Startsida
Hjälp
Sök i LIBRIS databas

     

 

Sökning: onr:18259438 > Implementing Cisco ...

Implementing Cisco IP switched networks (SWITCH) : foundation learning guide / Richard Froom, Erum Frahim.

Froom, Richard (författare)
Frahim, Erum (författare)
ISBN 9781587206641
Publicerad: Indianapolis, IN : Cisco Press, 2015
Engelska xxiv, 488 pages
  • Bok
Innehållsförteckning Ämnesord
Stäng  
  • Machine generated contents note: Switching Introduction -- Hubs and Switches -- Bridges and Switches -- Switches of Today -- Broadcast Domains -- MAC Addresses -- The Basic Ethernet Frame Format -- Basic Switching Function -- VLANs -- The Spanning Tree Protocol -- Trunking -- Port Channels -- Multilayer Switching -- Summary -- Campus Network Structure -- Hierarchical Network Design -- Access Layer -- Distribution Layer -- Core Layer (Backbone) -- Layer 3 in the Access Layer -- The Cisco Enterprise Campus Architecture -- The Need for a Core Layer -- Types of Cisco Switches -- Comparing Layer 2 and Multilayer Switches -- MAC Address Forwarding -- Layer 2 Switch Operation -- Layer 3 (Multilayer) Switch Operation -- Useful Commands for Viewing and Editing Catalyst Switch MAC Address Tables -- Frame Rewrite -- Distributed Hardware Forwarding -- Cisco Switching Methods -- Route Caching -- Topology-Based Switching -- Hardware Forward Details -- Study Tips -- Summary --. 
  • Note continued: Review Questions -- Implementing VLANs and Trunks in Campus Environment -- VLAN Overview -- VLAN Segmentation -- End-to-End VLANs -- Local VLANs -- Comparison of End-to-End VLANs and Local VLANs -- Mapping VLANs to a Hierarchical Network -- Implementing a Trunk in a Campus Environment -- Understanding Native VLAN in 802.1Q Trunking -- Understanding DTP -- VLAN Ranges and Mappings -- Configuring, Verifying, and Troubleshooting VLANs and Trunks -- Verifying the VLAN Configuration -- Configuring VLANs and Trunks -- Best Practices for VLANs and Trunking -- Voice VLAN Overview -- Switch Configuration for Wireless Network Support -- VLAN Trunking Protocol -- VTP Overview -- VTP Modes -- VTP Versions -- VTP Pruning -- VTP Authentication -- VTP Advertisements -- VTP Messages Types -- Summary Advertisements -- Subset Advertisements -- Configuring and Verifying VTP -- Overwriting VTP Configuration (Very Common Issue with VTP) --. 
  • Note continued: Best Practices for VTP Implementation -- Implementing EtherChannel in a Switched Network -- The Need for EtherChannel -- EtherChannel Mode Interactions -- LACP -- PAgP -- Layer 2 EtherChannel Configuration Guidelines -- EtherChannel Load-Balancing Options -- Configuring EtherChannel in a Switched Network -- EtherChannel Configuration and Load Balancing -- EtherChannel Guard -- Study Tips -- Summary -- Review Questions -- Spanning Tree Protocol Overview -- STP Need -- STP Standards -- STP Operations -- Bridge Protocol Data Units -- Root Bridge Election -- Root Port Election -- Designated Port Election -- STP Port States -- Per-VLAN STP Plus (PVST+) -- STP Topology Changes -- Rapid Spanning Tree Protocol -- RSTP Port Roles -- Comparison of RSTP and STP Port States -- RSTP Topology Changes -- RSTP Link Types -- Configuring and Modifying STP Behavior -- Changing STP Priority -- STP Path Manipulation -- STP Timers -- Implementing STP Stability Mechanisms --. 
  • Note continued: Use UplinkFast -- Use BackboneFast -- Use PortFast -- Securing PortFast Interface with BPDU Guard -- Disabling STP with BPDU Filter -- Use Root Guard -- Loop Guard Overview -- Use UDLD -- UDLD Recommended Practices -- Use FlexLinks -- STP Stability Mechanisms Recommendations -- Configuring Multiple Spanning Tree Protocol -- Introducing MST -- MST Regions -- STP Instances with MST -- Extended System ID for MST -- Configuring and Verifying MST -- Configuring MST Path Cost -- Configuring MST Port Priority -- MST Protocol Migration -- MST Recommended Practices -- Troubleshooting STP -- Potential STP Problems -- Duplex Mismatch -- Unidirectional Link Failure -- Frame Corruption -- Resource Errors -- PortFast Configuration Errors -- Study Tips -- Summary -- Review Questions -- Describing Inter-VLAN Routing -- Introduction to Inter-VLAN Routing -- Inter-VLAN Routing Using an External Router -- Configuring Inter-VLAN Routing Using an External Router --. 
  • Note continued: Routing with an External Router -- External Routers: Advantages Disadvantages -- Inter-VLAN Routing Using Switch Virtual Interfaces -- SVI: Advantages and Disadvantages -- Routing with Routed Ports -- Routed Ports: Advantages -- Configuring Inter-VLAN Routing Using SVI and Routed Ports -- Routing on a Multilayer Switch -- Using the SVI autostate exclude Command -- SVI Configuration Checklist -- Troubleshooting Inter-VLAN Problems -- Example of a Troubleshooting Plan -- Layer 2 Versus Layer 3 EtherChannel -- Layer 3 EtherChannel Configuration -- Verifying Routing Protocols -- Implementing DHCP -- DHCP Overview -- Configuring DHCP in Multilayer Switched Network -- Configuring a DHCP Relay -- Configuring DHCP Options -- Study Tips -- Summary -- Review Questions -- Overview of FHRP and HSRP -- The Need for First-Hop Redundancy -- HSRP Overview -- HSRP State Transition -- Aligning HSRP with STP Topology -- Configuring and Tuning HSRP --. 
  • Note continued: Forwarding Through the Active Router -- Load Sharing with HSRP -- The Need for Interface Tracking with HSRP -- HSRP Interface Tracking -- HSRP and Object Tracking -- Configuring HSRP Authentication -- Tuning HSRP Timers -- HSRP Versions -- Configuring Layer 3 Redundancy with VRRP -- About VRRP -- Configuring VRRP and Spotting the Differences from HSRP -- VRRP and Authentication -- Tracking and VRRP -- Configuring Layer 3 Redundancy with GLBP -- Introducing GLBP -- Comparing GLPB to HSRP -- GLBP States -- Configuring and Verifying GLBP -- GLBP Load-Balancing Options -- GLBP Authentication -- GLBP and STP -- Tracking and GLBP -- Study Tips -- Summary -- References -- Review Questions -- AAA -- Authentication Options -- RADIUS and TACACS+ Overview -- RADIUS Authentication Process -- TACACS+ Authentication Process -- Configuring AAA -- Configuring RADIUS for Console and vty Access -- Configuring TACACS+ for Console and vty Access -- AAA Authorization --. 
  • Note continued: AAA Accounting -- Limitations of TACACS+ and RADIUS -- Identity-Based Networking -- IEEE 802.1X Port-Based Authentication Overview -- IEEE 802.1X Configuration Checklist -- Network Time Protocols -- The Need for Accurate Time -- Configuring the System Clock Manually -- Network Time Protocol Overview -- NTP Modes -- Other NTP Configuration Options -- NTP Example -- NTP Design Principles -- Securing NTP -- NTP Source Address -- NTP Versions -- SNTP -- PTP/IEEE-1588 -- SNMP -- SNMP Overview -- SNMP Versions -- SNMP Best Practices -- SNMPv3 Configuration Example -- Verifying SNMP Version 3 Configuration -- Study Tips -- Summary -- Review Questions -- Discovery Protocols -- Introduction to LLDP -- Basic Configuration of LLDP -- Discovering Neighbors Using LLDP -- Unidirectional Link Detection -- UDLD Mechanisms and Specifics -- UDLD Configuration -- Leveraging UDLD and STP Loop Guard Together -- Power over Ethernet -- PoE Components -- PoE Standards --. 
  • Note continued: PoE Negotiation -- Configuring and Verifying PoE -- SDM Templates -- SDM Template Types -- Choosing the Right SDM Template -- System Resource Configuration on Other Platforms -- Monitoring Features -- SPAN and RSPAN Overview -- SPAN Configuration -- RSPAN Configuration -- IP SLA -- Introduction to IP SLA -- IP SLA Source and Responder -- IP SLA Configuration -- IP SLA Operation with Responder -- IP SLA Time Stamps -- Configuring Authentication for IP SLA -- IP SLA Example for UDP Jitter -- Study Tips -- Summary -- Review Questions -- The Need for Logical Switching Architectures -- What Is StackWise? -- StackWise Benefits -- Verifying StackWise -- What Is VSS? -- VSS Benefits -- Verifying VSS -- Redundant Switch Supervisors -- Supervisor Redundancy Modes -- Stateful Switchover -- Nonstop Forwarding -- Study Tips -- Summary -- Review Questions -- References -- Overview of Switch Security Issues -- Cisco Switch Security Configuration Best Practices --. 
  • Note continued: Campus Network Vulnerabilities -- Rogue Access -- Switch Vulnerabilities -- MAC Flooding Attacks -- Introducing Port Security -- Port Security Configuration -- Port Error Conditions -- Err-Disabled Automatic Recovery -- Port Access Lists -- Storm Control -- Introduction to Storm Control -- Configuring and Verifying Storm Control on an Interface -- Mitigating Spoofing Attacks -- DHCP Spoofing Attacks -- DHCP Snooping -- DHCP Option 82 -- DHCP Snooping Example Configuration -- IP Source Guard -- IPSG Configuration -- ARP Spoofing -- Dynamic ARP Inspection -- DAI Configuration -- Securing VLAN Trunks -- Switch Spoofing -- VLAN Hopping -- Protecting Against VLAN Hopping -- VLAN Access Lists -- VACL Interaction with ACLs and PACLs -- Configuring VACLs -- Private VLANs -- Introduction to PVLANs -- PVLAN Port Types -- PVLAN Configuration -- PVLAN Verification -- PVLANs Across Multiple Switches -- Using the Protected Port Feature -- Study Tips -- Summary --. 

Ämnesord

Telecommunication  -- Switching systems -- Examinations -- Study guides. (LCSH)
Telecommunications engineers  -- Certification -- Examinations -- Study guides. (LCSH)

Indexterm och SAB-rubrik

Puc Datanät och datakommunikation

Klassifikation

621.38216 (DDC)
Puc (kssb/8)
Inställningar Hjälp

Titeln finns på 5 bibliotek. 

Bibliotek i norra Sverige (1)

Ange som favorit

Bibliotek i Mellansverige (1)

Ange som favorit

Bibliotek i östra Sverige (1)

Ange som favorit

Bibliotek i västra Sverige (2)

Ange som favorit

Sök vidare

Hjälp
Fler titlar av
Froom, Richard
Frahim, Erum
Fler titlar om
Telecommunication
Telecommunication
och Study guides.
och Switching systems
och Examinations
Telecommunications engineers
Telecommunications e ...
och Study guides.
och Certification
och Examinations

Sök utanför LIBRIS

Hjälp
Om LIBRIS
Sekretess
Hjälp
Fel i posten?
Kontakt
Teknik och format
Sök utifrån
Sökrutor
Plug-ins
Bookmarklet
Anpassa
Textstorlek
Kontrast
Vyer
LIBRIS söktjänster
SwePub
Uppsök

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

Copyright © LIBRIS - Nationella bibliotekssystem

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy