Cargando…
A practical guide to advanced networking /
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro |
Lenguaje: | English |
Publicado: |
Indianapolis, Ind. :
Pearson,
2013, 2013.
|
Edición: | Third edition. |
Materias: |
Tabla de Contenidos:
- Machine generated contents note: ch. 1 Network Infrastructure Design
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 1-1. Physical Network Design
- Core
- Distribution Layer
- Access Layer
- Data Flow
- Selecting the Media
- 1-2. IP Subnet Design
- IP Address Range
- Determining the Number of Subnetworks Needed for the Network
- Determining the Size or the Number of IP Host Addresses Needed for the Network
- IP Assignment
- 1-3. VLAN Network
- Virtual LAN (VLAN)
- VLAN Configuration
- VLAN Tagging
- 802.1Q Configuration
- Networking Challenge: Static VLAN Configuration
- Configuring the HP Procurve Switch
- 1-4. Routed Network
- Router
- Gateway Address
- Network Segments
- Multilayer Switch
- Layer 3 Routed Networks
- Routed Port Configuration
- InterVLAN Routing Configuration
- Serial and ATM Port Configuration
- Summary
- Questions and Problems
- ch. 2 Advanced Router Configuration I
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 2-1. Configuring Static Routing
- Gateway of Last Resort
- Configuring Static Routes
- Load Balancing and Redundancy
- Networking Challenge
- Static Routes
- 2-2. Dynamic Routing Protocols
- Distance Vector Protocols
- Link State Protocols
- 2-3. Configuring RIPv2
- Configuring Routes with RIP
- Configuring Routes with RIP Version 2
- Networking Challenge
- RIP
- 2-4. TFTP
- Trivial File Transfer Protocol
- Configuring TFTP
- Summary
- Questions and Problems
- ch. 3 Advanced Router Configuration II
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 3-1. Configuring Link State Protocols
- OSPF
- Link State Protocols
- Configuring Routes with OSPF
- Load Balancing and Redundancy with OSPF
- Networking Challenge
- OSPF
- 3-2. Configuring Link State Protocols
- IS-IS
- Configuring Routes with IS-IS
- Load Balancing and Redundancy with IS-IS
- Networking Challenge: IS-IS
- 3-3. Configuring Hybrid Routing Protocols
- EIGRP
- Configuring Routes with EIGRP
- Load Balancing and Redundancy
- Networking Challenge: EIGRP
- 3-4. Advanced Routing Redistribution
- Route Redistribution into RIP
- Route Redistribution into OSPF
- Route Redistribution into EIGRP
- Route Redistribution into IS-IS
- 3-5. Analyzing OSPF "Hello" Packets
- Summary
- Questions and Problems
- ch. 4 Configuring Juniper Routers
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 4-1. Operational Mode
- 4-2. Router Configuration Mode
- Displaying the Router Interfaces
- Hostname Configuration
- Assigning an IP Address to an Interface
- 4-3. Configuring Routes On Juniper Routers
- Configure STATIC Routes on Juniper Routers
- Configure RIP on Juniper Routers
- Configure OSPF on Juniper Routers
- Configure IS-IS on Juniper Routers
- 4-4. Configuring Route Redistribution On Juniper Routers
- Summary
- Questions and Problems
- ch. 5 Configuring And Managing The Netwoi Infrastructure
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 5-1. Domain Name And IP Assignment
- 5-2. Ip Management With DHCP
- DHCP Data Packets
- DHCP Deployment
- 5-3. Scaling The Network With Nat And Pat
- Configuring NAT
- 5-4. Domain Name Service (DNS)
- DNS Tree Hierarchy
- DNS Resource Records
- Summary
- Questions and Problems
- ch. 6 Analyzing Network Data Traffic
- Chapter Outline
- Objectives
- Key Terms
- INTRODUCTION
- 6-1. Protocol Analysis/Forensics
- Basic TCP/UDP Forensics
- ARP and ICMP
- 6-2. Wireshark Protocol Analyzer
- Using Wireshark to Capture Packets
- 6-3. Analyzing Network Data Traffic
- Configuring SNMP
- NetFLow
- 6-4. Filtering
- FTP Filtering
- Right-Click Filtering Logic Rules
- Filtering DHCP
- Summary
- Questions and Problems
- ch. 7 Network Security
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 7-1. Denial Of Service
- Distributed Denial of Service Attacks (DDoS)
- 7-2. Firewalls And Access Lists
- Network Attack Prevention
- Access Lists
- 7-3. Router Security
- Router Access
- Router Services
- Router Logging and Access-List
- 7-4. Switch Security
- Switch Port Security
- Switch Special Features
- 7-5. Wireless Security
- 7-6. VPN Security
- VPN Tunneling Protocols
- Configuring a VPN Virtual Interface (Router to Router)
- Troubleshooting the VPN Tunnel Link
- Summary
- Questions and Problems
- ch. 8 IPv6
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 8-1.Comparison of IPv6 and IPv4
- 8-2. IPV6 ADDRESSING
- 8-3. IPv6 Network Settings
- 8-4. Configuring a Router for IPv6
- 8-5. IPv6 Routing
- IPv6: Static
- IPv6: RIP
- IPv6: OSPF
- IPv6: EIGRP
- IPv6: IS-IS
- 8-6. Troubleshooting IPv6 Connection
- Summary
- Questions and Problems
- ch. 9 Linux Networking
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 9-1. Logging On To Linux
- Adding a User Account
- 9-2. Linux File Structure And File Commands
- Listing Files
- Displaying File Contents
- Directory Operations
- File Operations
- Permissions and Ownership
- 9-3. Linux Administration Commands
- The man (manual) Command
- The ps (processes) Command
- Thesu (substitute user) Command
- The mount Command
- The shutdown Command
- Linux Tips
- 9-4. Adding Applications To Linux
- 9-5. Linux Networking
- Installing SSH
- The FTP Client
- DNS Service on Linux
- Changing the Hostname
- 9-6. Troubleshooting System And Network Problems With Linux
- Troubleshooting Boot Processes
- Listing Users on the System
- Network Security
- Enabling and Disabling Boot Services
- 9-7. Managing The Linux System
- Summary
- Questions and Problems
- ch. 10 Internet Routing
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 10-1. Internet Routing
- BGP
- Configuring a WAN Connection
- Configuring an Internet Connection
- 10-2. Configuring BGP
- Configuring BGP
- Networking Challenge: BGP
- 10-3. BGP Best Path Selection
- 10-4. IPv6 Over The Internet
- 10-5. Configure BGP On Juniper Routers
- Summary
- Questions and Problems
- ch. 11 Voice over IP
- Chapter Outline
- Objectives
- Key Terms
- Introduction
- 11-1. The Basics Of Voice Over IP
- 11-2. Voice Over IP Networks
- Replacing an Existing PBX Tie Line
- Upgrading Existing PBXs to Support IP Telephony
- Switching to a Complete IP Telephony Solution
- 11-3. Quality Of Service
- Jitter
- Network Latency
- Queuing
- QOS Configuration Example
- 11-4. Analyzing VoIP Data Packets
- Analyzing VoIP Telephone Call Data Packets
- 11-5. VoIP SECURITY
- Summary
- Questions and Problems.