Cisco LAN switching configuration handbook

著者

書誌事項

Cisco LAN switching configuration handbook

Steve McQuerry, David Jansen, Dave Hucaby

Cisco Press, c2009

2nd ed.

  • pbk.

タイトル別名

A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches

大学図書館所蔵 件 / 1

この図書・雑誌をさがす

内容説明・目次

内容説明

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE (R) No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco (R) Catalyst (R) switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS (R), followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations. This book is organized by groups of common features, with sections marked by shaded tabs for quick reference. Information on each feature is presented in a concise format, with background, configuration, and example components. The format is organized for easy accessibility to commands and their proper usage, saving you hours of research time. From the first page, the authors zero in on quick facts, configuration steps, and explanations of configuration options in each Cisco Catalyst switch feature. The quick reference format allows you to easily locate just the information you need without having to search through thousands of pages of documentation, helping you get your switches up and running quickly and smoothly. Whether you are looking for a handy, portable reference to more easily configure Cisco Catalyst switches in the field, or you are preparing for CCNA (R), CCNP (R), or CCIE (R) certification, you will find Cisco LAN Switching Configuration Handbook, Second Edition, to be an essential resource. Steve McQuerry, CCIE No. 6108, is a technical solutions architect with Cisco focused on data center solutions. Steve works with enterprise customers in the midwestern United States to help them plan their data center architectures. David Jansen, CCIE No. 5952, is a technical solutions architect (TSA) with Cisco focused on Data Center Architectures at Cisco. David has more than 20 years of experience in the IT industry. David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, ASA/PIX/FWSM security, and VPN product lines. Implement switched campus network designs Configure switch prompts, IP addresses, passwords, switch modules, file management, and administrative protocols Understand how Layer 3 interfaces are used in a switch Configure Ethernet, Fast Ethernet, Gigabit Ethernet, and EtherChannel interfaces Implement VLANs, trunking, and VTP Operate, configure, and tune Spanning Tree Protocol (STP) Handle multicast traffic and interact with multicast routers Streamline access to server and firewall farms with accelerated server load balancing Deploy broadcast suppression, user authentication, port security, and VLAN access lists Configure switch management features Implement QoS and high availability features Transport voice traffic with specialized voice gateway modules, inline power, and QoS features This book is part of the Networking Technology Series from Cisco Press (R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

目次

Introduction Chapter 1: CLI Usage 1-1: Cisco Internetwork Operating System (IOS) Software Using Cisco IOS Software 1-2: ROM Monitor Using the ROM Monitor Command Set Chapter 2: Switch Functionality 2-1: Catalyst Switch Families Catalyst 2000 Series Catalyst 3000 Series Catalyst 4500 Series Catalyst 6500 2-2: Switched Campus Network Designs Catalyst Switch Families Cisco Validated Designs: Campus Chapter 3: Supervisor Engine Configuration 3-1: Prompts and Banners Configuration of Prompt Configuration of Banner Feature Example 3-2: IP Addressing and Services Configuring an IP Management Address Configuring a Default Gateway Setting Up DNS Services or Host Tables Configuring HTTP Services Feature Example 3-3: Passwords and Password Recovery Configuration of Passwords Feature Example Password Recovery: Procedure 1 Feature Example Password Recovery on IOS Devices: Procedure 2 Feature Example 3-4: Managing Modules Viewing Modules Accessing Modules Resetting Modules Powering Modules Up and Down 3-5: File Management and Boot Parameters Navigating File Systems Deleting Files from Flash Copying System Files File System Boot Parameters Alias Commands 3-6: Redundant Supervisors Forcing a Change to the Standby Supervisor Synchronizing IOS Images Synchronizing Boot Parameters 3-7: Cisco Discovery Protocol Configuration of CDP Feature Example 3-8: Time and Calendar System Time Configuration Setting the System Time Manually Setting the System Time Through NTP Example Chapter 4: Layer 2 Interface Configuration 4-1: Switching Table Configuration Displaying Information About the Switching Table Switching Table Example 4-2: Port Selection Configuration Port Selection Example 4-3: Ethernet Configuration Ethernet Example Displaying Information About Layer 2 Interfaces 4-4: EtherChannel Configuration EtherChannel Example Displaying Information About EtherChannels Chapter 5: Layer 3 Interface Configuration 5-1: Layer 3 Switching 5-2: Layer 3 Ethernet Interfaces Configuration Verifying the Configuration Feature Example 5-3: Layer 3 EtherChannels Configuration Verifying the Channel Feature Example 5-4: WAN Interfaces Configuration Configuring an Enhanced FlexWAN Interface Configuring a SPA Interface Processor (SIP) / Shared Port Adapter (SPA) WAN Interface Configuring a Packet-over-SONET Interface Verifying Configurations Feature Example 5-5: Layer 3 Virtual Interfaces Configuring a VLAN Interface Configuring Subinterfaces Verifying Configurations Feature Example 5-6: Routing Tables Configuration Verifying Routes Chapter 6: VLANs and Trunking 6-1: VLAN Configuration Creation of an Ethernet VLAN Feature Example 6-2: VLAN Port Assignments Configuring Static VLANs Configuring Dynamic VLANs Verifying VLAN Assignments 6-3: Trunking Enabling Trunking Specifying VLANs to Trunk Verifying Trunks Feature Example 6-4: VLAN Trunking Protocol Enabling VTP for Operation Setting VTP Passwords Changing VTP Modes Enabling VTP Pruning Changing VTP Versions Verifying VTP Operation Feature Example 6-5: Private VLANs Configuring Private VLANs Configuring Private Edge VLANs Verifying Private VLAN Operation Feature Example Chapter 7: Spanning Tree Protocol (STP) 7-1: STP Operation STP Process STP Tiebreakers Path Costs STP Port States STP Topology Changes Improving STP Stability STP Operation Example 7-2: STP Configuration Displaying Information About STP STP Configuration Examples Poor STP Root Placement STP Load Balancing 7-3: STP Convergence Tuning Configuring STP Convergence Tuning 7-4: Navigating the Spanning-Tree Topology Chapter 8: Configuring High Availability Features 8-1: Route Processor Redundancy (RPR/RPR+) Configuration Displaying Information About RPR 8-2: Non-Stop Forwarding/Supervisor Switchover (NSF/SSO) with Supervisor Redundancy SSO/NSF Configuration Displaying Information About SSO and NSF 8-3: Router Redundancy with HSRP Configuration HSRP Example Displaying Information About HSRP 8-4: Fast Software Upgrade (FSU) and Enhanced Fast Software Upgrade (eFSU) Chapter 9: Multicast 9-1: Multicast Addressing 9-2: IGMP Snooping Configuration IGMP Snooping Example Displaying Information About IGMP Snooping Chapter 10: Server Load Balancing (SLB) 10-1: SLB Configuration SLB Example Displaying Information About SLB 10-2: SLB Firewall Load Balancing Configuration Firewall Load-Balancing Example Displaying Information About Firewall Load Balancing 10-3: SLB Probes Configuration Displaying Information About SLB Probes Chapter 11: Controlling Traffic and Switch Access 11-1: Broadcast Suppression Configuring Broadcast Suppression Verifying Configuration Feature Example 11-2: Protocol Filtering Configuration Verification Feature Example 11-3: Port Security Configuration Verification Feature Example 11-4: VLAN Access Control Lists IOS VACL Configuration Verification Feature Example 11-5: Switch Authentication Configuration Verification Feature Example 11-6: Access Class Configuration Verification Feature Example 11-7: SSH Telnet Configuration Configuration Verification Feature Example 11-8: 802.1X Port Authentication Configuration Feature Example 11-9: Layer 2 Security Port Security Feature Example Verification DHCP Snooping Feature Example Verification Dynamic ARP Inspection Feature Example Verification Chapter 12: Switch Management 12-1: Logging Configuration Logging Example Displaying Information About Logging 12-2: Simple Network Management Protocol Configuration SNMP Example Displaying Information About SNMP 12-3: Switched Port Analyzer SPAN Configuration RSPAN Configuration SPAN Examples Displaying Information About SPAN 12-4: Power Management Configuration Displaying Information About Power Management 12-5: Environmental Monitoring 12-6: Packet Tracing Configuration Packet-Tracing Example Chapter 13: Quality of Service 13-1: QoS Theory Layer 2 QoS Classification and Marking Layer 3 QoS Classification and Marking Catalyst Switch Queuing 13-2: QoS Configuration Catalyst 2000/3000 Configuration All Other Catalyst Configuration Displaying Information About QoS 13-3: QoS Data Export Configuration QoS Data Export Example Displaying Information About QoS Data Export Chapter 14: Voice 14-1: Voice Ports Configuration Example Displaying Information About Voice Ports 14-2: Voice QoS Access Layer Configuration Distribution and Core Layer Configuration Voice QoS Example Appendix A: Cabling Quick Reference Back-to-Back Connections Ethernet Connections Asynchronous Serial Connections T1/E1 CSU/DSU Connections Appendix B: Well-known Protocol, Port, and Other Numbers Index

「Nielsen BookData」 より

詳細情報

ページトップへ