Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Cisco Field Manual: Catalyst Switch Configuration

Авторы: Hucabi D., McQuerry S.

Аннотация:

Covering the most commonly used features configured on Cisco and Catalyst switches, this reference guide provides instructions for popular deployment tasks. It explains the configuration options and details each step of the process, with side-by-side comparisons between COS and Cisco IOS Software. Hucaby is a network engineer for the University of Kentucky. McQuery is an instructor and consultant.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 560

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
logging messages to syslog server, severity levels      2nd
logging messages to syslog server, time stamping      
longmode, default port cost      2nd
loop detection, STP, configuring      2nd 3rd 4th 5th 6th 7th
loop detection, STP, convergence tuning      2nd 3rd 4th 5th
loop detection, STP, displaying information      
loop detection, STP, example      2nd
loop detection, STP, example of poor root placement      
loop detection, STP, improving stability      
loop detection, STP, load balancing example      2nd
loop detection, STP, topology changes      2nd
loop detection, STP, topology navigation      2nd 3rd 4th 5th
loop prevention, STP, BID      
loop prevention, STP, BPDUs      
loop prevention, STP, election processes      
loop prevention, STP, path costs      2nd
loop prevention, STP, port states      
loop prevention, STP, tiebreakers      2nd
lost passwords, recovering      2nd
manual system time configuration      2nd 3rd 4th
mapping, internal DSCP values to egress CoS values      2nd
marking, Layer 2 frames      2nd
marking, Layer 3 frames      2nd
MaxAge timer (STP), adjusting      
maximum cabling distances      2nd
memory, buffer, setting for system logging      
messages, logging      2nd 3rd
messages, logging to syslog server      2nd 3rd 4th 5th 6th 7th 8th
messages, logging to syslog server:rate-limiting      
messages, logging to syslog server:severity level      2nd
messages, logging to syslog server:severity levels      2nd
messages, logging to syslog server:time stamping      
microflow policers      
MISTP, instance activation      2nd
MLS (multilayer switching)      2nd
MLS (multilayer switching), configuring      2nd 3rd
MLS (multilayer switching), external routers      2nd 3rd
MLS, displaying information      2nd 3rd
MLS, example      2nd
MLS, flow mask      
modes of COS      2nd
modes of operation, GVRP      
modes of VTP operation      2nd
modules, accessing      
modules, configurations, clearing      
modules, FlexWAN, configuring      2nd
modules, IDSM, configuring      2nd 3rd 4th 5th 6th 7th 8th
modules, IDSM, displaying information      2nd
modules, IDSM, removing from switch chassis      
modules, IDSM, upgrading      2nd 3rd
modules, NAM, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th
modules, NAM, displaying information      
modules, NAM, removing from switch chassis      2nd
modules, powering on/off      
modules, resetting      
modules, SFM, configuring      2nd
modules, SFM, displaying information      
modules, viewing      
modules, viewing configurations      
monitoring, environmental conditions      2nd
MOTD (Message of the Day) banners, configuring      2nd
moving, system files      2nd
MSFC, redundancy, config-sync mode      2nd 3rd 4th 5th 6th 7th 8th
MSFC, SRM, configuring      2nd 3rd
MSFC, SRM, displaying information      
mtu parameter, Ethernet VLANs, configuring      
mulitcast, RGMP, configuring      2nd
multicast addressing, tree structures      
multicast packets, flooding suppression      
multicast, CGMP, configuring      2nd
multicast, CGMP, displaying information      2nd
multicast, CGMP, example      
multicast, GMRP, configuring      2nd 3rd
multicast, GMRP, displaying information      2nd
multicast, IGMP snooping      2nd
multicast, IGMP snooping, configuring      2nd 3rd
multicast, IGMP snooping, displaying information      2nd
multicast, IGMP snooping, example      
multicast, RGMP, displaying information      
NAM (Network Analysis Module), configuring      2nd 3rd 4th 5th 6th 7th 8th 9th
NAM (Network Analysis Module), displaying information      
NAM, removing from switch chassis      2nd
name parameter, Ethernet VLANs, configuring      
native VLAN (802.1Q), switching      
navigating STP topology      2nd 3rd 4th 5th
navigating, IFS      2nd 3rd
NDE (Netflow Data Export), configuring      2nd
NDE (Netflow Data Export), example      2nd
NDE, displaying information      
nested Telnet sessions      
NetFlow Collector      
network management, SNMP, configuring      2nd 3rd 4th 5th 6th 7th 8th
network management, SNMP, displaying information      
network management, SNMP, example      2nd
network management, SNMP, notifications      2nd 3rd
network management, SNMP, RMON support      2nd
network management, SNMP, saving configuration file to TFTP server      
network media, connector pinouts      
network media, maximum cabling distances      2nd
nonegotiate trunking mode (COS)      
normal mode (UDLD)      
normal range, VLAN numbers      
normal registration mode (GVRP)      
normal routing table (CEF)      
notifications, SNMP, defining recipients      
notifications, SNMP, traps      2nd
NSAP addresses      2nd
off mode (VTP)      
off trunking mode (COS)      
on trunking mode (COS)      
operating systems, backward compatibility, alias commands      
operating systems, Cisco IOS      
operating systems, COS      2nd
out-of-profile traffic      
packets, tracing      2nd 3rd
packets, tracing, example      2nd
passwords, privileged, configuring      
passwords, recovering      2nd
passwords, recovering on IOS devices      2nd 3rd
passwords, setting for VTP      2nd
passwords, user-level, configuring      
path costs, STP      2nd
pause frames      
permanently deleting files from Flash      
permit lists, configuring      2nd
permit lists, example      2nd
PHBs (per-hop behavior)      
ping command, verifying packet reachability      2nd 3rd
pinouts      
policers, creating      2nd 3rd 4th 5th 6th
policies, QoS      2nd 3rd 4th 5th 6th
policies, QoS, applying      2nd 3rd 4th 5th 6th
policies, QoS, COPS      2nd 3rd 4th
policies, QoS, defining      2nd 3rd 4th
policing traffic      
port authentication, configuring      2nd 3rd
port numbers, well-known      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
port security, configuring      2nd
port security, example      2nd
port security, verifying configuration      
port security, violations      
port-based traffic classification      2nd 3rd 4th 5th 6th 7th 8th
ports (VLAN), dynamic assignment      2nd 3rd 4th
ports (VLAN), dynamic assignment, verifying      
ports (VLAN), static assignment      2nd
ports (VLAN), static assignment, example      2nd 3rd
ports (VLAN), static assignment, verifying      
ports, Layer 2, selecting      2nd 3rd 4th
ports, trunking      2nd 3rd 4th
POS interfaces, configuring      2nd
power allocations, voice ports      2nd
power-supply redundancy, configuring      2nd
power-supply redundancy, displaying information      
powering modules on/off      
Prefix field (NSAP addresses)      
primary Supervisor, changing backup Supervisor configuration      2nd
private edge VLANs, creating      2nd
private VLANs, configuring      2nd 3rd
private VLANs, example configuration      2nd 3rd 4th
private VLANs, verifying operation      
privileged EXEC mode (IOS)      
privileged mode (COS)      
privileged passwords, configuring      
privileged passwords, recovering      
probes, traceroute      2nd 3rd
prompts, configuring      
prompts, example configuration      
protected ports, creating private edge VLANs      2nd
protocol filtering, example      2nd 3rd
protocol filtering, verifying configuration      
pruning, VTP      2nd
QoS, capabilities among Catalyst switch families      2nd 3rd 4th
QoS, configuring on Catalyst 2900XL/3500XL      2nd
QoS, congestion-avoidance, thresholds      2nd
QoS, DHCP, PHBs      
QoS, DiffServ      
QoS, displaying information      2nd
QoS, domains      
QoS, DSCP, fields      2nd 3rd 4th 5th 6th 7th
QoS, egress scheduling, tuning      2nd
QoS, example      2nd 3rd 4th 5th 6th
QoS, exporting data      2nd 3rd
QoS, exporting data, example      
QoS, ingress port queues, tuning      2nd 3rd 4th 5th
QoS, internal DSCP value      
QoS, internal DSCP values, mapping to egress CoS values      2nd
QoS, Layer 2 classification and marking      2nd
QoS, Layer 3 classification and marking      2nd
QoS, management, displaying information      
QoS, network design principles      
QoS, policies      2nd 3rd 4th 5th 6th
QoS, policies, applying      2nd 3rd 4th 5th 6th
QoS, policies, class maps      2nd
QoS, policies, COPS      2nd 3rd 4th
QoS, policies, defining      2nd 3rd 4th
QoS, policing      
QoS, queuing      
QoS, traffic classification, port-based      2nd 3rd 4th 5th 6th 7th 8th
QoS, traffic policing      2nd 3rd 4th 5th 6th
QoS, voice traffic      2nd
QoS, voice traffic, access layer configuration      2nd 3rd 4th 5th
QoS, voice traffic, core layer configuration      2nd 3rd
QoS, voice traffic, distribution layer configuration      2nd 3rd
queuing      
RADIUS, configuring      2nd
rate-limiting, syslog messages      
reachability, verifying with ping command      2nd 3rd
recalling commands      2nd
recipients of SNMP notifications, defining      
recovering, lost passwords      2nd
redisplaying command input (COS)      
redundancy, high availability, enabling      2nd 3rd
redundancy, HSRP      2nd
redundancy, HSRP, configuring      2nd 3rd
redundancy, HSRP, displaying information      
redundancy, HSRP, example      2nd
redundancy, MSFC, config-sync mode      2nd 3rd 4th 5th 6th 7th 8th
redundancy, MSFC, SRM      2nd 3rd 4th 5th
redundancy, of network building blocks      2nd
redundancy, Supervisor Engine slots      
redundancy, synchronizing boot parameters      2nd
redundant power supplies, configuring      2nd
redundant power supplies, displaying information      
Regular expressions      2nd
removing, files from Flash      2nd 3rd
removing, IDSM module from switch chassis      
removing, NAM module from switch chassis      2nd
removing, switching table entries      
removing, VLANs from trunk links      2nd
resetting, modules      
restricting traffic with VACLs, example      2nd
resuming, IOS terminal sessions      
RGMP (Router-port Group Management Protocol), configuring      2nd
RGMP, displaying information      
RMON history statistics, collecting      2nd
rollover cables      
ROM Monitor, command set      2nd 3rd
ROM Monitor, saving configuration variables      
root bridge election (STP)      
root port election      
router discovery, traceroute command      2nd 3rd 4th
routing tables, configuring      2nd
RPF (Reverse Path Forwarding)      
RSPAN (Remote SPAN), configuring      2nd
RSPAN (Remote SPAN), destination port, configuring      2nd
RSPAN (Remote SPAN), source, configuring      
RTP (Real-Time Transport Protocol)      
saving, ROM Monitor configuration variables      
scaling, trunks      
SCCP (Skinny Client Control Protocol)      
screen format, IOS terminal sessions      
searching, IOS command output      2nd
security, firewalls, SLB load balancing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st
security, IDSM, configuring      2nd 3rd 4th 5th 6th 7th 8th
security, IDSM, displaying information      2nd
security, IDSM, performing hardware upgrades      2nd 3rd
security, permit lists, configuring      2nd
security, permit lists, example configuration      2nd
security, port authentication, configuring      2nd 3rd
security, port security, configuring      2nd
security, port security, example      2nd
security, port security, verifying configuration      
security, port security, violations      
security, SNMP, defining policies      2nd
security, SSH, configuring      2nd 3rd
security, switch authentication      2nd
security, switch authentication, example configuration      2nd
security, switch authentication, RADIUS      2nd
security, switch authentication, TACACS      2nd
security, VLAN ACLs      2nd
security, VLAN ACLs, COS configuration      2nd
security, VLAN ACLs, IOS configuration      2nd 3rd
selecting, IDSM service packs      
selecting, Layer 2 ports      2nd 3rd
selecting, Layer 2 ports, example
Selector field (NSAP addresses)      
server farms, load balancing, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th
server farms, load balancing, DFP      2nd 3rd
server farms, load balancing, SLB      2nd 3rd 4th 5th 6th 7th 8th
server farms, SLB, probes      2nd 3rd 4th 5th
server mode (VTP)      
service contact ports      
service packs, IDSM, selecting      
session command, accessing modules      
session timeout values, configuring      
set length command      2nd
setting, switch buffer size      
severity level of syslog messages, setting      2nd
SFM (Switch Fabric Module), configuring      2nd
SFM (Switch Fabric Module), displaying information      
show commands, syntax      
show modules command      
SLB, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th
SLB, DFP, configuring      2nd 3rd
SLB, displaying information      2nd
SLB, example      2nd 3rd 4th 5th 6th
SLB, firewall load balancing      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
SLB, firewall load balancing, displaying information      2nd
SLB, firewall load balancing, example      2nd 3rd 4th 5th 6th
SLB, probes, configuring      2nd 3rd 4th 5th
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте