书籍详情

CCIE路由与交换认证考试指南(第二版 英文版)

CCIE路由与交换认证考试指南(第二版 英文版)

作者:(美)奥登

出版社:人民邮电

出版时间:2007-02-01

ISBN:9787115155085

定价:¥148.00

购买这本书可以去
内容简介
  本书讲述了Cisco认证考试CCIE路由与交换(R&S)笔试所涉及的全部内容,此外,还介绍了CCIE服务提供商书面考试中与网络相关的内容。全书内容包括网络概念、设备操作、桥接与局域网(LAN)交换技术、广域网(WAN)、IP及IP路由选择协议、网络安全性以及多服务网络等。本书在介绍基本内容的同时,还提供了多种评估工具,以检查自己对某些内容的掌握情况。这些评估工具包括小测试、问题与答案、实践模拟练习以及CD-ROM中提供的200多道练习题。随书光盘中包含本书英文版的电子文档(以PDF格式提供)和500余道CCIE路由与交换考试模拟试题。本书适合准备参加CCIE认证考试的读者,也可供相关网络技术人员参考。.本书是优秀的Cisco认证考试指南,专门针对CCIE路由与交换考试内容编写。作者足著名的资深讲师和畅销书作者,在本书中将自己的备考和考试技巧与读者分享,帮助读者找出薄弱环节,增强理论知识与实践能力。本书行文简洁,旨在加强读者对考试主题的理解和记忆。..书中以一系列经实践证明十分有效的方法,向读者展示了一条清晰的备考路线。每章开头的“Do I Know This Already”测验帮助读者确定如何分配学习时间。考试主题列表和总结图表便于读者参考,在需要时还可以进行快速复习。章末的复习题帮助读者评估自己对知识的掌握程度并巩固重要概念。配套光盘中功能强大的测试引擎真实地模拟CCIE路由与交换考试,帮助读者尽快适应考试环境,并能记录考试成绩、提供反馈信息,进而指出需要进一步复习的内容,以便读者集中精力突破难关。在第二版的修订中对第一版的细节层次、评估特征和具有挑战性的复习题与练习都进行了周密的考虑和调整,以更好地帮助读者掌握概念和技术,顺利通过考试。...
作者简介
  本书提供作译者介绍Wendell Odom, CCIE No. 1624, is a senior instructor with Skyline Advanced Technology Services (http://www.skyline-ats.com), where he teaches the QOS, CCIE, and SAN courses. Wendell has worked in the networking arena for 20 years, with jobs in pre- and post-sales technical consulting, teaching, and course development. He has authored several Cisco Press books, including the bestselling CCNA INTRO and ICND Exam Certification Guides, the Cisco QoS...
目录
Contents
Part I Bridging and LAN Switching 2
Chapter 1 Ethernet Basics 5
 “Do I Know This Already?” Quiz 5
 Foundation Topics 8
  Ethernet Layer 1: Wiring, Speed, and Duplex 8
   RJ-45 Pinouts and Category 5 Wiring 8
   Auto-negotiation, Speed, and Duplex 9
    CSMA/CD 10
    Collision Domains and Switch Buffering 10
   Basic Switch Port Configuration 12
  Ethernet Layer 2: Framing and Addressing 14
   Types of Ethernet Addresses 16
   Ethernet Address Formats 17
   Protocol Types and the 802.3 Length Field 18
  Switching and Bridging Logic 19
 Foundation Summary 25
  Memory Builders 25
   Fill in Key Tables from Memory 25
   Definitions 25
   Further Reading 25
Chapter 2 Virtual LANs and VLAN Trunking 27
 “Do I Know This Already?” Quiz 27
 Foundation Topics 31
  Virtual LANs 31
   VLAN Configuration 31
    Using VLAN Database Mode to Create VLANs 32
    Using Configuration Mode to Put Interfaces into VLANs 34
    Using Configuration Mode to Create VLANs 35
   Private VLANs 36
  VLAN Trunking Protocol 38
   VTP Process and Revision Numbers 39
   VTP Configuration 40
    Normal-Range and Extended-Range VLANs 42
    Storing VLAN Configuration 43
  VLAN Trunking: ISL and 802.1Q 44
   ISL and 802.1Q Concepts 44
   ISL and 802.1Q Configuration 45
    Allowed, Active, and Pruned VLANs 48
    Trunk Configuration Compatibility 48
   Configuring Trunking on Routers 49
   802.1Q-in-Q Tunneling 51
 Foundation Summary 53
  Memory Builders 54
   Fill in Key Tables from Memory 54
   Definitions 54
   Further Reading 55
Chapter 3 Spanning Tree Protocol 57
 “Do I Know This Already?” Quiz 57
 Foundation Topics 61
  802.1D Spanning Tree Protocol 61
   Choosing Which Ports Forward: Choosing Root Ports and Designated Ports 61
    Electing a Root Switch 61
    Determining the Root Port 63
    Determining the Designated Port 64
   Converging to a New STP Topology 65
    Topology Change Notification and Updating the CAM 66
    Transitioning from Blocking to Forwarding 67
   Per-VLAN Spanning Tree and STP over Trunks 68
   STP Configuration and Analysis 70
  Optimizing Spanning Tree 73
   PortFast, UplinkFast, and BackboneFast 73
    PortFast 74
    UplinkFast 74
    BackboneFast 75
    PortFast, UplinkFast, and BackboneFast Configuration 75
   PortChannels 76
    Load Balancing Across PortChannels 76
    PortChannel Discovery and Configuration 77
   Rapid Spanning Tree Protocol 78
   Multiple Spanning Trees: IEEE 802.1s 80
  Protecting STP 82
   Root Guard and BPDU Guard: Protecting Access Ports 82
   UDLD and Loop Guard: Protecting Trunks 83
 Foundation Summary 85
  Memory Builders 87
   Fill in Key Tables from Memory 87
   Definitions 87
   Further Reading 87
Part II TCP/IP 89
Chapter 4 IP Addressing 91
 “Do I Know This Already?” Quiz 91
 Foundation Topics 94
  IP Addressing and Subnetting 94
   IP Addressing and Subnetting Review 94
    Subnetting a Classful Network Number 95
    Comments on Classless Addressing 97
   Subnetting Math 97
    Dissecting the Component Parts of an IP Address 97
    Finding Subnet Numbers and Valid Range of IP Addresses-Binary 98
    Decimal Shortcuts to Find the Subnet Number and Valid Range of IP Addresses 99
    Determining All Subnets of a Network-Binary 102
    Determining All Subnets of a Network-Decimal 104
   VLSM Subnet Allocation 105
   Route Summarization Concepts 107
    Finding Inclusive Summary Routes-Binary 108
    Finding Inclusive Summary Routes-Decimal 109
    Finding Exclusive Summary Routes-Binary 110
  CIDR, Private Addresses, and NAT 111
   Classless Interdomain Routing 111
   Private Addressing 113
   Network Address Translation 113
    Static NAT 115
    Dynamic NAT Without PAT 116
    Overloading NAT with Port Address Translation 117
    Dynamic NAT and PAT Configuration 118
  IP Version 6 119
   IPv6 Address Formats 120
   Aggregatable Global Unicast Addresses 120
   Simple IPv6 Configuration 121
   IPv6 Addressing Summary 123
 Foundation Summary 125
  Memory Builders 128
   Fill in Key Tables from Memory 128
   Definitions 129
   Further Reading 129
Chapter 5 IP Services 131
 “Do I Know This Already?” Quiz 131
 Foundation Topics 134
  ICMP 134
   ICMP Unreachable 135
   Time Exceeded ICMP Message 136
   ICMP Redirect 137
  ARP, Proxy ARP, Reverse ARP, BOOTP, and DHCP 137
   ARP and Proxy ARP 137
   RARP, BOOTP, and DHCP 139
  HSRP, VRRP, and GLBP 141
  Network Time Protocol 143
 Foundation Summary 146
  Memory Builders 148
   Fill in Key Tables from Memory 148
   Definitions 148
   Further Reading 149
Chapter 6 TCP/IP Transport and Application Services 151
 “Do I Know This Already?” Quiz 151
 Foundation Topics 154
  TCP and UDP 154
   TCP Connections and Port Numbers 155
   TCP Error Recovery 157
   TCP Dynamic Windowing 157
   TCP Header Miscellany 159
  TCP/IP Applications 160
   Passive and Active Mode FTP 161
   Application Authentication and Privacy 163
  Network Management and SNMP 163
   SNMP Protocol Messages 165
   SNMP MIBs 166
   SNMP Security 167
 Foundation Summary 168
  Memory Builders 168
   Fill in Key Tables from Memory 168
   Definitions 169
   Further Reading 169
Part III IP Routing 171
Chapter 7 IP Forwarding (Routing) 173
 “Do I Know This Already?” Quiz 173
 Foundation Topics 177
  IP Forwarding 177
   Process Switching, Fast Switching, and Cisco Express Forwarding 178
   Building Adjacency Information: ARP and Inverse ARP 179
    Frame Relay Inverse ARP 180
    Static Configuration of Frame Relay Mapping Information 183     Disabling InARP 184
   Classless and Classful Routing 185
  Multilayer Switching 186
   MLS Logic 186
   Using Routed Ports and PortChannels with MLS 187
   MLS Configuration 188
  Policy Routing 191
 Foundation Summary 197
  Memory Builders 198
   Fill in Key Tables from Memory 198
   Definitions 199
   Further Reading 199
Chapter 8 RIP Version 2 201
 “Do I Know This Already?” Quiz 201
 Foundation Topics 204
  RIP Version 2 Basics 204
  RIP Convergence and Loop Prevention 205
   Converged Steady-State Operation 206
   Triggered (Flash) Updates and Poisoned Routes 208
   RIP Convergence When Routing Updates Cease 210
   Convergence Extras 212
  RIP Configuration 213
   Enabling RIP and the Effects of Autosummarization 214
   RIP Authentication Configuration 216
   RIP Next-Hop Feature and Split Horizon 219
   RIP Offset Lists 220
   Route Filtering with Distribute Lists and Prefix Lists 222
 Foundation Summary 225
  Memory Builders 227
   Fill in Key Tables from Memory 227
   Definitions 227
   Further Reading 227
Chapter 9 EIGRP 229
 “Do I Know This Already?” Quiz 229
 Foundation Topics 233
  EIGRP Basics and Steady-State Operation 233
   Hellos, Neighbors, and Adjacencies 233
   EIGRP Updates 236
   The EIGRP Topology Table 238
  EIGRP Convergence 240
   Input Events and Local Computation 241
   Going Active on a Route 243
    Stuck-in-Active 245
    Limiting Query Scope 246
  EIGRP Configuration 246
   EIGRP Configuration Example 246
   EIGRP Load Balancing 249
   EIGRP Configuration Options That Are Similar to RIP 250
 Foundation Summary 251
  Memory Builders 253
   Fill in Key Tables from Memory 253
   Definitions 253
   Further Reading 253
Chapter 10 OSPF 255
 “Do I Know This Already?” Quiz 255
 Foundation Topics 260
  OSPF Database Exchange 260
   OSPF Router IDs 260
   Becoming Neighbors, Exchanging Databases, and Becoming Adjacent 261
    Becoming Neighbors: The Hello Process 263
    Flooding LSA Headers to Neighbors 264
    Requesting, Getting, and Acknowledging LSAs 265
   Designated Routers on LANs 266
    Designated Router Optimization on LANs 266
    DR Election on LANs 268
   Designated Routers on WANs and OSPF Network Types 269
    Caveats Regarding OSPF Network Types over NBMA Networks 270
    Example of OSPF Network Types and NBMA 271
   SPF Calculation 274
   Steady-State Operation 275
  OSPF Design and LSAs 275
   OSPF Design Terms 276
   LSA Types and Network Types 277
    LSA Types 1 and 2 278
    LSA Type 3 and Inter-Area Costs 281
    LSA Types 4 and 5, and External Route Types 1 and 2 284
    OSPF Design in Light of LSA Types 286
   Stubby Areas 287
  OSPF Configuration 290
    OSPF Costs and Clearing the OSPF Process 292
    Alternatives to the OSPF Network Command 295
   OSPF Filtering 295
    Filtering Routes Using the distribute-list Command 295
    OSPF ABR LSA Type 3 Filtering 297
    Filtering Type 3 LSAs with the area range Command 299
   Virtual Link Configuration 299
   Configuring OSPF Authentication 301
   OSPF Stub Router Configuration 303
 Foundation Summary 305
  Memory Builders 310
   Fill in Key Tables from Memory 310
   Definitions 310
   Further Reading 311
Chapter 11 IGP Route Redistribution, Route Summarization, and Default Routing 313
 “Do I Know This Already?” Quiz 313
 Foundation Topics 317
  Route Maps, Prefix Lists, and Administrative Distance 317
   Configuring Route Maps with the route-map Command 317
    Route Map match Commands for Route Redistribution 319
    Route Map set Commands for Route Redistribution 320
   IP Prefix Lists 321
   Administrative Distance 323
  Route Redistribution 324
   The Mechanics of the redistribute Command 324
    Redistribution Using Default Settings 325
    Setting Metrics, Metric Types, and Tags 328
   Redistributing a Subset of Routes Using a Route Map 329
   Mutual Redistribution at Multiple Routers 333
    Preventing Suboptimal Routes by Setting the Administrative Distance 335
    Preventing Suboptimal Routes by Using Route Tags 338
    Using Metrics and Metric Types to Influence Redistributed Routes 340
  Route Summarization 342
   EIGRP Route Summarization 344
   OSPF Route Summarization 344
   RIP Route Summarization 345
  Default Routes 345
Using Static Routes to 0.0.0.0, with redistribute static 347
    Using the default-information originate Command 348
   Using the ip default-network Command 349
   Using Route Summarization to Create Default Routes 350
 Foundation Summary 352
  Memory Builders 353
   Fill in Key Tables from Memory 353
   Definitions 353
   Further Reading 353
Chapter 12 Fundamental BGP Operations 355
 “Do I Know This Already?” Quiz 355
 Foundation Topics 360
  Building BGP Neighbor Relationships 361
   Internal BGP Neighbors 362
   External BGP Neighbors 365
   Checks Before Becoming BGP Neighbors 366
   BGP Messages and Neighbor States 368
    BGP Message Types 368
    Purposefully Resetting BGP Peer Connections 369
  Building the BGP Table 370
   Injecting Routes/Prefixes into the BGP Table 370
    The BGP network Command 370
    Redistributing from an IGP, Static, or Connected Route 373
    The Impact of Auto-Summary on Redistributed Routes and the network Command 375
    Manual Summaries and the AS_PATH Path Attribute 378
    Adding Default Routes to BGP 381 The ORIGIN Path Attribute 382
   Advertising BGP Routes to Neighbors 383
    The BGP Update Message 383
    Determining the Contents of Updates 384
    Example: Impact of the Decision Process and NEXT_HOP on BGP Updates 386
    Summary of Rules for Routes Advertised in BGP Updates 392
  Building the IP Routing Table 392
   Adding eBGP Routes to the IP Routing Table 392
   Backdoor Routes 393
   Adding iBGP Routes to the IP Routing Table 394
    Using Sync and Redistributing Routes 396
    Disabling Sync and Using BGP on All Routers in an AS 398
    Confederations 399
    Configuring Confederations 401
    Route Reflectors 404
 Foundation Summary 410
  Memory Builders 414
   Fill in Key Tables from Memory 414
   Definitions 414
   Further Reading 415
Chapter 13 BGP Routing Policies 417
 “Do I Know This Already?” Quiz 417
 Foundation Topics 423
  Route Filtering and Route Summarization 423
   Filtering BGP Updates Based on NLRI 424
    Route Map Rules for NLRI Filtering 427
    Soft Reconfiguration 428
    Comparing BGP Prefix Lists, Distribute Lists, and Route Maps 428
   Filtering Subnets of a Summary Using the aggregate-address Command 429
   Filtering BGP Updates by Matching the AS_PATH PA 430
    The BGP AS_PATH and AS_PATH Segment Types 431
    Using Regular Expressions to Match AS_PATH 433
    Example: Matching AS_PATHs Using AS_PATH Filters 436
    Matching AS_SET and AS_CONFED_SEQ 439
  BGP Path Attributes and the BGP Decision Process 442
   Generic Terms and Characteristics of BGP PAs 442
   The BGP Decision Process 444
   Clarifications of the BGP Decision Process 445
Two Final Tiebreaker Steps in the BGP Decision Process 445
   Adding Multiple BGP Routes to the IP Routing Table 446
   Mnemonics for Memorizing the Decision Process 446
  Configuring BGP Policies 448
   Background: BGP PAs and Features Used by Routing Policies 448
   Step 0: NEXT_HOP Reachable 450
   Step 1: Administrative Weight 450
   Step 2: Highest Local Preference (LOCAL_PREF) 453
   Step 3: Choose Between Locally Injected Routes Based on ORIGIN PA 456
   Step 4: Shortest AS_PATH 457
    Removing Private ASNs 457
    AS_PATH Prepending and Route Aggregation 458
   Step 5: Best ORIGIN PA 461
   Step 6: Smallest Multi-Exit Discriminator 461
    Configuring MED: Single Adjacent AS 463
    Configuring MED: Multiple Adjacent Autonomous Systems 464
    The Scope of MED 464
   Step 7: Prefer Neighbor Type eBGP over iBGP 465
   Step 8: Smallest IGP Metric to the NEXT_HOP 465
    The maximum-paths Command and BGP Decision Process Tiebreakers 465
   Step 9: Lowest BGP Router ID of Advertising Router (with One Exception) 466
   Step 10: Lowest Neighbor ID 466
    The BGP maximum-paths Command 466
  BGP Communities 468
    Matching COMMUNITY with Community Lists 472
    Removing COMMUNITY Values 473
    Filtering NLRI Using Special COMMUNITY Values 474
 Foundation Summary 476
  Memory Builders 480
   Fill in Key Tables from Memory 480
   Definitions 480
   Further Reading 480
Part IV Quality of Service 483
Chapter 14 Classification and Marking 485
 “Do I Know This Already?” Quiz 485
 Foundation Topics 489
  Fields That Can Be Marked for QoS Purposes 489
   IP Precedence and DSCP Compared 489
   DSCP Settings and Terminology 490
    The Class Selector PHB and DSCP Values 491
    The Assured Forwarding PHB and DSCP Values 491
    The Expedited Forwarding PHB and DSCP Values 492
   Non-IP Header Marking Fields 493
    Ethernet LAN Class of Service 493
    WAN Marking Fields 493
    Locations for Marking and Matching 494
  Cisco Modular QoS CLI 495
   The Mechanics of MQC 496
   Classification Using Class Maps 497
    Using Multiple match Commands 498
    Classification Using NBAR 499
  Classification and Marking Tools 500
   Class-Based Marking (CB Marking) Configuration 500
    CB Marking Example 501
    CB Marking of CoS and DSCP 505
    Network-Based Application Recognition 507
   CB Marking Design Choices 508
   Marking Using Policers 509
   Policy Routing for Marking 510
 Foundation Summary 511
  Memory Builders 513
   Fill in Key Tables from Memory 513
   Definitions 513
   Further Reading 513
Chapter 15 Congestion Management and Avoidance 515
 “Do I Know This Already?” Quiz 515
 Foundation Topics 519
  Cisco Router Queuing Concepts 519
   Software Queues and Hardware Queues 519
   Queuing on Interfaces Versus Subinterfaces and Virtual Circuits 520
   Comparing Queuing Tools 520
  Queuing Tools: FIFO, PQ, CQ, WFQ, CBWFQ, and LLQ 521
   FIFO Queuing 521
   Priority Queuing 522
   Custom Queuing 523
   Weighted Fair Queuing 524
    WFQ Scheduler: The Process 525
    WFQ Drop Policy, Number of Queues, and Queue Lengths 526
    Types of WFQ Queues 527
    WFQ Configuration 527
   Class-Based WFQ and Low-Latency Queuing 529
    CBWFQ Basic Features and Configuration 529
    Defining and Limiting CBWFQ Bandwidth 532
    Low-Latency Queuing 534
    Defining and Limiting LLQ Bandwidth 537
    LLQ with More Than One Priority Queue 538
    Miscellaneous CBWFQ/LLQ Topics 538
   Queuing Summary 538
  Weighted Random Early Detection 539
   How WRED Weights Packets 541
   WRED Configuration 542
  LAN Switch Congestion Management and Avoidance 542
   Cisco 3550 Switch Egress Queuing 543
   Cisco 3550 Congestion Avoidance 545
   Comparisons Between Cisco 3550 and 2950 Switches 547
 Foundation Summary 549
  Memory Builders 549
   Fill in Key Tables from Memory 549
   Definitions 549
   Further Reading 549
Chapter 16 Shaping and Policing 551
 “Do I Know This Already?” Quiz 551
 Foundation Topics 555
  Traffic-Shaping Concepts 555
   Shaping Terminology 555
   Shaping with an Excess Burst 557
   Underlying Mechanics of Shaping 557
   Traffic-Shaping Adaptation on Frame Relay Networks 559
  Class-Based Shaping Configuration 559
   Tuning Shaping for Voice Using LLQ and a Small Tc 561
   Configuring Shaping by Bandwidth Percent 564
   CB Shaping to a Peak Rate 565
   Adaptive Shaping 565
  Frame Relay Traffic Shaping Configuration 565
   FRTS Configuration Using the traffic-rate Command 567
   Setting FRTS Parameters Explicitly 568
   FRTS Configuration Using LLQ 569
   FRTS Adaptive Shaping 570
  Policing Concepts and Configuration 571
   CB Policing Concepts 571
    Single-Rate, Two-Color Policing (One Bucket) 571
    Single-Rate, Three-Color Policer (Two Buckets) 573
    Two-Rate, Three-Color Policer (Two Buckets) 573
   Class-Based Policing Configuration 575
    Single-Rate, Three-Color Policing of All Traffic 575
    Policing a Subset of the Traffic 576
    CB Policing Defaults for Bc and Be 577
    Configuring Dual-Rate Policing 577
    Multi-Action Policing 578
    Policing by Percentage 578
   Committed Access Rate 579
 Foundation Summary 582
  Memory Builders 584
   Fill in Key Tables from Memory 584
   Definitions 584
   Further Reading 585
Part V WAN 587
Chapter 17 Synchronous Serial Links and Protocols 589
 “Do I Know This Already?” Quiz 589
 Foundation Topics 592
  Synchronous Serial Links 592
   T1 Framing and Encoding 592
   T1 Alarms 594
   Carrier Detect and Interface Resets 594
  Point-to-Point Protocol 595
   PPP Link Control Protocol 596
    Basic LCP/PPP Configuration 597
    Multilink PPP 598
    MLP Link Fragmentation and Interleaving 600
   PPP Compression 601
    PPP Layer 2 Payload Compression 602
    Header Compression 602
 Foundation Summary 604
  Memory Builders 605
   Fill in Key Tables from Memory 605
   Definitions 605
   Further Reading 605
Chapter 18 Frame Relay 607
 “Do I Know This Already?” Quiz 607
 Foundation Topics 610
  Frame Relay Concepts 610
   Frame Relay Data Link Connection Identifiers 610
   Local Management Interface 611
   Frame Relay Headers and Encapsulation 612
   Frame Relay Congestion: DE, BECN, and FECN 613
    Adaptive Shaping, FECN, and BECN 614
    The Discard Eligibility Bit 615
  Frame Relay Configuration 615
   Frame Relay Configuration Basics 615
   Frame Relay Payload Compression 619
   Frame Relay Fragmentation 620
 Foundation Summary 623
  Memory Builders 624
   Fill in Key Tables from Memory 624
   Definitions 625
   Further Reading 625
Part VI IP Multicast 627
Chapter 19 Introduction to IP Multicasting 629
 “Do I Know This Already?” Quiz 629
 Foundation Topics 632
  Why Do You Need Multicasting? 632
   Problems with Unicast and Broadcast Methods 632
   How Multicasting Provides a Scalable and Manageable Solution 635
  Multicast IP Addresses 638
   Multicast Address Range and Structure 638
   Well-Known Multicast Addresses 638
    Multicast Addresses for Permanent Groups 639
    Multicast Addresses for Source-Specific Multicast Applications and Protocols 640
    Multicast Addresses for GLOP Addressing 640
    Multicast Addresses for Private Multicast Domains 640
   Multicast Addresses for Transient Groups 641
   Summary of Multicast Address Ranges 641
   Mapping IP Multicast Addresses to MAC Addresses 642
  Managing Distribution of Multicast Traffic with IGMP 643
   Joining a Group 644
   Internet Group Management Protocol 645
   IGMP Version 1 645
    IGMPv1 Host Membership Query Functions 646
    IGMPv1 Host Membership Report Functions 647
    IGMPv1 Leave Mechanism 651
    IGMPv1 Querier 651
   IGMP Version 2 651
    IGMPv2 Leave Group and Group-Specific Query Messages 654
    IGMPv2 Querier 656
   IGMPv1 and IGMPv2 Interoperability 657
    IGMPv2 Host and IGMPv1 Routers 657
    IGMPv1 Host and IGMPv2 Routers 658
    IGMPv1 and IGMPv2 Routers 658
   Timers Used in IGMPv1 and IGMPv2 659
   IGMP Version 3 659
   Comparison of IGMPv1, IGMPv2, and IGMPv3 661
   Multicast Listener Discovery Protocol 662
  LAN Multicast Optimizations 662
   Cisco Group Management Protocol 663
   IGMP Snooping 669
   Router-Port Group Management Protocol 673
 Foundation Summary 676
  Memory Builders 676
   Fill in Key Tables from Memory 677
   Definitions 677
   Further Reading 677
  References in This Chapter 677
Chapter 20 IP Multicast Routing 679
 “Do I Know This Already?” Quiz 679
 Foundation Topics 683
  Multicast Routing Basics 683
   Overview of Multicast Routing Protocols 684
    Multicast Forwarding Using Dense Mode 684
    Reverse-Path-Forwarding Check 685
    Multicast Forwarding Using Sparse Mode 687
   Multicast Scoping 689
    TTL Scoping 689
    Administrative Scoping 690
  Dense-Mode Routing Protocols 690
   Operation of Protocol Independent Multicast Dense Mode 691
    Forming PIM Adjacencies Using PIM Hello Messages 691
    Source-Based Distribution Trees 692
    Prune Message 693
    PIM-DM: Reacting to a Failed Link 695
    Rules for Pruning 697
    Steady-State Operation and the State Refresh Message 699
    Graft Message 700
   LAN-Specific Issues with PIM-DM and PIM-SM 702
    Prune Override 702
    Assert Message 703
    Designated Router 704
    Summary of PIM-DM Messages 705
   Distance Vector Multicast Routing Protocol 706
   Multicast Open Shortest Path First 706
  Sparse-Mode Routing Protocols 707
   Operation of Protocol Independent Multicast Sparse Mode 707
    Similarities Between PIM-DM and PIM-SM 707
    Sources Sending Packets to the Rendezvous Point 708
    Joining the Shared Tree 710
    Completion of the Source Registration Process 712
    Shared Distribution Tree 714
    Steady-State Operation by Continuing to Send Joins 715
    Examining the RP’s Multicast Routing Table 716
    Shortest-Path Tree Switchover 717
    Pruning from the Shared Tree 719
   Dynamically Finding RPs and Using Redundant RPs 720
    Dynamically Finding the RP Using Auto-RP 721
    Dynamically Finding the RP Using BSR 724
    Anycast RP with MSDP 726
    Summary: Finding the RP 728
   Bidirectional PIM 729
   Comparison of PIM-DM and PIM-SM 730
 Foundation Summary 732
  Memory Builders 736
   Fill in Key Tables from Memory 736
   Definitions 736
   Further Reading 737
Part VII Security 739
Chapter 21 Security 741
 “Do I Know This Already?” Quiz 741
 Foundation Topics 745
  Router and Switch Device Security 745
   Simple Password Protection for the CLI 745
    Better Protection of Enable and Username Passwords 746
   User Mode and Privileged Mode AAA Authentication 747
    Using a Default Set of Authentication Methods 748
    Using Multiple Authentication Methods 749
    Groups of AAA Servers 750
    Overriding the Defaults for Login Security 751
   PPP Security 752
  Layer 2 Security 752
Switch Security Best Practices for Unused and User Ports 753
     Port Security 754
    Dynamic ARP Inspection 758
    DHCP Snooping 761
    IP Source Guard 763
    802.1X Authentication Using EAP 764
   General Layer 2 Security Recommendations 766
  Layer 3 Security 768
   IP Access Control List Review 769
    ACL Rule Summary 770
    Wildcard Masks 772
   General Layer 3 Security Considerations 772
    Smurf Attacks, Directed Broadcasts, and RPF Checks 772
    Inappropriate IP Addresses 774
    TCP SYN Flood, the Established Bit, and TCP Intercept 775
 Foundation Summary 778
  Memory Builders 780
   Fill in Key Tables from Memory 780
   Definitions 781
   Further Reading 781
Part VIII Enterprise Wireless Mobility 783
Chapter 22 IEEE 802.11 Fundamentals 785
 “Do I Know This Already?” Quiz 785
 Foundation Topics 788
  802.11 Physical Layer Standards 788
   802.11a 788
   802.11b 789
   802.11g 790
   802.11n 791
   Comparison of 802.11 Standards 791
  Wireless System Configuration 791
   Infrastructure Mode Configuration 792
   Ad Hoc Mode Configuration 794
  Wireless Hardware Components 794
   Radio Cards 795
   Access Points 795
   Antennas 795
   Repeaters 796
   Bridges 797
   Routers 797
   Radio Frequency Peripherals 797
  Infrastructure Mode Operation 798
   Scanning 798
    Passive Scanning 798
    Active Scanning 799
   Connecting with a Network 799
   Data Transfer 799
   Roaming 800
  Ad Hoc Mode Operation 800
  Wireless Configuration Parameters 801
   SSID 802
   RF Channels 803
   Transmit Power 804
   Data Rates 804
   Power-Save Mode 805
   RTS/CTS 806
   Fragmentation 808
   RTS/CTS and Fragmentation Summary 808
  Wireless Medium Access 809
  Wireless Security 810
   WEP 811
   TKIP 811
   AES 812
   WPA 812
   Open System Authentication 812
   Shared Key Authentication 812
   Virtual Private Networks 813
   Comparing Wireless Security 813
  RF Signal Concepts 814
   Modulation 814
   RF Signal Characteristics 815
   Gain 816
   Signal-to-Noise Ratio 816
   Spread Spectrum 817
   Orthogonal Frequency Division Multiplexing 818
   FCC Rules 819 RF Interference 819 Multipath 820
 Foundation Summary 822
  Memory Builders 822
   Definitions 823
   Further Reading 823
Chapter 23 Wireless LAN Solutions 825
 “Do I Know This Already?” Quiz 825
 Foundation Topics 828
  Cisco Structured Wireless-Aware Network 828
   Wireless Domain Services 828
   Intrusion Detection System 829
   Cisco SWAN Hardware 831
   Cisco Wireless LAN Hardware 832
   CiscoWorks Wireless LAN Solution Engine 834
    Automatic Access Point Configuration 834
    Assisted Site Surveys 835
    Centralized Firmware Updates 835
    Dynamic Grouping 835
    VLAN Configuration 835
    Multiple Service Set Identifier Support 835
    Customizable Thresholds 835 Fault Status 836
    Intrusion Detection System 836
    Security Policy Monitoring 836
    Secure User Interface 836
    Air/RF Scanning and Monitoring 836
    Self-Healing Functions 837
    Reporting, Trending, Planning, and Troubleshooting 837
  Applying Wireless LANs in Enterprises 837
   Enterprise Security 837
   Voice Services 839
  Public Wireless LANs 840
  Small Office and Home Wireless LANs 842
 Foundation Summary 845
  Memory Builders 845
   Fill in Key Tables from Memory 845
   Definitions 845
   Further Reading 845
Part IX OSI and Cisco Device Basics 847
Chapter 24 Miscellaneous Networking Theory and Practices 849
 “Do I Know This Already?” Quiz 849
 Foundation Topics 851
  The OSI and TCP/IP Models 851
   OSI Layers 851
   OSI Layering Concepts and Benefits 854
   OSI Terminology 855
   OSI Layer Interactions 856
  Router Operation Miscellany 858
   Cisco IOS Software Boot Sequences and the Configuration Register 858
    The Configuration Register 858
    The boot system Command 859
   CLI Help Features 860
 Foundation Summary 862
  Memory Builders 863
   Fill in Key Tables from Memory 863
   Definitions 863

Part X Appendixes 865
Appendix A Answers to the “Do I Know This Already?” Quizzes 867
Appendix B CCIE Routing and Switching Exam Updates: Version 1.0 891
Appendix C MPLS 895
Appendix D Decimal to Binary Conversion Table 953
Index 958
猜您喜欢

读书导航