Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration
Hucabi D., McQuerry S. — Cisco Field Manual: Catalyst Switch Configuration



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Cisco Field Manual: Catalyst Switch Configuration

Авторы: Hucabi D., McQuerry S.

Аннотация:

Covering the most commonly used features configured on Cisco and Catalyst switches, this reference guide provides instructions for popular deployment tasks. It explains the configuration options and details each step of the process, with side-by-side comparisons between COS and Cisco IOS Software. Hucaby is a network engineer for the University of Kentucky. McQuery is an instructor and consultant.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2002

Количество страниц: 560

Добавлена в каталог: 19.08.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
SLB, sticky connections, configuring      2nd 3rd 4th 5th 6th 7th 8th 9th
SNMP, access, configuring      2nd 3rd 4th 5th 6th
SNMP, configuration files, saving      
SNMP, configuring      2nd
SNMP, displaying information      
SNMP, example      2nd
SNMP, notifications, traps      2nd
SNMP, RMON support      2nd
SPAN (Switched Port Analyzer), configuring      2nd
SPAN (Switched Port Analyzer), destination port, configuring      
SPAN (Switched Port Analyzer), displaying information      2nd
SPAN (Switched Port Analyzer), example      2nd
SPAN (Switched Port Analyzer), RSPAN, configuring      2nd 3rd 4th 5th
SPAN (Switched Port Analyzer), source, configuring      2nd
Spanning Tree MAC reduction, enabling on extended range VLANs      2nd
SRM (single router mode), configuring      2nd 3rd
SRM (single router mode), displaying information      
SSH (Secure Shell), configuring      2nd 3rd
SSRP (Simple Server Redundancy Protocol)      
standard VLANs, creating      2nd
standby Supervisor, system redundancy      
state parameter, Ethernet VLANs, configuring      
static port assignment (VLANs)      2nd
static port assignment, example      2nd 3rd
static port assignment, verifying      
static switching table entries, assigning      
statistics, QoS, exporting      2nd 3rd 4th
sticky connections      2nd 3rd 4th 5th 6th 7th 8th 9th
STP (Spanning Tree Protocol)      
STP Root Guard, enabling      
STP, BID      
STP, BPDUs, TC bit set      
STP, configuring      2nd 3rd 4th 5th 6th 7th
STP, convergence tuning      2nd 3rd 4th 5th
STP, displaying information      
STP, election processes      
STP, example      2nd
STP, examples      
STP, improving stability      
STP, load balancing, examples      2nd
STP, path costs      2nd
STP, port states      
STP, tiebreakers      2nd
STP, topology changes      2nd
STP, topology navigation      2nd 3rd 4th 5th
Supervisor Engine, banners, configuring      2nd
Supervisor Engine, boot parameter, synchronizing      2nd
Supervisor Engine, forcing changes in backup Supervisor      2nd
Supervisor Engine, high availability, versioning      2nd 3rd
Supervisor Engine, IOS images, synchronizing      2nd
Supervisor Engine, prompts, configuring      
Supervisor Engine, system redundancy      
suppressing, broadcasts      2nd 3rd 4th 5th
suppressing, broadcasts, time-based      
suppressing, broadcasts, verifying configuration      
switch authentication, configuring      2nd
switch authentication, example      2nd
switch authentication, RADIUS, configuring      2nd
switch authentication, TACACS, configuring      2nd
switch operating systems, Cisco IOS      
switch operating systems, COS      2nd
switch ports, path costsshortmode, default port cost      2nd
switch ports, STP states      
switched networks, design principles      2nd 3rd 4th 5th 6th
switches, booting in rommon mode      
switching table, aging time, configuring      
switching table, configuring      
switching table, default destination port, defining      
switching table, displaying information      
switching table, example configuration      2nd 3rd
switching table, removing entries      
switching VTP versions      2nd
switchport trunk encapsulation command      
synchronizing, boot parameters      2nd
synchronizing, IOS images      2nd
synchronous logging      
syntax checking (COS)      2nd
syntax, show commands      
syslog server, message logging      2nd 3rd 4th
syslog server, message logging, displaying information      2nd
syslog server, message logging, rate-limiting      
syslog server, message logging, severity level      2nd
syslog server, message logging, severity levels      2nd
syslog server, message logging, time stamping      
syslog server, message logging, to terminal sessions      2nd
system time, example configuration      
system time, manual configuration      2nd 3rd 4th
T1/E1 CSU/DSU back-to-back connections      2nd
TACACS, configuring      2nd
TCN BPDUs      2nd
Telnet, closing sessions      
Telnet, SSH, configuring      2nd 3rd
temperature monitoring      2nd
terminal screen length, configuring      2nd
terminal sessions, IOS      2nd
terminal sessions, IOS, configuring timeout values      2nd
terminal sessions, IOS, displaying      
terminal sessions, IOS, ending      
terminal sessions, IOS, resuming      
terminal sessions, IOS, screen format      
tiebreakers (STP)      2nd
time stamping, syslog messages      
time zone, configuring      
time-based broadcast suppression      
timeout values, IOS terminal sessions, configuring      2nd
timers, GARP      
timers, STP convergence tuning      2nd 3rd 4th 5th
token bucket algorithm      
Token Ring, configuring      2nd 3rd 4th
Token Ring, displaying information      
Token Ring, example configuration      2nd
topology changes (STP)      2nd
ToS (Type of Service) byte      
traceroute command, router discovery      2nd 3rd 4th
tracing packets, example      2nd
tracing, packets      2nd 3rd
traffic, broadcast suppression      2nd
traffic, broadcast suppression, configuring      2nd 3rd
traffic, broadcast suppression, time-based      
traffic, broadcast suppression, verifying configuration      
traffic, controlling with protocol filtering, verifying configuration      
traffic, load balancing, SLB      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th
traffic, out-of-profile      
traffic, policing      2nd 3rd 4th 5th 6th 7th
traffic, QoS policies      2nd 3rd 4th 5th 6th
traffic, QoS policies, applying      2nd 3rd 4th 5th 6th
traffic, QoS policies, class maps      2nd
traffic, QoS policies, defining      2nd 3rd 4th
traffic, restricting with VLAN ACLs      2nd
traffic, restricting with VLAN ACLs, COS configuration      2nd
traffic, restricting with VLAN ACLs, IOS configuration      2nd 3rd
transferring, system files      2nd
traps (SNMP)      2nd
truncated mode (SFM)      
trunking, configuring      2nd 3rd
trunking, DTP, disabling      
trunking, encapsulation method, specifying      2nd
trunking, example      2nd
trunking, identifying trunk link      
trunking, removing VLANs from trunk lins      2nd
trunking, verifying VLAN port assignments      
trunking, VTP, changing modes      2nd
trunking, VTP, changing versions      2nd
trunking, VTP, configuring      2nd 3rd
trunking, VTP, example      2nd
trunking, VTP, pruning      2nd
trunking, VTP, server mode      
trunking, VTP, setting passwords      2nd
trunking, VTP, verifying operation      
trunks, 802.1Q, voice traffic transport      
trunks, scaling      
tuning, egress scheduling      2nd
tuning, ingress port queues      2nd 3rd 4th 5th
type codes, Ethernet      2nd 3rd 4th 5th 6th 7th 8th 9th
UDLD (Unidirectional Link Detection)      
unicast packets, flooding suppression      
upgrading, IDSM hardware      2nd 3rd
uplink failover of switched networks      
usage errors (COS)      2nd
user interface, COS, features      
user interface, IOS, features      2nd
user mode (COS)      
user modes, IOS Software      2nd
user-level passwords, configuring      
user-level passwords, recovering      2nd
VACLs, example      2nd
verifying, broadcast suppression configuration      
verifying, Layer 3 EtherChannel configuration      2nd
verifying, Layer 3 Ethernet interface configuration
verifying, Layer 3 routing table routes
verifying, port security      
verifying, private VLAN operation      
verifying, STP operation      2nd 3rd 4th 5th
verifying, VLAN interface configuration      
verifying, VLAN port assignments      
verifying, VTP operation      
verifying, WAN interface configuration      
versioning Supervisor Engine      2nd 3rd
versions of VTP, switching      2nd
viewing, ATM LANE information      2nd
viewing, CEF information      2nd 3rd 4th
viewing, CGMP information      2nd
viewing, EtherChannel information      2nd
viewing, file system devices      2nd 3rd
viewing, GMRP information      2nd
viewing, HSRP information      
viewing, IDSM information      2nd
viewing, IGMP snooping information      2nd
viewing, installed modules      
viewing, Layer 2 information      2nd
viewing, MLS information      2nd 3rd
viewing, module configurations      
viewing, MSFC config-sync mode information      2nd
viewing, NAM information      
viewing, NDE information      
viewing, QoS information      2nd
viewing, QoS management information      
viewing, RGMP information      
viewing, SFM information      
viewing, SLB information      2nd
viewing, SNMP information      
viewing, SPAN information      2nd
viewing, SRM information      
viewing, STP information      
viewing, switching table information      
viewing, Token Ring information      
viewing, voice module information      
viewing, voice port information      
VIP2 WAN interfaces, configuring      2nd 3rd
VLAN database mode (IOS)      
VLAN interfaces, bridged virtual interfaces, configuring      2nd 3rd
VLAN interfaces, bridged virtual interfaces, subinterface configuration      2nd 3rd
VLAN interfaces, configuring      2nd 3rd
VLAN interfaces, example configuration      
VLAN interfaces, verifying configuration      
VLAN, ACLs      2nd
VLAN, ACLs, COS configuration      2nd
VLAN, ACLs, IOS configuration      2nd 3rd
VLANs, creating      2nd 3rd 4th 5th
VLANs, creating for COS devices      
VLANs, creating, example      2nd
VLANs, Ethernet, configurable parameters      
VLANs, extended range, creating      2nd
VLANs, extending with IRB      2nd 3rd 4th
VLANs, ports, dynamic assignment      2nd 3rd 4th
VLANs, ports, static assignment      2nd
VLANs, ports, verifying assignment      2nd
VLANs, private edge VLANs, creating      2nd
VLANs, private VLANs, configuring      2nd 3rd
VLANs, private VLANs, example configuration      2nd 3rd 4th
VLANs, private VLANs, verifying operation      
VLANs, standard range, creating      2nd
VLANs, trunking, configuring      2nd 3rd
VLANs, trunking, example      2nd
VLANs, trunking, identifying trunk link      
VLANs, trunking, removing VLANs from trunk link      2nd
VLANs, trunking, specifying encapsulation method      2nd
VLANs, VTP, changing versions      2nd
VLANs, VTP, configuring      2nd 3rd 4th 5th
VLANs, VTP, example configuration      2nd
VLANs, VTP, pruning      2nd
VLANs, VTP, server mode      
VLANs, VTP, setting passwords      2nd
VLANs, VTP, smodes      2nd
VLANs, VTP, verifying operation      
VMPS (VLAN Membership Policy Server), client configuration      2nd
VMPS (VLAN Membership Policy Server), server configuration      2nd
voice modules, Catalyst 4000 access gateway, configuring      2nd
voice modules, Catalyst 6000, configuring      2nd
voice modules, displaying information      
voice ports, displaying information      
voice ports, power allocations      2nd
voice, access layer configuration      
voice, configuring      2nd 3rd 4th 5th
voice, IP phone support, example      2nd
voice, over 802.1Q trunks      
voice, QoS      2nd
voice, QoS, access layer configuration      2nd 3rd 4th 5th
voice, QoS, core layer configuration      2nd 3rd
voice, QoS, distribution layer configuration      2nd 3rd
VTP (VLAN Trunking Protocol), configuring      2nd 3rd 4th 5th
VTP (VLAN Trunking Protocol), example configuration      2nd
VTP (VLAN Trunking Protocol), modes      2nd
VTP (VLAN Trunking Protocol), pruning      2nd
VTP (VLAN Trunking Protocol), setting passwords      2nd
VTP (VLAN Trunking Protocol), verifying operation      
VTP (VLAN Trunking Protocol), versions, changing      2nd
VTP, domain name, specifying      
VTP, domain names      
VTP, off mode (COS)      
VTP, server mode      
WAN interfaces, configuring      
WAN interfaces, example configuration      2nd
WAN interfaces, FlexWAN, configuring      2nd
WAN interfaces, Gigabit Ethernet, configuring      2nd
WAN interfaces, POS, configuring      2nd
WAN interfaces, verifying configuration      
WAN interfaces, VIP2, configuring      2nd 3rd
Web browser interface, configuring      2nd
well-known numbers, Ethernet type codes      2nd 3rd 4th 5th 6th 7th 8th 9th
well-known numbers, ICMP type codes      2nd 3rd 4th 5th 6th 7th 8th
well-known numbers, IP multicast addresses      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th
well-known numbers, IP port numbers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th
well-known numbers, IP protocol numbers      2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th
XOR (exclusive-OR) operation      
xtocid162851      
xtocid171941      
xtocid275601      
xtocid48951      
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте