Troubleshooting Remote Access Networks (CCIE Professional Development)

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C-plane (control) 2nd

C-plane (ISDN)

C/R (Command/Response) bit (Frame Relay Address field)

cable lengths

     long versus short

cable modem services 2nd

     limitations of

     standards

cable modems

cables

    shorts

         detecting

calculating

     CIR

     ISDN BRI load at full utilization

     maximum DLCIs per interface

     RER

call clearing messages

Call Reference field (Q.931 messages)

callback

     PPP callback 2nd 3rd 4th 5th 6th

callback function of PPP

     ISDN configuration 2nd 3rd 4th

called-party number verification

caller ID screening

calling

     IOS routers from IOS 77x routers 2nd 3rd

CAP (carrierless amplitude/phase modulation)

Capacity Theorem

     s Capacity Theorem nopage

captured Log Viewer results

     viewing 2nd 3rd 4th 5th 6th 7th 8th 9th

carrierless amplitude/phase modulation

carriers

     CO 2nd

     first- tier exchange carriers

     IXCs

     switching systems 2nd 3rd

     T-carriers 2nd

         E1

         T1 2nd

     tandem office 2nd

categories of ISDN network designs 2nd

CATV

     cable modems

     data transmission

         standards 2nd 3rd 4th 5th

     heartbeats

     two-way Internet connections

Cause messages (ISDN BRI) 2nd 3rd 4th

CCITT (Comit Consultatif International T l phonique et T l graphique)

CCP (Compression Control Protocol) 2nd

CCS (common channel signaling)

CDMA2000 1xEV

CDP (Cisco Discovery Protocol)

     discovering network topology

CDSL

cell switching

CERT (Computer Emergency Response Team)

change management

     of remote access VPNs

channel banks

channels

     ISDN

CHAP (Challenge Handshake Authentication Protocol)

charge backs

Chinese Remainder Theorem

CIR (committed information rate)

     aggregate CIR 2nd

     asymmetrical CIR

     flexible CIR

     zero CIR

circuit switching

Cisco Discovery Protocol

Cisco Easy VPN client

     client status, displaying 2nd

     debugging IPSec key events 2nd

         VPNs:Cisco Easy VPN Client:debugging IPSec key events;debugging:Cisco Easy VPN client connection:IPSec key events

     initial troubleshooting checklist 2nd

     monitoring 2nd 3rd

     resetting connection

     restrictions 2nd

Cisco IOS

    77x routers

         accessing ISDN routers 2nd 3rd

     commands

         short format 2nd

    ISDN

         available phone services 2nd

    ISDN voice privacy

         configuring 2nd 3rd

     NFAS groups

Cisco Mobile Office initiative 2nd

Cisco PIX 501 VPN Client

     configuring 2nd

Cisco PIX 506 VPN Client

     configuring 2nd

Cisco PIX VPN client

     connectivity, verifying 2nd 3rd 4th 5th 6th 7th 8th 9th

     restrictions

Cisco ubr7200 Series routers

Cisco uBR7246 Universal Broadband Router

Cisco VPN 3000 Concentrator

     IPSec over UDP

Cisco VPN 3002

     connection establishment 2nd

         verifying group name /password 2nd

         verifying interface status 2nd 3rd

Cisco VPN 3002 HW client

Cisco VPN 3002 HW Client

     configuring 2nd

Cisco VPN 3002 HW client

     Event Log 2nd 3rd 4th

     initial troubleshooting checklist

Cisco VPN IOS Client

     configuring 2nd 3rd

Cisco VPN Unity client

     Concentrator Event Log 2nd 3rd

         event classes 2nd 3rd

         event security levels 2nd

Cisco VPN Unity Client

     configuring

Cisco VPN Unity client

     Event Log Viewer

         Client Log Viewer, starting

         ISAKMP

         reviewing captured data 2nd 3rd 4th 5th 6th 7th 8th 9th

     incompatible GINAs 2nd

     restrictions 2nd 3rd 4th

     troubleshooting checklist 2nd 3rd

classifying

     enterprise VPNs 2nd 3rd

         data link layer VPNs 2nd 3rd 4th 5th 6th 7th

         firewall-based VPNs 2nd

         network VPNs 2nd 3rd 4th 5th

         remote access VPNs

         site-to-site VPNs

     troubleshooting tools

clear interface bri0 command

CLECs

CLECs (competitive LECs)

client authentication

Client mode configuration

     Cisco 3002 HW clients

CLLM

CLLM (consolidated link-layer management)

clocking

     SCTE

clocking issues

    Frame Relay

         isolating 2nd

         troubleshooting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

CO 2nd

code values for LMIs 2nd

codecs

coded orthogonal FDM

coding schemes

     AMI

     B8ZS 2nd

     DSL 2nd

     HDB3

     pseudo-ternary signaling 2nd

coding techniques

     2B1Q 2nd 3rd

     AMI

     WLANs

         COFDM

     zero-suppression 2nd

COFDM (coded orthogonal FDM)

Comit Consultatif International T l phonique et T l graphique

commands

     AS5200 series routers 2nd

     AS5300 series routers 2nd 3rd 4th 5th 6th 7th

     AS5400 series routers

     clear interface bri0

     debug bri 2nd

     debug interface serial 2nd 3rd

     debug isdn q931 2nd 3rd

     debug ppp negotiation 2nd 3rd

     deub ppp authentication

     extended ping

     isdn autodetect

     isdn timeout signaling

     logging console

    loopback

         troubleshooting T1 circuits

     mtrace

     ping 2nd 3rd 4th

         replies

         syntax

     service timestamps

     show cdp neighbors

     show controllers bri0 2nd

     show dialer 2nd

     show interface serial 0 2nd

     show isdn active

     show isdn status 2nd 3rd 4th 5th 6th

     show modem operational status 2nd 3rd

     traceroute 2nd

commands (Cisco IOS)

     short format 2nd

committed burst rate (Bc)

committed interval (Tc)

     Frame Relay 2nd

comparing

     remote access and site-to-site VPNs 2nd

     X.25 and Frame Relay features 2nd

components of Frame Relay networks

compression

     Frame Relay 2nd 3rd 4th 5th 6th 7th 8th

         hardware compression 2nd

         payload compression 2nd 3rd

         software compression 2nd 3rd

         Van Jacobson header compression 2nd 3rd

Concentrator Event Log 2nd 3rd

     event classes 2nd 3rd

     event security levels 2nd

configuration management

     of remote access VPNs

configuration negotiation phase (LCP) 2nd

configuration solutions

    ISDN

         DDR 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

         PPP callback 2nd 3rd 4th

         snapshot routing 2nd

         spoofing 2nd 3rd

configuring

    DDR

         with backup interfaces

         with dialer watch

         with floating static routes

     DDR backup 2nd 3rd 4th 5th 6th

    dial-in

         large-scale dial-in 2nd 3rd 4th 5th 6th 7th 8th 9th

         PPP dial-in 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

         text dial-in 2nd 3rd

    dial-out

         large-scale dial-out 2nd 3rd 4th

         PPP dial-out 2nd 3rd 4th 5th

         text dial-out 2nd 3rd 4th 5th 6th 7th 8th

     dialer profiles 2nd 3rd 4th 5th 6th 7th 8th

    Frame Relay

         bridging 2nd 3rd

         broadcast queues 2nd

         compression 2nd

         frame switching 2nd

         generic traffic shaping 2nd 3rd

         IP multicast 2nd

         IP unnumbered 2nd

         ISDN backup 2nd 3rd

         payload compression 2nd

         point-to-multipoint 2nd

         point-to-multipoint connections 2nd

         point-to-point connections 2nd 3rd 4th 5th 6th

         routing protocol overhead estimates 2nd

         traffic shaping 2nd 3rd 4th 5th 6th

         Van Jacobson header compression 2nd 3rd

    ISDN

         IP pools 2nd 3rd 4th 5th

         MMP 2nd 3rd 4th 5th 6th 7th 8th 9th

         per- user configuration 2nd 3rd 4th

         POTS interfaces 2nd 3rd 4th

         SPIDs 2nd 3rd

         switch type 2nd

         voice privacy 2nd 3rd

    ISDN BRI

         bandwidth on demand

    ISND

         NAT 2nd 3rd 4th 5th 6th 7th

         PAT 2nd 3rd 4th

     PPP callback 2nd 3rd

    remote access VPNs

         Cisco PIX 501 VPN Client 2nd

         Cisco PIX 506 VPN Client 2nd

         Cisco VPN 3002 HW Client 2nd

         Cisco VPN IOSClient 2nd 3rd

         Cisco VPN Unity Client

     VPN 3000 Concentrator 2nd

         filters and rules 2nd

         Group Lock

         IKE peer identity validation

         IKE proposals 2nd 3rd

         IPSec SAs

         load balancing 2nd

         redundancy

         reverse route injection

         SAs 2nd 3rd

congestion

    Frame Relay

         BECNs 2nd

congestion control mechanisms

     Frame Relay

         CLLM

         rate adoption algorithm 2nd

         windowing

connection speeds

     increasing 2nd

     limitations of

     of modems

connection termination phase (PPP) 2nd

connectionless data integrity 2nd

connectivity

    of Cisco PIX VPN client

         verifying 2nd 3rd 4th 5th 6th 7th 8th 9th

     testing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

console

     logging

Consortium LMI 2nd

     Status Enquiry message format 2nd

     Status message format

constellations

contention resolution

Control field (LAPD frames ) 2nd

Control field (LAPF control protocol) 2nd

Control field (PPP frames)

control LAPF

Control plane

core aspects of Frame Relay

core LAPF

core routers

    DLCI settings

         verifying 2nd 3rd 4th 5th

     Frame Relay point-to-multipoint configuration 2nd

     NFAS groups

     point-to-point Frame Relay configuration 2nd 3rd 4th

core routers (ISDN)

     IP pool assignment 2nd 3rd 4th 5th

corporate managed services 2nd

cost-effective ISDN solutions

     DDR 2nd

         dialer profiles 2nd 3rd 4th 5th 6th 7th 8th 9th

     PPP callback

         configuring 2nd 3rd

     snapshot routing 2nd

     spoofing 2nd 3rd

costs of remote access

     budgeting

counter parameters for LMIs 2nd 3rd

CPE (customer premises equipment)

creating

     dial peers 2nd

     VPN client profiles

CSU/DSU

     pinouts 2nd

custom design switches

     ISDN

customer premises equipment

Категории