Introduction |
|
xix | |
Assessment |
|
xxxi | |
Chapter 1 Cisco Solutions for Remote Access |
|
1 | (48) |
|
|
2 | (21) |
|
|
3 | (11) |
|
WAN Encapsulation Protocols |
|
|
14 | (2) |
|
|
16 | (7) |
|
Choosing Remote Connection Cisco Products |
|
|
23 | (3) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Cabling and Assembling the WAN |
|
|
26 | (13) |
|
Internetworking Overview and Remote Access Interface Options |
|
|
26 | (2) |
|
Identifying Company Site Equipment |
|
|
28 | (7) |
|
Verifying a Network Installation |
|
|
35 | (4) |
|
|
39 | (1) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (3) |
|
|
46 | (1) |
|
Answers to Review Questions |
|
|
47 | (2) |
Chapter 2 Asynchronous Connections |
|
49 | (28) |
|
Understanding Asynchronous Modems |
|
|
50 | (8) |
|
|
53 | (2) |
|
|
55 | (3) |
|
Configuring Asynchronous Modem Connections |
|
|
58 | (7) |
|
|
58 | (4) |
|
|
62 | (3) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (3) |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (3) |
|
|
74 | (1) |
|
Answers to Review Questions |
|
|
75 | (2) |
Chapter 3 Point-to-Point Protocol |
|
77 | (44) |
|
PPP Overview and Architecture |
|
|
78 | (4) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (2) |
|
|
82 | (1) |
|
The Frame Check Sequence (FCS) Field |
|
|
82 | (1) |
|
Configuring Access Servers |
|
|
82 | (9) |
|
|
82 | (1) |
|
Dedicated or Interactive PPP |
|
|
83 | (1) |
|
Interface Addressing Options for Local Devices |
|
|
83 | (8) |
|
PAP and CHAP Authentication |
|
|
91 | (2) |
|
Password Authentication Protocol (PAP) |
|
|
91 | (1) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
92 | (1) |
|
|
93 | (4) |
|
PPP Compression and Multilink |
|
|
97 | (4) |
|
Compression Configuration |
|
|
98 | (1) |
|
|
99 | (2) |
|
Verifying and Troubleshooting PPP |
|
|
101 | (8) |
|
The debug ppp authentication Command |
|
|
101 | (1) |
|
The debug ppp negotiation Command |
|
|
102 | (4) |
|
The debug ppp packet Command |
|
|
106 | (3) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
Lab 3.1: PPP and DHCP Configuration |
|
|
112 | (2) |
|
|
114 | (3) |
|
|
117 | (1) |
|
Answers to Review Questions |
|
|
118 | (3) |
Chapter 4 Using Microsoft Windows 95/98/2000/XP |
|
121 | (26) |
|
Reasons to Use Dial-Up Networking |
|
|
122 | (1) |
|
Configuring Dial-Up Networking with Windows 95/98 |
|
|
123 | (1) |
|
Configuring a Dial-Up Connection Client |
|
|
124 | (11) |
|
Dial-Up Networking Application |
|
|
124 | (1) |
|
Make New Connection Wizard |
|
|
125 | (2) |
|
|
127 | (8) |
|
Setting Additional Configuration Options |
|
|
135 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Verifying a Dial-Up Connection |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
140 | (4) |
|
Answers to Review Questions |
|
|
144 | (1) |
|
|
145 | (2) |
Chapter 5 Integrated Services Digital Network (ISDN) |
|
147 | (64) |
|
What Is Integrated Services Digital Network (ISDN)? |
|
|
149 | (1) |
|
|
150 | (4) |
|
Basic Rate Interface (BRI) |
|
|
151 | (2) |
|
Primary Rate Interface (PRI) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (3) |
|
|
160 | (3) |
|
ISDN Call Setup and Teardown |
|
|
163 | (3) |
|
|
166 | (5) |
|
|
171 | (4) |
|
Password Authentication Protocol (PAP) |
|
|
171 | (2) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
173 | (2) |
|
Dial-on-Demand Routing (DDR) |
|
|
175 | (6) |
|
|
176 | (3) |
|
|
179 | (1) |
|
Using DDR with Access Lists |
|
|
179 | (1) |
|
Verifying the ISDN Operation |
|
|
180 | (1) |
|
|
181 | (9) |
|
|
181 | (2) |
|
|
183 | (7) |
|
|
190 | (2) |
|
Channelized T-1/E-1 (PRI) |
|
|
192 | (3) |
|
|
192 | (2) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (7) |
|
|
197 | (3) |
|
Lab 5.2: Configuring PRI and BRI |
|
|
200 | (4) |
|
|
204 | (4) |
|
Answers to Review Questions |
|
|
208 | (1) |
|
|
209 | (2) |
Chapter 6 Remote Access with Digital Subscriber Line |
|
211 | (20) |
|
What is Digital Subscriber Line? |
|
|
212 | (1) |
|
The Different Flavors of DSL |
|
|
213 | (4) |
|
Asymmetric Digital Subscriber Line |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (4) |
|
|
228 | (1) |
|
|
228 | (1) |
|
Answers to Review Questions |
|
|
229 | (2) |
Chapter 7 Remote Access with Cable Modems and Virtual Private Networks |
|
231 | (20) |
|
|
232 | (2) |
|
|
233 | (1) |
|
Cisco's Cable Modem Product Line |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
235 | (5) |
|
|
235 | (5) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (2) |
|
|
244 | (3) |
|
|
247 | (1) |
|
|
248 | (2) |
|
Answers to Review Questions |
|
|
250 | (1) |
Chapter 8 Frame Relay |
|
251 | (40) |
|
Understanding Frame Relay. |
|
|
252 | (1) |
|
|
252 | (1) |
|
A Brief History of Frame Relay |
|
|
253 | (1) |
|
Frame Relay Virtual Circuits |
|
|
253 | (2) |
|
Switched Virtual Circuits |
|
|
254 | (1) |
|
Permanent Virtual Circuits |
|
|
255 | (1) |
|
Data Link Connection Identifier (DLCI) |
|
|
255 | (3) |
|
|
256 | (2) |
|
Frame Relay Local Management Interface (LMI) |
|
|
258 | (1) |
|
|
259 | (1) |
|
Frame Relay Congestion Control |
|
|
260 | (3) |
|
Factors Affecting Performance |
|
|
260 | (1) |
|
Congestion Handling by Frame Relay Switches |
|
|
261 | (1) |
|
Congestion Handling by Routers |
|
|
262 | (1) |
|
Point-to-Point and Multipoint Interfaces |
|
|
263 | (3) |
|
|
266 | (4) |
|
The show interface Command |
|
|
266 | (1) |
|
The show frame-relay pvc Command |
|
|
267 | (1) |
|
The show frame-relay map Command |
|
|
268 | (1) |
|
The show frame-relay lmi Command |
|
|
269 | (1) |
|
The debug frame-relay lmi Command |
|
|
269 | (1) |
|
|
270 | (4) |
|
Frame Relay Switching Commands |
|
|
271 | (3) |
|
Frame Relay Traffic Shaping |
|
|
274 | (3) |
|
Using Traffic Shaping Techniques |
|
|
274 | (1) |
|
Configuring Traffic Shaping |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (3) |
|
Lab 8.1: Configuring Frame Relay with Subinterfaces |
|
|
280 | (2) |
|
Lab 8.2: Frame Relay Traffic Shaping |
|
|
282 | (1) |
|
|
283 | (4) |
|
|
287 | (2) |
|
Answer to Review Questions |
|
|
289 | (2) |
Chapter 9 Queuing and Compression |
|
291 | (34) |
|
|
292 | (2) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (14) |
|
|
295 | (3) |
|
|
298 | (3) |
|
|
301 | (7) |
|
Cisco's Newer Queuing Technologies |
|
|
308 | (2) |
|
|
309 | (1) |
|
Class-Based Weighted Fair Queuing |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (4) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
Compression Considerations |
|
|
313 | (1) |
|
Viewing Compression Information |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (2) |
|
|
317 | (2) |
|
|
319 | (3) |
|
|
322 | (1) |
|
Answers to Review Questions |
|
|
323 | (2) |
Chapter 10 Network Address Translation (NAT) and Port Address Translation (PAT) |
|
325 | (34) |
|
Understanding Network Address Translation (NAT) |
|
|
327 | (4) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
Performing NAT Operations |
|
|
331 | (5) |
|
Translating Inside Local Addresses |
|
|
332 | (1) |
|
Overloading Inside Global Addresses |
|
|
333 | (1) |
|
Using TCP Load Distribution |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (8) |
|
|
337 | (1) |
|
Configuring Dynamic NAT, Inside Global Address Overloading, and TCP Load Distribution |
|
|
338 | (2) |
|
Configuring NAT to Perform Overlapping Address Translator |
|
|
340 | (1) |
|
Verifying NAT Configuration |
|
|
341 | (1) |
|
|
342 | (1) |
|
Clearing NAT Translation Entries |
|
|
343 | (1) |
|
Using Port Address Translation (PAT) |
|
|
344 | (4) |
|
|
344 | (1) |
|
|
345 | (2) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (2) |
|
|
350 | (2) |
|
|
352 | (4) |
|
|
356 | (1) |
|
Answers to Review Questions |
|
|
357 | (2) |
Chapter 11 Centralized Security in Remote Access Networks |
|
359 | (28) |
|
|
360 | (1) |
|
Cisco Access Control Solutions |
|
|
361 | (2) |
|
|
362 | (1) |
|
Authentication, Authorization, and Accounting |
|
|
363 | (2) |
|
|
364 | (1) |
|
|
365 | (2) |
|
Character-Mode Connections |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
367 | (9) |
|
Authentication Configuration |
|
|
368 | (2) |
|
Authorization Configuration |
|
|
370 | (4) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
377 | (1) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
380 | (4) |
|
|
384 | (1) |
|
Answers to Review Questions |
|
|
385 | (2) |
Glossary |
|
387 | (20) |
Index |
|
407 | |