Introduction |
|
xxxiii | |
Part I Forwarding |
|
|
Chapter 1 Packet Forwarding |
|
|
2 | (1) |
|
"Do I Know This Already?" Quiz |
|
|
2 | (1) |
|
|
3 | (1) |
|
Network Device Communication |
|
|
3 | (22) |
|
|
4 | (1) |
|
|
5 | (2) |
|
|
7 | (4) |
|
|
11 | (1) |
|
|
12 | (2) |
|
Layer 2 Diagnostic Commands |
|
|
14 | (4) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (3) |
|
Verification of IP Addresses |
|
|
23 | (2) |
|
|
25 | (6) |
|
|
25 | (1) |
|
|
26 | (1) |
|
Ternary Content Addressable Memory |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | |
Part II Layer |
|
2 | (120) |
|
Chapter 2 Spanning Tree Protocol |
|
|
34 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
34 | (2) |
|
|
36 | (1) |
|
Spanning Tree Protocol Fundamentals |
|
|
36 | (16) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
Building the STP Topology |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (1) |
|
Locating Blocked Designated Switch Ports |
|
|
43 | (3) |
|
Verification of VLANS on Trunk Links |
|
|
46 | (1) |
|
|
47 | (1) |
|
Converging with Direct Link Failures |
|
|
48 | (3) |
|
|
51 | (1) |
|
Rapid Spanning Tree Protocol |
|
|
52 | (2) |
|
RSTP (802.1W) Port States |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Building the RSTP Topology |
|
|
53 | (1) |
|
|
54 | (2) |
|
Chapter 3 Advanced STP Tuning |
|
|
56 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (8) |
|
|
58 | (3) |
|
Modifying STP Root Port and Blocked Switch Port Locations |
|
|
61 | (3) |
|
Modifying STP Port Priority |
|
|
64 | (1) |
|
Additional STP Protection Mechanisms |
|
|
65 | (9) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (3) |
|
|
70 | (1) |
|
Problems with Unidirectional Links |
|
|
71 | (1) |
|
|
71 | (1) |
|
Unidirectional Link Detection |
|
|
72 | (2) |
|
|
74 | (4) |
|
Chapter 4 Multiple Spanning Tree Protocol |
|
|
78 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
78 | (1) |
|
|
79 | (1) |
|
Multiple Spanning Tree Protocol |
|
|
79 | (11) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (3) |
|
|
86 | (1) |
|
Common MST Misconfigurations |
|
|
87 | (1) |
|
VLAN Assignment to the 1ST |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
MST Region as the Root Bridge |
|
|
89 | (1) |
|
MST Region Not a Root Bridge for Any VLAN |
|
|
89 | (1) |
|
|
90 | (2) |
|
Chapter 5 VLAN Trunks and EtherChannel Bundles |
|
|
92 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
94 | (5) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (2) |
|
Dynamic Trunking Protocol |
|
|
99 | (3) |
|
|
102 | (17) |
|
Dynamic Link Aggregation Protocols |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
EtherChannel Configuration |
|
|
105 | (1) |
|
Verifying Port-Channel Status |
|
|
106 | (2) |
|
Viewing EtherChannel Neighbors |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (1) |
|
Verifying EtherChannel Packets |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Advanced LACP Configuration Options |
|
|
112 | (1) |
|
|
113 | (1) |
|
Minimum Number of Port-Channel Member Interfaces |
|
|
113 | (1) |
|
Maximum Number of Port-Channel Member Interfaces |
|
|
114 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Troubleshooting EtherChannel Bundles |
|
|
116 | (1) |
|
Load Balancing Traffic with EtherChannel Bundles |
|
|
117 | (2) |
|
|
119 | (3) |
Part III Routing |
|
|
Chapter 6 IP Routing Essentials |
|
|
122 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
122 | (2) |
|
|
124 | (1) |
|
Routing Protocol Overview |
|
|
124 | (6) |
|
Distance Vector Algorithms |
|
|
126 | (1) |
|
Enhanced Distance Vector Algorithms |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (2) |
|
|
130 | (4) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
Unequal-Cost Load Balancing |
|
|
133 | (1) |
|
|
134 | (9) |
|
|
135 | (1) |
|
Directly Attached Static Routes |
|
|
135 | (1) |
|
|
136 | (1) |
|
Fully Specified Static Routes |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
140 | (2) |
|
|
142 | (1) |
|
Virtual Routing and Forwarding |
|
|
143 | (3) |
|
|
146 | (2) |
|
|
148 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
150 | (4) |
|
|
151 | (1) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (5) |
|
|
156 | (1) |
|
Metric Backward Compatibility |
|
|
157 | (1) |
|
|
157 | (2) |
|
Failure Detection and Timers |
|
|
159 | (2) |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (2) |
|
|
164 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
166 | (6) |
|
Inter-Router Communication |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Designated Router and Backup Designated Router |
|
|
170 | (2) |
|
|
172 | (9) |
|
|
172 | (2) |
|
Interface-Specific Configuration |
|
|
174 | (1) |
|
Statically Setting the Router ID |
|
|
174 | (1) |
|
|
174 | (1) |
|
Requirements for Neighbor Adjacency |
|
|
175 | (1) |
|
Sample Topology and Configuration |
|
|
175 | (2) |
|
Confirmation of Interfaces |
|
|
177 | (2) |
|
Verification of OSPF Neighbor Adjacencies |
|
|
179 | (1) |
|
Verification of OSPF Routes |
|
|
180 | (1) |
|
Default Route Advertisement |
|
|
181 | (1) |
|
Common OSPF Optimizations |
|
|
182 | (8) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
Designated Router Elections |
|
|
184 | (1) |
|
|
185 | (2) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
190 | (4) |
|
|
194 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
196 | (5) |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
201 | (8) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (3) |
|
|
205 | (2) |
|
|
207 | (2) |
|
|
209 | (1) |
|
|
210 | (2) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (5) |
|
Summarization Fundamentals |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Configuration of Interarea Summarization |
|
|
215 | (2) |
|
|
217 | (5) |
|
Filtering with Summarization |
|
|
217 | (1) |
|
|
218 | (2) |
|
|
220 | (2) |
|
|
222 | (2) |
|
|
224 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (3) |
|
OSPFv3 Link-State Advertisement |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (7) |
|
|
231 | (2) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
235 | (2) |
|
|
237 | (3) |
|
|
240 | (44) |
|
"Do I Know This Already?" Quiz |
|
|
240 | (2) |
|
|
242 | (1) |
|
|
242 | (9) |
|
Autonomous System Numbers |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
Inter-Router Communication |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (12) |
|
Verification of BGP Sessions |
|
|
253 | (2) |
|
|
255 | (2) |
|
Receiving and Viewing Routes |
|
|
257 | (4) |
|
BGP Route Advertisements from Indirect Sources |
|
|
261 | (2) |
|
|
263 | (10) |
|
|
264 | (5) |
|
|
269 | (1) |
|
Route Aggregation with AS_SET |
|
|
270 | (3) |
|
Multiprotocol BGP for IPv6 |
|
|
273 | (7) |
|
|
274 | (4) |
|
|
278 | (2) |
|
|
280 | (4) |
|
|
284 | (42) |
|
"Do I Know This Already?" Quiz |
|
|
284 | (2) |
|
|
286 | (1) |
|
|
287 | (4) |
|
Resiliency in Service Providers |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
|
291 | (6) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
295 | (1) |
|
Regular Expressions (regex) |
|
|
296 | (1) |
|
|
297 | (4) |
|
|
298 | (1) |
|
Multiple Conditional Match Conditions |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
BGP Route Filtering and Manipulation |
|
|
301 | (8) |
|
Distribute List Filtering |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (2) |
|
|
308 | (1) |
|
|
309 | (5) |
|
|
309 | (1) |
|
Enabling BGP Community Support |
|
|
310 | (1) |
|
Conditionally Matching BGP Communities |
|
|
310 | (2) |
|
Setting Private BGP Communities |
|
|
312 | (2) |
|
Understanding BGP Path Selection |
|
|
314 | (9) |
|
Routing Path Selection Using Longest Match |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
Locally Originated via Network or Aggregate Advertisement |
|
|
317 | (1) |
|
Accumulated Interior Gateway Protocol |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
Prefer the Oldest eBGP Path |
|
|
322 | (1) |
|
|
322 | (1) |
|
Minimum Cluster List Length |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (3) |
|
|
326 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
326 | (3) |
|
|
329 | (1) |
|
|
329 | (3) |
|
|
332 | (3) |
|
Layer 2 Multicast Addresses |
|
|
333 | (2) |
|
Internet Group Management Protocol |
|
|
335 | (5) |
|
|
335 | (2) |
|
|
337 | (1) |
|
|
337 | (3) |
|
Protocol Independent Multicast |
|
|
340 | (14) |
|
|
340 | (1) |
|
|
340 | (1) |
|
|
341 | (2) |
|
|
343 | (2) |
|
|
345 | (2) |
|
|
347 | (1) |
|
PIM Shared and Source Path Trees |
|
|
348 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (3) |
|
|
354 | (4) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (2) |
Part IV Services |
|
|
|
360 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
363 | (3) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (2) |
|
Classification and Marking |
|
|
368 | (9) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
Default Forwarding (DF) PHB |
|
|
373 | (1) |
|
Assured Forwarding (AF) PHB |
|
|
373 | (1) |
|
Expedited Forwarding (EF) PHB |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
A Practical Example: Wireless QoS |
|
|
377 | (1) |
|
|
377 | (9) |
|
Placing Policers and Shapers in the Network |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
379 | (2) |
|
|
381 | (1) |
|
Single-Rate Two-Color Markers/Policers |
|
|
381 | (1) |
|
Single-Rate Three-Color Markers/Policers (srTCM) |
|
|
382 | (2) |
|
Two-Rate Three-Color Markers/Policers (trTCM) |
|
|
384 | (2) |
|
Congestion Management and Avoidance |
|
|
386 | (4) |
|
|
386 | (4) |
|
Congestion-Avoidance Tools |
|
|
390 | (1) |
|
|
390 | (4) |
|
|
394 | (42) |
|
"Do I Know This Already?" Quiz |
|
|
394 | (2) |
|
|
396 | (5) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
400 | (1) |
|
First-Hop Redundancy Protocol |
|
|
401 | (16) |
|
|
402 | (2) |
|
Hot Standby Router Protocol |
|
|
404 | (5) |
|
Virtual Router Redundancy Protocol |
|
|
409 | (1) |
|
Legacy VRRP Configuration |
|
|
410 | (1) |
|
Hierarchical VRRP Configuration |
|
|
411 | (2) |
|
Global Load Balancing Protocol |
|
|
413 | (4) |
|
Network Address Translation |
|
|
417 | (15) |
|
|
418 | (2) |
|
|
420 | (1) |
|
|
420 | (3) |
|
|
423 | (3) |
|
|
426 | (3) |
|
|
429 | (3) |
|
|
432 | (4) |
Part V Overlay |
|
|
Chapter 16 Overlay Tunnels |
|
|
436 | (44) |
|
"Do I Know This Already?" Quiz |
|
|
437 | (2) |
|
|
439 | (1) |
|
Generic Routing Encapsulation (GRE) Tunnels |
|
|
439 | (6) |
|
|
440 | (2) |
|
GRE Configuration Example |
|
|
442 | (2) |
|
Problems with Overlay Networks: Recursive Routing |
|
|
444 | (1) |
|
|
445 | (19) |
|
|
446 | (1) |
|
Encapsulating Security Payload |
|
|
446 | (2) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
449 | (3) |
|
|
452 | (2) |
|
|
454 | (1) |
|
Cisco Dynamic Multipoint VPN (DMVPN) |
|
|
455 | (1) |
|
Cisco Group Encrypted Transport VPN (GET VPN) |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
456 | (1) |
|
Site-to-Site IPsec Configuration |
|
|
456 | (1) |
|
Site-to-Site GRE over IPsec |
|
|
457 | (5) |
|
Site-to-Site VTI over IPsec |
|
|
462 | (2) |
|
Cisco Location/ID Separation Protocol (LISP) |
|
|
464 | (9) |
|
LISP Architecture and Protocols |
|
|
466 | (1) |
|
LISP Routing Architecture |
|
|
466 | (1) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
468 | (1) |
|
Map Registration and Notification |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
470 | (2) |
|
|
472 | (1) |
|
Virtual Extensible Local Area Network (VXLAN) |
|
|
473 | (3) |
|
|
476 | (4) |
Part VI Wireless |
|
|
Chapter 17 Wireless Signals and Modulation |
|
|
480 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
480 | (2) |
|
|
482 | (1) |
|
Understanding Basic Wireless Theory |
|
|
482 | (19) |
|
|
484 | (5) |
|
|
489 | (1) |
|
|
489 | (1) |
|
Understanding RF Power and dB |
|
|
490 | (2) |
|
Important dB Laws to Remember |
|
|
492 | (2) |
|
Comparing Power Against a Reference: dBm |
|
|
494 | (1) |
|
Measuring Power Changes Along the Signal Path |
|
|
495 | (2) |
|
|
497 | (2) |
|
Understanding Power Levels at the Receiver |
|
|
499 | (2) |
|
Carrying Data Over an RF Signal |
|
|
501 | (9) |
|
Maintaining AP-Client Compatibility |
|
|
503 | (2) |
|
Using Multiple Radios to Scale Performance |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
508 | (1) |
|
Maximizing the AP-Client Throughput |
|
|
508 | (2) |
|
|
510 | (2) |
|
Chapter 18 Wireless Infrastructure |
|
|
512 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
512 | (2) |
|
|
514 | (1) |
|
|
514 | (7) |
|
|
514 | (2) |
|
Lightweight AP Topologies |
|
|
516 | (5) |
|
Pairing Lightweight APs and WLCs |
|
|
521 | (5) |
|
|
521 | (2) |
|
|
523 | (1) |
|
|
524 | (1) |
|
Maintaining WLC Availability |
|
|
524 | (1) |
|
|
525 | (1) |
|
Leveraging Antennas for Wireless Coverage |
|
|
526 | (12) |
|
|
526 | (3) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (3) |
|
|
534 | (4) |
|
|
538 | (2) |
|
Chapter 19 Understanding Wireless Roaming and Location Services |
|
|
540 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
540 | (2) |
|
|
542 | (1) |
|
|
542 | (5) |
|
Roaming Between Autonomous APs |
|
|
542 | (3) |
|
|
545 | (2) |
|
Roaming Between Centralized Controllers |
|
|
547 | (5) |
|
|
547 | (2) |
|
|
549 | (2) |
|
Scaling Mobility with Mobility Groups |
|
|
551 | (1) |
|
Locating Devices in a Wireless Network |
|
|
552 | (3) |
|
|
555 | (3) |
|
Chapter 20 Authenticating Wireless Clients |
|
|
558 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
558 | (2) |
|
|
560 | (1) |
|
|
561 | (2) |
|
Authenticating with Pre-Shared Key |
|
|
563 | (2) |
|
|
565 | (6) |
|
Configuring EAP-Based Authentication with External RADIUS Servers |
|
|
566 | (2) |
|
Configuring EAP-Based Authentication with Local EAP |
|
|
568 | (3) |
|
Verifying EAP-Based Authentication Configuration |
|
|
571 | (1) |
|
Authenticating with WebAuth |
|
|
571 | (3) |
|
|
574 | (2) |
|
Chapter 21 Troubleshooting Wireless Connectivity |
|
|
576 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
576 | (2) |
|
|
578 | (1) |
|
Troubleshooting Client Connectivity from the WLC |
|
|
579 | (9) |
|
Checking the Client's Connection Status |
|
|
582 | (1) |
|
Checking the Client's Association and Signal Status |
|
|
582 | (2) |
|
Checking the Client's Mobility State |
|
|
584 | (1) |
|
Checking the Client's Wireless Policies |
|
|
585 | (1) |
|
Testing a Wireless Client |
|
|
585 | (3) |
|
Troubleshooting Connectivity Problems at the AP |
|
|
588 | (4) |
|
|
592 | (2) |
Part VII Architecture |
|
|
Chapter 22 Enterprise Network Architecture |
|
|
594 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
594 | (2) |
|
|
596 | (1) |
|
Hierarchical LAN Design Model |
|
|
596 | (6) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
601 | (1) |
|
Enterprise Network Architecture Options |
|
|
602 | (8) |
|
Two-Tier Design (Collapsed Core) |
|
|
602 | (2) |
|
|
604 | (2) |
|
Layer 2 Access Layer (STP Based) |
|
|
606 | (1) |
|
Layer 3 Access Layer (Routed Access) |
|
|
607 | (1) |
|
|
607 | (3) |
|
Software-Defined Access (SD-Access) Design |
|
|
610 | (1) |
|
|
610 | (2) |
|
Chapter 23 Fabric Technologies |
|
|
612 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
613 | (2) |
|
|
615 | (1) |
|
Software-Defined Access (SD-Access) |
|
|
615 | (17) |
|
|
616 | (1) |
|
|
616 | (1) |
|
|
617 | (1) |
|
|
617 | (1) |
|
|
618 | (1) |
|
Overlay Network (SD-Access Fabric) |
|
|
619 | (3) |
|
SD-Access Fabric Roles and Components |
|
|
622 | (2) |
|
Fabric Control Plane Node |
|
|
624 | (2) |
|
SD-Access Fabric Concepts |
|
|
626 | (1) |
|
|
626 | (2) |
|
|
628 | (1) |
|
Cisco DNA Design Workflow |
|
|
628 | (1) |
|
Cisco DNA Policy Workflow |
|
|
629 | (1) |
|
Cisco DNA Provision Workflow |
|
|
630 | (1) |
|
Cisco DNA Assurance Workflow |
|
|
631 | (1) |
|
Software-Defined WAN (SD-WAN) |
|
|
632 | (7) |
|
Cisco SD-WAN Architecture |
|
|
633 | (1) |
|
|
634 | (1) |
|
|
634 | (1) |
|
Cisco SD-WAN Routers (vEdge and cEdge) |
|
|
634 | (1) |
|
|
635 | (1) |
|
|
636 | (1) |
|
Cisco SD-WAN Cloud OnRamp |
|
|
636 | (1) |
|
|
636 | (3) |
|
|
639 | (1) |
|
|
639 | (3) |
|
Chapter 24 Network Assurance |
|
|
642 | (64) |
|
|
642 | (2) |
|
|
644 | (1) |
|
|
645 | (10) |
|
|
645 | (5) |
|
|
650 | (5) |
|
|
655 | (20) |
|
|
662 | (3) |
|
Simple Network Management Protocol (SNMP) |
|
|
665 | (5) |
|
|
670 | (5) |
|
NetFlow and Flexible NetFlow |
|
|
675 | (9) |
|
Switched Port Analyzer (SPAN) Technologies |
|
|
684 | (8) |
|
|
685 | (1) |
|
Specifying the Source Ports |
|
|
686 | (1) |
|
Specifying the Destination Ports |
|
|
686 | (1) |
|
Local SPAN Configuration Examples |
|
|
687 | (2) |
|
|
689 | (1) |
|
Encapsulated Remote SPAN (ERSPAN) |
|
|
690 | (1) |
|
Specifying the Source Ports |
|
|
690 | (1) |
|
Specifying the Destination |
|
|
691 | (1) |
|
|
692 | (4) |
|
Cisco DNA Center Assurance |
|
|
696 | (7) |
|
|
703 | (3) |
Part VIII Security |
|
|
Chapter 25 Secure Network Access Control |
|
|
706 | (40) |
|
"Do I Know This Already?" Quiz |
|
|
706 | (2) |
|
|
708 | (1) |
|
Network Security Design for Threat Defense |
|
|
708 | (3) |
|
Next-Generation Endpoint Security |
|
|
711 | (16) |
|
|
711 | (1) |
|
|
712 | (1) |
|
Cisco Advanced Malware Protection (AMP) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
715 | (1) |
|
Cisco Web Security Appliance (WSA) |
|
|
716 | (1) |
|
|
716 | (1) |
|
|
717 | (1) |
|
|
717 | (1) |
|
Cisco Email Security Appliance (ESA) |
|
|
718 | (1) |
|
Next-Generation Intrusion Prevention System (NGIPS) |
|
|
719 | (2) |
|
Next-Generation Firewall (NGFW) |
|
|
721 | (1) |
|
Cisco Firepower Management Center (FMC) |
|
|
722 | (1) |
|
|
722 | (1) |
|
Cisco Stealthwatch Enterprise |
|
|
723 | (1) |
|
|
724 | (1) |
|
Cisco Identity Services Engine (ISE) |
|
|
725 | (2) |
|
Network Access Control (NAC) |
|
|
727 | (16) |
|
|
727 | (2) |
|
|
729 | (2) |
|
|
731 | (1) |
|
MAC Authentication Bypass (MAB) |
|
|
732 | (1) |
|
Web Authentication (WebAuth) |
|
|
733 | (1) |
|
|
733 | (1) |
|
Central Web Authentication with Cisco ISE |
|
|
734 | (1) |
|
Enhanced Flexible Authentication (FlexAuth) |
|
|
735 | (1) |
|
Cisco Identity-Based Networking Services (IBNS) 2.0 |
|
|
735 | (1) |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (2) |
|
|
739 | (2) |
|
|
741 | (1) |
|
|
742 | (1) |
|
|
743 | (1) |
|
|
743 | (3) |
|
Chapter 26 Network Device Access Control and Infrastructure Security |
|
|
746 | (46) |
|
"Do I Know This Already?" Quiz |
|
|
746 | (3) |
|
|
749 | (1) |
|
Access Control Lists (ACLs) |
|
|
749 | (7) |
|
|
750 | (1) |
|
|
751 | (1) |
|
|
752 | (1) |
|
Port ACLs (PACLs) and VLAN ACLs (VACLs) |
|
|
753 | (1) |
|
|
753 | (1) |
|
|
754 | (1) |
|
PACL, VACL, and RACL Interaction |
|
|
755 | (1) |
|
Terminal Lines and Password Protection |
|
|
756 | (14) |
|
|
757 | (1) |
|
|
757 | (1) |
|
Username and Password Authentication |
|
|
758 | (1) |
|
Configuring Line Local Password Authentication |
|
|
758 | (1) |
|
Verifying Line Local Password Authentication |
|
|
759 | (1) |
|
Configuring Line Local Username and Password Authentication |
|
|
760 | (1) |
|
Verifying Line Local Username and Password Authentication |
|
|
760 | (1) |
|
Privilege Levels and Role-Based Access Control (RBAC) |
|
|
761 | (1) |
|
Verifying Privilege Levels |
|
|
762 | (2) |
|
Controlling Access to vty Lines with ACLs |
|
|
764 | (1) |
|
Verifying Access to vty Lines with ACLs |
|
|
764 | (1) |
|
Controlling Access to vty Lines Using Transport Input |
|
|
765 | (1) |
|
Verifying Access to vty Lines Using Transport Input |
|
|
766 | (2) |
|
|
768 | (2) |
|
|
770 | (1) |
|
|
770 | (1) |
|
|
770 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
770 | (7) |
|
|
771 | (1) |
|
|
772 | (1) |
|
Configuring AAA for Network Device Access Control |
|
|
773 | (3) |
|
Verifying AAA Configuration |
|
|
776 | (1) |
|
Zone-Based Firewall (ZBFW) |
|
|
777 | (7) |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
778 | (5) |
|
|
783 | (1) |
|
Control Plane Policing (CoPP) |
|
|
784 | (5) |
|
Configuring ACLs for CoPP |
|
|
784 | (1) |
|
Configuring Class Maps for CoPP |
|
|
785 | (1) |
|
Configuring the Policy Map for CoPP |
|
|
786 | (1) |
|
Applying the CoPP Policy Map |
|
|
786 | (1) |
|
Verifying the CoPP Policy |
|
|
787 | (2) |
|
|
789 | (1) |
|
|
790 | (2) |
Part IX SDN |
|
|
Chapter 27 Virtualization |
|
|
792 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
792 | (2) |
|
|
794 | (1) |
|
|
794 | (5) |
|
|
794 | (2) |
|
|
796 | (1) |
|
|
797 | (2) |
|
Network Functions Virtualization |
|
|
799 | (13) |
|
|
800 | (1) |
|
Virtual Network Functions |
|
|
800 | (1) |
|
Virtualized Infrastructure Manager |
|
|
800 | (1) |
|
|
801 | (1) |
|
Management and Orchestration |
|
|
801 | (1) |
|
Operations Support System (OSS)/Business Support System (BSS) |
|
|
801 | (1) |
|
|
802 | (3) |
|
|
805 | (1) |
|
|
805 | (1) |
|
|
806 | (1) |
|
Cisco Enterprise Network Functions Virtualization (ENFV) |
|
|
807 | (1) |
|
Cisco ENFV Solution Architecture |
|
|
808 | (4) |
|
|
812 | (2) |
|
Chapter 28 Foundational Network Programmability Concepts |
|
|
814 | (42) |
|
"Do I Know This Already?" Quiz |
|
|
814 | (4) |
|
|
818 | (1) |
|
|
818 | (1) |
|
Application Programming Interface |
|
|
819 | (15) |
|
|
819 | (1) |
|
|
820 | (1) |
|
Representational State Transfer (REST) APIs |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
821 | (3) |
|
Data Formats (XML and JSON) |
|
|
824 | (2) |
|
|
826 | (5) |
|
|
831 | (3) |
|
Data Models and Supporting Protocols |
|
|
834 | (7) |
|
|
834 | (2) |
|
|
836 | (4) |
|
|
840 | (1) |
|
|
841 | (3) |
|
|
842 | (1) |
|
|
842 | (1) |
|
|
843 | (1) |
|
|
843 | (1) |
|
|
844 | (1) |
|
|
844 | (2) |
|
Basic Python Components and Scripts |
|
|
846 | (7) |
|
|
853 | (3) |
|
Chapter 29 Introduction to Automation Tools |
|
|
856 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
856 | (2) |
|
|
858 | (1) |
|
|
858 | (8) |
|
|
859 | (4) |
|
|
863 | (2) |
|
|
865 | (1) |
|
Agent-Based Automation Tools |
|
|
866 | (10) |
|
|
866 | (2) |
|
|
868 | (5) |
|
SaltStack (Agent and Server Mode) |
|
|
873 | (3) |
|
Agentless Automation Tools |
|
|
876 | (13) |
|
|
876 | (10) |
|
|
886 | (1) |
|
SaltStack SSH (Server-Only Mode) |
|
|
887 | (1) |
|
|
888 | (1) |
|
|
889 | (1) |
|
Chapter 30 Final Preparation |
|
|
890 | (7) |
|
|
890 | (1) |
|
Tools for Final Preparation |
|
|
891 | (3) |
|
Pearson Test Prep Practice Test Software and Questions on the Website |
|
|
891 | (1) |
|
Accessing the Pearson Test Prep Software Online |
|
|
891 | (1) |
|
Accessing the Pearson Test Prep Software Offline |
|
|
892 | (1) |
|
|
892 | (1) |
|
|
893 | (1) |
|
|
893 | (1) |
|
Chapter-Ending Review Tools |
|
|
894 | (1) |
|
Suggested Plan for Final Review/Study |
|
|
894 | (1) |
|
|
894 | (3) |
Glossary |
|
897 | (21) |
Appendix A Answers to the "Do I Know This Already?" Questions |
|
918 | (20) |
Appendix B CCNP Enterprise Core ENCOR 350-401 Official Cert Guide Exam Updates |
|
938 | (2) |
Index |
|
940 | |