Introduction |
|
1 | (2) |
|
Networking in the Enterprise |
|
|
3 | (10) |
|
|
3 | (3) |
|
Supporting the Business Enterprise |
|
|
3 | (1) |
|
Traffic Flow in the Enterprise Network |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Identifying Enterprise Applications |
|
|
6 | (2) |
|
|
6 | (1) |
|
Applications and Traffic on an Enterprise Network |
|
|
7 | (1) |
|
Network Traffic Prioritization |
|
|
8 | (1) |
|
Supporting Remote Workers |
|
|
8 | (3) |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (2) |
|
Exploring the Enterprise Network Infrastructure |
|
|
13 | (12) |
|
|
13 | (3) |
|
Enterprise Network Documentation |
|
|
13 | (1) |
|
Network Operations Center (NOC) |
|
|
14 | (1) |
|
Telecommunication Room Design and Considerations |
|
|
15 | (1) |
|
Supporting the Enterprise Edge |
|
|
16 | (2) |
|
Service Delivery at the Point-of-Presence |
|
|
16 | (1) |
|
Security Considerations at the Enterprise Edge |
|
|
17 | (1) |
|
Connecting the Enterprise Network to External Services |
|
|
17 | (1) |
|
Reviewing Routing and Switching |
|
|
18 | (5) |
|
|
18 | (1) |
|
Basic Router CLI Show Commands |
|
|
19 | (1) |
|
Basic Router Configuration Using CLI |
|
|
19 | (1) |
|
|
20 | (1) |
|
Basic Switch CLI Commands |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (2) |
|
Switching in an Enterprise Network |
|
|
25 | (20) |
|
|
25 | (3) |
|
Switching and Network Segmentation |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
Preventing Switching Loops |
|
|
28 | (5) |
|
Redundancy in a Switched Network |
|
|
28 | (1) |
|
Spanning Tree Protocol (STP) |
|
|
29 | (1) |
|
|
30 | (1) |
|
Spanning Tree in a Hierarchical Network |
|
|
31 | (1) |
|
Rapid Spanning Tree Protocol (RSTP) |
|
|
32 | (1) |
|
|
33 | (3) |
|
|
33 | (1) |
|
Configuring a Virtual LAN |
|
|
34 | (1) |
|
|
35 | (1) |
|
Trunking and Inter-VLAN Routing |
|
|
36 | (3) |
|
|
36 | (2) |
|
Extending VLANs across Switches |
|
|
38 | (1) |
|
|
38 | (1) |
|
Maintaining VLANs on an Enterprise Network |
|
|
39 | (4) |
|
VLAN Trunking Protocol (VTP) |
|
|
39 | (2) |
|
|
41 | (1) |
|
VLAN Support for IP Telephony and Wireless |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (2) |
|
Addressing in an Enterprise Network |
|
|
45 | (14) |
|
|
45 | (1) |
|
Flat and Hierarchical Networks |
|
|
45 | (1) |
|
Hierarchical Network Addressing |
|
|
45 | (1) |
|
Using Subnetting to Structure the Network |
|
|
45 | (1) |
|
|
46 | (4) |
|
|
46 | (1) |
|
Calculating Subnets Using Binary Representation |
|
|
47 | (1) |
|
|
47 | (1) |
|
Variable Length Subnet Masks (VLSM) |
|
|
48 | (1) |
|
Implementing VLSM Addressing |
|
|
49 | (1) |
|
Using Classless Routing and CIDR |
|
|
50 | (4) |
|
Classful and Classless Routing |
|
|
50 | (1) |
|
CIDR and Route Summarization |
|
|
51 | (1) |
|
Calculating Route Summarization |
|
|
52 | (1) |
|
|
52 | (1) |
|
Subnetting and Addressing Best Practices |
|
|
53 | (1) |
|
|
54 | (3) |
|
|
54 | (1) |
|
NAT at the Enterprise Edge |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (2) |
|
Routing with a Distance Vector Protocol |
|
|
59 | (20) |
|
|
59 | (4) |
|
|
59 | (1) |
|
|
59 | (1) |
|
Static and Dynamic Routing |
|
|
60 | (2) |
|
Configuring Static Routes |
|
|
62 | (1) |
|
|
63 | (1) |
|
Routing Using the RIP Protocol |
|
|
63 | (4) |
|
Distance Vector Routing Protocols |
|
|
63 | (1) |
|
Routing Information Protocol (RIP) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
Routing Using the EIGRP Protocol |
|
|
67 | (5) |
|
|
67 | (1) |
|
Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
|
68 | (1) |
|
EIGRP Terminology and Tables |
|
|
69 | (1) |
|
EIGRP Neighbors and Adjacencies |
|
|
70 | (1) |
|
EIGRP Metrics and Convergence |
|
|
71 | (1) |
|
|
72 | (5) |
|
|
72 | (2) |
|
EIGRP Route Summarization |
|
|
74 | (1) |
|
Verifying EIGRP Operation |
|
|
74 | (2) |
|
Issues and Limitations of EIGRP |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (2) |
|
Routing with a Link-State Protocol |
|
|
79 | (12) |
|
|
79 | (4) |
|
Link-State Protocol Operation |
|
|
79 | (1) |
|
OSPF Metrics and Convergence |
|
|
80 | (1) |
|
OSPF Neighbors and Adjacencies |
|
|
80 | (2) |
|
|
82 | (1) |
|
Implementing Single-Area OSPF |
|
|
83 | (3) |
|
Configuring Basic OSPF in a Single Area |
|
|
83 | (1) |
|
Configuring OSPF Authentication |
|
|
84 | (1) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Using Multiple Routing Protocols |
|
|
86 | (4) |
|
Configuring and Propagating a Default Route |
|
|
86 | (1) |
|
Configuring OSPF Summarization |
|
|
87 | (1) |
|
OSPF Issues and Limitations |
|
|
88 | (1) |
|
Using Multiple Protocols in the Enterprise |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
Implementing Enterprise WAN Links |
|
|
91 | (14) |
|
|
91 | (5) |
|
WAN Devices and Technology |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
Packet and Circuit Switching |
|
|
94 | (1) |
|
Last Mile and Long Range WAN Technologies |
|
|
95 | (1) |
|
Comparing Common WAN Encapsulations |
|
|
96 | (5) |
|
Ethernet and WAN Encapsulations |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (3) |
|
|
101 | (1) |
|
Frame Relay Functionality |
|
|
102 | (2) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
Filtering Traffic Using Access Control Lists |
|
|
105 | (18) |
|
|
105 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (2) |
|
ACL Wildcard Mask Purpose and Structure |
|
|
107 | (1) |
|
Analyzing the Effects of the Wildcard Mask |
|
|
108 | (1) |
|
Configuring Access Control Lists |
|
|
109 | (6) |
|
Placing Standard and Extended ACLs |
|
|
109 | (2) |
|
Basic ACL Configuration Process |
|
|
111 | (1) |
|
Configuring Numbered Standard ACLs |
|
|
111 | (1) |
|
Configuring Numbered Extended ACLs |
|
|
112 | (1) |
|
|
113 | (1) |
|
Configure Router VTY Access |
|
|
114 | (1) |
|
Permitting and Denying Specific Types of Traffic |
|
|
115 | (3) |
|
Configuring ACLs for Application and Port Filtering |
|
|
115 | (1) |
|
Configuring ACLs to Support Established Traffic |
|
|
116 | (1) |
|
Effects of NAT and PAT on ACL Placement |
|
|
116 | (1) |
|
Analyzing Network ACLs and Placement |
|
|
117 | (1) |
|
Configuring ACLs with Inter-VLAN Routing |
|
|
117 | (1) |
|
Filtering Traffic Using Access Control Lists |
|
|
118 | (3) |
|
Using Logging to Verify ACL Functionality |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
Troubleshooting an Enterprise Network |
|
|
123 | (18) |
|
|
123 | (4) |
|
Enterprise Network Requirements |
|
|
123 | (1) |
|
Monitoring and Proactive Maintenance |
|
|
124 | (1) |
|
Troubleshooting and the Failure Domain |
|
|
125 | (1) |
|
|
126 | (1) |
|
Troubleshooting Switching and Connectivity Issues |
|
|
127 | (4) |
|
Troubleshooting Basic Switching |
|
|
127 | (2) |
|
Troubleshooting VLAN Configuration Issues |
|
|
129 | (1) |
|
|
130 | (1) |
|
Troubleshooting Routing Issues |
|
|
131 | (3) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Route Redistribution Issues |
|
|
133 | (1) |
|
Troubleshooting WAN Configurations |
|
|
134 | (2) |
|
Troubleshooting WAN Connectivity |
|
|
134 | (1) |
|
Troubleshooting WAN Authentication |
|
|
135 | (1) |
|
Troubleshooting ACL Issues |
|
|
136 | (3) |
|
Determining if an ACL is the Issue |
|
|
136 | (1) |
|
ACL Configuration and Placement Issues |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (2) |
|
|
141 | (2) |
|
|
141 | (1) |
|
|
141 | (2) |
|
|
141 | (1) |
|
|
141 | (2) |
Glossary |
|
143 | |