p. 828 |
Exchanging Multicast Routing Information with MBGP | p. 830 |
Using MSDP to Discover External Sources | p. 833 |
Converting Broadcasts to Multicasts | p. 835 |
Showing Multicast Status | p. 837 |
Debugging Multicast Routing | p. 846 |
External Software Packages | p. 851 |
IP Precedence, TOS, and DSCP Classifications | p. 855 |
Index | p. 869 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.