While several publishers (including O'Reilly) supply excellent documentation of router features, the trick is knowing when, why, and how to use these features There are often many different ways to solve any given networking problem using Cisco devices, and some solutions are clearly more effective than others. The pressing question for a network engineer is which of the many potential solutions is the most appropriate for a particular situation. Once you have decided to use a particular feature, how should you implement it? Unfortunately, the documentation describing a particular command or feature frequently does very little to answer either of these questions.Everybody who has worked with Cisco routers for any length of time has had to ask their friends and co-workers for example router configuration files that show how to solve a common problem. A good working configuration example can often save huge amounts of time and frustration when implementing a feature that you've never used before. The Cisco Cookbook gathers hundreds of example router configurations all in one place.As the name suggests, Cisco Cookbook is organized as a series of recipes. Each recipe begins with a problem statement that describes a common situation that you might face. After each problem statement is a brief solution that shows a sample router configuration or script that you can use to resolve this particular problem. A discussion section then describes the solution, how it works, and when you should or should not use it. The chapters are organized by the feature or protocol discussed. If you are looking for information on a particular feature such as NAT, NTP or SNMP, you can turn to that chapter and find a variety of related recipes. Most chapters list basic problems first, and any unusual or complicated situations last.The Cisco Cookbook will quickly become your "go to" resource for researching and solving complex router configuration issues, saving you time and making your network more efficient. It covers: Router Configuration and File Management Router Management User Access and Privilege Levels TACACS+ IP Routing RIP EIGRP OSPF BGP Frame Relay Queueing and Congestion Tunnels and VPNs Dial Backup NTP and Time DLSw Router Interfaces and Media Simple Network Management Protocol Logging Access Lists DHCP NAT Hot Standby Router Protocol IP Multicast
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS. If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some of which mean different things in different situations--it doesn't have a reputation for being user-friendly. Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of IOS into a single, well-organized volume that you'll find refreshingly user-friendly. This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief, example-filled tutorial shows you how to accomplish common tasks. The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the routers themselves. It's a timely guide that any network administrator will come to rely on.
Author: Thomas Akin
Publisher: O'Reilly Media, Inc.
Release Date: 2009-02-09
This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.
Author: Joseph D Sloan
Publisher: "O'Reilly Media, Inc."
Release Date: 2001-08-09
Over the years, thousands of tools have been developed for debugging TCP/IP networks. They range from very specialized tools that do one particular task, to generalized suites that do just about everything except replace bad Ethernet cables. Even better, many of them are absolutely free. There's only one problem: who has time to track them all down, sort through them for the best ones for a particular purpose, or figure out how to use them?Network Troubleshooting Tools does the work for you--by describing the best of the freely available tools for debugging and troubleshooting. You can start with a lesser-known version of ping that diagnoses connectivity problems, or take on a much more comprehensive program like MRTG for graphing traffic through network interfaces. There's tkined for mapping and automatically monitoring networks, and Ethereal for capturing packets and debugging low-level problems.This book isn't just about the tools available for troubleshooting common network problems. It also outlines a systematic approach to network troubleshooting: how to document your network so you know how it behaves under normal conditions, and how to think about problems when they arise, so you can solve them more effectively.The topics covered in this book include: Understanding your network Connectivity testing Evaluating the path between two network nodes Tools for capturing packets Tools for network discovery and mapping Tools for working with SNMP Performance monitoring Testing application layer protocols Software sources If you're involved with network operations, this book will save you time, money, and needless experimentation.
Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet's size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.The topics include: Requesting an AS number and IP addresses Route filtering by remote ISPs and how to avoid this Configuring the initial BGP setup Balancing the available incoming or outgoing traffic over the available connections Securing and troubleshooting BGP BGP in larger networks: interaction with internal routing protocols, scalability issues BGP in Internet Service Provider networks The book is filled with numerous configuration examples with more complex case studies at the end of the book to strengthen your understanding. BGP is for anyone interested in creating reliable connectivity to the Internet.
Network Maintenance and Troubleshooting Guide Field-Tested Solutions for Everyday Problems, Second Edition Neal Allen The 100% practical, real-world guide to anticipating, finding, and solving network problems—fast! Real-life networks don’t always behave “by the book.” Troubleshooting them requires practical intuition that normally comes only with experience. In this book, Fluke Networks’ Neal Allen brings together all that hard-won, hands-on insight: everything you need to discover what’s really happening in your network, so you can anticipate and fix problems before users even notice them. Writing for network technicians and administrators at all levels, Allen presents an approach to troubleshooting that has been proven in networks of all kinds, no matter how complex. He introduces indispensable triage and troubleshooting techniques for everything from copper and fiber cabling to IPv6, and presents unparalleled guidance on identifying and resolving problems at the MAC Layer. He illustrates his advice with diagrams, tables, and screen captures from Fluke Networks’ market-leading instruments. Throughout this book, Allen also offers practical summaries of each of today’s core networking technologies, making it an ideal complement to any network certification study guide. Coverage includes Using the OSI model to more efficiently troubleshoot networks layer by layer Copper and fiber-optic cabling: theory, operation, and troubleshooting Media Access Control (MAC) Layer: Ethernet theory and operation Identifying and resolving problems related to IPv4 and IPv6 protocols Preventing problems before they occur Discovering device behavior Troubleshooting switches Using a protocol analyzer more successfully Creating network documentation that helps you more efficiently prevent and resolve problems Road tested by thousands of Fluke Networks customers, this book’s first edition became the best-kept secret resource for sysadmins, netadmins, and support technicians fortunate enough to discover it. Now, Allen has thoroughly updated his classic for today’s networks. If you’re responsible for maintaining one of those networks, you’ll find this new Second Edition even more indispensable. Neal Allen is a senior staff engineer in the Fluke Networks’ Technical Assistance Center (TAC) focusing on escalated problems. He has been involved in designing, installing, and troubleshooting networks for nearly 20 years. Allen has served on Interop’s trade show Network Operations Center (NOC) team since 1993, troubleshooting show-floor problems at the Las Vegas and Atlanta Interop trade shows, and helped support and troubleshoot the network for the 1996 Atlanta Olympic Games. His responsibilities currently include product feature specification and beta testing, remote and onsite problem solving, and providing training and sales support worldwide. informit.com/aw Cover design by Louisa Adair Cover photography from Image Source / Getty Images
As a delivery vehicle for email, web pages, text, audio, and video, the global IP network is inspiring and intimidating in its vigor and resilience. While we could discuss at length the reasons for its vigor, the resilience of this network is in large part due to IP routing. This book introduces the reader to the intricacies of IP routing as it is implemented using Cisco routers. Each section leads the reader through the basics of configuring routing protocols. This approach gives the reader a quick start with the routing protocol under discussion and reveals the underlying concepts of IP routing. What is the packet-forwarding process ? How is the routing table maintained ? How do Distance Vector algorithms work ? How do classful and classless route lookups differ ? These and other concepts are illustrated in the discussions of static routing, RIP, IGRP, and EIGRP. The limitations of these traditional routing protocols will also become obvious to the reader. Variable Length Subnet Masks, route summarization, and fast convergence are key features in the design of any large IP network. These features are discussed in the OSPF chapter, which includes an introduction to Dijkstra's algorithm, the foundation for Link State protocole. Finally, BGP-4 is described in detail, showing the reader how to use BGP-4 attributes to set routing policies. This book is intended for anyone interested in IP routing. While it is appropriate for a beginner, it will also be useful for anyone already familiar with IP routing who is seeking a better understanding of the underlying concepts.
This guide focuses on access lists that are critical to network and Internet security. Access lists are a main part of the Cisco IOS that are used to control access, route traffic and specify packet filtering for firewalls.
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you. You will find recipes for: Building a gateway, firewall, and wireless access point on a Linux network Building a VoIP server with Asterisk Secure remote administration with SSH Building secure VPNs with OpenVPN, and a Linux PPTP VPN server Single sign-on with Samba for mixed Linux/Windows LANs Centralized network directory with OpenLDAP Network monitoring with Nagios or MRTG Getting acquainted with IPv6 Setting up hands-free networks installations of new systems Linux system administration via serial console And a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don't have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need.
This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. The full range of certification topics is covered, including all aspects of IOS, NX-OS, and ASA software. The emphasis throughout is on solving the real-world challenges engineers face in configuring network devices, rather than on exhaustive descriptions of hardware features. This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCENT, CCNA, and CCNP exam takers. It distills a comprehensive library of cheat sheets, lab configurations, and advanced commands that the authors assembled as senior network engineers for the benefit of junior engineers they train, mentor on the job, and prepare for Cisco certification exams. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, Noel Rivera, and Richard Bedwell start their book with a review of the basics of configuring routers and switches. All the more advanced chapters have labs and exercises to reinforce the concepts learned. This book differentiates itself from other Cisco books on the market by approaching network security from a hacker’s perspective. Not only does it provide network security recommendations but it teaches you how to use black-hat tools such as oclHashcat, Loki, Burp Suite, Scapy, Metasploit, and Kali to actually test the security concepts learned. Readers of Cisco Networks will learn How to configure Cisco switches, routers, and data center devices in typical corporate network architectures The skills and knowledge needed to pass Cisco CCENT, CCNA, and CCNP certification exams How to set up and configure at-home labs using virtual machines and lab exercises in the book to practice advanced Cisco commands How to implement networks of Cisco devices supporting WAN, LAN, and data center configurations How to implement secure network configurations and configure the Cisco ASA firewall How to use black-hat tools and network penetration techniques to test the security of your network
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you’re part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You’ll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker’s tactics. Analyze the design, architecture, and security issues of wireless lighting systems Understand how to breach electronic door locks and their wireless mechanisms Examine security design flaws in remote-controlled baby monitors Evaluate the security design of a suite of IoT-connected home products Scrutinize security vulnerabilities in smart TVs Explore research into security weaknesses in smart cars Delve into prototyping techniques that address security in initial designs Learn plausible attacks scenarios based on how people will likely use IoT devices