Cisco: A Beginners Guide, Fourth Edition
|
Chapter 1: Cisco and the Internet
- Table 1-1: Cisco Acquisitions From 2001 Through 2005
Chapter 2: Networking Primer
- Table 2-1: Subnet Masks Listed by Number of Network ID Bits
- Table 2-2: Abbreviating IPv6 Addresses
Chapter 3: Router Overview
- Table 3-1: Optical Networking Speeds
- Table 3-2: How Network Administrators Access Routers
- Table 3-3: Overview of Router Passwords and Their Uses
- Table 3-4: Five Major Factors in Selecting a Router
- Table 3-5: Cisco's Three Series of SOHO Routers
- Table 3-6: Cisco's Midrange Routing Solutions
- Table 3-7: Cisco's Series of Backbone Routers
- Table 3-8: IOS Software Feature Categories
- Table 3-9: IOS Feature Set Families
Chapter 4: Configuring Routers
- Table 4-1: Three General Kinds of IOS Software Modes
- Table 4-2: Config Modes and the Parts of the Router Targeted
- Table 4-3: IOS Navigation Commands
- Table 4-4: Interface Status Report Definitions
- Table 4-5: Configuration Register Settings to Enter Factory Diagnostic Mode
- Table 4-6: Cisco's Password Recovery Procedures for Legacy Router Protocols
- Table 4-7: Color Keys That Track Configuration Status
- Table 4-8: The Four Parts of Fast Step Configuration Tasks
Chapter 5: Switches
- Table 5-1: Topology Design Factors (Besides Geography)
- Table 5-2: TIE/EIA Twisted-Pair Specifications
- Table 5-3: LAN Specifications with Cable Types and Distance Limits
- Table 5-4: Key Switching Technologies
- Table 5-5: Midrange Catalyst Switches With High Port Densities
- Table 5-6: Mid-Range Catalyst Switches With Multilayer Switching
- Table 5-7: Cisco's Two High-End Catalyst Switches With Gigabit, 10 Gigabit, and ATM Backbones
Chapter 6: Security Overview
- Table 6-1: Authentication Methods in IOS
- Table 6-2: Entity Types Secured by AAA Authentication Methods
- Table 6-3: AAA's Eight Named Methods for User Authentication
- Table 6-4: IOS's Five Authorization Types
- Table 6-5: How AAA Accounting Methods Work per Security Protocol
- Table 6-6: AAA Accounting Types That Track Asset Usage for Five Security Entity Types
- Table 6-7: RADIUS Attributes Used to Enforce User-Based Security
- Table 6-8: Cisco Extensions to the RADIUS Standard
- Table 6-9: TACACS+ Authentication and Authorization AV Pairs
Chapter 7: Security Building Blocks
- Table 7-1: Keywords in IOS Firewall's ip Inspect and Access-List Commands
- Table 7-2: Cisco's Line of Cisco Secure PIX Firewalls
- Table 7-3: Cisco's Line of Cisco Adaptive Security Appliances
- Table 7-4: Some of Cisco's VPN-Enabled Hardware
Chapter 8: Cisco Wireless Solutions
- Table 8-1: The Attributes of 802.11 a, b, g, and n Networks
- Table 8-2: Cisco's Line of Access Points
- Table 8-3: Cisco's Line of Wireless Client Adapters
- Table 8-4: Authentication Methods for Client Types
- Table 8-5: Wireless Client System Parameters
Chapter 9: Cisco Unified Contact Center
- Table 9-1: VoIP Covdec Comparison
- Table 9-2: SIP Functionality
- Table 9-3: Comparison of Cisco Unified IP Phones
- Table 9-4: Cisco Unified Communication's Call Processing Products
- Table 9-5: Cisco Unified Communications Clients
- Table 9-6: Cisco Unified Communications Voice and Messaging Components
- Table 9-7: Cisco Unified Communications Media-Conferencing Products
Chapter 10: Storage Tools
- Table 10-1: Layers in the Fibre Channel Stack
- Table 10-2: Comparison of the Cisco MDS 9500 Series
- Table 10-3: Several Configuration Commands Used in the CLI
- Table 10-4: Comparison of Cisco FS 5500 Series Integrated NAS and Cisco FS 5700 Series Integrated NASs
Chapter 11: Cisco Content Networking and Video Solutions
- Table 11-1: Components of an AVVID Solution
Chapter 12: Routing Protocols
- Table 12-1: Initial Steps to Configure Cisco's Routing Protocols
- Table 12-2: EIGRP's Command Set
Chapter 13: Network Management
- Table 13-1: Basic Cisco MIB Objects Commonly Used in SNMP Implementations
- Table 13-2: System Requirements for Cisco Network Assistant 4.0
- Table 13-3: Maximum Number of Devices Allowed in a Community
Chapter 14: Network Design Process
- Table 14-1: Typical Message Sizes and Types
- Table 14-2: IETF Domain Name Suffixes
Chapter 15: Troubleshooting Cisco Networks
- Table 15-1: Typical Host Access Problems and Causes
- Table 15-2: Typical Router Problems and Causes
- Table 15-3: Campus LAN Performance Problems and Causes
- Table 15-4: Definitions of Useful Ethernet Statistics
- Table 15-5: Input Errors Causes and Actions
- Table 15-6: Dropped Packet Causes and Actions
- Table 15-7: Serial Line Error Causes and Actions
- Table 15-8: Typical Reboot Problems and Probable Causes
- Table 15-9: The Number of Characters Needed in Various Key Lengths
|