Skip to content

Cisco IOS in a Nutshell A Desktop Quick Reference for IOS on IP Networks

Spend $50 to get a free DVD!

ISBN-10: 0596008694

ISBN-13: 9780596008697

Edition: 2nd 2005

Authors: James Boney

List price: $39.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line…    
Customers also bought

Book details

List price: $39.95
Edition: 2nd
Copyright year: 2005
Publisher: O'Reilly Media, Incorporated
Publication date: 9/1/2005
Binding: Paperback
Pages: 796
Size: 6.00" wide x 9.00" long x 1.50" tall
Weight: 2.090
Language: English

Jim Boney has worked for the last eight years as a consultant specializing in a wide variety of subjects: network design, network management, Unix administration, and programming in various languages (Perl, Java, Tcl/Tk, and C/C++). For the last three years, he has been working on the vLab project, which allows complete access to Cisco routers over the Internet.

Preface
Getting Started
IOS User Modes
Command-Line Completion
Get to Know the Question Mark
Command-Line Editing Keys
Pausing Output
Show Commands
IOS Images and Configuration Files
IOS Image Filenames
The New Cisco IOS Packaging Model
Loading Image Files Through the Network
Using the IOS Filesystem for Images
The Router's Configuration
Loading Configuration Files
Basic Router Configuration
Setting the Router Name
Setting the System Prompt
Configuration Comments
The Enable Password
Mapping Hostnames to IP Addresses
Setting the Router's Time
Enabling SNMP
Cisco Discovery Protocol
System Banners
Line Commands
The line Command
The Console Port
Virtual Terminals (VTYs)
Asynchronous Ports (TTYs)
The Auxiliary (AUX) Port
Show line
Reverse Telnet
Common Configuration Items
Interface Commands
Naming and Numbering Interfaces
Basic Interface Configuration Commands
The Loopback Interface
The Null Interface
Ethernet, Fast Ethernet, and Gigabit Ethernet Interfaces
Token Ring Interfaces
ISDN Interfaces
Serial Interfaces
Asynchronous Interfaces
Interface show Commands
Networking Technologies
Frame Relay
ATM
DSL
Cable
VoIP
Access Lists
How Packets Match a List Entry
Types of Access Lists
Specific Topics
IP Routing Topics
Autonomous System (AS) Numbers
Interior and Exterior Gateway Protocols
Distance-Vector and Link-State Routing Protocols
Static Routes
Split Horizon
Passive Interfaces
Fast Switching and Process Switching
Interior Routing Protocols
RIP
IGRP
EIGRP
OSPF
IS-IS
Border Gateway Protocol
Introduction to BGP
A Simple BGP Configuration
Route Filtering
An Advanced BGP Configuration
Neighbor Authentication
Peer Groups
Route Reflectors
BGP Confederacies
BGP TTL Security
Quality of Service
Marking
Older Queuing Methods
Modern IOS QoS Tools
Congestion Avoidance
Traffic Policing
Traffic Shaping
AutoQoS
QoS Device Manager
Dial-on-Demand Routing
Configuring a Simple DDR Connection
Sample Legacy DDR Configurations
Dialer Interfaces (Dialer Profiles)
Multilink PPP
Snapshot DDR
Specialized Networking Topics
Bridging
Hot Standby Routing Protocol (HSRP)
Network Address Translation (NAT)
Tunnels
Encrypted Tunnels
Multicast Routing
Multiprotocol Label Switching (MPLS)
Switches and VLANs
Switch Terminology
IOS on Switches
Basic Switch Configuration
Trunking
Switch Monitor Port for IDS or Sniffers
Troubleshooting Switches
Router Security
Securing Enable Mode Access
Routine Security Measures
Restricting Access to Your Router
Troubleshooting and Logging
Ping
Trace
Debugging
Logging
Quick Reference
Appendix
Index