Cisco IOS Cookbook, 2/e (Paperback)
暫譯: Cisco IOS 食譜, 第2版 (平裝本)

Kevin Dooley, Ian Brown

  • 出版商: O'Reilly
  • 出版日期: 2007-01-30
  • 售價: $2,430
  • 貴賓價: 9.5$2,309
  • 語言: 英文
  • 頁數: 1192
  • 裝訂: Paperback
  • ISBN: 0596527225
  • ISBN-13: 9780596527228
  • 相關分類: CiscoApple Developer
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

商品描述

Description

Never has something cried out for a cookbook quite as much as Cisco's Internetwork Operating System (IOS). IOS is powerful and flexible, but also confusing and daunting. Most tasks can be accomplished in several different ways. And you don't want to spend precious time figuring out which way is best when you're trying to solve a problem quickly.

That's what this cookbook is for. Fortunately, most router configuration tasks can be broken down into several more or less independent steps: you configure an interface, you configure a routing protocol, you set up backup links, you implement packet filters and other access control mechanisms. What you really need is a set of recipes that show you how to perform the most common tasks, so you can quickly come up with a good configuration for your site. And you need to know that these solutions work: you don't want to find yourself implementing a backup link at 2 A.M. because your main link is down and the backup link you set up when you installed the router wasn't quite right.



Thoroughly revised and expanded, Cisco IOS Cookbook, 2nd Edition, adds sections on MPLS, Security, IPv6, and IP Mobility, and presents solutions to the most common configuration problems, including:

  • Configuring interfaces of many types, from serial to ATM and Frame Relay
  • Configuring all of the common IP routing protocols (RIP, EIGRP, OSPF, and BGP)
  • Configuring authentication
  • Configuring other services, including DHCP and NTP
  • Setting up backup links, and using HSRP to configure backup routers
  • Managing the router, including SNMP and other solutions
  • Using access lists to control the traffic through the router



If you work with Cisco routers, you need a book like this to help you solve problems quickly and effectively. Even if you're experienced, the solutions and extensive explanations will give you new ideas and insights into router configuration. And if you're not experienced--if you've just been given responsibility for managing a network with Cisco routers--this book could be a job-saver.

 

Table of Contents

Preface

1. Router Configuration and File Management

      1.1 Configuring the Router via TFTP

      1.2 Saving Router Configuration to Server

      1.3 Booting the Router Using a Remote Configuration File

      1.4 Storing Configuration Files Larger Than NVRAM

      1.5 Clearing the Startup Configuration

      1.6 Loading a New IOS Image

      1.7 Booting a Different IOS Image

      1.8 Booting over the Network

      1.9 Copying an IOS Image to a Server

      1.10 Copying an IOS Image Through the Console

      1.11 Deleting Files from Flash

      1.12 Partitioning Flash

      1.13 Using the Router as a TFTP Server

      1.14 Using FTP from the Router

      1.15 Generating Large Numbers of Router Configurations

      1.16 Changing the Configurations of Many Routers at Once

      1.17 Extracting Hardware Inventory Information

      1.18 Backing Up Router Configurations

      1.19 Warm Reload

      1.20 Warm Upgrade

      1.21 Configuration Archiving

      1.22 Locking Configuration Access

2. Router Management

      2.1 Creating Command Aliases

      2.2 Managing the Router's ARP Cache

      2.3 Tuning Router Buffers

      2.4 Auto Tuning Buffers

      2.5 Using the Cisco Discovery Protocol

      2.6 Disabling the Cisco Discovery Protocol

      2.7 Using the Small Servers

      2.8 Enabling HTTP Access to a Router

      2.9 Enabling Secure HTTP (HTTPS) Access to a Router

      2.10 Using Static Hostname Tables

      2.11 Enabling Domain Name Services

      2.12 Disabling Domain Name Lookups

      2.13 Specifying a Router Reload Time

      2.14 Scheduling of Router Commands

      2.15 Displaying Historical CPU Values

      2.16 Creating Exception Dump Files

      2.17 Generating a Report of Interface Information

      2.18 Generating a Report of Routing Table Information

      2.19 Generating a Report of ARP Table Information

      2.20 Generating a Server Host Table File

3. User Access and Privilege Levels

      3.1 Setting Up User IDs

      3.2 Encrypting Passwords

      3.3 Using Better Password-Encryption Techniques

      3.4 Removing Passwords from a Router Configuration File

      3.5 Deciphering Cisco's Weak Password Encryption

      3.6 Displaying Active Users

      3.7 Sending Messages to Other Users

      3.8 Changing the Number of VTYs

      3.9 Changing VTY Timeouts

      3.10 Restricting VTY Access by Protocol

      3.11 Enabling Absolute Timeouts on VTY Lines

      3.12 Implementing Banners

      3.13 Disabling Banners on a Port

      3.14 Disabling Router Lines

      3.15 Reserving a VTY Port for Administrative Access

      3.16 Restricting Inbound Telnet Access

      3.17 Logging Telnet Access

      3.18 Setting the Source Address for Telnet

      3.19 Automating the Login Sequence

      3.20 Using SSH for Secure Access

      3.21 Changing Privilege Level of IOS Commands

      3.22  Defining Per User Privileges

      3.23 Defining Per Port Privileges

4. TACACS+

      4.1 Authenticating Login IDs from a Central System

      4.2 Restricting Command Access

      4.3 Losing Access to the TACACS+ Server

      4.4 Disabling TACACS+ Authentication on a Particular Line
      4.5 Capturing User Keystrokes

      4.6 Logging System Events

      4.7 Setting the IP Source Address for TACACS+ Messages

      4.8 Sample Server Configuration Files

5. IP Routing

      5.1 Finding an IP Route

      5.2 Finding Types of IP Routes

      5.3 Converting Different Mask Formats

      5.4 Using Static Routing

      5.5 Floating Static Routes

      5.6 Using Policy-Based Routing to Route Based on Source Address

      5.7 Using Policy-Based Routing to Route Based on Application Type

      5.8 Examining Policy-Based Routing

      5.9 Changing Administrative Distances

      5.10 Routing Over Multiple Paths with Equal Costs

      5.11 Static Routes That Track Interfaces or Other Routes

      5.12 Keeping Statistics on Routing Table Changes

6. RIP

      6.1 Configuring RIP Version 1

      6.2 Filtering Routes with RIP

      6.3 Redistributing Static Routes into RIP

      6.4 Redistributing Routes Using Route Maps

      6.5 Creating a Default Route in RIP

      6.6 Disabling RIP on an Interface

      6.7 Default Passive Interface

      6.8 Unicast Updates for RIP

      6.9 Applying Offsets to Routes

      6.10 Adjusting Timers

      6.11 Configuring Interpacket Delay

      6.12 Enabling Nonperiodic Updates

      6.13 Increasing the RIP Input Queue

      6.14 Configuring RIP Version 2

      6.15 Enabling RIP Authentication

      6.16 RIP Route Summarization

      6.17 Route Tagging

7. EIGRP

      7.1 Configuring EIGRP

      7.2 Filtering Routes with EIGRP

      7.3 Redistributing Routes into EIGRP

      7.4 Redistributing Routes into EIGRP Using Route Maps

      7.5 Disabling EIGRP on an Interface

      7.6 Adjusting EIGRP Metrics

      7.7 Adjusting Timers

      7.8 Enabling EIGRP Authentication

      7.9 EIGRP Route Summarization

      7.10 Logging EIGRP Neighbor State Changes

      7.11 Limiting EIGRP's Bandwidth Utilization

      7.12 EIGRP Stub Routing

      7.13 Route Tagging

      7.14 Viewing EIGRP Status

8. OSPF

      8.1 Configuring OSPF

      8.2 Filtering Routes in OSPF

      8.3 Adjusting OSPF Costs

      8.4 Creating a Default Route in OSPF

      8.5 Redistributing Static Routes into OSPF

      8.6 Redistributing External Routes into OSPF

      8.7 Manipulating DR Selection

      8.8 Setting the OSPF RID

      8.9 Enabling OSPF Authentication

      8.10 Selecting the Appropriate Area Types

      8.11 Using OSPF on Dial Interfaces

      8.12 Summarizing Routes in OSPF

      8.13 Disabling OSPF on Certain Interfaces

      8.14 Changing the Network Type on an Interface

      8.15 OSPF Route Tagging

      8.16 Logging OSPF Adjacency Changes

      8.17 Adjusting OSPF Timers

      8.18 Reducing OSPF Traffic in Stable Networks

      8.19 OSPF Virtual Links

      8.20 Viewing OSPF Status with Domain Names

      8.21 Debugging OSPF

9. BGP

      9.1 Configuring BGP

      9.2 Using eBGP Multihop

      9.3 Adjusting the Next-Hop Attribute

      9.4 Connecting to Two ISPs

      9.5 Connecting to Two ISPs with Redundant Routers

      9.6 Restricting Networks Advertised to a BGP Peer

      9.7 Adjusting Local Preference Values

      9.8 Load-Balancing

      9.9 Removing Private ASNs from the AS Path

      9.10 Filtering BGP Routes Based on AS Paths

      9.11 Reducing the Size of the Received Routing Table

      9.12 Summarizing Outbound Routing Information

      9.13 Prepending ASNs to the AS Path

      9.14 Redistributing Routes with BGP

      9.15 Using Peer Groups

      9.16 Authenticating BGP Peers

      9.17 Using BGP Communities

      9.18 Using BGP Route Reflectors

      9.19 Putting It All Together

10. Frame Relay

      10.1 Setting Up Frame Relay with Point-to-Point Subinterfaces

      10.2 Adjusting LMI Options

      10.3 Setting Up Frame Relay with Map Statements

      10.4 Using Multipoint Subinterfaces

      10.5 Configuring Frame Relay SVCs

      10.6 Simulating a Frame Relay Cloud

      10.7 Compressing Frame Relay Data on a Subinterface

      10.8 Compressing Frame Relay Data with Maps

      10.9 PPP over Frame Relay

      10.10 Viewing Frame Relay Status Information

11. Handling Queuing and Congestion

      11.1 Fast Switching and CEF

      11.2 Setting the DSCP or TOS Field

      11.3 Using Priority Queuing

      11.4 Using Custom Queuing

      11.5 Using Custom Queues with Priority Queues

      11.6 Using Weighted Fair Queuing

      11.7 Using Class-Based Weighted Fair Queuing

      11.8 Using NBAR Classification

      11.9 Controlling Congestion with WRED

      11.10 Using RSVP

      11.11 Manual RSVP Reservations

      11.12 Aggregating RSVP Reservations

      11.13 Using Generic Traffic Shaping

      11.14 Using Frame-Relay Traffic Shaping

      11.15 Using Committed Access Rate

      11.16 Implementing Standards-Based Per-Hop Behavior

      11.17 AutoQoS

      11.18 Viewing Queue Parameters

12. Tunnels and VPNs

      12.1 Creating a Tunnel

      12.2 Tunneling Foreign Protocols in IP

      12.3 Tunneling with Dynamic Routing Protocols

      12.4 Viewing Tunnel Status

      12.5 Creating an Encrypted Router-to-Router VPN in a GRE Tunnel

      12.6 Creating an Encrypted VPN Between the LAN Interfaces   of Two Routers

      12.7 Generating RSA Keys

      12.8 Creating a Router-to-Router VPN with RSA Keys

      12.9 Creating a VPN Between a Workstation and a Router

      12.10 Creating an SSL VPN

      12.11 Checking IPSec Protocol Status

13. Dial Backup

      13.1 Automating Dial Backup

      13.2 Using Dialer Interfaces

      13.3 Using an Async Modem on the AUX Port

      13.4 Using Backup Interfaces

      13.5 Using Dialer Watch

      13.6 Using Virtual Templates

      13.7 Ensuring Proper Disconnection

      13.8 View Dial Backup Status

      13.9 Debugging Dial Backup

14. NTP and Time

      14.1 Time-Stamping Router Logs

      14.2 Setting the Time

      14.3 Setting the Time Zone

      14.4 Adjusting for Daylight Saving Time

      14.5 Synchronizing the Time on All Routers (NTP)

      14.6 Configuring NTP Redundancy

      14.7 Setting the Router As the NTP Master for the Network

      14.8 Changing NTP Synchronization Periods

      14.9 Using NTP to Send Periodic Broadcast Time Updates

      14.10 Using NTP to Send Periodic Multicast Time Updates

      14.11 Enabling and Disabling NTP Per Interface

      14.12 NTP Authentication

      14.13 Limiting the Number of Peers

      14.14 Restricting Peers

      14.15 Setting the Clock Period

      14.16 Checking the NTP Status

      14.17 Debugging NTP

      14.18 NTP Logging

      14.19 Extended Daylight Saving Time

      14.20 NTP Server Configuration

15. DLSw

      15.1 Simple Bridging

      15.2 Configuring DLSw

      15.3 Using DLSw to Bridge Between Ethernet and Token Ring

      15.4 Converting Ethernet and Token Ring MAC Addresses

      15.5 Configuring SDLC

      15.6 Configuring SDLC for Multidrop Connections

      15.7 Using STUN

      15.8 Using BSTUN

      15.9 Controlling DLSw Packet Fragmentation

      15.10 Tagging DLSw Packets for QoS

      15.11 Supporting SNA Priorities

      15.12 DLSw+ Redundancy and Fault Tolerance

      15.13 Viewing DLSw Status Information

      15.14 Viewing SDLC Status Information

      15.15 Debugging DSLw

16. Router Interfaces and Media

      16.1 Viewing Interface Status

      16.2 Configuring Serial Interfaces

      16.3 Using an Internal T1 CSU/DSU

      16.4 Using an Internal ISDN PRI Module

      16.5 Using an Internal 56 Kbps CSU/DSU

      16.6 Configuring an Async Serial Interface

      16.7 Configuring ATM Subinterfaces

      16.8 Setting Payload Scrambling on an ATM Circuit

      16.9 Classical IP Over ATM

      16.10 Configuring Ethernet Interface Features

      16.11 Configuring Token Ring Interface Features

      16.12 Connecting VLAN Trunks with ISL

      16.13 Connecting VLAN Trunks with 802.1Q

      16.14 LPD Printer Support

17. Simple Network Management Protocol

      17.1 Configuring SNMP

      17.2 Extracting Router Information via SNMP Tools

      17.3 Recording Important Router Information for SNMP Access

      17.4 Using SNMP to Extract Inventory Information   from a List of Routers

      17.5 Using Access Lists to Protect SNMP Access

      17.6 Logging Unauthorized SNMP Attempts

      17.7 Limiting MIB Access

      17.8 Using SNMP to Modify a Router's Running Configuration

      17.9 Using SNMP to Copy a New IOS Image

      17.10 Using SNMP to Perform Mass Configuration Changes

      17.11 Preventing Unauthorized Configuration Modifications

      17.12 Making Interface Table Numbers Permanent

      17.13 Enabling SNMP Traps and Informs

      17.14 Sending Syslog Messages As SNMP Traps and Informs

      17.15 Setting SNMP Packet Size

      17.16 Setting SNMP Queue Size

      17.17 Setting SNMP Timeout Values

      17.18 Disabling Link Up/Down Traps per Interface

      17.19 Setting the IP Source Address for SNMP Traps

      17.20 Using RMON to Send Traps

      17.21 Enabling SNMPv3

      17.22 Strong SNMPv3 Encryption

      17.23 Using SAA

18. Logging

      18.1 Enabling Local Router Logging

      18.2 Setting the Log Size

      18.3 Clearing the Router's Log

      18.4 Sending Log Messages to Your Screen

      18.5 Using a Remote Log Server

      18.6 Enabling Syslog on a Unix Server

      18.7 Changing the Default Log Facility

      18.8 Restricting What Log Messages Are Sent to the Server

      18.9 Setting the IP Source Address for Syslog Messages

      18.10 Logging Router Syslog Messages in Different Files

      18.11 Maintaining Syslog Files on the Server

      18.12 Testing the Syslog Sever Configuration

      18.13 Preventing the Most Common Messages from Being Logged

      18.14 Rate-Limiting Syslog Traffic

      18.15 Enabling Error Log Counting

      18.16 XML-Formatted Log Messages

      18.17 Modifying Log Messages

19. Access-Lists

      19.1 Filtering by Source or Destination IP Address

      19.2 Adding a Comment to an ACL

      19.3 Filtering by Application

      19.4 Filtering Based on TCP Header Flags

      19.5 Restricting TCP Session Direction

      19.6 Filtering Multiport Applications

      19.7 Filtering Based on DSCP and TOS

      19.8 Logging When an Access-List Is Used

      19.9 Logging TCP Sessions

      19.10 Analyzing ACL Log Entries

      19.11 Using Named and Reflexive Access-Lists

      19.12 Dealing with Passive Mode FTP

      19.13 Using Time-Based Access-Lists

      19.14 Filtering Based on Noncontiguous Ports

      19.15 Advanced Access-List Editing

      19.16 Filtering IPv6

20. DHCP

      20.1 Using IP Helper Addresses for DHCP

      20.2 Limiting the Impact of IP Helper Addresses

      20.3 Using DHCP to Dynamically Configure Router IP Addresses

      20.4 Dynamically Allocating Client IP Addresses via DHCP

      20.5 Defining DHCP Configuration Options

      20.6 Defining DHCP Lease Periods

      20.7 Allocating Static IP Addresses with DHCP

      20.8 Configuring a DHCP Database Client

      20.9 Configuring Multiple DHCP Servers per Subnet

      20.10 DHCP Static Mapping

      20.11 DHCP-Secured IP Address Assignment

      20.12 Showing DHCP Status

      20.13 Debugging DHCP

21. NAT

      21.1 Configuring Basic NAT Functionality

      21.2 Allocating External Addresses Dynamically

      21.3 Allocating External Addresses Statically

      21.4 Translating Some Addresses Statically and Others Dynamically

      21.5 Using Route Maps to Refine Static Translation Rules

      21.6 Translating in Both Directions Simultaneously

      21.7 Rewriting the Network Prefix

      21.8 Using NAT for Server Load Distribution

      21.9 Stateful NAT Failover

      21.10 Adjusting NAT Timers

      21.11 Changing TCP Ports for FTP

      21.12 Checking NAT Status

      21.13 Debugging NAT

22. First Hop Redundancy Protocols

      22.1 Configuring Basic HSRP Functionality

      22.2 Using HSRP Preempt

      22.3 Making HSRP React to Problems on Other Interfaces

      22.4 Load-Balancing with HSRP

      22.5 Redirecting ICMP with HSRP

      22.6 Manipulating HSRP Timers

      22.7 Using HSRP on Token Ring

      22.8 HSRP SNMP Support

      22.9 Increasing HSRP Security

      22.10 Showing HSRP State Information

      22.11 Debugging HSRP

      22.12 HSRP Version 2

      22.13 VRRP

      22.14 Gateway Load-Balancing Protocol

23. IP Multicast

      23.1 Configuring Basic Multicast Functionality with PIM-DM

      23.2 Routing Multicast Traffic with PIM-SM and BSR

      23.3 Routing Multicast Traffic with PIM-SM and Auto-RP

      23.4 Filtering PIM Neighbors

      23.5 Configuring Routing for a Low-Frequency Multicast Application

      23.6 Multicast over Frame Relay or ATM WANs

      23.7 Configuring CGMP

      23.8 Using IGMP Version 3

      23.9 Static Multicast Routes and Group Memberships

      23.10 Routing Multicast Traffic with MOSPF

      23.11 Routing Multicast Traffic with DVMRP

      23.12 DVMRP Tunnels

      23.13 Configuring Bidirectional PIM

      23.14 Controlling Multicast Scope with TTL

      23.15 Controlling Multicast Scope with Administratively Scoped Addressing
      23.16 Exchanging Multicast Routing Information with MBGP

      23.17 Using MSDP to Discover External Sources

      23.18 Configuring Anycast RP

      23.19 Converting Broadcasts to Multicasts

      23.20 Showing Multicast Status

      23.21 Debugging Multicast Routing

24. IP Mobility

      24.1 Local Area Mobility

      24.2 Home Agent Configuration

      24.3 Foreign Agent Configuration

      24.4 Making a Router a Mobile Node

      24.5 Reverse-Tunnel Forwarding

      24.6 Using HSRP for Home Agent Redundancy

25. IPv6

      25.1 Automatically Generating IPv6 Addresses for an Interface

      25.2 Manually Configuring IPv6 Addresses on an Interface

      25.3 Configuring DHCP for IPv6

      25.4 Dynamic Routing with RIP

      25.5 Modifying the Default RIP Parameters

      25.6 IPv6 Route Filtering and Metric Manipulation in RIP

      25.7 Using OSPF for IPv6

      25.8 IPv6 Route Filtering and Metric Manipulation in OSPF

      25.9 Route Redistribution

      25.10 Dynamic Routing with MBGP

      25.11 Tunneling IPv6 Through an Existing IPv4 Network

      25.12 Translating Between IPv6 and IPv4

26. MPLS

      26.1 Configuring a Basic MPLS P Router

      26.2 Configuring a Basic MPLS PE Router

      26.3 Configuring Basic MPLS CE Routers

      26.4 Configuring MPLS over ATM

      26.5 PE-CE Communication via RIP

      26.6 PE-CE Communication via OSPF

      26.7 PE-CE Communication via EIGRP

      26.8 PE-CE Communication via BGP

      26.9 QoS over MPLS

      26.10 MPLS Traffic Engineering with Autoroute

      26.11 Multicast Over MPLS

      26.12 Your Service Provider Doesn't Do What You Want

27. Security

      27.1 Using AutoSecure

      27.2 Using Context-Based Access-Lists

      27.3 Transparent Cisco IOS Firewall

      27.4 Stopping Denial of Service Attacks

      27.5 Inspecting Applications on Different Port Numbers

      27.6 Intrusion Detection and Prevention

      27.7 Login Password Retry Lockout

      27.8 Authentication Proxy

A. External Software Packages

B. IP Precedence, TOS, and DSCP Classifications

Index

商品描述(中文翻譯)

**描述**

從未有任何東西像 Cisco 的網際網路作業系統 (IOS) 一樣,迫切需要一本食譜。IOS 功能強大且靈活,但同時也令人困惑且令人生畏。大多數任務可以用幾種不同的方式完成。在你試圖快速解決問題時,你不想浪費寶貴的時間去弄清楚哪種方式是最好的。

這就是這本食譜的目的。幸運的是,大多數路由器配置任務可以分解為幾個或多或少獨立的步驟:你配置一個介面,你配置一個路由協定,你設置備用鏈路,你實施封包過濾器和其他存取控制機制。你真正需要的是一套食譜,告訴你如何執行最常見的任務,這樣你就可以快速為你的站點制定出良好的配置。而且你需要知道這些解決方案是有效的:你不想在凌晨兩點實施備用鏈路,因為你的主鏈路故障,而你在安裝路由器時設置的備用鏈路並不完全正確。

經過徹底修訂和擴充的《Cisco IOS Cookbook》,第二版,新增了有關 MPLS、安全性、IPv6 和 IP 移動性的章節,並提供了針對最常見配置問題的解決方案,包括:
- 配置多種類型的介面,從串行到 ATM 和 Frame Relay
- 配置所有常見的 IP 路由協定 (RIP、EIGRP、OSPF 和 BGP)
- 配置身份驗證
- 配置其他服務,包括 DHCP 和 NTP
- 設置備用鏈路,並使用 HSRP 配置備用路由器
- 管理路由器,包括 SNMP 和其他解決方案
- 使用存取列表控制通過路由器的流量

如果你使用 Cisco 路由器,你需要這樣一本書來幫助你快速有效地解決問題。即使你已經有經驗,這些解決方案和詳細的解釋也會給你新的想法和對路由器配置的見解。如果你沒有經驗——如果你剛剛被賦予管理使用 Cisco 路由器的網路的責任——這本書可能會成為你的救命稻草。

**目錄**

**前言**

**1. 路由器配置與檔案管理**
1.1 通過 TFTP 配置路由器
1.2 將路由器配置保存到伺服器
1.3 使用遠端配置檔啟動路由器
1.4 儲存大於 NVRAM 的配置檔
1.5 清除啟動配置
1.6 載入新的 IOS 映像
1.7 啟動不同的 IOS 映像
1.8 通過網路啟動
1.9 將 IOS 映像複製到伺服器
1.10 通過控制台複製 IOS 映像
1.11 從 Flash 刪除檔案
1.12 分割 Flash
1.13 將路由器用作 TFTP 伺服器
1.14 從路由器使用 FTP
1.15 生成大量路由器配置
1.16 同時更改多個路由器的配置
1.17 提取硬體清單資訊
1.18 備份路由器配置
1.19 溫啟動
1.20 溫升級
1.21 配置檔案歸檔
1.22 鎖定配置存取

**2. 路由器管理**
2.1 創建命令別名
2.2 管理路由器的 ARP 快取
2.3 調整路由器緩衝區
2.4 自動調整緩衝區
2.5 使用 Cisco 發現協定
2.6 禁用 Cisco 發現協定
2.7 使用小型伺服器
2.8 啟用對路由器的 HTTP 存取
2.9 啟用對路由器的安全 HTTP (HTTPS) 存取
2.10 使用靜態主機名稱表
2.11 啟用域名服務
2.12 禁用域名查詢
2.13 指定路由器重啟時間
2.14 排程路由器命令
2.15 顯示歷史 CPU 值
2.16 創建例外轉儲檔案
2.17 生成介面資訊報告
2.18 生成路由表資訊報告
2.19 生成 ARP 表資訊報告
2.20 生成伺服器主機表檔案

**3. 使用者存取與特權等級**
3.1 設定使用者 ID
3.2 加密密碼
3.3 使用更好的密碼加密技術
3.4 從路由器配置檔中移除密碼
3.5 解密 Cisco 的弱密碼加密
3.6 顯示活動使用者
3.7 向其他使用者發送消息
3.8 更改 VTY 數量
3.9 更改 VTY 超時
3.10 按協定限制 VTY 存取
3.11 在 VTY 線上啟用絕對超時
3.12 實施橫幅
3.13 在端口上禁用橫幅
3.14 禁用路由器線
3.15 保留 VTY 端口以供管理存取
3.16 限制入站 Telnet 存取
3.17 記錄 Telnet 存取
3.18 設定 Telnet 的來源地址
3.19 自動化登錄序列
3.20 使用 SSH 進行安全存取
3.21 更改 IOS 命令的特權等級
3.22 定義每位使用者的特權
3.23 定義每個端口的特權

**4. TACACS+**
4.1 從中央系統驗證登錄 ID
4.2 限制命令存取
4.3 失去對 TACACS+ 伺服器的存取
4.4 在特定線上禁用 TACACS+ 驗證
4.5 捕獲使用者按鍵
4.6 記錄系統事件
4.7 設定 TACACS+ 訊息的 IP 來源地址
4.8 範例伺服器配置檔

**5. IP 路由**
5.1 查找 IP 路由
5.2 查找 IP 路由類型
5.3 轉換不同的遮罩格式
5.4 使用靜態路由
5.5 浮動靜態路由
5.6 使用基於政策的路由根據來源地址路由
5.7 使用基於政策的路由根據應用類型路由
5.8 檢查基於政策的路由
5.9 更改管理距離
5.10 在多條路徑上以相等成本路由
5.11 跟踪介面或其他路由的靜態路由
5.12 保持路由表變更的統計數據

**6. RIP**
6.1 配置 RIP 版本 1
6.2 使用 RIP 過濾路由
6.3 將靜態路由重新分配到 RIP
6.4 使用路由映射重新分配路由
6.5 在 RIP 中創建默認路由
6.6 在介面上禁用 RIP
6.7 默認被動介面
6.8 RIP 的單播更新
6.9 對路由應用偏移量
6.10 調整計時器
6.11 配置封包間延遲
6.12 啟用非定期更新
6.13 增加 RIP 輸入佇列
6.14 配置 RIP 版本 2
6.15 啟用 RIP 驗證
6.16 RIP 路由摘要
6.17 路由標記

**7. EIGRP**
7.1 配置 EIGRP
7.2 使用 EIGRP 過濾路由
7.3 將路由重新分配到 EIGRP
7.4 使用路由映射將路由重新分配到 EIGRP
7.5 在介面上禁用 EIGRP
7.6 調整 EIGRP 指標
7.7 調整計時器
7.8 啟用 EIGRP 驗證
7.9 EIGRP 路由摘要
7.10 記錄 EIGRP 鄰居狀態變更
7.11 限制 EIGRP 的帶寬使用
7.12 EIGRP Stub 路由
7.13 路由標記
7.14 查看 EIGRP 狀態

**8. OSPF**
8.1 配置 OSPF
8.2 在 OSPF 中過濾路由
8.3 調整 OSPF 成本
8.4 在 OSPF 中創建默認路由
8.5 將靜態路由重新分配到 OSPF
8.6 將外部路由重新分配到 OSPF
8.7 操控 DR 選擇
8.8 設定 OSPF RID
8.9 啟用 OSPF 驗證
8.10 選擇適當的區域類型
8.11 在撥號介面上使用 OSPF
8.12 在 OSPF 中摘要路由
8.13 在某些介面上禁用 OSPF
8.14 更改網路類型