Gary A. Donahue擔(dān)任過(guò)程序員、主機(jī)管理員、技術(shù)幫助中心工程師、網(wǎng)絡(luò)管理員、網(wǎng)絡(luò)設(shè)計(jì)師和咨詢師?,F(xiàn)在擔(dān)任在新澤西的他自己的咨詢公司GAD Technologies的主席。
圖書目錄
preface 1. what is a network? 2. hubs and switches hubs switches switch types planning a chassis-based switch installation 3. autonegotjatjon what is autonegotiation? how autonegotiation works when autonegotiation fails autonegotiation best practices configuring autonegotiation 4. vlans connecting vlans configuring vlans catos ios using vlan database ios using global commands nexus and nx-os 5. trunkjng how trunks work isl 802.1q which protocol to use trunk negotiation configuring trunks los catos nexus and nx-os 6. vlan trunking protocol vtp pruning dangers of vtp configuring vtp vtp domains vtp mode vtp password vtp pruning 7. link aggregation etherchannel etherchannel load balancing configuring and managing etherchannel cross-stack etherchannel multichassis etherchannel (mec) virtual port channel initial vpc configuration adding a vpc 8. spanning tree broadcast storms mac address table instability preventing loops with spanning tree how spanning tree works managing spanning tree additional spanning tree features portfast bpdu guard uplinkfast backbonefast common spanning tree problems duplex mismatch unidirectional links bridge assurance designing to prevent spanning tree problems use routing instead of switching for redundancy always configure the root bridge 9. routing and routers routing tables route types the ip routing table host route subnet summary (group of subnets) major network supernet (group of major networks) default route virtual routing and forwarding 10. routing protocols communication between routers metrics and protocol types administrative distance specific routing protocols rip ripv2 eigrp ospf bgp 11. redistribution redistributing into rip redistributing into eigrp redistributing into ospf mutual redistribution redistribution loops limiting redistribution route tags a real-world example 12. tunnels gre tunnels gre tunnels and routing protocols gre and access lists 13. first hop redundancy hsrp hsrp interface tracking when hsrp isn't enough nexus and hsrp glbp object tracking in glbp 14. route maps building a route map policy routing example monitoring policy routing
15. switching algorithms in cisco routers process switching interrupt context switching fast switching optimum switching cef configuring and managing switching paths process switching fast switching cef 16. multilayer switches configuring svis ios (4500, 6500, 3550, 3750, etc.) hybrid mode (4500, 6500) nx-os (nexus 7000, 5000) multilayer switch models 17. cisco 6500 multilayer switches architecture buses enhanced chassis vertical enhanced chassis supervisors modules catos versus ios installing vss other recommended vss commands vss failover commands miscellaneous vss commands vss best practices 18. cisco nexus nexus hardware nexus 7000 nexus 5000 nexus 2000 nexus 1000 series nx-os nx-os versus ios nexus iconography nexus design features virtual routing and forwarding virtual device contexts shared and dedicated rate-mode configuring fabric extenders (fexs) virtual port channel config-sync configuration rollback upgrading nx-os 19. catalyst 3750 features stacking interface ranges macros flex links storm control port security span voice vlan qos 20. telecom nomenclature telecom glossary 21. t1 understanding t1 duplex types of t1 encoding ami b8zs framing d4/superframe extended super frame performance monitoring loss of signal out of frame bipolar violation crc6 errored seconds extreme errored seconds alarms red alarm yellow alarm blue alarm troubleshooting tls loopback tests integrated csu/dsus configuring tls csu/dsu configuration csu/dsu troubleshooting 22. ds3 framing m13 c-bits clear-channel ds3 framing line coding configuring ds3s clear-channel ds3 channelized ds3 23. frame relay ordering frame relay service frame relay network design oversubscription local management interface congestion avoidance in frame relay configuring frame relay basic frame relay with two nodes basic frame relay with more than two nodes frame relay subinterfaces troubleshooting frame relay 24. mpls 25. access lists designing access lists named versus numbered wildcard masks where to apply access lists naming access lists top-down processing most-used on top using groups in asa and pix acls deleting acls turbo acls allowing outbound traceroute and ping allowing mtu path discovery packets acls in multilayer switches configuring port acls configuring router acls configuring vlan maps reflexive access lists configuring reflexive access lists 26. authentication in cisco devices basic (non-aaa) authentication line passwords configuring local users ppp authentication aaa authentication enabling aaa configuring security server information creating method lists applying method lists 27. basic firewall theory best practices the dmz another dmz example multiple dmz example alternate designs 28. asa firewallconfiguration contexts interfaces and security levels names object groups inspects managing contexts context types the classifier configuring contexts interfaces and contexts write mere behavior failover failover terminology understanding failover configuring failover--active/standby monitoring failover configuring failover--active/active nat nat commands nat examples miscellaneous remote access saving configuration changes logging troubleshooting 29. wireless wireless standards security configuring a wap mac address filtering troubleshooting 30. volp how volp works protocols telephony terms cisco telephony terms common issues with volp small-office volp example vlans switch ports qos on the cme router dhcp for phones tftp service telephony service dial plan voice ports configuring phones dial peers sip troubleshooting phone registration tftp dial peer sip 31. introduction to(los types of qos qos mechanics priorities flavors of qos common qos misconceptions qos "carves up" a link into smaller logical links qos limits bandwidth qos resolves a need for more bandwidth qos prevents packets from being dropped qos will make you more attractive to the opposite sex 32. designing (los llq scenario protocols priorities determine bandwidth requirements configuring the routers class maps policy maps service policies traffic-shaping scenarios scenario 1: ethernet handoff scenario 2: frame relay speed mismatch 33. the congested network determining whether the network is congested resolving the problem 34. the converged network configuration monitoring qos troubleshooting a converged network incorrect queue configuration priority queue too small priority queue too large nonpriority queue too small nonpriority queue too large default queue too small default queue too large 35. designing networks documentation requirements documents port layout spreadsheets ip and vlan spreadsheets bay face layouts power and cooling requirements tips for network diagrams naming conventions for devices network designs corporate networks ecommerce websites modern virtual server environments small networks 36. ip design public versus private ip space vlsm c1dr allocating ip network space allocating ip subnets sequential divide by half reverse binary ip subnetting made easy 37. ipv6 addressing subnet masks address types subnetting nat simple router configuration 38. network time protocol what is accurate time? ntp design configuring ntp ntp client ntp server 39. failures human error multiple component failure disaster chains no failover testing troubleshooting remain calm log your actions find out what changed check the physical layer first! assume nothing; prove everything isolate the problem don't look for zebras do a physical audit escalate troubleshooting in a team environment the janitor principle 40. gad's maxims maxim # 1 politics money the right way to do it maxim #2 simplify standardize stabilize maxim #3 lower costs increase performance or capacity increase reliability
41. avoiding frustration why everything is messed up how to sell your ideas to management when to upgrade and why the dangers of upgrading valid reasons to upgrade why change control is your friend how not to be a computer jerk behavioral environmental leadership and mentoring index