书籍详情
Network Warrior:思科网络工程师必备手册(影印版)
作者:(美)唐纳修 著
出版社:东南大学出版社
出版时间:2011-10-01
ISBN:9787564129392
定价:¥98.00
购买这本书可以去
内容简介
捡起认证考试的遗珠。这是一本细致而实用的网络基础架构指南,《Network Warrior:思科网络工程师必备手册(影印版)(第2版)》将助你一臂之力来处理真实的思科网络,而不是解决考试中的假想问题,比如ccna那样的。在作者广博的专业经验基础上,《network warrior》指导你一步一步地遍历路由器、交换机、防火墙以及其他的技术领域。在这本经过全面修订的第二版中,你会发现针对mpls、ipv6、voip和无线网络的新增加内容,同时还有针对思科nexus 5000和7000交换机的实例讲解。主体包括:深入介绍路由器和网络路由,使用思科catalyst和nexus交换机作为实例讲解网络交换,小型网络和家庭网络的voip和无线接入点设计与配置,用配置实例讲解ipv6,数据网络世界中的电信技术,包括t1、ds3、帧中继和mpls,网络安全,防火墙原理及配置,还有访问控制和认证,服务质量(qos),重点讲解低延迟队列(llq),ip地址分配、网络时间协议(ntp)以及设备故障。
作者简介
Gary A. Donahue担任过程序员、主机管理员、技术帮助中心工程师、网络管理员、网络设计师和咨询师。现在担任在新泽西的他自己的咨询公司GAD Technologies的主席。
目录
preface
1. what is a network?
2. hubs and switches
hubs
switches
switch types
planning a chassis-based switch installation
3. autonegotjatjon
what is autonegotiation?
how autonegotiation works
when autonegotiation fails
autonegotiation best practices
configuring autonegotiation
4. vlans
connecting vlans
configuring vlans
catos
ios using vlan database
ios using global commands
nexus and nx-os
5. trunkjng
how trunks work
isl
802.1q
which protocol to use
trunk negotiation
configuring trunks
los
catos
nexus and nx-os
6. vlan trunking protocol
vtp pruning
dangers of vtp
configuring vtp
vtp domains
vtp mode
vtp password
vtp pruning
7. link aggregation
etherchannel
etherchannel load balancing
configuring and managing etherchannel
cross-stack etherchannel
multichassis etherchannel (mec)
virtual port channel
initial vpc configuration
adding a vpc
8. spanning tree
broadcast storms
mac address table instability
preventing loops with spanning tree
how spanning tree works
managing spanning tree
additional spanning tree features
portfast
bpdu guard
uplinkfast
backbonefast
common spanning tree problems
duplex mismatch
unidirectional links
bridge assurance
designing to prevent spanning tree problems
use routing instead of switching for redundancy
always configure the root bridge
9. routing and routers
routing tables
route types
the ip routing table
host route
subnet
summary (group of subnets)
major network
supernet (group of major networks)
default route
virtual routing and forwarding
10. routing protocols
communication between routers
metrics and protocol types
administrative distance
specific routing protocols
rip
ripv2
eigrp
ospf
bgp
11. redistribution
redistributing into rip
redistributing into eigrp
redistributing into ospf
mutual redistribution
redistribution loops
limiting redistribution
route tags
a real-world example
12. tunnels
gre tunnels
gre tunnels and routing protocols
gre and access lists
13. first hop redundancy
hsrp
hsrp interface tracking
when hsrp isn't enough
nexus and hsrp
glbp
object tracking in glbp
14. route maps
building a route map
policy routing example
monitoring policy routing
15. switching algorithms in cisco routers
process switching
interrupt context switching
fast switching
optimum switching
cef
configuring and managing switching paths
process switching
fast switching
cef
16. multilayer switches
configuring svis
ios (4500, 6500, 3550, 3750, etc.)
hybrid mode (4500, 6500)
nx-os (nexus 7000, 5000)
multilayer switch models
17. cisco 6500 multilayer switches
architecture
buses
enhanced chassis
vertical enhanced chassis
supervisors
modules
catos versus ios
installing vss
other recommended vss commands
vss failover commands
miscellaneous vss commands
vss best practices
18. cisco nexus
nexus hardware
nexus 7000
nexus 5000
nexus 2000
nexus 1000 series
nx-os
nx-os versus ios
nexus iconography
nexus design features
virtual routing and forwarding
virtual device contexts
shared and dedicated rate-mode
configuring fabric extenders (fexs)
virtual port channel
config-sync
configuration rollback
upgrading nx-os
19. catalyst 3750 features
stacking
interface ranges
macros
flex links
storm control
port security
span
voice vlan
qos
20. telecom nomenclature
telecom glossary
21. t1
understanding t1 duplex
types of t1
encoding
ami
b8zs
framing
d4/superframe
extended super frame
performance monitoring
loss of signal
out of frame
bipolar violation
crc6
errored seconds
extreme errored seconds
alarms
red alarm
yellow alarm
blue alarm
troubleshooting tls
loopback tests
integrated csu/dsus
configuring tls
csu/dsu configuration
csu/dsu troubleshooting
22. ds3
framing
m13
c-bits
clear-channel ds3 framing
line coding
configuring ds3s
clear-channel ds3
channelized ds3
23. frame relay
ordering frame relay service
frame relay network design
oversubscription
local management interface
congestion avoidance in frame relay
configuring frame relay
basic frame relay with two nodes
basic frame relay with more than two nodes
frame relay subinterfaces
troubleshooting frame relay
24. mpls
25. access lists
designing access lists
named versus numbered
wildcard masks
where to apply access lists
naming access lists
top-down processing
most-used on top
using groups in asa and pix acls
deleting acls
turbo acls
allowing outbound traceroute and ping
allowing mtu path discovery packets
acls in multilayer switches
configuring port acls
configuring router acls
configuring vlan maps
reflexive access lists
configuring reflexive access lists
26. authentication in cisco devices
basic (non-aaa) authentication
line passwords
configuring local users
ppp authentication
aaa authentication
enabling aaa
configuring security server information
creating method lists
applying method lists
27. basic firewall theory
best practices
the dmz
another dmz example
multiple dmz example
alternate designs
28. asa firewallconfiguration
contexts
interfaces and security levels
names
object groups
inspects
managing contexts
context types
the classifier
configuring contexts
interfaces and contexts
write mere behavior
failover
failover terminology
understanding failover
configuring failover--active/standby
monitoring failover
configuring failover--active/active
nat
nat commands
nat examples
miscellaneous
remote access
saving configuration changes
logging
troubleshooting
29. wireless
wireless standards
security
configuring a wap
mac address filtering
troubleshooting
30. volp
how volp works
protocols
telephony terms
cisco telephony terms
common issues with volp
small-office volp example
vlans
switch ports
qos on the cme router
dhcp for phones
tftp service
telephony service
dial plan
voice ports
configuring phones
dial peers
sip
troubleshooting
phone registration
tftp
dial peer
sip
31. introduction to(los
types of qos
qos mechanics
priorities
flavors of qos
common qos misconceptions
qos "carves up" a link into smaller logical links
qos limits bandwidth
qos resolves a need for more bandwidth
qos prevents packets from being dropped
qos will make you more attractive to the opposite sex
32. designing (los
llq scenario
protocols
priorities
determine bandwidth requirements
configuring the routers
class maps
policy maps
service policies
traffic-shaping scenarios
scenario 1: ethernet handoff
scenario 2: frame relay speed mismatch
33. the congested network
determining whether the network is congested
resolving the problem
34. the converged network
configuration
monitoring qos
troubleshooting a converged network
incorrect queue configuration
priority queue too small
priority queue too large
nonpriority queue too small
nonpriority queue too large
default queue too small
default queue too large
35. designing networks
documentation
requirements documents
port layout spreadsheets
ip and vlan spreadsheets
bay face layouts
power and cooling requirements
tips for network diagrams
naming conventions for devices
network designs
corporate networks
ecommerce websites
modern virtual server environments
small networks
36. ip design
public versus private ip space
vlsm
c1dr
allocating ip network space
allocating ip subnets
sequential
divide by half
reverse binary
ip subnetting made easy
37. ipv6
addressing
subnet masks
address types
subnetting
nat
simple router configuration
38. network time protocol
what is accurate time?
ntp design
configuring ntp
ntp client
ntp server
39. failures
human error
multiple component failure
disaster chains
no failover testing
troubleshooting
remain calm
log your actions
find out what changed
check the physical layer first!
assume nothing; prove everything
isolate the problem
don't look for zebras
do a physical audit
escalate
troubleshooting in a team environment
the janitor principle
40. gad's maxims
maxim # 1
politics
money
the right way to do it
maxim #2
simplify
standardize
stabilize
maxim #3
lower costs
increase performance or capacity
increase reliability
41. avoiding frustration
why everything is messed up
how to sell your ideas to management
when to upgrade and why
the dangers of upgrading
valid reasons to upgrade
why change control is your friend
how not to be a computer jerk
behavioral
environmental
leadership and mentoring
index
1. what is a network?
2. hubs and switches
hubs
switches
switch types
planning a chassis-based switch installation
3. autonegotjatjon
what is autonegotiation?
how autonegotiation works
when autonegotiation fails
autonegotiation best practices
configuring autonegotiation
4. vlans
connecting vlans
configuring vlans
catos
ios using vlan database
ios using global commands
nexus and nx-os
5. trunkjng
how trunks work
isl
802.1q
which protocol to use
trunk negotiation
configuring trunks
los
catos
nexus and nx-os
6. vlan trunking protocol
vtp pruning
dangers of vtp
configuring vtp
vtp domains
vtp mode
vtp password
vtp pruning
7. link aggregation
etherchannel
etherchannel load balancing
configuring and managing etherchannel
cross-stack etherchannel
multichassis etherchannel (mec)
virtual port channel
initial vpc configuration
adding a vpc
8. spanning tree
broadcast storms
mac address table instability
preventing loops with spanning tree
how spanning tree works
managing spanning tree
additional spanning tree features
portfast
bpdu guard
uplinkfast
backbonefast
common spanning tree problems
duplex mismatch
unidirectional links
bridge assurance
designing to prevent spanning tree problems
use routing instead of switching for redundancy
always configure the root bridge
9. routing and routers
routing tables
route types
the ip routing table
host route
subnet
summary (group of subnets)
major network
supernet (group of major networks)
default route
virtual routing and forwarding
10. routing protocols
communication between routers
metrics and protocol types
administrative distance
specific routing protocols
rip
ripv2
eigrp
ospf
bgp
11. redistribution
redistributing into rip
redistributing into eigrp
redistributing into ospf
mutual redistribution
redistribution loops
limiting redistribution
route tags
a real-world example
12. tunnels
gre tunnels
gre tunnels and routing protocols
gre and access lists
13. first hop redundancy
hsrp
hsrp interface tracking
when hsrp isn't enough
nexus and hsrp
glbp
object tracking in glbp
14. route maps
building a route map
policy routing example
monitoring policy routing
15. switching algorithms in cisco routers
process switching
interrupt context switching
fast switching
optimum switching
cef
configuring and managing switching paths
process switching
fast switching
cef
16. multilayer switches
configuring svis
ios (4500, 6500, 3550, 3750, etc.)
hybrid mode (4500, 6500)
nx-os (nexus 7000, 5000)
multilayer switch models
17. cisco 6500 multilayer switches
architecture
buses
enhanced chassis
vertical enhanced chassis
supervisors
modules
catos versus ios
installing vss
other recommended vss commands
vss failover commands
miscellaneous vss commands
vss best practices
18. cisco nexus
nexus hardware
nexus 7000
nexus 5000
nexus 2000
nexus 1000 series
nx-os
nx-os versus ios
nexus iconography
nexus design features
virtual routing and forwarding
virtual device contexts
shared and dedicated rate-mode
configuring fabric extenders (fexs)
virtual port channel
config-sync
configuration rollback
upgrading nx-os
19. catalyst 3750 features
stacking
interface ranges
macros
flex links
storm control
port security
span
voice vlan
qos
20. telecom nomenclature
telecom glossary
21. t1
understanding t1 duplex
types of t1
encoding
ami
b8zs
framing
d4/superframe
extended super frame
performance monitoring
loss of signal
out of frame
bipolar violation
crc6
errored seconds
extreme errored seconds
alarms
red alarm
yellow alarm
blue alarm
troubleshooting tls
loopback tests
integrated csu/dsus
configuring tls
csu/dsu configuration
csu/dsu troubleshooting
22. ds3
framing
m13
c-bits
clear-channel ds3 framing
line coding
configuring ds3s
clear-channel ds3
channelized ds3
23. frame relay
ordering frame relay service
frame relay network design
oversubscription
local management interface
congestion avoidance in frame relay
configuring frame relay
basic frame relay with two nodes
basic frame relay with more than two nodes
frame relay subinterfaces
troubleshooting frame relay
24. mpls
25. access lists
designing access lists
named versus numbered
wildcard masks
where to apply access lists
naming access lists
top-down processing
most-used on top
using groups in asa and pix acls
deleting acls
turbo acls
allowing outbound traceroute and ping
allowing mtu path discovery packets
acls in multilayer switches
configuring port acls
configuring router acls
configuring vlan maps
reflexive access lists
configuring reflexive access lists
26. authentication in cisco devices
basic (non-aaa) authentication
line passwords
configuring local users
ppp authentication
aaa authentication
enabling aaa
configuring security server information
creating method lists
applying method lists
27. basic firewall theory
best practices
the dmz
another dmz example
multiple dmz example
alternate designs
28. asa firewallconfiguration
contexts
interfaces and security levels
names
object groups
inspects
managing contexts
context types
the classifier
configuring contexts
interfaces and contexts
write mere behavior
failover
failover terminology
understanding failover
configuring failover--active/standby
monitoring failover
configuring failover--active/active
nat
nat commands
nat examples
miscellaneous
remote access
saving configuration changes
logging
troubleshooting
29. wireless
wireless standards
security
configuring a wap
mac address filtering
troubleshooting
30. volp
how volp works
protocols
telephony terms
cisco telephony terms
common issues with volp
small-office volp example
vlans
switch ports
qos on the cme router
dhcp for phones
tftp service
telephony service
dial plan
voice ports
configuring phones
dial peers
sip
troubleshooting
phone registration
tftp
dial peer
sip
31. introduction to(los
types of qos
qos mechanics
priorities
flavors of qos
common qos misconceptions
qos "carves up" a link into smaller logical links
qos limits bandwidth
qos resolves a need for more bandwidth
qos prevents packets from being dropped
qos will make you more attractive to the opposite sex
32. designing (los
llq scenario
protocols
priorities
determine bandwidth requirements
configuring the routers
class maps
policy maps
service policies
traffic-shaping scenarios
scenario 1: ethernet handoff
scenario 2: frame relay speed mismatch
33. the congested network
determining whether the network is congested
resolving the problem
34. the converged network
configuration
monitoring qos
troubleshooting a converged network
incorrect queue configuration
priority queue too small
priority queue too large
nonpriority queue too small
nonpriority queue too large
default queue too small
default queue too large
35. designing networks
documentation
requirements documents
port layout spreadsheets
ip and vlan spreadsheets
bay face layouts
power and cooling requirements
tips for network diagrams
naming conventions for devices
network designs
corporate networks
ecommerce websites
modern virtual server environments
small networks
36. ip design
public versus private ip space
vlsm
c1dr
allocating ip network space
allocating ip subnets
sequential
divide by half
reverse binary
ip subnetting made easy
37. ipv6
addressing
subnet masks
address types
subnetting
nat
simple router configuration
38. network time protocol
what is accurate time?
ntp design
configuring ntp
ntp client
ntp server
39. failures
human error
multiple component failure
disaster chains
no failover testing
troubleshooting
remain calm
log your actions
find out what changed
check the physical layer first!
assume nothing; prove everything
isolate the problem
don't look for zebras
do a physical audit
escalate
troubleshooting in a team environment
the janitor principle
40. gad's maxims
maxim # 1
politics
money
the right way to do it
maxim #2
simplify
standardize
stabilize
maxim #3
lower costs
increase performance or capacity
increase reliability
41. avoiding frustration
why everything is messed up
how to sell your ideas to management
when to upgrade and why
the dangers of upgrading
valid reasons to upgrade
why change control is your friend
how not to be a computer jerk
behavioral
environmental
leadership and mentoring
index
猜您喜欢