书籍详情
CCIE路由与交换认证考试指南(第二版 英文版)
作者:(美)奥登
出版社:人民邮电
出版时间:2007-02-01
ISBN:9787115155085
定价:¥148.00
购买这本书可以去
内容简介
本书讲述了Cisco认证考试CCIE路由与交换(R&S)笔试所涉及的全部内容,此外,还介绍了CCIE服务提供商书面考试中与网络相关的内容。全书内容包括网络概念、设备操作、桥接与局域网(LAN)交换技术、广域网(WAN)、IP及IP路由选择协议、网络安全性以及多服务网络等。本书在介绍基本内容的同时,还提供了多种评估工具,以检查自己对某些内容的掌握情况。这些评估工具包括小测试、问题与答案、实践模拟练习以及CD-ROM中提供的200多道练习题。随书光盘中包含本书英文版的电子文档(以PDF格式提供)和500余道CCIE路由与交换考试模拟试题。本书适合准备参加CCIE认证考试的读者,也可供相关网络技术人员参考。.本书是优秀的Cisco认证考试指南,专门针对CCIE路由与交换考试内容编写。作者足著名的资深讲师和畅销书作者,在本书中将自己的备考和考试技巧与读者分享,帮助读者找出薄弱环节,增强理论知识与实践能力。本书行文简洁,旨在加强读者对考试主题的理解和记忆。..书中以一系列经实践证明十分有效的方法,向读者展示了一条清晰的备考路线。每章开头的“Do I Know This Already”测验帮助读者确定如何分配学习时间。考试主题列表和总结图表便于读者参考,在需要时还可以进行快速复习。章末的复习题帮助读者评估自己对知识的掌握程度并巩固重要概念。配套光盘中功能强大的测试引擎真实地模拟CCIE路由与交换考试,帮助读者尽快适应考试环境,并能记录考试成绩、提供反馈信息,进而指出需要进一步复习的内容,以便读者集中精力突破难关。在第二版的修订中对第一版的细节层次、评估特征和具有挑战性的复习题与练习都进行了周密的考虑和调整,以更好地帮助读者掌握概念和技术,顺利通过考试。...
作者简介
本书提供作译者介绍Wendell Odom, CCIE No. 1624, is a senior instructor with Skyline Advanced Technology Services (http://www.skyline-ats.com), where he teaches the QOS, CCIE, and SAN courses. Wendell has worked in the networking arena for 20 years, with jobs in pre- and post-sales technical consulting, teaching, and course development. He has authored several Cisco Press books, including the bestselling CCNA INTRO and ICND Exam Certification Guides, the Cisco QoS...
目录
Contents
Part I Bridging and LAN Switching 2
Chapter 1 Ethernet Basics 5
“Do I Know This Already?” Quiz 5
Foundation Topics 8
Ethernet Layer 1: Wiring, Speed, and Duplex 8
RJ-45 Pinouts and Category 5 Wiring 8
Auto-negotiation, Speed, and Duplex 9
CSMA/CD 10
Collision Domains and Switch Buffering 10
Basic Switch Port Configuration 12
Ethernet Layer 2: Framing and Addressing 14
Types of Ethernet Addresses 16
Ethernet Address Formats 17
Protocol Types and the 802.3 Length Field 18
Switching and Bridging Logic 19
Foundation Summary 25
Memory Builders 25
Fill in Key Tables from Memory 25
Definitions 25
Further Reading 25
Chapter 2 Virtual LANs and VLAN Trunking 27
“Do I Know This Already?” Quiz 27
Foundation Topics 31
Virtual LANs 31
VLAN Configuration 31
Using VLAN Database Mode to Create VLANs 32
Using Configuration Mode to Put Interfaces into VLANs 34
Using Configuration Mode to Create VLANs 35
Private VLANs 36
VLAN Trunking Protocol 38
VTP Process and Revision Numbers 39
VTP Configuration 40
Normal-Range and Extended-Range VLANs 42
Storing VLAN Configuration 43
VLAN Trunking: ISL and 802.1Q 44
ISL and 802.1Q Concepts 44
ISL and 802.1Q Configuration 45
Allowed, Active, and Pruned VLANs 48
Trunk Configuration Compatibility 48
Configuring Trunking on Routers 49
802.1Q-in-Q Tunneling 51
Foundation Summary 53
Memory Builders 54
Fill in Key Tables from Memory 54
Definitions 54
Further Reading 55
Chapter 3 Spanning Tree Protocol 57
“Do I Know This Already?” Quiz 57
Foundation Topics 61
802.1D Spanning Tree Protocol 61
Choosing Which Ports Forward: Choosing Root Ports and Designated Ports 61
Electing a Root Switch 61
Determining the Root Port 63
Determining the Designated Port 64
Converging to a New STP Topology 65
Topology Change Notification and Updating the CAM 66
Transitioning from Blocking to Forwarding 67
Per-VLAN Spanning Tree and STP over Trunks 68
STP Configuration and Analysis 70
Optimizing Spanning Tree 73
PortFast, UplinkFast, and BackboneFast 73
PortFast 74
UplinkFast 74
BackboneFast 75
PortFast, UplinkFast, and BackboneFast Configuration 75
PortChannels 76
Load Balancing Across PortChannels 76
PortChannel Discovery and Configuration 77
Rapid Spanning Tree Protocol 78
Multiple Spanning Trees: IEEE 802.1s 80
Protecting STP 82
Root Guard and BPDU Guard: Protecting Access Ports 82
UDLD and Loop Guard: Protecting Trunks 83
Foundation Summary 85
Memory Builders 87
Fill in Key Tables from Memory 87
Definitions 87
Further Reading 87
Part II TCP/IP 89
Chapter 4 IP Addressing 91
“Do I Know This Already?” Quiz 91
Foundation Topics 94
IP Addressing and Subnetting 94
IP Addressing and Subnetting Review 94
Subnetting a Classful Network Number 95
Comments on Classless Addressing 97
Subnetting Math 97
Dissecting the Component Parts of an IP Address 97
Finding Subnet Numbers and Valid Range of IP Addresses-Binary 98
Decimal Shortcuts to Find the Subnet Number and Valid Range of IP Addresses 99
Determining All Subnets of a Network-Binary 102
Determining All Subnets of a Network-Decimal 104
VLSM Subnet Allocation 105
Route Summarization Concepts 107
Finding Inclusive Summary Routes-Binary 108
Finding Inclusive Summary Routes-Decimal 109
Finding Exclusive Summary Routes-Binary 110
CIDR, Private Addresses, and NAT 111
Classless Interdomain Routing 111
Private Addressing 113
Network Address Translation 113
Static NAT 115
Dynamic NAT Without PAT 116
Overloading NAT with Port Address Translation 117
Dynamic NAT and PAT Configuration 118
IP Version 6 119
IPv6 Address Formats 120
Aggregatable Global Unicast Addresses 120
Simple IPv6 Configuration 121
IPv6 Addressing Summary 123
Foundation Summary 125
Memory Builders 128
Fill in Key Tables from Memory 128
Definitions 129
Further Reading 129
Chapter 5 IP Services 131
“Do I Know This Already?” Quiz 131
Foundation Topics 134
ICMP 134
ICMP Unreachable 135
Time Exceeded ICMP Message 136
ICMP Redirect 137
ARP, Proxy ARP, Reverse ARP, BOOTP, and DHCP 137
ARP and Proxy ARP 137
RARP, BOOTP, and DHCP 139
HSRP, VRRP, and GLBP 141
Network Time Protocol 143
Foundation Summary 146
Memory Builders 148
Fill in Key Tables from Memory 148
Definitions 148
Further Reading 149
Chapter 6 TCP/IP Transport and Application Services 151
“Do I Know This Already?” Quiz 151
Foundation Topics 154
TCP and UDP 154
TCP Connections and Port Numbers 155
TCP Error Recovery 157
TCP Dynamic Windowing 157
TCP Header Miscellany 159
TCP/IP Applications 160
Passive and Active Mode FTP 161
Application Authentication and Privacy 163
Network Management and SNMP 163
SNMP Protocol Messages 165
SNMP MIBs 166
SNMP Security 167
Foundation Summary 168
Memory Builders 168
Fill in Key Tables from Memory 168
Definitions 169
Further Reading 169
Part III IP Routing 171
Chapter 7 IP Forwarding (Routing) 173
“Do I Know This Already?” Quiz 173
Foundation Topics 177
IP Forwarding 177
Process Switching, Fast Switching, and Cisco Express Forwarding 178
Building Adjacency Information: ARP and Inverse ARP 179
Frame Relay Inverse ARP 180
Static Configuration of Frame Relay Mapping Information 183 Disabling InARP 184
Classless and Classful Routing 185
Multilayer Switching 186
MLS Logic 186
Using Routed Ports and PortChannels with MLS 187
MLS Configuration 188
Policy Routing 191
Foundation Summary 197
Memory Builders 198
Fill in Key Tables from Memory 198
Definitions 199
Further Reading 199
Chapter 8 RIP Version 2 201
“Do I Know This Already?” Quiz 201
Foundation Topics 204
RIP Version 2 Basics 204
RIP Convergence and Loop Prevention 205
Converged Steady-State Operation 206
Triggered (Flash) Updates and Poisoned Routes 208
RIP Convergence When Routing Updates Cease 210
Convergence Extras 212
RIP Configuration 213
Enabling RIP and the Effects of Autosummarization 214
RIP Authentication Configuration 216
RIP Next-Hop Feature and Split Horizon 219
RIP Offset Lists 220
Route Filtering with Distribute Lists and Prefix Lists 222
Foundation Summary 225
Memory Builders 227
Fill in Key Tables from Memory 227
Definitions 227
Further Reading 227
Chapter 9 EIGRP 229
“Do I Know This Already?” Quiz 229
Foundation Topics 233
EIGRP Basics and Steady-State Operation 233
Hellos, Neighbors, and Adjacencies 233
EIGRP Updates 236
The EIGRP Topology Table 238
EIGRP Convergence 240
Input Events and Local Computation 241
Going Active on a Route 243
Stuck-in-Active 245
Limiting Query Scope 246
EIGRP Configuration 246
EIGRP Configuration Example 246
EIGRP Load Balancing 249
EIGRP Configuration Options That Are Similar to RIP 250
Foundation Summary 251
Memory Builders 253
Fill in Key Tables from Memory 253
Definitions 253
Further Reading 253
Chapter 10 OSPF 255
“Do I Know This Already?” Quiz 255
Foundation Topics 260
OSPF Database Exchange 260
OSPF Router IDs 260
Becoming Neighbors, Exchanging Databases, and Becoming Adjacent 261
Becoming Neighbors: The Hello Process 263
Flooding LSA Headers to Neighbors 264
Requesting, Getting, and Acknowledging LSAs 265
Designated Routers on LANs 266
Designated Router Optimization on LANs 266
DR Election on LANs 268
Designated Routers on WANs and OSPF Network Types 269
Caveats Regarding OSPF Network Types over NBMA Networks 270
Example of OSPF Network Types and NBMA 271
SPF Calculation 274
Steady-State Operation 275
OSPF Design and LSAs 275
OSPF Design Terms 276
LSA Types and Network Types 277
LSA Types 1 and 2 278
LSA Type 3 and Inter-Area Costs 281
LSA Types 4 and 5, and External Route Types 1 and 2 284
OSPF Design in Light of LSA Types 286
Stubby Areas 287
OSPF Configuration 290
OSPF Costs and Clearing the OSPF Process 292
Alternatives to the OSPF Network Command 295
OSPF Filtering 295
Filtering Routes Using the distribute-list Command 295
OSPF ABR LSA Type 3 Filtering 297
Filtering Type 3 LSAs with the area range Command 299
Virtual Link Configuration 299
Configuring OSPF Authentication 301
OSPF Stub Router Configuration 303
Foundation Summary 305
Memory Builders 310
Fill in Key Tables from Memory 310
Definitions 310
Further Reading 311
Chapter 11 IGP Route Redistribution, Route Summarization, and Default Routing 313
“Do I Know This Already?” Quiz 313
Foundation Topics 317
Route Maps, Prefix Lists, and Administrative Distance 317
Configuring Route Maps with the route-map Command 317
Route Map match Commands for Route Redistribution 319
Route Map set Commands for Route Redistribution 320
IP Prefix Lists 321
Administrative Distance 323
Route Redistribution 324
The Mechanics of the redistribute Command 324
Redistribution Using Default Settings 325
Setting Metrics, Metric Types, and Tags 328
Redistributing a Subset of Routes Using a Route Map 329
Mutual Redistribution at Multiple Routers 333
Preventing Suboptimal Routes by Setting the Administrative Distance 335
Preventing Suboptimal Routes by Using Route Tags 338
Using Metrics and Metric Types to Influence Redistributed Routes 340
Route Summarization 342
EIGRP Route Summarization 344
OSPF Route Summarization 344
RIP Route Summarization 345
Default Routes 345
Using Static Routes to 0.0.0.0, with redistribute static 347
Using the default-information originate Command 348
Using the ip default-network Command 349
Using Route Summarization to Create Default Routes 350
Foundation Summary 352
Memory Builders 353
Fill in Key Tables from Memory 353
Definitions 353
Further Reading 353
Chapter 12 Fundamental BGP Operations 355
“Do I Know This Already?” Quiz 355
Foundation Topics 360
Building BGP Neighbor Relationships 361
Internal BGP Neighbors 362
External BGP Neighbors 365
Checks Before Becoming BGP Neighbors 366
BGP Messages and Neighbor States 368
BGP Message Types 368
Purposefully Resetting BGP Peer Connections 369
Building the BGP Table 370
Injecting Routes/Prefixes into the BGP Table 370
The BGP network Command 370
Redistributing from an IGP, Static, or Connected Route 373
The Impact of Auto-Summary on Redistributed Routes and the network Command 375
Manual Summaries and the AS_PATH Path Attribute 378
Adding Default Routes to BGP 381 The ORIGIN Path Attribute 382
Advertising BGP Routes to Neighbors 383
The BGP Update Message 383
Determining the Contents of Updates 384
Example: Impact of the Decision Process and NEXT_HOP on BGP Updates 386
Summary of Rules for Routes Advertised in BGP Updates 392
Building the IP Routing Table 392
Adding eBGP Routes to the IP Routing Table 392
Backdoor Routes 393
Adding iBGP Routes to the IP Routing Table 394
Using Sync and Redistributing Routes 396
Disabling Sync and Using BGP on All Routers in an AS 398
Confederations 399
Configuring Confederations 401
Route Reflectors 404
Foundation Summary 410
Memory Builders 414
Fill in Key Tables from Memory 414
Definitions 414
Further Reading 415
Chapter 13 BGP Routing Policies 417
“Do I Know This Already?” Quiz 417
Foundation Topics 423
Route Filtering and Route Summarization 423
Filtering BGP Updates Based on NLRI 424
Route Map Rules for NLRI Filtering 427
Soft Reconfiguration 428
Comparing BGP Prefix Lists, Distribute Lists, and Route Maps 428
Filtering Subnets of a Summary Using the aggregate-address Command 429
Filtering BGP Updates by Matching the AS_PATH PA 430
The BGP AS_PATH and AS_PATH Segment Types 431
Using Regular Expressions to Match AS_PATH 433
Example: Matching AS_PATHs Using AS_PATH Filters 436
Matching AS_SET and AS_CONFED_SEQ 439
BGP Path Attributes and the BGP Decision Process 442
Generic Terms and Characteristics of BGP PAs 442
The BGP Decision Process 444
Clarifications of the BGP Decision Process 445
Two Final Tiebreaker Steps in the BGP Decision Process 445
Adding Multiple BGP Routes to the IP Routing Table 446
Mnemonics for Memorizing the Decision Process 446
Configuring BGP Policies 448
Background: BGP PAs and Features Used by Routing Policies 448
Step 0: NEXT_HOP Reachable 450
Step 1: Administrative Weight 450
Step 2: Highest Local Preference (LOCAL_PREF) 453
Step 3: Choose Between Locally Injected Routes Based on ORIGIN PA 456
Step 4: Shortest AS_PATH 457
Removing Private ASNs 457
AS_PATH Prepending and Route Aggregation 458
Step 5: Best ORIGIN PA 461
Step 6: Smallest Multi-Exit Discriminator 461
Configuring MED: Single Adjacent AS 463
Configuring MED: Multiple Adjacent Autonomous Systems 464
The Scope of MED 464
Step 7: Prefer Neighbor Type eBGP over iBGP 465
Step 8: Smallest IGP Metric to the NEXT_HOP 465
The maximum-paths Command and BGP Decision Process Tiebreakers 465
Step 9: Lowest BGP Router ID of Advertising Router (with One Exception) 466
Step 10: Lowest Neighbor ID 466
The BGP maximum-paths Command 466
BGP Communities 468
Matching COMMUNITY with Community Lists 472
Removing COMMUNITY Values 473
Filtering NLRI Using Special COMMUNITY Values 474
Foundation Summary 476
Memory Builders 480
Fill in Key Tables from Memory 480
Definitions 480
Further Reading 480
Part IV Quality of Service 483
Chapter 14 Classification and Marking 485
“Do I Know This Already?” Quiz 485
Foundation Topics 489
Fields That Can Be Marked for QoS Purposes 489
IP Precedence and DSCP Compared 489
DSCP Settings and Terminology 490
The Class Selector PHB and DSCP Values 491
The Assured Forwarding PHB and DSCP Values 491
The Expedited Forwarding PHB and DSCP Values 492
Non-IP Header Marking Fields 493
Ethernet LAN Class of Service 493
WAN Marking Fields 493
Locations for Marking and Matching 494
Cisco Modular QoS CLI 495
The Mechanics of MQC 496
Classification Using Class Maps 497
Using Multiple match Commands 498
Classification Using NBAR 499
Classification and Marking Tools 500
Class-Based Marking (CB Marking) Configuration 500
CB Marking Example 501
CB Marking of CoS and DSCP 505
Network-Based Application Recognition 507
CB Marking Design Choices 508
Marking Using Policers 509
Policy Routing for Marking 510
Foundation Summary 511
Memory Builders 513
Fill in Key Tables from Memory 513
Definitions 513
Further Reading 513
Chapter 15 Congestion Management and Avoidance 515
“Do I Know This Already?” Quiz 515
Foundation Topics 519
Cisco Router Queuing Concepts 519
Software Queues and Hardware Queues 519
Queuing on Interfaces Versus Subinterfaces and Virtual Circuits 520
Comparing Queuing Tools 520
Queuing Tools: FIFO, PQ, CQ, WFQ, CBWFQ, and LLQ 521
FIFO Queuing 521
Priority Queuing 522
Custom Queuing 523
Weighted Fair Queuing 524
WFQ Scheduler: The Process 525
WFQ Drop Policy, Number of Queues, and Queue Lengths 526
Types of WFQ Queues 527
WFQ Configuration 527
Class-Based WFQ and Low-Latency Queuing 529
CBWFQ Basic Features and Configuration 529
Defining and Limiting CBWFQ Bandwidth 532
Low-Latency Queuing 534
Defining and Limiting LLQ Bandwidth 537
LLQ with More Than One Priority Queue 538
Miscellaneous CBWFQ/LLQ Topics 538
Queuing Summary 538
Weighted Random Early Detection 539
How WRED Weights Packets 541
WRED Configuration 542
LAN Switch Congestion Management and Avoidance 542
Cisco 3550 Switch Egress Queuing 543
Cisco 3550 Congestion Avoidance 545
Comparisons Between Cisco 3550 and 2950 Switches 547
Foundation Summary 549
Memory Builders 549
Fill in Key Tables from Memory 549
Definitions 549
Further Reading 549
Chapter 16 Shaping and Policing 551
“Do I Know This Already?” Quiz 551
Foundation Topics 555
Traffic-Shaping Concepts 555
Shaping Terminology 555
Shaping with an Excess Burst 557
Underlying Mechanics of Shaping 557
Traffic-Shaping Adaptation on Frame Relay Networks 559
Class-Based Shaping Configuration 559
Tuning Shaping for Voice Using LLQ and a Small Tc 561
Configuring Shaping by Bandwidth Percent 564
CB Shaping to a Peak Rate 565
Adaptive Shaping 565
Frame Relay Traffic Shaping Configuration 565
FRTS Configuration Using the traffic-rate Command 567
Setting FRTS Parameters Explicitly 568
FRTS Configuration Using LLQ 569
FRTS Adaptive Shaping 570
Policing Concepts and Configuration 571
CB Policing Concepts 571
Single-Rate, Two-Color Policing (One Bucket) 571
Single-Rate, Three-Color Policer (Two Buckets) 573
Two-Rate, Three-Color Policer (Two Buckets) 573
Class-Based Policing Configuration 575
Single-Rate, Three-Color Policing of All Traffic 575
Policing a Subset of the Traffic 576
CB Policing Defaults for Bc and Be 577
Configuring Dual-Rate Policing 577
Multi-Action Policing 578
Policing by Percentage 578
Committed Access Rate 579
Foundation Summary 582
Memory Builders 584
Fill in Key Tables from Memory 584
Definitions 584
Further Reading 585
Part V WAN 587
Chapter 17 Synchronous Serial Links and Protocols 589
“Do I Know This Already?” Quiz 589
Foundation Topics 592
Synchronous Serial Links 592
T1 Framing and Encoding 592
T1 Alarms 594
Carrier Detect and Interface Resets 594
Point-to-Point Protocol 595
PPP Link Control Protocol 596
Basic LCP/PPP Configuration 597
Multilink PPP 598
MLP Link Fragmentation and Interleaving 600
PPP Compression 601
PPP Layer 2 Payload Compression 602
Header Compression 602
Foundation Summary 604
Memory Builders 605
Fill in Key Tables from Memory 605
Definitions 605
Further Reading 605
Chapter 18 Frame Relay 607
“Do I Know This Already?” Quiz 607
Foundation Topics 610
Frame Relay Concepts 610
Frame Relay Data Link Connection Identifiers 610
Local Management Interface 611
Frame Relay Headers and Encapsulation 612
Frame Relay Congestion: DE, BECN, and FECN 613
Adaptive Shaping, FECN, and BECN 614
The Discard Eligibility Bit 615
Frame Relay Configuration 615
Frame Relay Configuration Basics 615
Frame Relay Payload Compression 619
Frame Relay Fragmentation 620
Foundation Summary 623
Memory Builders 624
Fill in Key Tables from Memory 624
Definitions 625
Further Reading 625
Part VI IP Multicast 627
Chapter 19 Introduction to IP Multicasting 629
“Do I Know This Already?” Quiz 629
Foundation Topics 632
Why Do You Need Multicasting? 632
Problems with Unicast and Broadcast Methods 632
How Multicasting Provides a Scalable and Manageable Solution 635
Multicast IP Addresses 638
Multicast Address Range and Structure 638
Well-Known Multicast Addresses 638
Multicast Addresses for Permanent Groups 639
Multicast Addresses for Source-Specific Multicast Applications and Protocols 640
Multicast Addresses for GLOP Addressing 640
Multicast Addresses for Private Multicast Domains 640
Multicast Addresses for Transient Groups 641
Summary of Multicast Address Ranges 641
Mapping IP Multicast Addresses to MAC Addresses 642
Managing Distribution of Multicast Traffic with IGMP 643
Joining a Group 644
Internet Group Management Protocol 645
IGMP Version 1 645
IGMPv1 Host Membership Query Functions 646
IGMPv1 Host Membership Report Functions 647
IGMPv1 Leave Mechanism 651
IGMPv1 Querier 651
IGMP Version 2 651
IGMPv2 Leave Group and Group-Specific Query Messages 654
IGMPv2 Querier 656
IGMPv1 and IGMPv2 Interoperability 657
IGMPv2 Host and IGMPv1 Routers 657
IGMPv1 Host and IGMPv2 Routers 658
IGMPv1 and IGMPv2 Routers 658
Timers Used in IGMPv1 and IGMPv2 659
IGMP Version 3 659
Comparison of IGMPv1, IGMPv2, and IGMPv3 661
Multicast Listener Discovery Protocol 662
LAN Multicast Optimizations 662
Cisco Group Management Protocol 663
IGMP Snooping 669
Router-Port Group Management Protocol 673
Foundation Summary 676
Memory Builders 676
Fill in Key Tables from Memory 677
Definitions 677
Further Reading 677
References in This Chapter 677
Chapter 20 IP Multicast Routing 679
“Do I Know This Already?” Quiz 679
Foundation Topics 683
Multicast Routing Basics 683
Overview of Multicast Routing Protocols 684
Multicast Forwarding Using Dense Mode 684
Reverse-Path-Forwarding Check 685
Multicast Forwarding Using Sparse Mode 687
Multicast Scoping 689
TTL Scoping 689
Administrative Scoping 690
Dense-Mode Routing Protocols 690
Operation of Protocol Independent Multicast Dense Mode 691
Forming PIM Adjacencies Using PIM Hello Messages 691
Source-Based Distribution Trees 692
Prune Message 693
PIM-DM: Reacting to a Failed Link 695
Rules for Pruning 697
Steady-State Operation and the State Refresh Message 699
Graft Message 700
LAN-Specific Issues with PIM-DM and PIM-SM 702
Prune Override 702
Assert Message 703
Designated Router 704
Summary of PIM-DM Messages 705
Distance Vector Multicast Routing Protocol 706
Multicast Open Shortest Path First 706
Sparse-Mode Routing Protocols 707
Operation of Protocol Independent Multicast Sparse Mode 707
Similarities Between PIM-DM and PIM-SM 707
Sources Sending Packets to the Rendezvous Point 708
Joining the Shared Tree 710
Completion of the Source Registration Process 712
Shared Distribution Tree 714
Steady-State Operation by Continuing to Send Joins 715
Examining the RP’s Multicast Routing Table 716
Shortest-Path Tree Switchover 717
Pruning from the Shared Tree 719
Dynamically Finding RPs and Using Redundant RPs 720
Dynamically Finding the RP Using Auto-RP 721
Dynamically Finding the RP Using BSR 724
Anycast RP with MSDP 726
Summary: Finding the RP 728
Bidirectional PIM 729
Comparison of PIM-DM and PIM-SM 730
Foundation Summary 732
Memory Builders 736
Fill in Key Tables from Memory 736
Definitions 736
Further Reading 737
Part VII Security 739
Chapter 21 Security 741
“Do I Know This Already?” Quiz 741
Foundation Topics 745
Router and Switch Device Security 745
Simple Password Protection for the CLI 745
Better Protection of Enable and Username Passwords 746
User Mode and Privileged Mode AAA Authentication 747
Using a Default Set of Authentication Methods 748
Using Multiple Authentication Methods 749
Groups of AAA Servers 750
Overriding the Defaults for Login Security 751
PPP Security 752
Layer 2 Security 752
Switch Security Best Practices for Unused and User Ports 753
Port Security 754
Dynamic ARP Inspection 758
DHCP Snooping 761
IP Source Guard 763
802.1X Authentication Using EAP 764
General Layer 2 Security Recommendations 766
Layer 3 Security 768
IP Access Control List Review 769
ACL Rule Summary 770
Wildcard Masks 772
General Layer 3 Security Considerations 772
Smurf Attacks, Directed Broadcasts, and RPF Checks 772
Inappropriate IP Addresses 774
TCP SYN Flood, the Established Bit, and TCP Intercept 775
Foundation Summary 778
Memory Builders 780
Fill in Key Tables from Memory 780
Definitions 781
Further Reading 781
Part VIII Enterprise Wireless Mobility 783
Chapter 22 IEEE 802.11 Fundamentals 785
“Do I Know This Already?” Quiz 785
Foundation Topics 788
802.11 Physical Layer Standards 788
802.11a 788
802.11b 789
802.11g 790
802.11n 791
Comparison of 802.11 Standards 791
Wireless System Configuration 791
Infrastructure Mode Configuration 792
Ad Hoc Mode Configuration 794
Wireless Hardware Components 794
Radio Cards 795
Access Points 795
Antennas 795
Repeaters 796
Bridges 797
Routers 797
Radio Frequency Peripherals 797
Infrastructure Mode Operation 798
Scanning 798
Passive Scanning 798
Active Scanning 799
Connecting with a Network 799
Data Transfer 799
Roaming 800
Ad Hoc Mode Operation 800
Wireless Configuration Parameters 801
SSID 802
RF Channels 803
Transmit Power 804
Data Rates 804
Power-Save Mode 805
RTS/CTS 806
Fragmentation 808
RTS/CTS and Fragmentation Summary 808
Wireless Medium Access 809
Wireless Security 810
WEP 811
TKIP 811
AES 812
WPA 812
Open System Authentication 812
Shared Key Authentication 812
Virtual Private Networks 813
Comparing Wireless Security 813
RF Signal Concepts 814
Modulation 814
RF Signal Characteristics 815
Gain 816
Signal-to-Noise Ratio 816
Spread Spectrum 817
Orthogonal Frequency Division Multiplexing 818
FCC Rules 819 RF Interference 819 Multipath 820
Foundation Summary 822
Memory Builders 822
Definitions 823
Further Reading 823
Chapter 23 Wireless LAN Solutions 825
“Do I Know This Already?” Quiz 825
Foundation Topics 828
Cisco Structured Wireless-Aware Network 828
Wireless Domain Services 828
Intrusion Detection System 829
Cisco SWAN Hardware 831
Cisco Wireless LAN Hardware 832
CiscoWorks Wireless LAN Solution Engine 834
Automatic Access Point Configuration 834
Assisted Site Surveys 835
Centralized Firmware Updates 835
Dynamic Grouping 835
VLAN Configuration 835
Multiple Service Set Identifier Support 835
Customizable Thresholds 835 Fault Status 836
Intrusion Detection System 836
Security Policy Monitoring 836
Secure User Interface 836
Air/RF Scanning and Monitoring 836
Self-Healing Functions 837
Reporting, Trending, Planning, and Troubleshooting 837
Applying Wireless LANs in Enterprises 837
Enterprise Security 837
Voice Services 839
Public Wireless LANs 840
Small Office and Home Wireless LANs 842
Foundation Summary 845
Memory Builders 845
Fill in Key Tables from Memory 845
Definitions 845
Further Reading 845
Part IX OSI and Cisco Device Basics 847
Chapter 24 Miscellaneous Networking Theory and Practices 849
“Do I Know This Already?” Quiz 849
Foundation Topics 851
The OSI and TCP/IP Models 851
OSI Layers 851
OSI Layering Concepts and Benefits 854
OSI Terminology 855
OSI Layer Interactions 856
Router Operation Miscellany 858
Cisco IOS Software Boot Sequences and the Configuration Register 858
The Configuration Register 858
The boot system Command 859
CLI Help Features 860
Foundation Summary 862
Memory Builders 863
Fill in Key Tables from Memory 863
Definitions 863
Part X Appendixes 865
Appendix A Answers to the “Do I Know This Already?” Quizzes 867
Appendix B CCIE Routing and Switching Exam Updates: Version 1.0 891
Appendix C MPLS 895
Appendix D Decimal to Binary Conversion Table 953
Index 958
Part I Bridging and LAN Switching 2
Chapter 1 Ethernet Basics 5
“Do I Know This Already?” Quiz 5
Foundation Topics 8
Ethernet Layer 1: Wiring, Speed, and Duplex 8
RJ-45 Pinouts and Category 5 Wiring 8
Auto-negotiation, Speed, and Duplex 9
CSMA/CD 10
Collision Domains and Switch Buffering 10
Basic Switch Port Configuration 12
Ethernet Layer 2: Framing and Addressing 14
Types of Ethernet Addresses 16
Ethernet Address Formats 17
Protocol Types and the 802.3 Length Field 18
Switching and Bridging Logic 19
Foundation Summary 25
Memory Builders 25
Fill in Key Tables from Memory 25
Definitions 25
Further Reading 25
Chapter 2 Virtual LANs and VLAN Trunking 27
“Do I Know This Already?” Quiz 27
Foundation Topics 31
Virtual LANs 31
VLAN Configuration 31
Using VLAN Database Mode to Create VLANs 32
Using Configuration Mode to Put Interfaces into VLANs 34
Using Configuration Mode to Create VLANs 35
Private VLANs 36
VLAN Trunking Protocol 38
VTP Process and Revision Numbers 39
VTP Configuration 40
Normal-Range and Extended-Range VLANs 42
Storing VLAN Configuration 43
VLAN Trunking: ISL and 802.1Q 44
ISL and 802.1Q Concepts 44
ISL and 802.1Q Configuration 45
Allowed, Active, and Pruned VLANs 48
Trunk Configuration Compatibility 48
Configuring Trunking on Routers 49
802.1Q-in-Q Tunneling 51
Foundation Summary 53
Memory Builders 54
Fill in Key Tables from Memory 54
Definitions 54
Further Reading 55
Chapter 3 Spanning Tree Protocol 57
“Do I Know This Already?” Quiz 57
Foundation Topics 61
802.1D Spanning Tree Protocol 61
Choosing Which Ports Forward: Choosing Root Ports and Designated Ports 61
Electing a Root Switch 61
Determining the Root Port 63
Determining the Designated Port 64
Converging to a New STP Topology 65
Topology Change Notification and Updating the CAM 66
Transitioning from Blocking to Forwarding 67
Per-VLAN Spanning Tree and STP over Trunks 68
STP Configuration and Analysis 70
Optimizing Spanning Tree 73
PortFast, UplinkFast, and BackboneFast 73
PortFast 74
UplinkFast 74
BackboneFast 75
PortFast, UplinkFast, and BackboneFast Configuration 75
PortChannels 76
Load Balancing Across PortChannels 76
PortChannel Discovery and Configuration 77
Rapid Spanning Tree Protocol 78
Multiple Spanning Trees: IEEE 802.1s 80
Protecting STP 82
Root Guard and BPDU Guard: Protecting Access Ports 82
UDLD and Loop Guard: Protecting Trunks 83
Foundation Summary 85
Memory Builders 87
Fill in Key Tables from Memory 87
Definitions 87
Further Reading 87
Part II TCP/IP 89
Chapter 4 IP Addressing 91
“Do I Know This Already?” Quiz 91
Foundation Topics 94
IP Addressing and Subnetting 94
IP Addressing and Subnetting Review 94
Subnetting a Classful Network Number 95
Comments on Classless Addressing 97
Subnetting Math 97
Dissecting the Component Parts of an IP Address 97
Finding Subnet Numbers and Valid Range of IP Addresses-Binary 98
Decimal Shortcuts to Find the Subnet Number and Valid Range of IP Addresses 99
Determining All Subnets of a Network-Binary 102
Determining All Subnets of a Network-Decimal 104
VLSM Subnet Allocation 105
Route Summarization Concepts 107
Finding Inclusive Summary Routes-Binary 108
Finding Inclusive Summary Routes-Decimal 109
Finding Exclusive Summary Routes-Binary 110
CIDR, Private Addresses, and NAT 111
Classless Interdomain Routing 111
Private Addressing 113
Network Address Translation 113
Static NAT 115
Dynamic NAT Without PAT 116
Overloading NAT with Port Address Translation 117
Dynamic NAT and PAT Configuration 118
IP Version 6 119
IPv6 Address Formats 120
Aggregatable Global Unicast Addresses 120
Simple IPv6 Configuration 121
IPv6 Addressing Summary 123
Foundation Summary 125
Memory Builders 128
Fill in Key Tables from Memory 128
Definitions 129
Further Reading 129
Chapter 5 IP Services 131
“Do I Know This Already?” Quiz 131
Foundation Topics 134
ICMP 134
ICMP Unreachable 135
Time Exceeded ICMP Message 136
ICMP Redirect 137
ARP, Proxy ARP, Reverse ARP, BOOTP, and DHCP 137
ARP and Proxy ARP 137
RARP, BOOTP, and DHCP 139
HSRP, VRRP, and GLBP 141
Network Time Protocol 143
Foundation Summary 146
Memory Builders 148
Fill in Key Tables from Memory 148
Definitions 148
Further Reading 149
Chapter 6 TCP/IP Transport and Application Services 151
“Do I Know This Already?” Quiz 151
Foundation Topics 154
TCP and UDP 154
TCP Connections and Port Numbers 155
TCP Error Recovery 157
TCP Dynamic Windowing 157
TCP Header Miscellany 159
TCP/IP Applications 160
Passive and Active Mode FTP 161
Application Authentication and Privacy 163
Network Management and SNMP 163
SNMP Protocol Messages 165
SNMP MIBs 166
SNMP Security 167
Foundation Summary 168
Memory Builders 168
Fill in Key Tables from Memory 168
Definitions 169
Further Reading 169
Part III IP Routing 171
Chapter 7 IP Forwarding (Routing) 173
“Do I Know This Already?” Quiz 173
Foundation Topics 177
IP Forwarding 177
Process Switching, Fast Switching, and Cisco Express Forwarding 178
Building Adjacency Information: ARP and Inverse ARP 179
Frame Relay Inverse ARP 180
Static Configuration of Frame Relay Mapping Information 183 Disabling InARP 184
Classless and Classful Routing 185
Multilayer Switching 186
MLS Logic 186
Using Routed Ports and PortChannels with MLS 187
MLS Configuration 188
Policy Routing 191
Foundation Summary 197
Memory Builders 198
Fill in Key Tables from Memory 198
Definitions 199
Further Reading 199
Chapter 8 RIP Version 2 201
“Do I Know This Already?” Quiz 201
Foundation Topics 204
RIP Version 2 Basics 204
RIP Convergence and Loop Prevention 205
Converged Steady-State Operation 206
Triggered (Flash) Updates and Poisoned Routes 208
RIP Convergence When Routing Updates Cease 210
Convergence Extras 212
RIP Configuration 213
Enabling RIP and the Effects of Autosummarization 214
RIP Authentication Configuration 216
RIP Next-Hop Feature and Split Horizon 219
RIP Offset Lists 220
Route Filtering with Distribute Lists and Prefix Lists 222
Foundation Summary 225
Memory Builders 227
Fill in Key Tables from Memory 227
Definitions 227
Further Reading 227
Chapter 9 EIGRP 229
“Do I Know This Already?” Quiz 229
Foundation Topics 233
EIGRP Basics and Steady-State Operation 233
Hellos, Neighbors, and Adjacencies 233
EIGRP Updates 236
The EIGRP Topology Table 238
EIGRP Convergence 240
Input Events and Local Computation 241
Going Active on a Route 243
Stuck-in-Active 245
Limiting Query Scope 246
EIGRP Configuration 246
EIGRP Configuration Example 246
EIGRP Load Balancing 249
EIGRP Configuration Options That Are Similar to RIP 250
Foundation Summary 251
Memory Builders 253
Fill in Key Tables from Memory 253
Definitions 253
Further Reading 253
Chapter 10 OSPF 255
“Do I Know This Already?” Quiz 255
Foundation Topics 260
OSPF Database Exchange 260
OSPF Router IDs 260
Becoming Neighbors, Exchanging Databases, and Becoming Adjacent 261
Becoming Neighbors: The Hello Process 263
Flooding LSA Headers to Neighbors 264
Requesting, Getting, and Acknowledging LSAs 265
Designated Routers on LANs 266
Designated Router Optimization on LANs 266
DR Election on LANs 268
Designated Routers on WANs and OSPF Network Types 269
Caveats Regarding OSPF Network Types over NBMA Networks 270
Example of OSPF Network Types and NBMA 271
SPF Calculation 274
Steady-State Operation 275
OSPF Design and LSAs 275
OSPF Design Terms 276
LSA Types and Network Types 277
LSA Types 1 and 2 278
LSA Type 3 and Inter-Area Costs 281
LSA Types 4 and 5, and External Route Types 1 and 2 284
OSPF Design in Light of LSA Types 286
Stubby Areas 287
OSPF Configuration 290
OSPF Costs and Clearing the OSPF Process 292
Alternatives to the OSPF Network Command 295
OSPF Filtering 295
Filtering Routes Using the distribute-list Command 295
OSPF ABR LSA Type 3 Filtering 297
Filtering Type 3 LSAs with the area range Command 299
Virtual Link Configuration 299
Configuring OSPF Authentication 301
OSPF Stub Router Configuration 303
Foundation Summary 305
Memory Builders 310
Fill in Key Tables from Memory 310
Definitions 310
Further Reading 311
Chapter 11 IGP Route Redistribution, Route Summarization, and Default Routing 313
“Do I Know This Already?” Quiz 313
Foundation Topics 317
Route Maps, Prefix Lists, and Administrative Distance 317
Configuring Route Maps with the route-map Command 317
Route Map match Commands for Route Redistribution 319
Route Map set Commands for Route Redistribution 320
IP Prefix Lists 321
Administrative Distance 323
Route Redistribution 324
The Mechanics of the redistribute Command 324
Redistribution Using Default Settings 325
Setting Metrics, Metric Types, and Tags 328
Redistributing a Subset of Routes Using a Route Map 329
Mutual Redistribution at Multiple Routers 333
Preventing Suboptimal Routes by Setting the Administrative Distance 335
Preventing Suboptimal Routes by Using Route Tags 338
Using Metrics and Metric Types to Influence Redistributed Routes 340
Route Summarization 342
EIGRP Route Summarization 344
OSPF Route Summarization 344
RIP Route Summarization 345
Default Routes 345
Using Static Routes to 0.0.0.0, with redistribute static 347
Using the default-information originate Command 348
Using the ip default-network Command 349
Using Route Summarization to Create Default Routes 350
Foundation Summary 352
Memory Builders 353
Fill in Key Tables from Memory 353
Definitions 353
Further Reading 353
Chapter 12 Fundamental BGP Operations 355
“Do I Know This Already?” Quiz 355
Foundation Topics 360
Building BGP Neighbor Relationships 361
Internal BGP Neighbors 362
External BGP Neighbors 365
Checks Before Becoming BGP Neighbors 366
BGP Messages and Neighbor States 368
BGP Message Types 368
Purposefully Resetting BGP Peer Connections 369
Building the BGP Table 370
Injecting Routes/Prefixes into the BGP Table 370
The BGP network Command 370
Redistributing from an IGP, Static, or Connected Route 373
The Impact of Auto-Summary on Redistributed Routes and the network Command 375
Manual Summaries and the AS_PATH Path Attribute 378
Adding Default Routes to BGP 381 The ORIGIN Path Attribute 382
Advertising BGP Routes to Neighbors 383
The BGP Update Message 383
Determining the Contents of Updates 384
Example: Impact of the Decision Process and NEXT_HOP on BGP Updates 386
Summary of Rules for Routes Advertised in BGP Updates 392
Building the IP Routing Table 392
Adding eBGP Routes to the IP Routing Table 392
Backdoor Routes 393
Adding iBGP Routes to the IP Routing Table 394
Using Sync and Redistributing Routes 396
Disabling Sync and Using BGP on All Routers in an AS 398
Confederations 399
Configuring Confederations 401
Route Reflectors 404
Foundation Summary 410
Memory Builders 414
Fill in Key Tables from Memory 414
Definitions 414
Further Reading 415
Chapter 13 BGP Routing Policies 417
“Do I Know This Already?” Quiz 417
Foundation Topics 423
Route Filtering and Route Summarization 423
Filtering BGP Updates Based on NLRI 424
Route Map Rules for NLRI Filtering 427
Soft Reconfiguration 428
Comparing BGP Prefix Lists, Distribute Lists, and Route Maps 428
Filtering Subnets of a Summary Using the aggregate-address Command 429
Filtering BGP Updates by Matching the AS_PATH PA 430
The BGP AS_PATH and AS_PATH Segment Types 431
Using Regular Expressions to Match AS_PATH 433
Example: Matching AS_PATHs Using AS_PATH Filters 436
Matching AS_SET and AS_CONFED_SEQ 439
BGP Path Attributes and the BGP Decision Process 442
Generic Terms and Characteristics of BGP PAs 442
The BGP Decision Process 444
Clarifications of the BGP Decision Process 445
Two Final Tiebreaker Steps in the BGP Decision Process 445
Adding Multiple BGP Routes to the IP Routing Table 446
Mnemonics for Memorizing the Decision Process 446
Configuring BGP Policies 448
Background: BGP PAs and Features Used by Routing Policies 448
Step 0: NEXT_HOP Reachable 450
Step 1: Administrative Weight 450
Step 2: Highest Local Preference (LOCAL_PREF) 453
Step 3: Choose Between Locally Injected Routes Based on ORIGIN PA 456
Step 4: Shortest AS_PATH 457
Removing Private ASNs 457
AS_PATH Prepending and Route Aggregation 458
Step 5: Best ORIGIN PA 461
Step 6: Smallest Multi-Exit Discriminator 461
Configuring MED: Single Adjacent AS 463
Configuring MED: Multiple Adjacent Autonomous Systems 464
The Scope of MED 464
Step 7: Prefer Neighbor Type eBGP over iBGP 465
Step 8: Smallest IGP Metric to the NEXT_HOP 465
The maximum-paths Command and BGP Decision Process Tiebreakers 465
Step 9: Lowest BGP Router ID of Advertising Router (with One Exception) 466
Step 10: Lowest Neighbor ID 466
The BGP maximum-paths Command 466
BGP Communities 468
Matching COMMUNITY with Community Lists 472
Removing COMMUNITY Values 473
Filtering NLRI Using Special COMMUNITY Values 474
Foundation Summary 476
Memory Builders 480
Fill in Key Tables from Memory 480
Definitions 480
Further Reading 480
Part IV Quality of Service 483
Chapter 14 Classification and Marking 485
“Do I Know This Already?” Quiz 485
Foundation Topics 489
Fields That Can Be Marked for QoS Purposes 489
IP Precedence and DSCP Compared 489
DSCP Settings and Terminology 490
The Class Selector PHB and DSCP Values 491
The Assured Forwarding PHB and DSCP Values 491
The Expedited Forwarding PHB and DSCP Values 492
Non-IP Header Marking Fields 493
Ethernet LAN Class of Service 493
WAN Marking Fields 493
Locations for Marking and Matching 494
Cisco Modular QoS CLI 495
The Mechanics of MQC 496
Classification Using Class Maps 497
Using Multiple match Commands 498
Classification Using NBAR 499
Classification and Marking Tools 500
Class-Based Marking (CB Marking) Configuration 500
CB Marking Example 501
CB Marking of CoS and DSCP 505
Network-Based Application Recognition 507
CB Marking Design Choices 508
Marking Using Policers 509
Policy Routing for Marking 510
Foundation Summary 511
Memory Builders 513
Fill in Key Tables from Memory 513
Definitions 513
Further Reading 513
Chapter 15 Congestion Management and Avoidance 515
“Do I Know This Already?” Quiz 515
Foundation Topics 519
Cisco Router Queuing Concepts 519
Software Queues and Hardware Queues 519
Queuing on Interfaces Versus Subinterfaces and Virtual Circuits 520
Comparing Queuing Tools 520
Queuing Tools: FIFO, PQ, CQ, WFQ, CBWFQ, and LLQ 521
FIFO Queuing 521
Priority Queuing 522
Custom Queuing 523
Weighted Fair Queuing 524
WFQ Scheduler: The Process 525
WFQ Drop Policy, Number of Queues, and Queue Lengths 526
Types of WFQ Queues 527
WFQ Configuration 527
Class-Based WFQ and Low-Latency Queuing 529
CBWFQ Basic Features and Configuration 529
Defining and Limiting CBWFQ Bandwidth 532
Low-Latency Queuing 534
Defining and Limiting LLQ Bandwidth 537
LLQ with More Than One Priority Queue 538
Miscellaneous CBWFQ/LLQ Topics 538
Queuing Summary 538
Weighted Random Early Detection 539
How WRED Weights Packets 541
WRED Configuration 542
LAN Switch Congestion Management and Avoidance 542
Cisco 3550 Switch Egress Queuing 543
Cisco 3550 Congestion Avoidance 545
Comparisons Between Cisco 3550 and 2950 Switches 547
Foundation Summary 549
Memory Builders 549
Fill in Key Tables from Memory 549
Definitions 549
Further Reading 549
Chapter 16 Shaping and Policing 551
“Do I Know This Already?” Quiz 551
Foundation Topics 555
Traffic-Shaping Concepts 555
Shaping Terminology 555
Shaping with an Excess Burst 557
Underlying Mechanics of Shaping 557
Traffic-Shaping Adaptation on Frame Relay Networks 559
Class-Based Shaping Configuration 559
Tuning Shaping for Voice Using LLQ and a Small Tc 561
Configuring Shaping by Bandwidth Percent 564
CB Shaping to a Peak Rate 565
Adaptive Shaping 565
Frame Relay Traffic Shaping Configuration 565
FRTS Configuration Using the traffic-rate Command 567
Setting FRTS Parameters Explicitly 568
FRTS Configuration Using LLQ 569
FRTS Adaptive Shaping 570
Policing Concepts and Configuration 571
CB Policing Concepts 571
Single-Rate, Two-Color Policing (One Bucket) 571
Single-Rate, Three-Color Policer (Two Buckets) 573
Two-Rate, Three-Color Policer (Two Buckets) 573
Class-Based Policing Configuration 575
Single-Rate, Three-Color Policing of All Traffic 575
Policing a Subset of the Traffic 576
CB Policing Defaults for Bc and Be 577
Configuring Dual-Rate Policing 577
Multi-Action Policing 578
Policing by Percentage 578
Committed Access Rate 579
Foundation Summary 582
Memory Builders 584
Fill in Key Tables from Memory 584
Definitions 584
Further Reading 585
Part V WAN 587
Chapter 17 Synchronous Serial Links and Protocols 589
“Do I Know This Already?” Quiz 589
Foundation Topics 592
Synchronous Serial Links 592
T1 Framing and Encoding 592
T1 Alarms 594
Carrier Detect and Interface Resets 594
Point-to-Point Protocol 595
PPP Link Control Protocol 596
Basic LCP/PPP Configuration 597
Multilink PPP 598
MLP Link Fragmentation and Interleaving 600
PPP Compression 601
PPP Layer 2 Payload Compression 602
Header Compression 602
Foundation Summary 604
Memory Builders 605
Fill in Key Tables from Memory 605
Definitions 605
Further Reading 605
Chapter 18 Frame Relay 607
“Do I Know This Already?” Quiz 607
Foundation Topics 610
Frame Relay Concepts 610
Frame Relay Data Link Connection Identifiers 610
Local Management Interface 611
Frame Relay Headers and Encapsulation 612
Frame Relay Congestion: DE, BECN, and FECN 613
Adaptive Shaping, FECN, and BECN 614
The Discard Eligibility Bit 615
Frame Relay Configuration 615
Frame Relay Configuration Basics 615
Frame Relay Payload Compression 619
Frame Relay Fragmentation 620
Foundation Summary 623
Memory Builders 624
Fill in Key Tables from Memory 624
Definitions 625
Further Reading 625
Part VI IP Multicast 627
Chapter 19 Introduction to IP Multicasting 629
“Do I Know This Already?” Quiz 629
Foundation Topics 632
Why Do You Need Multicasting? 632
Problems with Unicast and Broadcast Methods 632
How Multicasting Provides a Scalable and Manageable Solution 635
Multicast IP Addresses 638
Multicast Address Range and Structure 638
Well-Known Multicast Addresses 638
Multicast Addresses for Permanent Groups 639
Multicast Addresses for Source-Specific Multicast Applications and Protocols 640
Multicast Addresses for GLOP Addressing 640
Multicast Addresses for Private Multicast Domains 640
Multicast Addresses for Transient Groups 641
Summary of Multicast Address Ranges 641
Mapping IP Multicast Addresses to MAC Addresses 642
Managing Distribution of Multicast Traffic with IGMP 643
Joining a Group 644
Internet Group Management Protocol 645
IGMP Version 1 645
IGMPv1 Host Membership Query Functions 646
IGMPv1 Host Membership Report Functions 647
IGMPv1 Leave Mechanism 651
IGMPv1 Querier 651
IGMP Version 2 651
IGMPv2 Leave Group and Group-Specific Query Messages 654
IGMPv2 Querier 656
IGMPv1 and IGMPv2 Interoperability 657
IGMPv2 Host and IGMPv1 Routers 657
IGMPv1 Host and IGMPv2 Routers 658
IGMPv1 and IGMPv2 Routers 658
Timers Used in IGMPv1 and IGMPv2 659
IGMP Version 3 659
Comparison of IGMPv1, IGMPv2, and IGMPv3 661
Multicast Listener Discovery Protocol 662
LAN Multicast Optimizations 662
Cisco Group Management Protocol 663
IGMP Snooping 669
Router-Port Group Management Protocol 673
Foundation Summary 676
Memory Builders 676
Fill in Key Tables from Memory 677
Definitions 677
Further Reading 677
References in This Chapter 677
Chapter 20 IP Multicast Routing 679
“Do I Know This Already?” Quiz 679
Foundation Topics 683
Multicast Routing Basics 683
Overview of Multicast Routing Protocols 684
Multicast Forwarding Using Dense Mode 684
Reverse-Path-Forwarding Check 685
Multicast Forwarding Using Sparse Mode 687
Multicast Scoping 689
TTL Scoping 689
Administrative Scoping 690
Dense-Mode Routing Protocols 690
Operation of Protocol Independent Multicast Dense Mode 691
Forming PIM Adjacencies Using PIM Hello Messages 691
Source-Based Distribution Trees 692
Prune Message 693
PIM-DM: Reacting to a Failed Link 695
Rules for Pruning 697
Steady-State Operation and the State Refresh Message 699
Graft Message 700
LAN-Specific Issues with PIM-DM and PIM-SM 702
Prune Override 702
Assert Message 703
Designated Router 704
Summary of PIM-DM Messages 705
Distance Vector Multicast Routing Protocol 706
Multicast Open Shortest Path First 706
Sparse-Mode Routing Protocols 707
Operation of Protocol Independent Multicast Sparse Mode 707
Similarities Between PIM-DM and PIM-SM 707
Sources Sending Packets to the Rendezvous Point 708
Joining the Shared Tree 710
Completion of the Source Registration Process 712
Shared Distribution Tree 714
Steady-State Operation by Continuing to Send Joins 715
Examining the RP’s Multicast Routing Table 716
Shortest-Path Tree Switchover 717
Pruning from the Shared Tree 719
Dynamically Finding RPs and Using Redundant RPs 720
Dynamically Finding the RP Using Auto-RP 721
Dynamically Finding the RP Using BSR 724
Anycast RP with MSDP 726
Summary: Finding the RP 728
Bidirectional PIM 729
Comparison of PIM-DM and PIM-SM 730
Foundation Summary 732
Memory Builders 736
Fill in Key Tables from Memory 736
Definitions 736
Further Reading 737
Part VII Security 739
Chapter 21 Security 741
“Do I Know This Already?” Quiz 741
Foundation Topics 745
Router and Switch Device Security 745
Simple Password Protection for the CLI 745
Better Protection of Enable and Username Passwords 746
User Mode and Privileged Mode AAA Authentication 747
Using a Default Set of Authentication Methods 748
Using Multiple Authentication Methods 749
Groups of AAA Servers 750
Overriding the Defaults for Login Security 751
PPP Security 752
Layer 2 Security 752
Switch Security Best Practices for Unused and User Ports 753
Port Security 754
Dynamic ARP Inspection 758
DHCP Snooping 761
IP Source Guard 763
802.1X Authentication Using EAP 764
General Layer 2 Security Recommendations 766
Layer 3 Security 768
IP Access Control List Review 769
ACL Rule Summary 770
Wildcard Masks 772
General Layer 3 Security Considerations 772
Smurf Attacks, Directed Broadcasts, and RPF Checks 772
Inappropriate IP Addresses 774
TCP SYN Flood, the Established Bit, and TCP Intercept 775
Foundation Summary 778
Memory Builders 780
Fill in Key Tables from Memory 780
Definitions 781
Further Reading 781
Part VIII Enterprise Wireless Mobility 783
Chapter 22 IEEE 802.11 Fundamentals 785
“Do I Know This Already?” Quiz 785
Foundation Topics 788
802.11 Physical Layer Standards 788
802.11a 788
802.11b 789
802.11g 790
802.11n 791
Comparison of 802.11 Standards 791
Wireless System Configuration 791
Infrastructure Mode Configuration 792
Ad Hoc Mode Configuration 794
Wireless Hardware Components 794
Radio Cards 795
Access Points 795
Antennas 795
Repeaters 796
Bridges 797
Routers 797
Radio Frequency Peripherals 797
Infrastructure Mode Operation 798
Scanning 798
Passive Scanning 798
Active Scanning 799
Connecting with a Network 799
Data Transfer 799
Roaming 800
Ad Hoc Mode Operation 800
Wireless Configuration Parameters 801
SSID 802
RF Channels 803
Transmit Power 804
Data Rates 804
Power-Save Mode 805
RTS/CTS 806
Fragmentation 808
RTS/CTS and Fragmentation Summary 808
Wireless Medium Access 809
Wireless Security 810
WEP 811
TKIP 811
AES 812
WPA 812
Open System Authentication 812
Shared Key Authentication 812
Virtual Private Networks 813
Comparing Wireless Security 813
RF Signal Concepts 814
Modulation 814
RF Signal Characteristics 815
Gain 816
Signal-to-Noise Ratio 816
Spread Spectrum 817
Orthogonal Frequency Division Multiplexing 818
FCC Rules 819 RF Interference 819 Multipath 820
Foundation Summary 822
Memory Builders 822
Definitions 823
Further Reading 823
Chapter 23 Wireless LAN Solutions 825
“Do I Know This Already?” Quiz 825
Foundation Topics 828
Cisco Structured Wireless-Aware Network 828
Wireless Domain Services 828
Intrusion Detection System 829
Cisco SWAN Hardware 831
Cisco Wireless LAN Hardware 832
CiscoWorks Wireless LAN Solution Engine 834
Automatic Access Point Configuration 834
Assisted Site Surveys 835
Centralized Firmware Updates 835
Dynamic Grouping 835
VLAN Configuration 835
Multiple Service Set Identifier Support 835
Customizable Thresholds 835 Fault Status 836
Intrusion Detection System 836
Security Policy Monitoring 836
Secure User Interface 836
Air/RF Scanning and Monitoring 836
Self-Healing Functions 837
Reporting, Trending, Planning, and Troubleshooting 837
Applying Wireless LANs in Enterprises 837
Enterprise Security 837
Voice Services 839
Public Wireless LANs 840
Small Office and Home Wireless LANs 842
Foundation Summary 845
Memory Builders 845
Fill in Key Tables from Memory 845
Definitions 845
Further Reading 845
Part IX OSI and Cisco Device Basics 847
Chapter 24 Miscellaneous Networking Theory and Practices 849
“Do I Know This Already?” Quiz 849
Foundation Topics 851
The OSI and TCP/IP Models 851
OSI Layers 851
OSI Layering Concepts and Benefits 854
OSI Terminology 855
OSI Layer Interactions 856
Router Operation Miscellany 858
Cisco IOS Software Boot Sequences and the Configuration Register 858
The Configuration Register 858
The boot system Command 859
CLI Help Features 860
Foundation Summary 862
Memory Builders 863
Fill in Key Tables from Memory 863
Definitions 863
Part X Appendixes 865
Appendix A Answers to the “Do I Know This Already?” Quizzes 867
Appendix B CCIE Routing and Switching Exam Updates: Version 1.0 891
Appendix C MPLS 895
Appendix D Decimal to Binary Conversion Table 953
Index 958
猜您喜欢