当前位置:首页 > 工业技术
Cisco路由器配置导论 英文版
Cisco路由器配置导论 英文版

Cisco路由器配置导论 英文版PDF电子书下载

工业技术

  • 电子书积分:16 积分如何计算积分?
  • 作 者:(英)(L.查普尔)Laura Chappell著
  • 出 版 社:北京:清华大学出版社
  • 出版年份:1999
  • ISBN:7302034621
  • 页数:534 页
图书介绍:
《Cisco路由器配置导论 英文版》目录

Chapter1 The Internetworking Model 3

The Evolution of Networks 3

1960s and 1970s:Centralized Processing 3

PART1 INTRODUCTION TO INTERNETWORKING 3

1970s and 1980s:Networks 4

Presentation Layer 5

1980s and 1990s:Internetworks 6

1990s:Global Internetworking 7

NetworkTypes and Devices 9

Local-Area Networks(LANs) 9

Wide-Area Networks(WANs) 10

Enterprise Networks 12

Network Design Goals 13

The Layered Model 14

Why Use a Layered Model? 14

Application Layer 15

Session Layer 16

Transport Layer 16

Network Layer 16

Data Link Layer 16

Physical Layer 16

Peer-to-Peer Communications 17

Data Encapsulation and Headers 18

Step1:Build the Data 19

Step2:Package Data for End-to-End Transport 20

Step3:Append Network Address in Header 20

Step4:Append Local Address in Data-Link Header 20

Step5: Convert to Bits for Transmission 20

Summary 21

Chapter One Test: The Internetworking Model 22

Reviewing Command History 24

Application Layer 25

Chapter2 Applications and Upper Layers 25

Text and Data Formatting and Conversion 27

Pressentation Layer 27

Graphics Formatting and Conversion 28

Audio and Video Formatting and Conversion 28

Session Layer 28

Transport Layer 29

Multiplexing 30

Connection-Oriented Sessions 31

Flow Control and Congestion Avoidance 32

Flow Control with Windowing 33

Positive Acknowledgment 35

Summary 36

Chapter Two Test:Applications and Upper Layers 37

Chapter3 Physical and Data Link Layers 39

Basic Data-Link and Physical Layer Functions 39

LAN Standards and Standards Organizations 40

LAN Data Link Sublayers 41

LLC Sublayer Functions 42

MAC Sublayer Functions 42

Physical and Logical Addressing 43

MAC Addresses 43

Finding the MAC Address 44

Common LAN Technologies 46

Ethernet and IEEE802.3 46

The Ethernet/802.3Physical Layer 47

The Ethernet/802.3Interface 48

Ethernet/802.3Operation 49

Ethernet/802.3Broadcasts and Multicasts 50

Ethernet Frame Types 50

Ethernet/802.3Reliability 52

High-Speed Ethernet Options 53

Token Ring and IEEE802.5 55

Physical Layer: Token Ring/802.5 56

The Token Ring/802.5 Interface 57

Token Ring/802.5 Operation 58

Token Ring/802.5 Media Control 59

Token Ring/802.5 Active Monitor 60

Token Ring/802.5 Reliability 60

FDDI 61

Physical Layer: FDDI 62

The FDDI Interface 63

FDDI Dual-Ring Reliability 63

Common WAN Technologies 64

Physical Layer: WAN 66

High-Level Data Link Control(HDLC) 67

Link Access Procedure, Balanced(LAPB) 67

Synchronous Data Link Control(SDLC) 67

Data Link Layer: WAN Protocols 67

Point ╰o-Point Protocol (PPP) 68

Integrated Services Digital Network(ISDN) 68

Summary 68

Frame Relay 68

Chapter Three Test: Physical and Data Link Layers 69

Chapter4 Network Layer and Path Determination 71

Network Layer Basics 71

Path Determination 72

Communicating Path Information 73

Addressing: Network and Host 74

Protocol Addressing Variations 75

TCP/IP Network Addressing 76

Other Protocol Addressing 77

Routing Uses Network Addresses 78

Routed Versus Routing Protocol 79

Routed Protocol 79

Routing Protocol 79

Network-Layer Protocol Operations 80

Multiprotocol Routing 81

Static Versus Dynamic Routes 82

Static Route Example 82

Default Roure 83

Adapting to Topology Change 84

Dynamic Routing Operations 85

Representing Distance with Metrics 86

Routing Protocols 87

Distance Vector Routing 88

Distance Vector Network Discovery 89

Distance Vector Topology Changes 90

Problem: Routing Loops 91

Symptom: Counting to Infinity 92

Solution: Defining a Maximum 92

Solution: Poison Reverse 93

Solution: Split Horizon 93

Solution: Hold-Down Timers 94

Solution: Triggered Updates 95

Implementing Solutions in Multiple Routes 96

Link-State Routing 98

Link-State Network Discovery 98

Link-State Topology Changes 100

Link-State Concerns 100

Problem: Link-State Updates 101

Solution: Link-State Mechanisms 103

Comparing Distance Vector Routing to Link-State Routing 103

Hybrid Routing 104

Basic Routing Processes 105

LAN-to-LAN Routing 105

LAN-to-WAN Routing 106

Summary 107

Chapter Four Test: Network Layer and Path Determination 108

Chapter5 Basic Router Operations 111

Starting Up a Router 111

External Configuration Sources 112

Internal Configuration Components 113

RAM/DRAM 113

NVRAM 113

Flash Memory 113

ROM 114

Interfaces 114

Auxiliary Ports 114

System Startup Overview 114

Accessing the User Interface 116

Router Modes 116

ROM Monitor Mode 117

Privileged EXEC Mode 117

User EXEC Mode 117

RXBoot Mode 118

Global Configuration Mode 118

Setup Mode 118

Other Configuration Modes 119

Logging In to the Router 119

Using Passwords 119

Individual Line Passwords 120

Privileged EXEC Mode Password 120

Encrypted Passwords 120

Using a Password 121

User Mode Command 121

Privileged Mode Command List 122

Context-Sensitive Help 123

Using Enhanced Editing Commands 123

Examining Router Status 125

show version Command 127

show startup-config Command and show running-config Command 128

show interfaces Command 128

show protocols Command 130

Summary 130

Chapter Five Test: Basic Router Operations 131

Chapter6 Configuring a Router 133

Loading Configuration Files 134

Loading Configuration Files—Releases Before10.3 135

Loading Configuration Files from a TFTP Server 135

Fundamental Configuration Tasks 136

Overview of Router Modes 136

Configuring Router Identification 138

Password Configuration 140

Console Password 140

Privileged EXEC Mode Password 141

Virtual Terminal Password 141

Password Encryption 142

Configuring and Managing an Interface 142

The show interfaces Command 143

Interpreting Interface Status 144

Configuring a Serial Line 145

Determining DCE/DTE Status 147

Verifying Your Changes 148

Shutting Down an Interface 148

Verifying Configuration Changes—Release 10.3and Later 149

Saving Configuration Changes—Release10.3+ 152

Saving Configuration Changes—Releases Before10.3 153

Managing the Configuration Environment 153

Locating the Cisco IOS Software 154

Determining the Current Configuration Register Value 155

Boot System Options in Software 157

Preparing for a Network Backup Image 158

Viewing Available Memory and the Image Filename 159

Greating Software Image Backup 161

Upgrading the Image from the Network 162

Overwriting an Existing Image 164

Creating or Changing a Configuration Using Setup Mode 165

Setup Mode Global Parameters 166

Setup Mode Interface Parameters 167

Setup Mode Script Review 168

Summary 169

Chapter Six Test: Configuring a Router 170

Chapter7 Discovaring and Accessing Other Cisco Routers 175

Cisco Discovery Protocol Overvew 175

Using CDP on a Local Router 177

Altering CDP Parameters 178

Showing CDP Neighbors 179

Showing CDP Entries for a Neighboring Device 180

Summary 181

Chapter Seven Test: Discovering and Accessing Other Cisco Routers 182

PART2 NETWORKING PROTOCOL SUITES 187

Chapter8 TCP/IP Overview 187

TCP/IP Protocol Stack 188

Application LayerOverview 189

Transport Layer Overview 190

TCP Segment Format 191

Port Numbers 192

TCP Port Numbers 193

TCP Handshake/Open Connection 194

TCP Simple Acknowledgment and Windowing 195

TCP Sequence and Acknowledgment Numbers 197

Internet Layer Overview 198

UDP Segment Format 198

IP Datagram 199

Internet Control Message Protocol(ICMP) 200

ICMP Testing 201

Address Resolution Protocol 203

Reverse ARP 203

Summary 204

Chapter Eight Test: TCP/IP Overview 205

Chapter9 IP Addressing 207

TCP/IP Address Overview 207

IP Addressing Overview 208

IP Address Classes 209

IP Address Bit Patterns 210

The First Octet Rule 211

Host Addresses 212

Concepts of IP Address Configuration 212

Addressing Without Subnets 213

Addressing with Subnets 214

Subnetting Addressing 215

Subnet Mask 216

Decimal Equivalents of Bit Patterns 216

Subner Mask Without Subnets 217

Subnet Planning 218

Subnet Mask with Subnets 218

Class B Subnet Planning Example 220

Class C Subnet Planning Example 220

Broadcast Addresses 221

Configuration Commands 222

Configuring IP Addresses 223

IP Host Names 224

Name Server Configuration 224

Display Host Names 225

Name-to-Address Schemes 225

Verifying Address Configuration 226

Telnet Command 227

Simple Ping Command 227

Extended Ping Command 228

Trace Command 229

Smmary 230

Chapter Nine Test: IP Address Configuration 231

Chapter10 IP Routing Configuration 233

Basic Mechanisms and Commands of IP Routing 233

Setting Up the Initial IP Routing Table 233

Understanding How IP Routing Learns Destinations 235

Specifying Administrative Distance Values 235

Configuring Static Routes 237

Configuring Default Routers 239

Grouping into Autonomous Systems 239

Using Interior or Exterior Routing Protocols 240

Routing Protocol Problems 242

Interior IP Routing Protocols 242

Completing the IP Routing Configuration Tasks 243

Configuring Dynamic Routing 243

Configuring RIP 244

Configuring RIP Router Commands 245

Viewing IP RIP Information 247

Configuring IGRP 249

Understanding IGRP Operation 250

Flash Updates 250

Poison Reverse 250

Holddowns 250

Split Horizon 251

Using the IGRP Composite Metric 251

Unequal-Cost Load Balancing Feature 253

Creating an IGRP Routing Process 254

Displaying IGRP Routing Information 256

Summary 258

Chapter Ten Test: IP Routing Configuration 259

Chapter11 Configuring Novell IPX 263

IPX Routing Overview 263

Cisco Routers in NetWare Networks 263

Novell NetWare Protocol Suite 264

Key Novell NetWare Features 265

Novell IPX Addressing 267

How to Determine the IPX Address 267

Multiple Novell Encapsulations 268

Novell and Cisco Encapsulation Names 269

Novell Uses RIP for Routing 270

SAP: Supporting Service Advertisements 272

GNS: The Get Nearest Server Process 273

Configuring IPX Routing 274

Novell IPX Global Configuration Commands 275

ipx routing Command 275

ipx maximum-paths Command 275

ipx route destination-net next-hop Command 276

Novell IPX Interface Configuration Commmands 276

interface Command 276

ipx network Command 276

Novell IPX Configuration Example 277

Verifying and Monitoring IPX Routing 278

Monitoring the Status of an IPX Interface 279

Monitoring IPX Routing Tables 280

Monitoring the Novell IPX Servers 282

Monitoring IPX Traffic 283

Troubleshooting IPX Routing 283

Troubleshooting IPX SAP 284

Summary 285

Chapter Eleven Test: Configuring Novell IPX 286

Chapter12 Configuring Apple Talk 289

Apple Talk Oveview 289

Apple Talk Protocol Stack 289

Apple Talk Features 291

Nonextended or Extended Networks 291

Apple Talk Addressing 292

Extended Addressing 293

AppleTalk Address Acquisition 294

Limiting Requests for Services 295

Apple Talk Services 296

Locating Apple TalkServices 297

Configuring Apple Talk 298

AppleTalk Configuration Tasks 298

appletalk protocol Command 299

appletalk routing Command 299

AppleTalk Configuration Commands 299

appletalk cable-range Command 300

appletalk zone Command 300

Apple Talk Configuration Example 300

Discovery Mode 302

Discovery Mode Example 303

Verifying Your Apple Talk Configuration 304

Monitoring AppleTalk 305

Summary 307

Chapter Twelve Test: Configuring AppleTalk 308

Chapter13 Basic Traffic Management with Access Lists 311

Access Lists Overview 311

Why Use Access Lists? 311

Standard Access Lists 313

Extended Access Lists 313

How Access Lists Work 314

A List of Tests: Deny or Permit 315

Access List Command Overview 317

How to Identify Access Lists 317

TCP/IP Access Lists 318

Testing Packets with IP Access Lists 319

Key Concepts for IP Access Lists 319

How to Use Wildcard Mask Bits 320

Matching Any IP Address 322

Matching a Specific IP Host Address 323

IP Standard Access Configuration 324

Example1: Permit My Network Only 324

Example2: Deny a Specific Host 325

Example3: Deny a Specific Subnet 326

Expended IP Access Lists 327

Extended Access List Configuration 328

Example1: Deny FTP for EO 329

Example2: Deny Only Telnet out of E0; Permit All Other Traffic 330

Named Access Lists 331

Where to Place IP Access Lists 333

Verifying Access Lists 333

Monitoring Access List Statements 334

Novell IPX Access Lists 334

Testing Packets Using Novell Access Lists 335

Key Concepts for IPX Access Lists 335

Controlling IPX Overhead 337

IPX Standard Access List Configuration 338

Standard IPX Access List Example 339

IPX Extended Access List Configuration 340

Normal IPX SAP Operation 341

How to Use SAP Filters 342

SAP Filter Configuration Commands 343

AppleTalk Access Lists 346

Verifying IPX Access Lists 346

Testing Packets Using AppleTalk Access Lists 347

AppleTalk Network Structures 348

Key Concepts for AppleTalk Access Lists 349

AppleTalk Access List Procedures 350

AppleTalk Access List Commands 351

ZIP Reply Filter Configuration 352

Verifying AppleTalk Access Lists 353

Summary 353

Chapter Thirteen Test: Basic Traffic Management with Access Lists 354

PART3 WIDE-AREA NETWORKING 359

Chapter14 Introduction to WAN Connections 359

WAN Services 359

Interfacing WAN Service Providers 360

Customer Premises Equipment(CPE) 361

Demarcation 361

Toll Network 362

Local Loop 362

Central Office(CO)Switch 362

Subscriber to Provider Interface 363

Using WAN Services with Routers 364

WAN Frame Format Summary 364

An Overview of PPP 366

Layering PPP Elements 367

PPP LCP Configuration Options 368

PPP Session Establishment 369

Phase1: Link Establishment 369

Phase2: Authentication(Optional) 369

Phase3: Network-Layer Protocol 370

Selecting a PPP Authentication Protocol 370

PAP 370

CHAP 371

Configuring PPP Authentication 372

Summary 374

Verifying PPP 374

Chapter Fourteen Test: Introduction to Serial Connections 375

Chapter15 Configuring X.25 377

X.25 Overview 377

X.25 Protocol Stack 378

X.25 DTE and DCE 379

X.25{X.121}Addressing Format 380

X.25Encapsulation 382

X.25Virtual Circuits 382

SVC Usage 383

Single Protocol Virtual Circuits 384

Multiprotocol Virtual Circuits 385

Configuring X.25 385

encapsulation x25 Command 386

x25 map Command 387

x25 address Command 387

x.25 Configuration Example 388

Additional Configuration Tasks 389

Configuring X.25 VC Ranges 389

Configuring X.25 Packer Sizes 390

Configuring X.25 Window Parameters 391

X.25 Additional Configuration Example 392

Setting Up the Router as a Switch 393

X.25 Local and XOT Switching 394

Monitoring X.25 395

Summary 396

Chapter Fifteen Test: Configuring X.25 397

Chapter 16 Configuring Frame Relay 399

Frame Relay Overview 399

Data-Link Connection Identifier(DLCI) 400

Frame Relay Terminology 400

Local Access Rate 400

Local Management Interface(LMI) 401

Committed Information Rate(CIR) 402

Oversubscription 402

Committed Burst(Bc) 402

Excess Burst 402

Forward Explicit Congestion Notification (FFCN) 403

Backward Explicit Congestion Notification(BECN) 403

Discard Eligibility(DE)Indicator 403

Frame Relay Operation 403

Configuring Frame Relay 405

Configuring Optional Commands 407

Verifying Frame Relay Operation 408

Selecting a Frame Relay Topology 409

Partial-Mesh Topology 410

Reachability and Resource Issues for Frame Relay 410

Star Topology 410

Full-Mesh Toplogy 410

Resolving Reachability and Resource Issues: Subinterfaces 411

Configuring Subinterfaces 413

Multipoint Subinterfaces Configuration Example 414

Point-to-Point Subinterfaces Configuration Example 416

Summary 417

Chapter Sixteen Test: Configuring Frame Relay 419

APPENDIXES 423

Appendix A Chapter Test Answer Key 423

Appendix B Configuring DECnet 431

Overview of DECnet 431

Node Assignments 433

Designated Routers 434

Routers Pass Information 434

Level 1 and Level 2 Routing 435

DECnet Configuration Commands 435

DECnet Configuration Tasks 435

DECnet Configuration Commands 437

DECnet Configuration Example 437

Configuring DECnet Access Lists 438

DECnet Access List Commands 439

Controlling DECnet Example 439

Monitoring DECnet 440

Appendix C Configuring Banyan VINES 441

VINES Overview 441

Network Number 442

Subnet Number 442

Hello Messages 443

Host Address Assignment 443

Cisco VINES Network Number 443

Configuring VINES 444

VINES Configuration Commands 444

VINES Access Lists 446

Monitoring VIENS Operation 447

Appendix D Autolnstalling Configuration Data 449

Appendix E Decimal to Hexadecimal and Binary Conversion Table 453

Appendix F Password Recovery 461

Technique #1 462

Technique #2 464

Appendix G Frame Relay Examples and Configurations 467

AppleTalk over Frame Relay Example 467

Configuring IPX over Frame Relay Example 468

Frame Relay Switching Example 470

Appendix H Glossary 473

Index 513

返回顶部