28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

configure command (continued)<br />

exclusive access to router<br />

configuration, 18<br />

login class permissions, 89<br />

configure exclusive command, 18<br />

configure permission bit, 89–91<br />

configuring<br />

anycast PIM, 596–598<br />

anycast RP, 592–595<br />

ATM interfaces, 238–240<br />

auto-RP, 585<br />

BGP, 431–436<br />

BGP sessions, 422–431<br />

dynamic SAs, 111–115<br />

Ethernet interfaces, 217–220<br />

firewall filters, 282<br />

Frame Relay on T1 interface, 231–232<br />

IGMP, 604–605<br />

interface descriptions, 209<br />

interfaces, 191–194<br />

interfaces before PIC<br />

installation, 242–245<br />

IPSec, 108–110<br />

IPv4 addresses, 206, 207<br />

IPv6 addresses, 207<br />

IS-IS, 351–356<br />

IS-IS for IPv6, 361, 362<br />

IS-IS Level 1 routers, 363–364<br />

ISO addresses, 208<br />

label-switched paths, 485–493<br />

NTP servers, 186<br />

OSPF, 384–387<br />

OSPF for IPv6, 391–393<br />

OSPF multiarea network, 393–396<br />

PIM-DM, 617–619<br />

PIM-SM, 579–583<br />

policers, 319<br />

policies, 282<br />

protocols with graceful restart, 277–281<br />

reference bandwidth, 375<br />

RIP, 333–338<br />

RIP for IPv6, 339–341<br />

SNMP, 133–134, 153–155<br />

SONET interfaces, 232–236<br />

T1 interfaces, 225, 226<br />

tracing, 178<br />

VPNs, 569<br />

(see also router configuration)<br />

CONFLICT facility code, 163<br />

conflict-log facility, 163, 174<br />

Connect state (BGP), 425<br />

Connectionless Network Protocol<br />

(CNLP), 349<br />

console<br />

logging in to, 79<br />

root authentication and, 78<br />

CONSOLE facility code, 163<br />

Constrained Shortest Path First (see CSPF)<br />

control permission bit, 89–91, 95<br />

control plane, 247<br />

convergence time<br />

IS-IS, 375, 376<br />

OSPF and, 409–411<br />

poison reverse technique and, 332<br />

RIP and, 333<br />

Coordinated Universal Time (UTC), 36, 164,<br />

183<br />

copying<br />

configuration files, 34, 35<br />

files between Routing Engines, 16<br />

files from servers, 28–31<br />

files via FTP, 76<br />

software to routers, 49, 50<br />

text from terminal windows, 32–34<br />

core dumps, checking for, 61<br />

CoS (class-of-service) queues, 198<br />

count option (then clause), 315<br />

counter action, 306<br />

crack program, 74<br />

crashfiles, deleting, 47<br />

CRON facility code, 163<br />

CSN (complete sequence number), 381<br />

CSNPs (complete sequence number<br />

PDUs), 367<br />

CSPF (Constrained Shortest Path First)<br />

overview, 485<br />

prioritizing label-switched paths, 543<br />

protection LSP and, 533<br />

RSVP and, 484, 509, 524<br />

Ctrl-a keystroke sequence, 9<br />

Ctrl-b keystroke sequence, 9, 289<br />

Ctrl-e keystroke sequence, 9<br />

Ctrl-f keystroke sequence, 9<br />

Ctrl-k keystroke sequence, 9, 289<br />

Ctrl-n keystroke sequence, 9<br />

Ctrl-p keystroke sequence, 9, 289<br />

Ctrl-y keystroke sequence, 9<br />

curly braces { }, 5, 33<br />

customer edge routers (see CE routers)<br />

cutoff threshold, 459<br />

628 | Index<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!