Introduction Manage a Single System
Software TFTP Finding Help Loading Software onto Switches Loading Software onto Routers
Configuration Files Copying Configuration Files Manage Traffic on a Single System
Location, Location, Location
Aces Are Wild
Trust, But Verify
IP Access Lists Standard IP Access Lists 0.0.0.15? Huh? Extended IP Access Lists Applying IP Access Lists
IPX Access Lists Standard IPX Access Lists Extended IPX Access Lists SAP Filters Verifying IPX Access Lists Network Operations
Configure Authentication Types Configure PAP and CHAP
Use CDP SNMP and MIBs Configure CDP Discovering the Topology
Use ICMP Conclusion