home *** CD-ROM | disk | FTP | other *** search
Text File | 2001-02-28 | 23.2 KB | 1,161 lines |
- <LINKS>
- <LINK>
- <NAME>Introduction to Chapter 1</NAME>
- <SECTION>s010</SECTION>
- <PAGE>001a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.1.1. Campus Internetworks</NAME>
- <SECTION>s011</SECTION>
- <PAGE>003a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.2.1. Performance Problems and Solutions</NAME>
- <SECTION>s012</SECTION>
- <PAGE>004a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.3.1. Network Services</NAME>
- <SECTION>s013</SECTION>
- <PAGE>011a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.1. Open Systems Interconnection (OSI) Model</NAME>
- <SECTION>s014</SECTION>
- <PAGE>012a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.2. Layer 2 Switching</NAME>
- <SECTION>s014</SECTION>
- <PAGE>015a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.3. Routing</NAME>
- <SECTION>s014</SECTION>
- <PAGE>017a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.4. Layer 3 Switching</NAME>
- <SECTION>s014</SECTION>
- <PAGE>018a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.5. Layer 4 Switching</NAME>
- <SECTION>s014</SECTION>
- <PAGE>019a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.4.6. Multi-Layer Switching (MLS)</NAME>
- <SECTION>s014</SECTION>
- <PAGE>019b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.5.1. Three-Layer Hierarchical Model</NAME>
- <SECTION>s015</SECTION>
- <PAGE>021a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.6.1. Access Layer Switches</NAME>
- <SECTION>s016</SECTION>
- <PAGE>025a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.6.2. Distribution Layer Switches</NAME>
- <SECTION>s016</SECTION>
- <PAGE>026a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.6.3. Core Layer Switches</NAME>
- <SECTION>s016</SECTION>
- <PAGE>026b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.7.1. Switch Block</NAME>
- <SECTION>s017</SECTION>
- <PAGE>028a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.7.2. Core Block</NAME>
- <SECTION>s017</SECTION>
- <PAGE>029a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.7.3. Scaling Layer 2 Backbones</NAME>
- <SECTION>s017</SECTION>
- <PAGE>032a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.7.4. Scaling Layer 3 Backbones</NAME>
- <SECTION>s017</SECTION>
- <PAGE>034a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.8.1. Key Terms</NAME>
- <SECTION>s018</SECTION>
- <PAGE>036a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.9.1. Lab 1.1: Switching Definitions</NAME>
- <SECTION>s019</SECTION>
- <PAGE>036b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.9.2. Lab 1.2: Cisco's Three-Layer Model</NAME>
- <SECTION>s019</SECTION>
- <PAGE>037a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.9.3. Lab 1.3: Theory</NAME>
- <SECTION>s019</SECTION>
- <PAGE>038a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.10.1. Answers to Lab 1.1</NAME>
- <SECTION>s110</SECTION>
- <PAGE>045a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.10.2. Answers to Lab 1.2</NAME>
- <SECTION>s110</SECTION>
- <PAGE>046a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>1.10.3. Answers to Lab 1.3</NAME>
- <SECTION>s110</SECTION>
- <PAGE>046b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 2</NAME>
- <SECTION>s020</SECTION>
- <PAGE>051a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.1.1. The Background of IEEE Ethernet</NAME>
- <SECTION>s021</SECTION>
- <PAGE>053a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.1.2. Switched Ethernet</NAME>
- <SECTION>s021</SECTION>
- <PAGE>054a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.2.1. 10BaseT</NAME>
- <SECTION>s022</SECTION>
- <PAGE>055a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.2.2. FastEthernet</NAME>
- <SECTION>s022</SECTION>
- <PAGE>056a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.2.3. Gigabit Ethernet</NAME>
- <SECTION>s022</SECTION>
- <PAGE>059a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.3.1. Cabling the Switch Block Devices</NAME>
- <SECTION>s023</SECTION>
- <PAGE>062a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.3.2. Cisco IOS- and Set-Based Commands</NAME>
- <SECTION>s023</SECTION>
- <PAGE>065a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.4.1. Key Terms</NAME>
- <SECTION>s024</SECTION>
- <PAGE>082a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.4.2. Commands Used in This Chapter</NAME>
- <SECTION>s024</SECTION>
- <PAGE>083a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.5.1. Written Lab</NAME>
- <SECTION>s025</SECTION>
- <PAGE>085a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.6.1. Hands-On Lab</NAME>
- <SECTION>s026</SECTION>
- <PAGE>086a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>2.7.1. Answers to Written Lab</NAME>
- <SECTION>s027</SECTION>
- <PAGE>090a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 3</NAME>
- <SECTION>s030</SECTION>
- <PAGE>099a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.1.1. Broadcast Control</NAME>
- <SECTION>s031</SECTION>
- <PAGE>101a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.1.2. Security</NAME>
- <SECTION>s031</SECTION>
- <PAGE>102a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.1.3. Flexibility and Scalability</NAME>
- <SECTION>s031</SECTION>
- <PAGE>103a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.1.4. The Collapsed Backbone and the VLAN</NAME>
- <SECTION>s031</SECTION>
- <PAGE>103b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.2.1. Defining VLAN Boundaries</NAME>
- <SECTION>s032</SECTION>
- <PAGE>106a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.2.2. VLAN Memberships</NAME>
- <SECTION>s032</SECTION>
- <PAGE>107a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.2.3. Configuring Static VLANs</NAME>
- <SECTION>s032</SECTION>
- <PAGE>108a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.3.1. Frame Tagging</NAME>
- <SECTION>s033</SECTION>
- <PAGE>113a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.3.2. VLAN Identification Methods</NAME>
- <SECTION>s033</SECTION>
- <PAGE>114a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.4.1. Configuring Trunk Ports</NAME>
- <SECTION>s034</SECTION>
- <PAGE>117a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.4.2. Clearing VLANs from Trunk Links</NAME>
- <SECTION>s034</SECTION>
- <PAGE>119a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.4.3. Verifying Trunk Links</NAME>
- <SECTION>s034</SECTION>
- <PAGE>120a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.1. VTP Modes of Operation</NAME>
- <SECTION>s035</SECTION>
- <PAGE>122a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.2. VTP Advertisements</NAME>
- <SECTION>s035</SECTION>
- <PAGE>123a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.3. Configuration Revision Number</NAME>
- <SECTION>s035</SECTION>
- <PAGE>126a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.4. Configuring VTP</NAME>
- <SECTION>s035</SECTION>
- <PAGE>126b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.5. Adding to a VTP Domain</NAME>
- <SECTION>s035</SECTION>
- <PAGE>131a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.5.6. VTP Pruning</NAME>
- <SECTION>s035</SECTION>
- <PAGE>132a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.6.1. Key Terms</NAME>
- <SECTION>s036</SECTION>
- <PAGE>133a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.6.2. Commands Used in This Chapter</NAME>
- <SECTION>s036</SECTION>
- <PAGE>134a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.7.1. Written Lab</NAME>
- <SECTION>s037</SECTION>
- <PAGE>135a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.8.1. Hands-On Lab</NAME>
- <SECTION>s038</SECTION>
- <PAGE>136a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>3.9.1. Answers to Written Lab</NAME>
- <SECTION>s039</SECTION>
- <PAGE>146a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 4</NAME>
- <SECTION>s040</SECTION>
- <PAGE>149a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.1.1. Three Switch Functions at Layer 2</NAME>
- <SECTION>s041</SECTION>
- <PAGE>151a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.2.1. Selecting the Root Bridge</NAME>
- <SECTION>s042</SECTION>
- <PAGE>158a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.2.2. Selecting the Designated Port</NAME>
- <SECTION>s042</SECTION>
- <PAGE>159a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.2.3. Spanning Tree Port States</NAME>
- <SECTION>s042</SECTION>
- <PAGE>160a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.2.4. Spanning Tree Example</NAME>
- <SECTION>s042</SECTION>
- <PAGE>162a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.3.1. Store-and-Forward</NAME>
- <SECTION>s043</SECTION>
- <PAGE>164a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.3.2. Cut-Through (Real Time)</NAME>
- <SECTION>s043</SECTION>
- <PAGE>164b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.3.3. FragmentFree (Modified Cut-Through)</NAME>
- <SECTION>s043</SECTION>
- <PAGE>164c</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.4.1. Configuring Spanning Tree</NAME>
- <SECTION>s044</SECTION>
- <PAGE>165a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.5.1. Key Terms</NAME>
- <SECTION>s045</SECTION>
- <PAGE>168a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.5.2. Commands Used in This Chapter</NAME>
- <SECTION>s045</SECTION>
- <PAGE>169a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.6.1. Written Lab</NAME>
- <SECTION>s046</SECTION>
- <PAGE>170a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>4.7.1. Answers to Written Lab</NAME>
- <SECTION>s047</SECTION>
- <PAGE>177a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 5</NAME>
- <SECTION>s050</SECTION>
- <PAGE>181a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.1.1. Per-VLAN Spanning Tree (PVST)</NAME>
- <SECTION>s051</SECTION>
- <PAGE>183a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.1.2. Common Spanning Tree (CST)</NAME>
- <SECTION>s051</SECTION>
- <PAGE>184a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.1.3. Per-VLAN Spanning Tree+ (PVST+)</NAME>
- <SECTION>s051</SECTION>
- <PAGE>184b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.2.1. Determining the Root</NAME>
- <SECTION>s052</SECTION>
- <PAGE>186a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.2.2. Configuring the Root</NAME>
- <SECTION>s052</SECTION>
- <PAGE>186b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.2.3. Setting the Port Cost</NAME>
- <SECTION>s052</SECTION>
- <PAGE>191</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.2.4. Setting the Port Priority</NAME>
- <SECTION>s052</SECTION>
- <PAGE>193a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.2.5. Changing the STP Timers</NAME>
- <SECTION>s052</SECTION>
- <PAGE>197a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.1. Parallel Fast EtherChannel Links</NAME>
- <SECTION>s053</SECTION>
- <PAGE>199a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.2. EtherChannel Guidelines</NAME>
- <SECTION>s053</SECTION>
- <PAGE>200a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.3. Configuring EtherChannel</NAME>
- <SECTION>s053</SECTION>
- <PAGE>200b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.4. Port Aggregation Protocol (PAgP)</NAME>
- <SECTION>s053</SECTION>
- <PAGE>204a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.5. PortFast</NAME>
- <SECTION>s053</SECTION>
- <PAGE>205a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.6. PortFast Configuration</NAME>
- <SECTION>s053</SECTION>
- <PAGE>205b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.7. UplinkFast</NAME>
- <SECTION>s053</SECTION>
- <PAGE>206a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.8. UplinkFast Configuration</NAME>
- <SECTION>s053</SECTION>
- <PAGE>207a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.9. BackboneFast</NAME>
- <SECTION>s053</SECTION>
- <PAGE>209a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.3.10. Configuring and Verifying BackboneFast</NAME>
- <SECTION>s053</SECTION>
- <PAGE>209b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.4.1. Key Terms</NAME>
- <SECTION>s054</SECTION>
- <PAGE>210a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.4.2. Commands Used in This Chapter</NAME>
- <SECTION>s054</SECTION>
- <PAGE>211a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.5.1. Written Lab</NAME>
- <SECTION>s055</SECTION>
- <PAGE>213a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.6.1. Hands-On Lab</NAME>
- <SECTION>s056</SECTION>
- <PAGE>214a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>5.7.1. Answers to Written Lab</NAME>
- <SECTION>s057</SECTION>
- <PAGE>222a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 6</NAME>
- <SECTION>s060</SECTION>
- <PAGE>225a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.1.1. Multiple Links and A Single Trunked Link</NAME>
- <SECTION>s061</SECTION>
- <PAGE>227a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.1.2. Route Switch Modules (RSMs)</NAME>
- <SECTION>s061</SECTION>
- <PAGE>229a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.2.1. Configuring ISL</NAME>
- <SECTION>s062</SECTION>
- <PAGE>230a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.3.1. Key Terms</NAME>
- <SECTION>s063</SECTION>
- <PAGE>238a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.3.2. Commands Used in This Chapter</NAME>
- <SECTION>s063</SECTION>
- <PAGE>239a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.4.1. Written Lab</NAME>
- <SECTION>s064</SECTION>
- <PAGE>240a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.5.1. Lab 6.1: External Inter-VLAN Routing</NAME>
- <SECTION>s065</SECTION>
- <PAGE>241a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.5.2. Lab 6.2: Internal Inter-VLAN Routing</NAME>
- <SECTION>s065</SECTION>
- <PAGE>252a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>6.6.1. Answers to Written Lab</NAME>
- <SECTION>s066</SECTION>
- <PAGE>260a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 7</NAME>
- <SECTION>s070</SECTION>
- <PAGE>263a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.1. MLS Requirements</NAME>
- <SECTION>s071</SECTION>
- <PAGE>266a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.2. MLS Procedures</NAME>
- <SECTION>s071</SECTION>
- <PAGE>266b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.3. MLSP Discovery</NAME>
- <SECTION>s071</SECTION>
- <PAGE>268a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.4. XTAGs</NAME>
- <SECTION>s071</SECTION>
- <PAGE>269a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.5. MLS Cache</NAME>
- <SECTION>s071</SECTION>
- <PAGE>270a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.1.6. Disabling MLS</NAME>
- <SECTION>s071</SECTION>
- <PAGE>275a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.1. Enabling MLS</NAME>
- <SECTION>s072</SECTION>
- <PAGE>276a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.2. VTP Domain Assignments</NAME>
- <SECTION>s072</SECTION>
- <PAGE>276b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.3. VLAN Assignments</NAME>
- <SECTION>s072</SECTION>
- <PAGE>277a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.4. Interface Configurations</NAME>
- <SECTION>s072</SECTION>
- <PAGE>279a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.5. MSA Management Interface</NAME>
- <SECTION>s072</SECTION>
- <PAGE>279b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.6. Verifying the MLS Configuration</NAME>
- <SECTION>s072</SECTION>
- <PAGE>280a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.2.7. Access Lists</NAME>
- <SECTION>s072</SECTION>
- <PAGE>281a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.3.1. Enabling MLS on the MLS-SE</NAME>
- <SECTION>s073</SECTION>
- <PAGE>284a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.3.2. Cache Entries</NAME>
- <SECTION>s073</SECTION>
- <PAGE>284b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.3.3. Displaying the MLS Cache Entries</NAME>
- <SECTION>s073</SECTION>
- <PAGE>287a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.3.4. Removing MLS Cache Entries</NAME>
- <SECTION>s073</SECTION>
- <PAGE>288a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.4.1. Acceptable MLS Topologies</NAME>
- <SECTION>s074</SECTION>
- <PAGE>289a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.5.1. Key Terms</NAME>
- <SECTION>s075</SECTION>
- <PAGE>291a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.5.2. Commands Used in This Chapter</NAME>
- <SECTION>s075</SECTION>
- <PAGE>291b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.6.1. Written Lab</NAME>
- <SECTION>s076</SECTION>
- <PAGE>293a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.7.1. Hands-On Lab</NAME>
- <SECTION>s077</SECTION>
- <PAGE>294a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>7.8.1. Answers to Written Lab</NAME>
- <SECTION>s078</SECTION>
- <PAGE>301a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 8</NAME>
- <SECTION>s080</SECTION>
- <PAGE>305a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.1.1. Proxy ARP</NAME>
- <SECTION>s081</SECTION>
- <PAGE>307a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.1.2. Dynamic Routing Protocols</NAME>
- <SECTION>s081</SECTION>
- <PAGE>312a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.1.3. ICMP Router Discovery Protocol (IRDP)</NAME>
- <SECTION>s081</SECTION>
- <PAGE>313a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.2.1. Configuring HSRP</NAME>
- <SECTION>s082</SECTION>
- <PAGE>314a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.2.2. Active Router Properties</NAME>
- <SECTION>s082</SECTION>
- <PAGE>317a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.2.3. HSRP Tracking</NAME>
- <SECTION>s082</SECTION>
- <PAGE>318a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.3.1. HSRP with Multiple Groups</NAME>
- <SECTION>s083</SECTION>
- <PAGE>320a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.4.1. Key Terms</NAME>
- <SECTION>s084</SECTION>
- <PAGE>322a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.4.2. Commands Used in This Chapter</NAME>
- <SECTION>s084</SECTION>
- <PAGE>322b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.5.1. Written Lab</NAME>
- <SECTION>s085</SECTION>
- <PAGE>324a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.6.1. Hands-On Lab</NAME>
- <SECTION>s086</SECTION>
- <PAGE>325a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>8.7.1. Answers to Written Lab</NAME>
- <SECTION>s087</SECTION>
- <PAGE>336a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 9</NAME>
- <SECTION>s090</SECTION>
- <PAGE>339a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.1.1. Unicast</NAME>
- <SECTION>s091</SECTION>
- <PAGE>341a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.1.2. Broadcast</NAME>
- <SECTION>s091</SECTION>
- <PAGE>342a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.1.3. Multicast</NAME>
- <SECTION>s091</SECTION>
- <PAGE>343a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.2.1. Mapping IP Multicast to Ethernet</NAME>
- <SECTION>s092</SECTION>
- <PAGE>346a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.3.1. Subscribing and Maintaining Groups</NAME>
- <SECTION>s093</SECTION>
- <PAGE>351a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.3.2. Internet Group Management Protocol Version 1 (IGMPv1)</NAME>
- <SECTION>s093</SECTION>
- <PAGE>352a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.3.3. Internet Group Management Protocol Version 2 (IGMPv2)</NAME>
- <SECTION>s093</SECTION>
- <PAGE>355a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.3.4. Cisco Group Management Protocol (CGMP)</NAME>
- <SECTION>s093</SECTION>
- <PAGE>357a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.4.1. Distribution Trees</NAME>
- <SECTION>s094</SECTION>
- <PAGE>359a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.4.2. Managing Multicast Delivery</NAME>
- <SECTION>s094</SECTION>
- <PAGE>363a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.4.3. Time to Live (TTL)</NAME>
- <SECTION>s094</SECTION>
- <PAGE>364a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.4.4. Routing Protocols</NAME>
- <SECTION>s094</SECTION>
- <PAGE>365a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.4.5. Sparse Mode Routing Protocols</NAME>
- <SECTION>s094</SECTION>
- <PAGE>372a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>9.5.1. Key Terms</NAME>
- <SECTION>s095</SECTION>
- <PAGE>376a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 10</NAME>
- <SECTION>s100</SECTION>
- <PAGE>385a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.1.1. End-to-End IP Multicast</NAME>
- <SECTION>s101</SECTION>
- <PAGE>388a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.1. Enabling IP Multicast Routing</NAME>
- <SECTION>s102</SECTION>
- <PAGE>389a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.2. Enabling PIM on an Interface</NAME>
- <SECTION>s102</SECTION>
- <PAGE>391a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.3. Configuring a Rendezvous Point</NAME>
- <SECTION>s102</SECTION>
- <PAGE>395a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.4. Configuring TTL</NAME>
- <SECTION>s102</SECTION>
- <PAGE>398a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.5. Joining a Multicast Group</NAME>
- <SECTION>s102</SECTION>
- <PAGE>399a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.6. Changing the IGMP Version</NAME>
- <SECTION>s102</SECTION>
- <PAGE>402b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.2.7. Enabling CGMP</NAME>
- <SECTION>s102</SECTION>
- <PAGE>402a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.3.1. Key Terms</NAME>
- <SECTION>s103</SECTION>
- <PAGE>404a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.3.2. Commands Used in This Chapter</NAME>
- <SECTION>s103</SECTION>
- <PAGE>404b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.4.1. Written Lab</NAME>
- <SECTION>s104</SECTION>
- <PAGE>407a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.5.1. Hands-On Lab</NAME>
- <SECTION>s105</SECTION>
- <PAGE>408a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>10.6.1. Answers to Written Lab</NAME>
- <SECTION>s106</SECTION>
- <PAGE>420a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Introduction to Chapter 11</NAME>
- <SECTION>s110</SECTION>
- <PAGE>423a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.1.1. Applying Policies to the Hierarchical Model</NAME>
- <SECTION>s111</SECTION>
- <PAGE>425a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.1. Physical Security</NAME>
- <SECTION>s112</SECTION>
- <PAGE>426a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.2. Passwords</NAME>
- <SECTION>s112</SECTION>
- <PAGE>427a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.3. Privileged Levels</NAME>
- <SECTION>s112</SECTION>
- <PAGE>438a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.4. Banners</NAME>
- <SECTION>s112</SECTION>
- <PAGE>441a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.5. Limiting VTY Access</NAME>
- <SECTION>s112</SECTION>
- <PAGE>442a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.2.6. Controlling HTTP Access</NAME>
- <SECTION>s112</SECTION>
- <PAGE>443a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.3.1. Managing the MAC Address Table</NAME>
- <SECTION>s113</SECTION>
- <PAGE>444a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.4.1. Access Lists</NAME>
- <SECTION>s114</SECTION>
- <PAGE>447a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.4.2. Route Filtering</NAME>
- <SECTION>s114</SECTION>
- <PAGE>452a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.5.1. Key Terms</NAME>
- <SECTION>s115</SECTION>
- <PAGE>454a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.5.2. Commands Used in This Chapter</NAME>
- <SECTION>s115</SECTION>
- <PAGE>454b</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.6.1. Written Lab</NAME>
- <SECTION>s116</SECTION>
- <PAGE>456a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>11.7.1. Answers to Written Lab</NAME>
- <SECTION>s117</SECTION>
- <PAGE>462a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Commands Used in This Course</NAME>
- <SECTION>s0b0</SECTION>
- <PAGE>487a</PAGE>
- <DESC></DESC>
- </LINK>
- <LINK>
- <NAME>Internet Multicast Addresses</NAME>
- <SECTION>s0c0</SECTION>
- <PAGE>499a</PAGE>
- <DESC></DESC>
- </LINK>
- </LINKS>
-