Introduction |
|
xvii | |
|
Chapter 1 Operation of IP Data Networks |
|
|
1 | (54) |
|
Operation of IP Data Networks |
|
|
2 | (1) |
|
|
3 | (1) |
|
Recognize the Purpose and Functions of Various Network Devices Such as Routers, Switches, Bridges, and Hubs |
|
|
3 | (4) |
|
|
6 | (1) |
|
Select the Components Required to Meet a Given Network Specification |
|
|
7 | (2) |
|
|
9 | (1) |
|
Identify Common Applications and Their Impact on the Network |
|
|
9 | (9) |
|
|
18 | (1) |
|
Describe the Purpose and Basic Operation of the Protocols in the OSI and TCP/IP Models |
|
|
18 | (15) |
|
|
18 | (1) |
|
Advantages of Reference Models |
|
|
19 | (1) |
|
|
19 | (13) |
|
|
32 | (1) |
|
Predict the Data Plow between Two Hosts across a Network |
|
|
33 | (9) |
|
|
35 | (6) |
|
|
41 | (1) |
|
Identify the Appropriate Media, Cables, Ports, and Connectors to Connect Cisco Network Devices to Other Network Devices and Hosts in a LAN |
|
|
42 | (9) |
|
|
43 | (6) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (4) |
|
Chapter 2 LAN Switching Technologies |
|
|
55 | (80) |
|
Determine the Technology and Media Access Control Method for Ethernet Networks |
|
|
57 | (4) |
|
|
57 | (2) |
|
Half- and Full-Duplex Ethernet |
|
|
59 | (2) |
|
|
61 | (1) |
|
Identify Basic Switching Concepts and the Operation of Cisco Switches |
|
|
61 | (7) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (3) |
|
|
67 | (1) |
|
Configure and Verify Initial Switch Configuration Including Remote Access Management |
|
|
68 | (21) |
|
Cisco IOS Commands to Perform Basic Switch Setup |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (2) |
|
Editing and Help Features |
|
|
72 | (5) |
|
Administrative Configurations |
|
|
77 | (10) |
|
|
87 | (2) |
|
Verify Network Status and Switch Operation Using Basic Utilities Such as Ping, Telnet, and SSH |
|
|
89 | (5) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Identify Enhanced Switching Technologies |
|
|
94 | (6) |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
Describe How VLANs Create Logically Separate Networks and the Need for Routing between Them |
|
|
100 | (7) |
|
|
102 | (1) |
|
Explain Network Segmentation and Basic Traffic Management Concepts |
|
|
103 | (1) |
|
|
104 | (2) |
|
VLAN Identification Methods |
|
|
106 | (1) |
|
|
107 | (1) |
|
Configure and Verify VLANs |
|
|
107 | (5) |
|
Assigning Switch Ports to VLANs |
|
|
110 | (2) |
|
|
112 | (1) |
|
Configure and Verify Trunking on Cisco Switches |
|
|
112 | (6) |
|
Defining the Allowed VLANs on a Trunk |
|
|
114 | (1) |
|
Changing or Modifying the Trunk Native VLAN |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
Configure and Verify PVSTP Operation |
|
|
118 | (14) |
|
Describe, Root Bridge Election |
|
|
124 | (6) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (3) |
|
Chapter 3 IP Addressing (IPv4/IPv6) |
|
|
135 | (28) |
|
Describe the Operation and Necessity of Using Private and Public IP Addresses for IPv4 Addressing |
|
|
136 | (7) |
|
|
136 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
137 | (5) |
|
Private IP Addresses (RFC 1918) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Identify the Appropriate IPv6 Addressing Scheme to Satisfy Addressing Requirements in a LAN/WAN Environment |
|
|
143 | (2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Identify the Appropriate IPv4 Addressing Scheme Using VLSM and Summarization to Satisfy Addressing Requirements in a LAN/WAN Environment |
|
|
145 | (5) |
|
|
147 | (1) |
|
Implementing VLSM Networks |
|
|
147 | (1) |
|
|
148 | (2) |
|
Describe the Technological Requirements for Running IPv6 in Conjunction with IPv4 Such as Dual Stack |
|
|
150 | (6) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (5) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Chapter 4 IP Routing Technologies |
|
|
163 | (102) |
|
Describe Basic Routing Concepts |
|
|
166 | (3) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Describe the Boot Process of Cisco IOS Routers |
|
|
169 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
Configure and Verify Utilizing the CLI to Set Basic Router Configuration |
|
|
171 | (15) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
Cisco IOS Commands to Perform Basic Router Setup |
|
|
174 | (8) |
|
Encrypting Your Passwords |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Configure and Verify Operation Status of a Device Interface, Both Serial and Ethernet |
|
|
186 | (9) |
|
|
189 | (5) |
|
|
194 | (1) |
|
Verify Router Configuration and Network Connectivity |
|
|
195 | (10) |
|
Cisco IOS Commands to Review Basic Router Information and Network Connectivity |
|
|
195 | (10) |
|
|
205 | (1) |
|
Configure and Verify Routing Configuration for a Static or Default Route Given Specific Routing Requirements |
|
|
205 | (3) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (19) |
|
|
209 | (6) |
|
|
215 | (5) |
|
|
220 | (6) |
|
|
226 | (1) |
|
Differentiate Methods of Routing and Routing Protocols |
|
|
227 | (4) |
|
|
227 | (1) |
|
Link State vs. Distance Vector |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Configure and Verify OSPF (Single Area) |
|
|
231 | (15) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
238 | (5) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Configure and Verify EIGRP (Single AS) |
|
|
246 | (8) |
|
Feasible Distance/Feasible Successors/Administrative Distance |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Configure and Verify InterVLAN Routing (Router on a Stick) |
|
|
254 | (6) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
260 | (2) |
|
|
261 | (1) |
|
|
262 | (3) |
|
|
265 | (42) |
|
Configure and Verify DHCP (IOS Router) |
|
|
267 | (2) |
|
Configuring Router Interfaces to Use DHCP |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Describe the Types, Features, and Applications of ACLs |
|
|
269 | (3) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Configure and Verify ACLs in a Network Environment |
|
|
272 | (4) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Identify the Basic Operation of NAT |
|
|
276 | (4) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Configure and Verify NAT for Given Network Requirements |
|
|
280 | (5) |
|
|
280 | (1) |
|
Dynamic NAT Configuration |
|
|
281 | (1) |
|
PAT (Overloading) Configuration |
|
|
282 | (1) |
|
Simple Verification of NAT |
|
|
282 | (1) |
|
|
283 | (2) |
|
Configure and Verify NTP as a Client |
|
|
285 | (11) |
|
|
286 | (1) |
|
Recognize High Availability (FHRP) |
|
|
287 | (2) |
|
|
289 | (1) |
|
|
289 | (4) |
|
|
293 | (3) |
|
|
296 | (1) |
|
Configure and Verify Syslog |
|
|
296 | (5) |
|
|
298 | (3) |
|
|
301 | (1) |
|
|
301 | (3) |
|
|
303 | (1) |
|
|
304 | (3) |
|
Chapter 6 Network Device Security |
|
|
307 | (34) |
|
Configure and Verify Network Device Security Features |
|
|
309 | (7) |
|
|
309 | (1) |
|
Enable Secret vs. Enable Password |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
Describe External Authentication Methods |
|
|
315 | (1) |
|
|
316 | (1) |
|
Configure and Verify Switch Port Security Features |
|
|
316 | (6) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
Assign Unused Ports to an Unused VLAN |
|
|
321 | (1) |
|
Setting Native VLAN to Other than VLAN 1 |
|
|
321 | (1) |
|
|
321 | (1) |
|
Configure and Verify ACLs to Filter Network Traffic |
|
|
322 | (15) |
|
|
335 | (1) |
|
Configure and Verify ACLs to Limit Telnet and SSH Access to the Router |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (4) |
|
Chapter 7 Troubleshooting |
|
|
341 | (98) |
|
Identify and Correct Common Network Problems |
|
|
344 | (11) |
|
|
355 | (1) |
|
|
355 | (3) |
|
|
357 | (1) |
|
Troubleshoot and Correct Common Problems Associated with IP Addressing and Host Configurations |
|
|
358 | (4) |
|
|
361 | (1) |
|
Troubleshoot and Resolve VLAN Problems |
|
|
362 | (6) |
|
Identify That VLANs Are Configured |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
Troubleshoot and Resolve Trunking Problems on Cisco Switches |
|
|
365 | (1) |
|
|
365 | (1) |
|
Correct Encapsulation Configured |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
Troubleshoot and Resolve Spanning Tree Operation Issues |
|
|
368 | (3) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
Troubleshoot and Resolve Routing Issues |
|
|
371 | (3) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (1) |
|
Troubleshoot and Resolve OSPF Problems |
|
|
374 | (7) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Troubleshoot and Resolve EIGRP Problems |
|
|
381 | (12) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
389 | (2) |
|
|
391 | (2) |
|
|
393 | (1) |
|
Troubleshoot and Resolve InterVLAN Routing Problems |
|
|
393 | (9) |
|
|
393 | (5) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (2) |
|
|
402 | (1) |
|
Troubleshoot and Resolve ACL Issues |
|
|
402 | (3) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
Troubleshoot and Resolve WAN Implementation Issues |
|
|
405 | (13) |
|
|
407 | (1) |
|
|
407 | (4) |
|
|
411 | (7) |
|
|
418 | (1) |
|
Troubleshoot and Resolve Layer 1 Problems |
|
|
418 | (13) |
|
|
418 | (2) |
|
Verifying Your Interfaces |
|
|
420 | (5) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Verifying Interface Configuration |
|
|
426 | (3) |
|
|
429 | (1) |
|
Monitor NetFlow Statistics |
|
|
429 | (2) |
|
|
431 | (1) |
|
Troubleshoot EtherChannel Problems |
|
|
431 | (8) |
|
|
434 | (1) |
|
|
435 | (4) |
|
Chapter 8 WAN Technologies |
|
|
439 | (34) |
|
Identify Different WAN Technologies |
|
|
440 | (4) |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Configure and Verify a Basic WAN Serial Connection |
|
|
444 | (8) |
|
|
446 | (1) |
|
Configure and Verify a PPP Connection between Cisco Routers |
|
|
446 | (1) |
|
Configuring PPP on Cisco Routers |
|
|
446 | (1) |
|
Configuring PPP Authentication |
|
|
446 | (1) |
|
Verifying and Troubleshooting Serial Links |
|
|
447 | (5) |
|
|
452 | (1) |
|
Configure and Verify Frame Relay on Cisco Routers |
|
|
452 | (11) |
|
|
453 | (3) |
|
Frame Relay Implementation and Monitoring |
|
|
456 | (7) |
|
Troubleshooting Frame Relay Networks |
|
|
463 | (4) |
|
|
467 | (1) |
|
Implement and Troubleshoot PPPoE |
|
|
467 | (2) |
|
|
468 | (1) |
|
|
469 | (4) |
|
Appendix A Answers to Review Questions |
|
|
473 | (10) |
|
Chapter 1 Operation of IP Data Networks |
|
|
474 | (1) |
|
Chapter 2 LAN Switching Technologies |
|
|
475 | (1) |
|
Chapter 3 IP Addressing (IPv4/IPv6) |
|
|
475 | (1) |
|
Chapter 4 IP Routing Technologies |
|
|
476 | (1) |
|
|
477 | (1) |
|
Chapter 6 Network Device Security |
|
|
478 | (1) |
|
Chapter 7 Troubleshooting |
|
|
479 | (1) |
|
Chapter 8 WAN Technologies |
|
|
480 | (3) |
|
Appendix B About the Additional Study Tools |
|
|
483 | |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
485 | |
|
|
486 | |
Index |
|
487 | (558) |
Introduction |
|
xxvii | |
ICND1 (100-101) Exam Objectives |
|
xxxviii | |
ICND2 (200-101) Exam Objectives |
|
xliv | |
CCNA Composite (200-120) Exam Objectives |
|
xlvii | |
Assessment Test |
|
lviii | |
|
|
1 | (612) |
|
Chapter 1 Internetworking |
|
|
3 | (38) |
|
|
4 | (8) |
|
|
12 | (2) |
|
|
13 | (1) |
|
Advantages of Reference Models |
|
|
14 | (1) |
|
|
14 | (15) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (5) |
|
|
23 | (2) |
|
|
25 | (3) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (3) |
|
Written 1.1 OSI Questions |
|
|
32 | (1) |
|
Written 1.2 Defining the OSI Layers and Devices |
|
|
33 | (1) |
|
Written 1.3 Identifying Collision and Broadcast Domains |
|
|
34 | (1) |
|
|
35 | (6) |
|
Chapter 2 Ethernet Networking and Data Encapsulation |
|
|
41 | (46) |
|
Ethernet Networks in Review |
|
|
42 | (17) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
Half- and Full-Duplex Ethernet |
|
|
47 | (2) |
|
Ethernet at the Data Link Layer |
|
|
49 | (6) |
|
Ethernet at the Physical Layer |
|
|
55 | (4) |
|
|
59 | (7) |
|
|
60 | (1) |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (2) |
|
|
66 | (4) |
|
The Cisco three-layer Hierarchical Model |
|
|
70 | (3) |
|
|
70 | (2) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (7) |
|
Written 2.1 Binary/Decimal/Hexadecimal Conversion |
|
|
75 | (4) |
|
Written 2.2 CSMA/CD Operations |
|
|
79 | (1) |
|
|
79 | (1) |
|
Written 2.4 Encapsulation |
|
|
80 | (1) |
|
|
81 | (6) |
|
Chapter 3 Introduction to TCP/IP |
|
|
87 | (52) |
|
|
88 | (1) |
|
A Brief History of TCP/IP |
|
|
89 | (1) |
|
|
89 | (29) |
|
The Process/Application Layer Protocols |
|
|
91 | (10) |
|
The Host-to-host Layer Protocols |
|
|
101 | (9) |
|
The Internet Layer Protocols |
|
|
110 | (8) |
|
|
118 | (8) |
|
|
118 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
119 | (5) |
|
Private IP Addresses (RFC 1918) |
|
|
124 | (2) |
|
|
126 | (3) |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
132 | (2) |
|
|
132 | (1) |
|
Written 3.2 Mapping Applications to the DoD Model |
|
|
132 | (2) |
|
|
134 | (5) |
|
Chapter 4 Easy Subnetting |
|
|
139 | (42) |
|
|
140 | (30) |
|
|
142 | (1) |
|
|
142 | (2) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
144 | (2) |
|
|
146 | (1) |
|
Subnetting Class C Addresses |
|
|
146 | (12) |
|
Subnetting Class B Addresses |
|
|
158 | (9) |
|
Subnetting Class A Addresses |
|
|
167 | (3) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
171 | (3) |
|
Written 4.1 Written Subnet Practice #1 |
|
|
171 | |
|
Written 4.2 Written Subnet Practice #2 |
|
|
111 | (62) |
|
Written 4.3 Written Subnet Practice #3 |
|
|
173 | (1) |
|
|
174 | (7) |
|
Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP |
|
|
181 | (32) |
|
Variable Length Subnet Masks (VLSMs) |
|
|
182 | (11) |
|
|
184 | (1) |
|
Implementing VLSM Networks |
|
|
184 | (9) |
|
|
193 | (3) |
|
Troubleshooting IP Addressing |
|
|
196 | (7) |
|
Determining IP Address Problems |
|
|
198 | (5) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (7) |
|
Chapter 6 Cisco's Internetworking Operating System (IOS) |
|
|
213 | (70) |
|
|
215 | (4) |
|
|
216 | (1) |
|
Connecting to a Cisco IOS Device |
|
|
216 | (2) |
|
|
218 | (1) |
|
Command-line Interface (CLI) |
|
|
219 | (9) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (3) |
|
Editing and Help Features |
|
|
223 | (5) |
|
Administrative Configurations |
|
|
228 | (13) |
|
|
228 | (1) |
|
|
229 | (2) |
|
|
231 | (6) |
|
Encrypting Your Passwords |
|
|
237 | (2) |
|
|
239 | (2) |
|
Router and Switch Interfaces |
|
|
241 | (9) |
|
|
244 | (6) |
|
Viewing, Saving, and Erasing Configurations |
|
|
250 | (14) |
|
Deleting the Configuration-and Reloading the Device |
|
|
252 | (1) |
|
Verifying Your Configuration |
|
|
253 | (11) |
|
|
264 | (1) |
|
|
265 | (3) |
|
|
268 | (1) |
|
|
268 | (9) |
|
Hands-on Lab 6.1 Erasing an Existing Configuration |
|
|
269 | (1) |
|
Hands-on Lab 6.2 Exploring User, Privileged, and Configuration Modes |
|
|
269 | (1) |
|
Hands-on Lab 6.3 Using the Help and Editing Features |
|
|
270 | (1) |
|
Hands-on Lab 6.4 Saving a Configuration |
|
|
271 | (1) |
|
Hands-on Lab 6.5 Setting Passwords |
|
|
272 | (2) |
|
Hands-on Lab 6.6 Setting the Hostname, Descriptions, IP Address, and Clock Rate |
|
|
274 | (3) |
|
|
277 | (6) |
|
Chapter 7 Managing a Cisco Internetwork |
|
|
283 | (48) |
|
The Internal Components of a Cisco Router and Switch |
|
|
284 | (2) |
|
The Router and Switch Boot Sequence |
|
|
285 | (1) |
|
Backing Up and Restoring the Cisco Configuration |
|
|
286 | (4) |
|
Backing Up the Cisco Configuration |
|
|
286 | (2) |
|
Restoring the Cisco Configuration |
|
|
288 | (1) |
|
Erasing the Configuration |
|
|
289 | (1) |
|
|
290 | (3) |
|
|
291 | (1) |
|
Verifying DHCP on Cisco IOS |
|
|
292 | (1) |
|
Network Time Protocol (NTP) |
|
|
293 | (2) |
|
Using Cisco Discovery Protocol (CDP) |
|
|
295 | (8) |
|
Getting CDP Timers and Holdtime Information |
|
|
295 | (1) |
|
Gathering Neighbor Information |
|
|
296 | (4) |
|
Documenting a Network Topology Using CDP |
|
|
300 | (3) |
|
|
303 | (4) |
|
Telnetting into Multiple Devices Simultaneously |
|
|
305 | (1) |
|
Checking Telnet Connections |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (4) |
|
|
307 | (2) |
|
Using DNS to Resolve Names |
|
|
309 | (2) |
|
Checking Network Connectivity and Troubleshooting |
|
|
311 | (6) |
|
|
312 | (1) |
|
Using the traceroute Command |
|
|
312 | (2) |
|
|
314 | (2) |
|
Using the show processes Command |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (2) |
|
|
319 | (1) |
|
Written 7.1 IOS Management |
|
|
319 | (1) |
|
Written 7.2 Router Memory |
|
|
319 | (1) |
|
|
320 | (5) |
|
Hands-on Lab 7.1 Backing Up the Router Configuration |
|
|
320 | (1) |
|
Hands-on Lab 7.2 Using the Cisco Discovery Protocol (CDP) |
|
|
321 | (1) |
|
Hands-on Lab 7.3 Using Telnet |
|
|
322 | (1) |
|
Hands-on Lab 7.4 Resolving Hostnames |
|
|
323 | (2) |
|
|
325 | (6) |
|
|
331 | (54) |
|
|
333 | (2) |
|
|
335 | (11) |
|
The Cisco Router Internal Process |
|
|
341 | (1) |
|
Testing Your IP Routing Understanding |
|
|
342 | (4) |
|
|
346 | (10) |
|
Configuring IP Routing in Our Network |
|
|
356 | (9) |
|
|
357 | (5) |
|
|
362 | (3) |
|
|
365 | (2) |
|
|
365 | (2) |
|
Routing Information Protocol (RIP) |
|
|
367 | (6) |
|
|
367 | (4) |
|
Holding Down RIP Propagations |
|
|
371 | (2) |
|
|
373 | (1) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
376 | (4) |
|
Hands-on Lab 8.1 Creating Static Routes |
|
|
377 | (1) |
|
Hands-on Lab 8.2 Configuring RIP Routing |
|
|
378 | (2) |
|
|
380 | (5) |
|
Chapter 9 Open Shortest Path First (OSPF) |
|
|
385 | (40) |
|
Open Shortest Path First (OSPF) Basics |
|
|
386 | (7) |
|
|
389 | (2) |
|
|
391 | (2) |
|
|
393 | (9) |
|
|
393 | (1) |
|
|
394 | (3) |
|
Configuring Our Network with OSPF |
|
|
397 | (5) |
|
OSPF and Loopback Interfaces |
|
|
402 | (3) |
|
Configuring Loopback Interfaces |
|
|
403 | (2) |
|
Verifying OSPF Configuration |
|
|
405 | (6) |
|
|
406 | (1) |
|
The show ip ospf database Command |
|
|
407 | (1) |
|
The show ip ospf interface Command |
|
|
408 | (1) |
|
The show ip ospf neighbor Command |
|
|
409 | (2) |
|
The show ip protocols Command |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
413 | (4) |
|
Hands-on Lab 9.1 Enabling the OSPF Process |
|
|
414 | (1) |
|
Hands-on Lab 9.2 Configuring OSPF Interfaces |
|
|
415 | (1) |
|
Hands-on Lab 9.3 Verifying OSPF Operation |
|
|
416 | (1) |
|
|
417 | (8) |
|
Chapter 10 Layer 2 Switching |
|
|
425 | (34) |
|
|
426 | (10) |
|
Three Switch Functions at Layer 2 |
|
|
427 | (4) |
|
|
431 | (5) |
|
Configuring Catalyst Switches |
|
|
436 | (11) |
|
Catalyst Switch Configuration |
|
|
436 | (8) |
|
Verifying Cisco Catalyst Switches |
|
|
444 | (3) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (4) |
|
Lab 10.1 Configuring Layer 2 Switches |
|
|
449 | (1) |
|
Lab 10.2 Verifying Layer 2 Switches |
|
|
450 | (1) |
|
Lab 10.3 Configuring Port Security |
|
|
450 | (2) |
|
|
452 | (7) |
|
Chapter 11 VLANs and InterVLAN Routing |
|
|
459 | (42) |
|
|
460 | (5) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Flexibility and Scalability |
|
|
464 | (1) |
|
|
465 | (4) |
|
|
467 | (1) |
|
VLAN Identification Methods |
|
|
468 | (1) |
|
|
469 | (3) |
|
|
472 | (15) |
|
Assigning Switch Ports to VLANs |
|
|
475 | (1) |
|
|
476 | (4) |
|
Configuring Inter-VLAN Routing |
|
|
480 | (7) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (5) |
|
Hands-on Lab 11.1 Configuring and Verifying VLANs |
|
|
490 | (1) |
|
Hands-on Lab 11.2 Configuring and Verifying Trunk Links |
|
|
491 | (1) |
|
Hands-on Lab 11.3 Configuring Router on a Stick Routing |
|
|
492 | (1) |
|
Hands-on Lab 11.4 Configuring IVR with a Layer 3 Switch |
|
|
492 | (2) |
|
|
494 | (7) |
|
|
501 | (40) |
|
Perimeter, Firewall, and Internal Routers |
|
|
502 | (1) |
|
Introduction to Access Lists |
|
|
503 | (4) |
|
Mitigating Security Issues with ACLs |
|
|
506 | (1) |
|
|
507 | (8) |
|
|
508 | (2) |
|
Standard Access List Example |
|
|
510 | (4) |
|
Controlling VTY (Telnet/SSH) Access |
|
|
514 | (1) |
|
|
515 | (11) |
|
Extended Access List Example 1 |
|
|
519 | (2) |
|
Extended Access List Example 2 |
|
|
521 | (1) |
|
Extended Access List Example 3 |
|
|
522 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
526 | (2) |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (5) |
|
Hands-on Lab 12.1 Standard IP Access Lists |
|
|
531 | (1) |
|
Hands-on Lab 12.2 Extended IP Access Lists |
|
|
532 | (3) |
|
|
535 | (6) |
|
Chapter 13 Network Address Translation (NAT) |
|
|
541 | (28) |
|
|
542 | (2) |
|
Types of Network Address Translation |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (5) |
|
|
547 | (1) |
|
Dynamic NAT Configuration |
|
|
548 | (1) |
|
PAT (Overloading) Configuration |
|
|
548 | (1) |
|
Simple Verification of NAT |
|
|
549 | (1) |
|
Testing and Troubleshooting NAT |
|
|
550 | (5) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (7) |
|
Lab 13.1 Preparing for NAT |
|
|
558 | (2) |
|
Lab 13.2 Configuring Dynamic NAT |
|
|
560 | (1) |
|
|
561 | (3) |
|
|
564 | (5) |
|
Chapter 14 Internet Protocol Version 6 (IPv6) |
|
|
569 | (44) |
|
|
571 | (1) |
|
The Benefits and Uses of IPv6 |
|
|
571 | (2) |
|
IPv6 Addressing and Expressions |
|
|
573 | (4) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
How IPv6 Works in an Internetwork |
|
|
577 | (9) |
|
Manual Address Assignment |
|
|
578 | (1) |
|
Stateless Autocohfiguration (eui-64) |
|
|
578 | (3) |
|
|
581 | (1) |
|
|
582 | (1) |
|
|
583 | (3) |
|
|
586 | (2) |
|
|
586 | (1) |
|
|
587 | (1) |
|
Configuring IPv6 on Our Internetwork |
|
|
588 | (3) |
|
Configuring Routing on Our Internetwork |
|
|
591 | (8) |
|
|
594 | (5) |
|
|
599 | (1) |
|
|
599 | (2) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
602 | (5) |
|
Hands-on Lab 14.1 Manual and Stateful Autoconfiguration |
|
|
602 | (2) |
|
Hands-on Lab 14.2 Static and Default Routing |
|
|
604 | (1) |
|
|
605 | (2) |
|
|
607 | (6) |
|
|
613 | (354) |
|
Chapter 15 Enhanced Switched Technologies |
|
|
615 | (46) |
|
Spanning Tree Protocol (STP) |
|
|
616 | (7) |
|
|
617 | (4) |
|
|
621 | (2) |
|
Types of Spanning-tree Protocols |
|
|
623 | (8) |
|
|
624 | (1) |
|
|
625 | (6) |
|
Modifying and Verifying the Bridge ID |
|
|
631 | (5) |
|
Spanning-tree Failure Consequences |
|
|
636 | (2) |
|
|
638 | (4) |
|
|
640 | (2) |
|
|
642 | (4) |
|
Configuring and Verifying Port Channels |
|
|
643 | (3) |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
648 | (8) |
|
Hands-on Lab 1.1 Verifying STP and Finding Your Root Bridge |
|
|
649 | (2) |
|
Hands-on Lab 1.2 Configuring and Verifying Your Root Bridge |
|
|
651 | (1) |
|
Hands-on Lab 1.3 Configuring PortFast and BPDU Guard |
|
|
652 | (1) |
|
Hands-on Lab 1.4 Configuring and Verifying EtherChannel |
|
|
653 | (3) |
|
|
656 | (5) |
|
Chapter 16 Managing Cisco Devices |
|
|
661 | (38) |
|
The Internal Components of a Cisco Router |
|
|
662 | (1) |
|
|
663 | (1) |
|
Managing Configuration Register |
|
|
664 | (7) |
|
Understanding the Configuration Register Bits |
|
|
665 | (1) |
|
Checking the Current Configuration Register Value |
|
|
666 | (1) |
|
|
667 | (2) |
|
|
669 | (2) |
|
Backing Up and Restoring the Cisco IOS |
|
|
671 | (11) |
|
|
673 | (1) |
|
|
674 | (1) |
|
Restoring or Upgrading the Cisco Router IOS |
|
|
675 | (2) |
|
Using the Cisco IOS File System (Cisco IFS) |
|
|
677 | (5) |
|
|
682 | (6) |
|
Right-To-Use Licenses (Evaluation Licenses) |
|
|
684 | (3) |
|
Backing Up and Uninstalling the License |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
689 | (2) |
|
|
691 | (1) |
|
Written 2.1 IOS Management |
|
|
691 | (1) |
|
Written 2.2 Router Memory |
|
|
691 | (1) |
|
|
692 | (2) |
|
Hands-on Lab 2.1 Backing Up Your Router IOS |
|
|
692 | (1) |
|
Hands-on Lab 2.2 Upgrading or Restoring Your Router IOS |
|
|
692 | (2) |
|
|
694 | (5) |
|
|
699 | (42) |
|
|
700 | (2) |
|
Introducing First Hop Redundancy Protocol (FHRP) |
|
|
702 | (2) |
|
Hot Standby Router Protocol (HSRP) |
|
|
704 | (11) |
|
|
705 | (1) |
|
|
706 | (2) |
|
|
708 | (1) |
|
Configuring and Verifying HSRP |
|
|
709 | (6) |
|
Virtual Router Redundancy Protocol |
|
|
715 | (1) |
|
|
715 | (1) |
|
VRRP Redundancy Characteristics |
|
|
715 | (1) |
|
Gateway Load Balancing Protocol |
|
|
716 | (5) |
|
|
717 | (1) |
|
|
717 | (1) |
|
GLBP Per-host Traffic Balancing |
|
|
718 | (1) |
|
|
718 | (3) |
|
|
721 | (5) |
|
Configuring and Verifying Syslog |
|
|
723 | (3) |
|
|
726 | (4) |
|
Management Information Base (MIB) |
|
|
727 | (1) |
|
|
728 | (2) |
|
|
730 | (4) |
|
NetFlow Overview and Flows |
|
|
731 | (1) |
|
|
732 | (2) |
|
|
734 | (1) |
|
|
734 | (1) |
|
|
735 | (1) |
|
|
736 | (5) |
|
Chapter 18 Troubleshooting IP, IPv6, and VLANs |
|
|
741 | (42) |
|
Troubleshooting IP Network Connectivity |
|
|
742 | (12) |
|
Troubleshooting IPv6 Network Connectivity |
|
|
754 | (9) |
|
|
755 | (8) |
|
Troubleshooting VLAN Connectivity |
|
|
763 | (13) |
|
|
763 | (5) |
|
|
768 | (8) |
|
|
776 | (1) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
779 | (4) |
|
|
783 | (64) |
|
EIGRP Features and Operations |
|
|
784 | (8) |
|
|
785 | (5) |
|
Reliable Transport Protocol (RTP) |
|
|
790 | (1) |
|
Diffusing Update Algorithm (DUAL) |
|
|
791 | (1) |
|
Route Discovery and Maintenance |
|
|
792 | (1) |
|
|
792 | (19) |
|
VLSM Support and Summarization |
|
|
795 | (3) |
|
Controlling EIGRP Traffic |
|
|
798 | (11) |
|
|
809 | (2) |
|
Verifying and Troubleshooting EIGRP |
|
|
811 | (7) |
|
Troubleshooting Example with EIGRP |
|
|
818 | (10) |
|
|
828 | (5) |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
835 | (1) |
|
|
835 | (3) |
|
Hands-on Lab 5.1 Configuring and Verifying EIGRP |
|
|
835 | (2) |
|
Hands-on Lab 5.2 Configuring and Verifying EIGRPv6 |
|
|
837 | (1) |
|
|
838 | (9) |
|
Chapter 20 Multi-Area OSPF |
|
|
847 | (50) |
|
|
848 | (2) |
|
Categories of Multi-area Components |
|
|
850 | (7) |
|
|
850 | (1) |
|
|
851 | (1) |
|
Link-state Advertisements |
|
|
852 | (2) |
|
|
854 | (1) |
|
|
855 | (2) |
|
Basic Multi-area Configuration |
|
|
857 | (2) |
|
Verifying and Troubleshooting Multi-area OSPF Networks |
|
|
859 | (9) |
|
|
861 | (1) |
|
The show ip ospf interface Command |
|
|
862 | (2) |
|
The show ip protocols Command |
|
|
864 | (1) |
|
The show ip route Command |
|
|
865 | (1) |
|
The show ip ospf database Command |
|
|
866 | (2) |
|
Troubleshooting OSPF Scenario |
|
|
868 | (8) |
|
|
876 | (5) |
|
|
879 | (2) |
|
|
881 | (1) |
|
|
881 | (2) |
|
|
883 | (1) |
|
|
883 | (7) |
|
Hands-on Lab 6.1 Configuring and Verifying OSPF Multi-Area |
|
|
884 | (3) |
|
Hands-on Lab 6.2 Configuring and Verifying OSPFv3 |
|
|
887 | (3) |
|
|
890 | (7) |
|
Chapter 21 Wide Area Networks |
|
|
897 | (70) |
|
Introduction to Wide Area Networks |
|
|
898 | (7) |
|
|
899 | (1) |
|
|
900 | (1) |
|
|
900 | (2) |
|
|
902 | (3) |
|
|
905 | (5) |
|
|
906 | (1) |
|
Digital Subscriber Line (DSL) |
|
|
907 | (3) |
|
Cabling the Serial Wide Area Network |
|
|
910 | (2) |
|
|
910 | (1) |
|
Data Terminal Equipment and Data Communication Equipment |
|
|
911 | (1) |
|
High-Level Data-Link Control (HDLC) Protocol |
|
|
912 | (2) |
|
Point-to-Point Protocol (PPP) |
|
|
914 | (9) |
|
Link Control Protocol (LCP) Configuration Options |
|
|
915 | (1) |
|
PPP Session Establishment |
|
|
916 | (1) |
|
PPP Authentication Methods |
|
|
917 | (1) |
|
Configuring PPP on Cisco Routers |
|
|
917 | (1) |
|
Configuring PPP Authentication |
|
|
917 | (1) |
|
Verifying and Troubleshooting Serial Links |
|
|
918 | (5) |
|
|
923 | (19) |
|
Introduction to Frame Relay Technology |
|
|
924 | (7) |
|
Frame Relay Implementation and Monitoring |
|
|
931 | (11) |
|
|
942 | (4) |
|
|
943 | (1) |
|
Introduction to Cisco IOS IPsec |
|
|
944 | (1) |
|
|
945 | (1) |
|
|
946 | (5) |
|
|
947 | (2) |
|
|
949 | (2) |
|
|
951 | (1) |
|
|
951 | (2) |
|
|
953 | (1) |
|
|
953 | (8) |
|
Hands-on Lab 7.1 Configuring PPP Encapsulation and Authentication |
|
|
953 | (2) |
|
Hands-on Lab 7.2 Configuring and Monitoring HDLC |
|
|
955 | (1) |
|
Hands-on Lab 7.3 Configuring Frame Relay and Subinterfaces |
|
|
956 | (2) |
|
Hands-on Lab 7.4 Configuring a GRE Tunnel |
|
|
958 | (3) |
|
|
961 | (6) |
|
Appendix A Answers to Written Labs |
|
|
967 | (20) |
|
Chapter 1 Internetworking |
|
|
968 | (2) |
|
Written 1.1 OSI Questions |
|
|
968 | (1) |
|
Written 1.2 Defining the OSI Layers and Devices |
|
|
969 | (1) |
|
Written Lab 1.3 Identifying Collision and Broadcast Domains |
|
|
970 | (1) |
|
Chapter 2 Ethernet Networking and Data Encapsulation |
|
|
970 | (4) |
|
Written 2.1 Binary/Decimal/Hexadecimal Conversion |
|
|
970 | (3) |
|
Written 2.2 CSMA/CD Operations |
|
|
973 | (1) |
|
|
973 | (1) |
|
Written 2.4 Encapsulation |
|
|
974 | (1) |
|
Chapter 3 Introduction to TCP/IP |
|
|
974 | (1) |
|
|
974 | (1) |
|
Written 3.2 Mapping Applications to the DoD Model |
|
|
974 | (1) |
|
Chapter 4 Easy Subnetting |
|
|
975 | (2) |
|
Written 4.1 Written Subnet Practice #1 |
|
|
975 | (1) |
|
Written 4.2 Written Subnet Practice #2 |
|
|
976 | (1) |
|
Written 4.3 Written Subnet Practice #3 |
|
|
977 | (1) |
|
Chapter 5 VLSMs, Summarization and Troubleshooting TCP/IP |
|
|
977 | (1) |
|
Chapter 6 Cisco's Internetworking Operating System (IOS) |
|
|
978 | (1) |
|
|
978 | (1) |
|
Chapter 7 Managing a Cisco Internetwork |
|
|
978 | (1) |
|
Written 7.1 IOS Management |
|
|
978 | (1) |
|
Written 7.2 Router Memory |
|
|
979 | (1) |
|
|
979 | (1) |
|
Chapter 9 Open Shortest Path First (OSPF) |
|
|
980 | (1) |
|
Chapter 10 Layer 2 Switching |
|
|
980 | (1) |
|
Chapter 11 VLANs and InterVLAN Routing |
|
|
980 | (1) |
|
|
981 | (1) |
|
Chapter 13 Network Address Translation (NAT) |
|
|
981 | (1) |
|
Chapter 14 Internet Protocol Version 6 (IPv6) |
|
|
982 | (1) |
|
|
982 | (1) |
|
|
982 | (1) |
|
Chapter 15 Enhanced Switch Technologies |
|
|
982 | (1) |
|
Chapter 16 Managing Cisco Devices |
|
|
983 | (1) |
|
Written 16.1 IOS Management |
|
|
983 | (1) |
|
Written 16.2 Router Memory |
|
|
983 | (1) |
|
|
984 | (1) |
|
Chapter 18 Troubleshooting IP, IPv6, and VLANs |
|
|
984 | (1) |
|
|
984 | (1) |
|
Chapter 20 Multi-Area OSPF |
|
|
985 | (1) |
|
Chapter 21 Wide Area Networks |
|
|
985 | (2) |
|
Appendix B Answers to Review Questions |
|
|
987 | (42) |
|
Chapter 1 Internetworking |
|
|
988 | (2) |
|
Chapter 2 Ethernet Networking and Data Encapsulation |
|
|
990 | (1) |
|
Chapter 3 Introduction-to TCP/IP |
|
|
991 | (2) |
|
Chapter 4 Easy Subnetting |
|
|
993 | (2) |
|
Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP |
|
|
995 | (2) |
|
Chapter 6 Cisco's Internetworking Operating System (IOS) |
|
|
997 | (2) |
|
Chapter 7 Managing a Cisco Internetwork |
|
|
999 | (2) |
|
|
1001 | (1) |
|
Chapter 9 Open Shortest Path First (OSPF) |
|
|
1002 | (2) |
|
Chapter 10 Layer 2 Switching |
|
|
1004 | (3) |
|
Chapter 11 VLANs and InterVLAN Routing |
|
|
1007 | (1) |
|
|
1008 | (3) |
|
Chapter 13 Network Address Translation (NAT) |
|
|
1011 | (1) |
|
Chapter 14 Internet Protocol Version 6 (IPv6) |
|
|
1012 | (2) |
|
Chapter 15 Enhanced Switch Technologies |
|
|
1014 | (2) |
|
Chapter 16 Managing Cisco Devices |
|
|
1016 | (2) |
|
|
1018 | (3) |
|
Chapter 18 Troubleshooting IP, IPv6, and VLANs |
|
|
1021 | (1) |
|
|
1022 | (2) |
|
Chapter 20 Multi-Area OSPF |
|
|
1024 | (2) |
|
Chapter 21 Wide Area Networks |
|
|
1026 | (3) |
|
Appendix C Disabling and Configuring Network Services |
|
|
1029 | (12) |
|
|
1030 | (1) |
|
|
1030 | (1) |
|
Turning off BootP and Auto-Config |
|
|
1031 | (1) |
|
Disabling the HTTP Interface |
|
|
1032 | (1) |
|
Disabling IP Source Routing |
|
|
1032 | (1) |
|
|
1032 | (1) |
|
Disabling Redirect Messages |
|
|
1032 | (1) |
|
Disabling the Generation of ICMP Unreachable Messages |
|
|
1033 | (1) |
|
Disabling Multicast Route Caching |
|
|
1033 | (1) |
|
Disabling the Maintenance Operation Protocol (MOP) |
|
|
1033 | (1) |
|
Turning Off the X.25 PAD Service |
|
|
1034 | (1) |
|
Enabling the Nagle TCP Congestion Algorithm |
|
|
1034 | (1) |
|
|
1034 | (1) |
|
Disabling Cisco Discovery Protocol |
|
|
1035 | (1) |
|
Disabling the Default Forwarded UDP Protocols |
|
|
1035 | (1) |
|
|
1036 | (5) |
|
Appendix D About the Additional Study Tools |
|
|
1041 | (4) |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
|
1043 | (1) |
|
|
1043 | (1) |
|
|
1043 | (1) |
|
Minimum System Requirements |
|
|
1043 | (1) |
|
|
1044 | (1) |
|
|
1044 | (1) |
|
|
1044 | (1) |
Index |
|
1045 | |