思维导图备注

Network Warrior - Gary A. Donahue
首页 收藏书籍 阅读记录
  • 书签 我的书签
  • 添加书签 添加书签 移除书签 移除书签

Preface

浏览 13 扫码
  • 小字体
  • 中字体
  • 大字体
2022-02-24 01:43:40
请 登录 再阅读
上一篇:
下一篇:
  • 书签
  • 添加书签 移除书签
  • Preface
    • Who Should Read This Book
    • Conventions Used in This Book
    • Using Code Examples
    • We'd Like to Hear from You
    • Safari® Enabled
    • Acknowledgments
  • I. Hubs, Switches, and Switching
    • 1. What Is a Network?
    • 2. Hubs and Switches
      • 2.1. Hubs
      • 2.2. Switches
        • 2.2.1. Switch Types
        • 2.2.2. Planning a Chassis-Based Switch Installation
    • 3. Auto-Negotiation
      • 3.1. What Is Auto-Negotiation?
      • 3.2. How Auto-Negotiation Works
      • 3.3. When Auto-Negotiation Fails
      • 3.4. Auto-Negotiation Best Practices
      • 3.5. Configuring Auto-Negotiation
    • 4. VLANs
      • 4.1. Connecting VLANs
      • 4.2. Configuring VLANs
        • 4.2.1. CatOS
        • 4.2.2. IOS Using VLAN Database
        • 4.2.3. IOS Using Global Commands
    • 5. Trunking
      • 5.1. How Trunks Work
        • 5.1.1. ISL
        • 5.1.2. 802.1Q
        • 5.1.3. Which Protocol to Use
        • 5.1.4. Trunk Negotiation
      • 5.2. Configuring Trunks
        • 5.2.1. IOS
        • 5.2.2. CatOS
    • 6. VLAN Trunking Protocol
      • 6.1. VTP Pruning
      • 6.2. Dangers of VTP
      • 6.3. Configuring VTP
        • 6.3.1. VTP Domains
        • 6.3.2. VTP Mode
        • 6.3.3. VTP Password
        • 6.3.4. VTP Pruning
    • 7. EtherChannel
      • 7.1. Load Balancing
      • 7.2. Configuring and Managing EtherChannel
        • 7.2.1. EtherChannel Protocols
        • 7.2.2. CatOS Example
        • 7.2.3. IOS Example
    • 8. Spanning Tree
      • 8.1. Broadcast Storms
      • 8.2. MAC Address Table Instability
      • 8.3. Preventing Loops with Spanning Tree
        • 8.3.1. How Spanning Tree Works
      • 8.4. Managing Spanning Tree
      • 8.5. Additional Spanning Tree Features
        • 8.5.1. PortFast
        • 8.5.2. BPDU Guard
        • 8.5.3. UplinkFast
        • 8.5.4. BackboneFast
      • 8.6. Common Spanning Tree Problems
        • 8.6.1. Duplex Mismatch
        • 8.6.2. Unidirectional Links
      • 8.7. Designing to Prevent Spanning Tree Problems
        • 8.7.1. Use Routing Instead of Switching for Redundancy
        • 8.7.2. Always Configure the Root Bridge
  • II. Routers and Routing
    • 9. Routing and Routers
      • 9.1. Routing Tables
      • 9.2. Route Types
      • 9.3. The IP Routing Table
        • 9.3.1. Host Route
        • 9.3.2. Subnet
        • 9.3.3. Summary (Group of Subnets)
        • 9.3.4. Major Network
        • 9.3.5. Supernet (Group of Major Networks)
        • 9.3.6. Default Route
    • 10. Routing Protocols
      • 10.1. Communication Between Routers
      • 10.2. Metrics and Protocol Types
      • 10.3. Administrative Distance
      • 10.4. Specific Routing Protocols
        • 10.4.1. RIP
        • 10.4.2. RIPv2
        • 10.4.3. EIGRP
        • 10.4.4. OSPF
        • 10.4.5. BGP
    • 11. Redistribution
      • 11.1. Redistributing into RIP
      • 11.2. Redistributing into EIGRP
      • 11.3. Redistributing into OSPF
      • 11.4. Mutual Redistribution
      • 11.5. Redistribution Loops
      • 11.6. Limiting Redistribution
        • 11.6.1. Route Tags
        • 11.6.2. A Real-World Example
    • 12. Tunnels
      • 12.1. GRE Tunnels
      • 12.2. GRE Tunnels and Routing Protocols
      • 12.3. GRE and Access Lists
    • 13. Resilient Ethernet
      • 13.1. HSRP
      • 13.2. HSRP Interface Tracking
      • 13.3. When HSRP Isn't Enough
    • 14. Route Maps
      • 14.1. Building a Route Map
      • 14.2. Policy-Routing Example
        • 14.2.1. Monitoring Policy Routing
    • 15. Switching Algorithms in Cisco Routers
      • 15.1. Process Switching
      • 15.2. Interrupt Context Switching
        • 15.2.1. Fast Switching
        • 15.2.2. Optimum Switching
        • 15.2.3. Cisco Express Forwarding
      • 15.3. Configuring and Managing Switching Paths
        • 15.3.1. Process Switching
        • 15.3.2. Fast Switching
        • 15.3.3. Cisco Express Forwarding
  • III. Multilayer Switches
    • 16. Multilayer Switches
      • 16.1. Configuring SVIs
        • 16.1.1. Native Mode (4500, 6500, 3550, 3750)
        • 16.1.2. Hybrid Mode (4500, 6500)
      • 16.2. Multilayer Switch Models
    • 17. Cisco 6500 Multilayer Switches
      • 17.1. Architecture
        • 17.1.1. Buses
        • 17.1.2. Enhanced Chassis
        • 17.1.3. Supervisors
        • 17.1.4. Modules
      • 17.2. CatOS Versus IOS
    • 18. Catalyst 3750 Features
      • 18.1. Stacking
      • 18.2. Interface Ranges
      • 18.3. Macros
      • 18.4. Flex Links
      • 18.5. Storm Control
      • 18.6. Port Security
      • 18.7. SPAN
      • 18.8. Voice VLAN
      • 18.9. QoS
  • IV. Telecom
    • 19. Telecom Nomenclature
      • 19.1. Introduction and History
      • 19.2. Telecom Glossary
    • 20. T1
      • 20.1. Understanding T1 Duplex
      • 20.2. Types of T1
      • 20.3. Encoding
        • 20.3.1. AMI
        • 20.3.2. B8ZS
      • 20.4. Framing
        • 20.4.1. D4/Superframe
        • 20.4.2. Extended Superframe (ESF)
      • 20.5. Performance Monitoring
        • 20.5.1. Loss of Signal (LOS)
        • 20.5.2. Out of Frame (OOF)
        • 20.5.3. Bipolar Violation (BPV)
        • 20.5.4. CRC6
        • 20.5.5. Errored Seconds (ES)
        • 20.5.6. Extreme Errored Seconds (EES)
      • 20.6. Alarms
        • 20.6.1. Red Alarm
        • 20.6.2. Yellow Alarm (RAI)
        • 20.6.3. Blue Alarm (AIS)
      • 20.7. Troubleshooting T1s
        • 20.7.1. Loopback Tests
        • 20.7.2. Integrated CSU/DSUs
      • 20.8. Configuring T1s
        • 20.8.1. CSU/DSU Configuration
        • 20.8.2. CSU/DSU Troubleshooting
    • 21. DS3
      • 21.1. Framing
        • 21.1.1. M13
        • 21.1.2. C-Bits
        • 21.1.3. Clear-Channel DS3 Framing
      • 21.2. Line Coding
      • 21.3. Configuring DS3s
        • 21.3.1. Clear-Channel DS3
        • 21.3.2. Channelized DS3
    • 22. Frame Relay
      • 22.1. Ordering Frame-Relay Service
      • 22.2. Frame-Relay Network Design
      • 22.3. Oversubscription
      • 22.4. Local Management Interface (LMI)
        • 22.4.1. Congestion Avoidance in Frame Relay
      • 22.5. Configuring Frame Relay
        • 22.5.1. Basic Frame Relay with Two Nodes
        • 22.5.2. Basic Frame Relay with More Than Two Nodes
        • 22.5.3. Frame-Relay Subinterfaces
      • 22.6. Troubleshooting Frame Relay
  • V. Security and Firewalls
    • 23. Access Lists
      • 23.1. Designing Access Lists
        • 23.1.1. Wildcard Masks
        • 23.1.2. Where to Apply Access Lists
        • 23.1.3. Naming Access Lists
        • 23.1.4. Top-Down Processing
        • 23.1.5. Most-Used on Top
        • 23.1.6. Using Groups in PIX ACLs
        • 23.1.7. Turbo ACLs
        • 23.1.8. Allowing Outbound Traceroute and Ping
        • 23.1.9. Allowing MTU Path Discovery Packets
      • 23.2. ACLs in Multilayer Switches
        • 23.2.1. Configuring Port ACLs
        • 23.2.2. Configuring Router ACLs
        • 23.2.3. Configuring VLAN Maps
      • 23.3. Reflexive Access Lists
        • 23.3.1. Configuring Reflexive Access Lists
    • 24. Authentication in Cisco Devices
      • 24.1. Basic (Non-AAA) Authentication
        • 24.1.1. Line Passwords
        • 24.1.2. Configuring Local Users
        • 24.1.3. PPP Authentication
      • 24.2. AAA Authentication
        • 24.2.1. Enabling AAA
        • 24.2.2. Configuring Security Server Information
        • 24.2.3. Creating Method Lists
        • 24.2.4. Applying Method Lists
    • 25. Firewall Theory
      • 25.1. Best Practices
      • 25.2. The DMZ
        • 25.2.1. Another DMZ Example
        • 25.2.2. Multiple DMZ Example
      • 25.3. Alternate Designs
    • 26. PIX Firewall Configuration
      • 26.1. Interfaces and Priorities
      • 26.2. Names
      • 26.3. Object Groups
      • 26.4. Fixups
      • 26.5. Failover
        • 26.5.1. Failover Terminology
        • 26.5.2. Understanding Failover
        • 26.5.3. Configuring Failover
        • 26.5.4. Monitoring Failover
      • 26.6. NAT
        • 26.6.1. NAT Commands
        • 26.6.2. NAT Examples
      • 26.7. Miscellaneous
        • 26.7.1. Remote Access
        • 26.7.2. Saving Configuration Changes
        • 26.7.3. Logging
      • 26.8. Troubleshooting
  • VI. Server Load Balancing
    • 27. Server Load-Balancing Technology
      • 27.1. Types of Load Balancing
      • 27.2. How Server Load Balancing Works
        • 27.2.1. Balancing Algorithms
      • 27.3. Configuring Server Load Balancing
        • 27.3.1. IOS SLB
        • 27.3.2. Content Switch Modules
    • 28. Content Switch Modules in Action
      • 28.1. Common Tasks
      • 28.2. Upgrading the CSM
  • VII. Quality of Service
    • 29. Introduction to QoS
      • 29.1. Types of QoS
      • 29.2. QoS Mechanics
        • 29.2.1. Priorities
        • 29.2.2. Flavors of QoS
      • 29.3. Common QoS Misconceptions
    • 30. Designing a QoS Scheme
      • 30.1. Determining Requirements
        • 30.1.1. Protocols
        • 30.1.2. Priorities
        • 30.1.3. Determine Bandwidth Requirements
      • 30.2. Configuring the Routers
        • 30.2.1. Class Maps
        • 30.2.2. Policy Maps
        • 30.2.3. Service Policies
    • 31. The Congested Network
      • 31.1. Determining Whether the Network Is Congested
      • 31.2. Resolving the Problem
    • 32. The Converged Network
      • 32.1. Configuration
      • 32.2. Monitoring QoS
      • 32.3. Troubleshooting a Converged Network
        • 32.3.1. Incorrect Queue Configuration
        • 32.3.2. Priority Queue Too Small
        • 32.3.3. Priority Queue Too Large
        • 32.3.4. Nonpriority Queue Too Small
        • 32.3.5. Nonpriority Queue Too Large
        • 32.3.6. Default Queue Too Small
        • 32.3.7. Default Queue Too Large
  • VIII. Designing Networks
    • 33. Designing Networks
      • 33.1. Documentation
        • 33.1.1. Requirements Documents
        • 33.1.2. Port Layout Spreadsheets
        • 33.1.3. IP and VLAN Spreadsheets
        • 33.1.4. Bay Face Layouts
        • 33.1.5. Power and Cooling Requirements
        • 33.1.6. Tips for Network Diagrams
      • 33.2. Naming Conventions for Devices
      • 33.3. Network Designs
        • 33.3.1. Corporate Networks
        • 33.3.2. E-Commerce Web Sites
        • 33.3.3. Small Networks
    • 34. IP Design
      • 34.1. Public Versus Private IP Space
      • 34.2. VLSM
      • 34.3. CIDR
      • 34.4. Allocating IP Network Space
      • 34.5. Allocating IP Subnets
        • 34.5.1. Sequential
        • 34.5.2. Divide by Half
        • 34.5.3. Reverse Binary
      • 34.6. IP Subnetting Made Easy
    • 35. Network Time Protocol
      • 35.1. What Is Accurate Time?
      • 35.2. NTP Design
      • 35.3. Configuring NTP
        • 35.3.1. NTP Client
        • 35.3.2. NTP Server
    • 36. Failures
      • 36.1. Human Error
      • 36.2. Multiple Component Failure
      • 36.3. Disaster Chains
      • 36.4. No Failover Testing
      • 36.5. Troubleshooting
        • 36.5.1. Remain Calm
        • 36.5.2. Log Your Actions
        • 36.5.3. Find Out What Changed
        • 36.5.4. Check the Physical Layer First!
        • 36.5.5. Assume Nothing; Prove Everything
        • 36.5.6. Isolate the Problem
        • 36.5.7. Don't Look for Zebras
        • 36.5.8. Do a Physical Audit
        • 36.5.9. Escalate
        • 36.5.10. Troubleshooting in a Team Environment
        • 36.5.11. The Janitor Principle
    • 37. GAD's Maxims
      • 37.1. Maxim #1
      • 37.2. Maxim #2
      • 37.3. Maxim #3
    • 38. Avoiding Frustration
      • 38.1. Why Everything Is Messed Up
      • 38.2. How to Sell Your Ideas to Management
      • 38.3. When to Upgrade and Why
        • 38.3.1. The Dangers of Upgrading
        • 38.3.2. Valid Reasons to Upgrade
      • 38.4. Why Change Control Is Your Friend
      • 38.5. How Not to Be a Computer Jerk
  • Index
暂无相关搜索结果!
    展开/收起文章目录

    二维码

    手机扫一扫,轻松掌上学

    《Network Warrior - Gary A. Donahue》电子书下载

    请下载您需要的格式的电子书,随时随地,享受学习的乐趣!
    EPUB 电子书

    书签列表

      阅读记录

      阅读进度: 0.00% ( 0/0 ) 重置阅读进度