Introduction | |
Communication Basics | p. 1 |
Analog and Digital Transmissions | p. 2 |
Communication Synchronization | p. 9 |
Understanding Topologies | p. 10 |
Connection Types | p. 15 |
Data Packaging | p. 18 |
The OSI Model | p. 25 |
Transport Layer Services | p. 33 |
Understanding Logical Topologies | p. 41 |
Local Area Network Topologies | p. 42 |
Wide Area Network Topologies | p. 64 |
Protocols | p. 83 |
The Internet Protocol Suite (IP) | p. 84 |
Internetwork Packet Exchange (IPX) | p. 121 |
Network Basic Input/Output System (NetBIOS) | p. 136 |
AppleTalk | p. 142 |
Bridging and Switching | p. 149 |
Bridges | p. 150 |
Switches | p. 158 |
Designing Networks with Bridges and Switches | p. 171 |
Routing | p. 181 |
Protocol Review | p. 182 |
Routers | p. 186 |
Routing Tables | p. 189 |
Layer 3 Switching | p. 203 |
Designing Networks with Routers | p. 204 |
Routing Protocols | p. 211 |
Routing with IP | p. 212 |
IPX Routing | p. 221 |
Routing with NetBIOS | p. 223 |
AppleTalk Routing | p. 226 |
Protocol-Independent Routing | p. 227 |
Cisco IOS | p. 229 |
Online Help | p. 230 |
Modes of Operation | p. 232 |
Configuration Basics | p. 241 |
Management via HTTP | p. 252 |
Understanding Cisco Memory | p. 254 |
Installing Cisco IOS | p. 259 |
Selecting a Feature Set | p. 260 |
The Router Software Loader | p. 261 |
Cisco ConfigMaker | p. 267 |
TFTP | p. 281 |
Access Lists | p. 291 |
Available Options | p. 292 |
Static Packet Filtering | p. 292 |
Dynamic Packet Filtering | p. 301 |
Access List Basics | p. 307 |
Creating a Set of IP Access Lists | p. 319 |
Non-IP Access Lists | p. 333 |
Installing Your Access Rules | p. 340 |
Creating a Bastion Router | p. 349 |
What Is a Bastion Host? | p. 350 |
Security Check | p. 350 |
Disabling Unneeded Services | p. 354 |
Password Security | p. 359 |
Additional Security Precautions | p. 363 |
Virtual Private Networking | p. 369 |
Authentication and Encryption | p. 370 |
Encryption 101 | p. 377 |
Good Encryption Required | p. 386 |
VPN Basics | p. 387 |
Standards Used by Cisco | p. 393 |
VPN Deployment | p. 401 |
Configuring VPN Access | p. 407 |
Managing Cisco Routers | p. 413 |
Logging to Syslog | p. 414 |
Backup and Management via TFTP | p. 433 |
Management via SNMP | p. 437 |
Network Case Studies | p. 447 |
Case Study 1: A Subnet Masking Puzzle | p. 448 |
Case Study 1: Implementing the Solution | p. 453 |
Case Study 2: Router Table Efficiency | p. 457 |
Case Study 2: Implementing the Solution | p. 462 |
Case Study 3: Designing a New WAN | p. 470 |
Case Study 3: Implementing the Solution | p. 475 |
Real-World Routing: Advice from the Field | p. 481 |
Case Study 1: Dedicated Internet Access | p. 482 |
Case Study 2: Private WAN Using Dedicated Lines | p. 497 |
Case Study 3: Private IP/IPX WAN Using Frame Relay | p. 505 |
Case Study 4: A Multipoint VPN | p. 516 |
Case Study 5: A Network Operations Center | p. 533 |
Case Study 6: A Large Network Infrastructure | p. 556 |
Getting Cisco Certified | p. 583 |
The Brief History of Cisco Certifications | p. 584 |
Why Get Certified? | p. 585 |
Certification Levels | p. 587 |
Certification Requirements | p. 597 |
Preparing for the Tests | p. 597 |
Taking the Tests | p. 601 |
Glossary | p. 603 |
Index | p. 677 |
Table of Contents provided by Blackwell. All Rights Reserved. |