CCNA® Routing And Switching: Complete Review Guide |
|
|
|
xiii | |
|
|
xxvi | |
|
Chapter 1 Network Fundamentals |
|
|
1 | (60) |
|
Compare and contrast OSI and TCP/IP models |
|
|
2 | (3) |
|
Compare and contrast TCP and UDP protocols |
|
|
5 | (5) |
|
Describe the impact of infrastructure components in an enterprise network |
|
|
10 | (1) |
|
Describe the effects of cloud resources on enterprise network architecture |
|
|
11 | (3) |
|
Compare and contrast collapsed core and three-tier architectures |
|
|
14 | (4) |
|
Compare and contrast network topologies |
|
|
18 | (1) |
|
Select the appropriate cabling type based on implementation requirements |
|
|
19 | (9) |
|
Apply troubleshooting methodologies to resolve problems |
|
|
28 | (1) |
|
Configure, verify, and troubleshoot IPv4 addressing and subnetting |
|
|
29 | (13) |
|
Compare and contrast IPv4 address types |
|
|
42 | (4) |
|
Describe the need for private IPv4 addressing |
|
|
46 | (1) |
|
Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment |
|
|
47 | (3) |
|
Configure, verify, and troubleshoot IPv6 addressing |
|
|
50 | (3) |
|
Configure and verify IPv6 Stateless address Auto configuration |
|
|
53 | (2) |
|
Compare and contrast IPv6 address types |
|
|
55 | (3) |
|
|
58 | (3) |
|
Chapter 2 LAN Switching Technologies |
|
|
61 | (54) |
|
Describe and verify switching concepts |
|
|
62 | (4) |
|
Interpret Ethernet frame format |
|
|
66 | (2) |
|
Troubleshoot interface and cable issues (collisions, errors, duplex, speed) |
|
|
68 | (2) |
|
Configure, verify, and troubleshoot VLANs (normal/ extended range) spanning multiple switches |
|
|
70 | (6) |
|
Configure, verify, and troubleshoot interswitch connectivity |
|
|
76 | (8) |
|
Configure, verify, and troubleshoot STP protocols |
|
|
84 | (8) |
|
Configure, verify, and troubleshoot STP-related optional features |
|
|
92 | (2) |
|
Configure and verify layer 2 protocols |
|
|
94 | (8) |
|
Configure, verify, and troubleshoot (layer 2/layer 3) EtherChannel |
|
|
102 | (7) |
|
Describe the benefits of switch stacking and chassis aggregation |
|
|
109 | (2) |
|
|
111 | (4) |
|
Chapter 3 Routing Technologies |
|
|
115 | (110) |
|
Describe the routing concepts |
|
|
116 | (7) |
|
Interpret the components of a routing table |
|
|
123 | (4) |
|
Describe how a routing table is populated by different routing information sources |
|
|
127 | (1) |
|
Configure, verify, and troubleshoot inter-VLAN routing |
|
|
127 | (9) |
|
Compare and contrast static routing and dynamic routing |
|
|
136 | (2) |
|
Compare and contrast distance vector and link state routing protocols |
|
|
138 | (1) |
|
Compare and contrast interior and exterior routing protocols |
|
|
139 | (1) |
|
Configure, verify, and troubleshoot IPv4 and IPv6 static routing |
|
|
139 | (7) |
|
Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) |
|
|
146 | (28) |
|
Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs) |
|
|
174 | (4) |
|
Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub) |
|
|
178 | (9) |
|
Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub) |
|
|
187 | (6) |
|
Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution) |
|
|
193 | (6) |
|
Troubleshoot basic layer 3 end-to-end connectivity issues |
|
|
199 | (22) |
|
|
221 | (4) |
|
Chapter 4 WAN Technologies |
|
|
225 | (46) |
|
Configure and verify PPP and MLPPP on WAN interfaces using local authentication |
|
|
226 | (13) |
|
Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication |
|
|
239 | (2) |
|
Configure, verify, and troubleshoot GRE tunnel connectivity |
|
|
241 | (5) |
|
Describe WAN topology options |
|
|
246 | (2) |
|
Describe WAN access connectivity options |
|
|
248 | (5) |
|
Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only) |
|
|
253 | (6) |
|
Describe basic QoS concepts |
|
|
259 | (10) |
|
|
269 | (2) |
|
Chapter 5 Infrastructure Services |
|
|
271 | (36) |
|
Describe DNS lookup operation |
|
|
272 | (3) |
|
Troubleshoot client connectivity issues involving DNS |
|
|
275 | (1) |
|
Configure and verify DHCP on a router (excluding static reservations) |
|
|
276 | (2) |
|
Troubleshoot client- and router-based DHCP connectivity issues |
|
|
278 | (3) |
|
Configure, verify, and troubleshoot basic HSRP |
|
|
281 | (12) |
|
Configure, verify, and troubleshoot inside source NAT |
|
|
293 | (9) |
|
Configure and verify NTP operating in a client/server mode |
|
|
302 | (3) |
|
|
305 | (2) |
|
Chapter 6 Infrastructure Security |
|
|
307 | (52) |
|
Configure, verify, and troubleshoot port security |
|
|
308 | (3) |
|
Describe common access layer threat mitigation techniques |
|
|
311 | (3) |
|
Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering |
|
|
314 | (24) |
|
Verify ACLs using the APIC-EM Path Trace ACL Analysis tool |
|
|
338 | (3) |
|
Configure, verify, and troubleshoot basic device hardening |
|
|
341 | (11) |
|
Describe device security using AAA with TACACS+ and RADIUS |
|
|
352 | (4) |
|
|
356 | (3) |
|
Chapter 7 Infrastructure Management |
|
|
359 | (66) |
|
Configure and verify device-monitoring protocols |
|
|
360 | (9) |
|
Troubleshoot network connectivity issues using ICMP echo-based IP SLA |
|
|
369 | (2) |
|
Configure and verify device management |
|
|
371 | (21) |
|
Configure and verify initial device configuration |
|
|
392 | (10) |
|
Perform device maintenance |
|
|
402 | (11) |
|
Use Cisco IOS tools to troubleshoot and resolve problems |
|
|
413 | (4) |
|
Describe network programmability in enterprise network architecture |
|
|
417 | (5) |
|
|
422 | (3) |
|
Appendix Answers to Review Questions |
|
|
425 | (6) |
|
Chapter 1: Network Fundamentals |
|
|
426 | (1) |
|
Chapter 2: LAN Switching Technologies |
|
|
426 | (1) |
|
Chapter 3: Routing Technologies |
|
|
427 | (1) |
|
Chapter 4: WAN Technologies |
|
|
428 | (1) |
|
Chapter 5: Infrastructure Services |
|
|
428 | (1) |
|
Chapter 6: Infrastructure Security |
|
|
429 | (1) |
|
Chapter 7: Infrastructure Management |
|
|
430 | (1) |
|
|
431 | |
CCNA® Routing and Switching: Complete Deluxe Study Guide |
|
|
|
xxv | |
|
|
l | |
|
|
1 | (580) |
|
Chapter 1 Internetworking |
|
|
3 | (38) |
|
|
4 | (9) |
|
|
13 | (2) |
|
|
13 | (1) |
|
Advantages of Reference Models |
|
|
14 | (1) |
|
|
15 | (16) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (6) |
|
|
24 | (2) |
|
|
26 | (3) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (4) |
|
Written Lab 1.1: OSI Questions |
|
|
32 | (2) |
|
Written Lab 1.2: Defining the OSI Layers and Devices |
|
|
34 | (1) |
|
Written Lab 1.3: Identifying Collision and Broadcast Domains |
|
|
34 | (2) |
|
|
36 | (5) |
|
Chapter 2 Ethernet Networking and Data Encapsulation |
|
|
41 | (44) |
|
Ethernet Networks in Review |
|
|
42 | (17) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
Half- and Full-Duplex Ethernet |
|
|
47 | (2) |
|
Ethernet at the Data Link Layer |
|
|
49 | (6) |
|
Ethernet at the Physical Layer |
|
|
55 | (4) |
|
|
59 | (7) |
|
|
59 | (1) |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (2) |
|
|
66 | (3) |
|
The Cisco Three-Layer Hierarchical Model |
|
|
69 | (3) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (5) |
|
Written Lab 2.1: Binary/Decimal/Hexadecimal Conversion |
|
|
74 | (3) |
|
Written Lab 2.2: CSMA/CD Operations |
|
|
77 | (1) |
|
|
78 | (1) |
|
Written Lab 2.4: Encapsulation |
|
|
78 | (1) |
|
|
79 | (6) |
|
Chapter 3 Introduction to TCP/IP |
|
|
85 | (50) |
|
|
86 | (1) |
|
A Brief History of TCP/IP |
|
|
87 | (1) |
|
|
87 | (29) |
|
The Process/Application Layer Protocols |
|
|
89 | (10) |
|
The Host-to-Host or Transport Layer Protocols |
|
|
99 | (9) |
|
The Internet Layer Protocols |
|
|
108 | (8) |
|
|
116 | (7) |
|
|
116 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
117 | (5) |
|
Private IP Addresses (RFC 1918) |
|
|
122 | (1) |
|
|
123 | (4) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (2) |
|
|
129 | (2) |
|
|
129 | (1) |
|
Written Lab 3.2: Mapping Applications to the DoD Model |
|
|
129 | (2) |
|
|
131 | (4) |
|
Chapter 4 Easy Subnetting |
|
|
135 | (40) |
|
|
136 | (30) |
|
|
138 | (1) |
|
|
138 | (2) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
140 | (2) |
|
|
142 | (1) |
|
Subnetting Class C Addresses |
|
|
142 | (12) |
|
Subnetting Class B Addresses |
|
|
154 | (9) |
|
Subnetting Class A Addresses |
|
|
163 | (3) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (3) |
|
Written Lab 4.1: Written Subnet Practice #1 |
|
|
167 | (1) |
|
Written Lab 4.2: Written Subnet Practice #2 |
|
|
168 | (1) |
|
Written Lab 4.3: Written Subnet Practice #3 |
|
|
169 | (1) |
|
|
170 | (5) |
|
Chapter 5 VLSMs, Summarization, and Troubleshooting TCP/IP |
|
|
175 | (30) |
|
Variable Length Subnet Masks (VLSMs) |
|
|
176 | (10) |
|
|
178 | (1) |
|
Implementing VLSM Networks |
|
|
179 | (7) |
|
|
186 | (3) |
|
Troubleshooting IP Addressing |
|
|
189 | (7) |
|
Determining IP Address Problems |
|
|
192 | (4) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
Lab 5.1: Summarization Practice |
|
|
198 | (1) |
|
|
199 | (6) |
|
Chapter 6 Cisco's Internetworking Operating System (IOS) |
|
|
205 | (68) |
|
|
206 | (3) |
|
|
206 | (1) |
|
Connecting to a Cisco IOS Device |
|
|
207 | (2) |
|
|
209 | (1) |
|
Command-Line Interface (CLI) |
|
|
209 | (9) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (2) |
|
Editing and Help Features |
|
|
213 | (5) |
|
Administrative Configurations |
|
|
218 | (13) |
|
|
219 | (1) |
|
|
219 | (2) |
|
|
221 | (6) |
|
Encrypting Your Passwords |
|
|
227 | (2) |
|
|
229 | (2) |
|
Router and Switch Interfaces |
|
|
231 | (9) |
|
|
234 | (6) |
|
Viewing, Saving, and Erasing Configurations |
|
|
240 | (15) |
|
Deleting the Configuration and Reloading the Device |
|
|
242 | (1) |
|
Verifying Your Configuration |
|
|
242 | (13) |
|
|
255 | (1) |
|
|
256 | (3) |
|
Written Lab 6: IOS Understanding |
|
|
259 | (1) |
|
|
259 | (8) |
|
Hands-on Lab 6.1: Erasing an Existing Configuration |
|
|
260 | (1) |
|
Hands-on Lab 6.2: Exploring User, Privileged, and Configuration Modes |
|
|
260 | (1) |
|
Hands-on Lab 6.3: Using the Help and Editing Features |
|
|
261 | (1) |
|
Hands-on Lab 6.4: Saving a Configuration |
|
|
262 | (1) |
|
Hands-on Lab 6.5: Setting Passwords |
|
|
263 | (2) |
|
Hands-on Lab 6.6: Setting the Hostname, Descriptions, IP Address, and Clock Rate |
|
|
265 | (2) |
|
|
267 | (6) |
|
Chapter 7 Managing a Cisco Internetwork |
|
|
273 | (50) |
|
The Internal Components of a Cisco Router and Switch |
|
|
274 | (2) |
|
The Router and Switch Boot Sequence |
|
|
275 | (1) |
|
Backing Up and Restoring the Cisco Configuration |
|
|
276 | (4) |
|
Backing Up the Cisco Configuration |
|
|
277 | (2) |
|
Restoring the Cisco Configuration |
|
|
279 | (1) |
|
Erasing the Configuration |
|
|
279 | (1) |
|
|
280 | (3) |
|
|
281 | (1) |
|
Verifying DHCP on Cisco IOS |
|
|
282 | (1) |
|
|
283 | (5) |
|
Configuring and Verifying Syslog |
|
|
285 | (3) |
|
Network Time Protocol (NTP) |
|
|
288 | (1) |
|
Exploring Connected Devices Using CDP and LLDP |
|
|
289 | (9) |
|
Getting CDP Timers and Holdtime Information |
|
|
290 | (1) |
|
Gathering Neighbor Information |
|
|
291 | (4) |
|
Documenting a Network Topology Using CDP |
|
|
295 | (3) |
|
|
298 | (4) |
|
Telnetting into Multiple Devices Simultaneously |
|
|
300 | (1) |
|
Checking Telnet Connections |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (4) |
|
|
302 | (2) |
|
Using DNS to Resolve Names |
|
|
304 | (2) |
|
Checking Network Connectivity and Troubleshooting |
|
|
306 | (5) |
|
|
306 | (1) |
|
Using the traceroute Command |
|
|
307 | (1) |
|
|
308 | (2) |
|
Using the show processes Command |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (1) |
|
Written Lab 7.1: IOS Management |
|
|
313 | (1) |
|
Written Lab 7.2: Router Memory |
|
|
314 | (1) |
|
|
314 | (5) |
|
Hands-on Lab 7.1: Backing Up the Router Configuration |
|
|
315 | (1) |
|
Hands-on-Lab 7.2: Using the Cisco Discovery Protocol (CDP) |
|
|
315 | (1) |
|
Hands-on Lab 7.3: Using Telnet |
|
|
316 | (1) |
|
Hands-on Lab 7.4: Resolving Hostnames |
|
|
317 | (2) |
|
|
319 | (4) |
|
Chapter 8 Managing Cisco Devices |
|
|
323 | (34) |
|
Managing the Configuration Register |
|
|
324 | (7) |
|
Understanding the Configuration Register Bits |
|
|
324 | (2) |
|
Checking the Current Configuration Register Value |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (3) |
|
Backing Up and Restoring the Cisco IOS |
|
|
331 | (17) |
|
|
332 | (1) |
|
|
333 | (1) |
|
Restoring or Upgrading the Cisco Router IOS |
|
|
334 | (3) |
|
Using the Cisco IOS File System (Cisco IFS) |
|
|
337 | (4) |
|
|
341 | (3) |
|
Right-To-Use Licenses (Evaluation Licenses) |
|
|
344 | (3) |
|
Backing Up and Uninstalling the License |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
Written Lab 8.1: IOS Management |
|
|
350 | (1) |
|
|
350 | (2) |
|
Hands-on Lab 8.1: Backing Up Your Router IOS |
|
|
350 | (1) |
|
Hands-on Lab 8.2: Upgrading or Restoring Your Router IOS |
|
|
351 | (1) |
|
|
352 | (5) |
|
|
357 | (54) |
|
|
359 | (2) |
|
|
361 | (11) |
|
The Cisco Router Internal Process |
|
|
366 | (1) |
|
Testing Your IP Routing Understanding |
|
|
367 | (5) |
|
|
372 | (9) |
|
|
373 | (2) |
|
|
375 | (4) |
|
|
379 | (2) |
|
Configuring IP Routing in Our Network |
|
|
381 | (9) |
|
|
382 | (5) |
|
|
387 | (3) |
|
|
390 | (2) |
|
|
390 | (2) |
|
Routing Information Protocol (RIP) |
|
|
392 | (7) |
|
|
393 | (3) |
|
Holding Down RIP Propagations |
|
|
396 | (3) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (4) |
|
Hands-on Lab 9.1: Creating Static Routes |
|
|
402 | (1) |
|
Hands-on Lab 9.2: Configuring RIP Routing |
|
|
403 | (2) |
|
|
405 | (6) |
|
Chapter 10 Layer 2 Switching |
|
|
411 | (32) |
|
|
412 | (10) |
|
Three Switch Functions at Layer 2 |
|
|
413 | (4) |
|
|
417 | (5) |
|
Configuring Catalyst Switches |
|
|
422 | (11) |
|
Catalyst Switch Configuration |
|
|
423 | (7) |
|
Verifying Cisco Catalyst Switches |
|
|
430 | (3) |
|
|
433 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
|
434 | (4) |
|
Lab 10.1: Configuring Layer 2 Switches |
|
|
435 | (1) |
|
Lab 10.2: Verifying Layer 2 Switches |
|
|
436 | (1) |
|
Lab 10.3: Configuring Port Security |
|
|
437 | (1) |
|
|
438 | (5) |
|
Chapter 11 VLANs and Inter-VLAN Routing |
|
|
443 | (40) |
|
|
444 | (5) |
|
|
447 | (1) |
|
|
448 | (1) |
|
Flexibility and Scalability |
|
|
448 | (1) |
|
|
449 | (5) |
|
|
451 | (1) |
|
VLAN Identification Methods |
|
|
452 | (2) |
|
|
454 | (2) |
|
|
456 | (16) |
|
Assigning Switch Ports to VLANs |
|
|
459 | (2) |
|
|
461 | (4) |
|
Configuring Inter-VLAN Routing |
|
|
465 | (7) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
|
473 | (4) |
|
Hands-on Lab 11.1: Configuring and Verifying VLANs |
|
|
474 | (1) |
|
Hands-on Lab 11.2: Configuring and Verifying Trunk Links |
|
|
474 | (1) |
|
Hands-on Lab 11.3: Configuring Router on a Stick Routing |
|
|
475 | (1) |
|
Hands-on Lab 11.4: Configuring IVR with a Layer 3 Switch |
|
|
476 | (1) |
|
|
477 | (6) |
|
|
483 | (38) |
|
Perimeter, Firewall, and Internal Routers |
|
|
484 | (1) |
|
Introduction to Access Lists |
|
|
485 | (4) |
|
Mitigating Security Issues with ACLs |
|
|
488 | (1) |
|
|
489 | (8) |
|
|
490 | (2) |
|
Standard Access List Example |
|
|
492 | (4) |
|
Controlling VTY (Telnet/SSH) Access |
|
|
496 | (1) |
|
|
497 | (11) |
|
Extended Access List Example 1 |
|
|
501 | (2) |
|
Extended Access List Example 2 |
|
|
503 | (1) |
|
Extended Access List Example 3 |
|
|
504 | (1) |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (5) |
|
Hands-on Lab 12.1: Standard IP Access Lists |
|
|
513 | (1) |
|
Hands-on Lab 12.2: Extended IP Access Lists |
|
|
514 | (3) |
|
|
517 | (4) |
|
Chapter 13 Network Address Translation (NAT) |
|
|
521 | (26) |
|
|
522 | (2) |
|
Types of Network Address Translation |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
525 | (4) |
|
|
527 | (1) |
|
Dynamic NAT Configuration |
|
|
527 | (1) |
|
PAT (Overloading) Configuration |
|
|
528 | (1) |
|
Simple Verification of NAT |
|
|
529 | (1) |
|
Testing and Troubleshooting NAT |
|
|
529 | (6) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (6) |
|
Lab 13.1: Preparing for NAT |
|
|
537 | (1) |
|
Lab 13.2: Configuring Dynamic NAT |
|
|
538 | (2) |
|
Lab 13.3: Configuring PAT |
|
|
540 | (2) |
|
|
542 | (5) |
|
Chapter 14 Internet Protocol Version 6 (IPv6) |
|
|
547 | (34) |
|
|
549 | (1) |
|
The Benefits and Uses of IPv6 |
|
|
549 | (2) |
|
IPv6 Addressing and Expressions |
|
|
551 | (4) |
|
|
551 | (1) |
|
|
552 | (2) |
|
|
554 | (1) |
|
How IPv6 Works in an Internetwork |
|
|
555 | (10) |
|
Manual Address Assignment |
|
|
555 | (1) |
|
Stateless Autoconfiguration (eui-64) |
|
|
556 | (3) |
|
|
559 | (1) |
|
|
559 | (2) |
|
|
561 | (4) |
|
|
565 | (1) |
|
|
565 | (1) |
|
Configuring IPv6 on Our Internetwork |
|
|
566 | (3) |
|
Configuring Routing on Our Internetwork |
|
|
569 | (3) |
|
|
572 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
574 | (3) |
|
Hands-on Lab 14.1: Manual and Stateful Autoconfiguration |
|
|
574 | (2) |
|
Hands-on Lab 14.2: Static and Default Routing |
|
|
576 | (1) |
|
|
577 | (4) |
|
|
581 | (396) |
|
Chapter 15 Enhanced Switched Technologies |
|
|
583 | (66) |
|
|
584 | (9) |
|
Assigning Switch Ports to VLANs |
|
|
587 | (2) |
|
|
589 | (4) |
|
VLAN Trunking Protocol (VTP) |
|
|
593 | (4) |
|
|
594 | (2) |
|
|
596 | (1) |
|
|
597 | (5) |
|
|
598 | (4) |
|
Spanning Tree Protocol (STP) |
|
|
602 | (8) |
|
|
603 | (4) |
|
|
607 | (3) |
|
Types of Spanning-tree Protocols |
|
|
610 | (8) |
|
|
610 | (1) |
|
|
611 | (7) |
|
Modifying and Verifying the Bridge ID |
|
|
618 | (5) |
|
Spanning-Tree Failure Consequences |
|
|
623 | (2) |
|
|
625 | (4) |
|
|
627 | (2) |
|
|
629 | (5) |
|
Configuring and Verifying Port Channels |
|
|
630 | (4) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
635 | (1) |
|
|
636 | (7) |
|
Hands-on Lab 15.1: Verifying STP and Finding Your Root Bridge |
|
|
637 | (1) |
|
Hands-on Lab 15.2: Configuring and Verifying Your Root Bridge |
|
|
638 | (2) |
|
Hands-on Lab 15.3: Configuring PortFast and BPDU Guard |
|
|
640 | (1) |
|
Hands-on Lab 15.4: Configuring and Verifying EtherChannel |
|
|
641 | (2) |
|
|
643 | (6) |
|
Chapter 16 Network Device Management and Security |
|
|
649 | (32) |
|
Mitigating Threats at the Access Layer |
|
|
650 | (3) |
|
External Authentication Options |
|
|
653 | (2) |
|
|
653 | (1) |
|
|
654 | (1) |
|
|
655 | (4) |
|
Management Information Base (MIB) |
|
|
656 | (1) |
|
|
657 | (2) |
|
|
659 | (2) |
|
Introducing First Hop Redundancy Protocols (FHRPs) |
|
|
661 | (1) |
|
Hot Standby Router Protocol (HSRP) |
|
|
662 | (13) |
|
|
664 | (1) |
|
|
665 | (2) |
|
|
667 | (2) |
|
Configuring and Verifying HSRP |
|
|
669 | (6) |
|
|
675 | (1) |
|
|
675 | (1) |
|
|
676 | (1) |
|
|
677 | (4) |
|
|
681 | (64) |
|
EIGRP Features and Operations |
|
|
682 | (8) |
|
|
683 | (5) |
|
Reliable Transport Protocol (RTP) |
|
|
688 | (1) |
|
Diffusing Update Algorithm (DUAL) |
|
|
689 | (1) |
|
Route Discovery and Maintenance |
|
|
689 | (1) |
|
|
690 | (19) |
|
VLSM Support and Summarization |
|
|
693 | (3) |
|
Controlling EIGRP Traffic |
|
|
696 | (11) |
|
|
707 | (2) |
|
Verifying and Troubleshooting EIGRP |
|
|
709 | (18) |
|
Troubleshooting Example with EIGRP |
|
|
715 | (10) |
|
Simple Troubleshooting EIGRP for the CCNA |
|
|
725 | (2) |
|
|
727 | (5) |
|
|
732 | (1) |
|
|
733 | (1) |
|
|
733 | (1) |
|
|
734 | (3) |
|
Hands-on Lab 17.1: Configuring and Verifying EIGRP |
|
|
734 | (1) |
|
Hands-on Lab 17.2: Configuring and Verifying EIGRPv6 |
|
|
735 | (2) |
|
|
737 | (8) |
|
Chapter 18 Open Shortest Path First (OSPF) |
|
|
745 | (38) |
|
Open Shortest Path First (OSPF) Basics |
|
|
746 | (7) |
|
|
749 | (2) |
|
|
751 | (2) |
|
|
753 | (9) |
|
|
753 | (1) |
|
|
754 | (3) |
|
Configuring Our Network with OSPF |
|
|
757 | (5) |
|
OSPF and Loopback Interfaces |
|
|
762 | (3) |
|
Configuring Loopback Interfaces |
|
|
763 | (2) |
|
Verifying OSPF Configuration |
|
|
765 | (6) |
|
|
766 | (1) |
|
The show ip ospf database Command |
|
|
767 | (1) |
|
The show ip ospf interface Command |
|
|
768 | (1) |
|
The show ip ospf neighbor Command |
|
|
769 | (1) |
|
The show ip protocols Command |
|
|
770 | (1) |
|
|
771 | (1) |
|
|
771 | (1) |
|
|
772 | (1) |
|
|
772 | (4) |
|
Hands-on Lab 18.1: Enabling the OSPF Process |
|
|
773 | (1) |
|
Hands-on Lab 18.2: Configuring OSPF Interfaces |
|
|
774 | (1) |
|
Hands-on Lab 18.3: Verifying OSPF Operation |
|
|
775 | (1) |
|
|
776 | (7) |
|
Chapter 19 Multi-Area OSPF |
|
|
783 | (48) |
|
|
784 | (2) |
|
Categories of Multi-area Components |
|
|
786 | (7) |
|
|
786 | (1) |
|
|
787 | (1) |
|
Link-State Advertisements |
|
|
788 | (2) |
|
|
790 | (1) |
|
|
791 | (2) |
|
Basic Multi-area Configuration |
|
|
793 | (3) |
|
Verifying and Troubleshooting Multi-area OSPF Networks |
|
|
796 | (8) |
|
|
797 | (1) |
|
The show ip ospf interface Command |
|
|
798 | (3) |
|
The show ip protocols Command |
|
|
801 | (1) |
|
The show ip route Command |
|
|
801 | (1) |
|
The show ip ospf database Command |
|
|
802 | (2) |
|
Troubleshooting OSPF Scenario |
|
|
804 | (10) |
|
Simple Troubleshooting OSPF for the CCNA |
|
|
812 | (2) |
|
|
814 | (5) |
|
|
816 | (3) |
|
|
819 | (1) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
820 | (6) |
|
Hands-on Lab 19.1: Configuring and Verifying OSPF Multi-Area |
|
|
821 | (3) |
|
Hands-on Lab 19.2: Configuring and Verifying OSPFv3 |
|
|
824 | (2) |
|
|
826 | (5) |
|
Chapter 20 Troubleshooting IP, IPv6, and VLANs |
|
|
831 | (50) |
|
Troubleshooting IP Network Connectivity |
|
|
832 | (18) |
|
Using IP SLA for Troubleshooting |
|
|
843 | (2) |
|
Using SPAN for Troubleshooting |
|
|
845 | (2) |
|
Configuring and Verifying Extended Access Lists |
|
|
847 | (3) |
|
Troubleshooting IPv6 Network Connectivity |
|
|
850 | (12) |
|
|
850 | (8) |
|
Troubleshooting IPv6 Extended Access Lists |
|
|
858 | (4) |
|
Troubleshooting VLAN Connectivity |
|
|
862 | (12) |
|
|
862 | (5) |
|
|
867 | (7) |
|
|
874 | (1) |
|
|
875 | (1) |
|
|
875 | (2) |
|
|
877 | (4) |
|
Chapter 21 Wide Area Networks |
|
|
881 | (66) |
|
Introduction to Wide Area Networks |
|
|
882 | (12) |
|
|
883 | (2) |
|
|
885 | (1) |
|
|
886 | (1) |
|
|
887 | (1) |
|
|
888 | (3) |
|
Cisco Intelligent WAN (IWAN) |
|
|
891 | (3) |
|
Cabling the Serial Wide Area Network |
|
|
894 | (2) |
|
|
894 | (1) |
|
Data Terminal Equipment and Data Communication Equipment |
|
|
895 | (1) |
|
High-Level Data-Link Control (HDLC) Protocol |
|
|
896 | (2) |
|
Point-to-Point Protocol (PPP) |
|
|
898 | (4) |
|
Link Control Protocol (LCP) Configuration Options |
|
|
899 | (1) |
|
PPP Session Establishment |
|
|
900 | (1) |
|
PPP Authentication Methods |
|
|
901 | (1) |
|
Configuring PPP on Cisco Routers |
|
|
901 | (1) |
|
Configuring PPP Authentication |
|
|
901 | (1) |
|
Verifying and Troubleshooting Serial Links |
|
|
902 | (17) |
|
|
907 | (4) |
|
|
911 | (1) |
|
Configuring a PPPoE Client |
|
|
912 | (1) |
|
|
913 | (1) |
|
|
914 | (1) |
|
Enterprise- and Provider-Managed VPNs |
|
|
915 | (2) |
|
Introduction to Cisco IOS IPsec |
|
|
917 | (1) |
|
|
918 | (1) |
|
|
919 | (6) |
|
|
920 | (1) |
|
|
921 | (2) |
|
|
923 | (2) |
|
|
925 | (9) |
|
Protocol Comparison and Overview |
|
|
926 | (3) |
|
Configuring and Verifying EBGP |
|
|
929 | (2) |
|
|
931 | (3) |
|
|
934 | (1) |
|
|
934 | (1) |
|
|
935 | (1) |
|
|
935 | (6) |
|
Hands-on Lab 21.1: Configuring PPP Encapsulation and Authentication |
|
|
936 | (1) |
|
Hands-on Lab 21.2: Configuring and Monitoring HDLC |
|
|
937 | (1) |
|
Hands-on Lab 21.3: Configuring a GRE Tunnel |
|
|
938 | (3) |
|
|
941 | (6) |
|
Chapter 22 Evolution of Intelligent Networks |
|
|
947 | (30) |
|
|
948 | (2) |
|
Cloud Computing and Its Effect on the Enterprise Network |
|
|
950 | (3) |
|
|
952 | (1) |
|
Overview of Network Programmability in Enterprise Network |
|
|
953 | (1) |
|
Application Programming Interfaces (APIs) |
|
|
954 | (3) |
|
|
955 | (1) |
|
|
956 | (1) |
|
|
957 | (3) |
|
Using APIC-EM for Path Tracing |
|
|
959 | (1) |
|
|
960 | (2) |
|
|
962 | (2) |
|
|
962 | (2) |
|
|
964 | (1) |
|
|
965 | (6) |
|
Classification and Marking |
|
|
965 | (1) |
|
Policing, Shaping, and Re-Marking |
|
|
966 | (1) |
|
Tools for Managing Congestion |
|
|
967 | (3) |
|
Tools for Congestion Avoidance |
|
|
970 | (1) |
|
|
971 | (1) |
|
|
971 | (1) |
|
|
971 | (2) |
|
|
973 | (4) |
|
Appendix A Answers to Written Labs |
|
|
977 | (20) |
|
Chapter 1: Internetworking |
|
|
978 | (2) |
|
Written Lab 1.1: OSI Questions |
|
|
978 | (1) |
|
Written Lab 1.2: Defining the OSI Layers and Devices |
|
|
979 | (1) |
|
Written Lab 1.3: Identifying Collision and Broadcast Domains |
|
|
979 | (1) |
|
Chapter 2: Ethernet Networking and Data Encapsulation |
|
|
980 | (3) |
|
Written Lab 2.1: Binary/Decimal/Hexadecimal Conversion |
|
|
980 | (2) |
|
Written Lab 2.2: CSMA/CD Operations |
|
|
982 | (1) |
|
|
982 | (1) |
|
Written Lab 2.4: Encapsulation |
|
|
982 | (1) |
|
Chapter 3: Introduction to TCP/IP |
|
|
983 | (1) |
|
|
983 | (1) |
|
Written Lab 3.2: Mapping Applications to the DoD Model |
|
|
983 | (1) |
|
Chapter 4: Easy Subnetting |
|
|
984 | (2) |
|
Written Lab 4.1: Written Subnet Practice #1 |
|
|
984 | (1) |
|
Written Lab 4.2: Written Subnet Practice #2 |
|
|
985 | (1) |
|
Written Lab 4.3: Written Subnet Practice #3 |
|
|
985 | (1) |
|
Chapter 5: VLSMs, Summarization and Troubleshooting TCP/IP |
|
|
986 | (1) |
|
Chapter 6: Cisco's Internetworking Operating System (IOS) |
|
|
986 | (1) |
|
|
986 | (1) |
|
Chapter 7: Managing a Cisco Internetwork |
|
|
987 | (1) |
|
Written Lab 7.1: IOS Management |
|
|
987 | (1) |
|
Written Lab 7.2: Router Memory |
|
|
987 | (1) |
|
Chapter 8: Managing Cisco Devices |
|
|
988 | (1) |
|
Written Lab 8.1: IOS Management |
|
|
988 | (1) |
|
|
988 | (1) |
|
Chapter 10: Layer 2 Switching |
|
|
989 | (1) |
|
Chapter 11: VLANs and InterVLAN Routing |
|
|
989 | (1) |
|
|
990 | (1) |
|
Chapter 13: Network Address Translation (NAT) |
|
|
991 | (1) |
|
Chapter 14: Internet Protocol Version 6 (IPv6) |
|
|
991 | (1) |
|
Written Lab 14.1: IPv6 Foundation |
|
|
991 | (1) |
|
Written Lab 14.2: EUI-64 Format |
|
|
992 | (1) |
|
Chapter 15: Enhanced Switched Technologies |
|
|
992 | (1) |
|
|
992 | (1) |
|
Chapter 16: Network Device Management and Security |
|
|
993 | (1) |
|
|
993 | (1) |
|
Chapter 17: Enhanced IGRP |
|
|
993 | (1) |
|
|
993 | (1) |
|
Chapter 18: Open Shortest Path First (OSPF) |
|
|
994 | (1) |
|
|
994 | (1) |
|
Chapter 19: Multi-Area OSPF |
|
|
994 | (1) |
|
|
994 | (1) |
|
Chapter 20: Troubleshooting IP, IPv6, and VLANs |
|
|
995 | (1) |
|
|
995 | (1) |
|
Chapter 21: Wide Area Networks |
|
|
995 | (1) |
|
|
995 | (1) |
|
Chapter 22: Evolution of Intelligent Networks |
|
|
996 | (1) |
|
|
996 | (1) |
|
Appendix B Answers to Review Questions |
|
|
997 | (40) |
|
Chapter 1: Internetworking |
|
|
998 | (2) |
|
Chapter 2: Ethernet Networking and Data Encapsulation |
|
|
1000 | (2) |
|
Chapter 3: Introduction to TCP/IP |
|
|
1002 | (1) |
|
Chapter 4: Easy Subnetting |
|
|
1003 | (2) |
|
Chapter 5: VLSMs, Summarization, and Troubleshooting TCP/IP |
|
|
1005 | (2) |
|
Chapter 6: Cisco's Internetworking Operating System (I0S) |
|
|
1007 | (2) |
|
Chapter 7: Managing a Cisco Internetwork |
|
|
1009 | (1) |
|
Chapter 8: Managing Cisco Devices |
|
|
1010 | (2) |
|
|
1012 | (1) |
|
Chapter 10: Layer 2 Switching |
|
|
1013 | (2) |
|
Chapter 11: VLANs and InterVLAN Routing |
|
|
1015 | (2) |
|
|
1017 | (2) |
|
Chapter 13: Network Address Translation (NAT) |
|
|
1019 | (1) |
|
Chapter 14: Internet Protocol Version 6 (IPv6) |
|
|
1020 | (2) |
|
Chapter 15: Enhanced Switched Technologies |
|
|
1022 | (2) |
|
Chapter 16: Network Device Management and Security |
|
|
1024 | (1) |
|
Chapter 17: Enhanced IGRP |
|
|
1025 | (2) |
|
Chapter 18: Open Shortest Path First (OSPF) |
|
|
1027 | (2) |
|
Chapter 19: Multi-Area OSPF |
|
|
1029 | (2) |
|
Chapter 20: Troubleshooting IP, IPv6, and VLANs |
|
|
1031 | (1) |
|
Chapter 21: Wide Area Networks |
|
|
1032 | (1) |
|
Chapter 22: Evolution of Intelligent Networks |
|
|
1033 | (4) |
|
Appendix C Disabling and Configuring Network Services |
|
|
1037 | (10) |
|
|
1038 | (1) |
|
|
1038 | (1) |
|
Turning off BootP and Auto-Config |
|
|
1039 | (1) |
|
Disabling the HTTP Interface |
|
|
1040 | (1) |
|
Disabling IP Source Routing |
|
|
1040 | (1) |
|
|
1040 | (1) |
|
Disabling Redirect Messages |
|
|
1040 | (1) |
|
Disabling the Generation of ICMP Unreachable Messages |
|
|
1041 | (1) |
|
Disabling Multicast Route Caching |
|
|
1041 | (1) |
|
Disabling the Maintenance Operation Protocol (MOP) |
|
|
1041 | (1) |
|
Turning Off the X.25 PAD Service |
|
|
1042 | (1) |
|
Enabling the Nagle TCP Congestion Algorithm |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
Disabling Cisco Discovery Protocol |
|
|
1043 | (1) |
|
Disabling the Default Forwarded UDP Protocols |
|
|
1043 | (1) |
|
|
1044 | (3) |
|
|
1047 | |