Preface 1. Router Configuration and File Management 1.1 Configuring the Router via TFTP 1.2 Saving Router Configuration to Server 1.3 Booting the Router Using a Remote Configuration File 1.4 Storing Configuration Files Larger Than NVRAM 1.5 Clearing the Startup Configuration 1.6 Loading a New IOS Image 1.
7 Booting a Different IOS Image 1.8 Booting over the Network 1.9 Copying an IOS Image to a Server 1.10 Copying an IOS Image Through the Console 1.11 Deleting Files from Flash 1.12 Partitioning Flash 1.13 Using the Router as a TFTP Server 1.14 Using FTP from the Router 1.
15 Generating Large Numbers of Router Configurations 1.16 Changing the Configurations of Many Routers at Once 1.17 Extracting Hardware Inventory Information 1.18 Backing Up Router Configurations 1.19 Warm Reload 1.20 Warm Upgrade 1.21 Configuration Archiving 1.22 Locking Configuration Access 2.
Router Management 2.1 Creating Command Aliases 2.2 Managing the Router's ARP Cache 2.3 Tuning Router Buffers 2.4 Auto Tuning Buffers 2.5 Using the Cisco Discovery Protocol 2.6 Disabling the Cisco Discovery Protocol 2.7 Using the Small Servers 2.
8 Enabling HTTP Access to a Router 2.9 Enabling Secure HTTP (HTTPS) Access to a Router 2.10 Using Static Hostname Tables 2.11 Enabling Domain Name Services 2.12 Disabling Domain Name Lookups 2.13 Specifying a Router Reload Time 2.14 Scheduling of Router Commands 2.15 Displaying Historical CPU Values 2.
16 Creating Exception Dump Files 2.17 Generating a Report of Interface Information 2.18 Generating a Report of Routing Table Information 2.19 Generating a Report of ARP Table Information 2.20 Generating a Server Host Table File 3. User Access and Privilege Levels 3.1 Setting Up User IDs 3.2 Encrypting Passwords 3.
3 Using Better Password-Encryption Techniques 3.4 Removing Passwords from a Router Configuration File 3.5 Deciphering Cisco's Weak Password Encryption 3.6 Displaying Active Users 3.7 Sending Messages to Other Users 3.8 Changing the Number of VTYs 3.9 Changing VTY Timeouts 3.10 Restricting VTY Access by Protocol 3.
11 Enabling Absolute Timeouts on VTY Lines 3.12 Implementing Banners 3.13 Disabling Banners on a Port 3.14 Disabling Router Lines 3.15 Reserving a VTY Port for Administrative Access 3.16 Restricting Inbound Telnet Access 3.17 Logging Telnet Access 3.18 Setting the Source Address for Telnet 3.
19 Automating the Login Sequence 3.20 Using SSH for Secure Access 3.21 Changing Privilege Level of IOS Commands 3.22 Defining Per User Privileges 3.23 Defining Per Port Privileges 4. TACACS+ 4.1 Authenticating Login IDs from a Central System 4.2 Restricting Command Access 4.
3 Losing Access to the TACACS+ Server 4.4 Disabling TACACS+ Authentication on a Particular Line 4.5 Capturing User Keystrokes 4.6 Logging System Events 4.7 Setting the IP Source Address for TACACS+ Messages 4.8 Sample Server Configuration Files 5. IP Routing 5.1 Finding an IP Route 5.
2 Finding Types of IP Routes 5.3 Converting Different Mask Formats 5.4 Using Static Routing 5.5 Floating Static Routes 5.6 Using Policy-Based Routing to Route Based on Source Address 5.7 Using Policy-Based Routing to Route Based on Application Type 5.8 Examining Policy-Based Routing 5.9 Changing Administrative Distances 5.
10 Routing Over Multiple Paths with Equal Costs 5.11 Static Routes That Track Interfaces or Other Routes 5.12 Keeping Statistics on Routing Table Changes 6. RIP 6.1 Configuring RIP Version 1 6.2 Filtering Routes with RIP 6.3 Redistributing Static Routes into RIP 6.4 Redistributing Routes Using Route Maps 6.
5 Creating a Default Route in RIP 6.6 Disabling RIP on an Interface 6.7.