Cisco IOS Cookbook 2nd Edition by Kevin Dooley, Ian Brown – Ebook PDF Instant Download/Delivery: 0596527225, 9780596527228
Full download Cisco IOS Cookbook 2nd Edition after payment
Product details:
ISBN 10: 0596527225
ISBN 13: 9780596527228
Author: Kevin Dooley, Ian Brown
Never has something cried out for a cookbook quite as much as Cisco’s Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don’t want to spend precious time figuring out which way is best when you’re trying to solve a problem quickly.That’s what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don’t want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn’t quite right.Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:Configuring interfaces of many types, from serial to ATM and Frame RelayConfiguring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)Configuring authenticationConfiguring other services, including DHCP and NTPSetting up backup links, and using HSRP to configure backup routersManaging the router, including SNMP and other solutionsUsing access lists to control the traffic through the routerIf you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you’re experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you’re not experienced–if you’ve just been given responsibility for managing a network with Cisco routers–this book could be a job-saver.
Table of contents:
1.0 Introduction
IOS
1.1 Configuring the Router via TFTP
Problem
Solution
Discussion
See Also
1.2 Saving Router Configuration to Server
Problem
Solution
Discussion
See Also
1.3 Booting the Router Using a Remote Configuration File
Problem
Solution
Discussion
See Also
1.4 Storing Configuration Files Larger Than NVRAM
Problem
Solution
Discussion
See Also
1.5 Clearing the Startup Configuration
Problem
Solution
Discussion
See Also
1.6 Loading a New IOS Image
Problem
Solution
Discussion
See Also
1.7 Booting a Different IOS Image
Problem
Solution
Discussion
See Also
1.8 Booting over the Network
Problem
Solution
Discussion
See Also
1.9 Copying an IOS Image to a Server
Problem
Solution
Discussion
See Also
1.10 Copying an IOS Image Through the Console
Problem
Solution
Discussion
1.11 Deleting Files from Flash
Problem
Solution
Discussion
See Also
1.12 Partitioning Flash
Problem
Solution
Discussion
See Also
1.13 Using the Router as a TFTP Server
Problem
Solution
Discussion
See Also
1.14 Using FTP from the Router
Problem
Solution
Discussion
See Also
1.15 Generating Large Numbers of Router Configurations
Problem
Solution
Discussion
See Also
1.16 Changing the Configurations of Many Routers at Once
Problem
Solution
Discussion
See Also
1.17 Extracting Hardware Inventory Information
Problem
Solution
Discussion
See Also
1.18 Backing Up Router Configurations
Problem
Solution
Discussion
See Also
1.19 Warm Reload
Problem
Solution
Discussion
See Also
1.20 Warm Upgrade
Problem
Solution
Discussion
See Also
1.21 Configuration Archiving
Problem
Solution
Discussion
See Also
1.22 Locking Configuration Access
Problem
Solution
Discussion
Router Management
2.0 Introduction
2.1 Creating Command Aliases
Problem
Solution
Discussion
2.2 Managing the Router’s ARP Cache
Problem
Solution
Discussion
2.3 Tuning Router Buffers
Problem
Solution
Discussion
2.4 Auto Tuning Buffers
Problem
Solution
Discussion
See Also
2.5 Using the Cisco Discovery Protocol
Problem
Solution
Discussion
See Also
2.6 Disabling the Cisco Discovery Protocol
Problem
Solution
Discussion
See Also
2.7 Using the Small Servers
Problem
Solution
Discussion
See Also
2.8 Enabling HTTP Access to a Router
Problem
Solution
Discussion
See Also
2.9 Enabling Secure HTTP (HTTPS) Access to a Router
Problem
Solution
Discussion
See Also
2.10 Using Static Hostname Tables
Problem
Solution
Discussion
See Also
2.11 Enabling Domain Name Services
Problem
Solution
Discussion
See Also
2.12 Disabling Domain Name Lookups
Problem
Solution
Discussion
See Also
2.13 Specifying a Router Reload Time
Problem
Solution
Discussion
See Also
2.14 Scheduling of Router Commands
Problem
Solution
Discussion
See Also
2.15 Displaying Historical CPU Values
Problem
Solution
Discussion
2.16 Creating Exception Dump Files
Problem
Solution
Discussion
See Also
2.17 Generating a Report of Interface Information
Problem
Solution
Discussion
See Also
2.18 Generating a Report of Routing Table Information
Problem
Solution
Discussion
See Also
2.19 Generating a Report of ARP Table Information
Problem
Solution
Discussion
See Also
2.20 Generating a Server Host Table File
Problem
Solution
Discussion
See Also
User Access and Privilege Levels
3.0 Introduction
3.1 Setting Up User IDs
Problem
Solution
Discussion
See Also
3.2 Encrypting Passwords
Problem
Solution
Discussion
See Also
3.3 Using Better Password-Encryption Techniques
Problem
Solution
Discussion
See Also
3.4 Removing Passwords from a Router Configuration File
Problem
Solution
Discussion
See Also
3.5 Deciphering Cisco’s Weak Password Encryption
Problem
Solution
Discussion
See Also
3.6 Displaying Active Users
Problem
Solution
Discussion
See Also
3.7 Sending Messages to Other Users
Problem
Solution
Discussion
See Also
3.8 Changing the Number of VTYs
Problem
Solution
Discussion
See Also
3.9 Changing VTY Timeouts
Problem
Solution
Discussion
See Also
3.10 Restricting VTY Access by Protocol
Problem
Solution
Discussion
See Also
3.11 Enabling Absolute Timeouts on VTY Lines
Problem
Solution
Discussion
See Also
3.12 Implementing Banners
Problem
Solution
Discussion
See Also
3.13 Disabling Banners on a Port
Problem
Solution
Discussion
See Also
3.14 Disabling Router Lines
Problem
Solution
Discussion
See Also
3.15 Reserving a VTY Port for Administrative Access
Problem
Solution
Discussion
See Also
3.16 Restricting Inbound Telnet Access
Problem
Solution
Discussion
See Also
3.17 Logging Telnet Access
Problem
Solution
Discussion
See Also
3.18 Setting the Source Address for Telnet
Problem
Solution
Discussion
3.19 Automating the Login Sequence
Problem
Solution
Discussion
See Also
3.20 Using SSH for Secure Access
Problem
Solution
Discussion
See Also
3.21 Changing Privilege Level of IOS Commands
Problem
Solution
Discussion
See Also
3.22 Defining Per User Privileges
Problem
Solution
Discussion
See Also
3.23 Defining Per Port Privileges
Problem
Solution
Discussion
See Also
TACACS+
4.0 Introduction
4.1 Authenticating Login IDs from a Central System
Problem
Solution
Discussion
See Also
4.2 Restricting Command Access
Problem
Solution
Discussion
See Also
4.3 Losing Access to the TACACS+ Server
Problem
Solution
Discussion
See Also
4.4 Disabling TACACS+ Authentication on a Particular Line
Problem
Solution
Discussion
See Also
4.5 Capturing User Keystrokes
Problem
Solution
Discussion
See Also
4.6 Logging System Events
Problem
Solution
Discussion
See Also
4.7 Setting the IP Source Address for TACACS+ Messages
Problem
Solution
Discussion
See Also
4.8 Sample Server Configuration Files
Problem
Solution
Discussion
See Also
IP Routing
5.0 Introduction
Unregistered Addresses
5.1 Finding an IP Route
Problem
Solution
Discussion
5.2 Finding Types of IP Routes
Problem
Solution
Discussion
5.3 Converting Different Mask Formats
Problem
Solution
Discussion
5.4 Using Static Routing
Problem
Solution
Discussion
See Also
5.5 Floating Static Routes
Problem
Solution
Discussion
See Also
5.6 Using Policy-Based Routing to Route Based on Source Address
Problem
Solution
Discussion
See Also
5.7 Using Policy-Based Routing to Route Based on Application Type
Problem
Solution
Discussion
See Also
5.8 Examining Policy-Based Routing
Problem
Solution
Discussion
See Also
5.9 Changing Administrative Distances
Problem
Solution
Discussion
See Also
5.10 Routing Over Multiple Paths with Equal Costs
Problem
Solution
Discussion
See Also
5.11 Static Routes That Track Interfaces or Other Routes
Problem
Solution
Discussion
See Also
5.12 Keeping Statistics on Routing Table Changes
Problem
Solution
Discussion
RIP
6.0 Introduction
6.1 Configuring RIP Version 1
Problem
Solution
Discussion
See Also
6.2 Filtering Routes with RIP
Problem
Solution
Discussion
See Also
6.3 Redistributing Static Routes into RIP
Problem
Solution
Discussion
See Also
6.4 Redistributing Routes Using Route Maps
Problem
Solution
Discussion
See Also
6.5 Creating a Default Route in RIP
Problem
Solution
Discussion
See Also
6.6 Disabling RIP on an Interface
Problem
Solution
Discussion
See Also
6.7 Default Passive Interface
Problem
Solution
Discussion
See Also
6.8 Unicast Updates for RIP
Problem
Solution
Discussion
See Also
6.9 Applying Offsets to Routes
Problem
Solution
Discussion
6.10 Adjusting Timers
Problem
Solution
Discussion
See Also
6.11 Configuring Interpacket Delay
Problem
Solution
Discussion
See Also
6.12 Enabling Nonperiodic Updates
Problem
Solution
Discussion
See Also
6.13 Increasing the RIP Input Queue
Problem
Solution
Discussion
See Also
6.14 Configuring RIP Version 2
Problem
Solution
Discussion
6.15 Enabling RIP Authentication
Problem
Solution
Discussion
See Also
6.16 RIP Route Summarization
Problem
Solution
Discussion
6.17 Route Tagging
Problem
Solution
Discussion
See Also
EIGRP
7.0 Introduction
7.1 Configuring EIGRP
Problem
Solution
Discussion
See Also
7.2 Filtering Routes with EIGRP
Problem
Solution
Discussion
See Also
7.3 Redistributing Routes into EIGRP
Problem
Solution
Discussion
See Also
7.4 Redistributing Routes into EIGRP Using Route Maps
Problem
Solution
Discussion
See Also
7.5 Disabling EIGRP on an Interface
Problem
Solution
Discussion
See Also
7.6 Adjusting EIGRP Metrics
Problem
Solution
Discussion
7.7 Adjusting Timers
Problem
Solution
Discussion
See Also
7.8 Enabling EIGRP Authentication
Problem
Solution
Discussion
See Also
7.9 EIGRP Route Summarization
Problem
Solution
Discussion
See Also
7.10 Logging EIGRP Neighbor State Changes
Problem
Solution
Discussion
See Also
7.11 Limiting EIGRP’s Bandwidth Utilization
Problem
Solution
Discussion
See Also
7.12 EIGRP Stub Routing
Problem
Solution
Discussion
See Also
7.13 Route Tagging
Problem
Solution
Discussion
See Also
7.14 Viewing EIGRP Status
Problem
Solution
Discussion
OSPF
8.0 Introduction
8.1 Configuring OSPF
Problem
Solution
Discussion
8.2 Filtering Routes in OSPF
Problem
Solution
Discussion
See Also
8.3 Adjusting OSPF Costs
Problem
Solution
Discussion
8.4 Creating a Default Route in OSPF
Problem
Solution
Discussion
See Also
8.5 Redistributing Static Routes into OSPF
Problem
Solution
Discussion
8.6 Redistributing External Routes into OSPF
Problem
Solution
Discussion
See Also
8.7 Manipulating DR Selection
Problem
Solution
Discussion
See Also
8.8 Setting the OSPF RID
Problem
Solution
Discussion
See Also
8.9 Enabling OSPF Authentication
Problem
Solution
Discussion
See Also
8.10 Selecting the Appropriate Area Types
Problem
Solution
Discussion
See Also
8.11 Using OSPF on Dial Interfaces
Problem
Solution
Discussion
See Also
8.12 Summarizing Routes in OSPF
Problem
Solution
Discussion
See Also
8.13 Disabling OSPF on Certain Interfaces
Problem
Solution
Discussion
8.14 Changing the Network Type on an Interface
Problem
Solution
Discussion
See Also
8.15 OSPF Route Tagging
Problem
Solution
Discussion
See Also
8.16 Logging OSPF Adjacency Changes
Problem
Solution
Discussion
See Also
8.17 Adjusting OSPF Timers
Problem
Solution
Discussion
See Also
8.18 Reducing OSPF Traffic in Stable Networks
Problem
Solution
Discussion
8.19 OSPF Virtual Links
Problem
Solution
Discussion
8.20 Viewing OSPF Status with Domain Names
Problem
Solution
Discussion
See Also
8.21 Debugging OSPF
Problem
Solution
Discussion
BGP
9.0 Introduction
Basic Terminology
BGP Attributes
Route Selection
9.1 Configuring BGP
Problem
Solution
Discussion
See Also
9.2 Using eBGP Multihop
Problem
Solution
Discussion
See Also
9.3 Adjusting the Next-Hop Attribute
Problem
Solution
Discussion
9.4 Connecting to Two ISPs
Problem
Solution
Discussion
See Also
9.5 Connecting to Two ISPs with Redundant Routers
Problem
Solution
Discussion
See Also
9.6 Restricting Networks Advertised to a BGP Peer
Problem
Solution
Discussion
See Also
9.7 Adjusting Local Preference Values
Problem
Solution
Discussion
See Also
9.8 Load-Balancing
Problem
Solution
Discussion
9.9 Removing Private ASNs from the AS Path
Problem
Solution
Discussion
9.10 Filtering BGP Routes Based on AS Paths
Problem
Solution
Discussion
See Also
9.11 Reducing the Size of the Received Routing Table
Problem
Solution
Discussion
See Also
9.12 Summarizing Outbound Routing Information
Problem
Solution
Discussion
See Also
9.13 Prepending ASNs to the AS Path
Problem
Solution
Discussion
See Also
9.14 Redistributing Routes with BGP
Problem
Solution
Discussion
See Also
9.15 Using Peer Groups
Problem
Solution
Discussion
9.16 Authenticating BGP Peers
Problem
Solution
Discussion
See Also
9.17 Using BGP Communities
Problem
Solution
Discussion
See Also
9.18 Using BGP Route Reflectors
Problem
Solution
Discussion
See Also
9.19 Putting It All Together
Problem
Solution
Discussion
See Also
Frame Relay
10.0 Introduction
Frame Relay QoS Features
10.1 Setting Up Frame Relay with Point-to-Point Subinterfaces
Problem
Solution
Discussion
See Also
10.2 Adjusting LMI Options
Problem
Solution
Discussion
10.3 Setting Up Frame Relay with Map Statements
Problem
Solution
Discussion
See Also
10.4 Using Multipoint Subinterfaces
Problem
Solution
Discussion
See Also
10.5 Configuring Frame Relay SVCs
Problem
Solution
Discussion
See Also
10.6 Simulating a Frame Relay Cloud
Problem
Solution
Discussion
See Also
10.7 Compressing Frame Relay Data on a Subinterface
Problem
Solution
Discussion
See Also
10.8 Compressing Frame Relay Data with Maps
Problem
Solution
Discussion
See Also
10.9 PPP over Frame Relay
Problem
Solution
Discussion
See Also
10.10 Viewing Frame Relay Status Information
Problem
Solution
Discussion
Handling Queuing and Congestion
11.0 Introduction
Queuing Algorithms
Fast Switching and CEF
11.1 Fast Switching and CEF
Problem
Solution
Discussion
See Also
11.2 Setting the DSCP or TOS Field
Problem
Solution
Discussion
See Also
11.3 Using Priority Queuing
Problem
Solution
Discussion
See Also
11.4 Using Custom Queuing
Problem
Solution
Discussion
11.5 Using Custom Queues with Priority Queues
Problem
Solution
Discussion
See Also
11.6 Using Weighted Fair Queuing
Problem
Solution
Discussion
See Also
11.7 Using Class-Based Weighted Fair Queuing
Problem
Solution
Discussion
See Also
11.8 Using NBAR Classification
Problem
Solution
Discussion
11.9 Controlling Congestion with WRED
Problem
Solution
Discussion
See Also
11.10 Using RSVP
Problem
Solution
Discussion
See Also
11.11 Manual RSVP Reservations
Problem
Solution
Discussion
RESV and PATH messages
Two service types
The examples
See Also
11.12 Aggregating RSVP Reservations
Problem
Solution
Discussion
See Also
11.13 Using Generic Traffic Shaping
Problem
Solution
Discussion
See Also
11.14 Using Frame-Relay Traffic Shaping
Problem
Solution
Discussion
See Also
11.15 Using Committed Access Rate
Problem
Solution
Discussion
See Also
11.16 Implementing Standards-Based Per-Hop Behavior
Problem
Solution
Discussion
See Also
11.17 AutoQoS
Problem
Solution
Discussion
See Also
11.18 Viewing Queue Parameters
Problem
Solution
Discussion
Tunnels and VPNs
12.0 Introduction
12.1 Creating a Tunnel
Problem
Solution
Discussion
See Also
12.2 Tunneling Foreign Protocols in IP
Problem
Solution
Discussion
See Also
12.3 Tunneling with Dynamic Routing Protocols
Problem
Solution
Discussion
See Also
12.4 Viewing Tunnel Status
Problem
Solution
Discussion
See Also
12.5 Creating an Encrypted Router-to-Router VPN in a GRE Tunnel
Problem
Solution
Discussion
See Also
12.6 Creating an Encrypted VPN Between the LAN Interfaces of Two Routers
Problem
Solution
Discussion
See Also
12.7 Generating RSA Keys
Problem
Solution
Discussion
See Also
12.8 Creating a Router-to-Router VPN with RSA Keys
Problem
Solution
Discussion
See Also
12.9 Creating a VPN Between a Workstation and a Router
Problem
Solution
Discussion
See Also
12.10 Creating an SSL VPN
Problem
Solution
Discussion
See Also
12.11 Checking IPSec Protocol Status
Problem
Solution
Discussion
Dial Backup
13.0 Introduction
Analog Modems
Switched 56 Kbps Digital Service
ISDN
Estimating How Many Dialup Lines You Need
13.1 Automating Dial Backup
Problem
Solution
Discussion
See Also
13.2 Using Dialer Interfaces
Problem
Solution
Discussion
See Also
13.3 Using an Async Modem on the AUX Port
Problem
Solution
Discussion
See Also
13.4 Using Backup Interfaces
Problem
Solution
Discussion
See Also
13.5 Using Dialer Watch
Problem
Solution
Discussion
See Also
13.6 Using Virtual Templates
Problem
Solution
Discussion
See Also
13.7 Ensuring Proper Disconnection
Problem
Solution
Discussion
13.8 View Dial Backup Status
Problem
Solution
Discussion
See Also
13.9 Debugging Dial Backup
Problem
Solution
Discussion
NTP and Time
14.0 Introduction
14.1 Time-Stamping Router Logs
Problem
Solution
Discussion
See Also
14.2 Setting the Time
Problem
Solution
Discussion
See Also
14.3 Setting the Time Zone
Problem
Solution
Discussion
See Also
14.4 Adjusting for Daylight Saving Time
Problem
Solution
Discussion
See Also
14.5 Synchronizing the Time on All Routers (NTP)
Problem
Solution
Discussion
See Also
14.6 Configuring NTP Redundancy
Problem
Solution
Discussion
See Also
14.7 Setting the Router As the NTP Master for the Network
Problem
Solution
Discussion
See Also
14.8 Changing NTP Synchronization Periods
Problem
Solution
Discussion
See Also
14.9 Using NTP to Send Periodic Broadcast Time Updates
Problem
Solution
Discussion
See Also
14.10 Using NTP to Send Periodic Multicast Time Updates
Problem
Solution
Discussion
See Also
14.11 Enabling and Disabling NTP Per Interface
Problem
Solution
Discussion
See Also
14.12 NTP Authentication
Problem
Solution
Discussion
14.13 Limiting the Number of Peers
Problem
Solution
Discussion
See Also
14.14 Restricting Peers
Problem
Solution
Discussion
See Also
14.15 Setting the Clock Period
Problem
Solution
Discussion
14.16 Checking the NTP Status
Problem
Solution
Discussion
14.17 Debugging NTP
Problem
Solution
Discussion
14.18 NTP Logging
Problem
Solution
Discussion
See Also
14.19 Extended Daylight Saving Time
Problem
Solution
Discussion
See Also
14.20 NTP Server Configuration
Problem
Solution
Discussion
See Also
DLSw
15.0 Introduction
Service Access Points (SAP and LSAP)
Explorers and RIFs
Cisco IOS Code Sets
15.1 Simple Bridging
Problem
Solution
Discussion
15.2 Configuring DLSw
Problem
Solution
Discussion
The peers
Ring groups, ring numbers, and bridge numbers
Explorer options
Other features
15.3 Using DLSw to Bridge Between Ethernet and Token Ring
Problem
Solution
Discussion
Ethernet II or 802.3 framing
See Also
15.4 Converting Ethernet and Token Ring MAC Addresses
Problem
Solution
Discussion
See Also
15.5 Configuring SDLC
Problem
Solution
Discussion
See Also
15.6 Configuring SDLC for Multidrop Connections
Problem
Solution
Discussion
See Also
15.7 Using STUN
Problem
Solution
Discussion
See Also
15.8 Using BSTUN
Problem
Solution
Discussion
15.9 Controlling DLSw Packet Fragmentation
Problem
Solution
Discussion
15.10 Tagging DLSw Packets for QoS
Problem
Solution
Discussion
See Also
15.11 Supporting SNA Priorities
Problem
Solution
Discussion
See Also
15.12 DLSw+ Redundancy and Fault Tolerance
Problem
Solution
Discussion
See Also
15.13 Viewing DLSw Status Information
Problem
Solution
Discussion
15.14 Viewing SDLC Status Information
Problem
Solution
Discussion
See Also
15.15 Debugging DSLw
Problem
Solution
Discussion
See Also
Router Interfaces and Media
16.0 Introduction
16.1 Viewing Interface Status
Problem
Solution
Discussion
See Also
16.2 Configuring Serial Interfaces
Problem
Solution
Discussion
See Also
16.3 Using an Internal T1 CSU/DSU
Problem
Solution
Discussion
See Also
16.4 Using an Internal ISDN PRI Module
Problem
Solution
Discussion
See Also
16.5 Using an Internal 56 Kbps CSU/DSU
Problem
Solution
Discussion
See Also
16.6 Configuring an Async Serial Interface
Problem
Solution
Discussion
See Also
16.7 Configuring ATM Subinterfaces
Problem
Solution
Discussion
See Also
16.8 Setting Payload Scrambling on an ATM Circuit
Problem
Solution
Discussion
See Also
16.9 Classical IP Over ATM
Problem
Solution
Discussion
See Also
16.10 Configuring Ethernet Interface Features
Problem
Solution
Discussion
16.11 Configuring Token Ring Interface Features
Problem
Solution
Discussion
See Also
16.12 Connecting VLAN Trunks with ISL
Problem
Solution
Discussion
See Also
16.13 Connecting VLAN Trunks with 802.1Q
Problem
Solution
Discussion
See Also
16.14 LPD Printer Support
Problem
Solution
Discussion
See Also
Simple Network Management Protocol
17.0 Introduction
SNMP Management Model
MIBs and OIDs
17.1 Configuring SNMP
Problem
Solution
Discussion
See Also
17.2 Extracting Router Information via SNMP Tools
Problem
Solution
Discussion
See Also
17.3 Recording Important Router Information for SNMP Access
Problem
Solution
Discussion
17.4 Using SNMP to Extract Inventory Information from a List of Routers
Problem
Solution
Discussion
See Also
17.5 Using Access Lists to Protect SNMP Access
Problem
Solution
Discussion
See Also
17.6 Logging Unauthorized SNMP Attempts
Problem
Solution
Discussion
See Also
17.7 Limiting MIB Access
Problem
Solution
Discussion
See Also
17.8 Using SNMP to Modify a Router’s Running Configuration
Problem
Solution
Discussion
See Also
17.9 Using SNMP to Copy a New IOS Image
Problem
Solution
Discussion
See Also
17.10 Using SNMP to Perform Mass Configuration Changes
Problem
Solution
Discussion
See Also
17.11 Preventing Unauthorized Configuration Modifications
Problem
Solution
Discussion
See Also
17.12 Making Interface Table Numbers Permanent
Problem
Solution
Discussion
See Also
17.13 Enabling SNMP Traps and Informs
Problem
Solution
Discussion
See Also
17.14 Sending Syslog Messages As SNMP Traps and Informs
Problem
Solution
Discussion
See Also
17.15 Setting SNMP Packet Size
Problem
Solution
Discussion
17.16 Setting SNMP Queue Size
Problem
Solution
Discussion
17.17 Setting SNMP Timeout Values
Problem
Solution
Discussion
17.18 Disabling Link Up/Down Traps per Interface
Problem
Solution
Discussion
See Also
17.19 Setting the IP Source Address for SNMP Traps
Problem
Solution
Discussion
17.20 Using RMON to Send Traps
Problem
Solution
Discussion
See Also
17.21 Enabling SNMPv3
Problem
Solution
Discussion
Using the SNMPv3 security levels
See Also
17.22 Strong SNMPv3 Encryption
Problem
Solution
Discussion
See Also
17.23 Using SAA
Problem
Solution
Discussion
Logging
18.0 Introduction
18.1 Enabling Local Router Logging
Problem
Solution
Discussion
See Also
18.2 Setting the Log Size
Problem
Solution
Discussion
See Also
18.3 Clearing the Router’s Log
Problem
Solution
Discussion
18.4 Sending Log Messages to Your Screen
Problem
Solution
Discussion
18.5 Using a Remote Log Server
Problem
Solution
Discussion
See Also
18.6 Enabling Syslog on a Unix Server
Problem
Solution
Discussion
See Also
18.7 Changing the Default Log Facility
Problem
Solution
Discussion
See Also
18.8 Restricting What Log Messages Are Sent to the Server
Problem
Solution
Discussion
18.9 Setting the IP Source Address for Syslog Messages
Problem
Solution
Discussion
See Also
18.10 Logging Router Syslog Messages in Different Files
Problem
Solution
Discussion
See Also
18.11 Maintaining Syslog Files on the Server
Problem
Solution
Discussion
18.12 Testing the Syslog Sever Configuration
Problem
Solution
Discussion
18.13 Preventing the Most Common Messages from Being Logged
Problem
Solution
Discussion
18.14 Rate-Limiting Syslog Traffic
Problem
Solution
Discussion
18.15 Enabling Error Log Counting
Problem
Solution
Discussion
18.16 XML-Formatted Log Messages
Problem
Solution
Discussion
See Also
18.17 Modifying Log Messages
Problem
Solution
Discussion
See Also
Access-Lists
19.0 Introduction
19.1 Filtering by Source or Destination IP Address
Problem
Solution
Discussion
See Also
19.2 Adding a Comment to an ACL
Problem
Solution
Discussion
See Also
19.3 Filtering by Application
Problem
Solution
Discussion
See Also
19.4 Filtering Based on TCP Header Flags
Problem
Solution
Discussion
See Also
19.5 Restricting TCP Session Direction
Problem
Solution
Discussion
19.6 Filtering Multiport Applications
Problem
Solution
Discussion
See Also
19.7 Filtering Based on DSCP and TOS
Problem
Solution
Discussion
See Also
19.8 Logging When an Access-List Is Used
Problem
Solution
Discussion
See Also
19.9 Logging TCP Sessions
Problem
Solution
Discussion
See Also
19.10 Analyzing ACL Log Entries
Problem
Solution
Discussion
See Also
19.11 Using Named and Reflexive Access-Lists
Problem
Solution
Discussion
See Also
19.12 Dealing with Passive Mode FTP
Problem
Solution
Discussion
See Also
19.13 Using Time-Based Access-Lists
Problem
Solution
Discussion
See Also
19.14 Filtering Based on Noncontiguous Ports
Problem
Solution
Discussion
See Also
19.15 Advanced Access-List Editing
Problem
Solution
Discussion
See Also
19.16 Filtering IPv6
Problem
Solution
Discussion
See Also
DHCP
20.0 Introduction
20.1 Using IP Helper Addresses for DHCP
Problem
Solution
Discussion
See Also
20.2 Limiting the Impact of IP Helper Addresses
Problem
Solution
Discussion
See Also
20.3 Using DHCP to Dynamically Configure Router IP Addresses
Problem
Solution
Discussion
20.4 Dynamically Allocating Client IP Addresses via DHCP
Problem
Solution
Discussion
See Also
20.5 Defining DHCP Configuration Options
Problem
Solution
Discussion
See Also
20.6 Defining DHCP Lease Periods
Problem
Solution
Discussion
See Also
20.7 Allocating Static IP Addresses with DHCP
Problem
Solution
Discussion
See Also
20.8 Configuring a DHCP Database Client
Problem
Solution
Discussion
See Also
20.9 Configuring Multiple DHCP Servers per Subnet
Problem
Solution
Discussion
See Also
20.10 DHCP Static Mapping
Problem
Solution
Discussion
See Also
20.11 DHCP-Secured IP Address Assignment
Problem
Solution
Discussion
20.12 Showing DHCP Status
Problem
Solution
Discussion
See Also
20.13 Debugging DHCP
Problem
Solution
Discussion
NAT
21.0 Introduction
21.1 Configuring Basic NAT Functionality
Problem
Solution
Discussion
21.2 Allocating External Addresses Dynamically
Problem
Solution
Discussion
See Also
21.3 Allocating External Addresses Statically
Problem
Solution
Discussion
See Also
21.4 Translating Some Addresses Statically and Others Dynamically
Problem
Solution
Discussion
See Also
21.5 Using Route Maps to Refine Static Translation Rules
Problem
Solution
Discussion
See Also
21.6 Translating in Both Directions Simultaneously
Problem
Solution
Discussion
See Also
21.7 Rewriting the Network Prefix
Problem
Solution
Discussion
21.8 Using NAT for Server Load Distribution
Problem
Solution
Discussion
21.9 Stateful NAT Failover
Problem
Solution
Discussion
See Also
21.10 Adjusting NAT Timers
Problem
Solution
Discussion
See Also
21.11 Changing TCP Ports for FTP
Problem
Solution
Discussion
21.12 Checking NAT Status
Problem
Solution
Discussion
21.13 Debugging NAT
Problem
Solution
Discussion
First Hop Redundancy Protocols
22.0 Introduction
22.1 Configuring Basic HSRP Functionality
Problem
Solution
Discussion
See Also
22.2 Using HSRP Preempt
Problem
Solution
Discussion
See Also
22.3 Making HSRP React to Problems on Other Interfaces
Problem
Solution
Discussion
See Also
22.4 Load-Balancing with HSRP
Problem
Solution
Discussion
See Also
22.5 Redirecting ICMP with HSRP
Problem
Solution
Discussion
22.6 Manipulating HSRP Timers
Problem
Solution
Discussion
22.7 Using HSRP on Token Ring
Problem
Solution
Discussion
See Also
22.8 HSRP SNMP Support
Problem
Solution
Discussion
See Also
22.9 Increasing HSRP Security
Problem
Solution
Discussion
See Also
22.10 Showing HSRP State Information
Problem
Solution
Discussion
22.11 Debugging HSRP
Problem
Solution
Discussion
22.12 HSRP Version 2
Problem
Solution
Discussion
See Also
22.13 VRRP
Problem
Solution
Discussion
See Also
22.14 Gateway Load-Balancing Protocol
Problem
Solution
Discussion
See Also
IP Multicast
23.0 Introduction
IGMP and CGMP
Multicast Routing Protocols
PIM-DM, PIM-SM, and Bidirectional PIM
DVMRP
MOSPF
MBGP
23.1 Configuring Basic Multicast Functionality with PIM-DM
Problem
Solution
Discussion
23.2 Routing Multicast Traffic with PIM-SM and BSR
Problem
Solution
Discussion
23.3 Routing Multicast Traffic with PIM-SM and Auto RP
Problem
Solution
Discussion
See Also
23.4 Filtering PIM Neighbors
Problem
Solution
Discussion
23.5 Configuring Routing for a Low-Frequency Multicast Application
Problem
Solution
Discussion
See Also
23.6 Multicast over Frame Relay or ATM WANs
Problem
Solution
Discussion
See Also
23.7 Configuring CGMP
Problem
Solution
Discussion
23.8 Using IGMP Version 3
Problem
Solution
Discussion
See Also
23.9 Static Multicast Routes and Group Memberships
Problem
Solution
Discussion
23.10 Routing Multicast Traffic with MOSPF
Problem
Solution
Discussion
23.11 Routing Multicast Traffic with DVMRP
Problem
Solution
Discussion
See Also
23.12 DVMRP Tunnels
Problem
Solution
Discussion
See Also
23.13 Configuring Bidirectional PIM
Problem
Solution
Discussion
See Also
23.14 Controlling Multicast Scope with TTL
Problem
Solution
Discussion
See Also
23.15 Controlling Multicast Scope with Administratively Scoped Addressing
Problem
Solution
Discussion
23.16 Exchanging Multicast Routing Information with MBGP
Problem
Solution
Discussion
See Also
23.17 Using MSDP to Discover External Sources
Problem
Solution
Discussion
See Also
23.18 Configuring Anycast RP
Problem
Solution
Discussion
See Also
23.19 Converting Broadcasts to Multicasts
Problem
Solution
Discussion
See also
23.20 Showing Multicast Status
Problem
Solution
Discussion
23.21 Debugging Multicast Routing
Problem
Solution
Discussion
IP Mobility
24.0 Introduction
Terminology
Local Area Mobility
24.1 Local Area Mobility
Problem
Solution
Discussion
See Also
24.2 Home Agent Configuration
Problem
Solution
Discussion
See Also
24.3 Foreign Agent Configuration
Problem
Solution
Discussion
Authenticating the Foreign Agent
See Also
24.4 Making a Router a Mobile Node
Problem
Solution
Discussion
Authenticating with the Foreign Agent
See Also
24.5 Reverse-Tunnel Forwarding
Problem
Solution
Discussion
See Also
24.6 Using HSRP for Home Agent Redundancy
Problem
Solution
Discussion
See Also
IPv6
25.0 Introduction
IPv6 Addressing
Addressing Standards
IEEE EUI-64 Identifiers
Routing Protocols
25.1 Automatically Generating IPv6 Addresses for an Interface
Problem
Solution
Discussion
See Also
25.2 Manually Configuring IPv6 Addresses on an Interface
Problems
Solution
Discussion
See Also
25.3 Configuring DHCP for IPv6
Problem
Solution
Discussion
See Also
25.4 Dynamic Routing with RIP
Problem
Solution
Discussion
See Also
25.5 Modifying the Default RIP Parameters
Problem
Solution
Discussion
See Also
25.6 IPv6 Route Filtering and Metric Manipulation in RIP
Problem
Solution
Discussion
See Also
25.7 Using OSPF for IPv6
Problem
Solution
Discussion
See Also
25.8 IPv6 Route Filtering and Metric Manipulation in OSPF
Problem
Solution
Discussion
See Also
25.9 Route Redistribution
Problem
Solution
Discussion
See Also
25.10 Dynamic Routing with MBGP
Problem
Solution
Discussion
See Also
25.11 Tunneling IPv6 Through an Existing IPv4 Network
Problem
Solution
Discussion
See Also
25.12 Translating Between IPv6 and IPv4
Problem
Solution
Discussion
See Also
MPLS
26.0 Introduction
Some Terminology
Benefits of MPLS
IOS Versions and Feature Sets
Structure of This Chapter
26.1 Configuring a Basic MPLS P Router
Problem
Solution
Discussion
See Also
26.2 Configuring a Basic MPLS PE Router
Problem
Solution
Discussion
See Also
26.3 Configuring Basic MPLS CE Routers
Problem
Solution
Discussion
See Also
26.4 Configuring MPLS over ATM
Problem
Solution
Discussion
26.5 PE-CE Communication via RIP
Problem
Solution
Discussion
See Also
26.6 PE-CE Communication via OSPF
Problem
Solution
Discussion
See Also
26.7 PE-CE Communication via EIGRP
Problem
Solution
Discussion
See Also
26.8 PE-CE Communication via BGP
Problem
Solution
Discussion
See Also
26.9 QoS over MPLS
Problem
Solution
Discussion
See Also
26.10 MPLS Traffic Engineering with Autoroute
Problem
Solution
Discussion
See Also
26.11 Multicast Over MPLS
Problem
Solution
Discussion
See Also
26.12 Your Service Provider Doesn’t Do What You Want
Problem
Solution
Discussion
See Also
Security
27.0 Introduction
CBAC
PAM
Authentication Proxy
TCP Intercept
Intrusion Prevention
AutoSecure
27.1 Using AutoSecure
Problem
Solution
Discussion
27.2 Using Context-Based Access-Lists
Problem
Solution
Discussion
See Also
27.3 Transparent Cisco IOS Firewall
Problem
Solution
Discussion
See Also
27.4 Stopping Denial of Service Attacks
Problem
Solution
Discussion
27.5 Inspecting Applications on Different Port Numbers
Problem
Solution
Discussion
See Also
27.6 Intrusion Detection and Prevention
Problem
Solution
Discussion
Intrusion detection
Intrusion prevention
See Also
27.7 Login Password Retry Lockout
Problem
Solution
Discussion
See Also
27.8 Authentication Proxy
Problem
Solution
Discussion
See Also
External Software Packages
Perl
Expect
NET-SNMP
PuTTY
OpenSSH
Ethereal
IP Precedence, TOS, and DSCP Classifications
IP Precedence, TOS, and DSCP Classifications
Combining TOS and IP Precedence to Mimic DSCP
RSVP
Queueing Algorithms
Weighted Fair Queueing
Priority Queueing
Custom Queueing
Dropping Packets and Congestion Avoidance
People also search:
cisco ios cookbook pdf
cisco ios cookbook
cisco ios cookbook 3rd edition pdf
ios cookbook
Tags: Kevin Dooley, Ian Brown, Cookbook, Cisco