Network Warrior:思科网络工程师必备手册(影印版)

Network Warrior:思科网络工程师必备手册(影印版)
作 者: 唐纳
出版社: 东南大学出版社
丛编项:
版权说明: 本书为出版图书,暂不支持在线阅读,请支持正版图书
标 签: 网络配置与管理
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

  Gary A. Donahue担任过程序员、主机管理员、技术帮助中心工程师、网络管理员、网络设计师和咨询师。现在担任在新泽西的他自己的咨询公司GAD Technologies的主席。

内容简介

捡起认证考试的遗珠。这是一本细致而实用的网络基础架构指南,《Network Warrior:思科网络工程师必备手册(影印版)(第2版)》将助你一臂之力来处理真实的思科网络,而不是解决考试中的假想问题,比如ccna那样的。在作者广博的专业经验基础上,《network warrior》指导你一步一步地遍历路由器、交换机、防火墙以及其他的技术领域。在这本经过全面修订的第二版中,你会发现针对mpls、ipv6、voip和无线网络的新增加内容,同时还有针对思科nexus 5000和7000交换机的实例讲解。主体包括:深入介绍路由器和网络路由,使用思科catalyst和nexus交换机作为实例讲解网络交换,小型网络和家庭网络的voip和无线接入点设计与配置,用配置实例讲解ipv6,数据网络世界中的电信技术,包括t1、ds3、帧中继和mpls,网络安全,防火墙原理及配置,还有访问控制和认证,服务质量(qos),重点讲解低延迟队列(llq),ip地址分配、网络时间协议(ntp)以及设备故障。

图书目录

preface

1. what is a network?

2. hubs and switches

hubs

switches

switch types

planning a chassis-based switch installation

3. autonegotjatjon

what is autonegotiation?

how autonegotiation works

when autonegotiation fails

autonegotiation best practices

configuring autonegotiation

4. vlans

connecting vlans

configuring vlans

catos

ios using vlan database

ios using global commands

nexus and nx-os

5. trunkjng

how trunks work

isl

802.1q

which protocol to use

trunk negotiation

configuring trunks

los

catos

nexus and nx-os

6. vlan trunking protocol

vtp pruning

dangers of vtp

configuring vtp

vtp domains

vtp mode

vtp password

vtp pruning

7. link aggregation

etherchannel

etherchannel load balancing

configuring and managing etherchannel

cross-stack etherchannel

multichassis etherchannel (mec)

virtual port channel

initial vpc configuration

adding a vpc

8. spanning tree

broadcast storms

mac address table instability

preventing loops with spanning tree

how spanning tree works

managing spanning tree

additional spanning tree features

portfast

bpdu guard

uplinkfast

backbonefast

common spanning tree problems

duplex mismatch

unidirectional links

bridge assurance

designing to prevent spanning tree problems

use routing instead of switching for redundancy

always configure the root bridge

9. routing and routers

routing tables

route types

the ip routing table

host route

subnet

summary (group of subnets)

major network

supernet (group of major networks)

default route

virtual routing and forwarding

10. routing protocols

communication between routers

metrics and protocol types

administrative distance

specific routing protocols

rip

ripv2

eigrp

ospf

bgp

11. redistribution

redistributing into rip

redistributing into eigrp

redistributing into ospf

mutual redistribution

redistribution loops

limiting redistribution

route tags

a real-world example

12. tunnels

gre tunnels

gre tunnels and routing protocols

gre and access lists

13. first hop redundancy

hsrp

hsrp interface tracking

when hsrp isn't enough

nexus and hsrp

glbp

object tracking in glbp

14. route maps

building a route map

policy routing example

monitoring policy routing

15. switching algorithms in cisco routers

process switching

interrupt context switching

fast switching

optimum switching

cef

configuring and managing switching paths

process switching

fast switching

cef

16. multilayer switches

configuring svis

ios (4500, 6500, 3550, 3750, etc.)

hybrid mode (4500, 6500)

nx-os (nexus 7000, 5000)

multilayer switch models

17. cisco 6500 multilayer switches

architecture

buses

enhanced chassis

vertical enhanced chassis

supervisors

modules

catos versus ios

installing vss

other recommended vss commands

vss failover commands

miscellaneous vss commands

vss best practices

18. cisco nexus

nexus hardware

nexus 7000

nexus 5000

nexus 2000

nexus 1000 series

nx-os

nx-os versus ios

nexus iconography

nexus design features

virtual routing and forwarding

virtual device contexts

shared and dedicated rate-mode

configuring fabric extenders (fexs)

virtual port channel

config-sync

configuration rollback

upgrading nx-os

19. catalyst 3750 features

stacking

interface ranges

macros

flex links

storm control

port security

span

voice vlan

qos

20. telecom nomenclature

telecom glossary

21. t1

understanding t1 duplex

types of t1

encoding

ami

b8zs

framing

d4/superframe

extended super frame

performance monitoring

loss of signal

out of frame

bipolar violation

crc6

errored seconds

extreme errored seconds

alarms

red alarm

yellow alarm

blue alarm

troubleshooting tls

loopback tests

integrated csu/dsus

configuring tls

csu/dsu configuration

csu/dsu troubleshooting

22. ds3

framing

m13

c-bits

clear-channel ds3 framing

line coding

configuring ds3s

clear-channel ds3

channelized ds3

23. frame relay

ordering frame relay service

frame relay network design

oversubscription

local management interface

congestion avoidance in frame relay

configuring frame relay

basic frame relay with two nodes

basic frame relay with more than two nodes

frame relay subinterfaces

troubleshooting frame relay

24. mpls

25. access lists

designing access lists

named versus numbered

wildcard masks

where to apply access lists

naming access lists

top-down processing

most-used on top

using groups in asa and pix acls

deleting acls

turbo acls

allowing outbound traceroute and ping

allowing mtu path discovery packets

acls in multilayer switches

configuring port acls

configuring router acls

configuring vlan maps

reflexive access lists

configuring reflexive access lists

26. authentication in cisco devices

basic (non-aaa) authentication

line passwords

configuring local users

ppp authentication

aaa authentication

enabling aaa

configuring security server information

creating method lists

applying method lists

27. basic firewall theory

best practices

the dmz

another dmz example

multiple dmz example

alternate designs

28. asa firewallconfiguration

contexts

interfaces and security levels

names

object groups

inspects

managing contexts

context types

the classifier

configuring contexts

interfaces and contexts

write mere behavior

failover

failover terminology

understanding failover

configuring failover--active/standby

monitoring failover

configuring failover--active/active

nat

nat commands

nat examples

miscellaneous

remote access

saving configuration changes

logging

troubleshooting

29. wireless

wireless standards

security

configuring a wap

mac address filtering

troubleshooting

30. volp

how volp works

protocols

telephony terms

cisco telephony terms

common issues with volp

small-office volp example

vlans

switch ports

qos on the cme router

dhcp for phones

tftp service

telephony service

dial plan

voice ports

configuring phones

dial peers

sip

troubleshooting

phone registration

tftp

dial peer

sip

31. introduction to(los

types of qos

qos mechanics

priorities

flavors of qos

common qos misconceptions

qos "carves up" a link into smaller logical links

qos limits bandwidth

qos resolves a need for more bandwidth

qos prevents packets from being dropped

qos will make you more attractive to the opposite sex

32. designing (los

llq scenario

protocols

priorities

determine bandwidth requirements

configuring the routers

class maps

policy maps

service policies

traffic-shaping scenarios

scenario 1: ethernet handoff

scenario 2: frame relay speed mismatch

33. the congested network

determining whether the network is congested

resolving the problem

34. the converged network

configuration

monitoring qos

troubleshooting a converged network

incorrect queue configuration

priority queue too small

priority queue too large

nonpriority queue too small

nonpriority queue too large

default queue too small

default queue too large

35. designing networks

documentation

requirements documents

port layout spreadsheets

ip and vlan spreadsheets

bay face layouts

power and cooling requirements

tips for network diagrams

naming conventions for devices

network designs

corporate networks

ecommerce websites

modern virtual server environments

small networks

36. ip design

public versus private ip space

vlsm

c1dr

allocating ip network space

allocating ip subnets

sequential

divide by half

reverse binary

ip subnetting made easy

37. ipv6

addressing

subnet masks

address types

subnetting

nat

simple router configuration

38. network time protocol

what is accurate time?

ntp design

configuring ntp

ntp client

ntp server

39. failures

human error

multiple component failure

disaster chains

no failover testing

troubleshooting

remain calm

log your actions

find out what changed

check the physical layer first!

assume nothing; prove everything

isolate the problem

don't look for zebras

do a physical audit

escalate

troubleshooting in a team environment

the janitor principle

40. gad's maxims

maxim # 1

politics

money

the right way to do it

maxim #2

simplify

standardize

stabilize

maxim #3

lower costs

increase performance or capacity

increase reliability

41. avoiding frustration

why everything is messed up

how to sell your ideas to management

when to upgrade and why

the dangers of upgrading

valid reasons to upgrade

why change control is your friend

how not to be a computer jerk

behavioral

environmental

leadership and mentoring

index