Introduction |
|
xxx | |
|
Chapter 1 Networking Today |
|
|
1 | (18) |
|
Networks Affect Our Lives |
|
|
2 | (1) |
|
|
2 | (2) |
|
End Devices, Intermediary Devices, and Media |
|
|
2 | (1) |
|
Check Your Understanding: Network Components |
|
|
3 | (1) |
|
Network Representations and Topologies |
|
|
4 | (1) |
|
Classify and Identify Network Components |
|
|
4 | (1) |
|
|
4 | (1) |
|
Check Your Understanding: Network Representations and Topologies |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Check Your Understanding: Common Types of Networks |
|
|
6 | (1) |
|
|
6 | (2) |
|
Vocabulary Exercise: Matching |
|
|
6 | (2) |
|
|
8 | (1) |
|
Classify the Requirements for a Reliable Network |
|
|
8 | (1) |
|
Check Your Understanding: Reliable Networks |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
10 | (1) |
|
Check Your Understanding: Network Trends |
|
|
10 | (1) |
|
|
11 | (1) |
|
Check Your Understanding: Network Security |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.5.7 Packet Tracer---Network Representation |
|
|
13 | (3) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (2) |
|
1.9.3 Lab---Research IT and Networking Job Opportunities |
|
|
16 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Chapter 2 Basic Switch and End Device Configuration |
|
|
19 | (40) |
|
|
20 | (1) |
|
Check Your Understanding: Cisco IOS Access |
|
|
20 | (1) |
|
|
21 | (2) |
|
Syntax Checker: Navigate Between IOS Modes |
|
|
21 | (1) |
|
Check Your Understanding: IOS Navigation |
|
|
22 | (1) |
|
|
23 | (2) |
|
Navigate the IOS Matching Exercise |
|
|
23 | (1) |
|
|
24 | (1) |
|
Basic Device Configuration |
|
|
25 | (2) |
|
Apply a Basic Configuration |
|
|
25 | (1) |
|
Check Your Understanding: Basic Device Configuration |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
Check Your Understanding: Ports and Addresses |
|
|
28 | (1) |
|
|
28 | (2) |
|
|
30 | (2) |
|
Packet Tracer Exercise 2-1: Basic Switch Configuration |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.3.7 Packet Tracer---Navigate the IOS |
|
|
33 | (5) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
Part 1 Establish Basic Connections, Access the CLI, and Explore Help |
|
|
33 | (1) |
|
Part 2 Explore EXEC Modes |
|
|
34 | (2) |
|
|
36 | (2) |
|
2.3.8 Lab---Navigate the IOS by Using Tera Term for Console Connectivity |
|
|
38 | (7) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
Part 1 Access a Cisco Switch through the Serial Console Port |
|
|
39 | (1) |
|
Part 2 Display and Configure Basic Device Settings |
|
|
40 | (2) |
|
Part 3 (Optional) Access a Cisco Router Using a Mini-USB Console Cable |
|
|
42 | (2) |
|
|
44 | (1) |
|
Router Interface Summary Table |
|
|
44 | (1) |
|
2.5.5 Packet Tracer---Configure Initial Switch Settings |
|
|
45 | (5) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
Part 1 Verify the Default Switch Configuration |
|
|
45 | (1) |
|
Part 2 Create a Basic Switch Configuration |
|
|
46 | (2) |
|
Part 3 Configure a MOTD Banner |
|
|
48 | (1) |
|
Part 4 Save and Verify Configuration Files to NVRAM |
|
|
49 | (1) |
|
|
49 | (1) |
|
2.7.6 Packet Tracer---Implement Basic Connectivity |
|
|
50 | (3) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
Part 1 Perform a Basic Configuration on SI and S2 |
|
|
50 | (1) |
|
|
51 | (1) |
|
Part 3 Configure the Switch Management Interface |
|
|
51 | (2) |
|
2.9.1 Packet Tracer---Basic Switch and End Device Configuration |
|
|
53 | (2) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (2) |
|
2.9.2 Lab---Basic Switch and End Device Configuration |
|
|
55 | (4) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
Chapter 3 Protocols and Models |
|
|
59 | (32) |
|
|
60 | (1) |
|
Vocabulary Exercise: Matching |
|
|
60 | (1) |
|
Check Your Understanding: The Rules |
|
|
60 | (1) |
|
|
61 | (2) |
|
Check Your Understanding: Protocols |
|
|
62 | (1) |
|
|
63 | (3) |
|
Protocol Definitions: Matching |
|
|
63 | (1) |
|
Map the Protocols of the TCP/IP Suite |
|
|
64 | (1) |
|
Check Your Understanding: Protocol Suites |
|
|
65 | (1) |
|
|
66 | (2) |
|
Standards Organizations: Matching |
|
|
66 | (1) |
|
Check Your Understanding: Standards Organizations |
|
|
67 | (1) |
|
|
68 | (1) |
|
OSI Reference Model Layers: Matching |
|
|
68 | (1) |
|
TCP/IP Model Layers: Matching |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
69 | (1) |
|
Check Your Understanding: Data Encapsulation |
|
|
70 | (1) |
|
|
71 | (2) |
|
The Role of Addressing in Network Communications |
|
|
71 | (1) |
|
Check Your Understanding: Data Access |
|
|
72 | (1) |
|
3.0.3 Class Activity---Design a Communications System |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
3.4.4 Lab---Research Networking Standards |
|
|
74 | (3) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (3) |
|
3.5.5 Packet Tracer---Investigate the TCP/IP and OSI Models in Action |
|
|
77 | (5) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Part 1 Examine HTTP Web Traffic |
|
|
77 | (3) |
|
Part 2 Display Elements of the TCP/IP Protocol Suite |
|
|
80 | (1) |
|
|
81 | (1) |
|
3.7.9 Lab---Install Wireshark |
|
|
82 | (2) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
3.7.10 Lab---Use Wireshark to View Network Traffic |
|
|
84 | (7) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
Part 1 Capture and Analyze Local ICMP Data in Wireshark |
|
|
85 | (2) |
|
Part 2 Capture and Analyze Remote ICMP Data in Wireshark |
|
|
87 | (1) |
|
|
88 | (1) |
|
Appendix A Allowing ICMP Traffic Through a Firewall |
|
|
89 | (1) |
|
Part 1 Create a new inbound rule allowing ICMP traffic through the firewall |
|
|
89 | (1) |
|
Part 2 Disabling or deleting the new ICMP rule |
|
|
89 | (2) |
|
|
91 | (1) |
|
Purpose of the Physical Layer |
|
|
92 | (1) |
|
Check Your Understanding: Purpose of the Physical Layer |
|
|
92 | (1) |
|
Physical Layer Characteristics |
|
|
92 | (2) |
|
|
93 | (1) |
|
Check Your Understanding: Physical Layer Characteristics |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
94 | (1) |
|
Compare UTP, STP, and Coaxial Characteristics |
|
|
95 | (1) |
|
|
96 | (1) |
|
Limiting the Negative Effect of Crosstalk |
|
|
96 | (1) |
|
UTP Cable Wiring Standards |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (2) |
|
|
97 | (1) |
|
Check Your Understanding: Fiber-Optic Cabling |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
99 | (1) |
|
Check Your Understanding: Wireless Media |
|
|
100 | (1) |
|
4.6.5 Packet Tracer---Connect a Wired and Wireless LAN |
|
|
101 | (4) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
Part 1 Connect to the Cloud |
|
|
102 | (1) |
|
|
102 | (1) |
|
Part 3 Connect Remaining Devices |
|
|
102 | (1) |
|
Part 4 Verify Connections |
|
|
103 | (1) |
|
Part 5 Examine the Physical Topology |
|
|
103 | (2) |
|
4.6.6 Lab---View Wired and Wireless NIC Information |
|
|
105 | (4) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Part 1 Identify and Work with PC NICs |
|
|
105 | (3) |
|
Part 2 Identify and Use the System Tray Network Icons |
|
|
108 | (1) |
|
|
108 | (1) |
|
4.7.1 Packet Tracer---Connect the Physical Layer |
|
|
109 | (6) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Part 1 Identify Physical Characteristics of Internetworking Devices |
|
|
109 | (1) |
|
Part 2 Select Correct Modules for Connectivity |
|
|
110 | (1) |
|
|
111 | (1) |
|
Part 4 Check Connectivity |
|
|
112 | (3) |
|
|
115 | (8) |
|
|
116 | (2) |
|
|
116 | (1) |
|
Convert Binary to Decimal |
|
|
117 | (1) |
|
Convert Decimal to Binary |
|
|
118 | (1) |
|
|
118 | (1) |
|
Hexadecimal Number System |
|
|
118 | (5) |
|
Decimal to Hexadecimal Conversion |
|
|
120 | (1) |
|
Hexadecimal to Decimal Conversion |
|
|
120 | (1) |
|
Check Your Understanding: Hexadecimal Number System |
|
|
120 | (3) |
|
Chapter 6 Data Link Layer |
|
|
123 | (8) |
|
Purpose of the Data Link Layer |
|
|
124 | (2) |
|
Check Your Understanding: Purpose of the Data Link Layer |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
126 | (1) |
|
Check Your Understanding: Topologies |
|
|
127 | (1) |
|
|
128 | (3) |
|
Label the Generic Frame Fields |
|
|
128 | (1) |
|
Check Your Understanding: Data Link Frame |
|
|
128 | (3) |
|
Chapter 7 Ethernet Switching |
|
|
131 | (28) |
|
|
132 | (2) |
|
Identify the Ethernet Frame Attributes |
|
|
133 | (1) |
|
Check Your Understanding: Ethernet Switching |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (5) |
|
|
135 | (1) |
|
Build the MAC Address Table |
|
|
136 | (1) |
|
|
136 | (4) |
|
Switch Speeds and Forwarding Methods |
|
|
140 | (2) |
|
Compare Switch Forwarding Methods |
|
|
140 | (1) |
|
Port Settings Completion Exercise |
|
|
140 | (1) |
|
Check Your Understanding: Switch Speeds and Forwarding Methods |
|
|
141 | (1) |
|
7.1.6 Lab---Use Wireshark to Examine Ethernet Frames |
|
|
142 | (7) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
Part 1 Examine the Header Fields in an Ethernet II Frame |
|
|
142 | (4) |
|
Part 2 Use Wireshark to Capture and Analyze Ethernet Frames |
|
|
146 | (2) |
|
|
148 | (1) |
|
7.2.7 Lab---View Network Device MAC Addresses |
|
|
149 | (6) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Part 1 Configure Devices and Verify Connectivity |
|
|
150 | (1) |
|
Part 2 Display, Describe, and Analyze Ethernet MAC Addresses |
|
|
151 | (3) |
|
|
154 | (1) |
|
7.3.7 Lab---View the Switch MAC Address Table |
|
|
155 | (4) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
Part 1 Build and Configure the Network |
|
|
156 | (1) |
|
Part 2 Examine the Switch MAC Address Table |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
159 | (12) |
|
Network Layer Characteristics |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
160 | (1) |
|
Check Your Understanding: IP Characteristics |
|
|
161 | (1) |
|
|
161 | (2) |
|
Fields of the IPv4 Packet |
|
|
162 | (1) |
|
Check Your Understanding: IPv4 Packet |
|
|
162 | (1) |
|
|
163 | (1) |
|
Fields of the IPv6 Packet |
|
|
163 | (1) |
|
Check Your Understanding: IPv6 Packet |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
165 | (1) |
|
Check Your Understanding: How a Host Routes |
|
|
166 | (1) |
|
|
166 | (5) |
|
Routing Table Entry: Matching |
|
|
168 | (1) |
|
Check Your Understanding: Introduction to Routing |
|
|
169 | (2) |
|
Chapter 9 Address Resolution |
|
|
171 | (20) |
|
|
172 | (1) |
|
Identify the MAC and IP Addresses |
|
|
172 | (1) |
|
Check Your Understanding: MAC and IP |
|
|
172 | (1) |
|
|
173 | (2) |
|
|
173 | (1) |
|
Check Your Understanding: ARP |
|
|
174 | (1) |
|
|
175 | (2) |
|
|
175 | (1) |
|
Check Your Understanding: Neighbor Discovery |
|
|
175 | (2) |
|
9.1.3 Packet Tracer---Identify MAC and IP Addresses |
|
|
177 | (4) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Part 1 Gather PDU Information for Local Network Communication |
|
|
177 | (1) |
|
Part 2 Gather PDU Information for Remote Network Communication |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
9.2.9 Packet Tracer---Examine the ARP Table |
|
|
181 | (4) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
Part 1 Examine an ARP Request |
|
|
181 | (1) |
|
Part 2 Examine a Switch MAC Address Table |
|
|
182 | (1) |
|
Part 3 Examine the ARP Process in Remote Communications |
|
|
183 | (2) |
|
9.3.4 Packet Tracer---IPv6 Neighbor Discovery |
|
|
185 | (6) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
Part 1 IPv6 Neighbor Discovery Local Network |
|
|
185 | (2) |
|
Part 2 IPv6 Neighbor Discovery Remote Network |
|
|
187 | (3) |
|
|
190 | (1) |
|
Chapter 10 Basic Router Configuration |
|
|
191 | (28) |
|
Configure Initial Router Settings |
|
|
192 | (2) |
|
Basic Router Configuration Exercise |
|
|
192 | (1) |
|
Configure Initial Settings Exercise |
|
|
193 | (1) |
|
|
194 | (2) |
|
Configure Router Interfaces Exercise |
|
|
194 | (2) |
|
Packet Tracer Exercise 10-1: Basic Router Configuration |
|
|
196 | (1) |
|
Configure the Default Gateway |
|
|
196 | (1) |
|
|
197 | (1) |
|
10.1.4 Packet Tracer---Configure Initial Router Settings |
|
|
198 | (4) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Part 1 Verify the Default Router Configuration |
|
|
198 | (1) |
|
Part 2 Configure and Verify the Initial Router Configuration |
|
|
199 | (1) |
|
Part 3 Save the Running Configuration File |
|
|
200 | (2) |
|
10.3.4 Packet Tracer---Connect a Router to a LAN |
|
|
202 | (5) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
Part 1 Display Router Information |
|
|
202 | (2) |
|
Part 2 Configure Router Interfaces |
|
|
204 | (1) |
|
Part 3 Verify the Configuration |
|
|
205 | (2) |
|
10.3.5 Packet Tracer---Troubleshoot Default Gateway Issues |
|
|
207 | (3) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Part 1 Verify Network Documentation and Isolate Problems |
|
|
208 | (1) |
|
Part 2 Implement, Verify, and Document Solutions |
|
|
209 | (1) |
|
10.4.3 Packet Tracer---Basic Device Configuration |
|
|
210 | (2) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (1) |
|
10.4.4 Lab---Build a Switch and Router Network |
|
|
212 | (7) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
Part 1 Set Up Topology and Initialize Devices |
|
|
213 | (1) |
|
Part 2 Configure Devices and Verify Connectivity |
|
|
214 | (1) |
|
Part 3 Display Device Information |
|
|
215 | (1) |
|
|
216 | (1) |
|
Router Interface Summary Table |
|
|
216 | (3) |
|
Chapter 11 IPv4 Addressing |
|
|
219 | (42) |
|
|
220 | (4) |
|
Network and Host Portions |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Determining the Network: Logical AND |
|
|
221 | (1) |
|
ANDing to Determine the Network Address |
|
|
222 | (1) |
|
Activity: ANDing to Determine the Network Address |
|
|
222 | (1) |
|
Check Your Understanding: IPv4 Address Structure |
|
|
223 | (1) |
|
IPv4 Unicast, Broadcast, and Multicast |
|
|
224 | (1) |
|
|
224 | (2) |
|
Public and Private Addresses |
|
|
224 | (1) |
|
Special Use IPv4 Addresses |
|
|
224 | (1) |
|
Legacy Classful Addressing |
|
|
225 | (1) |
|
Assignment of IP Addresses |
|
|
225 | (1) |
|
Check Your Understanding: Types of IPv4 Addresses |
|
|
226 | (1) |
|
|
226 | (1) |
|
Broadcast Domains and Segmentation |
|
|
226 | (1) |
|
Problems with Large Broadcast Domains |
|
|
226 | (1) |
|
Reasons for Segmenting Networks |
|
|
227 | (1) |
|
Check Your Understanding: Network Segmentation |
|
|
227 | (1) |
|
|
227 | (4) |
|
|
228 | (1) |
|
|
228 | (2) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (5) |
|
|
231 | (2) |
|
VLSM Addressing Design Exercises |
|
|
233 | (3) |
|
11.5.5 Packet Tracer---Subnet an IPv4 Network |
|
|
236 | (5) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Part 1 Subnet the Assigned Network |
|
|
237 | (3) |
|
Part 2 Configure the Devices |
|
|
240 | (1) |
|
Part 3 Test and Troubleshoot the Network |
|
|
240 | (1) |
|
11.6.6 Lab---Calculate IPv4 Subnets |
|
|
241 | (4) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
11.7.5 Packet Tracer---Subnetting Scenario |
|
|
245 | (4) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
Part 1 Design an IP Addressing Scheme |
|
|
245 | (3) |
|
Part 2 Assign IP Addresses to Network Devices and Verify Connectivity |
|
|
248 | (1) |
|
11.9.3 Packet Tracer---VLSM Design and implementation Practice |
|
|
249 | (4) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Part 1 Examine the Network Requirements |
|
|
250 | (1) |
|
Part 2 Design the VLSM Addressing Scheme |
|
|
251 | (1) |
|
Part 3 Assign IP Addresses to Devices and Verify Connectivity |
|
|
252 | (1) |
|
11.10.1 Packet Tracer---Design and Implement a VLSM Addressing Scheme |
|
|
253 | (2) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
11.10.2 Lab---Design and Implement a VLSM Addressing Scheme |
|
|
255 | (6) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Part 1 Examine Network Requirements |
|
|
256 | (2) |
|
Part 2 Design the VLSM Address Scheme |
|
|
258 | (1) |
|
Part 3 Cable and Configure the IPv4 Network |
|
|
259 | (1) |
|
|
260 | (1) |
|
Router Interface Summary Table |
|
|
260 | (1) |
|
Chapter 12 IPv6 Addressing |
|
|
261 | (30) |
|
|
262 | (1) |
|
IPv4 and IPv6 Coexistence |
|
|
262 | (1) |
|
Check Your Understanding: IPv4 Issues |
|
|
262 | (1) |
|
IPv6 Address Representation |
|
|
263 | (1) |
|
|
263 | (2) |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
GUA and LLA Static Configuration |
|
|
265 | (2) |
|
Static Configuration of Global Unicast Addressing |
|
|
265 | (1) |
|
Static GUA Configuration on a Windows Host |
|
|
266 | (1) |
|
Static Configuration of a Link-Local Unicast Address |
|
|
266 | (1) |
|
Dynamic Addressing for IPv6 GUAs |
|
|
267 | (5) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Method 2 SLAAC and Stateless DHCPv6 |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
Randomly Generated Interface IDs |
|
|
271 | (1) |
|
Check Your Understanding: Dynamic Addressing for IPv6 GUAs |
|
|
271 | (1) |
|
Dynamic Addressing for IPv6 LLAs |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (4) |
|
|
273 | (1) |
|
IPv6 Subnetting Scenario 1 |
|
|
273 | (1) |
|
IPv6 Subnetting Scenario 2 |
|
|
273 | (1) |
|
IPv6 Subnetting Scenario 3 |
|
|
274 | (1) |
|
Check Your Understanding: Subnet an IPv6 Network |
|
|
274 | (2) |
|
12.6.6 Packet Tracer---Configure IPv6 Addressing |
|
|
276 | (4) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Part 1 Configure IPv6 Addressing on the Router |
|
|
276 | (2) |
|
Part 2 Configure IPv6 Addressing on the Servers |
|
|
278 | (1) |
|
Part 3 Configure IPv6 Addressing on the Clients |
|
|
278 | (1) |
|
Part 4 Test and Verify Network Connectivity |
|
|
278 | (2) |
|
12.7.4 Lab---identify IPv6 Addresses |
|
|
280 | (4) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
|
280 | (1) |
|
Part 1 Practice with Different Types of IPv6 Addresses |
|
|
280 | (1) |
|
Part 2 Examine a Host IPv6 Network Interface and Address |
|
|
281 | (2) |
|
|
283 | (1) |
|
12.9.1 Packet Tracer---Implement a Subnetted IPv6 Addressing Scheme |
|
|
284 | (2) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (2) |
|
12.9.2 Lab---Configure IPv6 Addresses on Network Devices |
|
|
286 | (5) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
Part 1 Cable the Network and Configure Basic Router and Switch Settings |
|
|
287 | (1) |
|
Part 2 Configure IPv6 Addresses Manually |
|
|
287 | (2) |
|
Part 3 Verify End-to-End Connectivity |
|
|
289 | (1) |
|
|
289 | (1) |
|
Router Interface Summary Table |
|
|
289 | (2) |
|
|
291 | (28) |
|
|
292 | (4) |
|
|
292 | (1) |
|
Destination or Service Unreachable |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (2) |
|
Check Your Understanding: ICMP Messages |
|
|
295 | (1) |
|
Ping and Traceroute Tests |
|
|
296 | (1) |
|
|
296 | (1) |
|
Traceroute---Test the Path |
|
|
296 | (1) |
|
|
297 | (1) |
|
13.2.6 Packet Tracer---Verify IPv4 and IPv6 Addressing |
|
|
297 | (4) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
Part 1 Complete the Addressing Table Documentation |
|
|
298 | (1) |
|
Part 2 Test Connectivity Using Ping |
|
|
298 | (1) |
|
Part 3 Discover the Path by Tracing the Route |
|
|
299 | (2) |
|
13.2.7 Packet Tracer---Use Ping and Traceroute to Test Network Connectivity |
|
|
301 | (4) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Part 1 Test and Restore IPv4 Connectivity |
|
|
302 | (1) |
|
Part 2 Test and Restore IPv6 Connectivity |
|
|
303 | (2) |
|
13.3.1 Packet Tracer---Use ICMP to Test and Correct Network Connectivity |
|
|
305 | (2) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
13.3.2 Lab---Use Ping and Traceroute to Test Network Connectivity |
|
|
307 | (12) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
Part 1 Build and Configure the Network |
|
|
309 | (1) |
|
Part 2 Use Ping Command for Basic cork Testing |
|
|
310 | (5) |
|
Part 3 Use Tracert and Traceroute Commands for Basic Network Testing |
|
|
315 | (1) |
|
Part 4 Troubleshoot the Topology |
|
|
316 | (1) |
|
|
317 | (1) |
|
Router Interface Summary Table |
|
|
317 | (2) |
|
Chapter 14 Transport Layer |
|
|
319 | (24) |
|
|
320 | (2) |
|
Transportation Layer Responsibilities |
|
|
320 | (1) |
|
Transmission Control Protocol (TCP) |
|
|
320 | (1) |
|
User Datagram Protocol (UDP) |
|
|
320 | (1) |
|
The Right Transport Layer Protocol for the Right Application |
|
|
320 | (1) |
|
Check Your Understanding: Transportation of Data |
|
|
321 | (1) |
|
|
322 | (3) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
Applications That Use TCP |
|
|
324 | (1) |
|
Check Your Understanding: TCP Overview |
|
|
324 | (1) |
|
|
325 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
Applications That Use UDP |
|
|
325 | (1) |
|
Check Your Understanding: UDP Overview |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (2) |
|
|
327 | (1) |
|
|
328 | (1) |
|
Check Your Understanding: Port Numbers |
|
|
328 | (1) |
|
TCP Communication Process |
|
|
329 | (3) |
|
|
329 | (1) |
|
TCP Connection Establishment |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
Check Your Understanding: TCP Communication Process |
|
|
331 | (1) |
|
Reliability and Flow Control |
|
|
332 | (2) |
|
TCP Reliability---Guaranteed and Ordered Delivery |
|
|
332 | (1) |
|
TCP Reliability---Data Loss and Retransmission |
|
|
332 | (1) |
|
TCP Flow Control---Window Size and Acknowledgments |
|
|
332 | (1) |
|
TCP Flow Control---Maximum Segment Size (MSS) |
|
|
333 | (1) |
|
TCP Flow Control---Congestion Avoidance |
|
|
333 | (1) |
|
Check Your Understanding: Reliability and Flow Control |
|
|
334 | (1) |
|
|
334 | (2) |
|
|
334 | (1) |
|
|
334 | (1) |
|
Check Your Understanding: UDP Communication |
|
|
335 | (1) |
|
|
336 | (1) |
|
14.8.1 Packet Tracer---TCP and UDP Communications |
|
|
336 | (7) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
Part 1 Generate Network Traffic in Simulation Mode and View Multiplexing |
|
|
336 | (2) |
|
Part 2 Examine Functionality of the TCP and UDP Protocols |
|
|
338 | (5) |
|
Chapter 15 Application Layer |
|
|
343 | (16) |
|
Application, Presentation, and Session |
|
|
344 | (1) |
|
|
344 | (2) |
|
Presentation and Session Layer |
|
|
344 | (1) |
|
TCP/IP Application Layer Protocols |
|
|
344 | (1) |
|
Check Your Understanding: Application, Session, Presentation |
|
|
345 | (1) |
|
|
346 | (1) |
|
Check Your Understanding: Peer-to-Peer |
|
|
346 | (1) |
|
|
347 | (2) |
|
Hypertext Transfer Protocol and Hypertext Markup Language |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
Check Your Understanding: Web and Email Protocols |
|
|
348 | (1) |
|
|
349 | (4) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
Dynamic Host Configuration Protocol |
|
|
351 | (1) |
|
|
351 | (1) |
|
Check Your Understanding: IP Addressing Services |
|
|
352 | (1) |
|
|
353 | (2) |
|
|
353 | (1) |
|
|
353 | (1) |
|
Check Your Understanding: File Sharing Services |
|
|
354 | (1) |
|
|
355 | (1) |
|
15.4.8 Lab---Observe DNS Resolution |
|
|
355 | (4) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
Part 1 Observe the DNS Conversion of a URL to an IP Address |
|
|
355 | (2) |
|
Part 2 Observe DNS Lookup Using the nslookup Command on a Website |
|
|
357 | (1) |
|
Part 3 Observe DNS Lookup Using the nslookup Command on Mail Servers |
|
|
358 | (1) |
|
|
358 | (1) |
|
Chapter 16 Network Security Fundamentals |
|
|
359 | (30) |
|
Security Threats and Vulnerabilities |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (3) |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (1) |
|
Denial of Service Attacks |
|
|
362 | (1) |
|
Check Your Understanding: Network Attacks |
|
|
363 | (1) |
|
Network Attack Mitigation |
|
|
364 | (2) |
|
Matching Exercise: Network Attack Mitigation |
|
|
364 | (1) |
|
Check Your Understanding: Network Attack Mitigation |
|
|
365 | (1) |
|
|
366 | (2) |
|
|
366 | (1) |
|
Additional Password Security |
|
|
366 | (1) |
|
|
366 | (1) |
|
Packet Tracer Exercise 16-1: SSH Configuration and Verification |
|
|
367 | (1) |
|
|
368 | (1) |
|
16.2.6 Lab---Research Network Security Threats |
|
|
368 | (4) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Part 1 Exploring the SANS Website |
|
|
369 | (1) |
|
Part 2 Identify Recent Network Security Threats |
|
|
370 | (1) |
|
Part 3 Detail a Specific Network Security Attack |
|
|
370 | (1) |
|
|
371 | (1) |
|
16.4.6 Packet Tracer---Configure Secure Passwords and SSH |
|
|
372 | (3) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (3) |
|
16.4.7 Lab---Configure Network Devices with SSH |
|
|
375 | (6) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Part 1 Configure Basic Device Settings |
|
|
376 | (1) |
|
Part 2 Configure the Router for SSH Access |
|
|
377 | (1) |
|
Part 3 Configure the Switch for SSH Access |
|
|
377 | (1) |
|
Part 4 SSH from the CLI on the Switch |
|
|
378 | (1) |
|
|
379 | (1) |
|
Router Interface Summary Table |
|
|
379 | (2) |
|
16.5.1 Packet Tracer---Secure Network Devices |
|
|
381 | (2) |
|
|
381 | (1) |
|
|
381 | (1) |
|
|
381 | (2) |
|
16.5.1 Lab---Secure Network Devices |
|
|
383 | (6) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
|
384 | (1) |
|
Part 1 Configure Basic Device Settings |
|
|
384 | (1) |
|
Part 2 Configure Basic Security Measures on the Router |
|
|
385 | (1) |
|
Part 3 Configure Security Measures |
|
|
385 | (1) |
|
Part 4 Configure Basic Security Measures on the Switch |
|
|
386 | (1) |
|
|
387 | (1) |
|
Router Interface Summary Table |
|
|
388 | (1) |
|
Chapter 17 Build a Small Network |
|
|
389 | |
|
Devices in a Small Network |
|
|
390 | (2) |
|
|
390 | (1) |
|
Device Selection for a Small Network |
|
|
390 | (1) |
|
IP Addressing for a Small Network |
|
|
391 | (1) |
|
Matching Exercise: Devices in a Small Network |
|
|
391 | (1) |
|
Check Your Understanding: Devices in a Small Network |
|
|
392 | (1) |
|
Small Network Applications and Protocols |
|
|
392 | (2) |
|
|
392 | (1) |
|
|
393 | (1) |
|
Check Your Understanding: Small Network Applications and Protocols |
|
|
393 | (1) |
|
|
394 | (1) |
|
Check Your Understanding: Scale to Larger Networks |
|
|
394 | (1) |
|
|
395 | (2) |
|
Verify Connectivity with Ping |
|
|
395 | (1) |
|
Verify Connectivity with Traceroute |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
397 | (5) |
|
IP Configuration on a Windows Host |
|
|
397 | (1) |
|
IP Configuration on a Linux Host |
|
|
398 | (1) |
|
IP Configuration on a macOS Host |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
Matching Exercise: show Commands |
|
|
401 | (1) |
|
Troubleshooting Methodologies |
|
|
402 | (1) |
|
Basic Troubleshooting Approaches |
|
|
402 | (1) |
|
Check Your Understanding: Troubleshooting Methodologies |
|
|
402 | (1) |
|
Troubleshooting Scenarios |
|
|
403 | (2) |
|
Packet Tracer Exercise 17-1: Troubleshooting Scenario |
|
|
403 | (2) |
|
|
405 | (1) |
|
17.4.6 Lab---Test Network Latency with Ping and Traceroute |
|
|
406 | (5) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
|
406 | (1) |
|
Part 1 Use Ping to Document Network Latency |
|
|
406 | (2) |
|
Part 2 Use Traceroute to Document Network Latency |
|
|
408 | (1) |
|
Part 3 Extended Traceroute |
|
|
409 | (1) |
|
|
410 | (1) |
|
17.5.9 Packet Tracer---Interpret show Command Output |
|
|
411 | (2) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
411 | (2) |
|
17.7.6 Lab---Troubleshoot Connectivity Issues |
|
|
413 | (5) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
414 | (1) |
|
Troubleshooting Configuration |
|
|
414 | (1) |
|
Part 1 Identify the Problem |
|
|
415 | (1) |
|
Part 2 Implement Network Changes |
|
|
416 | (1) |
|
Part 3 Verify Full Functionality |
|
|
416 | (1) |
|
Part 4 Document Findings and Configuration Changes |
|
|
416 | (1) |
|
|
416 | (1) |
|
Router Interface Summary Table |
|
|
416 | (2) |
|
17.7.7 Packet Tracer---Troubleshoot Connectivity Issues |
|
|
418 | (4) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
418 | (4) |
|
17.8.1 Lab---Design and Build a Small Network |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
|
422 | (1) |
|
17.8.2 Packet Tracer---Skills Integration Challenge |
|
|
423 | (3) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (2) |
|
17.8.3 Packet Tracer---Troubleshooting Challenge |
|
|
426 | |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
427 | (1) |
|
|
427 | |