Network Warrior

By Gary A. Donahue

Pick up the place certification assessments depart off. With this useful, in-depth advisor to the full community infrastructure, you’ll tips on how to care for genuine Cisco networks, instead of the hypothetical occasions offered on checks just like the CCNA. Network Warrior takes you step-by-step during the international of routers, switches, firewalls, and different applied sciences in accordance with the author's huge box adventure. you will discover new content material for MPLS, IPv6, VoIP, and instant during this thoroughly revised moment version, in addition to examples of Cisco Nexus 5000 and 7000 switches throughout.

Topics include:

  • An in-depth view of routers and routing
  • Switching, utilizing Cisco Catalyst and Nexus switches as examples
  • SOHO VoIP and SOHO instant entry aspect layout and configuration
  • Introduction to IPv6 with configuration examples
  • Telecom applied sciences within the data-networking international, together with T1, DS3, body relay, and MPLS
  • Security, firewall concept, and configuration, in addition to ACL and authentication
  • Quality of carrier (QoS), with an emphasis on low-latency queuing (LLQ)
  • IP tackle allocation, community Time Protocol (NTP), and machine failures

Show description

Quick preview of Network Warrior PDF

Best Computer Science books

Web Services, Service-Oriented Architectures, and Cloud Computing, Second Edition: The Savvy Manager's Guide (The Savvy Manager's Guides)

Internet prone, Service-Oriented Architectures, and Cloud Computing is a jargon-free, hugely illustrated rationalization of ways to leverage the speedily multiplying prone on hand on the net. the way forward for enterprise relies on software program brokers, cellular units, private and non-private clouds, monstrous info, and different hugely attached expertise.

Software Engineering: Architecture-driven Software Development

Software program Engineering: Architecture-driven software program improvement is the 1st complete consultant to the underlying abilities embodied within the IEEE's software program Engineering physique of information (SWEBOK) typical. criteria professional Richard Schmidt explains the normal software program engineering practices well-known for constructing initiatives for presidency or company structures.

Platform Ecosystems: Aligning Architecture, Governance, and Strategy

Platform Ecosystems is a hands-on consultant that provides a whole roadmap for designing and orchestrating brilliant software program platform ecosystems. not like software program items which are controlled, the evolution of ecosystems and their myriad contributors needs to be orchestrated via a considerate alignment of structure and governance.

Extra info for Network Warrior

Show sample text content

25 Connecting VLANs Configuring VLANs CatOS IOS utilizing VLAN Database IOS utilizing international instructions Nexus and NX-OS 25 29 29 31 33 35 five. Trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 How Trunks paintings ISL 802. 1Q Which Protocol to exploit Trunk Negotiation 38 39 39 forty forty v Configuring Trunks IOS CatOS Nexus and NX-OS forty two forty two forty four forty six 6. VLAN Trunking Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . forty nine VTP Pruning hazards of VTP Configuring VTP VTP domain names VTP Mode VTP Password VTP Pruning fifty two fifty four fifty five fifty five fifty six fifty seven fifty eight 7. hyperlink Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . sixty three EtherChannel EtherChannel Load Balancing Configuring and handling EtherChannel Cross-Stack EtherChannel Multichassis EtherChannel (MEC) digital Port Channel preliminary vPC Configuration including a vPC sixty three sixty four sixty eight seventy five seventy five seventy five seventy six seventy seven eight. Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . eighty one Broadcast Storms MAC deal with desk Instability combating Loops with Spanning Tree How Spanning Tree Works coping with Spanning Tree extra Spanning Tree positive aspects PortFast BPDU defend UplinkFast BackboneFast universal Spanning Tree difficulties Duplex Mismatch Unidirectional hyperlinks Bridge insurance Designing to avoid Spanning Tree difficulties Use Routing rather than Switching for Redundancy continuously Configure the basis Bridge vi | desk of Contents eighty two 86 88 88 ninety one ninety five ninety five ninety six ninety seven ninety nine a hundred a hundred one hundred and one 103 104 104 104 9. Routing and Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . one hundred and five Routing Tables path forms The IP Routing desk Host path Subnet precis (Group of Subnets) significant community Supernet (Group of significant Networks) Default path digital Routing and Forwarding 106 109 109 111 112 112 113 114 114 a hundred and fifteen 10. Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 conversation among Routers Metrics and Protocol varieties Administrative Distance particular Routing Protocols RIP RIPv2 EIGRP OSPF BGP one hundred twenty 123 a hundred twenty five 127 129 132 133 137 143 eleven. Redistribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Redistributing into RIP Redistributing into EIGRP Redistributing into OSPF Mutual Redistribution Redistribution Loops proscribing Redistribution path Tags A Real-World instance 149 152 154 156 157 159 159 163 12. Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 GRE Tunnels GRE Tunnels and Routing Protocols GRE and entry Lists 168 173 178 thirteen. First Hop Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 HSRP HSRP Interface monitoring whilst HSRP Isn’t adequate 181 184 186 desk of Contents | vii Nexus and HSRP GLBP item monitoring in GLBP 189 189 194 14. path Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 development a direction Map coverage Routing instance tracking coverage Routing 198 2 hundred 203 15. Switching Algorithms in Cisco Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 procedure Switching Interrupt Context Switching quickly Switching optimal Switching CEF Configuring and handling Switching Paths strategy Switching speedy Switching CEF 209 210 211 213 213 216 216 218 219 sixteen.

Download PDF sample

Rated 4.36 of 5 – based on 42 votes