Books & Videos

Table of Contents

  1. Hubs, Switches, and Switching

    1. Chapter 1 What Is a Network?

    2. Chapter 2 Hubs and Switches

      1. Hubs
      2. Switches
    3. Chapter 3 Auto-Negotiation

      1. What Is Auto-Negotiation?
      2. How Auto-Negotiation Works
      3. When Auto-Negotiation Fails
      4. Auto-Negotiation Best Practices
      5. Configuring Auto-Negotiation
    4. Chapter 4 VLANs

      1. Connecting VLANs
      2. Configuring VLANs
    5. Chapter 5 Trunking

      1. How Trunks Work
      2. Configuring Trunks
    6. Chapter 6 VLAN Trunking Protocol

      1. VTP Pruning
      2. Dangers of VTP
      3. Configuring VTP
    7. Chapter 7 EtherChannel

      1. Load Balancing
      2. Configuring and Managing EtherChannel
    8. Chapter 8 Spanning Tree

      1. Broadcast Storms
      2. MAC Address Table Instability
      3. Preventing Loops with Spanning Tree
      4. Managing Spanning Tree
      5. Additional Spanning Tree Features
      6. Common Spanning Tree Problems
      7. Designing to Prevent Spanning Tree Problems
  2. Routers and Routing

    1. Chapter 9 Routing and Routers

      1. Routing Tables
      2. Route Types
      3. The IP Routing Table
    2. Chapter 10 Routing Protocols

      1. Communication Between Routers
      2. Metrics and Protocol Types
      3. Administrative Distance
      4. Specific Routing Protocols
    3. Chapter 11 Redistribution

      1. Redistributing into RIP
      2. Redistributing into EIGRP
      3. Redistributing into OSPF
      4. Mutual Redistribution
      5. Redistribution Loops
      6. Limiting Redistribution
    4. Chapter 12 Tunnels

      1. GRE Tunnels
      2. GRE Tunnels and Routing Protocols
      3. GRE and Access Lists
    5. Chapter 13 Resilient Ethernet

      1. HSRP
      2. HSRP Interface Tracking
      3. When HSRP Isn't Enough
    6. Chapter 14 Route Maps

      1. Building a Route Map
      2. Policy-Routing Example
    7. Chapter 15 Switching Algorithms in Cisco Routers

      1. Process Switching
      2. Interrupt Context Switching
      3. Configuring and Managing Switching Paths
  3. Multilayer Switches

    1. Chapter 16 Multilayer Switches

      1. Configuring SVIs
      2. Multilayer Switch Models
    2. Chapter 17 Cisco 6500 Multilayer Switches

      1. Architecture
      2. CatOS Versus IOS
    3. Chapter 18 Catalyst 3750 Features

      1. Stacking
      2. Interface Ranges
      3. Macros
      4. Flex Links
      5. Storm Control
      6. Port Security
      7. SPAN
      8. Voice VLAN
      9. QoS
  4. Telecom

    1. Chapter 19 Telecom Nomenclature

      1. Introduction and History
      2. Telecom Glossary
    2. Chapter 20 T1

      1. Understanding T1 Duplex
      2. Types of T1
      3. Encoding
      4. Framing
      5. Performance Monitoring
      6. Alarms
      7. Troubleshooting T1s
      8. Configuring T1s
    3. Chapter 21 DS3

      1. Framing
      2. Line Coding
      3. Configuring DS3s
    4. Chapter 22 Frame Relay

      1. Ordering Frame-Relay Service
      2. Frame-Relay Network Design
      3. Oversubscription
      4. Local Management Interface (LMI)
      5. Configuring Frame Relay
      6. Troubleshooting Frame Relay
  5. Security and Firewalls

    1. Chapter 23 Access Lists

      1. Designing Access Lists
      2. ACLs in Multilayer Switches
      3. Reflexive Access Lists
    2. Chapter 24 Authentication in Cisco Devices

      1. Basic (Non-AAA) Authentication
      2. AAA Authentication
    3. Chapter 25 Firewall Theory

      1. Best Practices
      2. The DMZ
      3. Alternate Designs
    4. Chapter 26 PIX Firewall Configuration

      1. Interfaces and Priorities
      2. Names
      3. Object Groups
      4. Fixups
      5. Failover
      6. NAT
      7. Miscellaneous
      8. Troubleshooting
  6. Server Load Balancing

    1. Chapter 27 Server Load-Balancing Technology

      1. Types of Load Balancing
      2. How Server Load Balancing Works
      3. Configuring Server Load Balancing
    2. Chapter 28 Content Switch Modules in Action

      1. Common Tasks
      2. Upgrading the CSM
  7. Quality of Service

    1. Chapter 29 Introduction to QoS

      1. Types of QoS
      2. QoS Mechanics
      3. Common QoS Misconceptions
    2. Chapter 30 Designing a QoS Scheme

      1. Determining Requirements
      2. Configuring the Routers
    3. Chapter 31 The Congested Network

      1. Determining Whether the Network Is Congested
      2. Resolving the Problem
    4. Chapter 32 The Converged Network

      1. Configuration
      2. Monitoring QoS
      3. Troubleshooting a Converged Network
  8. Designing Networks

    1. Chapter 33 Designing Networks

      1. Documentation
      2. Naming Conventions for Devices
      3. Network Designs
    2. Chapter 34 IP Design

      1. Public Versus Private IP Space
      2. VLSM
      3. CIDR
      4. Allocating IP Network Space
      5. Allocating IP Subnets
      6. IP Subnetting Made Easy
    3. Chapter 35 Network Time Protocol

      1. What Is Accurate Time?
      2. NTP Design
      3. Configuring NTP
    4. Chapter 36 Failures

      1. Human Error
      2. Multiple Component Failure
      3. Disaster Chains
      4. No Failover Testing
      5. Troubleshooting
    5. Chapter 37 GAD's Maxims

      1. Maxim #1
      2. Maxim #2
      3. Maxim #3
    6. Chapter 38 Avoiding Frustration

      1. Why Everything Is Messed Up
      2. How to Sell Your Ideas to Management
      3. When to Upgrade and Why
      4. Why Change Control Is Your Friend
      5. How Not to Be a Computer Jerk
  1. Colophon