Chapter 0 Course Introduction |
|
1 | (4) |
|
0.0 Welcome to Routing and Switching Essentials |
|
|
1 | (3) |
|
0.0.1 Message to the Student |
|
|
1 | (4) |
|
|
1 | (1) |
|
0.0.1.2 A Global Community |
|
|
1 | (1) |
|
0.0.1.3 More Than Just Information I |
|
|
|
|
2 | (1) |
|
0.0.1.5 Practice Leads to Mastery |
|
|
2 | (1) |
|
|
2 | (1) |
|
0.0.1.7 Engineering Journals |
|
|
2 | (1) |
|
0.0.1.8 Explore the World of Networking |
|
|
2 | (1) |
|
0.0.1.9 Create Your Own Worlds |
|
|
2 | (1) |
|
0.0.1.10 How Packet Tracer Helps Master Concepts |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
Chapter 1 Routing Concepts |
|
5 | (30) |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.0.1.2 Activity - Do We Really Need a Map? |
|
|
5 | (1) |
|
1.1 Router Initial Configuration |
|
|
6 | (14) |
|
|
6 | (4) |
|
1.1.1.1 Characteristics of a Network |
|
|
6 | (1) |
|
|
7 | (1) |
|
1.1.1.3 Routers Are Computers |
|
|
7 | (1) |
|
1.1.1.4 Routers Interconnect Networks |
|
|
8 | (1) |
|
1.1.1.5 Routers Choose Best Paths |
|
|
8 | (1) |
|
1.1.1.6 Packet Forwarding Mechanisms |
|
|
9 | (1) |
|
1.1.1.7 Activity - Identify Router Components |
|
|
10 | (1) |
|
1.1.1.8 Packet Tracer - Using Traceroute to Discover the Network |
|
|
10 | (1) |
|
1.1.1.9 Lab - Mapping the Internet |
|
|
10 | (1) |
|
|
10 | (4) |
|
1.1.2.1 Connect to a Network |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.1.2.3 Document Network Addressing |
|
|
12 | (1) |
|
1.1.2.4 Enable IP on a Host |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
1.1.2.7 Enable IP on a Switch |
|
|
14 | (1) |
|
1.1.2.8 Activity - Document an Addressing Scheme |
|
|
14 | (1) |
|
1.1.2.9 Packet Tracer - Documenting the Network |
|
|
14 | (1) |
|
1.1.3 Router Basic Settings |
|
|
14 | (3) |
|
1.1.3.1 Configure Basic Router Settings |
|
|
14 | (1) |
|
1.1.3.2 Configure an IPv4 Router Interface |
|
|
15 | (1) |
|
1.1.3.3 Configure an IPv6 Router Interface |
|
|
15 | (1) |
|
1.1.3.4 Configure an IPv4 Loopback Interface |
|
|
16 | (1) |
|
1.1.3.5 Packet Tracer - Configuring IPv4 and IPv6 Interfaces |
|
|
17 | (1) |
|
1.1.4 Verify Connectivity of Directly Connected Networks |
|
|
17 | (3) |
|
1.1.4.1 Verify Interface Settings |
|
|
17 | (1) |
|
1.1.4.2 Verify IPv6 Interface Settings |
|
|
18 | (1) |
|
1.1.4.3 Filter Show Command Output |
|
|
19 | (1) |
|
1.1.4.4 Command History Feature |
|
|
19 | (1) |
|
1.1.4.5 Packet Tracer - Configuring and Verifying a Small Network |
|
|
20 | (1) |
|
1.1.4.6 Lab - Configuring Basic Router Settings with IOS CLI |
|
|
20 | (1) |
|
|
20 | (5) |
|
1.2.1 Switching Packets Between Networks |
|
|
20 | (3) |
|
1.2.1.1 Router Switching Function |
|
|
20 | (1) |
|
|
21 | (1) |
|
1.2.1.3 Forward to the Next Hop |
|
|
21 | (1) |
|
|
22 | (1) |
|
1.2.1.5 Reach the Destination |
|
|
23 | (1) |
|
1.2.1.6 Activity - Match Layer 2 and Layer 3 Addressing |
|
|
23 | (1) |
|
|
23 | (2) |
|
1.2.2.1 Routing Decisions |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
1.2.2.4 Administrative Distance |
|
|
25 | (1) |
|
1.2.2.5 Activity - Order the Steps in the Packet Forwarding Process |
|
|
25 | (1) |
|
1.2.2.6 Activity - Match the Administrative Distance to the Route Source |
|
|
25 | (1) |
|
|
25 | (7) |
|
1.3.1 Analyze the Routing Table |
|
|
25 | (2) |
|
1.3.1.1 The Routing Table |
|
|
25 | (1) |
|
1.3.1.2 Routing Table Sources |
|
|
26 | (1) |
|
1.3.1.3 Remote Network Routing Entries |
|
|
27 | (1) |
|
1.3.1.4 Activity - Interpret the Content of a Routing Table Entry |
|
|
27 | (1) |
|
1.3.2 Directly Connected Routes |
|
|
27 | (2) |
|
1.3.2.1 Directly Connected Interfaces |
|
|
27 | (1) |
|
1.3.2.2 Directly Connected Routing Table Entries |
|
|
27 | (1) |
|
1.3.2.3 Directly Connected Examples |
|
|
28 | (1) |
|
1.3.2.4 Directly Connected IPv6 Example |
|
|
28 | (1) |
|
1.3.2.5 Packet Tracer - Investigating Directly Connected Routes |
|
|
29 | (1) |
|
1.3.3 Statically Learned Routes |
|
|
29 | (2) |
|
|
29 | (1) |
|
1.3.3.2 Static Route Examples |
|
|
29 | (1) |
|
1.3.3.3 Static IPv6 Route Examples |
|
|
30 | (1) |
|
1.3.4 Dynamic Routing Protocols |
|
|
31 | (1) |
|
|
31 | (1) |
|
1.3.4.2 IPv4 Routing Protocols |
|
|
31 | (1) |
|
1.3.4.3 IPv4 Dynamic Routing Examples |
|
|
31 | (1) |
|
1.3.4.4 IPv6 Routing Protocols |
|
|
32 | (1) |
|
1.3.4.5 IPv6 Dynamic Routing Examples |
|
|
32 | (1) |
|
|
32 | (2) |
|
1.4.1.1 Activity - We Really Could Use a Map! |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
Chapter 2 Static Routing |
|
35 | (22) |
|
|
35 | (1) |
|
|
35 | (1) |
|
2.0.1.2 Activity - Which Way Should We Go |
|
|
35 | (1) |
|
2.1 Implement Static Routes |
|
|
36 | (3) |
|
|
36 | (1) |
|
2.1.1.1 Reach Remote Networks |
|
|
36 | (1) |
|
2.1.1.2 Why Use Static Routing? |
|
|
36 | (1) |
|
2.1.1.3 When to Use Static Routes |
|
|
37 | (1) |
|
2.1.1.4 Activity - Identify the Advantages and Disadvantages of Static Routing |
|
|
37 | (1) |
|
2.1.2 Types of Static Routes |
|
|
37 | (2) |
|
2.1.2.1 Static Route Applications |
|
|
37 | (1) |
|
2.1.2.2 Standard Static Route |
|
|
38 | (1) |
|
2.1.2.3 Default Static Route |
|
|
38 | (1) |
|
2.1.2.4 Summary Static Route |
|
|
38 | (1) |
|
2.1.2.5 Floating Static Route |
|
|
38 | (1) |
|
2.1.2.6 Activity - Identify the Type of Static Route |
|
|
39 | (1) |
|
2.2 Configure Static and Default Routes |
|
|
39 | (12) |
|
2.2.1 Configure IPv4 Static Routes |
|
|
39 | (4) |
|
|
39 | (1) |
|
|
40 | (1) |
|
2.2.1.3 Configure a Next-Hop Static Route |
|
|
40 | (1) |
|
2.2.1.4 Configure a Directly Connected Static Route |
|
|
41 | (1) |
|
2.2.1.5 Configure a Fully Specified Static Route |
|
|
41 | (1) |
|
2.2.1.6 Verify a Static Route |
|
|
42 | (1) |
|
2.2.2 Configure IPv4 Default Routes |
|
|
43 | (1) |
|
2.2.2.1 Default Static Route |
|
|
43 | (1) |
|
2.2.2.2 Configure a Default Static Route |
|
|
43 | (1) |
|
2.2.2.3 Verify a Default Static Route |
|
|
43 | (1) |
|
2.2.2.4 Packet Tracer - Configuring IPv4 Static and Default Routes |
|
|
44 | (1) |
|
2.2.2.5 Lab - Configuring IPv4 Static and Default Routes |
|
|
44 | (1) |
|
2.2.3 Configure IPv6 Static Routes |
|
|
44 | (3) |
|
2.2.3.1 The ipv6 route Command |
|
|
44 | (1) |
|
|
44 | (1) |
|
2.2.3.3 Configure a Next-Hop Static IPv6 Route |
|
|
45 | (1) |
|
2.2.3.4 Configure a Directly Connected Static IPv6 Route |
|
|
46 | (1) |
|
2.2.3.5 Configure a Fully Specified Static IPv6 Route |
|
|
46 | (1) |
|
2.2.3.6 Verify IPv6 Static Routes |
|
|
47 | (1) |
|
2.2.4 Configure IPv6 Default Routes |
|
|
47 | (1) |
|
2.2.4.1 Default Static IPv6 Route |
|
|
47 | (1) |
|
2.2.4.2 Configure a Default Static IPv6 Route |
|
|
47 | (1) |
|
2.2.4.3 Verify a Default Static Route |
|
|
48 | (1) |
|
2.2.4.4 Packet Tracer - Configuring IPv6 Static and Default Routes |
|
|
48 | (1) |
|
2.2.4.5 Lab - Configuring IPv6 Static and Default Routes |
|
|
48 | (1) |
|
2.2.5 Configure Floating Static Routes |
|
|
48 | (2) |
|
2.2.5.1 Floating Static Routes |
|
|
48 | (1) |
|
2.2.5.2 Configure an IPv4 Floating Static Route |
|
|
49 | (1) |
|
2.2.5.3 Test the IPv4 Floating Static Route |
|
|
49 | (1) |
|
2.2.5.4 Configure an IPv6 Floating Static Route |
|
|
49 | (1) |
|
2.2.5.5 Packet Tracer - Configuring Floating Static Routes |
|
|
50 | (1) |
|
2.2.6 Configure Static Host Routes |
|
|
50 | (1) |
|
2.2.6.1 Automatically Installed Host Routes |
|
|
50 | (1) |
|
2.2.6.2 Configure IPv4 and IPv6 Static Host Routes |
|
|
50 | (1) |
|
2.3 Troubleshoot Static and Default Route |
|
|
51 | (2) |
|
2.3.1 Packet Processing with Static Routes |
|
|
51 | (1) |
|
2.3.1.1 Static Routes and Packet Forwarding |
|
|
51 | (1) |
|
2.3.2 Troubleshoot IPv4 Static and Default Route Configuration |
|
|
51 | (2) |
|
2.3.2.1 Troubleshoot a Missing Route |
|
|
51 | (1) |
|
2.3.2.2 Solve a Connectivity Problem |
|
|
52 | (1) |
|
2.3.2.3 Packet Tracer - Troubleshooting Static Routes |
|
|
53 | (1) |
|
2.3.2.4 Lab - Troubleshooting Static Routes |
|
|
53 | (1) |
|
|
53 | (2) |
|
2.4.1.1 Activity - Make It Static |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (2) |
Chapter 3 Dynamic Routing |
|
57 | (16) |
|
|
57 | (1) |
|
|
57 | (1) |
|
3.0.1.2 How Much Does This Cost |
|
|
57 | (1) |
|
3.1 Dynamic Routing Protocols |
|
|
58 | (3) |
|
3.1.1 Dynamic Routing Protocol Overview |
|
|
58 | (1) |
|
3.1.1.1 Dynamic Routing Protocol Evolution |
|
|
58 | (1) |
|
3.1.1.2 Dynamic Routing Protocol Components |
|
|
59 | (1) |
|
3.1.2 Dynamic versus Static Routing |
|
|
59 | (2) |
|
3.1.2.1 Static Routing Uses |
|
|
59 | (1) |
|
3.1.2.2 Static Routing Advantages and Disadvantages |
|
|
60 | (1) |
|
3.1.2.3 Dynamic Routing Protocols Uses |
|
|
60 | (1) |
|
3.1.2.4 Dynamic Routing Advantages and Disadvantages |
|
|
60 | (1) |
|
3.1.2.5 Activity - Compare Static and Dynamic Routing |
|
|
60 | (1) |
|
|
61 | (3) |
|
3.2.1 Configuring the RIP Protocol |
|
|
61 | (3) |
|
3.2.1.1 Router RIP Configuration Mode |
|
|
61 | (1) |
|
3.2.1.2 Advertise Networks |
|
|
61 | (1) |
|
3.2.1.3 Verify RIP Routing |
|
|
62 | (1) |
|
3.2.1.4 Enable and Verify RIPv2 |
|
|
62 | (1) |
|
3.2.1.5 Disable Auto Summarization |
|
|
63 | (1) |
|
3.2.1.6 Configure Passive Interfaces |
|
|
63 | (1) |
|
3.2.1.7 Propagate a Default Route |
|
|
64 | (1) |
|
3.2.1.8 Packet Tracer - Configuring RIPv2 |
|
|
64 | (1) |
|
3.2.1.9 Lab - Configuring Basic RIPv2 |
|
|
64 | (1) |
|
|
64 | (6) |
|
3.3.1 Parts of an IPv4 Route Entry |
|
|
64 | (2) |
|
3.3.1.1 Routing Table Entries |
|
|
64 | (1) |
|
3.3.1.2 Directly Connected Entries |
|
|
65 | (1) |
|
3.3.1.3 Remote Network Entries |
|
|
66 | (1) |
|
3.3.1.4 Activity - Identify Parts of an IPv4 Routing Table Entry |
|
|
66 | (1) |
|
3.3.2 Dynamically Learned IPv4 Routes |
|
|
66 | (1) |
|
3.3.2.1 Routing Table Terms |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
3.3.2.4 Level 1 Parent Route |
|
|
67 | (1) |
|
3.3.2.5 Level 2 Child Route |
|
|
67 | (1) |
|
3.3.2.6 Activity - Identify Parent and Child IPv4 Routes |
|
|
67 | (1) |
|
3.3.3 The IPv4 Route Lookup Process |
|
|
67 | (2) |
|
3.3.3.1 Route Lookup Process |
|
|
67 | (1) |
|
3.3.3.2 Best Route = Longest Match |
|
|
68 | (1) |
|
3.3.3.3 Activity - Determine the Longest Match Route |
|
|
69 | (1) |
|
3.3.4 Analyze an IPv6 Routing Table |
|
|
69 | (1) |
|
3.3.4.1 IPv6 Routing Table Entries |
|
|
69 | (1) |
|
3.3.4.2 Directly Connected Entries |
|
|
69 | (1) |
|
3.3.4.3 Remote IPv6 Network Entries |
|
|
70 | (1) |
|
3.3.4.4 Activity - Identify Parts of an IPv6 Routing Table Entry |
|
|
70 | (1) |
|
|
70 | (2) |
|
3.4.1.1 IPv6 - Details, Details |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
Chapter 4 Switched Networks |
|
73 | (14) |
|
|
73 | (1) |
|
4.0.1.1 Switched Networks |
|
|
73 | (1) |
|
4.0.1.2 Sent or Received Instructions |
|
|
73 | (1) |
|
|
74 | (4) |
|
|
74 | (3) |
|
4.1.1.1 Growing Complexity of Networks |
|
|
74 | (1) |
|
4.1.1.2 Elements of a Converged Network |
|
|
74 | (1) |
|
4.1.1.3 Cisco Borderless Networks |
|
|
75 | (1) |
|
4.1.1.4 Hierarchy in the Borderless Switched Network |
|
|
75 | (1) |
|
4.1.1.5 Access, Distribution, and Core Layers |
|
|
76 | (1) |
|
4.1.1.6 Activity - Identify Switched Network Terminology |
|
|
77 | (1) |
|
|
77 | (1) |
|
4.1.2.1 Role of Switched Networks |
|
|
77 | (1) |
|
|
77 | (1) |
|
4.1.2.3 Activity - Identify Switch Hardware |
|
|
78 | (1) |
|
4.2 The Switched Environment |
|
|
78 | (5) |
|
|
78 | (3) |
|
4.2.1.1 Switching as a General Concept in Networking and Telecommunications |
|
|
78 | (1) |
|
4.2.1.2 Dynamically Populating a Switch MAC Address Table |
|
|
79 | (1) |
|
4.2.1.3 Switch Forwarding Methods |
|
|
80 | (1) |
|
4.2.1.4 Store-and-Forward Switching |
|
|
80 | (1) |
|
4.2.1.5 Cut-Through Switching |
|
|
81 | (1) |
|
4.2.1.6 Activity - Frame Forwarding Methods |
|
|
81 | (1) |
|
4.2.1.7 Activity - Switch It! |
|
|
81 | (1) |
|
|
81 | (2) |
|
4.2.2.1 Collision Domains |
|
|
81 | (1) |
|
4.2.2.2 Broadcast Domains |
|
|
82 | (1) |
|
4.2.2.3 Alleviating Network Congestion |
|
|
82 | (1) |
|
4.2.2.4 Activity - Circle the Domain |
|
|
83 | (1) |
|
|
83 | (2) |
|
4.3.1.1 It's Network Access Time |
|
|
83 | (1) |
|
4.3.1.2 Basic Switch Configurations |
|
|
83 | (1) |
|
4.3.1.3 Switched Networks |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (2) |
Chapter 5 Switch Configuration |
|
87 | (20) |
|
|
87 | (1) |
|
5.0.1.1 Switch Configuration |
|
|
87 | (1) |
|
5.0.1.2 Activity - Stand By Me |
|
|
87 | (1) |
|
5.1 Basic Switch Configuration |
|
|
88 | (8) |
|
5.1.1 Configure a Switch with Initial Settings |
|
|
88 | (4) |
|
5.1.1.1 Switch Boot Sequence |
|
|
88 | (1) |
|
5.1.1.2 Recovering From a System Crash |
|
|
89 | (1) |
|
5.1.1.3 Switch LED Indicators |
|
|
89 | (1) |
|
5.1.1.4 Preparing for Basic Switch Management |
|
|
90 | (1) |
|
5.1.1.5 Configuring Basic Switch Management Access with IPv4 |
|
|
91 | (1) |
|
5.1.1.6 Lab - Basic Switch Configuration |
|
|
91 | (1) |
|
5.1.2 Configure Switch Ports |
|
|
92 | (4) |
|
5.1.2.1 Duplex Communication |
|
|
92 | (1) |
|
5.1.2.2 Configure Switch Ports at the Physical Layer |
|
|
92 | (1) |
|
|
93 | (1) |
|
5.1.2.4 Verifying Switch Port Configuration |
|
|
93 | (1) |
|
5.1.2.5 Network Access Layer Issues |
|
|
94 | (1) |
|
5.1.2.6 Troubleshooting Network Access Layer Issues |
|
|
95 | (1) |
|
|
96 | (6) |
|
5.2.1 Secure Remote Access |
|
|
96 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
5.2.1.4 Packet Tracer - Configuring SSH |
|
|
98 | (1) |
|
5.2.2 Switch Port Security |
|
|
98 | (4) |
|
5.2.2.1 Secure Unused Ports |
|
|
98 | (1) |
|
5.2.2.2 Port Security: Operation |
|
|
98 | (2) |
|
5.2.2.3 Port Security: Violation Modes |
|
|
100 | (1) |
|
5.2.2.4 Port Security: Configuring |
|
|
100 | (1) |
|
5.2.2.5 Port Security: Verifying |
|
|
100 | (1) |
|
5.2.2.6 Ports in Error Disabled State |
|
|
101 | (1) |
|
5.2.2.7 Packet Tracer - Configuring Switch Port Security |
|
|
101 | (1) |
|
5.2.2.8 Packet Tracer - Troubleshooting Switch Port Security |
|
|
101 | (1) |
|
5.2.2.9 Lab - Configuring Switch Security Features |
|
|
102 | (1) |
|
|
102 | (3) |
|
5.3.1.1 Activity - Switch Trio |
|
|
102 | (1) |
|
5.3.1.2 Packet Tracer - Skills Integration Challenge |
|
|
102 | (1) |
|
5.3.1.3 Switch Configuration |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (2) |
Chapter 6 VLANs |
|
107 | (28) |
|
|
107 | (1) |
|
|
107 | (1) |
|
6.0.1.2 Class Activity - Vacation Station |
|
|
107 | (1) |
|
|
108 | (6) |
|
|
108 | (3) |
|
|
108 | (1) |
|
6.1.1.2 Benefits of VLANs |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
6.1.1.5 Packet Tracer - Who Hears the Broadcast? |
|
|
111 | (1) |
|
6.1.2 VLANs in a Multi-Switched Environment |
|
|
111 | (3) |
|
|
111 | (1) |
|
6.1.2.2 Controlling Broadcast Domains with VLANs |
|
|
111 | (1) |
|
6.1.2.3 Tagging Ethernet Frames for VLAN Identification |
|
|
112 | (1) |
|
6.1.2.4 Native VLANs and 802.1Q Tagging |
|
|
113 | (1) |
|
6.1.2.5 Voice VLAN Tagging |
|
|
113 | (1) |
|
6.1.2.6 Activity - Predict Switch Behavior |
|
|
114 | (1) |
|
6.1.2.7 Packet Tracer - Investigating a VLAN Implementation |
|
|
114 | (1) |
|
|
114 | (9) |
|
|
114 | (4) |
|
6.2.1.1 VLAN Ranges on Catalyst Switches |
|
|
114 | (1) |
|
|
115 | (1) |
|
6.2.1.3 Assigning Ports to VLANs |
|
|
116 | (1) |
|
6.2.1.4 Changing VLAN Port Membership |
|
|
116 | (1) |
|
|
117 | (1) |
|
6.2.1.6 Verifying VLAN Information |
|
|
117 | (1) |
|
6.2.1.7 Packet Tracer - Configuring VLANs |
|
|
117 | (1) |
|
|
118 | (1) |
|
6.2.2.1 Configuring IEEE 802.1Q Trunk Links |
|
|
118 | (1) |
|
6.2.2.2 Resetting the Trunk to Default State |
|
|
118 | (1) |
|
6.2.2.3 Verifying Trunk Configuration |
|
|
119 | (1) |
|
6.2.2.4 Packet Tracer - Configuring Trunks |
|
|
119 | (1) |
|
6.2.2.5 Lab - Configuring VLANs and Trunking |
|
|
119 | (1) |
|
6.2.3 Troubleshoot VLANs and Trunks |
|
|
119 | (4) |
|
6.2.3.1 IP Addressing Issues with VLAN |
|
|
119 | (1) |
|
|
120 | (1) |
|
6.2.3.3 Introduction to Troubleshooting Trunks |
|
|
120 | (1) |
|
6.2.3.4 Common Problems with Trunks |
|
|
121 | (1) |
|
6.2.3.5 Incorrect Port Mode |
|
|
121 | (1) |
|
6.2.3.6 Incorrect VLAN List |
|
|
122 | (1) |
|
6.2.3.7 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 1 |
|
|
122 | (1) |
|
6.2.3.8 Packet Tracer - Troubleshooting a VLAN Implementation - Scenario 2 |
|
|
122 | (1) |
|
6.2.3.9 Lab - Troubleshooting VLAN Configurations |
|
|
123 | (1) |
|
6.3 Inter-VLAN Routing Using Routers |
|
|
123 | (8) |
|
6.3.1 Inter-VLAN Routing Operation |
|
|
123 | (2) |
|
6.3.1.1 What is Inter-VLAN Routing? |
|
|
123 | (1) |
|
6.3.1.2 Legacy Inter-VLAN Routing |
|
|
123 | (1) |
|
6.3.1.3 Router-on-a-Stick Inter-VLAN Routing |
|
|
124 | (1) |
|
6.3.1.4 Activity - Identify the Types of Inter-VLAN Routing |
|
|
125 | (1) |
|
6.3.2 Configure Legacy Inter-VLAN Routing |
|
|
125 | (2) |
|
6.3.2.1 Configure Legacy Inter-VLAN Routing: Preparation |
|
|
125 | (1) |
|
6.3.2.2 Configure Legacy Inter-VLAN Routing: Switch Configuration |
|
|
126 | (1) |
|
6.3.2.3 Configure Legacy Inter-VLAN Routing: Router Interface Configuration |
|
|
127 | (1) |
|
6.3.2.4 Lab - Configuring Per-Interface Inter-VLAN Routing |
|
|
127 | (1) |
|
6.3.3 Configure Router-on-a-Stick Inter-VLAN Routing |
|
|
127 | (4) |
|
6.3.3.1 Configure Router-on-a-Stick: Preparation |
|
|
127 | (1) |
|
6.3.3.2 Configure Router-on-a-Stick: Switch Configuration |
|
|
128 | (1) |
|
6.3.3.3 Configure Router-on-a-Stick: Router Subinterface Configuration |
|
|
129 | (1) |
|
6.3.3.4 Configure Router-on-a-Stick: Verifying Subinterfaces |
|
|
129 | (1) |
|
6.3.3.5 Configure Router-on-a-Stick: Verifying Routing |
|
|
130 | (1) |
|
6.3.3.6 Packet Tracer - Configuring Router-on-a-Stick Inter-VLAN Routing |
|
|
131 | (1) |
|
6.3.3.7 Lab - Configuring 801.2Q Trunk-Based Inter-VLAN Routing |
|
|
131 | (1) |
|
6.3.3.8 Packet Tracer - Inter-VLAN Routing Challenge |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
131 | (1) |
|
6.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
Chapter 7 Access Control Lists |
|
135 | (22) |
|
|
135 | (1) |
|
7.0.1.1 Access Control Lists |
|
|
135 | (1) |
|
7.0.1.2 Permit Me to Assist You |
|
|
135 | (1) |
|
|
136 | (7) |
|
|
136 | (2) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
7.1.1.4 Packet Tracer - ACL Demonstration |
|
|
137 | (1) |
|
7.1.2 Wildcard Masks in ACLs |
|
|
138 | (2) |
|
7.1.2.1 Introducing ACL Wildcard Masking |
|
|
138 | (1) |
|
7.1.2.2 Wildcard Mask Examples |
|
|
138 | (1) |
|
7.1.2.3 Calculating the Wildcard Mask |
|
|
139 | (1) |
|
7.1.2.4 Wildcard Mask Keywords |
|
|
140 | (1) |
|
7.1.2.5 Wildcard Mask Keyword Examples |
|
|
140 | (1) |
|
7.1.2.6 Activity - Determine the Correct Wildcard Mask |
|
|
140 | (1) |
|
7.1.2.7 Activity - Determine the Permit or Deny |
|
|
140 | (1) |
|
7.1.3 Guidelines for ACL Creation |
|
|
140 | (1) |
|
7.1.3.1 General Guidelines for Creating ACLs |
|
|
140 | (1) |
|
7.1.3.2 ACL Best Practices |
|
|
141 | (1) |
|
7.1.3.3 Activity - ACL Operation |
|
|
141 | (1) |
|
7.1.4 Guidelines for ACL Placement |
|
|
141 | (2) |
|
7.1.4.1 Where to Place ACLs |
|
|
141 | (1) |
|
7.1.4.2 Standard ACL Placement |
|
|
142 | (1) |
|
|
143 | (6) |
|
7.2.1 Configure Standard IPv4 ACLs |
|
|
143 | (2) |
|
7.2.1.1 Numbered Standard IPv4 ACL Syntax |
|
|
143 | (1) |
|
7.2.1.2 Applying Standard IPv4 ACLs to Interfaces |
|
|
143 | (1) |
|
7.2.1.3 Numbered Standard IPv4 ACL Examples |
|
|
144 | (1) |
|
7.2.1.4 Named Standard IPv4 ACL Syntax |
|
|
144 | (1) |
|
7.2.1.5 Activity - Configuring Standard IPv4 ACLs |
|
|
145 | (1) |
|
7.2.1.6 Packet Tracer - Configuring Numbered Standard IPv4 ACLs |
|
|
145 | (1) |
|
7.2.1.7 Packet Tracer - Configuring Named Standard IPv4 ACLs |
|
|
145 | (1) |
|
|
145 | (3) |
|
7.2.2.1 Method 1 - Use a Text Editor |
|
|
145 | (1) |
|
7.2.2.2 Method 2 - Use Sequence Numbers |
|
|
146 | (1) |
|
7.2.2.3 Editing Standard Named ACLs |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
7.2.2.6 Lab - Configuring and Modifying Standard IPv4 ACLs |
|
|
148 | (1) |
|
7.2.3 Securing VTY ports with a Standard IPv4 ACL |
|
|
148 | (1) |
|
7.2.3.1 The access-class Command |
|
|
148 | (1) |
|
7.2.3.2 Verifying the VTY Port is Secured |
|
|
149 | (1) |
|
7.2.3.3 Packet Tracer - Configuring an IPv4 ACL on VTY Lines |
|
|
149 | (1) |
|
7.2.3.4 Lab - Configuring and Verifying VTY Restrictions |
|
|
149 | (1) |
|
|
149 | (4) |
|
7.3.1 Processing Packets with ACLs |
|
|
149 | (2) |
|
7.3.1.1 The Implicit Deny Any |
|
|
149 | (1) |
|
7.3.1.2 The Order of ACEs in an ACL |
|
|
150 | (1) |
|
7.3.1.3 Cisco IOS Reorders Standard ACLs |
|
|
150 | (1) |
|
7.3.1.4 Routing Processes and ACLs |
|
|
151 | (1) |
|
7.3.2 Common IPv4 Standard ACL Errors |
|
|
151 | (2) |
|
7.3.2.1 Troubleshooting Standard IPv4 ACLs - Example 1 |
|
|
151 | (1) |
|
7.3.2.2 Troubleshooting Standard IPv4 ACLs - Example 2 |
|
|
152 | (1) |
|
7.3.2.3 Troubleshooting Standard IPv4 ACLs - Example 3 |
|
|
152 | (1) |
|
7.3.2.4 Packet Tracer - Troubleshooting Standard IPv4 ACLs |
|
|
152 | (1) |
|
7.3.2.5 Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
153 | (1) |
|
7.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
153 | (1) |
|
7.4.1.3 Access Control Lists |
|
|
153 | (2) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (2) |
Chapter 8 DHCP |
|
157 | (24) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (10) |
|
|
157 | (4) |
|
8.1.1.1 Introducing DHCPv4 |
|
|
157 | (1) |
|
|
158 | (1) |
|
8.1.1.3 DHCPv4 Message Format |
|
|
159 | (1) |
|
8.1.1.4 DHCPv4 Discover and Offer Messages |
|
|
160 | (1) |
|
8.1.1.5 Activity - Identify the Steps in DHCPv4 Operation |
|
|
161 | (1) |
|
8.1.2 Configuring a Basic DHCPv4 Server |
|
|
161 | (3) |
|
8.1.2.1 Configuring a Basic DHCPv4 Server |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
8.1.2.4 Lab - Configuring Basic DHCPv4 on a Router |
|
|
164 | (1) |
|
8.1.2.5 Lab - Configuring Basic DHCPv4 on a Switch |
|
|
164 | (1) |
|
8.1.3 Configure DHCPv4 Client |
|
|
164 | (1) |
|
8.1.3.1 Configuring a Router as DHCPv4 Client |
|
|
164 | (1) |
|
8.1.3.2 Configuring a Wireless Router as a DHCPv4 Client |
|
|
164 | (1) |
|
8.1.3.3 Packet Tracer - Configuring DHCPv4 Using Cisco IOS |
|
|
165 | (1) |
|
8.1.4 Troubleshoot DHCPv4 |
|
|
165 | (2) |
|
8.1.4.1 Troubleshooting Tasks |
|
|
165 | (1) |
|
8.1.4.2 Verify Router DHCPv4 Configuration |
|
|
166 | (1) |
|
|
167 | (1) |
|
8.1.4.4 Lab - Troubleshooting DHCPv4 |
|
|
167 | (1) |
|
|
167 | (11) |
|
|
167 | (5) |
|
8.2.1.1 Stateless Address Autoconfiguration (SLAAC) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
8.2.1.5 Stateless DHCPv6 Option |
|
|
170 | (1) |
|
8.2.1.6 Stateful DHCPv6 Option |
|
|
170 | (1) |
|
8.2.1.7 DHCPv6 Operations |
|
|
171 | (1) |
|
8.2.1.8 Activity - Identify the Steps in DHCPv6 Operation |
|
|
171 | (1) |
|
|
172 | (1) |
|
8.2.2.1 Configuring a Router as a Stateless DHCPv6 Server |
|
|
172 | (1) |
|
8.2.2.2 Configuring a Router as a Stateless DHCPv6 Client |
|
|
172 | (1) |
|
8.2.2.3 Verifying Stateless DHCPv6 |
|
|
173 | (1) |
|
8.2.3 Stateful DHCPv6 Server |
|
|
173 | (3) |
|
8.2.3.1 Configuring a Router as a Stateful DHCPv6 Server |
|
|
173 | (1) |
|
8.2.3.2 Configuring a Router as a Stateful DHCPv6 Client |
|
|
174 | (1) |
|
8.2.3.3 Verifying Stateful DHCPv6 |
|
|
174 | (1) |
|
8.2.3.4 Configuring a Router as a DHCPv6 Relay Agent |
|
|
175 | (1) |
|
8.2.3.5 Lab - Configuring Stateless and Stateful DHCPv6 |
|
|
175 | (1) |
|
8.2.4 Troubleshoot DHCPv6 |
|
|
176 | (2) |
|
8.2.4.1 Troubleshooting Tasks |
|
|
176 | (1) |
|
8.2.4.2 Verify Router DHCPv6 Configuration |
|
|
177 | (1) |
|
|
177 | (1) |
|
8.2.4.4 Lab - Troubleshooting DHCPv6 |
|
|
177 | (1) |
|
|
178 | (2) |
|
8.3.1.1 Class Activity - IoE and DHCP |
|
|
178 | (1) |
|
8.3.1.2 Packet Tracer - Skills Integration Challenge |
|
|
178 | (1) |
|
|
178 | (2) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
Chapter 9 NAT for IPv4 |
|
181 | (26) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (7) |
|
9.1.1 NAT Characteristics |
|
|
182 | (3) |
|
9.1.1.1 IPv4 Private Address Space |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
9.1.1.4 NAT Terminology (Cont.) |
|
|
184 | (1) |
|
|
184 | (1) |
|
9.1.1.6 Activity - Identify the NAT Terminology |
|
|
185 | (1) |
|
|
185 | (3) |
|
|
185 | (1) |
|
|
186 | (1) |
|
9.1.2.3 Port Address Translation (PAT) |
|
|
186 | (1) |
|
9.1.2.4 Next Available Port |
|
|
187 | (1) |
|
9.1.2.5 Comparing NAT and PAT |
|
|
187 | (1) |
|
9.1.2.6 Packet Tracer - Investigating NAT Operation |
|
|
188 | (1) |
|
|
188 | (1) |
|
9.1.3.1 Advantages of NAT |
|
|
188 | (1) |
|
9.1.3.2 Disadvantages of NAT |
|
|
188 | (1) |
|
|
189 | (12) |
|
9.2.1 Configuring Static NAT |
|
|
189 | (2) |
|
9.2.1.1 Configure Static NAT |
|
|
189 | (1) |
|
9.2.1.2 Analyzing Static NAT |
|
|
190 | (1) |
|
9.2.1.3 Verifying Static NAT |
|
|
190 | (1) |
|
9.2.1.4 Packet Tracer - Configuring Static NAT |
|
|
191 | (1) |
|
9.2.2 Configure Dynamic NAT |
|
|
191 | (3) |
|
9.2.2.1 Dynamic NAT Operation |
|
|
191 | (1) |
|
9.2.2.2 Configuring Dynamic NAT |
|
|
191 | (1) |
|
9.2.2.3 Analyzing Dynamic NAT |
|
|
192 | (1) |
|
9.2.2.4 Verifying Dynamic NAT |
|
|
193 | (1) |
|
9.2.2.5 Packet Tracer - Configuring Dynamic NAT |
|
|
194 | (1) |
|
9.2.2.6 Lab - Configuring Dynamic and Static NAT |
|
|
194 | (1) |
|
|
194 | (3) |
|
9.2.3.1 Configuring PAT Address Pool |
|
|
194 | (1) |
|
9.2.3.2 Configuring PAT: Single Address |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
9.2.3.5 Activity - Identify the Address Information at Each Hop |
|
|
197 | (1) |
|
9.2.3.6 Packet Tracer - Implementing Static and Dynamic NAT |
|
|
197 | (1) |
|
9.2.3.7 Lab - Configuring Port Address Translation (PAT) |
|
|
197 | (1) |
|
9.2.4 Configure Port Forwarding |
|
|
197 | (2) |
|
|
197 | (1) |
|
9.2.4.2 Wireless Router Example |
|
|
198 | (1) |
|
9.2.4.3 Configuring Port Forwarding with IOS |
|
|
198 | (1) |
|
9.2.4.4 Packet Tracer - Configuring Port Forwarding on a Wireless Router |
|
|
199 | (1) |
|
|
199 | (2) |
|
|
199 | (1) |
|
9.2.5.2 IPv6 Unique Local Addresses |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (2) |
|
9.3.1 NAT Troubleshooting Commands |
|
|
201 | (2) |
|
9.3.1.1 The show ip nat Commands |
|
|
201 | (1) |
|
9.3.1.2 The debug ip nat Command |
|
|
202 | (1) |
|
9.3.1.3 NAT Troubleshooting Scenario |
|
|
202 | (1) |
|
9.3.1.4 Packet Tracer - Verifying and Troubleshooting NAT Configurations |
|
|
203 | (1) |
|
9.3.1.5 Lab - Troubleshooting NAT Configurations |
|
|
203 | (1) |
|
|
203 | (2) |
|
|
203 | (1) |
|
9.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (2) |
Chapter 10 Device Discovery, Management, and Maintenance |
|
207 | (26) |
|
|
207 | (1) |
|
10.0.1.1 Device Discovery, Management, and Maintenance |
|
|
207 | (1) |
|
|
207 | (3) |
|
10.1.1 Device Discovery with CDP |
|
|
207 | (2) |
|
|
207 | (1) |
|
10.1.1.2 Configure and Verify CDP |
|
|
208 | (1) |
|
10.1.1.3 Discover Devices Using CDP |
|
|
208 | (1) |
|
10.1.1.4 Packet Tracer - Map a Network Using CDP |
|
|
209 | (1) |
|
10.1.2 Device Discovery with LLDP |
|
|
209 | (1) |
|
|
209 | (1) |
|
10.1.2.2 Configure and Verify LLDP |
|
|
209 | (1) |
|
10.1.2.3 Discover Devices Using LLDP |
|
|
209 | (1) |
|
10.1.2.4 Activity - Compare CDP and LLDP |
|
|
210 | (1) |
|
10.1.2.5 Lab - Configure CDP and LLDP |
|
|
210 | (1) |
|
|
210 | (6) |
|
|
210 | (2) |
|
10.2.1.1 Setting the System Clock |
|
|
210 | (1) |
|
|
211 | (1) |
|
10.2.1.3 Configure and Verify NTP |
|
|
211 | (1) |
|
10.2.1.4 Packet Tracer - Configure and Verify NTP |
|
|
212 | (1) |
|
|
212 | (2) |
|
10.2.2.1 Introduction to Syslog |
|
|
212 | (1) |
|
10.2.2.2 Syslog Operation |
|
|
212 | (1) |
|
10.2.2.3 Syslog Message Format |
|
|
213 | (1) |
|
10.2.2.4 Service Timestamp |
|
|
214 | (1) |
|
10.2.2.5 Activity - Interpret Syslog Output |
|
|
214 | (1) |
|
10.2.3 Syslog Configuration |
|
|
214 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
10.2.3.3 Router and Switch Commands for Syslog Clients |
|
|
215 | (1) |
|
10.2.3.4 Verifying Syslog |
|
|
216 | (1) |
|
10.2.3.5 Packet Tracer - Configuring Syslog and NTP |
|
|
216 | (1) |
|
10.2.3.6 Lab - Configuring Syslog and NTP |
|
|
216 | (1) |
|
|
216 | (14) |
|
10.3.1 Router and Switch File Maintenance |
|
|
216 | (5) |
|
10.3.1.1 Router File Systems |
|
|
216 | (1) |
|
10.3.1.2 Switch File Systems |
|
|
217 | (1) |
|
10.3.1.3 Backing Up and Restoring Using Text Files |
|
|
217 | (1) |
|
10.3.1.4 Backing up and Restoring TFTP |
|
|
218 | (1) |
|
10.3.1.5 Using USB Ports on a Cisco Router |
|
|
219 | (1) |
|
10.3.1.6 Backing Up and Restoring Using a USB |
|
|
219 | (1) |
|
10.3.1.7 Password Recovery |
|
|
219 | (1) |
|
10.3.1.8 Packet Tracer - Backing Up Configuration Files |
|
|
220 | (1) |
|
10.3.1.9 Lab - Managing Router Configuration Files with Tera Term |
|
|
221 | (1) |
|
10.3.1.10 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB |
|
|
221 | (1) |
|
10.3.1.11 Lab - Researching Password Recovery Procedures |
|
|
221 | (1) |
|
|
221 | (2) |
|
10.3.2.1 IOS 15 System Image Packaging |
|
|
221 | (1) |
|
10.3.2.2 IOS Image Filenames |
|
|
222 | (1) |
|
10.3.3 IOS Image Management |
|
|
223 | (2) |
|
10.3.3.1 TFTP Servers as a Backup Location |
|
|
223 | (1) |
|
10.3.3.2 Steps to Backup IOS Image to TFTP Server |
|
|
223 | (1) |
|
10.3.3.3 Steps to Copy an IOS Image to a Device |
|
|
224 | (1) |
|
10.3.3.4 The boot system Command |
|
|
225 | (1) |
|
10.3.3.5 Packet Tracer - Using a TFTP Server to Upgrade a Cisco IOS Image |
|
|
225 | (1) |
|
10.3.3.6 Video Demonstration - Managing Cisco IOS Images |
|
|
225 | (1) |
|
10.3.4 Software Licensing |
|
|
225 | (3) |
|
10.3.4.1 Licensing Overview |
|
|
225 | (1) |
|
10.3.4.2 Licensing Process |
|
|
226 | (1) |
|
10.3.4.3 Step 1. Purchase the Software Package or Feature to Install |
|
|
226 | (1) |
|
10.3.4.4 Step 2. Obtain a License |
|
|
227 | (1) |
|
10.3.4.5 Step 3. Install the License |
|
|
227 | (1) |
|
10.3.5 License Verification and Management |
|
|
228 | (2) |
|
10.3.5.1 License Verification |
|
|
228 | (1) |
|
10.3.5.2 Activate an Evaluation Right-To-Use License |
|
|
228 | (1) |
|
10.3.5.3 Back up the License |
|
|
229 | (1) |
|
10.3.5.4 Uninstall the License |
|
|
230 | (1) |
|
10.3.5.5 Video Demonstration - Working with IOS 15 Image Licenses |
|
|
230 | (1) |
|
|
230 | (2) |
|
10.4.1.1 Packet Tracer - Skills Integration Challenge |
|
|
230 | (1) |
|
10.4.1.2 Device Discovery, Management, and Maintenance |
|
|
230 | (2) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
Index |
|
233 | |