Introduction |
|
xxxi | |
Assessment Test |
|
xli | |
Chapter 1 Introduction to Networks |
|
1 | (30) |
|
First Things First: What's a Network? |
|
|
3 | (11) |
|
|
4 | (2) |
|
Common Network Components |
|
|
6 | (3) |
|
Metropolitan Area Network |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Software-Defined Wide Area Network |
|
|
11 | (1) |
|
Multiprotocol Label Switching |
|
|
11 | (1) |
|
Multipoint Generic Routing Encapsulation |
|
|
12 | (1) |
|
Network Architecture: Peer-to-Peer or Client-Server? |
|
|
12 | (2) |
|
Physical Network Topologies |
|
|
14 | (7) |
|
|
14 | (1) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Point-to-Multipoint Topology |
|
|
19 | (1) |
|
|
20 | (1) |
|
Topology Selection, Backbones, and Segments |
|
|
21 | (3) |
|
Selecting the Right Topology |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Service-Related Entry Points |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (5) |
Chapter 2 The Open Systems Interconnection Specifications |
|
31 | (26) |
|
|
32 | (2) |
|
|
33 | (1) |
|
Advantages of Reference Models |
|
|
33 | (1) |
|
|
34 | (15) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (6) |
|
|
43 | (3) |
|
|
46 | (2) |
|
|
48 | (1) |
|
Introduction to Encapsulation |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (4) |
Chapter 3 Networking Connectors and Wiring Standards |
|
57 | (36) |
|
|
59 | (17) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
62 | (4) |
|
|
66 | (5) |
|
|
71 | (1) |
|
|
72 | (2) |
|
|
74 | (2) |
|
|
76 | (2) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
Noise Immunity (Security, EMI) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
78 | (7) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
83 | (2) |
|
Installing Wiring Distributions |
|
|
85 | (2) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (4) |
Chapter 4 The Current Ethernet Specifications |
|
93 | (36) |
|
|
94 | (2) |
|
|
96 | (6) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
Half- and Full-Duplex Ethernet |
|
|
100 | (2) |
|
Ethernet at the Data Link Layer |
|
|
102 | (7) |
|
Binary to Decimal and Hexadecimal Conversion |
|
|
102 | (4) |
|
|
106 | (1) |
|
|
107 | (2) |
|
Ethernet at the Physical Layer |
|
|
109 | (6) |
|
Ethernet over Other Standards (IEEE 1905.1-2013) |
|
|
115 | (3) |
|
|
115 | (2) |
|
|
117 | (1) |
|
Bidirectional Wavelength-Division Multiplexing (WDM) |
|
|
117 | (1) |
|
Course Wavelength-Division Multiplexing (CWDM) |
|
|
117 | (1) |
|
Dense Wavelength-Division Multiplexing (DWDM) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (5) |
|
|
124 | (5) |
Chapter 5 Networking Devices |
|
129 | (56) |
|
Common Network Connectivity Devices |
|
|
132 | (20) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (4) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (3) |
|
Dynamic Host Configuration Protocol Server |
|
|
147 | (5) |
|
|
152 | (1) |
|
Other Specialized Devices |
|
|
152 | (15) |
|
|
153 | (1) |
|
Domain Name Service Server |
|
|
153 | (7) |
|
|
160 | (1) |
|
|
160 | (2) |
|
Encryption and Content Filtering |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Physical Access Control Devices |
|
|
167 | (1) |
|
|
167 | (1) |
|
Heating Ventilation, and Air Conditioning (HVAC) Sensors |
|
|
167 | (1) |
|
|
168 | (1) |
|
Industrial Control Systems |
|
|
168 | (1) |
|
Planning and Implementing a Basic SOHO Network Using Network Segmentation |
|
|
168 | (10) |
|
|
169 | (6) |
|
Switches and Bridges at the Data Link Layer |
|
|
175 | (2) |
|
Hubs at the Physical Layer |
|
|
177 | (1) |
|
Environmental Considerations |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (4) |
Chapter 6 Introduction to the Internet Protocol |
|
185 | (46) |
|
|
188 | (32) |
|
A Brief History of TCP/IP |
|
|
188 | (1) |
|
|
189 | (2) |
|
The Process/Application Layer Protocols |
|
|
191 | (13) |
|
The Host-to-Host Layer Protocols |
|
|
204 | (6) |
|
The Internet Layer Protocols |
|
|
210 | (10) |
|
|
220 | (4) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (5) |
Chapter 7 IP Addressing |
|
231 | (30) |
|
|
233 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
234 | (7) |
|
|
235 | (4) |
|
Private IP Addresses (RFC 1918) |
|
|
239 | (2) |
|
|
241 | (2) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
Multicast Address (Class D) |
|
|
243 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
243 | (10) |
|
|
244 | (1) |
|
The Benefits of and Uses for IPv6 |
|
|
244 | (2) |
|
IPv6 Addressing and Expressions |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Stateless Address Autoconfiguration (SLAAC) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
255 | (1) |
|
|
255 | (2) |
|
|
257 | (4) |
Chapter 8 IP Subnefting, Troubleshooting IP, and Introduction to NAT |
|
261 | (44) |
|
|
263 | (23) |
|
|
264 | (1) |
|
|
265 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
266 | (2) |
|
Subnetting Class C Addresses |
|
|
268 | (10) |
|
Subnetting Class B Addresses |
|
|
278 | (8) |
|
Troubleshooting IP Addressing |
|
|
286 | (8) |
|
Determining IP Address Problems |
|
|
289 | (5) |
|
Introduction to Network Address Translation (NAT) |
|
|
294 | (4) |
|
Types of Network Address Translation |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (2) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
300 | (5) |
Chapter 9 Introduction to IP Routing |
|
305 | (20) |
|
|
306 | (3) |
|
|
309 | (6) |
|
Testing Your IP Routing Understanding |
|
|
315 | (1) |
|
Static and Dynamic Routing |
|
|
316 | (3) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (4) |
Chapter 10 Routing Protocols |
|
325 | (40) |
|
|
326 | (4) |
|
|
327 | (2) |
|
Classes of Routing Protocols |
|
|
329 | (1) |
|
Distance-Vector Routing Protocols |
|
|
330 | (10) |
|
Routing Information Protocol (RIP) |
|
|
332 | (1) |
|
|
332 | (1) |
|
VLSMs and Discontiguous Networks |
|
|
333 | (3) |
|
|
336 | (2) |
|
Border Gateway Protocol (BGP) |
|
|
338 | (2) |
|
Link-State Routing Protocols |
|
|
340 | (4) |
|
Open Shortest Path First (OSPF) |
|
|
340 | (3) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
343 | (1) |
|
|
344 | (7) |
|
Hot Standby Router Protocol (HSRP) |
|
|
346 | (4) |
|
Virtual Router Redundancy Protocol |
|
|
350 | (1) |
|
|
351 | (6) |
|
|
351 | (2) |
|
Neighbor Discovery Protocol |
|
|
353 | (1) |
|
|
354 | (3) |
|
|
357 | (1) |
|
|
357 | (2) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (4) |
Chapter 11 Switching and Virtual LANs |
|
365 | (48) |
|
Networking Before Layer 2 Switching |
|
|
367 | (3) |
|
|
370 | (8) |
|
Limitations of Layer 2 Switching |
|
|
371 | (1) |
|
Bridging vs. LAN Switching |
|
|
372 | (1) |
|
Three Switch Functions at Layer 2 |
|
|
372 | (6) |
|
|
378 | (1) |
|
|
378 | (4) |
|
Spanning Tree Port States |
|
|
379 | (1) |
|
|
380 | (1) |
|
Rapid Spanning Tree Protocol 802.1w |
|
|
381 | (1) |
|
|
382 | (10) |
|
|
383 | (3) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (2) |
|
VLAN Identification Methods |
|
|
390 | (2) |
|
|
392 | (9) |
|
|
393 | (1) |
|
Do We Really Need to Put an IP Address on a Switch? |
|
|
394 | (2) |
|
|
396 | (3) |
|
|
399 | (2) |
|
|
401 | (1) |
|
Two Additional Advanced Features of Switches |
|
|
401 | (4) |
|
Power over Ethernet (802.3af, 802.3at) |
|
|
401 | (3) |
|
Port Mirroring/Spanning (SPAN/RSPAN) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
406 | (2) |
|
|
408 | (5) |
Chapter 12 Wireless Networking |
|
413 | (56) |
|
Introduction to Wireless Technology |
|
|
415 | (3) |
|
|
418 | (1) |
|
The 802.11 Standards (Regulatory Impacts) |
|
|
419 | (8) |
|
|
421 | (1) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
426 | (1) |
|
Comparing 802.11 Standards |
|
|
427 | (1) |
|
Range and Speed Comparisons |
|
|
428 | (1) |
|
Wireless Network Components |
|
|
428 | (4) |
|
|
429 | (1) |
|
Wireless Network Interface Card |
|
|
430 | (1) |
|
|
431 | (1) |
|
Installing a Wireless Network |
|
|
432 | (15) |
|
Ad Hoc Mode: Independent Basic Service Set |
|
|
432 | (1) |
|
Infrastructure Mode: Basic Service Set |
|
|
433 | (1) |
|
|
434 | (2) |
|
|
436 | (2) |
|
|
438 | (1) |
|
Other Network Infrastructure Implementations |
|
|
438 | (2) |
|
Technologies That Facilitate the Internet of Things (IoT) |
|
|
440 | (1) |
|
Installing and Configuring WLAN Hardware |
|
|
441 | (6) |
|
|
447 | (4) |
|
|
448 | (1) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (11) |
|
|
451 | (4) |
|
|
455 | (1) |
|
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication |
|
|
455 | (2) |
|
Remote Authentication Dial-In User Service (802.1X) |
|
|
457 | (1) |
|
Temporal Key Integrity Protocol |
|
|
458 | (1) |
|
Wi-Fi Protected Access or WPA2 Pre-Shared Key |
|
|
459 | (3) |
|
|
462 | (1) |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
465 | (4) |
Chapter 13 Using Statistics and Sensors to Ensure Network Availability |
|
469 | (36) |
|
Performance Metrics/Sensors |
|
|
471 | (3) |
|
|
471 | (2) |
|
|
473 | (1) |
|
|
474 | (2) |
|
|
475 | (1) |
|
Object Identifiers (OIDs) |
|
|
476 | (1) |
|
Management Information Bases (MIBs) |
|
|
476 | (1) |
|
|
476 | (6) |
|
|
476 | (4) |
|
Logging Levels/Severity Levels |
|
|
480 | (2) |
|
Interface Statistics/Status |
|
|
482 | (4) |
|
|
482 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
Cyclic Redundancy Checks (CRCs) |
|
|
485 | (1) |
|
Protocol Packet and Byte Counts |
|
|
486 | (1) |
|
Interface Errors or Alerts |
|
|
486 | (3) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
Environmental Factors and Sensors |
|
|
489 | (6) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (5) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (2) |
|
NetFlow Overview and Flows |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (2) |
|
|
501 | (4) |
Chapter 14 Organizational Documents and Policies |
|
505 | (28) |
|
|
507 | (4) |
|
|
508 | (2) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
Standard Operating Procedures |
|
|
511 | (1) |
|
Hardening and Security Policies |
|
|
511 | (8) |
|
|
512 | (1) |
|
|
512 | (1) |
|
Bring Your Own Device (BYOD) Policy |
|
|
513 | (1) |
|
|
513 | (1) |
|
Onboarding and Offboarding Policy |
|
|
513 | (1) |
|
|
514 | (5) |
|
|
519 | (1) |
|
|
519 | (9) |
|
|
520 | (4) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
Audit and Assessment Report |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
528 | (1) |
|
Nondisclosure Agreement (NDA) |
|
|
528 | (1) |
|
Service-Level Agreement (SLA) |
|
|
529 | (1) |
|
Memorandum of Understanding (MOU) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
531 | (2) |
Chapter 15 High Availability and Disaster Recovery |
|
533 | (26) |
|
|
535 | (1) |
|
|
536 | (1) |
|
Network Interface Card (NIC) Teaming |
|
|
537 | (1) |
|
Redundant Hardware/Clusters |
|
|
538 | (4) |
|
|
538 | (2) |
|
|
540 | (2) |
|
|
542 | (1) |
|
Facilities and Infrastructure Support |
|
|
542 | (3) |
|
Uninterruptible Power Supply (UPS) |
|
|
542 | (1) |
|
Power Distribution Units (PDUs) |
|
|
543 | (1) |
|
|
543 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
Redundancy and High Availability (HA) Concepts |
|
|
545 | (8) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
546 | (1) |
|
|
546 | (1) |
|
Active/Active vs. Active/Passive |
|
|
546 | (7) |
|
Mean Time to Repair (MTTR) |
|
|
553 | (1) |
|
Mean Time Between Failure (MTBF) |
|
|
554 | (1) |
|
Recovery Time Objective (RTO) |
|
|
554 | (1) |
|
Recovery Point Objective (RPO) |
|
|
554 | (1) |
|
Network Device Backup/Restore |
|
|
554 | (1) |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
555 | (1) |
|
|
556 | (1) |
|
|
557 | (2) |
Chapter 16 Common Security Concepts |
|
559 | (22) |
|
Confidentiality, Integrity, and Availability (CIA) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
Common Vulnerabilities and Exposures (CVE) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
563 | (1) |
|
|
564 | (1) |
|
|
564 | (1) |
|
|
564 | (3) |
|
Network Segmentation Enforcement |
|
|
564 | (1) |
|
Screened Subnet (aka Demilitarized Zone) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
567 | (1) |
|
|
567 | (6) |
|
|
567 | (1) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
568 | (1) |
|
Remote Authentication Dial-In User Service (RADIUS) |
|
|
568 | (1) |
|
Terminal Access Controller Access Control System Plus (TACACS+) |
|
|
568 | (2) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
571 | (1) |
|
Extensible Authentication Protocol (EAP) |
|
|
572 | (1) |
|
Security Risk Assessments |
|
|
573 | (3) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
Business Risk Assessments |
|
|
575 | (1) |
|
Security Information and Event Management (SIEM) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
578 | (3) |
Chapter 17 Common Types of Attacks |
|
581 | (24) |
|
|
582 | (16) |
|
Denial of Service (DoS)/Distributed Denial of Service (DDoS) |
|
|
583 | (5) |
|
On-Path Attack (Previously Known as Man-in-the-Middle Attack) |
|
|
588 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
590 | (1) |
|
|
590 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
|
593 | (1) |
|
|
593 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (1) |
|
|
594 | (4) |
|
|
598 | (2) |
|
|
598 | (1) |
|
|
599 | (1) |
|
|
599 | (1) |
|
|
600 | (1) |
|
|
600 | (1) |
|
|
601 | (1) |
|
|
602 | (3) |
Chapter 18 Network Hardening Techniques |
|
605 | (20) |
|
|
607 | (11) |
|
|
608 | (1) |
|
Router Advertisement (RA) Guard |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
Disable Unneeded Switchports |
|
|
610 | (1) |
|
Disable Unneeded Network Services |
|
|
610 | (1) |
|
|
610 | (1) |
|
Password Complexity/Length |
|
|
610 | (3) |
|
|
613 | (1) |
|
|
613 | (1) |
|
Patch and Firmware Management |
|
|
614 | (1) |
|
|
615 | (1) |
|
|
616 | (1) |
|
|
617 | (1) |
|
|
618 | (3) |
|
|
618 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
Wireless Client Isolation |
|
|
619 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
620 | (1) |
|
|
621 | (1) |
|
IoT Access Considerations |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (2) |
Chapter 19 Remote Access Security |
|
625 | (12) |
|
|
626 | (1) |
|
|
626 | (2) |
|
|
627 | (1) |
|
Split Tunnel vs. Full Tunnel |
|
|
628 | (1) |
|
Remote Desktop Connection |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
Virtual Network Computing (VNC) |
|
|
630 | (1) |
|
|
631 | (1) |
|
Authentication and Authorization Considerations |
|
|
631 | (1) |
|
In-Band vs. Out-of-Band Management |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
632 | (1) |
|
|
632 | (2) |
|
|
634 | (3) |
Chapter 20 Physical Security |
|
637 | (14) |
|
|
639 | (3) |
|
|
639 | (1) |
|
|
640 | (1) |
|
|
641 | (1) |
|
|
641 | (1) |
|
|
642 | (4) |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
643 | (1) |
|
|
644 | (1) |
|
Access Control Vestibule (Previously Known as a Mantrap) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
Factory Reset/Wipe Configuration |
|
|
646 | (1) |
|
Sanitize Devices for Disposal |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
649 | (2) |
Chapter 21 Data Center Architecture and Cloud Concepts |
|
651 | (74) |
|
Data Center Network Architectures |
|
|
654 | (1) |
|
|
654 | (1) |
|
|
655 | (1) |
|
|
655 | (1) |
|
Software-Defined Networking |
|
|
655 | (3) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
656 | (1) |
|
|
656 | (1) |
|
Spine-Leaf-Based Two-Tier Networks |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
658 | (2) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Branch Office vs. On-premises Data Center vs. Colocation |
|
|
660 | (1) |
|
Cloud Computing and Its Effect on the Enterprise Network |
|
|
661 | (4) |
|
|
663 | (2) |
|
Overview of Network Programmability in Enterprise Network |
|
|
665 | (1) |
|
Software-Defined Networking |
|
|
666 | (1) |
|
Application Programming Interfaces (APIs) |
|
|
666 | (4) |
|
|
667 | (2) |
|
|
669 | (1) |
|
Managing Network Documentation |
|
|
670 | (6) |
|
|
670 | (1) |
|
|
671 | (5) |
|
|
676 | (13) |
|
|
676 | (1) |
|
|
676 | (1) |
|
Onboarding and Offboarding of Mobile Devices |
|
|
677 | (1) |
|
|
677 | (1) |
|
Policies, Procedures, and Regulations |
|
|
677 | (4) |
|
|
681 | (5) |
|
Implementing Network Segmentation |
|
|
686 | (3) |
|
|
689 | (28) |
|
Reasons to Optimize Your Network's Performance |
|
|
689 | (2) |
|
How to Optimize Performance |
|
|
691 | (3) |
|
|
694 | (1) |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
695 | (1) |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
696 | (1) |
|
Common Address Redundancy Protocol |
|
|
697 | (1) |
|
|
697 | (11) |
|
Locating and Installing Equipment |
|
|
708 | (7) |
|
Change Management Procedures |
|
|
715 | (2) |
|
|
717 | (2) |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
721 | (4) |
Chapter 22 Ensuring Network Availability |
|
725 | (20) |
|
Performance Metrics/Sensors |
|
|
727 | (1) |
|
|
728 | (3) |
|
|
729 | (2) |
|
|
731 | (2) |
|
Interface Statistics/Status |
|
|
733 | (1) |
|
|
734 | (2) |
|
Environmental Factors and Sensors |
|
|
735 | (1) |
|
|
736 | (1) |
|
|
737 | (1) |
|
|
738 | (1) |
|
|
738 | (1) |
|
|
739 | (1) |
|
|
739 | (1) |
|
|
740 | (1) |
|
|
741 | (4) |
Chapter 23 Cable Connectivity Issues and Tools |
|
745 | (26) |
|
Specifications and Limitations |
|
|
747 | (1) |
|
|
747 | (1) |
|
|
748 | (1) |
|
|
749 | (2) |
|
Identifying Hardware Tools |
|
|
751 | (14) |
|
|
752 | (3) |
|
|
755 | (1) |
|
|
755 | (1) |
|
Time-Domain Reflectometer |
|
|
756 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
756 | (1) |
|
|
757 | (1) |
|
|
758 | (1) |
|
|
759 | (1) |
|
|
760 | (1) |
|
|
760 | (1) |
|
|
761 | (1) |
|
|
761 | (2) |
|
|
763 | (1) |
|
Voltage Event Recorder (Power) |
|
|
763 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (1) |
|
|
765 | (1) |
|
|
766 | (1) |
|
|
767 | (4) |
Chapter 24 Network Troubleshooting Methodology |
|
771 | (54) |
|
Narrowing Down the Problem |
|
|
775 | (16) |
|
Did You Check the Super Simple Stuff? |
|
|
776 | (4) |
|
Is Hardware or Software Causing the Problem? |
|
|
780 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
781 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
781 | (1) |
|
|
782 | (9) |
|
|
791 | (24) |
|
Step 1: Identify the Problem |
|
|
792 | (4) |
|
Step 2: Establish a Theory of Probable Cause |
|
|
796 | (10) |
|
Step 3: Test the Theory to Determine Cause |
|
|
806 | (3) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
809 | (1) |
|
Step 5: Implement the Solution or Escalate as Necessary |
|
|
810 | (3) |
|
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures |
|
|
813 | (1) |
|
Step 7: Document Findings, Actions, Outcomes, and Lessons Learned |
|
|
814 | (1) |
|
|
815 | (3) |
|
Don't Overlook the Small Stuff |
|
|
815 | (1) |
|
|
815 | (1) |
|
Check the Software Configuration |
|
|
816 | (1) |
|
Don't Overlook Physical Conditions |
|
|
817 | (1) |
|
Don't Overlook Cable Problems |
|
|
817 | (1) |
|
|
818 | (1) |
|
|
818 | (1) |
|
|
818 | (1) |
|
|
819 | (2) |
|
|
821 | (4) |
Chapter 25 Network Software Tools and Commands |
|
825 | (62) |
|
|
827 | (6) |
|
|
827 | (1) |
|
Protocol Analyzer/Packet Capture |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
830 | (1) |
|
|
830 | (1) |
|
Trivial File Transfer Protocol (TFTP) Server |
|
|
831 | (1) |
|
|
831 | (1) |
|
|
832 | (1) |
|
|
833 | (3) |
|
Using ipconfig, ifconfig, and ip |
|
|
836 | (4) |
|
Using the ipconfig Utility |
|
|
836 | (4) |
|
Using the ifconfig Utility |
|
|
840 | (1) |
|
|
840 | (1) |
|
Using the iptables Utility |
|
|
841 | (1) |
|
|
841 | (1) |
|
|
841 | (4) |
|
Using the Address Resolution Protocol |
|
|
845 | (1) |
|
|
845 | (1) |
|
|
846 | (3) |
|
Using the nslookup Utility |
|
|
849 | (1) |
|
Resolving Names with the Hosts File |
|
|
850 | (2) |
|
Using the Mtr Command (pathping) |
|
|
852 | (1) |
|
|
853 | (1) |
|
|
854 | (3) |
|
Using the route Command Options |
|
|
854 | (3) |
|
Some Examples of the route Command |
|
|
857 | (1) |
|
Using the nbtstat Utility |
|
|
857 | (6) |
|
|
858 | (2) |
|
|
860 | (1) |
|
|
860 | (1) |
|
|
860 | (1) |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
862 | (1) |
|
|
863 | (1) |
|
Using the netstat Utility |
|
|
863 | (8) |
|
|
866 | (1) |
|
|
866 | (1) |
|
|
867 | (1) |
|
|
867 | (1) |
|
|
868 | (1) |
|
|
869 | (2) |
|
|
871 | (1) |
|
Examples of Using tcpdump |
|
|
871 | (1) |
|
Using the File Transfer Protocol |
|
|
871 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
872 | (2) |
|
|
874 | (2) |
|
|
876 | (1) |
|
|
876 | (2) |
|
How to Enable Telnet in Windows |
|
|
877 | (1) |
|
Don't Use Telnet, Use Secure Shell |
|
|
878 | (1) |
|
|
878 | (1) |
|
|
879 | (1) |
|
|
880 | (1) |
|
|
881 | (6) |
Appendix A Answers to Written Labs |
|
887 | (18) |
|
Chapter 1: Introduction to Networks |
|
|
888 | (1) |
|
Chapter 2: The Open Systems Interconnection Specifications |
|
|
888 | (1) |
|
Chapter 3: Networking Connectors and Wiring Standards |
|
|
889 | (1) |
|
Chapter 4: The Current Ethernet Specifications |
|
|
889 | (2) |
|
Chapter 5: Networking Devices |
|
|
891 | (1) |
|
Chapter 6: Introduction to the Internet Protocol |
|
|
892 | (1) |
|
|
893 | (1) |
|
|
893 | (1) |
|
|
893 | (1) |
|
Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
894 | (1) |
|
Chapter 9: Introduction to IP Routing |
|
|
895 | (1) |
|
Chapter 10: Routing Protocols |
|
|
895 | (1) |
|
Chapter 11: Switching and Virtual LANs |
|
|
895 | (1) |
|
Chapter 12: Wireless Networking |
|
|
896 | (1) |
|
Chapter 13: Using Statistics and Sensors to Ensure Network Availability |
|
|
896 | (1) |
|
Chapter 14: Organizational Documents and Policies |
|
|
897 | (1) |
|
Chapter 15: High Availability and Disaster Recovery |
|
|
898 | (1) |
|
Chapter 16: Common Security Concepts |
|
|
898 | (1) |
|
Chapter 17: Common Types of Attacks |
|
|
899 | (1) |
|
Chapter 18: Network Hardening Techniques |
|
|
899 | (1) |
|
Chapter 19: Remote Access Security |
|
|
900 | (1) |
|
Chapter 20: Physical Security |
|
|
900 | (1) |
|
Chapter 21: Data Center Architecture and Cloud Concepts |
|
|
901 | (1) |
|
Chapter 22: Ensuring Network Availability |
|
|
901 | (1) |
|
Chapter 23: Cable Connectivity Issues and Tools |
|
|
902 | (1) |
|
Chapter 24: Network Troubleshooting Methodology |
|
|
902 | (1) |
|
Chapter 25: Network Software Tools and Commands |
|
|
903 | (2) |
Appendix B Answers to Review Questions |
|
905 | (34) |
|
Chapter 1: Introduction to Networks |
|
|
906 | (1) |
|
Chapter 2: The Open Systems Interconnection Specifications |
|
|
907 | (2) |
|
Chapter 3: Networking Connectors and Wiring Standards |
|
|
909 | (1) |
|
Chapter 4: The Current Ethernet Specifications |
|
|
910 | (1) |
|
Chapter 5: Networking Devices |
|
|
911 | (2) |
|
Chapter 6: Introduction to the Internet Protocol |
|
|
913 | (1) |
|
|
914 | (2) |
|
Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
916 | (2) |
|
Chapter 9: Introduction to IP Routing |
|
|
918 | (1) |
|
Chapter 10: Routing Protocols |
|
|
919 | (2) |
|
Chapter 11: Switching and Virtual LANs |
|
|
921 | (1) |
|
Chapter 12: Wireless Networking |
|
|
922 | (2) |
|
Chapter 13: Using Statistics and Sensors to Ensure Network Availability |
|
|
924 | (1) |
|
Chapter 14: Organizational Documents and Policies |
|
|
925 | (1) |
|
Chapter 15: High Availability and Disaster Recovery |
|
|
926 | (1) |
|
Chapter 16: Common Security Concepts |
|
|
927 | (1) |
|
Chapter 17: Common Types of Attacks |
|
|
927 | (1) |
|
Chapter 18: Network Hardening Techniques |
|
|
928 | (1) |
|
Chapter 19: Remote Access Security |
|
|
929 | (1) |
|
Chapter 20: Physical Security |
|
|
930 | (1) |
|
Chapter 21: Data Center Architecture and Cloud Concepts |
|
|
931 | (2) |
|
Chapter 22: Ensuring Network Availability |
|
|
933 | (1) |
|
Chapter 23: Cable Connectivity Issues and Tools |
|
|
934 | (1) |
|
Chapter 24: Network Troubleshooting Methodology |
|
|
935 | (2) |
|
Chapter 25: Network Software Tools and Commands |
|
|
937 | (2) |
Appendix C Subnetting Class A |
|
939 | (8) |
|
Subnetting Practice Examples: Class A Addresses |
|
|
940 | (2) |
|
Practice Example #1A: 255.255.0.0 (/16) |
|
|
941 | (1) |
|
Practice Example #2A: 255.255.240.0 (/20) |
|
|
941 | (1) |
|
Practice Example #3A: 255.255.255.192 (/26) |
|
|
942 | (1) |
|
Subnetting in Your Head: Class A Addresses |
|
|
942 | (1) |
|
|
943 | (1) |
|
|
944 | (1) |
|
|
944 | (1) |
|
|
945 | (2) |
Index |
|
947 | |