Cisco IOS Cookbook, 2/e (Paperback)
Kevin Dooley, Ian Brown
- 出版商: O'Reilly|英文2書85折
- 出版日期: 2007-01-30
- 售價: $2,360
- 貴賓價: 9.5 折 $2,242
- 語言: 英文
- 頁數: 1192
- 裝訂: Paperback
- ISBN: 0596527225
- ISBN-13: 9780596527228
-
相關分類:
Cisco、Apple Developer
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$880$581 -
$650$618 -
$550$468 -
$980$774 -
$990$891 -
$1,200$948 -
$600$480 -
$1,200$1,020 -
$600$588 -
$490$417 -
$480$408 -
$399CompTIA Security+Study Guide: Exam SY0-201, 4/e (Paperback)
-
$780$616 -
$420$336 -
$750$638 -
$570$542 -
$820$648 -
$560$504 -
$250$198 -
$480$470 -
$580$458 -
$850$723 -
$580$458 -
$800$632 -
$600$468
相關主題
商品描述
Description
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly.That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right.
Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:
- Configuring interfaces of many types, from serial to ATM and Frame Relay
- Configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)
- Configuring authentication
- Configuring other services, including DHCP and NTP
- Setting up backup links, and using HSRP to configure backup routers
- Managing the router, including SNMP and other solutions
- Using access lists to control the traffic through the router
If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.
Table of Contents
Preface
1. Router Configuration and File Management
1.1 Configuring the Router via TFTP
1.2 Saving Router Configuration to Server
1.3 Booting the Router Using a Remote Configuration File
1.4 Storing Configuration Files Larger Than NVRAM
1.5 Clearing the Startup Configuration
1.6 Loading a New IOS Image
1.7 Booting a Different IOS Image
1.8 Booting over the Network
1.9 Copying an IOS Image to a Server
1.10 Copying an IOS Image Through the Console
1.11 Deleting Files from Flash
1.12 Partitioning Flash
1.13 Using the Router as a TFTP Server
1.14 Using FTP from the Router
1.15 Generating Large Numbers of Router Configurations
1.16 Changing the Configurations of Many Routers at Once
1.17 Extracting Hardware Inventory Information
1.18 Backing Up Router Configurations
1.19 Warm Reload
1.20 Warm Upgrade
1.21 Configuration Archiving
1.22 Locking Configuration Access
2. Router Management
2.1 Creating Command Aliases
2.2 Managing the Router's ARP Cache
2.3 Tuning Router Buffers
2.4 Auto Tuning Buffers
2.5 Using the Cisco Discovery Protocol
2.6 Disabling the Cisco Discovery Protocol
2.7 Using the Small Servers
2.8 Enabling HTTP Access to a Router
2.9 Enabling Secure HTTP (HTTPS) Access to a Router
2.10 Using Static Hostname Tables
2.11 Enabling Domain Name Services
2.12 Disabling Domain Name Lookups
2.13 Specifying a Router Reload Time
2.14 Scheduling of Router Commands
2.15 Displaying Historical CPU Values
2.16 Creating Exception Dump Files
2.17 Generating a Report of Interface Information
2.18 Generating a Report of Routing Table Information
2.19 Generating a Report of ARP Table Information
2.20 Generating a Server Host Table File
3. User Access and Privilege Levels
3.1 Setting Up User IDs
3.2 Encrypting Passwords
3.3 Using Better Password-Encryption Techniques
3.4 Removing Passwords from a Router Configuration File
3.5 Deciphering Cisco's Weak Password Encryption
3.6 Displaying Active Users
3.7 Sending Messages to Other Users
3.8 Changing the Number of VTYs
3.9 Changing VTY Timeouts
3.10 Restricting VTY Access by Protocol
3.11 Enabling Absolute Timeouts on VTY Lines
3.12 Implementing Banners
3.13 Disabling Banners on a Port
3.14 Disabling Router Lines
3.15 Reserving a VTY Port for Administrative Access
3.16 Restricting Inbound Telnet Access
3.17 Logging Telnet Access
3.18 Setting the Source Address for Telnet
3.19 Automating the Login Sequence
3.20 Using SSH for Secure Access
3.21 Changing Privilege Level of IOS Commands
3.22 Defining Per User Privileges
3.23 Defining Per Port Privileges
4. TACACS+
4.1 Authenticating Login IDs from a Central System
4.2 Restricting Command Access
4.3 Losing Access to the TACACS+ Server
4.4 Disabling TACACS+ Authentication on a Particular Line
4.5 Capturing User Keystrokes
4.6 Logging System Events
4.7 Setting the IP Source Address for TACACS+ Messages
4.8 Sample Server Configuration Files
5. IP Routing
5.1 Finding an IP Route
5.2 Finding Types of IP Routes
5.3 Converting Different Mask Formats
5.4 Using Static Routing
5.5 Floating Static Routes
5.6 Using Policy-Based Routing to Route Based on Source Address
5.7 Using Policy-Based Routing to Route Based on Application Type
5.8 Examining Policy-Based Routing
5.9 Changing Administrative Distances
5.10 Routing Over Multiple Paths with Equal Costs
5.11 Static Routes That Track Interfaces or Other Routes
5.12 Keeping Statistics on Routing Table Changes
6. RIP
6.1 Configuring RIP Version 1
6.2 Filtering Routes with RIP
6.3 Redistributing Static Routes into RIP
6.4 Redistributing Routes Using Route Maps
6.5 Creating a Default Route in RIP
6.6 Disabling RIP on an Interface
6.7 Default Passive Interface
6.8 Unicast Updates for RIP
6.9 Applying Offsets to Routes
6.10 Adjusting Timers
6.11 Configuring Interpacket Delay
6.12 Enabling Nonperiodic Updates
6.13 Increasing the RIP Input Queue
6.14 Configuring RIP Version 2
6.15 Enabling RIP Authentication
6.16 RIP Route Summarization
6.17 Route Tagging
7. EIGRP
7.1 Configuring EIGRP
7.2 Filtering Routes with EIGRP
7.3 Redistributing Routes into EIGRP
7.4 Redistributing Routes into EIGRP Using Route Maps
7.5 Disabling EIGRP on an Interface
7.6 Adjusting EIGRP Metrics
7.7 Adjusting Timers
7.8 Enabling EIGRP Authentication
7.9 EIGRP Route Summarization
7.10 Logging EIGRP Neighbor State Changes
7.11 Limiting EIGRP's Bandwidth Utilization
7.12 EIGRP Stub Routing
7.13 Route Tagging
7.14 Viewing EIGRP Status
8. OSPF
8.1 Configuring OSPF
8.2 Filtering Routes in OSPF
8.3 Adjusting OSPF Costs
8.4 Creating a Default Route in OSPF
8.5 Redistributing Static Routes into OSPF
8.6 Redistributing External Routes into OSPF
8.7 Manipulating DR Selection
8.8 Setting the OSPF RID
8.9 Enabling OSPF Authentication
8.10 Selecting the Appropriate Area Types
8.11 Using OSPF on Dial Interfaces
8.12 Summarizing Routes in OSPF
8.13 Disabling OSPF on Certain Interfaces
8.14 Changing the Network Type on an Interface
8.15 OSPF Route Tagging
8.16 Logging OSPF Adjacency Changes
8.17 Adjusting OSPF Timers
8.18 Reducing OSPF Traffic in Stable Networks
8.19 OSPF Virtual Links
8.20 Viewing OSPF Status with Domain Names
8.21 Debugging OSPF
9. BGP
9.1 Configuring BGP
9.2 Using eBGP Multihop
9.3 Adjusting the Next-Hop Attribute
9.4 Connecting to Two ISPs
9.5 Connecting to Two ISPs with Redundant Routers
9.6 Restricting Networks Advertised to a BGP Peer
9.7 Adjusting Local Preference Values
9.8 Load-Balancing
9.9 Removing Private ASNs from the AS Path
9.10 Filtering BGP Routes Based on AS Paths
9.11 Reducing the Size of the Received Routing Table
9.12 Summarizing Outbound Routing Information
9.13 Prepending ASNs to the AS Path
9.14 Redistributing Routes with BGP
9.15 Using Peer Groups
9.16 Authenticating BGP Peers
9.17 Using BGP Communities
9.18 Using BGP Route Reflectors
9.19 Putting It All Together
10. Frame Relay
10.1 Setting Up Frame Relay with Point-to-Point Subinterfaces
10.2 Adjusting LMI Options
10.3 Setting Up Frame Relay with Map Statements
10.4 Using Multipoint Subinterfaces
10.5 Configuring Frame Relay SVCs
10.6 Simulating a Frame Relay Cloud
10.7 Compressing Frame Relay Data on a Subinterface
10.8 Compressing Frame Relay Data with Maps
10.9 PPP over Frame Relay
10.10 Viewing Frame Relay Status Information
11. Handling Queuing and Congestion
11.1 Fast Switching and CEF
11.2 Setting the DSCP or TOS Field
11.3 Using Priority Queuing
11.4 Using Custom Queuing
11.5 Using Custom Queues with Priority Queues
11.6 Using Weighted Fair Queuing
11.7 Using Class-Based Weighted Fair Queuing
11.8 Using NBAR Classification
11.9 Controlling Congestion with WRED
11.10 Using RSVP
11.11 Manual RSVP Reservations
11.12 Aggregating RSVP Reservations
11.13 Using Generic Traffic Shaping
11.14 Using Frame-Relay Traffic Shaping
11.15 Using Committed Access Rate
11.16 Implementing Standards-Based Per-Hop Behavior
11.17 AutoQoS
11.18 Viewing Queue Parameters
12. Tunnels and VPNs
12.1 Creating a Tunnel
12.2 Tunneling Foreign Protocols in IP
12.3 Tunneling with Dynamic Routing Protocols
12.4 Viewing Tunnel Status
12.5 Creating an Encrypted Router-to-Router VPN in a GRE Tunnel
12.6 Creating an Encrypted VPN Between the LAN Interfaces of Two Routers
12.7 Generating RSA Keys
12.8 Creating a Router-to-Router VPN with RSA Keys
12.9 Creating a VPN Between a Workstation and a Router
12.10 Creating an SSL VPN
12.11 Checking IPSec Protocol Status
13. Dial Backup
13.1 Automating Dial Backup
13.2 Using Dialer Interfaces
13.3 Using an Async Modem on the AUX Port
13.4 Using Backup Interfaces
13.5 Using Dialer Watch
13.6 Using Virtual Templates
13.7 Ensuring Proper Disconnection
13.8 View Dial Backup Status
13.9 Debugging Dial Backup
14. NTP and Time
14.1 Time-Stamping Router Logs
14.2 Setting the Time
14.3 Setting the Time Zone
14.4 Adjusting for Daylight Saving Time
14.5 Synchronizing the Time on All Routers (NTP)
14.6 Configuring NTP Redundancy
14.7 Setting the Router As the NTP Master for the Network
14.8 Changing NTP Synchronization Periods
14.9 Using NTP to Send Periodic Broadcast Time Updates
14.10 Using NTP to Send Periodic Multicast Time Updates
14.11 Enabling and Disabling NTP Per Interface
14.12 NTP Authentication
14.13 Limiting the Number of Peers
14.14 Restricting Peers
14.15 Setting the Clock Period
14.16 Checking the NTP Status
14.17 Debugging NTP
14.18 NTP Logging
14.19 Extended Daylight Saving Time
14.20 NTP Server Configuration
15. DLSw
15.1 Simple Bridging
15.2 Configuring DLSw
15.3 Using DLSw to Bridge Between Ethernet and Token Ring
15.4 Converting Ethernet and Token Ring MAC Addresses
15.5 Configuring SDLC
15.6 Configuring SDLC for Multidrop Connections
15.7 Using STUN
15.8 Using BSTUN
15.9 Controlling DLSw Packet Fragmentation
15.10 Tagging DLSw Packets for QoS
15.11 Supporting SNA Priorities
15.12 DLSw+ Redundancy and Fault Tolerance
15.13 Viewing DLSw Status Information
15.14 Viewing SDLC Status Information
15.15 Debugging DSLw
16. Router Interfaces and Media
16.1 Viewing Interface Status
16.2 Configuring Serial Interfaces
16.3 Using an Internal T1 CSU/DSU
16.4 Using an Internal ISDN PRI Module
16.5 Using an Internal 56 Kbps CSU/DSU
16.6 Configuring an Async Serial Interface
16.7 Configuring ATM Subinterfaces
16.8 Setting Payload Scrambling on an ATM Circuit
16.9 Classical IP Over ATM
16.10 Configuring Ethernet Interface Features
16.11 Configuring Token Ring Interface Features
16.12 Connecting VLAN Trunks with ISL
16.13 Connecting VLAN Trunks with 802.1Q
16.14 LPD Printer Support
17. Simple Network Management Protocol
17.1 Configuring SNMP
17.2 Extracting Router Information via SNMP Tools
17.3 Recording Important Router Information for SNMP Access
17.4 Using SNMP to Extract Inventory Information from a List of Routers
17.5 Using Access Lists to Protect SNMP Access
17.6 Logging Unauthorized SNMP Attempts
17.7 Limiting MIB Access
17.8 Using SNMP to Modify a Router's Running Configuration
17.9 Using SNMP to Copy a New IOS Image
17.10 Using SNMP to Perform Mass Configuration Changes
17.11 Preventing Unauthorized Configuration Modifications
17.12 Making Interface Table Numbers Permanent
17.13 Enabling SNMP Traps and Informs
17.14 Sending Syslog Messages As SNMP Traps and Informs
17.15 Setting SNMP Packet Size
17.16 Setting SNMP Queue Size
17.17 Setting SNMP Timeout Values
17.18 Disabling Link Up/Down Traps per Interface
17.19 Setting the IP Source Address for SNMP Traps
17.20 Using RMON to Send Traps
17.21 Enabling SNMPv3
17.22 Strong SNMPv3 Encryption
17.23 Using SAA
18. Logging
18.1 Enabling Local Router Logging
18.2 Setting the Log Size
18.3 Clearing the Router's Log
18.4 Sending Log Messages to Your Screen
18.5 Using a Remote Log Server
18.6 Enabling Syslog on a Unix Server
18.7 Changing the Default Log Facility
18.8 Restricting What Log Messages Are Sent to the Server
18.9 Setting the IP Source Address for Syslog Messages
18.10 Logging Router Syslog Messages in Different Files
18.11 Maintaining Syslog Files on the Server
18.12 Testing the Syslog Sever Configuration
18.13 Preventing the Most Common Messages from Being Logged
18.14 Rate-Limiting Syslog Traffic
18.15 Enabling Error Log Counting
18.16 XML-Formatted Log Messages
18.17 Modifying Log Messages
19. Access-Lists
19.1 Filtering by Source or Destination IP Address
19.2 Adding a Comment to an ACL
19.3 Filtering by Application
19.4 Filtering Based on TCP Header Flags
19.5 Restricting TCP Session Direction
19.6 Filtering Multiport Applications
19.7 Filtering Based on DSCP and TOS
19.8 Logging When an Access-List Is Used
19.9 Logging TCP Sessions
19.10 Analyzing ACL Log Entries
19.11 Using Named and Reflexive Access-Lists
19.12 Dealing with Passive Mode FTP
19.13 Using Time-Based Access-Lists
19.14 Filtering Based on Noncontiguous Ports
19.15 Advanced Access-List Editing
19.16 Filtering IPv6
20. DHCP
20.1 Using IP Helper Addresses for DHCP
20.2 Limiting the Impact of IP Helper Addresses
20.3 Using DHCP to Dynamically Configure Router IP Addresses
20.4 Dynamically Allocating Client IP Addresses via DHCP
20.5 Defining DHCP Configuration Options
20.6 Defining DHCP Lease Periods
20.7 Allocating Static IP Addresses with DHCP
20.8 Configuring a DHCP Database Client
20.9 Configuring Multiple DHCP Servers per Subnet
20.10 DHCP Static Mapping
20.11 DHCP-Secured IP Address Assignment
20.12 Showing DHCP Status
20.13 Debugging DHCP
21. NAT
21.1 Configuring Basic NAT Functionality
21.2 Allocating External Addresses Dynamically
21.3 Allocating External Addresses Statically
21.4 Translating Some Addresses Statically and Others Dynamically
21.5 Using Route Maps to Refine Static Translation Rules
21.6 Translating in Both Directions Simultaneously
21.7 Rewriting the Network Prefix
21.8 Using NAT for Server Load Distribution
21.9 Stateful NAT Failover
21.10 Adjusting NAT Timers
21.11 Changing TCP Ports for FTP
21.12 Checking NAT Status
21.13 Debugging NAT
22. First Hop Redundancy Protocols
22.1 Configuring Basic HSRP Functionality
22.2 Using HSRP Preempt
22.3 Making HSRP React to Problems on Other Interfaces
22.4 Load-Balancing with HSRP
22.5 Redirecting ICMP with HSRP
22.6 Manipulating HSRP Timers
22.7 Using HSRP on Token Ring
22.8 HSRP SNMP Support
22.9 Increasing HSRP Security
22.10 Showing HSRP State Information
22.11 Debugging HSRP
22.12 HSRP Version 2
22.13 VRRP
22.14 Gateway Load-Balancing Protocol
23. IP Multicast
23.1 Configuring Basic Multicast Functionality with PIM-DM
23.2 Routing Multicast Traffic with PIM-SM and BSR
23.3 Routing Multicast Traffic with PIM-SM and Auto-RP
23.4 Filtering PIM Neighbors
23.5 Configuring Routing for a Low-Frequency Multicast Application
23.6 Multicast over Frame Relay or ATM WANs
23.7 Configuring CGMP
23.8 Using IGMP Version 3
23.9 Static Multicast Routes and Group Memberships
23.10 Routing Multicast Traffic with MOSPF
23.11 Routing Multicast Traffic with DVMRP
23.12 DVMRP Tunnels
23.13 Configuring Bidirectional PIM
23.14 Controlling Multicast Scope with TTL
23.15 Controlling Multicast Scope with Administratively Scoped Addressing
23.16 Exchanging Multicast Routing Information with MBGP
23.17 Using MSDP to Discover External Sources
23.18 Configuring Anycast RP
23.19 Converting Broadcasts to Multicasts
23.20 Showing Multicast Status
23.21 Debugging Multicast Routing
24. IP Mobility
24.1 Local Area Mobility
24.2 Home Agent Configuration
24.3 Foreign Agent Configuration
24.4 Making a Router a Mobile Node
24.5 Reverse-Tunnel Forwarding
24.6 Using HSRP for Home Agent Redundancy
25. IPv6
25.1 Automatically Generating IPv6 Addresses for an Interface
25.2 Manually Configuring IPv6 Addresses on an Interface
25.3 Configuring DHCP for IPv6
25.4 Dynamic Routing with RIP
25.5 Modifying the Default RIP Parameters
25.6 IPv6 Route Filtering and Metric Manipulation in RIP
25.7 Using OSPF for IPv6
25.8 IPv6 Route Filtering and Metric Manipulation in OSPF
25.9 Route Redistribution
25.10 Dynamic Routing with MBGP
25.11 Tunneling IPv6 Through an Existing IPv4 Network
25.12 Translating Between IPv6 and IPv4
26. MPLS
26.1 Configuring a Basic MPLS P Router
26.2 Configuring a Basic MPLS PE Router
26.3 Configuring Basic MPLS CE Routers
26.4 Configuring MPLS over ATM
26.5 PE-CE Communication via RIP
26.6 PE-CE Communication via OSPF
26.7 PE-CE Communication via EIGRP
26.8 PE-CE Communication via BGP
26.9 QoS over MPLS
26.10 MPLS Traffic Engineering with Autoroute
26.11 Multicast Over MPLS
26.12 Your Service Provider Doesn't Do What You Want
27. Security
27.1 Using AutoSecure
27.2 Using Context-Based Access-Lists
27.3 Transparent Cisco IOS Firewall
27.4 Stopping Denial of Service Attacks
27.5 Inspecting Applications on Different Port Numbers
27.6 Intrusion Detection and Prevention
27.7 Login Password Retry Lockout
27.8 Authentication Proxy
A. External Software Packages
B. IP Precedence, TOS, and DSCP Classifications
Index
商品描述(中文翻譯)
描述
沒有什麼比思科的網絡操作系統(IOS)更需要一本烹飪書了。IOS功能強大且靈活,但也令人困惑和令人生畏。大多數任務可以用幾種不同的方式完成。當您試圖快速解決問題時,您不希望花貴重的時間弄清楚哪種方式最好。
這就是這本烹飪書的用途。幸運的是,大多數路由器配置任務可以分解為幾個相對獨立的步驟:配置接口,配置路由協議,設置備份連接,實施封包過濾和其他訪問控制機制。您真正需要的是一套食譜,向您展示如何執行最常見的任務,以便您可以快速為您的網站編寫出良好的配置。您需要知道這些解決方案有效:您不希望在凌晨2點時實施備份連接,因為您的主連接已經斷開,而您在安裝路由器時設置的備份連接不太正確。
經過全面修訂和擴展,《思科IOS烹飪書》第2版增加了MPLS、安全性、IPv6和IP移動等部分,並提供了對最常見配置問題的解決方案,包括:
- 配置各種類型的接口,從串行到ATM和幀中繼
- 配置所有常見的IP路由協議(RIP、EIGRP、OSPF和BGP)
- 配置身份驗證
- 配置其他服務,包括DHCP和NTP
- 設置備份連接,並使用HSRP配置備份路由器
- 管理路由器,包括SNMP和其他解決方案
- 使用訪問列表控制通過路由器的流量
如果您使用思科路由器,您需要像這樣的一本書來幫助您快速有效地解決問題。即使您有經驗,這些解決方案和詳細的解釋也將給您帶來新的想法和對路由器配置的深入了解。如果您沒有經驗,如果您剛剛負責管理一個擁有思科路由器的網絡,這本書可能會幫助您保住工作。
目錄
前言
1. 路由器配置和文件管理
1.1 通過TFTP配置路由器
1.2
將路由器配置保存到服務器
1.3 使用遠程配置文件引導路由器
1.4
存儲大於NVRAM的配置文件
1.5 清除啟動配置
1.6
加載新的IOS映像
1.7 引導不同的IOS映像
1.8
通過網絡引導
1.9 將IOS映像複製到服務器
1.10 通過控制台複製IOS映像
1.11 從閃存中刪除文件
1.12
劃分閃存
1.13 使用路由器作為TFTP服務器
1.14
從路由器使用FTP
1.15 生成大量的路由器配置
1.16
更改多個路由器的配置