《Cisco高级路由器配置技术 英文版》PDF下载

  • 购买积分:18 如何计算积分?
  • 作  者:Laura Chappell编
  • 出 版 社:北京:清华大学出版社
  • 出版年份:2000
  • ISBN:7302010943
  • 页数:644 页
图书介绍:

PART 1 OVERVIEW OF SCALABLE INTERNETWORKS 3

Chapter 1 Overview of Scalable Internetworks 3

Scaling Large Internetworks 3

Defining the Router s Role in a Hierarchy 5

Key Characteristics of Scalable Internetworks 7

Making the Network Reliable and Available 7

Making the Network Responsive 9

Making the Network Efficient 11

Making the Network Adaptable 14

Making the Network Accessible but Secure 15

Summary 18

PART 2 INTRODUCTION TO MANAGING TRAFFIC AND ACCESS 23

Chapter 2 Introduction to Managing Traffic and Congestion 23

Congestion Overview 23

Traffic in an IP Network 24

Traffic in an IPX Network 25

Other Traffic in a Multiprotocol Network 26

Managing Traffic Congestion 26

Adjusting Timers on Periodic Announcements 27

Providing Static Entries in Tables 27

Filtering Broadcast Traffic 27

Filtering User and Application Traffic 27

Prioritizing Traffic 28

Summary 28

Chapter 3 Managing IP Traffic 31

Traffic Management Techniques 32

IP Access Lists 32

Helper Addressing 34

Configuring IP Standard Access Lists 34

Inbound Access List Processing 35

Outbound Access List Processing 36

IP Addressing Review 37

Access Lists Use Wildcard Mask 39

Access List Configuration Tasks 40

Standard Access List Commands 40

Implicit Masks 42

Configuring Principles for Access Lists 43

Standard Access List Example 45

Location of Standard Access Lists 46

Restricting Virtual Terminal Access 47

How to Control vty Access 47

Virtual Terminal Line Commands 48

Virtual Terminal Access Example 49

Configuring Extended Access Lists 49

Extended Access List Processing 50

Extended IP Access List Command 51

Extended Access List Examples 60

Configuring Named Access Lists 61

Implementation Considerations 62

Named Access List Example 63

Location of Extended Access Lists 64

Verifying Access List Configurations 64

Using an Alternative to Access Lists 65

Configuring Null Interface 66

Null Interface Command 66

Using Helper Addresses 68

Server Location 69

IP Helper Address Commands 70

Helper Address Examples 72

Summary 75

Chapter 4 Managing Novell IPX/SPX Traffic 83

Novell IPX/SPX Overview 83

IPX Addressing 85

Managing IPX/SPX Traffic 86

IPX Traffic Filtering 88

IPX Traffic Filtering Overview 88

IPX Access List Commands 89

IPX SAP Overview 92

SAP Operation 94

SAP Filters 95

SAP Filter Configuration 95

SAP Filtering Examples 97

Filtering RIP Traffic 101

SAP/GNS Operation 102

Connecting IPX Networks Using IP Tunnels 108

Configuring and IP Tunnel Interface 108

IP Tunnel Configuration Example 110

Verifying IPX Traffic Operation 111

Summary 112

Chapter 5 Configuring Queuing to Manage Traffic 117

Queuing Overview 117

Traffic Prioritization 118

Establishing a Queuing Policy 119

Choosing a Cisco IOS Queuing Option 120

Primary Differences Between the Queuing Options 122

Weighted Fair Queuing Overview 123

Weighted Fair Queuing Operation 124

Weighted Fair Queue Example 125

Priority Queuing Overview 126

Priority Queuing Operation 127

Priority Queuing Configuration Tasks 129

Priority List Configuration Commands 130

Priority Queuing Example 133

Custom Queuing Overview 135

Custom Queuing Operation 137

Custom Queuing Configuration Tasks 138

Custom Queue Configuration Commands 139

Custom Queuing Examples 143

Verifying Queuing Operation 145

Summary 146

What Is Routing? 151

Chapter 6 Routing Protocol Overview 151

PART 3 CONFIGURING SCALABLE ROUTING PROTOCOLS 151

Comparing Routing Protocols 152

Using Convergence 153

Discovering Routes 154

Selecting a Route 156

Maintaining Routing Information 157

Summary 158

Chapter 7 Extending IP Addresses Using VLSMs (Variable-Length Subnet Masks) 161

IP Address Issues and Solutions 161

Using Addressing Hierarchies 162

Slowing IP Address Depletion 163

Variable-Length Subnet Masks 164

Variable-Length Subnet Mask Overview 165

Classless and Classful Updates 165

Calculating VLSMs 167

VLSM Example 170

Route Summarization Overview 171

What Is Route Summarization? 171

Summarizing Within an Octer 172

Summarizing Addresses in a VLSM-Designed Network 173

Route Summarization Implementation Considerations 174

Using Private Addressing 177

Other Addressing Considerations 177

Translating Inside Local Addresses 179

Summary 181

Chapter 8 Configuring OSPF in a Single Area 185

OSPF Overview 185

Steps to OSPF Operation 188

Step 1:Establishing Router Adjacencies 188

Step 2: Electing the DR and BDR 192

Step 3:Discovering Routes 194

Step 4:Choosing Routes 195

Step 5:Maintaining Routing Information 197

Configuring OSPF on Routers Within a Single Area 199

Basic Configuration Steps 200

Optional Configuration Commands 201

Verifying OSPF Operation 203

Summary 205

Chapter 9 Interconnecting Multiple OSPF Areas 209

Creating Multiple OSPF Areas 209

OSPF Hierarchical Routing 210

OSPF Multi-Area Components 211

Configuring OSPF Operation Across Multiple Areas 216

Forwarding Packets in a Multi-Area Network 218

Flooding LSUs to Multiple Areas 219

Updating the Routing Table 220

Using and Configuring OSPF Multi-Area Components 221

Configuring OSPF ABRs 221

Using Route Summarization 222

Configuring Route Summarization 224

Using Stub and Totally Stubby Areas 226

Meeting the Backbone Area Requirements 232

Creating a Virtual Link 232

Configuring Virtual Links 234

OSPF Virtual Link Configuration Example 235

Verifying OSPF Operation 236

Summary 237

Enhanced IGRP Overview 241

Chapter 10 Configuring Enhanced IGRP 241

EIGRP Support for Novell IPX RIP and SAP 242

EIGRP Support for AppleTalk 243

EIGRP Terminology 244

Enhanced IGRP Operation 244

Building the Neighbor Table 245

Discovering Routes 246

Choosing Routes 247

Maintaining Routes 250

Configuring EIGRP for IP 253

Configuring EIGRP 253

Configuring EIGRP Support for IPX 255

Summarizing EIGRP Routes for IP 258

Verifying Enhanced IGRP Operation 259

Summary 261

Chapter 11 Optimizing Routing Update Operation 263

Controlling Routing Update Traffic 263

Using and Configuring the passive-interface Command 265

Using and Configuring Default Routes 265

Using and Configuring Static Routes 267

Using and Configuring Route Filters 270

IPX Route Filtering Configuration Example 272

Using Multiple Routing Protocols 273

What Is Redistribution? 274

Redistribution Implementation Considerations 275

Selecting the Best Path 276

What Protocol to Believe? 276

Redistribution Guidelines 278

Redistribution and EIGRP 280

Using and Configuring Redistribution 280

Modifying Administrative Distance (Optional) 284

IP Route Filtering Configuration Example 285

IP Static Route Filtering Configuration Example 286

Redistribution Example Using ip default-network 287

Redistribution Example Using distance 290

Verifying Redistribution Operation 297

Summary 297

Chapter 12 Connecting Enterprises to an Internet Service Provider 301

BGP and ISP Connectivity Basics 301

When Not to Use BGP 302

Policy Drives BGP Requirements 303

BGP Sessions 304

Static Route Command Review 305

Connecting to an ISP Using BGP and Alternatives 305

BGP Operation 305

RIP Static Route Example 306

OSPF Example 307

BGP Configuration Commands 307

BGP Configuration Example 309

Verifying BGP Operation With the Show Commands 310

Summary 310

Integrated Services Digital Network (ISDN) BRI 311

PART 4 CONFIGURING DIALUP CONNECTIVITY 315

Chapter 13 WAN Connectivity Overview 315

WAN Connectivity Options 315

Dedicated Connectivity 316

Asynchronous Dial-In Connectivity 317

Dial-on-Demand Routing 318

Packet-Switched Services 320

WAN Encapsulation Protocols 324

Connection Considerations 326

Summary 327

Chapter 14 Configuring Dial-on-Demand Routing 331

ISDN Standards 332

ISDN Access Options 333

ISDN Encapsulation Options 334

ISDN Functions 335

Selecting a Cisco Router: Considerations 338

ISDN Switch Types 339

Configuring ISDN BRI 340

Dial-on-Demand Routing 341

Generic DDR Operation 343

Selecting a DDR Implementation 344

Legacy DDR 346

Configuring Legacy DDR 346

Task 1: Specifying Interesting Traffic (What Enables the Connection?) 346

Task 2: Defining Static Routes (Route to Destination) 348

Task 3: Configuring the Dialer Information 350

Legacy DDR Configuration Tasks Summarized 352

Legacy DDR Optional Commands 353

Legacy DDR Using ACLs Configuration Example 355

Verifying and Troubleshooting Legacy DDR Operation 356

Dialer Profiles Overview 357

Configuring Dialer Profiles 360

Dialer Profiles Configuration Tasks Summarized 365

Dialer Profiles Configuration Example 367

Verifying Dialer Profiles Operation 370

DDR Using Rotary Group Overview 370

Configuring Dialer Rotary Groups 371

Dialer Rotary Group Configuration Example 374

PPP Authentication Overview 377

Selecting a PPP Authentication Protocol 378

Configuring PPP Authentication 381

Optional PPP Authentication Commands 382

Summary 383

Chapter 15 Customizing DDR Operation 387

Dial Backup for Dedicated Connections 387

Configuring Dial Backup for Primary Links 388

Configuring Dial Backup for Excessive Traffic Load 390

MultiLink PPP Operation 392

MultiLink PPP Overview 392

Configuring MultiLink PPP 394

MultiLink PPP Configuration Example 394

Verifying MultiLink PPP Operation 398

Disabling Overhead Traffic 399

Snapshot Routing 400

IPX Spoofing 408

Summary 411

PART 5 INTEGRATING NONROUTED SERVICES 417

Chapter 16 Bridging Overview 417

Introduction to Bridging 417

Nonrouted Protocol Support 418

Routing Versus Bridging 419

Basic Router/Bridge Operation 420

Cisco-Supported Bridging Types 420

Transparent Bridging 421

Encapsulated Bridging 421

Integrated Routing and Bridging 422

Source-Route Bridging 422

Source-Route Transparent Bridging 423

Source-Route Translational Bridging 424

Summary 425

Transparent Bridging Operation 429

Transparent Bridging 429

Chapter 17 Configuring Transparent Bridging and Integrated Routing and Bridging 429

Transparent Bridging Configuration Tasks 435

Verifying Transparent Bridging 439

Verifying Spanning Tree Operation 440

Integrated Routing and Bridging 441

IRB Operation 443

BVI Addressing 444

Making Bridging or Routing Decisions 444

IRB Configuration Tasks 446

Configuration Example: IRB and the BVI 447

Enabling Routing on a Bridge Group 448

IRB Configuration Considerations 449

Verifying IRB Operation 450

Summary 452

Chapter 18 Configuring Source-Route Bridging 455

Source-Router Bridging (SRB) Overview 455

Source-Route Bridging Operation 457

Routing Information Indicator 459

Source-Router Bridging Configuration 460

SRB Manual Spanning-Tree Configuration Example 462

SRB Automatic Spanning-Tree Configuration Example 463

Multiport Configuration 464

Proxy Explorer Configuration 466

Multiring Configuration 466

Multiring Configuration Example 468

Source-Route Transparent Bridging (SRT) Overview 468

SRT Operation 469

SRT Configuration Example 470

Source-Route Translational Bridging (SR/TLB) Overview 470

SR/TLB Configuration Example 472

Verifying Source-Route Bridging Operation 474

SR/TLB Configuration 477

Summary 478

Appendix A Chapter Test Answer Key 485

Appendixes 485

Appendix B Managing AppleTalk Traffic 499

AppleTalk Traffic Overview 499

AppleTalk Protocol Stack 500

AppleTalk Services 500

Nonextended/Extended Networks 501

Extended AppleTalk Internetwork 502

AppleTalk Zones 503

AppleTalk Filtering Options 503

GetZoneList Filtering 505

ZIP Reply Filtering 509

RTMP Filtering 513

NBP Filtering 518

Summary 522

Appendix C Configuring NetWare Link Services Protocol 523

Configuring NLSP 523

NLSP Operation 524

NLSP Configuration Commands 527

NLSP Configuration Example 530

Verifying NLSP Operation 531

Summary 533

Configuring T1 and E1 535

Appendix D Configuring T1/E1 and ISDN PRI Options 535

Channelized T1/E1 Configuration Commands 538

Channelized T1 Configuration Example 540

Channelized E1 Configuration 542

Channelized E1 Configuration Example 542

Configuring Primary Rate Interface 544

ISDN PRI Configuration Commands 545

T1/E1 Controller Options for PRI 546

ISDN PRI Configuration 547

PRI Configuration Example 548

Summary 549

Overview of Switched Multimegabit Data Service (SMDS) 551

Appendix E Configuring SMDS 551

SMDS Configuration Tasks 553

SMDS Configuration Commands 554

SMDS Configuration Example 555

Summary 556

Appendix F Password Recovery 557

Theory of Password Recovery 557

Password Recovery Technique #1 558

Password Recovery Technique #2 561

Summary 563

Appendix G Glossary 565

Index 613