Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cisco LAN Switching Configuration Handbook

  • Formāts: 360 pages
  • Sērija : Networking Technology
  • Izdošanas datums: 03-Jun-2009
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9781587140624
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 30,98 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 360 pages
  • Sērija : Networking Technology
  • Izdošanas datums: 03-Jun-2009
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9781587140624
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Cisco LAN Switching Configuration Handbook

Second Edition

 

A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches

 

Steve McQuerry, CCIE® No. 6108

David Jansen, CCIE No. 5952

David Hucaby, CCIE No. 4594

 

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations.

 

This book is organized by groups of common features, with sections marked by shaded tabs for quick reference. Information on each feature is presented in a concise format, with background, configuration, and example components. The format is organized for easy accessibility to commands and their proper usage, saving you hours of research time.

 

From the first page, the authors zero in on quick facts, configuration steps, and explanations of configuration options in each Cisco Catalyst switch feature. The quick reference format allows you to easily locate just the information you need without having to search through thousands of pages of documentation, helping you get your switches up and running quickly and smoothly.

 

Whether you are looking for a handy, portable reference to more easily configure Cisco Catalyst switches in the field, or you are preparing for CCNA®, CCNP®, or CCIE® certification, you will find Cisco LAN Switching Configuration Handbook, Second Edition, to be an essential resource.

 

Steve McQuerry, CCIE No. 6108, is a technical solutions architect with Cisco focused on data center solutions. Steve works with enterprise customers in the midwestern United States to help them plan their data center architectures. David Jansen, CCIE No. 5952, is a technical solutions architect (TSA) with Cisco focused on Data Center Architectures at Cisco. David has more than 20 years of experience in the IT industry. David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, ASA/PIX/FWSM security, and VPN product lines.

 





Implement switched campus network designs Configure switch prompts, IP addresses, passwords, switch modules, file management, and administrative protocols Understand how Layer 3 interfaces are used in a switch Configure Ethernet, Fast Ethernet, Gigabit Ethernet, and EtherChannel interfaces Implement VLANs, trunking, and VTP Operate, configure, and tune Spanning Tree Protocol (STP) Handle multicast traffic and interact with multicast routers Streamline access to server and firewall farms with accelerated server load balancing Deploy broadcast suppression, user authentication, port security, and VLAN access lists Configure switch management features Implement QoS and high availability features Transport voice traffic with specialized voice gateway modules, inline power, and QoS features

 

This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Introduction xviii
CLI Usage
1(12)
Cisco Internet work Operating System (IOS) Software
1(8)
Using Cisco IOS Software
2(7)
ROM Monitor
9(4)
Using the ROM Monitor Command Set
9(4)
Switch Functionality
13(12)
Catalyst Switch Families
13(4)
Catalyst 2000 Series
13(1)
Catalyst 3000 Series
14(1)
Catalyst 4500 Series
15(1)
Catalyst 6500
16(1)
Switched Campus Network Designs
17(8)
Catalyst Switch Families
23(1)
Cisco Validated Designs: Campus
23(2)
Supervisor Engine Configuration
25(28)
Prompts and Banners
25(2)
Configuration of Prompt
26(1)
Configuration of Banner
26(1)
Feature Example
26(1)
IP Addressing and Services
27(3)
Configuring an IP Management Address
27(1)
Configuring a Default Gateway
28(1)
Setting Up DNS Services or Host Tables
28(1)
Configuring HTTP Services
29(1)
Feature Example
29(1)
Passwords and Password Recovery
30(4)
Configuration of Passwords
30(1)
Feature Example
30(1)
Password Recovery: Procedure 1
31(1)
Feature Example
32(1)
Password Recovery on IOS Devices: Procedure 2
33(1)
Feature Example
33(1)
Managing Modules
34(1)
Viewing Modules
34(1)
Accessing Modules
34(1)
Resetting Modules
34(1)
Powering Modules Up and Down
35(1)
File Management and Boot Parameters
35(7)
Navigating File Systems
36(2)
Deleting Files from Flash
38(1)
Copying Systems Files
39(1)
File System Boot parameters
40(1)
Alias Commands
41(1)
Redundant Supervisors
42(4)
Forcing a Change to the Standby Supervisor
43(1)
Synchronizing IOS Images
44(1)
Synchronizing Boot Parameters
45(1)
Cisco Discovery Protocol
46(1)
Configuration of CDP
46(1)
Feature Example
47(1)
Time and Calendar
47(6)
System Time Configuration
48(1)
Setting the System Time Manually
48(1)
Setting the System Time Through NTP
49(1)
Example
50(3)
Layer 2 Interface Configuration
53(18)
Switching Table
53(3)
Configuration
53(1)
Displaying Information About the Switching Table
54(1)
Switching Table Example
54(2)
Port Selection
56(1)
Configuration
56(1)
Port Selection Example
57(1)
Ethernet
57(5)
Configuration
57(3)
Ethernet Example
60(1)
Displaying Information About Layer 2 Interfaces
61(1)
EtherChannel
62(9)
Configuration
63(4)
EtherChannel Example
67(1)
Displying Information About EtherChannels
68(3)
Layer 3 Interface Configuration
71(16)
Layer 3 Switching
71(1)
Layer 3 Ethernet Interfaces
72(2)
Configuration
72(1)
Verifying the Configuration
73(1)
Feature Example
73(1)
Layer 3 EtherChannels
74(4)
Configuration
74(2)
Verifying the Channel
76(1)
Feature Example
77(1)
WAN Interfaces
78(4)
Configuration
78(1)
Configuring an Enhanced Flex WAN Interface
78(1)
Configuring a SPA Interface Processor (SIP) / Shared Port Adapter (SPA) WAN Interface
79(1)
Configuring a Packet-over-SONET Interface
80(1)
Verifying Configurations
81(1)
Feature Example
81(1)
Layer 3 Virtual Interfaces
82(3)
Configuring a VLAN Interface
82(1)
Configuring Subinterfaces
83(1)
Verifying Configurations
84(1)
Feature Example
84(1)
Routing Tables
85(2)
Configuration
85(1)
Verifying Routes
86(1)
VLANs and Trunking
87(24)
VLAN Configuration
87(4)
Creation of an Ethernet VLAN
88(2)
Feature Example
90(1)
VLAN Port Assignments
91(2)
Configuring Static VLANs
91(1)
Configuring Dynamic VLANs
91(2)
Verifying VLAN Assignments
93(1)
Trunking
93(5)
Enabling Trunking
93(3)
Specifying VLANs to Trunk
96(1)
Verifying Trunks
97(1)
Feature Example
97(1)
VLAN Trunking Protocol
98(6)
Enabling VTP for Operation
98(1)
Setting VTP Passwords
99(1)
Changing VTP Modes
100(1)
Enabling VTP Pruning
101(1)
Changing VTP Versions
102(1)
Verifying VTP Operation
102(1)
Feature Example
103(1)
Private VLANs
104(7)
Configuring Private VLANs
105(1)
Configuring Private Edge VLANs
106(1)
Verifying Private VLAN Operation
107(1)
Feature Example
107(4)
Spanning Tree Protocol (STP)
111(20)
STP Operation
111(5)
STP Process
112(1)
STP Tiebreakers
113(1)
Path Costs
113(1)
STP Port States
114(1)
STP Topology Changes
114(1)
Improving STP Stability
115(1)
STP Operation Example
115(1)
STP Configuration
116(8)
Displaying Information About STP
120(1)
STP Configuration Examples
120(1)
Poor STP Root Placement
120(2)
STP Load Balancing
122(2)
STP Convergence Tuning
124(2)
Configuring STP Convergence Tuning
125(1)
Navigating the Spanning-Tree Topology
126(5)
Configuring High Availability Features
131(10)
Route Processor Redundancy (RPR/RPR+)
131(1)
Configuration
132(1)
Displaying Information About RPR
132(1)
Non-Stop Forwarding/Supervisor Switchover (NSF/SSO) with Supervisor Redundancy
132(3)
SSO/NSF Configuration
133(2)
Displaying Information About SSO and NSF
135(1)
Router Redundancy with HSRP
135(3)
Configuration
136(1)
HSRP Example
137(1)
Displaying Information About HSRP
138(1)
Fast Software Upgrade (FSU) and Enhanced Fast Software Upgrade (eFSU)
138(3)
Multicast
141(6)
Multicast Addressing
141(1)
IGMP Snooping
142(5)
Configuration
143(1)
IGMP Snooping Example
144(1)
Displaying Information About IGMP Snooping
145(2)
Server Load Balancing (SLB)
147(20)
SLB
147(11)
Configuration
149(6)
SLB Example
155(2)
Displaying Information About SLB
157(1)
SLB Firewall Load Balancing
158(6)
Configuration
159(2)
Firewall Load-Balancing Example
161(3)
Displaying Information About Firewall Load Balancing
164(1)
SLB Probes
164(3)
Configuration
165(1)
Displaying Information About SLB Probes
166(1)
Controlling Traffic and Switch Access
167(26)
Broadcast Suppression
168(2)
Configuring Broadcast Suppression
168(2)
Verifying Configuration
170(1)
Feature Example
170(1)
Protocol Filtering
170(3)
Configuration
171(1)
Verification
171(1)
Feature Example
172(1)
Port Security
173(2)
Configuration
173(2)
Verification
175(1)
Feature Example
175(1)
VLAN Access Control Lists
175(5)
IOS VACL Configuration
176(2)
Verification
178(1)
Feature Example
178(2)
Switch Authentication
180(3)
Configuration
180(2)
Verification
182(1)
Feature Example
182(1)
Access Class
183(1)
Configuration
183(1)
Verification
184(1)
Feature Example
184(1)
SSH Telnet Configuration
184(1)
Configuration
184(1)
Feature Example
185(1)
802.1X Port Authentication
185(1)
Configuration
186(1)
Feature Example
186(1)
Layer 2 Security
186(3)
Port Security
188(1)
Feature Example
188(1)
Verification
188(1)
DHCP Snooping
189(1)
Feature Example
189(1)
Verification
190(1)
Dynamic ARP Inspection
191(1)
Feature Example
191(1)
Verification
192(1)
Switch Management
193(28)
Logging
193(5)
Configuration
194(4)
Logging Example
198(1)
Displaying Information About Logging
198(1)
Simple Network Management Protocol
198(8)
Configuration
199(6)
SNMP Example
205(1)
Displaying Information About SNMP
206(1)
Switched Port Analyzer
206(7)
SPAN Configuration
206(2)
RSPAN Configuration
208(2)
SPAN Examples
210(1)
Displaying Information About SPAN
211(2)
Power Management
213(1)
Configuration
213(1)
Displaying Information About Power Management
214(1)
Environmental Monitoring
214(1)
Packet Tracing
214(7)
Configuration
215(3)
Packet-Tracing Example
218(3)
Quality of Service
221(28)
QoS Theory
221(5)
Layer 2 QoS Classification and Marking
222(1)
Layer 3 QoS Classification and Marking
223(3)
Catalyst Switch Queuing
226(1)
QoS Configuration
226(20)
Catalyst 2000/3000 Configuration
228(1)
All Other Catalyst Configuration
228(17)
Displaying Information About QoS
245(1)
QoS Data Export
246(3)
Configuration
246(2)
QoS Data Export Example
248(1)
Displaying Information About QoS Data Export
248(1)
Voice
249(14)
Voice Ports
249(5)
Configuration
250(3)
Example
253(1)
Displaying Information About Voice Ports
253(1)
Voice QoS
254(9)
Access Layer Configuration
256(3)
Distribution and Core Layer Configuration
259(2)
Voice QoS Example
261(2)
Appendix A Cabling Quick Reference
263(8)
Back-to-Back Connections
267(4)
Ethernet Connections
267(1)
Asynchronous Serial Connections
268(1)
T1/E1 CSU/DSU Connections
269(2)
Appendix B Well-known Protocol, Port, and Other Numbers
271(46)
Index 317
Steve McQuerry

, CCIE No. 6108, is a technical solutions architect with Cisco Systems focused on data center solutions. Steve works with enterprise customers in the

midwestern United States to help them plan their data center architectures. Steve has been an active member of the internetworking community since 1991 and has held multiple

certifications from Novell, Microsoft, and Cisco. Steve holds a BS degree in physics from Eastern Kentucky University. Prior to joining Cisco, Steve worked as a consultant for various companies and as an independent contractor with Global Knowledge, where he taught and developed coursework around Cisco technologies and certifications.

 

David Jansen, CCIE No. 5952, is a vertical solutions architect for manufacturing for U.S Enterprise Segment. David has more than 20 years experience in the information technology

industry. He has held multiple certifications from Microsoft, Novell, Checkpoint, and Cisco. His focus is to work with Enterprise customers to address end to end manufacturing architectures. David has been with Cisco for 11 years, and working as a manufacturing architect for the past year has provided unique experiences helping customers build architectural solutions for manufacturing connectivity. David holds a BSE degree in computer science from the University of Michigan (Go Blue!) and an MA degree in adult education from Central Michigan University.

 

David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, IP Telephony, PIX, and VPN product lines. Prior to his current position, David was a senior network consultant, where he provided design and implementation consulting, focusing on Cisco-based VPN and IP Telephony solutions. David has BS and MS degrees in electrical engineering from the University of Kentucky.