CISCO路由器配置导论:英文版

CISCO路由器配置导论:英文版
作 者: Laura Chappell
出版社: 清华大学出版社
丛编项: CISCO系列丛书 影印版
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: Cisco
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《CISCO路由器配置导论:英文版》作者简介

内容简介

内容简介本书包含有关路由模型,进程和设计的翔实的技术细节,可以作为设计,实现或支持基于TCP、IP、IPX、SPX,APPLETALK,SNA,DECNET和BANYANVINES协议的网络互连的参考手册。本书主要包括三部分:I.介绍网络互连的相关概念和理论,主要介绍物理层,数据链路层,网络层的协议以及基本路由器的配置;II详细介绍TCP、IP协议,也包括NOVELIPX,APPLETALK协议的配置方法等;III.介绍WAN的通信,包括WAN的连接,X25和帧中继的配置等。本书特别适合于参加CCNA考试的读者。Cisco公司把本书作为CCNA的正式课本。对于其他读者,本书可以使他们增加对影响网络通信和安全的基础理论的理解。

图书目录

Contents

PART 1 INTRODUCTION TO INTERNETWORKING

Chapter 1 The Internetworking Model

The Evolution of Networks

1960s and 1970s: Centralized Processing

1970s and 1980s: Networks

1980s and 1990s: Internetworks

1990s: Global Internetworking

Network Types and Devices

Local-Area Networks (LANs)

Wide-Area Networks (WANs)

Enterprise Networks

Network Design Goals

The Layered Model

Why Use a Layered Model?

Application Layer

Presentation Layer

Session Layer

Transport Layer

Network Layer

Data Link Layer

Physical Layer

Peer-to-Peer Communications

Data Encapsulation and Headers

Step 1: Buildthe Data

Step 2: Package Data for End-to-End Transport

Step 3: Append Network Address in Header

Step 4: Append Local Address

in Data-Link Header

Step 5: Convert to Bits for Transmission

Summary

Chapter One Test: The Internetworking Model

Applications and Upper Layers

Application Layer

Presentation Layer

Text and Data Formatting and Conversion

Graphics Formatting and Conversion

Audio and Video Formatting and Conversion

Session Layer

Transport Layer

Multiplexing

Connection-Oriented Sessions

Flow Control and Congestion Avoidance

Flow Control with Windowing

Positive Acknowledgment

Summary

Chapter 2 Test: Applications and Upper Layers

Physical and Data Link Layers

Basic Data-Link and Physical Layer Functions

LAN Standards and Standards Organizations

LAN Data Link Sublayers

LLC Sublayer Functions

MAC Sublayer Functions

Physical and Logical Addressing

MAC Addresses

Finding the MAC Address

Common LAN Technologies

Ethernet and IEEE 802.3

The Ethernet/802.3 Physical Layer

The Ethernet/802.3 Interface

Ethernet/802.3 Operation

Ethernet/802.3 Broadcasts and Multicasts

Ethernet Frame Types

Ethernet/802.3 Reliability

High-Speed Ethernet Options

Token Ring and IEEE 802.5

Physical Layer: Token Ring/802.5

The Token Ring/802.5 Interface

Token Ring/802.5 Operation

Token Rmg/802.5 Media Control

Token Ring/802.5 Active Monitor

Token Ring/802.5 Reliability

FDDI

Physical Layer: FDDI

The FDDI Interface

FDDI Dual-Ring Reliability

Common WAN Technologies

Physical Layer: WAN

Data Link Layer: WAN Protocols

Synchronous Data Link Control (SDLC)

High-Level Data Link Control (HDLC)

Link Access Procedure, Balanced (LAPB)

Frame Relay

Point-to-Point Protocol (PPP)

Integrated Services Digital Network (ISDN)

Summary

Chapter 3 Test: Physical and Data Link Layers

Chapter 4 Network Layer and Path Determination

Network Layer Basics

Path Determination

Communicating Path Information

Addressing: Network and Host

Protocol Addressing Variations

TCP/IP Network Addressing

Other Protocol Addressing

Routing Uses Network Addresses

Routed Versus Routing Protocol

Routed Protocol

Routing Protocol

Network-Layer Protocol Operations

Multiprotocol Routing

Static Versus Dynamic Routes

Static Route Example

Default Route

Adapting to Topology Change

Dynamic Routing Operations

Representing Distance with Metrics

Routing Protocols

Distance Vector Routing

Distance Vector Network Discovery

Distance Vector Topology Changes

Problem: Routing Loops

Symptom: Counting to Infinity

Solution: Defining a Maximum

Solution: Split Horizon

Solution: Poison Reverse

Solution: Hold-Down Timers

Solution: Triggered Updates

Implementing Solutions in Multiple Routes

Link-State Routing

Link-State Network Discovery

Link-State Topology Changes

Link-State Concerns

Problem: Link-State Updates

Solution: Link-State Mechanisms

Comparing Distance Vector Routing to Link-State

Routing

Hybrid Routing

Basic Routing Processes

LAN-to-LAN Routing

LAN-to-WAN Routing

Summary

Chapter four Test: Network Layer

and Path Determination

Chapter 5 Basic Router Operations

Starting Up a Router

External Configuration Sources

Internal Configuration Components

RAM/DRAM

NVRAM

Flash Memory

ROM

Interfaces

Auxiliary Ports

System Startup Overview

Accessing the User Interface

Router Modes

User EXEC Mode

Privileged EXEC Mode

ROM Monitoi- Mode

Setup Mode

RXBoot Mode

Global Configuration Mode

Other Configuration Modes

Logging In to the Router

Using Passwords

Individual Line Passwords

Privileged EXEC Mode Password

Encrypted Passwords

Using a Password

User Mode Command List

Privileged Mode Command List

Context-Sensitive Help

Using Enhanced Editing Commands

Reviewing Command History

Examining Router Status

show version Command

show startup-config Command

and show running-config Command

show interfaces Command

show protocols Command

Summary

Chapter Five Test: Basic Router Operations

Chapter 6 Configuring a Router

Loading Configuration Files

Loading Configuration Files-

Releases Before 10.3

Loading Configuration Files from a TFTP Server

Fundamental Configuration Tasks

Overview of Router Modes

Configuring Router Identification

Password Configuration

Console Password

Virtual Terminal Password

Privileged EXEC Mode Password

Password Encryption

Configuring and Managing an Interface

The show interfaces Command

Interpreting Interface Status

Configuring a Serial Line

Determining DCE/DTE Status

Verifying Your Changes

Shutting Down an Interface

Verifying Configuration Changes-

Release 10.3 and Later

Verifying Configuration Changes-

Releases Before 10.3

Saving Configuration Changes--Release 10.3+ 152

Saving Configuration Changes-

Releases Before 10.3

Managing the Configuration Environment

Locating the Cisco lOS Software

Determining the Current

Configuration Register Value

Boot System Options in Software

Preparing for a Network Backup Image

Viewing Available Memory

and the Image Filename

Creating Software Image Backup

Upgrading the Image from the Network

Overwriting an Existing Image

Creating or Changing a Configuration Using Setup

Mode

Setup Mode Global Parameters

Setup Mode Interface Parameters

Setup Mode Script Review

Summary

Chapter Six Test: Configuring a Router

Discovering and Accessing Other Cisco Routers

Cisco Discovery Protocol Overview

Using CDP on a Local Router

Altering CDP Parameters

Showing CDP Neighbors

Showing CDP Entries for a Neighboring Device

Summary

Chapter 7 Test: Discovering and Accessing

Other Cisco Routers

NETWORKING PROTOCOL SUITES

TCP/IP Overview

TCP/IP Protocol Stack

Application Layer Overview

Transport Layer Overview

TCP Segment Format

Port Numbers

TCP Port Number

TCP Handshake/Open Connection

TCP Simple Acknowledgment and Windowing

TCP Sequence and Acknowledgment Numbers

UDP Segment Format

Internet Layer Overview

IP Datagram

Internet Control Message Protocol (ICMP)

ICMP Testing

part 2 Address Resolution Protocol

Reverse ARP

Summary

Chapter 8 Test: TCP/IP Overview

Chapter 9 IP Addressing

TCP/IP Address Overview

IP Addressing Overview

IP Address Classes

IP Address Bit Patterns

The First Octet Rule

Concepts of IP Address Configuration

Host Addresses

Addressing Without Subnets

Addressing with Subnets

Subnetting Addressing

Subnet Mask

Decimal Equivalents of Bit Patterns

Subnet Mask Without Subnets

Subnet Mask with Subnets

Subnet Planning

Class B Subnet Planning Example

Class C Subnet Planning Example

Broadcast Addresses

Configuration Commands

Configuring IP Addresses

IP Host Names

Name Server Configuration

Name-to-Address Schemes

Display Host Names

Verifying Address Configuration

Telnet Command

Simple Ping Command

Extended Ping Command

Trace Command

Summary

Chapter Nine Test: IP Address Configuration

Chapter 10 IP Routing Configuration

Basic Mechanisms and Commands of IP Routing

Setting Up the Initial IP Routing Table

Understanding How IP Routing

Learns Destinations

Specifying Administrative Distance Values

Configuring Static Routes

Configuring Default Routers

Grouping into Autonomous Systems

Using Interior or Exterior Routing Protocols

Routing Protocol Problems

Interior IP Routing Protocols

Completing the IP Routing Configuration Tasks

Configuring Dynamic Routing

Configuring RIP

Configuring RIP Router Commands

Viewing IP RIP Information

Configuring IGRP

Understanding IGRP Operation

Flash Updates

Poison Reverse

Holddowns

Split Horizon

Using the IGRP Composite Metric

Unequal-Cost Load Balancing Feature

Creating an IGRP Routing Process

Displaying IGRP Routing Information

Summary

Chapter Ten Test: IP Routing Configuration

Chapter 11 Configuring Novell IPX

IPX Routing Overview

Cisco Routers in NetWare Networks

Novell NetWare Protocol Suite

Key Novell NetWare Features

Novell IPX Addressing

How to Determine the IPX Address

Multiple Novell Encapsulations

Novell and Cisco Encapsulation Names

Novell Uses RIP for Routing

SAP: Supporting Service Advertisements

GNS: The Get Nearest Server Process

Configuring IPX Routing

Novell IPX Global Configuration Commands

ipx routing Command

ipx maximum-paths Command

ipx route destination-net next-hop Command

Novell IPX Interface Configuration Commands

interface Command

ipx network Command

Novell IPX Configuration Example

Verifying and Monitoring IPX Routing

Monitoring the Status of an IPX Interface

Monitoring IPX Routing Tables

Monitoring the Novell IPX Servers

Monitoring IPX Traffic

Troubleshooting IPX Routing

Troubleshooting IPX SAP

Summary

Chapter Eleven Test: Configuring Novell IPX

Chapter 12 Configuring AppleTalk

AppleTalk Overview

AppleTalk Protocol Stack

AppleTalk Features

Nonextended or Extended Networks

AppleTalk Addressing

Extended Addressing

AppleTalk Address Acquisition

Limiting Requests for Services

AppleTalk Services

Locating AppleTalk Services

Configuring AppleTalk

AppleTalk Configuration Tasks

AppleTalk Configuration Commands

appletalk routing Command

appletalk protocol Command

appletalk cable-range Command

appletalk zone Command

AppleTalk Configuration Example

Discovery Mode

Discovery Mode Example

Verifying Your AppleTalk Configuration

Monitoring AppleTalk

Summary

Chapter Twelve Test: Configuring AppleTalk

Chapter 13 Basic Traffic Management with Access Lists

Access Lists Overview

Why Use Access Lists?

Standard Access Lists

Extended Access Lists

How Access Lists Work

A List of Tests: Deny or Permit

Access List Command Overview

How to Identify Access Lists

TCP/IP Access Lists

Testing Packets with IP Access Lists

Key Concepts for IP Access Lists

How to Use Wildcard Mask Bits

Matching Any IP Address

Matching a Specific IP Host Address

IP Standard Access Configuration

Example 1: Permit My Network Only

Example 2: Deny a Specific Host

Example 3: Deny a Specific Subnet

Extended IP Access Lists

Extended Access List Configuration

Example 1: Deny FTP for EO

Example 2: Deny Only Telnet out of EO;

Permit All Other Traffic

Named Access Lists

Where to Place IP Access Lists

Verifying Access Lists

Monitoring Access List Statements

Novell IPX Access Lists

Testing Packets Using Novell Access Lists

Key Concepts for IPX Access Lists

Controlling IPX Overhead

IPX Standard Access List Configuration

Standard IPX Access List Example

IPX Extended Access List Configuration

Normal IPX SAP Operation

How to Use SAP Filters

SAP Filter Configuration Commands

Verifying IPX Access Lists

AppleTalk Access Lists

Testing Packets Using AppleTalk Access Lists

AppleTalk Network Structures

Key Concepts for AppleTalk Access Lists

AppleTalk Access List Procedures

AppleTalk Access List Commands

ZIP Reply Filter Configuration

Verifying AppleTalk Access Lists

Summary

Chapter Thirteen Test: Basic Traffic Management

with Access Lists

PART 3 WlDE-AREA NETWORKING

Chapter 14 Introduction to WAN Connections

WAN Services

Interfacing WAN Service Providers

Customer Premises Equipment (CPE)

Demarcation

Local Loop

Central Office (CO) Switch

Toll Network

Subscriber to Provider Interface

Using WAN Services with Routers

WAN Frame Format Summary

An Overview of PPP

Layering PPP Elements

PPP LCP Configuration Options

PPP Session Establishment

Phase 1: Link Establishment

Phase 2: Authentication (Optional)

Phase 3: Network-Layer Protocol

Selecting a PPP Authentication Protocol

PAP

CHAP

Configuring PPP Authentication

Verifying PPP

Summary

Chapter Fourteen Test:

Introduction to Serial Connections

Chapter 15 Configuring X.25

X.25 Overview

X.25 Protocol Stack

X.25 DTE and DCE

X.25 (X.12l) Addressing Format

X.25 Encapsulation

X.25 Virtual Circuits

SVC Usage

Single Protocol Virtual Circuits

Multiprotocol Virtual Circuits

Configuring X.25

encapsulation x25 Command

x25 address Command

x25 map Command

X.25 Configuration Example

Additional Configuration Tasks

Configuring X.25 VC Ranges

Configuring X.25 Packet Sizes

Configuring X.25 Window Parameters

X.25 Additional Configuration Example

Setting Up the Router as a Switch

X.25 Local and XOT Switching

Monitoring X.25

Summary

Chapter Fifteen Test: Configuring X.25

Chapter 16 Configuring Frame Relay

Frame Relay Overview

- Frame Relay Terminology

Local Access Rate

Data-Link Connection Identifier (DLCI)

Local Management Interface (LMI) 401

Committed Information Rate (CIR) 402

Oversubscription

Committed Burst (Bc)

Excess Burst

Forward Explicit Congestion Notification

(FECN)

Backward Explicit Congestion Notification

(BECN)

Discard Eligibility (DE) Indicator

Frame Relay Operation

Configuring Frame Relay

Configuring Optional Commands

Verifying Frame Relay Operation

Selecting a Frame Relay Topology

Star Topology

Full-Mesh Topology

Partial-Mesh Topology

Reachability and Resource Issues for Frame Relay

Resolving Reachability and Resource Issues:

Subinterfaces

Configuring Subinterfaces

Multipoint Subinterfaces Configuration Example

Point-to-Point Subinterfaces

Configuration Example

Summary

Chapter Sixteen Test: Configuring Frame Relay

APPENDIXES

Appendix A Chapter Test Answer Key

Appendix B Configuring DECnet

Overview of DECnet

Node Assignments

Routers Pass Information

Designated Routers

Level 1 and Level 2 Routing

DECnet Configuration Commands

DECnet Configuration Tasks

DECnet Configuration Commands

DECnet Configuration Example

Configuring DECnet Access Lists

DECnet Access List Commands

Controlling DECnet Example

Monitoring DECnet

Appendix C Configuring Banyan VINES

VINES Overview

Network Number

Subnet Number

Cisco VINES Network Number

Host Address Assignment

Hello Messages

Configuring VINES

VINES Configuration Commands

VINES Access Lists

Monitoring VINES Operation

Appendix D Autolnstalling Configuration Data

Appendix E Decimal to Hexadecimal

and Binary Conversion Table

Appendix F Password Recovery

Technique #1

Technique #2

Appendix G Frame Relay Examples and Configurations

AppleTalk over Frame Relay Example

Configuring IPX over Frame Relay Example

Frame Relay Switching Example

Appendix H Glossary

Index