Introduction |
|
xix | |
Chapter 1 WAN Concepts |
|
1 | (48) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
WAN Technologies Overview (1.1) |
|
|
3 | (17) |
|
|
3 | (10) |
|
|
3 | (1) |
|
Are WANs Necessary? (1.1.1.2) |
|
|
4 | (1) |
|
|
5 | (3) |
|
Evolving Networks (1.1.1.4) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Branch Networks (1.1.1.7) |
|
|
10 | (1) |
|
Distributed Network (1.1.1.8) |
|
|
11 | (2) |
|
|
13 | (7) |
|
WANs in the OSI Model (1.1.2.1) |
|
|
13 | (1) |
|
Common WAN Terminology (1.1.2.2) |
|
|
14 | (2) |
|
|
16 | (1) |
|
Circuit Switching (1.1.2.4) |
|
|
17 | (1) |
|
Packet Switching (1.1.2.5) |
|
|
18 | (2) |
|
Selecting a WAN Technology (1.2) |
|
|
20 | (23) |
|
|
20 | (3) |
|
WAN Link Connection Options (1.2.1.1) |
|
|
20 | (1) |
|
Service Provider Network Infrastructure (1.2.1.2) |
|
|
21 | (2) |
|
Private WAN Infrastructures (1.2.2) |
|
|
23 | (10) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Public WAN Infrastructure (1.2.3) |
|
|
33 | (6) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Selecting WAN Services (1.2.4) |
|
|
39 | (12) |
|
Choosing a WAN Link Connection (1.2.4.1) |
|
|
40 | (1) |
|
Choosing a WAN Link Connection (Cont.) (1.2.4.2) |
|
|
41 | (2) |
|
|
43 | (1) |
|
|
44 | (1) |
|
Check Your Understanding Questions |
|
|
44 | (5) |
Chapter 2 Point-to-Point Connections |
|
49 | (52) |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
Serial Point-to-Point Overview (2.1) |
|
|
51 | (12) |
|
Serial Communications (2.1.1) |
|
|
52 | (4) |
|
Serial and Parallel Ports (2.1.1.1) |
|
|
52 | (1) |
|
Point-to-Point Communication Links (2.1.1.2) |
|
|
53 | (1) |
|
Serial Bandwidth (2.1.1.3) |
|
|
54 | (2) |
|
HDLC Encapsulation (2.1.2) |
|
|
56 | (7) |
|
WAN Encapsulation Protocols (2.1.2.1) |
|
|
56 | (1) |
|
HDLC Encapsulation (2.1.2.2) |
|
|
57 | (1) |
|
Configuring HDLC Encapsulation (2.1.2.3) |
|
|
58 | (1) |
|
Troubleshooting a Serial Interface (2.1.2.4) |
|
|
59 | (4) |
|
|
63 | (26) |
|
|
63 | (2) |
|
Introducing PPP (2.2.1.1) |
|
|
64 | (1) |
|
Advantages of PPP (2.2.1.2) |
|
|
65 | (1) |
|
|
65 | (3) |
|
PPP-Layered Architecture (2.2.2.1) |
|
|
65 | (1) |
|
PPP: Link Control Protocol (LCP) (2.2.2.2) |
|
|
66 | (1) |
|
PPP: Network Control Protocol (NCP) (2.2.2.3) |
|
|
66 | (1) |
|
PPP Frame Structure (2.2.2.4) |
|
|
67 | (1) |
|
|
68 | (6) |
|
Establishing a PPP Session (2.2.3.1) |
|
|
68 | (1) |
|
|
69 | (3) |
|
PPP Configuration Options (2.2.3.3) |
|
|
72 | (1) |
|
|
72 | (2) |
|
|
74 | (8) |
|
|
74 | (1) |
|
PPP Configuration Options (2.3.1.1) |
|
|
74 | (2) |
|
PPP Basic Configuration Command (2.3.1.2) |
|
|
76 | (1) |
|
PPP Compression Commands (2.3.1.3) |
|
|
76 | (1) |
|
PPP Link Quality Monitoring Command (2.3.1.4) |
|
|
77 | (1) |
|
PPP Multilink Commands (2.3.1.5) |
|
|
78 | (3) |
|
Verifying PPP Configuration (2.3.1.6) |
|
|
81 | (1) |
|
Configure PPP Authentication (2.3.2) |
|
|
82 | (7) |
|
PPP Authentication Protocols (2.3.2.1) |
|
|
83 | (1) |
|
Password Authentication Protocol (PAP) (2.3.2.2) |
|
|
83 | (2) |
|
Challenge Handshake Authentication Protocol (CHAP) (2.3.2.3) |
|
|
85 | (1) |
|
PPP Authentication Command (2.3.2.4) |
|
|
86 | (1) |
|
Configuring PPP with Authentication (2.3.2.5) |
|
|
87 | (2) |
|
Troubleshoot WAN Connectivity (2.4) |
|
|
89 | (7) |
|
|
89 | (15) |
|
Troubleshooting PPP Serial Encapsulation (2.4.1.1) |
|
|
90 | (1) |
|
|
91 | (3) |
|
Troubleshooting a PPP Configuration with Authentication (2.4.1.3) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
Check Your Understanding Questions |
|
|
98 | (3) |
Chapter 3 Branch Connections |
|
101 | (54) |
|
|
101 | (1) |
|
|
101 | (2) |
|
|
103 | (1) |
|
Remote-Access Connections (3.1) |
|
|
104 | (9) |
|
Broadband Connections (3.1.1) |
|
|
104 | (8) |
|
What Is a Cable System? (3.1.1.1) |
|
|
104 | (1) |
|
Cable Components (3.1.1.2) |
|
|
105 | (2) |
|
|
107 | (1) |
|
DSL Connections (3.1.1.4) |
|
|
107 | (2) |
|
Wireless Connection (3.1.1.5) |
|
|
109 | (3) |
|
Select a Broadband Connection (3.1.2) |
|
|
112 | (1) |
|
Comparing Broadband Solutions (3.1.2.1) |
|
|
112 | (1) |
|
|
113 | (9) |
|
|
113 | (2) |
|
PPPoE Motivation (3.2.1.1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
115 | (7) |
|
PPPoE Configuration (3.2.2.1) |
|
|
115 | (1) |
|
PPPoE Verification (3.2.2.2) |
|
|
116 | (2) |
|
PPPoE Troubleshooting (3.2.2.3) |
|
|
118 | (1) |
|
PPPoE Negotiation (3.2.2.4) |
|
|
118 | (1) |
|
PPPoE Authentication (3.2.2.5) |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (6) |
|
Fundamentals of VPNs (3.3.1) |
|
|
122 | (3) |
|
Introducing VPNs (3.3.1.1) |
|
|
123 | (1) |
|
Benefits of VPNs (3.3.1.2) |
|
|
124 | (1) |
|
|
125 | (3) |
|
Site-to-Site VPNs (3.3.2.1) |
|
|
125 | (1) |
|
Remote-Access VPNs (3.3.2.2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (8) |
|
|
129 | (2) |
|
GRE Introduction (3.4.1.1) |
|
|
129 | (1) |
|
GRE Characteristics (3.4.1.2) |
|
|
130 | (1) |
|
|
131 | (5) |
|
|
131 | (2) |
|
|
133 | (1) |
|
Troubleshoot GRE (3.4.2.3) |
|
|
134 | (2) |
|
|
136 | (12) |
|
|
136 | (3) |
|
IGP and EGP Routing Protocols (3.11.1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
BGP Design Considerations (3.5.2) |
|
|
139 | (3) |
|
When to Use BGP (3.5.2.1) |
|
|
139 | (1) |
|
When Not to Use BGP (3.5.2.2) |
|
|
140 | (1) |
|
|
140 | (2) |
|
eBGP Branch Configuration (3.5.3) |
|
|
142 | (14) |
|
Steps to Configure eBGP (3.5.3.1) |
|
|
142 | (1) |
|
BGP Sample Configuration (3.5.3.2) |
|
|
143 | (2) |
|
|
145 | (3) |
|
|
148 | (1) |
|
|
149 | (1) |
|
Check Your Understanding Questions |
|
|
150 | (5) |
Chapter 4 Access Control Lists |
|
155 | (60) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
Standard ACL Operation and Configuration Review (4.1) |
|
|
156 | (17) |
|
ACL Operation Overview (4.1.1) |
|
|
156 | (6) |
|
ACLs and the Wildcard Mask (4.1.1.1) |
|
|
156 | (2) |
|
Applying ACLs to an Interface (4.1.1.2) |
|
|
158 | (1) |
|
A TCP Conversation (4.1.1.3) |
|
|
159 | (1) |
|
ACL Packet Filtering (4.1.1.4) |
|
|
160 | (2) |
|
Types of IPv4 ACLs (4.1.2) |
|
|
162 | (5) |
|
Standard and Extended IPv4 ACLs (4.1.2.1) |
|
|
162 | (1) |
|
Numbered and Named ACLs (4.1.2.2) |
|
|
163 | (1) |
|
Where to Place ACLs (4.1.2.3) |
|
|
163 | (2) |
|
Standard ACL Placement Example (4.1.2.4) |
|
|
165 | (1) |
|
Extended ACL Placement Example (4.1.2.5) |
|
|
166 | (1) |
|
Standard IPv4 ACL Implementation (4.1.3) |
|
|
167 | (6) |
|
Configure a Standard IPv4 ACL (4.1.3.1) |
|
|
167 | (2) |
|
Apply a Standard IPv4 ACL (4.1.3.2) |
|
|
169 | (1) |
|
Standard Named IPv4 ACLs (4.1.3.3) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
173 | (11) |
|
Structure of an Extended IPv4 ACLs (4.2.1) |
|
|
173 | (2) |
|
|
173 | (1) |
|
Filtering Ports and Services (4.2.1.2) |
|
|
173 | (2) |
|
Configure Extended IPv4 ACLs (4.2.2) |
|
|
175 | (9) |
|
Configuring Extended ACLs (4.2.2.1) |
|
|
175 | (2) |
|
Applying Extended ACLs to Interfaces (4.2.2.2) |
|
|
177 | (1) |
|
Filtering Traffic with Extended ACLs (4.2.2.3) |
|
|
178 | (2) |
|
Creating Extended Named ACLs (4.2.2.4) |
|
|
180 | (1) |
|
Verifying Extended ACLs (4.2.2.5) |
|
|
181 | (1) |
|
Editing Extended ACLs (4.2.2.6) |
|
|
182 | (2) |
|
|
184 | (10) |
|
IPv6 ACL Creation (4.3.1) |
|
|
184 | (2) |
|
Types of IPv6 ACLs (4.3.1.1) |
|
|
184 | (1) |
|
Comparing IPv4 and IPv6 ACLs (4.3.1.2) |
|
|
185 | (1) |
|
Configuring IPv6 ACLs (4.3.2) |
|
|
186 | (8) |
|
Configuring IPv6 Topology (4.3.2.1) |
|
|
186 | (2) |
|
Configuring IPv6 ACLs (4.3.2.2) |
|
|
188 | (1) |
|
Applying an IPv6 ACL to an Interface (4.3.2.3) |
|
|
189 | (1) |
|
IPv6 ACL Examples (4.3.2.4) |
|
|
190 | (2) |
|
Verifying IPv6 ACLs (4.3.2.5) |
|
|
192 | (2) |
|
|
194 | (14) |
|
Processing Packets with ACLs (4.4.1) |
|
|
194 | (3) |
|
Inbound and Outbound ACL Logic (4.4.1.1) |
|
|
194 | (1) |
|
ACL Logic Operations (4.4.1.2) |
|
|
195 | (1) |
|
Standard ACL Decision Process (4.4.1.3) |
|
|
196 | (1) |
|
Extended ACL Decision Process (4.4.1.4) |
|
|
197 | (1) |
|
Common ACL Errors (4.4.2) |
|
|
197 | (20) |
|
Troubleshooting IPv4 ACLs: Example 1 (4.4.2.1) |
|
|
197 | (1) |
|
Troubleshooting IPv4 ACLs: Example 2 (4.4.2.2) |
|
|
198 | (1) |
|
Troubleshooting IPv4 ACLs: Example 3 (4.4.2.3) |
|
|
199 | (1) |
|
Troubleshooting IPv4 ACLs: Example 4 (4.4.2.4) |
|
|
200 | (1) |
|
Troubleshooting IPv4 ACLs: Example 5 (4.4.2.5) |
|
|
200 | (1) |
|
Troubleshooting IPv6 ACLs: Example 1 (4.4.2.6) |
|
|
201 | (2) |
|
Troubleshooting IPv6 ACLs: Example 2 (4.4.2.7) |
|
|
203 | (2) |
|
Troubleshooting IPv6 ACLs: Example 3 (4.4.2.8) |
|
|
205 | (3) |
|
|
208 | (1) |
|
|
209 | (1) |
|
Check Your Understanding Questions |
|
|
210 | (5) |
Chapter 5 Network Security and Monitoring |
|
215 | (54) |
|
|
215 | (1) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
217 | (17) |
|
LAN Security Attacks (5.1.1) |
|
|
218 | (9) |
|
Common LAN Attacks (5.1.1.1) |
|
|
218 | (1) |
|
CDP Reconnaissance Attack (5.1.1.2) |
|
|
219 | (1) |
|
|
220 | (2) |
|
MAC Address Table Flooding Attack (5.1.1.4) |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
226 | (1) |
|
LAN Security Best Practices (5.1.2) |
|
|
227 | (7) |
|
|
227 | (1) |
|
Mitigate. MAC Address Flooding Table Attacks (5.1.2.2) |
|
|
228 | (1) |
|
Mitigate VLAN Attacks (5.1.2.3) |
|
|
229 | (1) |
|
Mitigate DHCP Attacks (5.1.2.4) |
|
|
230 | (1) |
|
Secure Administrative Access Using AAA (5.1.2.5) |
|
|
231 | (2) |
|
Secure Device Access Using 802.1X (5.1.2.6) |
|
|
233 | (1) |
|
|
234 | (21) |
|
|
234 | (14) |
|
Introduction to SNMP (5.2.1.1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
SNMP Agent Traps (5.2.1.3) |
|
|
237 | (1) |
|
|
238 | (3) |
|
Community Strings (5.2.1.5) |
|
|
241 | (2) |
|
Management Information Base Object ID (5.2.1.6) |
|
|
243 | (3) |
|
|
246 | (2) |
|
|
248 | (7) |
|
Steps for Configuring SNMP (5.2.2.1) |
|
|
248 | (1) |
|
Verifying SNMP Configuration (5.2.2.2) |
|
|
249 | (3) |
|
SNMP Best Practices (5.2.2.3) |
|
|
252 | (2) |
|
Steps for Configuring SNMPv3 (5.2.2.4) |
|
|
254 | (1) |
|
Verifying SNMPv3 Configuration (5.2.2.5) |
|
|
254 | (1) |
|
Cisco Switch Port Analyzer (5.3) |
|
|
255 | (9) |
|
|
256 | (4) |
|
|
256 | (1) |
|
Analyzing Suspicious Traffic (5.3.1.2) |
|
|
257 | (1) |
|
|
257 | (2) |
|
|
259 | (1) |
|
SPAN Configuration (5.3.2) |
|
|
260 | (2) |
|
Configuring Local SPAN (5.3.2.1) |
|
|
260 | (1) |
|
Verifying Local SPAN (5.3.2.2) |
|
|
261 | (1) |
|
SPAN as a Troubleshooting Tool (5.3.3) |
|
|
262 | (9) |
|
Troubleshooting with SPAN Overview (5.3.3.1) |
|
|
262 | (2) |
|
|
264 | (1) |
|
|
264 | (1) |
|
Check Your Understanding Questions |
|
|
265 | (4) |
Chapter 6 Quality of Service |
|
269 | (34) |
|
|
269 | (1) |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
271 | (12) |
|
Network Transmission Quality (6.1.1) |
|
|
271 | (4) |
|
Prioritizing Traffic (6.1.1.1) |
|
|
271 | (1) |
|
Bandwidth, Congestion, Delay, and Jitter (6.1.1.2) |
|
|
272 | (1) |
|
|
273 | (2) |
|
Traffic Characteristics (6.1.2) |
|
|
275 | (3) |
|
Network Traffic Trends (6.1.2.1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Queuing Algorithms (6.1.3) |
|
|
278 | (5) |
|
Queuing Overview (6.1.3.1) |
|
|
279 | (1) |
|
First-In First-Out (FIFO) (6.1.3.2) |
|
|
279 | (1) |
|
Weighted Fair Queuing (WFQ) (6.1.3.3) |
|
|
280 | (1) |
|
Class-Based Weighted Fair Queuing (CBWFQ) (6.1.3.4) |
|
|
281 | (1) |
|
Low Latency Queuing (LLQ) (6.1.3.5) |
|
|
282 | (1) |
|
|
283 | (16) |
|
|
283 | (5) |
|
Selecting an Appropriate QoS Policy Model (6.2.1.1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Integrated Services (6.2.1.3) |
|
|
285 | (1) |
|
Differentiated Services (6.2.1.4) |
|
|
286 | (2) |
|
QoS Implementation Techniques (6.2.2) |
|
|
288 | (17) |
|
Avoiding Packet Loss (6.2.2.1) |
|
|
288 | (1) |
|
|
289 | (1) |
|
Classification and Marking (6.2.2.3) |
|
|
290 | (1) |
|
Marking at Layer 2 (6.2.2.4) |
|
|
291 | (1) |
|
Marking at Layer 3 (6.2.2.5) |
|
|
292 | (3) |
|
Trust Boundaries (6.2.2.6) |
|
|
295 | (1) |
|
Congestion Avoidance (6.2.2.7) |
|
|
296 | (1) |
|
Shaping and Policing (6.2.2.8) |
|
|
297 | (2) |
|
|
299 | (1) |
|
|
300 | (1) |
|
Check Your Understanding Questions |
|
|
300 | (3) |
Chapter 7 Network Evolution |
|
303 | (44) |
|
|
303 | (1) |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
305 | (9) |
|
|
305 | (2) |
|
What Is the loT? (71.1.1) |
|
|
305 | (1) |
|
The Converged Network and Things (71.1.2) |
|
|
305 | (1) |
|
Challenges to Connecting Things (71.1.3) |
|
|
306 | (1) |
|
The Six Pillars of the Cisco IoT System (71.1.4) |
|
|
307 | (1) |
|
|
307 | (7) |
|
The Network Connectivity Pillar (71.2.1) |
|
|
308 | (1) |
|
The Fog Computing Pillar (71.2.2) |
|
|
308 | (3) |
|
The Security Pillar (71.2.3) |
|
|
311 | (1) |
|
Data Analytics Pillar (71.2.4) |
|
|
312 | (1) |
|
Management and Automation Pillar (71.2.5) |
|
|
313 | (1) |
|
Application Enablement Platform Pillar (71.2.6) |
|
|
313 | (1) |
|
Cloud and Virtualization (7.2) |
|
|
314 | (12) |
|
|
314 | (3) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
Cloud Computing versus Data Center (72.1.5) |
|
|
316 | (1) |
|
|
317 | (6) |
|
Cloud Computing and Virtualization (Z2.2.1) |
|
|
317 | (1) |
|
Dedicated Servers (72.2.2) |
|
|
318 | (1) |
|
Server Virtualization (72.2.3) |
|
|
319 | (1) |
|
Advantages of Virtualization (72.2.4) |
|
|
320 | (1) |
|
Abstraction Layers (72.2.5) |
|
|
321 | (1) |
|
Type 2 Hypervisors (72.2.6) |
|
|
321 | (2) |
|
Virtual Network Infrastructure (Z2.3) |
|
|
323 | (3) |
|
Type 1 Hypervisors (72.3.1) |
|
|
323 | (1) |
|
Installing a VM on a Hypervisor (72.3.2) |
|
|
324 | (1) |
|
Network Virtualization (72.3.3) |
|
|
324 | (2) |
|
Network Programming (7.3) |
|
|
326 | (14) |
|
Software-Defined Networking (7.3.1) |
|
|
326 | (5) |
|
Control Plane and Data Plane (73.1.1) |
|
|
326 | (1) |
|
Virtualizing the Network (73.1.2) |
|
|
327 | (2) |
|
SDN Architecture (73.1.3) |
|
|
329 | (2) |
|
|
331 | (18) |
|
SDN Controller and Operations (73.2.1) |
|
|
331 | (1) |
|
Cisco Application Centric Infrastructure (73.2.2) |
|
|
332 | (1) |
|
Core Components of ACI (73.2.3) |
|
|
332 | (1) |
|
Spine-Leaf Topology (73.2.4) |
|
|
333 | (1) |
|
|
334 | (2) |
|
APIC-EM Features (73.2.6) |
|
|
336 | (1) |
|
APIC-EM ACL Analysis (73.2.7) |
|
|
337 | (3) |
|
|
340 | (1) |
|
|
341 | (1) |
|
Check Your Understanding Questions |
|
|
341 | (6) |
Chapter 8 Network Troubleshooting |
|
347 | (84) |
|
|
347 | (1) |
|
|
347 | (2) |
|
|
349 | (1) |
|
Troubleshooting Methodology (8.1) |
|
|
349 | (23) |
|
Network Documentation (8.1.1) |
|
|
349 | (11) |
|
Documenting the Network (8.1.1.1) |
|
|
349 | (3) |
|
Network Topology Diagrams (8.1.1.2) |
|
|
352 | (3) |
|
Establishing a Network Baseline (8.1.1.3) |
|
|
355 | (1) |
|
Steps to Establish a Network Baseline (8.1.1.4) |
|
|
355 | (3) |
|
|
358 | (2) |
|
Troubleshooting Process (8.1.2) |
|
|
360 | (5) |
|
General Troubleshooting Procedures (8.1.2.1) |
|
|
360 | (2) |
|
Gathering Symptoms (8.1.2.2) |
|
|
362 | (2) |
|
Questioning End Users (8.1.2.3) |
|
|
364 | (1) |
|
Isolating the Issue Using Layered Models (8.1.3) |
|
|
365 | (7) |
|
Using Layered Models for Troubleshooting (8.1.3.1) |
|
|
365 | (2) |
|
Troubleshooting Methods (8.1.3.2) |
|
|
367 | (3) |
|
Other Troubleshooting Methods (8.1.3.3) |
|
|
370 | (1) |
|
Guidelines for Selecting a Troubleshooting Method (8.1.3.4) |
|
|
371 | (1) |
|
Troubleshooting Scenarios (8.2) |
|
|
372 | (53) |
|
|
372 | (5) |
|
IP SLA Concepts (8.2.1.1) |
|
|
372 | (1) |
|
IP SLA Configuration (8.2.1.2) |
|
|
373 | (2) |
|
Sample IP SLA Configuration (8.2.1.3) |
|
|
375 | (1) |
|
Verifying an IP SLA Configuration (8.2.1.4) |
|
|
376 | (1) |
|
Troubleshooting Tools (8.2.2) |
|
|
377 | (10) |
|
Software Troubleshooting Tools (8.2.2.1) |
|
|
377 | (2) |
|
Protocol Analyzers (8.2.2.2) |
|
|
379 | (1) |
|
Hardware Troubleshooting Tools (8.2.2.3) |
|
|
380 | (5) |
|
Using a Syslog Server for Troubleshooting (8.2.2.4) |
|
|
385 | (2) |
|
Symptoms and Causes of Network Troubleshooting (8.2.3) |
|
|
387 | (11) |
|
Physical Layer Troubleshooting (8.2.3.1) |
|
|
387 | (3) |
|
Data Link Layer Troubleshooting (8.2.3.2) |
|
|
390 | (2) |
|
Network Layer Troubleshooting (8.2.3.3) |
|
|
392 | (2) |
|
Transport Layer Troubleshooting: ACLs (8.2.3.4) |
|
|
394 | (2) |
|
Transport Layer Troubleshooting: NAT for IPv4 (8.2.3.5) |
|
|
396 | (1) |
|
Application Layer Troubleshooting (8.2.3.6) |
|
|
397 | (1) |
|
Troubleshooting IP Connectivity (8.2.4) |
|
|
398 | (27) |
|
Components of Troubleshooting End-to-End Connectivity (8.2.4.1) |
|
|
398 | (2) |
|
End-to-End Connectivity Problem Initiates Troubleshooting (8.2.4.2) |
|
|
400 | (2) |
|
Step 1: Verify the Physical Layer (8.2.4.3) |
|
|
402 | (2) |
|
Step 2: Check for Duplex Mismatches (8.2.4.4) |
|
|
404 | (2) |
|
Step 3: Verify Layer 2 and Layer 3 Addressing on the Local Network (8.2.4.5) |
|
|
406 | (5) |
|
Step 4: Verify Default Gateway (8.2.4.6) |
|
|
411 | (4) |
|
Step 5: Verify Correct Path (8.2.4.7) |
|
|
415 | (3) |
|
Step 6: Verify the Transport Layer (8.2.4.8) |
|
|
418 | (2) |
|
Step 7: Verify ACLs (8.2.4.9) |
|
|
420 | (2) |
|
Step 8: Verify DNS (8.2.4.10) |
|
|
422 | (3) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Check Your Understanding Questions |
|
|
427 | (4) |
Appendix A: Answers to the-"Check Your Understanding" Questions |
|
431 | (12) |
Glossary |
|
443 | (28) |
Index |
|
471 | |