Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Cisco Field Manual: Catalyst Switch Configuration

Авторы: Hucabi D., McQuerry S.

Аннотация:

Covering the most commonly used features configured on Cisco and Catalyst switches, this reference guide provides instructions for popular deployment tasks. It explains the configuration options and details each step of the process, with side-by-side comparisons between COS and Cisco IOS Software. Hucaby is a network engineer for the University of Kentucky. McQuery is an instructor and consultant.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 560

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
(*, G) common shared tree structure      
(S, G) shortest path tree structure      
56/64-kbps CSU/DSU back-to-back connections      
802.1Q trunking, native VLAN, switching      
802.1Q trunks, voice traffic transport      
802.1Q, GVRP, configuring      2nd
802.1Q, GVRP, dynamic VLAN creation      2nd
802.1Q, GVRP, example configuration      2nd
802.1X port authentication, configuring      2nd 3rd
abbreviated commands, typing      
Access layer functionality      
access layer, QoS, applying to voice traffic      2nd 3rd 4th 5th
access ports      
accessing switches, permit lists      2nd 3rd 4th
accessing, modules      
accessing, switch devices, authentication      2nd 3rd 4th 5th 6th
accessing, switch devices, SSH      2nd 3rd
ACEs (Access Control Entries)      
ACLs, VLAN ACLs      2nd
ACLs, VLAN ACLs, COS configuration      2nd
ACLs, VLAN ACLs, IOS configuration      2nd 3rd
activating, MISTP instances      2nd
active commands, disabling      
adding, entries to switching table      
addresses, IP multicast, well-known      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
adjacency table (CEF)      
adjacency table, displaying contents      
AF (Assured Forwarding) service levels      
aggressive mode (UDLD)      
aging time (switching table), setting      
alias commands      
applying, QoS policies      2nd 3rd 4th 5th 6th
assigned ICMP type codes      2nd 3rd 4th 5th 6th 7th 8th
assigned IP protocol numbers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
assigning VLAN ports, dynamic      2nd 3rd 4th
assigning VLAN ports, static      2nd
assigning VLAN ports, verifying      
assigning, IP management address      
assigning, static switching table entries      
assigning, traffic to QoS policies      2nd 3rd 4th 5th 6th
assigning, traffic to QoS policies, class maps      2nd
asynchronous back-to-back connections      
ATM LANE, configuring      2nd 3rd 4th 5th 6th
ATM LANE, displaying information      2nd
ATM LANE, example configuration      2nd
Authentication      2nd 3rd
authentication, configuring      2nd
authentication, example configuration      2nd
authentication, RADIUS, configuring      2nd
authentication, TACACSconfiguring      2nd
authorization, passwords, recovering      2nd
authorization, privileged passwords, configuring      
authorization, user-level passwords, configuring      
auto trunking mode (COS)      
autoconfig      
automatic IP management address assignment      
back-to-back connections, 56/64-kbps CSU/DSU      
back-to-back connections, asynchronous      
back-to-back connections, Ethernet      
back-to-back connections, T1/E1 CSU/DSU      2nd
backward compatibility, alias commands      
banners, character limitations      
banners, configuring      2nd
banners, example configuraiton      
BID (bridge ID)      
blocking state (STP)      
boot parameters, synchronizing      2nd
booting from ROM Monitor      
booting, images from Flash      2nd
BPDU Filtering      
BPDU Skewing      
BPDUs, TC bit set      
bridged virtual interfaces, configuring      2nd 3rd
bridged virtual interfaces, subinterfaces:configuring      2nd 3rd
bridged virtual interfaces, verifying configuration      
broadcast domains, design principles      
broadcast suppression      2nd
broadcast suppression, configuring      2nd 3rd
broadcast suppression, time-based      
broadcast suppression, verifying configuration      
building blocks of network design      2nd
building blocks of network design, redundancy      2nd
BUS (Broadcast and Unknown Server)      
cabling, maximum distances      2nd
card modules, Supervisor redundancy      
Catalyst 2900MXLseries switches      
Catalyst 2950 series switch      2nd
Catalyst 3500XL      
Catalyst 3500XL switches, private edge VLANs, creating      2nd
Catalyst 3550 series switch      
Catalyst 4000 series switch      2nd
Catalyst 5000 series switches      
Catalyst 6000 series switch      
CDP (Cisco Discovery Protocol), configuring      2nd 3rd
CEF, configuring      2nd 3rd
CEF, displaying information      2nd 3rd 4th
CEF, tables      2nd 3rd
CGMP (Cisco Group Management Protocol), configuring      2nd
CGMP (Cisco Group Management Protocol), displaying information      2nd
CGMP (Cisco Group Management Protocol), example      
changing VTP versions      2nd
character limitations of banners      
Cisco IOS, trunking modes      2nd
class maps, QoS      2nd
classification, Layer 2 frames      2nd
classification, Layer 3 frames      2nd
clearing modules      
clearing, module configurations      
closing, Telnet sessions      
collapsed core design      
collecting, RMON statistics      2nd
command history      2nd
command line (IOS), regular expressions      2nd
command set (ROM Monitor)      2nd 3rd
commands, editing      
commands, help      
commands, output, filtering      
commands, ping, verifying packet reachability      2nd 3rd
commands, recalling      2nd
commands, session, accessing modules      
commands, set length      2nd
commands, show modules      
commands, switchport trunk encapsulation      
commands, traceroute, router discovery      2nd 3rd 4th
community string values, configurign SNMP access      
community VLANs, creating      
compact mode (SFM)      
config-sync mode (MSFC)      2nd 3rd 4th 5th 6th
config-sync mode (MSFC), displaying information      2nd
configuration mode (IOS)      
configuring, broadcast suppression      2nd 3rd
configuring, broadcast suppression, verification      
configuring, CDP      2nd 3rd
configuring, CEF      2nd 3rd
configuring, CGMP      2nd
configuring, default gateways      
configuring, DNS services      2nd
configuring, FlexWAN module      2nd
configuring, GMRP      2nd 3rd
configuring, GVRP      2nd
configuring, GVRP, dynamic VLAN creation      2nd
configuring, GVRP, example      2nd
configuring, HSRP      2nd 3rd
configuring, HTTP services      2nd
configuring, IDSM      2nd 3rd 4th 5th 6th 7th 8th
configuring, IGMP snooping      2nd 3rd
configuring, IOS, Web browser interface      2nd
configuring, IP management address      2nd
configuring, Layer 2 interface, EtherChannel      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, Layer 2 interface, Ethernet      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, Layer 2 interface, port selection      2nd 3rd 4th
configuring, Layer 2 interface, switching table      2nd 3rd 4th 5th 6th 7th 8th
configuring, Layer 2 interface, Token Ring      2nd 3rd 4th 5th 6th
configuring, Layer 2 interfaces, ATM LANE      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, Layer 3 EtherChannels      2nd 3rd 4th
configuring, Layer 3 Ethernet interfaces      2nd 3rd 4th
configuring, Layer 3 routing tables      2nd
configuring, Layer 3 routing tables, route verification
configuring, Layer 3 switching      2nd 3rd
configuring, MLS      2nd 3rd
configuring, MLS, external routers      2nd 3rd
configuring, MSFC, config-sync mode      2nd 3rd 4th 5th 6th
configuring, MSFC, SRM      2nd 3rd 4th
configuring, NAM      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, NDE      2nd
configuring, packet tracing      2nd 3rd
configuring, passwords, privileged      
configuring, passwords, user-lvel      
configuring, permit lists      2nd
configuring, permit lists, example      2nd
configuring, port authentication      2nd 3rd
configuring, port security      2nd
configuring, port security, verifying configuration      
configuring, power-supply redundancy      2nd 3rd
configuring, private VLANs      2nd 3rd
configuring, protocol filtering, verifying configuration      
configuring, QoS, class maos      2nd
configuring, QoS, congestion avoidance      2nd
configuring, QoS, data exports      2nd 3rd 4th
configuring, QoS, example      2nd 3rd 4th 5th 6th
configuring, QoS, ingress port queues      2nd 3rd 4th 5th
configuring, QoS, on Catalyst 2900XL/3500XL      2nd
configuring, QoS, policers      2nd 3rd 4th 5th 6th
configuring, QoS, policies      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
configuring, QoS, port-based traffic classification      2nd 3rd 4th 5th 6th 7th 8th
configuring, RGMP      2nd
configuring, SFM      2nd
configuring, SLB      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
configuring, SLB firewall load balancing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
configuring, SLB firewall load balancing, example      2nd 3rd 4th 5th 6th
configuring, SLB, DFP      2nd 3rd
configuring, SLB, example      2nd 3rd 4th 5th 6th
configuring, SLB, probes      2nd 3rd 4th 5th 6th 7th 8th 9th 10th
configuring, SLB, sticky connections      2nd 3rd 4th 5th 6th 7th 8th 9th
configuring, SNMP      2nd
configuring, SNMP, access      2nd 3rd 4th 5th 6th 7th
configuring, SNMP, example      2nd
configuring, SNMP, notifications      2nd 3rd
configuring, SNMP, RMON support      2nd
configuring, SPAN      2nd
configuring, SPAN, destination port      
configuring, SPAN, example      2nd
configuring, SPAN, RSPAN      2nd 3rd 4th 5th
configuring, SPAN, source      2nd
configuring, SSH      2nd 3rd
configuring, STP      2nd 3rd 4th 5th 6th 7th
configuring, STP, timers      2nd 3rd 4th 5th
configuring, Supervisor Engine, banners      2nd
configuring, Supervisor Engine, prompts      
configuring, switch authentication      2nd
configuring, switch authentication, RADIUS      2nd
configuring, switch authentication, TACACS      2nd
configuring, system time      2nd 3rd 4th
configuring, terminal screen length      2nd
configuring, trunking      2nd 3rd
configuring, trunking, example      2nd
configuring, trunks, encapsulation method      2nd
configuring, trunks, identifying trunk link      
configuring, trunks, removing VLANs from trunk link      2nd
configuring, VLAN ACLs      2nd
configuring, VLAN ACLs, COS configuration      2nd
configuring, VLAN ACLs, IOS configuration      2nd 3rd
configuring, VLAN interfaces      2nd 3rd 4th
configuring, VLAN interfaces, bridged virtual interfaces      2nd 3rd 4th 5th 6th
configuring, VLANs, dynamic port assignment      2nd 3rd 4th
configuring, VLANs, example port assignment      2nd 3rd
configuring, VLANs, static port assignment      2nd
configuring, VLANs, verifying port assignment      2nd
configuring, voice      2nd 3rd 4th 5th
configuring, voice modules on Catalyst 4000/4224      2nd
configuring, voice modules on Catalyst 6000      2nd
configuring, voice, access layer      2nd 3rd 4th 5th 6th
configuring, voice, core layer      2nd 3rd
configuring, voice, distribution layer      2nd 3rd
configuring, voice, IP phone support      2nd
configuring, VTP      2nd 3rd 4th 5th
configuring, VTP, changing versions      2nd
configuring, VTP, example      2nd
configuring, VTP, modes      2nd
configuring, VTP, pruning      2nd
configuring, VTP, setting passwords      2nd
configuring, VTP, verifying operation      
configuring, WAN interfaces, FlexWAN      2nd
configuring, WAN interfaces, Gigabit Ethernet      2nd
configuring, WAN interfaces, POS      2nd
configuring, WAN interfaces, VIP2      2nd 3rd
congestion avoidance, thresholds      2nd
connections, back-to-back, 56/64-kbps CSU/DSU      
connections, back-to-back, asynchronous      
connections, back-to-back, Ethernet      
connections, back-to-back, T1/E1 CSU/DSU      2nd
connector pinouts      
context-sensitive help, IOS      2nd
controlling traffic, protocol filtering, verifying configuration      
COPS (Common Open Policy Service)      2nd 3rd 4th
copying, system files      2nd
Core layer functionality      
core layer, QoS, applying to voice traffic      2nd 3rd
COS (Catalyst Operating System)      2nd
COS switches, ATM LANE, configuring      2nd 3rd 4th 5th 6th 7th
COS switches, ATM LANE, displaying information      2nd
COS switches, ATM LANE, example      2nd
COS switches, EtherChannel, configuring      2nd 3rd 4th 5th 6th 7th
COS switches, EtherChannel, displaying information      
COS switches, Layer 2 port selection      2nd
COS switches, Layer 2 port selection, example
COS switches, Token Ring, configuring      2nd 3rd 4th 5th 6th
COS switches, Token Ring, displaying information      
COS, command history      2nd
COS, commands, editing      
COS, context-sensitive help      
COS, GVRP, configuring      2nd
COS, GVRP, dynamic VLAN creation      2nd
COS, GVRP, example configuration      2nd
COS, modes      2nd
COS, refreshing input      
COS, session timeout values, configuring      
COS, STP, configuring      2nd 3rd 4th 5th 6th 7th
COS, syntax checking      2nd
COS, Telnet sessions, closing      
COS, trunking modes      2nd
COS, VLANs, creating      
COS, VTP off mode      
COS-based switches, Ethernet, configuring      2nd 3rd 4th 5th 6th 7th
COS-based switches, Ethernet, displaying information      2nd
creating, community VLANs      
creating, isolated VLANs      
creating, private edge VLANs      2nd
creating, traffic policers      2nd 3rd 4th 5th 6th
creating, VLANs      2nd 3rd 4th 5th
creating, VLANs, example      2nd
creating, VLANs, extended range      2nd
creating, VLANs, standard range      2nd
databases, VTP, configuring      2nd
databases, VTP, domain name, specifying      
databases, VTP, dynamic VLAN configuration      2nd 3rd 4th
date and time, system calendar configuration      
debouncing, port state changes      
default destination port, defining for switching table      
default gateways, configuring      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2017
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте