Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cisco router configuration handbook : the single-source guide to configuring the most popular cisco router features
Bookmark Share

Text

Cisco router configuration handbook : the single-source guide to configuring the most popular cisco router features

Hucaby, David - Personal Name; McQuerry, Steve - Personal Name; Whitaker, Andrew - Personal Name;

Contents:

Part 1: Configuration Fundamentals
Chapter 1. Configuration Basics
1.1. User Interface
1.2. File Management
1.3. Cisco Discovery Protocol
1.4. System Time
1.5. Logging
1.6. System Monitoring
1.7. Service Assurance Agent
1.8. Buffer Management
1.9. Some Troubleshooting Tools
Chapter 2. Interface Configuration
2.1. Ethernet Interface
2.2. FDDI Interface
2.3. Loopback and Null Interface
2.4. VLAN Interface
2.5. Tunnel Interface
2.6. Synchronous Serial Interface
2.7. Packet-Over-SONET Interface
2.8. Frame Relay Interface
2.9. Frame Relat Switching
2.10.ATM Interface
Chapter 3. Dial Solutions
3.1. Modems
3.2. ISDN
3.3. Dial-on-Demand Routing
3.4. Dial Backup
3.5. Routing Over Dialup Networks
3.6. Point-to-Point Protocol

Part II: Networks Protocols
Chapter 4. IPv4 Addresing and Services
4.1. IP Addressing and Resolution
4.2. IP Broadcast Handling
4.3. Hot Standby Router Protocol
4.4. Virtual Router Redudancy Protocol
4.5. Dynamic Host Configuration Protocol
4.6. Mobile IP
4.7. Network Address Translation
4.8. Server Load Balancing
Chapter 5. IPv6 Addressing and Services
5.1. IPv6 Addressing
5.2. Dynamic Host Configuration Protocol
5.3. Gateway Load Balancing Protocol Version 6
5.4. Host Standby Router Protocol for IPv6
5.5. Mobile IPv6
5.6. Network Address Translation-Protocol Translation
5.7. Tunneling
Chapter 6. IP Routing Protocols
6.1. Routing Information Protocol
6.2. Routing Information Protocol for IPv6
6.3. Enhanced Interior Gateway Routing Protocol
6.4. Enhanced Interior Gateway Routing Protocol for IPv6
6.5. Open Shortest Path First
6.6. Open Shortest Path First Version 3 (Ipv6)
6.7. Integrated IS-IS
6.8. Integrated IS-IS for IPv6
6.9. Border Gateway Protocol
6.10.Multiprotocol Border Gateway Protocol for IPv6
Chapter 7. IP Multicast Routing
7.1. Protocol Independent Multicast
7.2. Internet Group Management Protocol
7.3. Multiprotocol BGP
7.4. Multicast Source Discovery Protocol
7.5. IPv6 Multicast
Chapter 8. IP Route Processing
8.1. Manually Configuring Routes
8.2. Policy Routing
8.3. Redistributing Routing Information
8.4. Filtering Routing Information
8.5. Load Balancing

Part III. Packet Processing
Chapter 9. Quality of Service
9.1. Modular QoS Command Line Interface
9.2. Network-Based Application Recognition
9.3. Policy-Based Routing
9.4. Quality of Service for VPNs
9.5. QoS Policy Propagation via BGP
9.6. Priority Queuing
9.7. Custom Queuing
9.8. Weighted Fair Queuing
9.9. Weighted Random Early Detection
9.10.Commited Access Rate
9.11.Generic Traffic Shaping
9.12.Frame Relay Traffic Shaping
9.13.Use RSVP for QoS Signaling Example
9.14.Link Efficiency Mechanism
9.15.AutoQoS for The Enterprise
Chapter 10.Multiprotocol Label Switching
10.1. Configuring Basic MPLS
10.2. MPLS Traffic Engineering
10.3. MPLS Virtual Private Networks

Part IV: Voice and Telephony
Chapter 11.Voice and Telephony
11.1. Quality of Service for Voice
11.2. Voice Ports
11.3. Dialing
11.4. H.323 Gateways
11.5. H.323 Gatekeepers
11.6. Interactive Voice Response
11.7. Survivable Remote Site Telephony

Part v: Security
Chapter 12.Router Security
12.1. Suggested Ways to Secure a Router
12.2. Authentication, Authorization, and Accounting
12.3. Dymanically Authentication and Authorize User with Authentication Proxy
12.4. Controlling Access with Lock and Key Security
12.5. Filtering IP Session with Reflexive Access Lists
12.6. Prevent DoS Attack witc TCP Intercept
12.7. Intelligent Filtering with Context-Based Access Control
12.8. Detect Attacks and Threats with the IOS Intrusion Prevention System
12.9. Control Plane Security
12.10.Auto Secure
Chapter 13.Virtual Private Network
13.1. Using Internet Key Exchange for VPNs
13.2. IPSec VPN Tunnel
13.3. High Availability Features
13.4. Dynamic Multipoint VPN
13.5. Secure Socket Layer VPNs
Chapter 14.Access Lists and Reguler Expressions
14.1. IP Access Lists
14.2. MAC Address and Protocol Type Code Access Lists
14.3. IPv6 Access Lists
14.4. Reguler Expressions


Availability
#
Perpustakaan Poltek SSN (Running Number) 123
000 01409
Available
Detail Information
Series Title
--
Call Number
004 HUC c
Publisher
Indianapolis : Cisco Press., 2010
Collation
xxi, 641 hlm.; ilus.; 23 cm
Language
English
ISBN/ISSN
9781587141164
Classification
004
Content Type
-
Media Type
-
Carrier Type
-
Edition
Second Edition
Subject(s)
-
Specific Detail Info
--
Statement of Responsibility
David Hucaby, Steve McQuerry and Andrew Whitaker
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?