Cisco IOS in a Nutshell 2nd ed Edition James Boney
Cisco IOS in a Nutshell 2nd ed Edition James Boney
Cisco IOS in a Nutshell 2nd ed Edition James Boney
Cisco IOS in a Nutshell 2nd ed Edition James Boney
1. Cisco IOS in a Nutshell 2nd ed Edition James Boney
download pdf
https://ebookfinal.com/download/cisco-ios-in-a-nutshell-2nd-ed-edition-
james-boney/
Visit ebookfinal.com today to download the complete set of
ebook or textbook!
2. Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Cisco IOS in a Nutshell A Desktop Quick Reference for IOS
on IP Networks 1st Edition James Boney
https://ebookfinal.com/download/cisco-ios-in-a-nutshell-a-desktop-
quick-reference-for-ios-on-ip-networks-1st-edition-james-boney/
Java in a nutshell 2nd ed Edition David Flanagan
https://ebookfinal.com/download/java-in-a-nutshell-2nd-ed-edition-
david-flanagan/
Cisco IOS Cookbook 2nd Edition Cookbooks O Reilly Kevin
Dooley
https://ebookfinal.com/download/cisco-ios-cookbook-2nd-edition-
cookbooks-o-reilly-kevin-dooley/
LPI Linux Certification in a Nutshell 2nd ed Edition
Steven Pritchard
https://ebookfinal.com/download/lpi-linux-certification-in-a-
nutshell-2nd-ed-edition-steven-pritchard/
3. C in a Nutshell 1st ed Edition Ray Lischner
https://ebookfinal.com/download/c-in-a-nutshell-1st-ed-edition-ray-
lischner/
UML 2 0 in a Nutshell 1st ed Edition Dan Pilone
https://ebookfinal.com/download/uml-2-0-in-a-nutshell-1st-ed-edition-
dan-pilone/
Python in a nutshell Second Edition Alex Martelli
https://ebookfinal.com/download/python-in-a-nutshell-second-edition-
alex-martelli/
SQL in a Nutshell 3rd Edition Kevin Kline
https://ebookfinal.com/download/sql-in-a-nutshell-3rd-edition-kevin-
kline/
Quantum Field Theory in a Nutshell Second Edition A. Zee
https://ebookfinal.com/download/quantum-field-theory-in-a-nutshell-
second-edition-a-zee/
5. Cisco IOS in a Nutshell 2nd ed Edition James Boney
Digital Instant Download
Author(s): James Boney
ISBN(s): 9780596008697, 0596008694
Edition: 2nd ed
File Details: PDF, 3.05 MB
Year: 2005
Language: english
6. 1
Cisco IOS in a Nutshell, 2nd Edition
By James Boney
...............................................
7. 2
Publisher: O'Reilly
Pub Date: August 2005
ISBN: 0-596-00869-4
Pages: 796
Overview
Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to
equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly
70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the
product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.
If you work with Cisco routers, it's likely that you deal with Cisco's IOS software--an extremely powerful and complex operating
system, with an equally complex configuration language. With a cryptic command-line interface and thousands of commands--some
of which mean different things in different situations--it doesn't have a reputation for being user-friendly.
Fortunately, there's help. This second edition of Cisco IOS in a Nutshell consolidates the most important commands and features of
IOS into a single, well-organized volume that you'll find refreshingly user-friendly.
This handy, two-part reference covers IOS configuration for the TCP/IP protocol family. The first section includes chapters on the
user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. A brief,
example-filled tutorial shows you how to accomplish common tasks.
8. 3
The second part is a classic O'Reilly quick reference to all the commands for working with TCP/IP and the lower-level protocols on
which it relies. Brief descriptions and lists of options help you zero in on the commands you for the task at hand. Updated to cover
Cisco IOS Software Major Release 12.3, this second edition includes lots of examples of the most common configuration steps for the
routers themselves. It's a timely guide that any network administrator will come to rely on.
Table of Contents
Copyright Preface Organization What's New in This Edition Conventions Safari Enabled We'd Like to
Hear from You Acknowledgments Chapter 1. Getting Started Section 1.1. IOS User Modes Section 1.2.
Command-Line Completion Section 1.3. Get to Know the Question Mark Section 1.4. Command-Line Editing Keys
Section 1.5. Pausing Output Section 1.6. show Commands Chapter 2. IOS Images and Configuration Files Section
2.1. IOS Image Filenames Section 2.2. The New Cisco IOS Packaging Model Section 2.3. Loading Image Files Through
the Network Section 2.4. Using the IOS Filesystem for Images Section 2.5. The Router's Configuration Section 2.6.
Loading Configuration Files Chapter 3. Basic Router Configuration Section 3.1. Setting the Router Name Section
3.2. Setting the System Prompt Section 3.3. Configuration Comments Section 3.4. The Enable Password Section
3.5. Mapping Hostnames to IP Addresses Section 3.6. Setting the Router's Time Section 3.7. Enabling SNMP
Section 3.8. Cisco Discovery Protocol Section 3.9. System Banners Chapter 4. Line Commands Section 4.1. The
line Command Section 4.2. The Console Port Section 4.3. Virtual Terminals (VTYs) Section 4.4. Asynchronous
Ports (TTYs) Section 4.5. The Auxiliary (AUX) Port Section 4.6. show line Section 4.7. Reverse Telnet
Section 4.8. Common Configuration Items Chapter 5. Interface Commands Section 5.1. Naming and Numbering
Interfaces Section 5.2. Basic Interface Configuration Commands Section 5.3. The Loopback Interface Section 5.4.
The Null Interface Section 5.5. Ethernet, Fast Ethernet, and Gigabit Ethernet Interfaces Section 5.6. Token Ring
Interfaces Section 5.7. ISDN Interfaces Section 5.8. Serial Interfaces Section 5.9. Asynchronous Interfaces
Section 5.10. Interface show Commands Chapter 6. Networking Technologies Section 6.1. Frame Relay Section
6.2. ATM Section 6.3. DSL Section 6.4. Cable Section 6.5. VoIP Chapter 7. Access Lists Section 7.1.
How Packets Match a List Entry Section 7.2. Types of Access Lists Section 7.3. Specific Topics Chapter 8. IP
Routing Topics Section 8.1. Autonomous System (AS) Numbers Section 8.2. Interior and Exterior Gateway Protocols
Section 8.3. Distance-Vector and Link-State Routing Protocols Section 8.4. Static Routes Section 8.5. Split Horizon
11. 6
fddi t-out fddi valid-transmission-time flowcontrol format frame-relay adaptive-shaping frame-relay [ bc |
be] frame-relay becn-response-enable frame-relay broadcast-queue frame-relay cir frame-relay class frame-
relay custom-queue-list frame-relay de-group frame-relay de-list frame-relay idle-timer frame-relay interface-
dlci frame-relay intf-type frame-relay inverse-arp frame-relay ip rtp header-compression frame-relay ip tcp
header-compression frame-relay lmi-type frame-relay local-dlci frame-relay map frame-relay map bridge
frame-relay map clns frame-relay map ip compress frame-relay map ip rtp header-compression frame-relay map ip tcp
header-compression frame-relay mincir frame-relay multicast-dlci frame-relay payload-compress packet-by-packet
frame-relay priority-dlci-group frame-relay priority-group frame-relay route frame-relay svc frame-relay
switching frame-relay traffic-rate frame-relay traffic-shaping fsck ftp-server enable ftp-server topdir
full-duplex full-help group-range half-duplex half-duplex controlled-carrier help history hold-
character hold-queue hostname hssi external-loop-request hssi internal-clock hub ignore-dcd
interface interface bvi interface dialer interface group-async ip access-group ip access-list ip
accounting ip accounting-list ip accounting-threshold ip accounting-transits ip address ip address
negotiated ip address-pool ip alias ip as-path access-list ip authentication ip bandwidth-percent eigrp
ip bgp-community new-format ip bootp server ip broadcast-address ip cef ip cef traffic-statistics ip cgmp
ip classless ip community-list ip default-gateway ip default-network ip dhcp-server ip directed-
broadcast ip domain-list ip domain-lookup ip domain-name ip dvmrp accept-filter ip dvmrp auto-
summary ip dvmrp default-information ip dvmrp metric ip dvmrp metric-offset ip dvmrp output-report-delay
ip dvmrp reject-non-pruners ip dvmrp routehog-notification ip dvmrp route-limit ip dvmrp summary-address ip
dvmrp unicast-routing ip forward-protocol ip ftp passive ip ftp password ip ftp source-interface ip ftp
username ip hello-interval eigrp ip helper-address ip hold-time eigrp ip host ip http ip identd ip
igmp access-group ip igmp explicit-tracking ip igmp helper-address ip igmp join-group ip igmp query-interval
ip igmp query-max-response-time ip igmp query-timeout ip igmp static-group ip igmp version ip irdp ip
load-sharing ip local policy route-map ip local pool ip mask-reply ip mroute ip mroute-cache ip mtu
ip multicast boundary ip multicast cache-headers ip multicast helper-map ip multicast rate-limit ip multicast-
routing ip multicast ttl-threshold ip name-server ip nat ip nat inside destination ip nat inside source ip
nat outside source ip nat pool ip nat stateful id ip nat translation ip nbar pdlm ip nbar port-map ip nbar
protocol-discovery ip netmask-format ip nhrp authentication ip nhrp holdtime ip nhrp interest ip nhrp map
ip nhrp map multicast ip nhrp max-send ip nhrp network-id ip nhrp nhs ip nhrp record ip nhrp
responder ip nhrp server-only ip nhrp trigger-svc ip nhrp use ip ospf authentication ip ospf authentication-
key ip ospf cost ip ospf dead-interval ip ospf demand-circuit ip ospf hello-interval ip ospf message-digest-
12. 7
key ip ospf name-lookup ip ospf network ip ospf priority ip ospf retransmit-interval ip ospf transmit-delay
ip pim ip pim accept-rp ip pim message-interval ip pim minimum-vc-rate ip pim multipoint-signalling ip
pim nbma-mode ip pim neighbor-filter ip pim query-interval ip pim rp-address ip pim rp-announce-filter ip
pim send-rp-announce ip pim send-rp-discovery ip pim vc-count ip pim version ip policy-list ip policy
route-map ip proxy-arp ip radius source-interface ip rarp-server ip rcmd rcp-enable ip rcmd remote-host
ip rcmd remote-username ip rcmd rsh-enable ip redirects ip rip authentication ip rip receive version ip rip
send version ip rip triggered ip rip v2-broadcast ip route ip route-cache ip route-cache policy ip route
priority high ip route profile ip router isis ip routing ip rtp compression-connections ip rtp header-
compression ip rtp priority ip scp server enable ip source-route ip split-horizon ip ssh ip subnet-zero
ip summary-address eigrp ip summary-address rip ip tcp chunk-size ip tcp compression-connections ip tcp
header-compression ip tcp mtu-path-discovery ip tcp queuemax ip tcp synwait-time ip tcp window-size ip
telnet source-interface ip tftp source-interface ip unnumbered ip unreachables isdn answer1, isdn answer2
isdn autodetect isdn bchan-number-order isdn busy isdn caller isdn call interface isdn calling-number
isdn conference-code isdn disconnect interface isdn fast-rollover-delay isdn incoming-voice isdn leased-line bri
128 isdn not-end-to-end isdn nsf-service isdn outgoing-voice isdn overlap-receiving isdn send-alerting
isdn sending-complete isdn service isdn spid1 (spid2) isdn switch-type isdn tei isdn tei-negotiation
isdn transfer-code isdn twait-disable isdn voice-priority isis advertise-prefix isis authentication key-chain
isis authentication mode isis authentication send-only isis circuit-type isis csnp-interval isis hello-interval
isis hello-multiplier isis lsp-interval isis metric isis password isis priority isis retransmit-interval isis
retransmit-throttle-interval is-type keepalive key key chain key config-key key-string lane auto-
config-atm-address lane bus-atm-address lane client lane client-atm-address lane config-atm-address lane
config database lane database lane fixed-config-atm-address lane global-lecs-address lane le-arp lane
server-atm-address lane server-bus line linecode link-test location logging logging buffered
logging buffered xml logging console logging console xml logging count logging facility logging history
logging history size logging host logging monitor logging on logging source-interface logging
synchronous logging trap login login authentication logout-warning loopback mac-address-table
aging-time mac-address-table dynamic mac-address-table secure mac-address-table static map-class dialer
map-class frame-relay map-group map-list match access-group match any match as-path match class-
map match community-list match cos match destination-address mac match discard-class match dscp
match fr-dlci match input-interface match interface match ip address match ip dscp match ip next-hop
match ip precedence match ip route-source match ip rtp match length match metric match mpls
13. 8
experimental match mpls-label match not match packet length match precedence match protocol
match qos-group match route-type match source-address mac match tag maximum-paths max-reserved-
bandwidth media-type member menu menu command menu text menu title metric holddown
metric maximum-hops metric weights mkdir modem monitor session more motd-banner mpls
atm control-vc mpls atm cos mpls atm disable-headend-vc mpls atm multi-vc mpls atm vpi mpls atm vp-
tunnel mpls cos-map mpls ip mpls ip default-route mpls ip encapsulate explicit-null mpls ip ttl-expiration
pop mpls label protocol mpls label range mpls mtu mpls prefix-map mpls request-labels for mrinfo
mstat mtrace mtu name elan-id name local-seg-id name preempt name server-atm-address
neighbor neighbor advertisement-interval neighbor database-filter neighbor default-originate neighbor
description neighbor distribute-list neighbor filter-list neighbor maximum-prefix neighbor next-hop-self
neighbor password neighbor peer-group neighbor prefix-list neighbor remote-as neighbor route-map
neighbor route-reflector-client neighbor send-community neighbor send-label neighbor shutdown neighbor soft-
reconfiguration inbound neighbor ttl-security neighbor timers neighbor ttl-security neighbor update-source
neighbor version neighbor weight net network network backdoor network weight nrzi-encoding
ntp access-group ntp authenticate ntp authentication-key ntp broadcast ntp broadcast client ntp
broadcastdelay ntp disable ntp master ntp peer ntp server ntp source ntp trusted-key ntp update-
calendar offset-list ospf auto-cost reference-bandwidth ospf log-adj-changes output-delay padding
parity passive-interface password peer default ip address peer neighbor-route physical-layer ping
police policy-map ppp ppp authentication ppp bridge ip ppp chap ppp compress ppp multilink
ppp quality ppp reliable-link ppp use-tacacs priority-group priority-list privilege level (global)
privilege level (line) prompt pulse-time pvc qos pre-classify queue-limit queue-list radius-
server random-detect random-detect discard-class random-detect discard-class-based random-detect dscp
random-detect ecn random-detect exponential-weighting-constant random-detect flow rate-limit redistribute
refuse-message reload rename ring-speed rlogin rmdir route-map router rsh
rxspeed send service service compress-config service linenumber service-module 56k service-module
t1 service-policy (interface) service-policy (policy-map) service timestamps session-limit session-timeout
set as-path set atm-clp set automatic-tag set community set cos set default interface set discard-
class set dscp set fr-de set interface set ip default next-hop set ip next-hop set ip precedence set ip
tos set level set local-preference set metric set metric-type set metric-type internal set mpls-label
set origin set ospf router-id set-overload-bit set precedence set qos-group set tag setup set
weight shape show shutdown smt-queue-threshold snapshot snmp-server snmp-server chassis-
15. 10
O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles
(safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or
corporate@oreilly.com.
Editors: Mike Loukides and Debra Cameron
Production Editor: Jamie Peppard
Cover Designer: Ellie Volckhausen
Interior Designer: David Futato
Printing History:
January 2002: First Edition.
August 2005: Second Edition.
Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. Cisco IOS in
a Nutshell, the image of donkey, and related trade dress are trademarks of O'Reilly Media, Inc.
Cisco IOS and all Cisco-based trademarks are registered trademarks of Cisco Systems, Inc. in the United States and other countries.
O'Reilly Media is independent of Cisco Systems, Inc.
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those
designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps
or initial caps.
While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or
omissions, or for damages resulting from the use of the information contained herein.
ISBN: 0-596-00869-4
16. 11
[M]
Preface
This is a book for everybody who has to deal with Cisco's routers.
As you well know, Cisco Systems has created an extremely diverse line of routers and other network products. One unifying thread
runs through the product line: virtually all of Cisco's products run the Internetwork Operating System (IOS). This is both a great
advantage and a great disadvantage. On the one hand, when you're familiar with one Cisco router, you're reasonably familiar with
them all. Someone using a small DSL router in a home office could look at a configuration file for a high-end router at an ISP and not
be lost. He might not understand how to configure the more esoteric routing protocols or high-speed network interfaces, but he'd be
looking at a language that was recognizably the same.
On the other hand, this uniformity means that just about everything has been crammed into IOS at one time or another. IOS is
massivethere's no other way to say it. And it has evolved over many years. The command-line interface isn't graceful, and is often
non-uniform: many commands don't do what you think they should, and the same command verbs can mean completely different
things in different contexts. This inconsistency is probably a natural result of evolution at an extremely large company with an
extremely large number of developers, but it doesn't make life any easier.
So, where do you find out what commands you need to know? There's the almost mythical "green wall" of Cisco documentation, but
it's difficult to find what you need in tens of thousands of pages. Of course, even getting to Cisco's online documentation may be
impossible if your router doesn't work. And the volume of documentation is imposing. A search for ip cef traffic-statisticsnot
one of the more frequently used commandsyields 163 hits. How do you get to the right one? Beats me. That's why I wrote this book.
This book is primarily a quick reference to the commands that are most frequently needed to configure Cisco routers for standard IP
routing tasks. There are plenty of weasel words in there, and they're needed. This is far from a complete quick ref to all of IOSsuch a
quick ref would probably be well over 2000 pages long, clearly too long to be useful. Therefore, I haven't attempted to cover protocols
other than IP (although there is support for everything from AppleTalk to SNA), nor any of the more exotic creatures in the IP space.
And even in areas I have covered thoroughly, I was still forced to exclude commands that are useful only in limited cases.
17. 12
Above all, this is a network administrator's book: it represents practical experience with IP routing on Cisco routers and covers the
commands that you're likely to need. No doubt some readers will disagree with the choices I've made, such disagreement is inevitable.
But though you occasionally won't find information about a command you need to use, you will far more often find, at your fingertips,
precisely what you need to know.
More than anything else, the goal of this book is to give you information quickly. It aspires not to give you in-depth knowledge of how
IP routing works, but to help you remember what arguments you need to give to the snmp-server enable traps command, or to
help you scan through the many commands that start with ip to jog your memory about which one configures the forwarding of
broadcast packets to selected subnets. If I succeed in doing that, I'm happy.
Organization
This book consists primarily of two parts. The first could be considered a tutorial, but that doesn't quite capture its purpose. I try to
teach the basic principles behind configuring the router, but there are many other sources for that information (for example, Scott
Ballew's Managing IP Networks with Cisco Routers, or Kevin Dooley and Ian J. Brown's Cisco Cookbook, both from O'Reilly). This
part of the book quickly breezes through as many examples of different configuration tasks as possible. I provide explanations, but the
focus is on the examples. By studying them, you'll see how to accomplish many of the tasks involved in setting up a router.
The bulk of the book is the quick reference. There's nothing fancy here, it's organized alphabetically and shows the commands that I
felt were most useful to someone using a Cisco router in an IP environment.
What's New in This Edition
In this edition, we updated the book with features that were integrated into Cisco's latest major IOS release, 12.3, along with highlights
from minor release 12.4. Some of the new features you'll find are AutoSecure, AutoQoS, and the new IOS naming model. We've also
expanded other sections to include IS-IS routing, MPLS, and some new hardware types. Previously neglected topics such as quality-
of-service and multicast routing have been expanded (a new chapter, Chapter 11, covers quality-of-service; multicasting is discussed
in Chapter 13). You'll also find a new appendix that covers IP subnetting, the OSI network model, and other useful nuggets.
18. 13
We've broken from our previous mantra of "routing-only topics" to include VLANs and switching, adding a new chapter on these
topics (Chapter 14). Since the book was first written, routing and switching have come quite a long way; switches are a pretty
fundamental part of Cisco's product line. And now, you'll find IOS on most of their newer switches instead of CatOS.
This book has grown substantially since its first edition. And I hope you'll find that its usefulness has grown as well.
Conventions
The following conventions are used in this book:
Italic
Used for filenames, URLs, and occasionally for emphasis or clarity
Constant width
Used for commands, command keywords, and anything else that has to be typed literally
Constant width italic
Used for parameters or arguments that must be substituted in commands
Constant width bold
19. 14
Used for user input
[Keywords and other stuff]
Used for optional keywords and arguments
{choice-1 | choice-2}
Used to signify either choice-1 or choice-2
This icon signifies a tip relating to the nearby text.
This icon indicates a warning relating to the nearby text.
One of the confusing things about working with a Cisco router is the notion of a command context. Most commands are legal only in
limited situations; all of the quick-reference entries include a command context that indicates how the command is to be used. A
context of "command" means that the command is for interactive use and is not entered into the router's configuration; you do not
need to enter the configuration mode (configure terminal) to give the command, and you can't include it in a configuration file that
you upload. A context of "global" indicates that a command doesn't require any specific context; you can give it as soon as you've
entered the configuration mode. A context of "interface" indicates that you must be in the interface configuration submode to give the
command; "line" means that you must be in the line configuration submode, and so on.
20. 15
IOS has no concept of a continuation character for breaking up command lines that are too long. That may be okay for a router, but it's
a problem for a book; still, I've decided not to invent a continuation character for the purposes of this book. I've split long commands
across lines as it seemed most convenient and clear; just remember that you have to type it all on one line.
Safari Enabled
When you see a Safari® Enabled icon on the cover of your favorite technology book, that means the book is available
online through the O'Reilly Network Safari Bookshelf.
Safari offers a solution that's better than e-books. It's a virtual library that lets you easily search thousands of top tech books, cut and
paste code samples, download chapters, and find quick answers when you need the most accurate, current information. Try it free at
http://safari.oreilly.com.
We'd Like to Hear from You
Please address comments and questions concerning this book to the publisher:
O'Reilly Media, Inc.
1005 Gravenstein Highway North
Sebastopol, CA 95472
(800) 998-9938 (in the United States or Canada)
(707) 829-0515 (international or local)
(707) 829-0104 (fax)
There is a web page for this book, which lists errata and any additional information. You can access this page at:
http://www.oreilly.com/catalog/cisiosnut2/
21. 16
To comment or ask technical questions about this book, send email to:
bookquestions@oreilly.com
For more information about books, conferences, Resource Centers, and the O'Reilly Network, see the O'Reilly web site at:
http://www.oreilly.com
Acknowledgments
As I began to plan the second edition of this book, I proclaimed that this time the writing would be effortless. I reassured everyone that
the book would be completed very quickly. Evidently, I had tossed away lessons learned from the previous writing experience.
As it turned out, this edition wasn't easy or quick. Looking back, this edition proved to be every bit as long a journey as the first one.
Now that the journey is over, I'd like to thank the people who helped me along the way.
I wish to thank my editors for their heroic efforts. For the first edition, Mike Loukides performed a great deal of work and provided
fantastic guidance. Without him, this book would not exist today. For the second edition, I owe editor Deb Cameron a tremendous
amount of gratitude. Besides being a terrific editor, she displayed a depth of patience when faced with my seemingly natural ability for
procrastination. Without her help and hard work, this second edition would never have been completed.
I'd like to thank all the reviewers from the first edition: Terry Slattery, Scott Ballew, Kevin Kelleher, Kennedy Clark, Val
Pavlichenko, and Duke Meesuk. For the second edition, new reviewers provided invaluable feedback and deserve my thanks: Trey
McMahon, Kevin Dooley, Ian J. Brown, and Theodore Wallingford. You guys went above and beyond the call of duty.
I'd like to thank my wife Peggy. Once again, she provided moral support. And she had to listen to me say, countless times, "I have to
go work on the new book," which she probably found significantly more irritating than before. Also, she had the added strenuous task
of watching our beautiful little daughter while I wrote this edition.
22. 17
Finally, I need to rectify a glaring omission from the acknowledgments in the first edition. I'd like to thank my parents, George and
Gail Boney. Not only did they tolerate me for the last thirty-three years, but they provided an endless amount of support, which would
be too much to quantify and impossible to repay.
Chapter 1. Getting Started
In the first edition of this book, I may have dated myself a bit by starting this chapter off with the following paragraph:
The modern world is networked in a way that could barely be imagined a few decades ago. Today, the Internet reaches into virtually
every business and almost every home. Our children and even our grandparents speak of dot-coms, email, and web sites. The Internet
is now part of our culture.
Almost four years have passed since then, which does not seem like much time at all. But in the networking and computer fields, that's
a very long time indeed. Our children and grandparents now speak of dot-bombs, MP3s, broadband, voice over IP, instant messaging,
and outsourcing. Even the once-killer app email has been surpassed by the gratification of instant messaging. Things have certainly
changed, which leaves us to wonder what the next few years will bring.
No matter what happens, Cisco is likely to continue its dominance of the networking world. Even that little router sitting on your cable
or DSL connection at home could very well be a Cisco device. Routers and switches are the glue that holds the Internet together. And
Cisco is the most prominent router manufacturer, holding the largest share of the market. Their routers come in all shapes and sizes,
from inexpensive units for homes and small offices to equipment that costs hundreds of thousands of dollars, used by very large ISPs
and telcos. Almost all of their devicesfrom the smallest to the largestrun the Internetwork Operating System (IOS) . Therefore, they
share the same command set, the same user interface, and the same configuration techniques. While a small home network router
doesn't have the features or the capacity of an ISP's router, you configure them pretty much the same way. Both routers use access
lists, have similar security mechanisms, support the same set of protocols in the same way, and so on.
As Cisco continues developing its product line, it's clear that the Internetwork Operating System (IOS) is a key part of its strategy. As
new products come out, they all have the familiar IOS interface.
23. 18
IOS is an extremely powerful and complex operating system with an equally complex configuration language. There are many
commands, with many options, and if you get something wrong you can easily take your company offline. That's why I've decided to
provide a quick-reference guide to IOS. As large a book as this is, though, it's impossible to cover all of IOS. Therefore, I've limited
the discussion to IOS configuration for the TCP/IP protocol family. I've included all the commands that you need to work with TCP/IP
and the lower-level protocols on which it relies. In the last edition, I apologized for not including other protocols such as IPX due to
the lack of space in a handy reference. Today, there is hardly a need for such an apology, as TCP/IP has become the standard
networking protocol for all but the most legacy network environments.
This book is intended as a quick reference, not as a step-by-step exposition of routing protocols or as an IOS tutorial. I haven't focused
on thorough explanation; instead, I've tried to give lots of examples of the things people most frequently need to do when configuring
a Cisco router, with just enough explanation to get you by. I'll start with the user interface (Chapters 1, 2, and 3), then talk about
configuring lines and interfaces (Chapters 4, 5, and 6), access lists (Chapter 7), and routing protocols (Chapters 8, 9, and 10). Chapter
11, new in this edition, addresses quality of service issues, while Chapter 12 describes dial-on-demand routing. Chapter 13 covers a
variety of networking topics, including bridging, Network Address Translation (NAT), tunnels, and Multiprotocol Label Switching
(MPLS). Chapter 14, also new to this edition, describes working with switches and VLANs. Chapters 15 and 16 cover IOS security
and troubleshooting, respectively. Chapter 17 is the quick reference. Chances are, by the time the next edition of this book appears, the
quick-reference section will be pretty well thumbed and worn out.
At first, the Cisco user interface appears cryptic. After learning the interface's structure, you'll become much more comfortable with it.
Once you have learned some special features, you'll be able to work with the router's configuration easily.
1.1. IOS User Modes
IOS has two primary modes of operation: user mode and privileged mode. When you first connect to the router, you are placed in user
mode. The Cisco documentation refers to this as the user exec mode; I am going to omit "exec" throughout this book. The user mode
is indicated by the prompt:
Router>
24. 19
The word "Router" is replaced with your router's hostname if the hostname is already configured.
The show commands in user mode are limited to a few basic levels. You cannot edit or view configurations at this stage; you can only
view the router status and other miscellaneous information. To obtain a basic listing of commands, type a question mark:
Router>?
Editing the router's configuration requires you to be in the privileged exec mode, which I call "privileged mode ." Use the enable
command to enter this mode:
Router>enable
Password:
Router# Privileged mode prompt
You can always tell whether you are in user mode or privileged mode by looking at the prompt. The user mode prompt has a > at the
end; the privileged mode prompt always has a # at the end, regardless of the submode.
If you are familiar with Unix, you can equate privileged mode to "root" access. You could also equate it to the administrator level in
Windows 2000 or the supervisor in NetWare. In this mode, you have permission to access everything inside the router, including
configuration commands. However, you can't type configuration commands directly. Before you can change the router's actual
configuration, you must enter a submode of the privileged mode by giving the command configure terminal (see "Command-Line
Completion" later in this chapter for a shortcut). This command can be entered only when you are in privileged mode.
Router#configure terminal
Enter configuration commands, one per line. End with Ctrl-Z
25. 20
Router(config)# Configuration mode
To exit configuration mode, you can use the command exit or type Ctrl-z. To exit privileged mode, you can use the disable
command. So to exit both configuration and enable mode, use the following sequence of commands:
Router(config)#exit
Router#disable
Router>
Privileged mode has several submodes in addition to configuration mode; each has its own prompt. To enter these submodes, you
must first enter configuration mode by giving the configure terminal command. Here's a summary of the most common modes and
prompts (there are many others):
Global configuration mode
Prompt: Router(config)#
This level allows you to enter commands directly into the router configuration. From this level, you can enter any of the other
three levels listed here. Once you are done entering commands into the configuration, use Ctrl-z, exit, or the end command to
return to the privileged prompt. The device's hostname is a good example of a configuration item you would find in the global
configuration mode .
Interface configuration mode
Prompt: Router(config-if)#
27. INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
28. remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
29. small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
30. Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
31. Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookfinal.com