Atjaunināt sīkdatņu piekrišanu

E-grāmata: Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7)

  • Formāts: 640 pages
  • Sērija : Companion Guide
  • Izdošanas datums: 13-Jul-2020
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9780136729488
  • Formāts - EPUB+DRM
  • Cena: 63,11 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 640 pages
  • Sērija : Companion Guide
  • Izdošanas datums: 13-Jul-2020
  • Izdevniecība: Cisco Press
  • Valoda: eng
  • ISBN-13: 9780136729488

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7) is the official supplemental textbook for the Switching, Routing, and Wireless Essentials course in the Cisco Networking Academy CCNA curriculum. This course describes the architecture, components, and operations of routers and switches in a small network.



The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The books features help you focus on important concepts to succeed in this course:

Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.

Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.



* Glossary: Consult the comprehensive Glossary with more than 300 terms. * Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. * Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. How To: Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities: Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. Videos: Watch the videos embedded within the online course. Packet Tracer Activities: Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. Hands-on Labs: Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide. This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.Related titles: CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 31 Days Before Your CCNA Exam Book: 9780135964088 eBook: 9780135964231 CCNA 200-301 Official Cert Guide, Volume 1 Book: 9780135792735 Premium Edition: 9780135792728 CCNA 200-301 Official Cert Guide, Volume 2 Book: 9781587147135 Premium Edition: 9780135262719
Introduction xxvii
Chapter 1 Basic Device Configuration
1(44)
Objectives
1(1)
Key Terms
1(1)
Introduction (1.0)
2(1)
Configure a Switch with Initial Settings (1.1)
2(9)
Switch Boot Sequence (1.1.1)
2(1)
The boot system Command (1.1.2)
3(1)
Switch LED Indicators (1.1.3)
3(3)
Recovering from a System Crash (1.1.4)
6(2)
Switch Management Access (1.1.5)
8(1)
Switch SVI Configuration Example (1.1.6)
8(3)
Configure Switch Ports (1.2)
11(9)
Duplex Communication (1.2.1)
11(1)
Configure Switch Ports at the Physical Layer (1.2.2)
12(1)
Auto-MDIX (1.2.3)
13(1)
Switch Verification Commands (1.2.4)
14(1)
Verify Switch Port Configuration (1.2.5)
14(1)
Network Access Layer Issues (1.2.6)
15(2)
Interface Input and Output Errors (1.2.7)
17(1)
Troubleshooting Network Access Layer Issues (1.2.8)
18(2)
Secure Remote Access (1.3)
20(5)
Telnet Operation (1.3.1)
20(1)
SSH Operation (1.3.2)
20(2)
Verify the Switch Supports SSH (1.3.3)
22(1)
Configure SSH (1.3.4)
22(2)
Verify SSH Is Operational (1.3.5)
24(1)
Basic Router Configuration (1.4)
25(4)
Configure Basic Router Settings (1.4.1)
26(1)
Dual Stack Topology (1.4.3)
27(1)
Configure Router Interfaces (1.4.4)
27(1)
IPv4 Loopback Interfaces (1.4.6)
28(1)
Verify Directly Connected Networks (1.5)
29(9)
Interface Verification Commands (1.5.1)
30(1)
Verify Interface Status (1.5.2)
30(1)
Verify IPv6 Link Local and Multicast Addresses (1.5.3)
31(1)
Verify Interface Configuration (1.5.4)
32(1)
Verify Routes (1.5.5)
32(2)
Filter Show Command Output (1.5.6)
34(1)
The section Filter
34(1)
The include Filter
34(1)
The exclude Filter
35(1)
The begin Filter
35(1)
Command History Feature (1.5.8)
36(2)
Summary (1.6)
38(2)
Configure a Switch with Initial Settings
38(1)
Configure Switch Ports
38(1)
Secure Remote Access
38(1)
Basic Router Configuration
39(1)
Verify Directly Connected Networks
39(1)
Practice
40(1)
Check Your Understanding Questions
41(4)
Chapter 2 Switching Concepts
45(14)
Objectives
45(1)
Key Terms
45(1)
Introduction (2.0)
46(1)
Frame Forwarding (2.1)
46(5)
Switching in Networking (2.1.1)
46(1)
The Switch MAC Address Table (2.1.2)
47(1)
The Switch Learn and Forward Method (2.1.3)
48(1)
Switching Forwarding Methods (2.1.5)
48(1)
Store-and-Forward Switching (2.1.6)
49(1)
Cut-Through Switching (2.1.7)
49(2)
Collision and Broadcast Domains (2.2)
51(4)
Collision Domains (2.2.1)
51(1)
Broadcast Domains (2.2.2)
52(1)
Alleviate Network Congestion (2.2.3)
53(2)
Summary (2.3)
55(1)
Frame Forwarding
55(1)
Switching Domains
55(1)
Check Your Understanding Questions
56(3)
Chapter 3 VLANs
59(38)
Objectives
59(1)
Key Terms
59(1)
Introduction (3.0)
60(1)
Overview of VLANs (3.1)
60(6)
VLAN Definitions (3.1.1)
60(1)
Benefits of a VLAN Design (3.1.2)
61(2)
Types of VLANs (3.1.3)
63(1)
Default VLAN
63(1)
Data VLAN
64(1)
Native VLAN
64(1)
Management VLAN
64(1)
Voice VLAN
65(1)
VLANs in a Multi-Switched Environment (3.2)
66(7)
Defining VLAN Trunks (3.2.1)
66(1)
Network Without VLANs (3.2.2)
67(1)
Network with VLANs (3.2.3)
68(1)
VLAN Identification with a Tag (3.2.4)
69(1)
VLAN Tag Field Details
69(1)
Native VLANs and 802.1Q Tagging (3.2.5)
70(1)
Tagged Frames on the Native VLAN
70(1)
Untagged Frames on the Native VLAN
70(1)
Wee VLAN Tagging (3.2.6)
71(1)
Voice VLAN Verification Example (3.2.7)
72(1)
VLAN Configuration (3.3)
73(10)
VLAN Ranges on Catalyst Switches (3.3.1)
73(1)
Normal Range VLANs
74(1)
Extended Range VLANs
74(1)
VLAN Creation Commands (3.3.2)
75(1)
VLAN Creation Example (3.3.3)
75(1)
VLAN Port Assignment Commands (3.3.4)
76(1)
VLAN Port Assignment Example (3.3.5)
77(1)
Data and Voice VLANs (3.3.6)
78(1)
Data and Voice VLAN Example (3.3.7)
78(1)
Verify VLAN Information (3.3.8)
79(2)
Change VLAN Port Membership (3.3.9)
81(1)
Delete VLANs (3.3.10)
82(1)
VLAN Trunks (3.4)
83(4)
Trunk Configuration Commands (3.4.1)
83(1)
Trunk Configuration Example (3.4.2)
83(2)
Verify Trunk Configuration (3.4.3)
85(1)
Reset the Trunk to the Default State (3.4.4)
86(1)
Dynamic Trunking Protocol (3.5)
87(5)
Introduction to DTP (3.5.1)
88(1)
Negotiated Interface Modes (3.5.2)
89(1)
Results of a DTP Configuration (3.5.3)
89(1)
Verify DTP Mode (3.5.4)
90(2)
Summary (3.6)
92(1)
Overview of VLANs
92(1)
VLANs in a Multi-Switched Environment
92(1)
VLAN Configuration
92(1)
VLAN Trunks
93(1)
Dynamic Trunking Protocol
93(1)
Practice
93(1)
Check Your Understanding Questions
94(3)
Chapter 4 Inter-VLAN Routing
97(40)
Objectives
97(1)
Key Terms
97(1)
Introduction (4.0)
98(1)
Inter-VLAN Routing Operation (4.1)
98(5)
What Is Inter-VLAN Routing? (4.1.1)
98(1)
Legacy Inter-VLAN Routing (4.1.2)
98(2)
Router-on-a-Stick Inter-VLAN Routing (4.1.3)
100(2)
Inter-VLAN Routing on a Layer 3 Switch (4.1.4)
102(1)
Router-on-a-Stick Inter-VLAN Routing (4.2)
103(9)
Router-on-a-Stick Scenario (4.2.1)
103(2)
S1 VLAN and Trunking Configuration (4.2.2)
105(1)
S2 VLAN and Trunking Configuration (4.2.3)
106(1)
R1 Subinterface Configuration (4.2.4)
107(1)
Verify Connectivity Between PCI and PC2 (4.2.5)
108(2)
Router-on-a-Stick Inter-VLAN Routing Verification (4.2.6)
110(2)
Inter-VLAN Routing using Layer 3 Switches (4.3)
112(7)
Layer 3 Switch Inter-VLAN Routing (4.3.1)
112(1)
Layer 3 Switch Scenario (4.3.2)
113(1)
Layer 3 Switch Configuration (4.3.3)
114(1)
Layer 3 Switch Inter-VLAN Routing Verification (4.3.4)
115(1)
Routing on a Layer 3 Switch (4.3.5)
116(1)
Routing Scenario on a Layer 3 Switch (4.3.6)
116(1)
Routing Configuration on a Layer 3 Switch (4.3.7)
117(2)
Troubleshoot Inter-VLAN Routing (4.4)
119(11)
Common Inter-VLAN Issues (4.4.1)
119(1)
Troubleshoot Inter-VLAN Routing Scenario (4.4.2)
120(1)
Missing VLANs (4.4.3)
121(3)
Switch Trunk Port Issues (4.4.4)
124(1)
Switch Access Port Issues (4.4.5)
125(2)
Router Configuration Issues (4.4.6)
127(3)
Summary (4.5)
130(2)
Inter-VLAN Routing Operation
130(1)
Router-on-a-Stick Inter-VLAN Routing
130(1)
Inter-VLAN Routing Using Layer 3 Switches
130(1)
Troubleshoot Inter-VLAN Routing
131(1)
Practice
132(1)
Check Your Understanding Questions
132(5)
Chapter 5 STP Concepts
137(38)
Objectives
137(1)
Key Terms
137(2)
Introduction (5.0)
139(1)
Purpose of STP (5.1)
139(9)
Redundancy in Layer 2 Switched Networks (5.1.1)
139(1)
Spanning Tree Protocol (5.1.2)
140(1)
STP Recalculation (5.1.3)
141(1)
Issues with Redundant Switch Links (5.1.4)
141(1)
Layer 2 Loops (5.1.5)
142(1)
Broadcast Storm (5.1.6)
143(2)
The Spanning Tree Algorithm (5.1.7)
145(3)
STP Operations (5.2)
148(1)
Steps to a Loop-Free Topology (5.2.1)
148(2)
Bridge Priority
149(1)
Extended System ID
149(1)
MAC address
150(1)
1 Elect the Root Bridge (5.2.2)
150(2)
Impact of Default BIDs (5.2.3)
151(1)
Determine the Root Path Cost (5.2.4)
152(1)
2 Elect the Root Ports (5.2.5)
152(1)
3 Elect Designated Ports (5.2.6)
153(3)
4 Elect Alternate (Blocked) Ports (5.2.7)
156(1)
Elect a Root Port from Multiple Equal-Cost Paths (5.2.8)
156(1)
1 Lowest Sender BID
157(1)
2 Lowest Sender Port Priority
157(1)
3 Lowest Sender Port ID
158(3)
STP Timers and Port States (5.2.9)
158(2)
Operational Details of Each Port State (5.2.10)
160(1)
Per-VLAN Spanning Tree (5.2.11)
160(1)
Evolution of STP (5.3)
161(8)
Different Versions of STP (5.3.1)
161(1)
RSTP Concepts (5.3.2)
162(1)
RSTP Port States and Port Roles (5.3.3)
163(1)
STP and RSTP Port States
163(2)
PortFast and BPDU Guard (5.3.4)
165(1)
Alternatives to STP (5.3.5)
166(3)
Summary (5.4)
169(2)
Purpose of STP
169(1)
STP Operations
169(1)
Evolution of STP
170(1)
Practice
171(1)
Check Your Understanding Questions
171(4)
Chapter 6 EtherChannel
175(24)
Objectives
175(1)
Key Terms
175(1)
Introduction (6.0)
176(1)
EtherChannel Operation (6.1)
176(7)
Link Aggregation (6.1.1)
176(1)
EtherChannel (6.1.2)
177(1)
Advantages of EtherChannel (6.1.3)
177(1)
Implementation Restrictions (6.1.4)
178(1)
AutoNegotiation Protocols (6.1.5)
179(1)
PAgP Operation (6.1.6)
180(1)
PAgP Mode Settings Example (6.1.7)
181(1)
LACP Operation (6.1.8)
181(1)
LACP Mode Settings Example (6.1.9)
182(1)
Configure EtherChannel (6.2)
183(3)
Configuration Guidelines (6.2.1)
183(2)
LACP Configuration Example (6.2.2)
185(1)
Verify and Troubleshoot EtherChannel (6.3)
186(7)
Verify EtherChannel (6.3.1)
186(2)
Common Issues with EtherChannel Configurations (6.3.2)
188(1)
Troubleshoot EtherChannel Example (6.3.3)
189(4)
Summary (6.4)
193(2)
EtherChannel Operation
193(1)
Configure EtherChannel
193(1)
Verify and Troubleshoot EtherChannel
194(1)
Practice
195(1)
Check Your Understanding Questions
195(4)
Chapter 7 DHCPv4
199(24)
Objectives
199(1)
Key Terms
199(1)
Introduction (7.0)
200(1)
DHCPv4 Concepts (7.1)
200(4)
DHCPv4 Server and Client (7.1.1)
200(1)
DHCPv4 Operation (7.1.2)
201(1)
Steps to Obtain a Lease (7.1.3)
201(2)
Steps to Renew a Lease (7.1.4)
203(1)
Configure a Cisco IOS DHCPv4 Server (7.2)
204(10)
Cisco IOS DHCPv4 Server (7.2.1)
204(1)
Steps to Configure a Cisco IOS DHCPv4 Server (7.2.2)
205(1)
Configuration Example (7.2.3)
206(1)
DHCPv4 Verification Commands (7.2.4)
207(1)
Verify DHCPv4 is Operational (7.2.5)
207(1)
Verify the DHCPv4 Configuration
207(1)
Verify DHCPv4 Bindings
208(1)
Verify DHCPv4 Statistics
208(1)
Verify DHCPv4 Client Received IPv4 Addressing
209(1)
Disable the Cisco IOS DHCPv4 Server (7.2.7)
210(1)
DHCPv4 Relay (7.2.8)
210(1)
The ipconfig /release Command
211(1)
The ipconfig /renew Command
211(1)
The ip helper-address Command
212(1)
The show ip interface Command
212(1)
The ipconfig /all Command
213(1)
Other Service Broadcasts Relayed (7.2.9)
213(1)
Configure a DHCPv4 Client (7.3)
214(2)
Cisco Router as a DHCPv4 Client (7.3.1)
214(1)
Configuration Example (7.3.2)
214(1)
Home Router as a DHCPv4 Client (7.3.3)
215(1)
Summary (7.4)
216(2)
DHCPv4 Concepts
216(1)
Configure a Cisco IOS DHCPv4 Server
216(1)
Configure a DHCPv4 Client
217(1)
Practice
218(1)
Check Your Understanding Questions
218(5)
Chapter 8 SLAAC and DHCPv6
223(38)
Objectives
223(1)
Key Terms
223(1)
Introduction (8.0)
224(1)
IPv6 GUA Assignment (8.1)
224(4)
IPv6 Host Configuration (8.1.1)
224(1)
IPv6 Host Link-Local Address (8.1.2)
224(2)
IPv6 GUA Assignment (8.1.3)
226(1)
Three RA Message Flags (8.1.4)
226(2)
SLAAC (8.2)
228(6)
SLAAC Overview (8.2.1)
228(1)
Enabling SLAAC (8.2.2)
229(1)
Verify IPv6 Addresses
229(1)
Enable IPv6 Routing
230(1)
Verify SLAAC Is Enabled
230(1)
SLAAC Only Method (8.2.3)
231(1)
ICMPv6 RS Messages (8.2.4)
232(1)
Host Process to Generate Interface ID (8.2.5)
233(1)
Duplicate Address Detection (8.2.6)
234(1)
DHCPv6 (8.3)
234(6)
DHCPv6 Operation Steps (8.3.1)
234(2)
Stateless DHCPv6 Operation (8.3.2)
236(1)
Enable Stateless DHCPv6 on an Interface (8.3.3)
237(1)
Stateful DHCPv6 Operation (8.3.4)
238(1)
Enable Stateful DHCPv6 on an Interface (8.3.5)
239(1)
Configure DHCPv6 Server (8.4)
240(15)
DHCPv6 Router Roles (8.4.1)
240(1)
Configure a Stateless DHCPv6 Server (8.4.2)
240(3)
Configure a Stateless DHCPv6 Client (8.4.3)
243(2)
Configure a Stateful DHCPv6 Server (8.4.4)
245(3)
Configure a Stateful DHCPv6 Client (8.4.5)
248(2)
DHCPv6 Server Verification Commands (8.4.6)
250(2)
Configure a DHCPv6 Relay Agent (8.4.7)
252(1)
Verify the DHCPv6 Relay Agent (8.4.8)
252(3)
Summary
255(2)
IPv6 GUA Assignment
255(1)
SLAAC
255(1)
DHCPv6
256(1)
Configure DHCPv6 Server
256(1)
Practice
257(1)
Check Your Understanding Questions
257(4)
Chapter 9 FHRP Concepts
261(14)
Objectives
261(1)
Key Terms
261(1)
Introduction (9.0)
262(1)
First Hop Redundancy Protocols (9.1)
262(5)
Default Gateway Limitations (9.1.1)
262(2)
Router Redundancy (9.1.2)
264(1)
Steps for Router Failover (9.1.3)
265(1)
FHRP Options (9.1.4)
266(1)
HSRP (9.2)
267(4)
HSRP Overview (9.2.1)
267(1)
HSRP Priority and Preemption (9.2.2)
268(1)
HSRP Priority
268(1)
HSRP Preemption
268(1)
HSRP States and Timers (9.2.3)
269(2)
Summary (9.3)
271(1)
First Hop Redundancy Protocols
271(1)
HSRP
271(1)
Practice
272(1)
Check Your Understanding Questions
272(3)
Chapter 10 LAN Security Concepts
275(38)
Objectives
275(1)
Key Terms
275(2)
Introduction (10.0)
277(1)
Endpoint Security (10.1)
277(4)
Network Attacks Today (10.1.1)
277(1)
Network Security Devices (10.1.2)
278(1)
Endpoint Protection (10.1.3)
278(1)
Cisco Email Security Appliance (10.1.4)
279(1)
Cisco Web Security Appliance (10.1.5)
280(1)
Access Control (10.2)
281(5)
Authentication with a Local Password (10.2.1)
281(2)
AAA Components (10.2.2)
283(1)
Authentication (10.2.3)
283(1)
Local AAA Authentication
284(1)
Server-Based AAA Authentication
284(1)
Authorization (10.2.4)
285(1)
Accounting (10.2.5)
285(1)
802.1X (10.2.6)
286(1)
Layer 2 Security Threats (10.3)
287(3)
Layer 2 Vulnerabilities (10.3.1)
287(1)
Switch Attack Categories (10.3.2)
288(1)
Switch Attack Mitigation Techniques (10.3.3)
289(1)
MAC Address Table Attack (10.4)
290(2)
Switch Operation Review (10.4.1)
290(1)
MAC Address Table Flooding (10.4.2)
290(1)
MAC Address Table Attack Mitigation (10.4.3)
291(1)
LAN Attacks (10.5)
292(15)
VLAN Hopping Attacks (10.5.2)
293(1)
VLAN Double-Tagging Attack (10.5.3)
293(2)
VLAN Attack Mitigation
295(1)
DHCP Messages (10.5.4)
296(1)
DHCP Attacks (10.5.5)
296(1)
DHCP Starvation Attack
296(1)
DHCP Spoofing Attack
297(3)
ARP Attacks (10.5.7)
300(3)
Address Spoofing Attack (10.5.8)
303(1)
STP Attack (10.5.9)
303(2)
CDP Reconnaissance (10.5.10)
305(2)
Summary (10.6)
307(1)
Practice
308(1)
Check Your Understanding Questions
309(4)
Chapter 11 Switch Security Configuration
313(34)
Objectives
313(1)
Key Terms
313(1)
Introduction (11.0)
314(1)
Implement Port Security (11.1)
314(1)
Secure Unused Ports (11.1.1)
314(1)
Mitigate MAC Address Table Attacks (11.1.2)
315(1)
Enable Port Security-(11.1.3)
316(1)
Limit and Learn MAC Addresses (11.1.4)
317(2)
Port Security Aging (11.1.5)
319(2)
Port Security Violation Modes (11.1.6)
321(1)
Ports in error-disabled State (11.1.7)
322(2)
Verify Port Security (11.1.8)
324(1)
Porf Security for All Interfaces
325(1)
Port Security for a Specific Interface
325(1)
Verify Learned MAC Addresses
326(1)
Verify Secure MAC Addresses
326(1)
Mitigate VLAN Attacks (11.2)
327(2)
VLAN Attacks Review (11.2.1)
327(1)
Steps to Mitigate VLAN Hopping Attacks (11.2.2)
327(2)
Mitigate DHCP Attacks (11.3)
329(3)
DHCP Attack Review (11.3.1)
329(1)
DHCP Snooping (11.3.2)
329(1)
Steps to Implement DHCP Snooping (11.3.3)
330(1)
DHCP Snooping Configuration Example (11.3.4)
331(1)
Mitigate ARP Attacks (11.4)
332(3)
Dynamic ARP Inspection (11.4.1)
333(1)
DAI Implementation Guidelines (11.4.2)
333(1)
DAI Configuration Example (11.4.3)
333(2)
Mitigate STP Attacks (11.5)
335(5)
PortFast and BPDU Guard (11.5.1)
335(1)
Configure PortFast (11.5.2)
336(2)
Configure BPDU Guard (11.5.3)
338(2)
Summary (11.6)
340(2)
Practice
342(1)
Check Your Understanding Questions
343(4)
Chapter 12 WLAN Concepts
347(50)
Objectives
347(1)
Key Terms
347(2)
Introduction (12.0)
349(1)
Introduction to Wireless (12.1)
349(4)
Benefits of Wireless (12.1.1)
349(1)
Types of Wireless Networks (12.1.2)
349(1)
Wireless Technologies (12.1.3)
350(3)
802.11 Standards (12.1.4)
353(3)
Radio Frequencies (12.1.5)
354(1)
Wireless Standards Organizations (12.1.6)
355(1)
WLAN Components (12.2)
356(6)
Wireless NICs (12.2.2)
356(1)
Wireless Home Router (12.2.3)
357(1)
Wireless Access Points (12.2.4)
358(1)
AP Categories (12.2.5)
358(1)
Autonomous APs
359(1)
Controller-Based APs
359(1)
Wireless Antennas (12.2.6)
360(2)
WLAN Operation (12.3)
362(1)
802.11 Wireless Topology Modes (12.3.2)
362(3)
BSS and ESS (12.3.3)
364(1)
Basic Service Set
364(1)
Extended Service Set
365(1)
802.11 Frame Structure (12.3.4)
365(5)
CSMA/CA (12.3.5)
367(1)
Wireless Client and AP Association (12.3.6)
367(1)
Passive and Active Discover Mode (12.3.7)
368(1)
Passive Mode
368(1)
Active Mode
369(1)
CAPWAP Operation (12.4)
370(3)
Introduction to CAPWAP (12.4.2)
370(1)
SplirMAC Architecture (12.4.3)
371(1)
DTLS Encryption (12.4.4)
372(1)
ElexConnect APs {12.4.5)
372(1)
Channel Management (12.5)
373(6)
Frequency Channel Saturation (12.5.1)
373(2)
Channel Selection (12.5.2)
375(2)
Plan a WLAN Deployment (12.5.3)
377(2)
WLAN Threats (12.6)
379(4)
Wireless Security Overview (12.6.2)
379(1)
DoS Attacks (12.6.3)
380(1)
Rogue Access Points (12.6.4)
381(1)
Man-in-the-Middle Attack (12.6.5)
381(2)
Secure WLANs (12.7)
383(2)
SSID Cloaking and MAC Address Filtering (12.7.2)
383(1)
SSID Cloaking
383(1)
MAC Addresses Filtering
384(1)
802.11 Original Authentication Methods (12.7.3)
385(6)
Shared Key Authentication Methods (12.7.4)
385(1)
Authenticating a Home User (12.7.5)
386(1)
Encryption Methods (12.7.6)
387(1)
Authentication in the Enterprise (12.7.7)
388(1)
WPA3 (12.7.8)
389(1)
WPA3-Personal
389(1)
WPA3-Enterprise
390(1)
Open Networks
390(1)
IoT Onboarding
390(1)
Summary (12.8)
391(1)
Practice
392(1)
Check Your Understanding Questions
392(5)
Chapter 13 WLAN Configuration
397(48)
Objectives
397(1)
Key Terms
397(1)
Introduction (13.0)
398(1)
Remote Site WLAN Configuration (13.1)
398(14)
The Wireless Router (13.1.2)
398(1)
Log in to the Wireless Router (13.1.3)
399(2)
Basic Network Setup (13.1.4)
401(3)
Basic Wireless Setup (13.1.5)
404(4)
Configure a Wireless Mesh Network (13.1.6)
408(1)
NAT for IPv4 (13.1.7)
408(2)
Quality of Service (13.1.8)
410(1)
Port Forwarding (13.1.9)
410(2)
Configure a Basic WLAN on the WLC (13.2)
412(9)
WLC Topology (13.2.2)
412(2)
Log in to the WLC (13.2.3)
414(1)
View AP Information (13.2.4)
415(1)
Advanced Settings (13.2.5)
416(1)
Configure a WLAN (13.2.6)
416(5)
Configure a WPA2 Enterprise WLAN on the WLC (13.3)
421(12)
SNMP and RADIUS (13.3.2)
421(1)
Configure SNMP Server Information (13.3.3)
421(2)
Configure RADIUS Server Information (13.3.4)
423(1)
Topology with VLAN
424(1)
Addressing (13.3.6)
424(1)
Configure a New Interface (13.3.7)
425(3)
Configure a DHCP Scope (13.3.9)
428(2)
Configure a WPA2 Enterprise WLAN (13.3.11)
430(3)
Troubleshoot WLAN Issues (13.4)
433(7)
Troubleshooting Approaches (13.4.1)
433(2)
Wireless Client Not Connecting (13.4.2)
435(1)
Troubleshooting When the Network Is Slow (13.4.3)
436(2)
Updating Firmware (13.4.4)
438(2)
Summary (13.5)
440(1)
Practice
441(1)
Check Your Understanding Questions
441(4)
Chapter 14 Routing Concepts
445(50)
Objectives
445(1)
Key Terms
445(2)
Introduction (14.0)
447(1)
Path Determination (14.1)
447(4)
Two-Functions of Router (14.1.1)
447(1)
Router Functions Example (14.1.2)
447(1)
Best Path Equals Longest Match (14.1.3)
448(1)
IPv4 Address Longest Match Example (14.1.4)
449(1)
IPv6 Address Longest Match Example (14.1.5)
449(1)
Build the Routing Table (14.1.6)
450(1)
Directly Connected Networks
450(1)
Remote Networks
450(1)
Default Route
451(1)
Packet Forwarding (14.2)
451(8)
Packet Forwarding Decision Process (14.2.1)
451(1)
Forwards the Packet to a Device on a Directly Connected Network
452(1)
Forwards the Packet to a Next-Hop Router
453(1)
Drops the Packet--N & Match in Routing Table 453 End-to-End Packet Forwarding (14.2.2)
453(1)
PCI Sends Packet to PC2
453(1)
R1 Forwards the Packet to PC2
454(1)
R2 Forwards the Packet to R3
455(1)
R3 Forwards the Packet to PC2
455(1)
Packet Forwarding Mechanisms (14.2.3)
455(1)
Process Switching
456(1)
Fast Switching
456(2)
Cisco Express Forwarding (CEF)
458(1)
Basic Router Configuration Review (14.3)
459(8)
Topology (14.3.1)
459(1)
Configuration Commands (14.3.2)
459(2)
Verification Commands (14.3.3)
461(5)
Filter Command Output (14.3.4)
466(1)
IP Routing Table (14.4)
467(13)
Route Sources (14.4.1)
467(2)
Routing Table Principles (14.4.2)
469(1)
Routing Table Entries (14.4.3)
469(1)
Directly Connected Networks (14.4.4)
470(1)
Static Routes (14.4.5)
471(1)
Static Routes in the IP Routing Table (14.4.6)
472(2)
Dynamic Routing Protocols (14.4.7)
474(1)
Default Route (14.4.9)
475(2)
Structure of an IPv4 Routing Table (14.4.10)
477(1)
Structure of an IPv6 Routing Table (14.4.11)
478(1)
Administrative Distance (14.4.12)
479(1)
Static and Dynamic Routing (14.5)
480(8)
Static or Dynamic? (14.5.1)
480(1)
Static Routes
481(1)
Dynamic Routing Protocols
481(1)
Dynamic Routing Evolution (14.5.2)
482(1)
Dynamic Routing Protocol Concepts (14.5.3)
483(1)
Best Path (14.5.4)
484(1)
Load Balancing (14.5.5)
485(3)
Summary (14.6)
488(3)
Path Determination
488(1)
Packet Forwarding
488(1)
Basic Router Configuration Review
488(1)
IP Routing Table
489(1)
Static and Dynamic Routing
490(1)
Practice
491(1)
Check Your Understanding Questions
491(4)
Chapter 15 IP Static Routing
495(36)
Objectives
495(1)
Key Terms
495(1)
Introduction (15.0)
496(1)
Static Routes (15.1)
496(7)
Types of Static Routes (15.1.1)
496(1)
Next-Hop Options (15.1.2)
497(1)
IPv4 Static Route Command (15.1.3)
497(1)
IPv6 Static Route Command (15.1.4)
498(1)
Dual-Stack Topology (15.1.5)
499(1)
IPv4 Starting Routing Tables (15.1.6)
499(2)
IPv6 Starting Routing Tables (15.1.7)
501(2)
Configure IP Static Routes (15.2)
503(10)
IPv4 Next-Hop Static Route (15.2.1)
503(1)
IPv6 Next-Hop Static Route (15.2.2)
504(1)
IPv4 Directly Connected Static Route (15.2.3)
505(1)
IPv6 Directly Connected Static Route (15.2.4)
506(1)
IPv4 Fully Specified Static Route (15.2.5)
507(2)
IPv6 Fully Specified Static Route (15.2.6)
509(1)
Verify a Static Route (15.2.7)
510(1)
Display Only IPv4 Static Routes
511(1)
Display a Specific IPv4 Network
511(1)
Display the IPv4 Static Route Configuration
511(1)
Display Only IPv6 Static Routes
512(1)
Display a Specific IPv6 Network
512(1)
Display the IPv6 Static Route Configuration
512(1)
Configure IP Default Static Routes (15.3)
513(4)
Default Static Route (15.3.1)
513(1)
IPv4 Default Static RQute
513(1)
IPv6 Default Static Route
514(1)
Configure a Default Static Route (15.3.2)
514(1)
Verify a Default Static Route (15.3.3)
515(2)
Configure Floating Static Routes (15.4)
517(4)
Floating Static Routes (15.4.1)
517(1)
Configure IPv4 and IPv6 Floating Static Routes (15.4.2)
518(2)
Test the Floating Static Route (15.4.3)
520(1)
Configure Static Host Routes (15.5)
521(4)
Host Routes (15.5.1)
521(1)
Automatically Installed Host Routes (15.5.2)
522(1)
Static Host Routes (15.5.3)
523(1)
Configure Static Host Routes (15.5.4)
523(1)
Verify Static Host Routes (15.5.5)
523(1)
Configure IPv6 Static Host Route with Link-Local Next-Hop (15.5.6)
524(1)
Summary (15.6)
525(2)
Static Routes
525(1)
Configure IP Static Routes
525(1)
Configure IP Default Static Routes
525(1)
Configure Floating Static Routes
526(1)
Configure Static Host Routes
526(1)
Practice
527(1)
Check Your Understanding Questions
527(4)
Chapter 16 Troubleshoot Static and Default Routes
531(14)
Objectives
531(1)
Introduction (16.0)
532(1)
Packet Processing with Static Routes (16.1)
532(1)
Static Routes and Packet Forwarding (16.1.1)
532(1)
Troubleshoot IPv4 Static and Default Route Configuration (16.2)
533(7)
Network Changes (16.2.1)
534(1)
Common Troubleshooting Commands (16.2.2)
534(2)
Solve a Connectivity Problem (16.2.3)
536(1)
Ping the Remote LAN
536(1)
Ping the Next-Hop Router
537(1)
Ping R3 LAN from SO/1/0
537(1)
Verify the R2 Routing Table
538(1)
Correct the R2 Static Route Configuration
538(1)
Verify New Static Route Is Installed
538(1)
Ping the Remote LAN Again
539(1)
Summary (16.3)
540(1)
Packet Processing with Static Routes
540(1)
Troubleshoot IPv4 Static and Default Route Configuration
540(1)
Practice
541(1)
Check Your Understanding Questions
542(3)
Appendix A Answers to the "Check Your Understanding" Questions 545(16)
Glossary 561(26)
Index 587
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."