|
Part I Introduction to Networks |
|
|
|
Chapter 1 Exploring the Network |
|
|
1 | (12) |
|
|
1 | (2) |
|
Vocabulary Exercise: Matching |
|
|
2 | (1) |
|
|
3 | (1) |
|
LANs, WANs, and the Internet |
|
|
3 | (5) |
|
|
3 | (2) |
|
Classify and Identify Network Components |
|
|
5 | (1) |
|
|
6 | (1) |
|
Vocabulary Exercise: Matching |
|
|
7 | (1) |
|
The Network as a Platform |
|
|
8 | (2) |
|
Classify Network Architecture Requirements |
|
|
8 | (2) |
|
The Changing Network Environment |
|
|
10 | (3) |
|
|
10 | (1) |
|
Network Security Terminology |
|
|
11 | (2) |
|
Chapter 2 Configuring a Network Operating System |
|
|
13 | (6) |
|
|
13 | (3) |
|
|
13 | (1) |
|
Accessing a Cisco IOS Device |
|
|
14 | (1) |
|
Navigating the IOS Matching Exercise |
|
|
15 | (1) |
|
Basic Device Configuration |
|
|
16 | (3) |
|
Applying a Basic Configuration |
|
|
16 | (3) |
|
Chapter 3 Network Protocols and Communications |
|
|
19 | (10) |
|
|
19 | (2) |
|
Vocabulary Exercise: Matching |
|
|
20 | (1) |
|
Network Protocols and Standards |
|
|
21 | (5) |
|
Protocol Definitions: Matching |
|
|
21 | (1) |
|
Mapping the Protocols of the TCP/IP Suite |
|
|
22 | (1) |
|
Explore the Purpose of Standards Organizations |
|
|
22 | (2) |
|
OSI Reference Model Layers: Matching |
|
|
24 | (1) |
|
TCP/IP Model Layers: Matching |
|
|
24 | (1) |
|
Mapping the Layers of the OSI and TCP/IP Models |
|
|
25 | (1) |
|
Moving Data in the Network |
|
|
26 | (3) |
|
Data Encapsulation and the PDUs |
|
|
26 | (1) |
|
The Role of Addressing in Network Communications |
|
|
27 | (2) |
|
|
29 | (12) |
|
|
29 | (3) |
|
|
29 | (2) |
|
Vocabulary Exercise: Matching |
|
|
31 | (1) |
|
|
32 | (5) |
|
Copper Cabling Completion Exercise |
|
|
32 | (1) |
|
Compare UTP, STP, and Coaxial Characteristics |
|
|
32 | (1) |
|
UTP Cabling Completion Exercise |
|
|
33 | (1) |
|
|
34 | (1) |
|
Fiber-Optic Cabling Completion Exercise |
|
|
34 | (1) |
|
Compare Single-Mode and Multimode Fiber |
|
|
35 | (1) |
|
Wireless Media Completion Exercise |
|
|
36 | (1) |
|
Data Link Layer Protocols |
|
|
37 | (1) |
|
The Sublayers of the Data Link Layer |
|
|
37 | (1) |
|
Label the Generic Frame Fields |
|
|
37 | (1) |
|
Identify the Data Link Layer Standards Organization |
|
|
37 | (1) |
|
|
38 | (3) |
|
Topologies and Access Methods Completion Exercise |
|
|
38 | (1) |
|
Label the Ethernet Frame Fields |
|
|
39 | (1) |
|
Label the PPP Frame Fields |
|
|
40 | (1) |
|
Label the 802.11 Wireless Frame Fields |
|
|
40 | (1) |
|
|
41 | (12) |
|
|
41 | (2) |
|
Ethernet Operation Completion Exercise |
|
|
41 | (1) |
|
Identify the Ethernet Frame Attributes: Matching |
|
|
42 | (1) |
|
Comparing Decimal, Binary, and Hexadecimal Digits |
|
|
43 | (1) |
|
Address Resolution Protocol |
|
|
43 | (2) |
|
|
43 | (1) |
|
Identify the MAC and IP Addresses |
|
|
44 | (1) |
|
|
45 | (8) |
|
Building the MAC Address Table |
|
|
45 | (1) |
|
Switching Concepts Completion Exercise |
|
|
46 | (1) |
|
Comparing Switch Forwarding Methods |
|
|
47 | (1) |
|
|
47 | (3) |
|
Layer 3 Switching Concepts Completion Exercise |
|
|
50 | (1) |
|
Layer 3 Switch Configuration |
|
|
51 | (2) |
|
|
53 | (12) |
|
|
53 | (3) |
|
The Processes of the Network Layer |
|
|
53 | (1) |
|
Characteristics of the IP Protocol |
|
|
53 | (2) |
|
Fields of the IPv4 Packet: Matching |
|
|
55 | (1) |
|
Fields of the IPv6 Packet: Matching |
|
|
55 | (1) |
|
|
56 | (2) |
|
How a Host Routes Packets Completion Exercise |
|
|
56 | (2) |
|
Routing Table Entry: Matching |
|
|
58 | (1) |
|
|
58 | (2) |
|
Identify Router Components |
|
|
58 | (1) |
|
Router Boot Process Exercise |
|
|
59 | (1) |
|
Interpreting the show version Command Exercise |
|
|
60 | (1) |
|
Configuring a Cisco Router |
|
|
60 | (5) |
|
Basic Router Configuration Exercise |
|
|
60 | (2) |
|
Applying a Basic Configuration |
|
|
62 | (1) |
|
Verifying Basic Router Configuration |
|
|
63 | (2) |
|
Chapter 7 Transport Layer |
|
|
65 | (6) |
|
Transport Layer Protocols |
|
|
65 | (1) |
|
Transportation of Data Completion Exercise |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
66 | (5) |
|
|
67 | (2) |
|
|
69 | (1) |
|
TCP or UDP, That Is the Question |
|
|
69 | (2) |
|
|
71 | (14) |
|
|
71 | (4) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
ANDing to Determine the Network Address |
|
|
73 | (1) |
|
IPv4 Unicast, Broadcast, and Multicast |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (8) |
|
Representing IPv6 Addresses |
|
|
76 | (1) |
|
Identify IPv6 Address Types |
|
|
77 | (3) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Static Configuration of Global Unicast Addressing |
|
|
81 | (1) |
|
Dynamic Configuration of Global Unicast Addressing |
|
|
81 | (1) |
|
|
82 | (1) |
|
Connectivity Verification |
|
|
83 | (2) |
|
|
83 | (1) |
|
|
83 | (2) |
|
Chapter 9 Subnetting IP Networks |
|
|
85 | (12) |
|
Subnetting an IPv4 Network |
|
|
85 | (3) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Determine How Many Bits to Borrow |
|
|
85 | (1) |
|
Determine the New Subnet Mask |
|
|
86 | (1) |
|
Determine the Subnet Multiplier |
|
|
86 | (1) |
|
List the Subnets, Host Ranges, and Broadcast Addresses |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (6) |
|
|
89 | (1) |
|
VLSM Addressing Design Exercises |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Design Considerations for IPv6 |
|
|
94 | (3) |
|
Subnetting an IPv6 Network |
|
|
95 | (1) |
|
|
95 | (1) |
|
IPv6 Subnetting Scenario 1 |
|
|
95 | (1) |
|
IPv6 Subnetting Scenario 2 |
|
|
96 | (1) |
|
IPv6 Subnetting Scenario 3 |
|
|
96 | (1) |
|
Chapter 10 Application Layer |
|
|
97 | (8) |
|
Application Layer Protocols |
|
|
97 | (2) |
|
OSI and TCP/IP Model Comparison |
|
|
97 | (1) |
|
Application and Presentation Protocols and Standards |
|
|
98 | (1) |
|
How Application Protocols Interact with End-User Applications |
|
|
98 | (1) |
|
Well-Known Application Layer Protocols and Services |
|
|
99 | (4) |
|
|
99 | (1) |
|
|
100 | (2) |
|
|
102 | (1) |
|
The Message Heard Around the World |
|
|
103 | (2) |
|
Chapter 11 It's a Network |
|
|
105 | |
|
|
105 | (2) |
|
Devices in a Small Network |
|
|
105 | (1) |
|
Protocols in a Small Network |
|
|
106 | (1) |
|
Growing to Larger Networks |
|
|
107 | (1) |
|
|
107 | (3) |
|
Network Device Security Measures |
|
|
107 | (1) |
|
Vulnerabilities and Network Attacks |
|
|
108 | (1) |
|
Mitigating Network Attacks |
|
|
109 | (1) |
|
|
110 | (1) |
|
Basic Network Performance |
|
|
110 | (4) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (2) |
|
Managing IOS Configuration Files |
|
|
114 | (2) |
|
Integrated Routing Services |
|
|
116 | |
|
Part II Routing and Switching Essentials CHAPTER |
|
|
12 | |
|
Introduction to Switched Networks |
|
|
117 | (1) |
|
|
117 | (3) |
|
|
117 | (2) |
|
Selecting Switch Hardware |
|
|
119 | (1) |
|
|
120 | (5) |
|
Frame Forwarding Methods and Terminology |
|
|
120 | (1) |
|
Building the MAC Address Table |
|
|
120 | (2) |
|
Collision and Broadcast Domains |
|
|
122 | (3) |
|
Chapter 13 Basic Switching Concepts and Configuration |
|
|
125 | (10) |
|
Basic Switch Configuration |
|
|
125 | (4) |
|
|
125 | (1) |
|
Half-Duplex, Full-Duplex, and Auto-MDIX |
|
|
125 | (1) |
|
Configure a Switch with Initial Settings |
|
|
126 | (1) |
|
Basic Configuration Tasks |
|
|
127 | (1) |
|
Applying a Basic Configuration |
|
|
127 | (2) |
|
Verifying Basic Switch Configuration |
|
|
129 | (1) |
|
Switch Security: Management and Implementation |
|
|
129 | (6) |
|
|
129 | (2) |
|
|
131 | (1) |
|
Configuring Port Security |
|
|
132 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (14) |
|
|
135 | (2) |
|
|
135 | (1) |
|
VLANs in a Multiswitched Environment |
|
|
136 | (1) |
|
|
137 | (9) |
|
VLAN Configuration Exercise |
|
|
137 | (4) |
|
Practice VLAN Configuration |
|
|
141 | (1) |
|
VLAN Trunk Configuration Exercise |
|
|
141 | (1) |
|
Practice Trunk Configuration |
|
|
142 | (1) |
|
Dynamic Trunking Protocol |
|
|
143 | (1) |
|
Troubleshoot VLANs and Trunks |
|
|
144 | (2) |
|
|
146 | (3) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (2) |
|
Chapter 15 Routing Concepts |
|
|
149 | (22) |
|
Initial Configuration of a Router |
|
|
149 | (12) |
|
|
149 | (3) |
|
|
152 | (2) |
|
Topology and Addressing Documentation |
|
|
154 | (2) |
|
Configure and Verify Dual-Stack IPv4 and IPv6 Addressing |
|
|
156 | (5) |
|
|
161 | (4) |
|
|
162 | (2) |
|
Concept of Administrative Distance Exercise |
|
|
164 | (1) |
|
Switching Packets Between Networks |
|
|
164 | (1) |
|
|
165 | (6) |
|
Analyze the Routing Table |
|
|
165 | (2) |
|
Directly Connected, Static, and Dynamic Routes |
|
|
167 | (4) |
|
Chapter 16 Inter-VLAN Routing |
|
|
171 | (12) |
|
Inter-VLAN Routing Configuration |
|
|
171 | (3) |
|
Types of Inter-VLAN Routing |
|
|
171 | (1) |
|
Configuring Inter-VLAN Routing |
|
|
172 | (2) |
|
Troubleshoot Inter-VLAN Routing |
|
|
174 | (2) |
|
Inter-VLAN Troubleshooting Scenarios |
|
|
174 | (2) |
|
|
176 | (7) |
|
Layer 3 Switching Operation |
|
|
176 | (1) |
|
Configuring Static Routes on a Catalyst 2960 |
|
|
177 | (2) |
|
Layer 3 Switching Troubleshooting Scenarios |
|
|
179 | (4) |
|
Chapter 17 Static Routing |
|
|
183 | (14) |
|
Static Routing Implementation |
|
|
183 | (2) |
|
|
183 | (1) |
|
Identify Types of Static Routes |
|
|
184 | (1) |
|
Configure Static and Default Routes |
|
|
185 | (3) |
|
Configuring IPv4 Static and Default Routes |
|
|
185 | (1) |
|
B1 and B2 Routing Strategy |
|
|
186 | (1) |
|
Configuring IPv6 Static and Default Routes |
|
|
187 | (1) |
|
B1 and B2 Routing Strategy |
|
|
187 | (1) |
|
|
188 | (3) |
|
|
189 | (1) |
|
CIDR and Route Summarization |
|
|
189 | (1) |
|
Summary Route Calculation Scenario 1 |
|
|
190 | (1) |
|
Summary Route Calculation Scenario 2 |
|
|
191 | (1) |
|
Summary Route Calculation Scenario 3 |
|
|
191 | (1) |
|
Configure Summary and Floating Static Routes |
|
|
191 | (4) |
|
Configure IPv4 Summary Routes |
|
|
192 | (1) |
|
Configure IPv6 Summary Routes |
|
|
192 | (2) |
|
Configure Floating Static Routes |
|
|
194 | (1) |
|
Troubleshoot Static and Default Route Issues |
|
|
195 | (2) |
|
IPv4 Static and Default Route Implementation |
|
|
195 | (1) |
|
IPv6 Static and Default Route Implementation |
|
|
195 | (2) |
|
Chapter 18 Routing Dynamically |
|
|
197 | (24) |
|
Dynamic Routing Protocols |
|
|
197 | (5) |
|
Dynamic Routing Protocol Operation |
|
|
197 | (1) |
|
Compare Static and Dynamic Routing |
|
|
197 | (1) |
|
From Cold Start to Convergence |
|
|
198 | (2) |
|
Dynamic Routing Protocols Classification Chart |
|
|
200 | (1) |
|
Routing Protocols Characteristics |
|
|
201 | (1) |
|
Comparing Routing Protocol Characteristics |
|
|
202 | (1) |
|
Distance Vector Dynamic Routing |
|
|
202 | (2) |
|
Distance Vector Operation and Terminology |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
204 | (4) |
|
|
204 | (2) |
|
|
206 | (2) |
|
Link-State Dynamic Routing |
|
|
208 | (6) |
|
Link-State Routing Protocol Operation |
|
|
208 | (2) |
|
Building the Link-State Database |
|
|
210 | (4) |
|
Using Link-State Routing Protocols |
|
|
214 | (1) |
|
|
214 | (7) |
|
Identifying Elements of the Routing Table |
|
|
214 | (1) |
|
Dynamically Learned IPv4 Routes |
|
|
215 | (2) |
|
The IPv4 Route Lookup Process |
|
|
217 | (1) |
|
Routing Table Lookup Chart |
|
|
217 | (1) |
|
Routing Table Lookup Exercise |
|
|
218 | (1) |
|
Analyze an IPv6 Routing Table |
|
|
219 | (2) |
|
Chapter 19 Single-Area OSPF |
|
|
221 | (16) |
|
|
221 | (6) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (3) |
|
Configuring Single-Area OSPFv2 |
|
|
227 | (6) |
|
|
228 | (1) |
|
Single-Area OSPFv2 Basic Configuration Scenario |
|
|
229 | (2) |
|
|
231 | (1) |
|
|
231 | (1) |
|
The Default Interface Bandwidth |
|
|
232 | (1) |
|
Modifying the OSPF Cost Metric |
|
|
232 | (1) |
|
Verify the OSPF Configuration |
|
|
233 | (1) |
|
Configure Single-Area OSPFv3 |
|
|
233 | (4) |
|
Comparing OSPFv2 and OSPFv3 |
|
|
233 | (1) |
|
|
234 | (2) |
|
|
236 | (1) |
|
Chapter 20 Access Control Lists |
|
|
237 | (18) |
|
|
237 | (3) |
|
Standard Versus Extended IPv4 ACLs |
|
|
237 | (1) |
|
Calculating Wildcard Masks |
|
|
237 | (1) |
|
Wildcard Mask in Operation |
|
|
238 | (1) |
|
Guidelines for ACL Creation |
|
|
239 | (1) |
|
Guidelines for ACL Placement |
|
|
240 | (1) |
|
|
240 | (5) |
|
Configuring Standard IPv4 ACLs |
|
|
241 | (3) |
|
|
244 | (1) |
|
Securing vty Ports with a Standard IPv4 ACL |
|
|
245 | (1) |
|
|
245 | (6) |
|
Configuring Extended IPv4 ACL Statements |
|
|
245 | (1) |
|
Extended ACL Configuration Scenarios |
|
|
246 | (1) |
|
Evaluating Extended IPv4 ACL Statements |
|
|
247 | (1) |
|
|
248 | (3) |
|
|
251 | (1) |
|
|
252 | (3) |
|
Comparing IPv4 and IPv6 ACLs |
|
|
252 | (1) |
|
|
252 | (3) |
|
|
255 | (10) |
|
Dynamic Host Configuration Protocol v4 |
|
|
255 | (5) |
|
|
255 | (1) |
|
Configuring a Cisco Device as a DHCPv4 Server |
|
|
256 | (2) |
|
Configuring a Router to Relay DHCPv4 Requests |
|
|
258 | (1) |
|
Configuring a Router as a DHCPv4 Client |
|
|
259 | (1) |
|
|
259 | (1) |
|
Dynamic Host Configuration Protocol v6 |
|
|
260 | (5) |
|
|
260 | (2) |
|
Configuring a Router as a Stateless DHCPv6 Server |
|
|
262 | (1) |
|
Configuring a Router as a Stateful DHCPv6 Server |
|
|
263 | (2) |
|
Chapter 22 Network Address Translation for IPv4 |
|
|
265 | |
|
|
265 | (2) |
|
|
265 | (2) |
|
|
267 | |
|
|
267 | (1) |
|
|
268 | (1) |
|
Configuring Port Address Translation |
|
|
269 | (3) |
|
A Word About Port Forwarding |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | |