Cisco: A Beginners Guide, Fourth Edition

Chapter 1: Cisco and the Internet

Table 1-1: Cisco Acquisitions From 2001 Through 2005

Chapter 2: Networking Primer

Table 2-1: Subnet Masks Listed by Number of Network ID Bits
Table 2-2: Abbreviating IPv6 Addresses

Chapter 3: Router Overview

Table 3-1: Optical Networking Speeds
Table 3-2: How Network Administrators Access Routers
Table 3-3: Overview of Router Passwords and Their Uses
Table 3-4: Five Major Factors in Selecting a Router
Table 3-5: Cisco's Three Series of SOHO Routers
Table 3-6: Cisco's Midrange Routing Solutions
Table 3-7: Cisco's Series of Backbone Routers
Table 3-8: IOS Software Feature Categories
Table 3-9: IOS Feature Set Families

Chapter 4: Configuring Routers

Table 4-1: Three General Kinds of IOS Software Modes
Table 4-2: Config Modes and the Parts of the Router Targeted
Table 4-3: IOS Navigation Commands
Table 4-4: Interface Status Report Definitions
Table 4-5: Configuration Register Settings to Enter Factory Diagnostic Mode
Table 4-6: Cisco's Password Recovery Procedures for Legacy Router Protocols
Table 4-7: Color Keys That Track Configuration Status
Table 4-8: The Four Parts of Fast Step Configuration Tasks

Chapter 5: Switches

Table 5-1: Topology Design Factors (Besides Geography)
Table 5-2: TIE/EIA Twisted-Pair Specifications
Table 5-3: LAN Specifications with Cable Types and Distance Limits
Table 5-4: Key Switching Technologies
Table 5-5: Midrange Catalyst Switches With High Port Densities
Table 5-6: Mid-Range Catalyst Switches With Multilayer Switching
Table 5-7: Cisco's Two High-End Catalyst Switches With Gigabit, 10 Gigabit, and ATM Backbones

Chapter 6: Security Overview

Table 6-1: Authentication Methods in IOS
Table 6-2: Entity Types Secured by AAA Authentication Methods
Table 6-3: AAA's Eight Named Methods for User Authentication
Table 6-4: IOS's Five Authorization Types
Table 6-5: How AAA Accounting Methods Work per Security Protocol
Table 6-6: AAA Accounting Types That Track Asset Usage for Five Security Entity Types
Table 6-7: RADIUS Attributes Used to Enforce User-Based Security
Table 6-8: Cisco Extensions to the RADIUS Standard
Table 6-9: TACACS+ Authentication and Authorization AV Pairs

Chapter 7: Security Building Blocks

Table 7-1: Keywords in IOS Firewall's ip Inspect and Access-List Commands
Table 7-2: Cisco's Line of Cisco Secure PIX Firewalls
Table 7-3: Cisco's Line of Cisco Adaptive Security Appliances
Table 7-4: Some of Cisco's VPN-Enabled Hardware

Chapter 8: Cisco Wireless Solutions

Table 8-1: The Attributes of 802.11 a, b, g, and n Networks
Table 8-2: Cisco's Line of Access Points
Table 8-3: Cisco's Line of Wireless Client Adapters
Table 8-4: Authentication Methods for Client Types
Table 8-5: Wireless Client System Parameters

Chapter 9: Cisco Unified Contact Center

Table 9-1: VoIP Covdec Comparison
Table 9-2: SIP Functionality
Table 9-3: Comparison of Cisco Unified IP Phones
Table 9-4: Cisco Unified Communication's Call Processing Products
Table 9-5: Cisco Unified Communications Clients
Table 9-6: Cisco Unified Communications Voice and Messaging Components
Table 9-7: Cisco Unified Communications Media-Conferencing Products

Chapter 10: Storage Tools

Table 10-1: Layers in the Fibre Channel Stack
Table 10-2: Comparison of the Cisco MDS 9500 Series
Table 10-3: Several Configuration Commands Used in the CLI
Table 10-4: Comparison of Cisco FS 5500 Series Integrated NAS and Cisco FS 5700 Series Integrated NASs

Chapter 11: Cisco Content Networking and Video Solutions

Table 11-1: Components of an AVVID Solution

Chapter 12: Routing Protocols

Table 12-1: Initial Steps to Configure Cisco's Routing Protocols
Table 12-2: EIGRP's Command Set

Chapter 13: Network Management

Table 13-1: Basic Cisco MIB Objects Commonly Used in SNMP Implementations
Table 13-2: System Requirements for Cisco Network Assistant 4.0
Table 13-3: Maximum Number of Devices Allowed in a Community

Chapter 14: Network Design Process

Table 14-1: Typical Message Sizes and Types
Table 14-2: IETF Domain Name Suffixes

Chapter 15: Troubleshooting Cisco Networks

Table 15-1: Typical Host Access Problems and Causes
Table 15-2: Typical Router Problems and Causes
Table 15-3: Campus LAN Performance Problems and Causes
Table 15-4: Definitions of Useful Ethernet Statistics
Table 15-5: Input Errors Causes and Actions
Table 15-6: Dropped Packet Causes and Actions
Table 15-7: Serial Line Error Causes and Actions
Table 15-8: Typical Reboot Problems and Probable Causes
Table 15-9: The Number of Characters Needed in Various Key Lengths

Категории