Cisco IOS Cookbook, 2/e (Paperback)
暫譯: Cisco IOS 食譜, 第2版 (平裝本)
Kevin Dooley, Ian Brown
- 出版商: O'Reilly
- 出版日期: 2007-01-30
- 售價: $2,430
- 貴賓價: 9.5 折 $2,309
- 語言: 英文
- 頁數: 1192
- 裝訂: Paperback
- ISBN: 0596527225
- ISBN-13: 9780596527228
-
相關分類:
Cisco、Apple Developer
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$880$695 -
$650$618 -
$550$435 -
$980$774 -
$990$891 -
$1,200$948 -
$600$480 -
$1,200$1,020 -
$600$588 -
$490$417 -
$480$408 -
$399CompTIA Security+Study Guide: Exam SY0-201, 4/e (Paperback)
-
$780$616 -
$420$336 -
$750$638 -
$570$542 -
$820$648 -
$560$476 -
$250$198 -
$480$470 -
$580$458 -
$850$723 -
$580$458 -
$800$632 -
$600$468
商品描述
Description
Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly.That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right.
Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:
- Configuring interfaces of many types, from serial to ATM and Frame Relay
- Configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)
- Configuring authentication
- Configuring other services, including DHCP and NTP
- Setting up backup links, and using HSRP to configure backup routers
- Managing the router, including SNMP and other solutions
- Using access lists to control the traffic through the router
If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.
Table of Contents
Preface
1. Router Configuration and File Management
1.1 Configuring the Router via TFTP
1.2 Saving Router Configuration to Server
1.3 Booting the Router Using a Remote Configuration File
1.4 Storing Configuration Files Larger Than NVRAM
1.5 Clearing the Startup Configuration
1.6 Loading a New IOS Image
1.7 Booting a Different IOS Image
1.8 Booting over the Network
1.9 Copying an IOS Image to a Server
1.10 Copying an IOS Image Through the Console
1.11 Deleting Files from Flash
1.12 Partitioning Flash
1.13 Using the Router as a TFTP Server
1.14 Using FTP from the Router
1.15 Generating Large Numbers of Router Configurations
1.16 Changing the Configurations of Many Routers at Once
1.17 Extracting Hardware Inventory Information
1.18 Backing Up Router Configurations
1.19 Warm Reload
1.20 Warm Upgrade
1.21 Configuration Archiving
1.22 Locking Configuration Access
2. Router Management
2.1 Creating Command Aliases
2.2 Managing the Router's ARP Cache
2.3 Tuning Router Buffers
2.4 Auto Tuning Buffers
2.5 Using the Cisco Discovery Protocol
2.6 Disabling the Cisco Discovery Protocol
2.7 Using the Small Servers
2.8 Enabling HTTP Access to a Router
2.9 Enabling Secure HTTP (HTTPS) Access to a Router
2.10 Using Static Hostname Tables
2.11 Enabling Domain Name Services
2.12 Disabling Domain Name Lookups
2.13 Specifying a Router Reload Time
2.14 Scheduling of Router Commands
2.15 Displaying Historical CPU Values
2.16 Creating Exception Dump Files
2.17 Generating a Report of Interface Information
2.18 Generating a Report of Routing Table Information
2.19 Generating a Report of ARP Table Information
2.20 Generating a Server Host Table File
3. User Access and Privilege Levels
3.1 Setting Up User IDs
3.2 Encrypting Passwords
3.3 Using Better Password-Encryption Techniques
3.4 Removing Passwords from a Router Configuration File
3.5 Deciphering Cisco's Weak Password Encryption
3.6 Displaying Active Users
3.7 Sending Messages to Other Users
3.8 Changing the Number of VTYs
3.9 Changing VTY Timeouts
3.10 Restricting VTY Access by Protocol
3.11 Enabling Absolute Timeouts on VTY Lines
3.12 Implementing Banners
3.13 Disabling Banners on a Port
3.14 Disabling Router Lines
3.15 Reserving a VTY Port for Administrative Access
3.16 Restricting Inbound Telnet Access
3.17 Logging Telnet Access
3.18 Setting the Source Address for Telnet
3.19 Automating the Login Sequence
3.20 Using SSH for Secure Access
3.21 Changing Privilege Level of IOS Commands
3.22 Defining Per User Privileges
3.23 Defining Per Port Privileges
4. TACACS+
4.1 Authenticating Login IDs from a Central System
4.2 Restricting Command Access
4.3 Losing Access to the TACACS+ Server
4.4 Disabling TACACS+ Authentication on a Particular Line
4.5 Capturing User Keystrokes
4.6 Logging System Events
4.7 Setting the IP Source Address for TACACS+ Messages
4.8 Sample Server Configuration Files
5. IP Routing
5.1 Finding an IP Route
5.2 Finding Types of IP Routes
5.3 Converting Different Mask Formats
5.4 Using Static Routing
5.5 Floating Static Routes
5.6 Using Policy-Based Routing to Route Based on Source Address
5.7 Using Policy-Based Routing to Route Based on Application Type
5.8 Examining Policy-Based Routing
5.9 Changing Administrative Distances
5.10 Routing Over Multiple Paths with Equal Costs
5.11 Static Routes That Track Interfaces or Other Routes
5.12 Keeping Statistics on Routing Table Changes
6. RIP
6.1 Configuring RIP Version 1
6.2 Filtering Routes with RIP
6.3 Redistributing Static Routes into RIP
6.4 Redistributing Routes Using Route Maps
6.5 Creating a Default Route in RIP
6.6 Disabling RIP on an Interface
6.7 Default Passive Interface
6.8 Unicast Updates for RIP
6.9 Applying Offsets to Routes
6.10 Adjusting Timers
6.11 Configuring Interpacket Delay
6.12 Enabling Nonperiodic Updates
6.13 Increasing the RIP Input Queue
6.14 Configuring RIP Version 2
6.15 Enabling RIP Authentication
6.16 RIP Route Summarization
6.17 Route Tagging
7. EIGRP
7.1 Configuring EIGRP
7.2 Filtering Routes with EIGRP
7.3 Redistributing Routes into EIGRP
7.4 Redistributing Routes into EIGRP Using Route Maps
7.5 Disabling EIGRP on an Interface
7.6 Adjusting EIGRP Metrics
7.7 Adjusting Timers
7.8 Enabling EIGRP Authentication
7.9 EIGRP Route Summarization
7.10 Logging EIGRP Neighbor State Changes
7.11 Limiting EIGRP's Bandwidth Utilization
7.12 EIGRP Stub Routing
7.13 Route Tagging
7.14 Viewing EIGRP Status
8. OSPF
8.1 Configuring OSPF
8.2 Filtering Routes in OSPF
8.3 Adjusting OSPF Costs
8.4 Creating a Default Route in OSPF
8.5 Redistributing Static Routes into OSPF
8.6 Redistributing External Routes into OSPF
8.7 Manipulating DR Selection
8.8 Setting the OSPF RID
8.9 Enabling OSPF Authentication
8.10 Selecting the Appropriate Area Types
8.11 Using OSPF on Dial Interfaces
8.12 Summarizing Routes in OSPF
8.13 Disabling OSPF on Certain Interfaces
8.14 Changing the Network Type on an Interface
8.15 OSPF Route Tagging
8.16 Logging OSPF Adjacency Changes
8.17 Adjusting OSPF Timers
8.18 Reducing OSPF Traffic in Stable Networks
8.19 OSPF Virtual Links
8.20 Viewing OSPF Status with Domain Names
8.21 Debugging OSPF
9. BGP
9.1 Configuring BGP
9.2 Using eBGP Multihop
9.3 Adjusting the Next-Hop Attribute
9.4 Connecting to Two ISPs
9.5 Connecting to Two ISPs with Redundant Routers
9.6 Restricting Networks Advertised to a BGP Peer
9.7 Adjusting Local Preference Values
9.8 Load-Balancing
9.9 Removing Private ASNs from the AS Path
9.10 Filtering BGP Routes Based on AS Paths
9.11 Reducing the Size of the Received Routing Table
9.12 Summarizing Outbound Routing Information
9.13 Prepending ASNs to the AS Path
9.14 Redistributing Routes with BGP
9.15 Using Peer Groups
9.16 Authenticating BGP Peers
9.17 Using BGP Communities
9.18 Using BGP Route Reflectors
9.19 Putting It All Together
10. Frame Relay
10.1 Setting Up Frame Relay with Point-to-Point Subinterfaces
10.2 Adjusting LMI Options
10.3 Setting Up Frame Relay with Map Statements
10.4 Using Multipoint Subinterfaces
10.5 Configuring Frame Relay SVCs
10.6 Simulating a Frame Relay Cloud
10.7 Compressing Frame Relay Data on a Subinterface
10.8 Compressing Frame Relay Data with Maps
10.9 PPP over Frame Relay
10.10 Viewing Frame Relay Status Information
11. Handling Queuing and Congestion
11.1 Fast Switching and CEF
11.2 Setting the DSCP or TOS Field
11.3 Using Priority Queuing
11.4 Using Custom Queuing
11.5 Using Custom Queues with Priority Queues
11.6 Using Weighted Fair Queuing
11.7 Using Class-Based Weighted Fair Queuing
11.8 Using NBAR Classification
11.9 Controlling Congestion with WRED
11.10 Using RSVP
11.11 Manual RSVP Reservations
11.12 Aggregating RSVP Reservations
11.13 Using Generic Traffic Shaping
11.14 Using Frame-Relay Traffic Shaping
11.15 Using Committed Access Rate
11.16 Implementing Standards-Based Per-Hop Behavior
11.17 AutoQoS
11.18 Viewing Queue Parameters
12. Tunnels and VPNs
12.1 Creating a Tunnel
12.2 Tunneling Foreign Protocols in IP
12.3 Tunneling with Dynamic Routing Protocols
12.4 Viewing Tunnel Status
12.5 Creating an Encrypted Router-to-Router VPN in a GRE Tunnel
12.6 Creating an Encrypted VPN Between the LAN Interfaces of Two Routers
12.7 Generating RSA Keys
12.8 Creating a Router-to-Router VPN with RSA Keys
12.9 Creating a VPN Between a Workstation and a Router
12.10 Creating an SSL VPN
12.11 Checking IPSec Protocol Status
13. Dial Backup
13.1 Automating Dial Backup
13.2 Using Dialer Interfaces
13.3 Using an Async Modem on the AUX Port
13.4 Using Backup Interfaces
13.5 Using Dialer Watch
13.6 Using Virtual Templates
13.7 Ensuring Proper Disconnection
13.8 View Dial Backup Status
13.9 Debugging Dial Backup
14. NTP and Time
14.1 Time-Stamping Router Logs
14.2 Setting the Time
14.3 Setting the Time Zone
14.4 Adjusting for Daylight Saving Time
14.5 Synchronizing the Time on All Routers (NTP)
14.6 Configuring NTP Redundancy
14.7 Setting the Router As the NTP Master for the Network
14.8 Changing NTP Synchronization Periods
14.9 Using NTP to Send Periodic Broadcast Time Updates
14.10 Using NTP to Send Periodic Multicast Time Updates
14.11 Enabling and Disabling NTP Per Interface
14.12 NTP Authentication
14.13 Limiting the Number of Peers
14.14 Restricting Peers
14.15 Setting the Clock Period
14.16 Checking the NTP Status
14.17 Debugging NTP
14.18 NTP Logging
14.19 Extended Daylight Saving Time
14.20 NTP Server Configuration
15. DLSw
15.1 Simple Bridging
15.2 Configuring DLSw
15.3 Using DLSw to Bridge Between Ethernet and Token Ring
15.4 Converting Ethernet and Token Ring MAC Addresses
15.5 Configuring SDLC
15.6 Configuring SDLC for Multidrop Connections
15.7 Using STUN
15.8 Using BSTUN
15.9 Controlling DLSw Packet Fragmentation
15.10 Tagging DLSw Packets for QoS
15.11 Supporting SNA Priorities
15.12 DLSw+ Redundancy and Fault Tolerance
15.13 Viewing DLSw Status Information
15.14 Viewing SDLC Status Information
15.15 Debugging DSLw
16. Router Interfaces and Media
16.1 Viewing Interface Status
16.2 Configuring Serial Interfaces
16.3 Using an Internal T1 CSU/DSU
16.4 Using an Internal ISDN PRI Module
16.5 Using an Internal 56 Kbps CSU/DSU
16.6 Configuring an Async Serial Interface
16.7 Configuring ATM Subinterfaces
16.8 Setting Payload Scrambling on an ATM Circuit
16.9 Classical IP Over ATM
16.10 Configuring Ethernet Interface Features
16.11 Configuring Token Ring Interface Features
16.12 Connecting VLAN Trunks with ISL
16.13 Connecting VLAN Trunks with 802.1Q
16.14 LPD Printer Support
17. Simple Network Management Protocol
17.1 Configuring SNMP
17.2 Extracting Router Information via SNMP Tools
17.3 Recording Important Router Information for SNMP Access
17.4 Using SNMP to Extract Inventory Information from a List of Routers
17.5 Using Access Lists to Protect SNMP Access
17.6 Logging Unauthorized SNMP Attempts
17.7 Limiting MIB Access
17.8 Using SNMP to Modify a Router's Running Configuration
17.9 Using SNMP to Copy a New IOS Image
17.10 Using SNMP to Perform Mass Configuration Changes
17.11 Preventing Unauthorized Configuration Modifications
17.12 Making Interface Table Numbers Permanent
17.13 Enabling SNMP Traps and Informs
17.14 Sending Syslog Messages As SNMP Traps and Informs
17.15 Setting SNMP Packet Size
17.16 Setting SNMP Queue Size
17.17 Setting SNMP Timeout Values
17.18 Disabling Link Up/Down Traps per Interface
17.19 Setting the IP Source Address for SNMP Traps
17.20 Using RMON to Send Traps
17.21 Enabling SNMPv3
17.22 Strong SNMPv3 Encryption
17.23 Using SAA
18. Logging
18.1 Enabling Local Router Logging
18.2 Setting the Log Size
18.3 Clearing the Router's Log
18.4 Sending Log Messages to Your Screen
18.5 Using a Remote Log Server
18.6 Enabling Syslog on a Unix Server
18.7 Changing the Default Log Facility
18.8 Restricting What Log Messages Are Sent to the Server
18.9 Setting the IP Source Address for Syslog Messages
18.10 Logging Router Syslog Messages in Different Files
18.11 Maintaining Syslog Files on the Server
18.12 Testing the Syslog Sever Configuration
18.13 Preventing the Most Common Messages from Being Logged
18.14 Rate-Limiting Syslog Traffic
18.15 Enabling Error Log Counting
18.16 XML-Formatted Log Messages
18.17 Modifying Log Messages
19. Access-Lists
19.1 Filtering by Source or Destination IP Address
19.2 Adding a Comment to an ACL
19.3 Filtering by Application
19.4 Filtering Based on TCP Header Flags
19.5 Restricting TCP Session Direction
19.6 Filtering Multiport Applications
19.7 Filtering Based on DSCP and TOS
19.8 Logging When an Access-List Is Used
19.9 Logging TCP Sessions
19.10 Analyzing ACL Log Entries
19.11 Using Named and Reflexive Access-Lists
19.12 Dealing with Passive Mode FTP
19.13 Using Time-Based Access-Lists
19.14 Filtering Based on Noncontiguous Ports
19.15 Advanced Access-List Editing
19.16 Filtering IPv6
20. DHCP
20.1 Using IP Helper Addresses for DHCP
20.2 Limiting the Impact of IP Helper Addresses
20.3 Using DHCP to Dynamically Configure Router IP Addresses
20.4 Dynamically Allocating Client IP Addresses via DHCP
20.5 Defining DHCP Configuration Options
20.6 Defining DHCP Lease Periods
20.7 Allocating Static IP Addresses with DHCP
20.8 Configuring a DHCP Database Client
20.9 Configuring Multiple DHCP Servers per Subnet
20.10 DHCP Static Mapping
20.11 DHCP-Secured IP Address Assignment
20.12 Showing DHCP Status
20.13 Debugging DHCP
21. NAT
21.1 Configuring Basic NAT Functionality
21.2 Allocating External Addresses Dynamically
21.3 Allocating External Addresses Statically
21.4 Translating Some Addresses Statically and Others Dynamically
21.5 Using Route Maps to Refine Static Translation Rules
21.6 Translating in Both Directions Simultaneously
21.7 Rewriting the Network Prefix
21.8 Using NAT for Server Load Distribution
21.9 Stateful NAT Failover
21.10 Adjusting NAT Timers
21.11 Changing TCP Ports for FTP
21.12 Checking NAT Status
21.13 Debugging NAT
22. First Hop Redundancy Protocols
22.1 Configuring Basic HSRP Functionality
22.2 Using HSRP Preempt
22.3 Making HSRP React to Problems on Other Interfaces
22.4 Load-Balancing with HSRP
22.5 Redirecting ICMP with HSRP
22.6 Manipulating HSRP Timers
22.7 Using HSRP on Token Ring
22.8 HSRP SNMP Support
22.9 Increasing HSRP Security
22.10 Showing HSRP State Information
22.11 Debugging HSRP
22.12 HSRP Version 2
22.13 VRRP
22.14 Gateway Load-Balancing Protocol
23. IP Multicast
23.1 Configuring Basic Multicast Functionality with PIM-DM
23.2 Routing Multicast Traffic with PIM-SM and BSR
23.3 Routing Multicast Traffic with PIM-SM and Auto-RP
23.4 Filtering PIM Neighbors
23.5 Configuring Routing for a Low-Frequency Multicast Application
23.6 Multicast over Frame Relay or ATM WANs
23.7 Configuring CGMP
23.8 Using IGMP Version 3
23.9 Static Multicast Routes and Group Memberships
23.10 Routing Multicast Traffic with MOSPF
23.11 Routing Multicast Traffic with DVMRP
23.12 DVMRP Tunnels
23.13 Configuring Bidirectional PIM
23.14 Controlling Multicast Scope with TTL
23.15 Controlling Multicast Scope with Administratively Scoped Addressing
23.16 Exchanging Multicast Routing Information with MBGP
23.17 Using MSDP to Discover External Sources
23.18 Configuring Anycast RP
23.19 Converting Broadcasts to Multicasts
23.20 Showing Multicast Status
23.21 Debugging Multicast Routing
24. IP Mobility
24.1 Local Area Mobility
24.2 Home Agent Configuration
24.3 Foreign Agent Configuration
24.4 Making a Router a Mobile Node
24.5 Reverse-Tunnel Forwarding
24.6 Using HSRP for Home Agent Redundancy
25. IPv6
25.1 Automatically Generating IPv6 Addresses for an Interface
25.2 Manually Configuring IPv6 Addresses on an Interface
25.3 Configuring DHCP for IPv6
25.4 Dynamic Routing with RIP
25.5 Modifying the Default RIP Parameters
25.6 IPv6 Route Filtering and Metric Manipulation in RIP
25.7 Using OSPF for IPv6
25.8 IPv6 Route Filtering and Metric Manipulation in OSPF
25.9 Route Redistribution
25.10 Dynamic Routing with MBGP
25.11 Tunneling IPv6 Through an Existing IPv4 Network
25.12 Translating Between IPv6 and IPv4
26. MPLS
26.1 Configuring a Basic MPLS P Router
26.2 Configuring a Basic MPLS PE Router
26.3 Configuring Basic MPLS CE Routers
26.4 Configuring MPLS over ATM
26.5 PE-CE Communication via RIP
26.6 PE-CE Communication via OSPF
26.7 PE-CE Communication via EIGRP
26.8 PE-CE Communication via BGP
26.9 QoS over MPLS
26.10 MPLS Traffic Engineering with Autoroute
26.11 Multicast Over MPLS
26.12 Your Service Provider Doesn't Do What You Want
27. Security
27.1 Using AutoSecure
27.2 Using Context-Based Access-Lists
27.3 Transparent Cisco IOS Firewall
27.4 Stopping Denial of Service Attacks
27.5 Inspecting Applications on Different Port Numbers
27.6 Intrusion Detection and Prevention
27.7 Login Password Retry Lockout
27.8 Authentication Proxy
A. External Software Packages
B. IP Precedence, TOS, and DSCP Classifications
Index
商品描述(中文翻譯)
**描述**
從未有任何東西像 Cisco 的網際網路作業系統 (IOS) 一樣,迫切需要一本食譜。IOS 功能強大且靈活,但同時也令人困惑且令人生畏。大多數任務可以用幾種不同的方式完成。在你試圖快速解決問題時,你不想浪費寶貴的時間去弄清楚哪種方式是最好的。
這就是這本食譜的目的。幸運的是,大多數路由器配置任務可以分解為幾個或多或少獨立的步驟:你配置一個介面,你配置一個路由協定,你設置備用鏈路,你實施封包過濾器和其他存取控制機制。你真正需要的是一套食譜,告訴你如何執行最常見的任務,這樣你就可以快速為你的站點制定出良好的配置。而且你需要知道這些解決方案是有效的:你不想在凌晨兩點實施備用鏈路,因為你的主鏈路故障,而你在安裝路由器時設置的備用鏈路並不完全正確。
經過徹底修訂和擴充的《Cisco IOS Cookbook》,第二版,新增了有關 MPLS、安全性、IPv6 和 IP 移動性的章節,並提供了針對最常見配置問題的解決方案,包括:
- 配置多種類型的介面,從串行到 ATM 和 Frame Relay
- 配置所有常見的 IP 路由協定 (RIP、EIGRP、OSPF 和 BGP)
- 配置身份驗證
- 配置其他服務,包括 DHCP 和 NTP
- 設置備用鏈路,並使用 HSRP 配置備用路由器
- 管理路由器,包括 SNMP 和其他解決方案
- 使用存取列表控制通過路由器的流量
如果你使用 Cisco 路由器,你需要這樣一本書來幫助你快速有效地解決問題。即使你已經有經驗,這些解決方案和詳細的解釋也會給你新的想法和對路由器配置的見解。如果你沒有經驗——如果你剛剛被賦予管理使用 Cisco 路由器的網路的責任——這本書可能會成為你的救命稻草。
**目錄**
**前言**
**1. 路由器配置與檔案管理**
1.1 通過 TFTP 配置路由器
1.2 將路由器配置保存到伺服器
1.3 使用遠端配置檔啟動路由器
1.4 儲存大於 NVRAM 的配置檔
1.5 清除啟動配置
1.6 載入新的 IOS 映像
1.7 啟動不同的 IOS 映像
1.8 通過網路啟動
1.9 將 IOS 映像複製到伺服器
1.10 通過控制台複製 IOS 映像
1.11 從 Flash 刪除檔案
1.12 分割 Flash
1.13 將路由器用作 TFTP 伺服器
1.14 從路由器使用 FTP
1.15 生成大量路由器配置
1.16 同時更改多個路由器的配置
1.17 提取硬體清單資訊
1.18 備份路由器配置
1.19 溫啟動
1.20 溫升級
1.21 配置檔案歸檔
1.22 鎖定配置存取
**2. 路由器管理**
2.1 創建命令別名
2.2 管理路由器的 ARP 快取
2.3 調整路由器緩衝區
2.4 自動調整緩衝區
2.5 使用 Cisco 發現協定
2.6 禁用 Cisco 發現協定
2.7 使用小型伺服器
2.8 啟用對路由器的 HTTP 存取
2.9 啟用對路由器的安全 HTTP (HTTPS) 存取
2.10 使用靜態主機名稱表
2.11 啟用域名服務
2.12 禁用域名查詢
2.13 指定路由器重啟時間
2.14 排程路由器命令
2.15 顯示歷史 CPU 值
2.16 創建例外轉儲檔案
2.17 生成介面資訊報告
2.18 生成路由表資訊報告
2.19 生成 ARP 表資訊報告
2.20 生成伺服器主機表檔案
**3. 使用者存取與特權等級**
3.1 設定使用者 ID
3.2 加密密碼
3.3 使用更好的密碼加密技術
3.4 從路由器配置檔中移除密碼
3.5 解密 Cisco 的弱密碼加密
3.6 顯示活動使用者
3.7 向其他使用者發送消息
3.8 更改 VTY 數量
3.9 更改 VTY 超時
3.10 按協定限制 VTY 存取
3.11 在 VTY 線上啟用絕對超時
3.12 實施橫幅
3.13 在端口上禁用橫幅
3.14 禁用路由器線
3.15 保留 VTY 端口以供管理存取
3.16 限制入站 Telnet 存取
3.17 記錄 Telnet 存取
3.18 設定 Telnet 的來源地址
3.19 自動化登錄序列
3.20 使用 SSH 進行安全存取
3.21 更改 IOS 命令的特權等級
3.22 定義每位使用者的特權
3.23 定義每個端口的特權
**4. TACACS+**
4.1 從中央系統驗證登錄 ID
4.2 限制命令存取
4.3 失去對 TACACS+ 伺服器的存取
4.4 在特定線上禁用 TACACS+ 驗證
4.5 捕獲使用者按鍵
4.6 記錄系統事件
4.7 設定 TACACS+ 訊息的 IP 來源地址
4.8 範例伺服器配置檔
**5. IP 路由**
5.1 查找 IP 路由
5.2 查找 IP 路由類型
5.3 轉換不同的遮罩格式
5.4 使用靜態路由
5.5 浮動靜態路由
5.6 使用基於政策的路由根據來源地址路由
5.7 使用基於政策的路由根據應用類型路由
5.8 檢查基於政策的路由
5.9 更改管理距離
5.10 在多條路徑上以相等成本路由
5.11 跟踪介面或其他路由的靜態路由
5.12 保持路由表變更的統計數據
**6. RIP**
6.1 配置 RIP 版本 1
6.2 使用 RIP 過濾路由
6.3 將靜態路由重新分配到 RIP
6.4 使用路由映射重新分配路由
6.5 在 RIP 中創建默認路由
6.6 在介面上禁用 RIP
6.7 默認被動介面
6.8 RIP 的單播更新
6.9 對路由應用偏移量
6.10 調整計時器
6.11 配置封包間延遲
6.12 啟用非定期更新
6.13 增加 RIP 輸入佇列
6.14 配置 RIP 版本 2
6.15 啟用 RIP 驗證
6.16 RIP 路由摘要
6.17 路由標記
**7. EIGRP**
7.1 配置 EIGRP
7.2 使用 EIGRP 過濾路由
7.3 將路由重新分配到 EIGRP
7.4 使用路由映射將路由重新分配到 EIGRP
7.5 在介面上禁用 EIGRP
7.6 調整 EIGRP 指標
7.7 調整計時器
7.8 啟用 EIGRP 驗證
7.9 EIGRP 路由摘要
7.10 記錄 EIGRP 鄰居狀態變更
7.11 限制 EIGRP 的帶寬使用
7.12 EIGRP Stub 路由
7.13 路由標記
7.14 查看 EIGRP 狀態
**8. OSPF**
8.1 配置 OSPF
8.2 在 OSPF 中過濾路由
8.3 調整 OSPF 成本
8.4 在 OSPF 中創建默認路由
8.5 將靜態路由重新分配到 OSPF
8.6 將外部路由重新分配到 OSPF
8.7 操控 DR 選擇
8.8 設定 OSPF RID
8.9 啟用 OSPF 驗證
8.10 選擇適當的區域類型
8.11 在撥號介面上使用 OSPF
8.12 在 OSPF 中摘要路由
8.13 在某些介面上禁用 OSPF
8.14 更改網路類型