« Home « Kết quả tìm kiếm

Cisco Switching Black Book


Tóm tắt Xem thử

- The Rule of the Network Road...22.
- Connecting to the Switch...25.
- Connecting to the Console Port...34.
- Displaying the Alarm Level of the Switch...67.
- Configuring RGMP on the Switch...155.
- Disabling RGMP on the Switch...155.
- •Accessibility—The information in a book is worthless unless you can find it quickly when you need it.
- To make a long story short, a few months later, with a great big outline and help from Albert Ip and Hanson Nottingham, the book became this Black Book—the most feature−packed handbook for Cisco switching an administrator can buy.
- It is a quote by Albert Einstein, and I remember it from one of my mentors: “The significant [technical] problems we face cannot be solved by the same level of thinking that created them.”.
- Table 1.1: The average limits in terms of physical wire utilization.
- Figure 1.7: The addition of a Gigabit Ethernet link on the physical link between the switch and the server..
- The Rule of the Network Road.
- Connecting to the Switch.
- The CLI can be found on the following switches:.
- First in, first out (FIFO)—The queuing method most network administrators are familiar with.
- congestion occurs on the network.
- Access layer—The first layer, which is the first point of access for the end user interface.
- Distribution layer—The second layer, which serves to combine the traffic of the Access layer, summarize traffic, and combine routes.
- Figure 2.1: The Cisco campus hierarchical switching model..
- Connecting to the Console Port.
- Figure 2.2: The different types of console ports on the switches..
- Table 2.4: The RJ−45−to−AUX port DB−9 connector signal appointments for each pin..
- Table 2.5: The RJ−45−to−DB−9 AUX port pinouts by color..
- Privileged EXEC mode—The Privileged command set includes those commands contained in User EXEC mode, as well as the configure command, through which you can access the remaining command modes.
- auto—Autonegotiates the speed of the traffic on the port.
- Figure 2.4: The Configuration menu of the menu−driven IOS..
- Figure 2.6: The menu−driven VLAN IP configuration screen..
- Figure 2.7: The Community Strings configuration screen..
- Table 2.9 : The boot command syntaxes..
- Ctrl+E Moves to the end of the command line.
- Ctrl+K Deletes all characters to the end of the line.
- Ctrl+W Deletes to the left of the cursor.
- Table 3.2: The different broadband transmission types and their bandwidth..
- Figure 3.4: The STS−1 framing and STS−n framing.
- Figure 3.8: The adduser command..
- The switch name will be distributed automatically on the network.
- −if—The interface (26 for Ethernet, 28 for SLIP, or 37 for ATM).
- −ip—The IP address.
- −msk—The network mask.
- −bc—The broadcast address.
- Displaying the Alarm Level of the Switch.
- Figure 4.1: The architecture of the Cisco Catalyst 5000 series switch..
- Tip The switching fabric is the “highway” the data takes from the point of entry to the port or ports from which the data exits..
- Figure 4.4: The Phoenix ASIC used on the Supervisor Engine III..
- connected to the QMAC ASIC..
- All this takes place transparently to both hosts on the network—the Ethernet host believes that the Token Ring host is on Ethernet, and vice versa..
- Here’s an example of the command’s use:.
- the network..
- knowledge of the network administrators.
- (Just a few years ago, this rule was reversed—the administrators’ goal was to keep all the servers local and to allow only 20 percent or less of the network traffic to extend outside the local network.).
- Figure 5.3: The ISL header inserted into an ISL encapsulated packet..
- High bit of source address (HSA)—The 3−byte manufacturer’s portion of the SA field or vendor field of the source port’s MAC address..
- Sorry—the closest it gets to trunk links is sending its VTP information between switches by using a trunk port between the switches and routers.
- When you configure VTP on all of your switches and assign them to the same VTP domain name, you can merely configure one switch to make changes on all the switches—the changes will be propagated to all the other switches in the network.
- Configuration revision number—The higher the number, the more updated the information..
- Management domain name—The name of the VTP management domain.
- Updater identity—The identity of the switch that forwarded the summary advertisement to the switch..
- VLAN identification—The ISL or 802.1Q information..
- static—The port number you as the administrator selects will remain the same regardless of the MAC address used by the end user of that port..
- To set the switch to the Coriolis domain, use the following command:.
- Figure 6.1: The Catalyst Supervisor Engine I and II..
- Figure 6.2: The Supervisor Engine III..
- Figure 6.3: The Catalyst Supervisor Engine III G..
- Figure 6.4: The 5000/5500 and the 5002 chassis with installed Ethernet modules..
- Configuring a Hostname on the RSM.
- Enable IPX routing on the router:.
- Enable AppleTalk routing on the router:.
- Figure 7.4: The IP multicast address structure..
- Figure 7.5: The 32−to−1 relationship of IP addresses to MAC address..
- Windows 2000 have native support for IGMPv2.) The same situation applies to the different versions of Unix..
- Leave group message—The biggest improvement in IGMPv2.
- This entire process moves the administration of the multicast from the switch to the router.
- The router sends a hello packet to the switch.
- Use the following commands to disable PIM on the interface:.
- Configuring RGMP on the Switch.
- Disabling RGMP on the Switch.
- Configuring RGMP on the Router.
- Disabling RGMP on the Router.
- But don’t be fooled—the switch will let you configure GMRP on a per−port basis, but it will not work unless you enable it globally..
- Feeder nodes—The MGX 8220 concentrator shelves, which are used to aggregate narrowband UNI connections and multiplex traffic onto a single trunk link to a BPX switch or routing node..
- Hybrid nodes—The IGX 8400 and the MGX 8800 switches, which are used to aggregate UNI connections.
- Routing nodes—The BPX switches that actually render the switching decisions and forward packets to appropriate trunk links..
- LAN Emulation Server (LES)—The centerpiece of the LANE architecture.
- Broadcast and Unknown Server (BUS)—The means by which ATM provides broadcasting support for an ELAN..
- Cell relay services (CRS)—The basis for networking protocols, including ATM, SMDS, and IEEE 802.6.
- Figure 8.1: The ATM cell..
- AA5—The primary AAL used for non−SMDS traffic that doesn’t require the pacing AAL1 would provide.
- Figure 8.4: The ATM Reference Model layers compared to OSI Reference Model layers..
- Figure 8.5: The format of an ATM NSAP address..
- Figure 8.6: The LES address resolution process..
- Connect interfaces to the ELAN.
- The following assignments pertain to the LANE components:.
- Workgroup switches—The smallest switches, typically found in the Access layer of the network..
- Enterprise switches—The next level of ATM switches.
- Network Management on the LANE Module.
- The source sends a “flush” message to the BUS, which instructs the BUS to stop sending any unsent cells—the source will now establish a direct connection with the destination and send the remaining data..
- Follow these steps to configure a LES/BUS for two ELANS—the default ELAN and ELAN2:.
- Follow these steps to configure two LECs for two ELANS—the default ELAN and ELAN2:.
- Figure 9.1: The LS100 switch..
- Figure 9.2: The LS1010 switch.

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt