Introduction |
|
xxvii | |
|
Chapter 1 Basic Device Configuration |
|
|
1 | (44) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
Configure a Switch with Initial Settings (1.1) |
|
|
2 | (9) |
|
Switch Boot Sequence (1.1.1) |
|
|
2 | (1) |
|
The boot system Command (1.1.2) |
|
|
3 | (1) |
|
Switch LED Indicators (1.1.3) |
|
|
3 | (3) |
|
Recovering from a System Crash (1.1.4) |
|
|
6 | (2) |
|
Switch Management Access (1.1.5) |
|
|
8 | (1) |
|
Switch SVI Configuration Example (1.1.6) |
|
|
8 | (3) |
|
Configure Switch Ports (1.2) |
|
|
11 | (9) |
|
Duplex Communication (1.2.1) |
|
|
11 | (1) |
|
Configure Switch Ports at the Physical Layer (1.2.2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Switch Verification Commands (1.2.4) |
|
|
14 | (1) |
|
Verify Switch Port Configuration (1.2.5) |
|
|
14 | (1) |
|
Network Access Layer Issues (1.2.6) |
|
|
15 | (2) |
|
Interface Input and Output Errors (1.2.7) |
|
|
17 | (1) |
|
Troubleshooting Network Access Layer Issues (1.2.8) |
|
|
18 | (2) |
|
Secure Remote Access (1.3) |
|
|
20 | (5) |
|
|
20 | (1) |
|
|
20 | (2) |
|
Verify the Switch Supports SSH (1.3.3) |
|
|
22 | (1) |
|
|
22 | (2) |
|
Verify SSH Is Operational (1.3.5) |
|
|
24 | (1) |
|
Basic Router Configuration (1.4) |
|
|
25 | (4) |
|
Configure Basic Router Settings (1.4.1) |
|
|
26 | (1) |
|
Dual Stack Topology (1.4.3) |
|
|
27 | (1) |
|
Configure Router Interfaces (1.4.4) |
|
|
27 | (1) |
|
IPv4 Loopback Interfaces (1.4.6) |
|
|
28 | (1) |
|
Verify Directly Connected Networks (1.5) |
|
|
29 | (9) |
|
Interface Verification Commands (1.5.1) |
|
|
30 | (1) |
|
Verify Interface Status (1.5.2) |
|
|
30 | (1) |
|
Verify IPv6 Link Local and Multicast Addresses (1.5.3) |
|
|
31 | (1) |
|
Verify Interface Configuration (1.5.4) |
|
|
32 | (1) |
|
|
32 | (2) |
|
Filter Show Command Output (1.5.6) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
Command History Feature (1.5.8) |
|
|
36 | (2) |
|
|
38 | (2) |
|
Configure a Switch with Initial Settings |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Basic Router Configuration |
|
|
39 | (1) |
|
Verify Directly Connected Networks |
|
|
39 | (1) |
|
|
40 | (1) |
|
Check Your Understanding Questions |
|
|
41 | (4) |
|
Chapter 2 Switching Concepts |
|
|
45 | (14) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (5) |
|
Switching in Networking (2.1.1) |
|
|
46 | (1) |
|
The Switch MAC Address Table (2.1.2) |
|
|
47 | (1) |
|
The Switch Learn and Forward Method (2.1.3) |
|
|
48 | (1) |
|
Switching Forwarding Methods (2.1.5) |
|
|
48 | (1) |
|
Store-and-Forward Switching (2.1.6) |
|
|
49 | (1) |
|
Cut-Through Switching (2.1.7) |
|
|
49 | (2) |
|
Collision and Broadcast Domains (2.2) |
|
|
51 | (4) |
|
Collision Domains (2.2.1) |
|
|
51 | (1) |
|
Broadcast Domains (2.2.2) |
|
|
52 | (1) |
|
Alleviate Network Congestion (2.2.3) |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
Check Your Understanding Questions |
|
|
56 | (3) |
|
|
59 | (38) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
60 | (6) |
|
|
60 | (1) |
|
Benefits of a VLAN Design (3.1.2) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
VLANs in a Multi-Switched Environment (3.2) |
|
|
66 | (7) |
|
Defining VLAN Trunks (3.2.1) |
|
|
66 | (1) |
|
Network Without VLANs (3.2.2) |
|
|
67 | (1) |
|
Network with VLANs (3.2.3) |
|
|
68 | (1) |
|
VLAN Identification with a Tag (3.2.4) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Native VLANs and 802.1Q Tagging (3.2.5) |
|
|
70 | (1) |
|
Tagged Frames on the Native VLAN |
|
|
70 | (1) |
|
Untagged Frames on the Native VLAN |
|
|
70 | (1) |
|
|
71 | (1) |
|
Voice VLAN Verification Example (3.2.7) |
|
|
72 | (1) |
|
|
73 | (10) |
|
VLAN Ranges on Catalyst Switches (3.3.1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
VLAN Creation Commands (3.3.2) |
|
|
75 | (1) |
|
VLAN Creation Example (3.3.3) |
|
|
75 | (1) |
|
VLAN Port Assignment Commands (3.3.4) |
|
|
76 | (1) |
|
VLAN Port Assignment Example (3.3.5) |
|
|
77 | (1) |
|
Data and Voice VLANs (3.3.6) |
|
|
78 | (1) |
|
Data and Voice VLAN Example (3.3.7) |
|
|
78 | (1) |
|
Verify VLAN Information (3.3.8) |
|
|
79 | (2) |
|
Change VLAN Port Membership (3.3.9) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (4) |
|
Trunk Configuration Commands (3.4.1) |
|
|
83 | (1) |
|
Trunk Configuration Example (3.4.2) |
|
|
83 | (2) |
|
Verify Trunk Configuration (3.4.3) |
|
|
85 | (1) |
|
Reset the Trunk to the Default State (3.4.4) |
|
|
86 | (1) |
|
Dynamic Trunking Protocol (3.5) |
|
|
87 | (5) |
|
Introduction to DTP (3.5.1) |
|
|
88 | (1) |
|
Negotiated Interface Modes (3.5.2) |
|
|
89 | (1) |
|
Results of a DTP Configuration (3.5.3) |
|
|
89 | (1) |
|
|
90 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
VLANs in a Multi-Switched Environment |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
Dynamic Trunking Protocol |
|
|
93 | (1) |
|
|
93 | (1) |
|
Check Your Understanding Questions |
|
|
94 | (3) |
|
Chapter 4 Inter-VLAN Routing |
|
|
97 | (40) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Inter-VLAN Routing Operation (4.1) |
|
|
98 | (5) |
|
What Is Inter-VLAN Routing? (4.1.1) |
|
|
98 | (1) |
|
Legacy Inter-VLAN Routing (4.1.2) |
|
|
98 | (2) |
|
Router-on-a-Stick Inter-VLAN Routing (4.1.3) |
|
|
100 | (2) |
|
Inter-VLAN Routing on a Layer 3 Switch (4.1.4) |
|
|
102 | (1) |
|
Router-on-a-Stick Inter-VLAN Routing (4.2) |
|
|
103 | (9) |
|
Router-on-a-Stick Scenario (4.2.1) |
|
|
103 | (2) |
|
S1 VLAN and Trunking Configuration (4.2.2) |
|
|
105 | (1) |
|
S2 VLAN and Trunking Configuration (4.2.3) |
|
|
106 | (1) |
|
R1 Subinterface Configuration (4.2.4) |
|
|
107 | (1) |
|
Verify Connectivity Between PCI and PC2 (4.2.5) |
|
|
108 | (2) |
|
Router-on-a-Stick Inter-VLAN Routing Verification (4.2.6) |
|
|
110 | (2) |
|
Inter-VLAN Routing using Layer 3 Switches (4.3) |
|
|
112 | (7) |
|
Layer 3 Switch Inter-VLAN Routing (4.3.1) |
|
|
112 | (1) |
|
Layer 3 Switch Scenario (4.3.2) |
|
|
113 | (1) |
|
Layer 3 Switch Configuration (4.3.3) |
|
|
114 | (1) |
|
Layer 3 Switch Inter-VLAN Routing Verification (4.3.4) |
|
|
115 | (1) |
|
Routing on a Layer 3 Switch (4.3.5) |
|
|
116 | (1) |
|
Routing Scenario on a Layer 3 Switch (4.3.6) |
|
|
116 | (1) |
|
Routing Configuration on a Layer 3 Switch (4.3.7) |
|
|
117 | (2) |
|
Troubleshoot Inter-VLAN Routing (4.4) |
|
|
119 | (11) |
|
Common Inter-VLAN Issues (4.4.1) |
|
|
119 | (1) |
|
Troubleshoot Inter-VLAN Routing Scenario (4.4.2) |
|
|
120 | (1) |
|
|
121 | (3) |
|
Switch Trunk Port Issues (4.4.4) |
|
|
124 | (1) |
|
Switch Access Port Issues (4.4.5) |
|
|
125 | (2) |
|
Router Configuration Issues (4.4.6) |
|
|
127 | (3) |
|
|
130 | (2) |
|
Inter-VLAN Routing Operation |
|
|
130 | (1) |
|
Router-on-a-Stick Inter-VLAN Routing |
|
|
130 | (1) |
|
Inter-VLAN Routing Using Layer 3 Switches |
|
|
130 | (1) |
|
Troubleshoot Inter-VLAN Routing |
|
|
131 | (1) |
|
|
132 | (1) |
|
Check Your Understanding Questions |
|
|
132 | (5) |
|
|
137 | (38) |
|
|
137 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
139 | (9) |
|
Redundancy in Layer 2 Switched Networks (5.1.1) |
|
|
139 | (1) |
|
Spanning Tree Protocol (5.1.2) |
|
|
140 | (1) |
|
STP Recalculation (5.1.3) |
|
|
141 | (1) |
|
Issues with Redundant Switch Links (5.1.4) |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
The Spanning Tree Algorithm (5.1.7) |
|
|
145 | (3) |
|
|
148 | (1) |
|
Steps to a Loop-Free Topology (5.2.1) |
|
|
148 | (2) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
1 Elect the Root Bridge (5.2.2) |
|
|
150 | (2) |
|
Impact of Default BIDs (5.2.3) |
|
|
151 | (1) |
|
Determine the Root Path Cost (5.2.4) |
|
|
152 | (1) |
|
2 Elect the Root Ports (5.2.5) |
|
|
152 | (1) |
|
3 Elect Designated Ports (5.2.6) |
|
|
153 | (3) |
|
4 Elect Alternate (Blocked) Ports (5.2.7) |
|
|
156 | (1) |
|
Elect a Root Port from Multiple Equal-Cost Paths (5.2.8) |
|
|
156 | (1) |
|
|
157 | (1) |
|
2 Lowest Sender Port Priority |
|
|
157 | (1) |
|
|
158 | (3) |
|
STP Timers and Port States (5.2.9) |
|
|
158 | (2) |
|
Operational Details of Each Port State (5.2.10) |
|
|
160 | (1) |
|
Per-VLAN Spanning Tree (5.2.11) |
|
|
160 | (1) |
|
|
161 | (8) |
|
Different Versions of STP (5.3.1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
RSTP Port States and Port Roles (5.3.3) |
|
|
163 | (1) |
|
|
163 | (2) |
|
PortFast and BPDU Guard (5.3.4) |
|
|
165 | (1) |
|
Alternatives to STP (5.3.5) |
|
|
166 | (3) |
|
|
169 | (2) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
Check Your Understanding Questions |
|
|
171 | (4) |
|
|
175 | (24) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
EtherChannel Operation (6.1) |
|
|
176 | (7) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Advantages of EtherChannel (6.1.3) |
|
|
177 | (1) |
|
Implementation Restrictions (6.1.4) |
|
|
178 | (1) |
|
AutoNegotiation Protocols (6.1.5) |
|
|
179 | (1) |
|
|
180 | (1) |
|
PAgP Mode Settings Example (6.1.7) |
|
|
181 | (1) |
|
|
181 | (1) |
|
LACP Mode Settings Example (6.1.9) |
|
|
182 | (1) |
|
Configure EtherChannel (6.2) |
|
|
183 | (3) |
|
Configuration Guidelines (6.2.1) |
|
|
183 | (2) |
|
LACP Configuration Example (6.2.2) |
|
|
185 | (1) |
|
Verify and Troubleshoot EtherChannel (6.3) |
|
|
186 | (7) |
|
Verify EtherChannel (6.3.1) |
|
|
186 | (2) |
|
Common Issues with EtherChannel Configurations (6.3.2) |
|
|
188 | (1) |
|
Troubleshoot EtherChannel Example (6.3.3) |
|
|
189 | (4) |
|
|
193 | (2) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Verify and Troubleshoot EtherChannel |
|
|
194 | (1) |
|
|
195 | (1) |
|
Check Your Understanding Questions |
|
|
195 | (4) |
|
|
199 | (24) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (4) |
|
DHCPv4 Server and Client (7.1.1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Steps to Obtain a Lease (7.1.3) |
|
|
201 | (2) |
|
Steps to Renew a Lease (7.1.4) |
|
|
203 | (1) |
|
Configure a Cisco IOS DHCPv4 Server (7.2) |
|
|
204 | (10) |
|
Cisco IOS DHCPv4 Server (7.2.1) |
|
|
204 | (1) |
|
Steps to Configure a Cisco IOS DHCPv4 Server (7.2.2) |
|
|
205 | (1) |
|
Configuration Example (7.2.3) |
|
|
206 | (1) |
|
DHCPv4 Verification Commands (7.2.4) |
|
|
207 | (1) |
|
Verify DHCPv4 is Operational (7.2.5) |
|
|
207 | (1) |
|
Verify the DHCPv4 Configuration |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Verify DHCPv4 Client Received IPv4 Addressing |
|
|
209 | (1) |
|
Disable the Cisco IOS DHCPv4 Server (7.2.7) |
|
|
210 | (1) |
|
|
210 | (1) |
|
The ipconfig /release Command |
|
|
211 | (1) |
|
The ipconfig /renew Command |
|
|
211 | (1) |
|
The ip helper-address Command |
|
|
212 | (1) |
|
The show ip interface Command |
|
|
212 | (1) |
|
The ipconfig /all Command |
|
|
213 | (1) |
|
Other Service Broadcasts Relayed (7.2.9) |
|
|
213 | (1) |
|
Configure a DHCPv4 Client (7.3) |
|
|
214 | (2) |
|
Cisco Router as a DHCPv4 Client (7.3.1) |
|
|
214 | (1) |
|
Configuration Example (7.3.2) |
|
|
214 | (1) |
|
Home Router as a DHCPv4 Client (7.3.3) |
|
|
215 | (1) |
|
|
216 | (2) |
|
|
216 | (1) |
|
Configure a Cisco IOS DHCPv4 Server |
|
|
216 | (1) |
|
Configure a DHCPv4 Client |
|
|
217 | (1) |
|
|
218 | (1) |
|
Check Your Understanding Questions |
|
|
218 | (5) |
|
Chapter 8 SLAAC and DHCPv6 |
|
|
223 | (38) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
IPv6 GUA Assignment (8.1) |
|
|
224 | (4) |
|
IPv6 Host Configuration (8.1.1) |
|
|
224 | (1) |
|
IPv6 Host Link-Local Address (8.1.2) |
|
|
224 | (2) |
|
IPv6 GUA Assignment (8.1.3) |
|
|
226 | (1) |
|
Three RA Message Flags (8.1.4) |
|
|
226 | (2) |
|
|
228 | (6) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
SLAAC Only Method (8.2.3) |
|
|
231 | (1) |
|
ICMPv6 RS Messages (8.2.4) |
|
|
232 | (1) |
|
Host Process to Generate Interface ID (8.2.5) |
|
|
233 | (1) |
|
Duplicate Address Detection (8.2.6) |
|
|
234 | (1) |
|
|
234 | (6) |
|
DHCPv6 Operation Steps (8.3.1) |
|
|
234 | (2) |
|
Stateless DHCPv6 Operation (8.3.2) |
|
|
236 | (1) |
|
Enable Stateless DHCPv6 on an Interface (8.3.3) |
|
|
237 | (1) |
|
Stateful DHCPv6 Operation (8.3.4) |
|
|
238 | (1) |
|
Enable Stateful DHCPv6 on an Interface (8.3.5) |
|
|
239 | (1) |
|
Configure DHCPv6 Server (8.4) |
|
|
240 | (15) |
|
DHCPv6 Router Roles (8.4.1) |
|
|
240 | (1) |
|
Configure a Stateless DHCPv6 Server (8.4.2) |
|
|
240 | (3) |
|
Configure a Stateless DHCPv6 Client (8.4.3) |
|
|
243 | (2) |
|
Configure a Stateful DHCPv6 Server (8.4.4) |
|
|
245 | (3) |
|
Configure a Stateful DHCPv6 Client (8.4.5) |
|
|
248 | (2) |
|
DHCPv6 Server Verification Commands (8.4.6) |
|
|
250 | (2) |
|
Configure a DHCPv6 Relay Agent (8.4.7) |
|
|
252 | (1) |
|
Verify the DHCPv6 Relay Agent (8.4.8) |
|
|
252 | (3) |
|
|
255 | (2) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
Check Your Understanding Questions |
|
|
257 | (4) |
|
|
261 | (14) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
First Hop Redundancy Protocols (9.1) |
|
|
262 | (5) |
|
Default Gateway Limitations (9.1.1) |
|
|
262 | (2) |
|
Router Redundancy (9.1.2) |
|
|
264 | (1) |
|
Steps for Router Failover (9.1.3) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (4) |
|
|
267 | (1) |
|
HSRP Priority and Preemption (9.2.2) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
HSRP States and Timers (9.2.3) |
|
|
269 | (2) |
|
|
271 | (1) |
|
First Hop Redundancy Protocols |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Check Your Understanding Questions |
|
|
272 | (3) |
|
Chapter 10 LAN Security Concepts |
|
|
275 | (38) |
|
|
275 | (1) |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
277 | (4) |
|
Network Attacks Today (10.1.1) |
|
|
277 | (1) |
|
Network Security Devices (10.1.2) |
|
|
278 | (1) |
|
Endpoint Protection (10.1.3) |
|
|
278 | (1) |
|
Cisco Email Security Appliance (10.1.4) |
|
|
279 | (1) |
|
Cisco Web Security Appliance (10.1.5) |
|
|
280 | (1) |
|
|
281 | (5) |
|
Authentication with a Local Password (10.2.1) |
|
|
281 | (2) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Server-Based AAA Authentication |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (1) |
|
|
286 | (1) |
|
Layer 2 Security Threats (10.3) |
|
|
287 | (3) |
|
Layer 2 Vulnerabilities (10.3.1) |
|
|
287 | (1) |
|
Switch Attack Categories (10.3.2) |
|
|
288 | (1) |
|
Switch Attack Mitigation Techniques (10.3.3) |
|
|
289 | (1) |
|
MAC Address Table Attack (10.4) |
|
|
290 | (2) |
|
Switch Operation Review (10.4.1) |
|
|
290 | (1) |
|
MAC Address Table Flooding (10.4.2) |
|
|
290 | (1) |
|
MAC Address Table Attack Mitigation (10.4.3) |
|
|
291 | (1) |
|
|
292 | (15) |
|
VLAN Hopping Attacks (10.5.2) |
|
|
293 | (1) |
|
VLAN Double-Tagging Attack (10.5.3) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
300 | (3) |
|
Address Spoofing Attack (10.5.8) |
|
|
303 | (1) |
|
|
303 | (2) |
|
CDP Reconnaissance (10.5.10) |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
308 | (1) |
|
Check Your Understanding Questions |
|
|
309 | (4) |
|
Chapter 11 Switch Security Configuration |
|
|
313 | (34) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Implement Port Security (11.1) |
|
|
314 | (1) |
|
Secure Unused Ports (11.1.1) |
|
|
314 | (1) |
|
Mitigate MAC Address Table Attacks (11.1.2) |
|
|
315 | (1) |
|
Enable Port Security-(11.1.3) |
|
|
316 | (1) |
|
Limit and Learn MAC Addresses (11.1.4) |
|
|
317 | (2) |
|
Port Security Aging (11.1.5) |
|
|
319 | (2) |
|
Port Security Violation Modes (11.1.6) |
|
|
321 | (1) |
|
Ports in error-disabled State (11.1.7) |
|
|
322 | (2) |
|
Verify Port Security (11.1.8) |
|
|
324 | (1) |
|
Porf Security for All Interfaces |
|
|
325 | (1) |
|
Port Security for a Specific Interface |
|
|
325 | (1) |
|
Verify Learned MAC Addresses |
|
|
326 | (1) |
|
Verify Secure MAC Addresses |
|
|
326 | (1) |
|
Mitigate VLAN Attacks (11.2) |
|
|
327 | (2) |
|
VLAN Attacks Review (11.2.1) |
|
|
327 | (1) |
|
Steps to Mitigate VLAN Hopping Attacks (11.2.2) |
|
|
327 | (2) |
|
Mitigate DHCP Attacks (11.3) |
|
|
329 | (3) |
|
DHCP Attack Review (11.3.1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
Steps to Implement DHCP Snooping (11.3.3) |
|
|
330 | (1) |
|
DHCP Snooping Configuration Example (11.3.4) |
|
|
331 | (1) |
|
Mitigate ARP Attacks (11.4) |
|
|
332 | (3) |
|
Dynamic ARP Inspection (11.4.1) |
|
|
333 | (1) |
|
DAI Implementation Guidelines (11.4.2) |
|
|
333 | (1) |
|
DAI Configuration Example (11.4.3) |
|
|
333 | (2) |
|
Mitigate STP Attacks (11.5) |
|
|
335 | (5) |
|
PortFast and BPDU Guard (11.5.1) |
|
|
335 | (1) |
|
Configure PortFast (11.5.2) |
|
|
336 | (2) |
|
Configure BPDU Guard (11.5.3) |
|
|
338 | (2) |
|
|
340 | (2) |
|
|
342 | (1) |
|
Check Your Understanding Questions |
|
|
343 | (4) |
|
|
347 | (50) |
|
|
347 | (1) |
|
|
347 | (2) |
|
|
349 | (1) |
|
Introduction to Wireless (12.1) |
|
|
349 | (4) |
|
Benefits of Wireless (12.1.1) |
|
|
349 | (1) |
|
Types of Wireless Networks (12.1.2) |
|
|
349 | (1) |
|
Wireless Technologies (12.1.3) |
|
|
350 | (3) |
|
802.11 Standards (12.1.4) |
|
|
353 | (3) |
|
Radio Frequencies (12.1.5) |
|
|
354 | (1) |
|
Wireless Standards Organizations (12.1.6) |
|
|
355 | (1) |
|
|
356 | (6) |
|
|
356 | (1) |
|
Wireless Home Router (12.2.3) |
|
|
357 | (1) |
|
Wireless Access Points (12.2.4) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
Wireless Antennas (12.2.6) |
|
|
360 | (2) |
|
|
362 | (1) |
|
802.11 Wireless Topology Modes (12.3.2) |
|
|
362 | (3) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
802.11 Frame Structure (12.3.4) |
|
|
365 | (5) |
|
|
367 | (1) |
|
Wireless Client and AP Association (12.3.6) |
|
|
367 | (1) |
|
Passive and Active Discover Mode (12.3.7) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (3) |
|
Introduction to CAPWAP (12.4.2) |
|
|
370 | (1) |
|
SplirMAC Architecture (12.4.3) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
Channel Management (12.5) |
|
|
373 | (6) |
|
Frequency Channel Saturation (12.5.1) |
|
|
373 | (2) |
|
Channel Selection (12.5.2) |
|
|
375 | (2) |
|
Plan a WLAN Deployment (12.5.3) |
|
|
377 | (2) |
|
|
379 | (4) |
|
Wireless Security Overview (12.6.2) |
|
|
379 | (1) |
|
|
380 | (1) |
|
Rogue Access Points (12.6.4) |
|
|
381 | (1) |
|
Man-in-the-Middle Attack (12.6.5) |
|
|
381 | (2) |
|
|
383 | (2) |
|
SSID Cloaking and MAC Address Filtering (12.7.2) |
|
|
383 | (1) |
|
|
383 | (1) |
|
|
384 | (1) |
|
802.11 Original Authentication Methods (12.7.3) |
|
|
385 | (6) |
|
Shared Key Authentication Methods (12.7.4) |
|
|
385 | (1) |
|
Authenticating a Home User (12.7.5) |
|
|
386 | (1) |
|
Encryption Methods (12.7.6) |
|
|
387 | (1) |
|
Authentication in the Enterprise (12.7.7) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Check Your Understanding Questions |
|
|
392 | (5) |
|
Chapter 13 WLAN Configuration |
|
|
397 | (48) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
Remote Site WLAN Configuration (13.1) |
|
|
398 | (14) |
|
The Wireless Router (13.1.2) |
|
|
398 | (1) |
|
Log in to the Wireless Router (13.1.3) |
|
|
399 | (2) |
|
Basic Network Setup (13.1.4) |
|
|
401 | (3) |
|
Basic Wireless Setup (13.1.5) |
|
|
404 | (4) |
|
Configure a Wireless Mesh Network (13.1.6) |
|
|
408 | (1) |
|
|
408 | (2) |
|
Quality of Service (13.1.8) |
|
|
410 | (1) |
|
|
410 | (2) |
|
Configure a Basic WLAN on the WLC (13.2) |
|
|
412 | (9) |
|
|
412 | (2) |
|
Log in to the WLC (13.2.3) |
|
|
414 | (1) |
|
View AP Information (13.2.4) |
|
|
415 | (1) |
|
Advanced Settings (13.2.5) |
|
|
416 | (1) |
|
Configure a WLAN (13.2.6) |
|
|
416 | (5) |
|
Configure a WPA2 Enterprise WLAN on the WLC (13.3) |
|
|
421 | (12) |
|
|
421 | (1) |
|
Configure SNMP Server Information (13.3.3) |
|
|
421 | (2) |
|
Configure RADIUS Server Information (13.3.4) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
Configure a New Interface (13.3.7) |
|
|
425 | (3) |
|
Configure a DHCP Scope (13.3.9) |
|
|
428 | (2) |
|
Configure a WPA2 Enterprise WLAN (13.3.11) |
|
|
430 | (3) |
|
Troubleshoot WLAN Issues (13.4) |
|
|
433 | (7) |
|
Troubleshooting Approaches (13.4.1) |
|
|
433 | (2) |
|
Wireless Client Not Connecting (13.4.2) |
|
|
435 | (1) |
|
Troubleshooting When the Network Is Slow (13.4.3) |
|
|
436 | (2) |
|
Updating Firmware (13.4.4) |
|
|
438 | (2) |
|
|
440 | (1) |
|
|
441 | (1) |
|
Check Your Understanding Questions |
|
|
441 | (4) |
|
Chapter 14 Routing Concepts |
|
|
445 | (50) |
|
|
445 | (1) |
|
|
445 | (2) |
|
|
447 | (1) |
|
Path Determination (14.1) |
|
|
447 | (4) |
|
Two-Functions of Router (14.1.1) |
|
|
447 | (1) |
|
Router Functions Example (14.1.2) |
|
|
447 | (1) |
|
Best Path Equals Longest Match (14.1.3) |
|
|
448 | (1) |
|
IPv4 Address Longest Match Example (14.1.4) |
|
|
449 | (1) |
|
IPv6 Address Longest Match Example (14.1.5) |
|
|
449 | (1) |
|
Build the Routing Table (14.1.6) |
|
|
450 | (1) |
|
Directly Connected Networks |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (8) |
|
Packet Forwarding Decision Process (14.2.1) |
|
|
451 | (1) |
|
Forwards the Packet to a Device on a Directly Connected Network |
|
|
452 | (1) |
|
Forwards the Packet to a Next-Hop Router |
|
|
453 | (1) |
|
Drops the Packet--N & Match in Routing Table 453 End-to-End Packet Forwarding (14.2.2) |
|
|
453 | (1) |
|
|
453 | (1) |
|
R1 Forwards the Packet to PC2 |
|
|
454 | (1) |
|
R2 Forwards the Packet to R3 |
|
|
455 | (1) |
|
R3 Forwards the Packet to PC2 |
|
|
455 | (1) |
|
Packet Forwarding Mechanisms (14.2.3) |
|
|
455 | (1) |
|
|
456 | (1) |
|
|
456 | (2) |
|
Cisco Express Forwarding (CEF) |
|
|
458 | (1) |
|
Basic Router Configuration Review (14.3) |
|
|
459 | (8) |
|
|
459 | (1) |
|
Configuration Commands (14.3.2) |
|
|
459 | (2) |
|
Verification Commands (14.3.3) |
|
|
461 | (5) |
|
Filter Command Output (14.3.4) |
|
|
466 | (1) |
|
|
467 | (13) |
|
|
467 | (2) |
|
Routing Table Principles (14.4.2) |
|
|
469 | (1) |
|
Routing Table Entries (14.4.3) |
|
|
469 | (1) |
|
Directly Connected Networks (14.4.4) |
|
|
470 | (1) |
|
|
471 | (1) |
|
Static Routes in the IP Routing Table (14.4.6) |
|
|
472 | (2) |
|
Dynamic Routing Protocols (14.4.7) |
|
|
474 | (1) |
|
|
475 | (2) |
|
Structure of an IPv4 Routing Table (14.4.10) |
|
|
477 | (1) |
|
Structure of an IPv6 Routing Table (14.4.11) |
|
|
478 | (1) |
|
Administrative Distance (14.4.12) |
|
|
479 | (1) |
|
Static and Dynamic Routing (14.5) |
|
|
480 | (8) |
|
Static or Dynamic? (14.5.1) |
|
|
480 | (1) |
|
|
481 | (1) |
|
Dynamic Routing Protocols |
|
|
481 | (1) |
|
Dynamic Routing Evolution (14.5.2) |
|
|
482 | (1) |
|
Dynamic Routing Protocol Concepts (14.5.3) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
485 | (3) |
|
|
488 | (3) |
|
|
488 | (1) |
|
|
488 | (1) |
|
Basic Router Configuration Review |
|
|
488 | (1) |
|
|
489 | (1) |
|
Static and Dynamic Routing |
|
|
490 | (1) |
|
|
491 | (1) |
|
Check Your Understanding Questions |
|
|
491 | (4) |
|
Chapter 15 IP Static Routing |
|
|
495 | (36) |
|
|
495 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (7) |
|
Types of Static Routes (15.1.1) |
|
|
496 | (1) |
|
Next-Hop Options (15.1.2) |
|
|
497 | (1) |
|
IPv4 Static Route Command (15.1.3) |
|
|
497 | (1) |
|
IPv6 Static Route Command (15.1.4) |
|
|
498 | (1) |
|
Dual-Stack Topology (15.1.5) |
|
|
499 | (1) |
|
IPv4 Starting Routing Tables (15.1.6) |
|
|
499 | (2) |
|
IPv6 Starting Routing Tables (15.1.7) |
|
|
501 | (2) |
|
Configure IP Static Routes (15.2) |
|
|
503 | (10) |
|
IPv4 Next-Hop Static Route (15.2.1) |
|
|
503 | (1) |
|
IPv6 Next-Hop Static Route (15.2.2) |
|
|
504 | (1) |
|
IPv4 Directly Connected Static Route (15.2.3) |
|
|
505 | (1) |
|
IPv6 Directly Connected Static Route (15.2.4) |
|
|
506 | (1) |
|
IPv4 Fully Specified Static Route (15.2.5) |
|
|
507 | (2) |
|
IPv6 Fully Specified Static Route (15.2.6) |
|
|
509 | (1) |
|
Verify a Static Route (15.2.7) |
|
|
510 | (1) |
|
Display Only IPv4 Static Routes |
|
|
511 | (1) |
|
Display a Specific IPv4 Network |
|
|
511 | (1) |
|
Display the IPv4 Static Route Configuration |
|
|
511 | (1) |
|
Display Only IPv6 Static Routes |
|
|
512 | (1) |
|
Display a Specific IPv6 Network |
|
|
512 | (1) |
|
Display the IPv6 Static Route Configuration |
|
|
512 | (1) |
|
Configure IP Default Static Routes (15.3) |
|
|
513 | (4) |
|
Default Static Route (15.3.1) |
|
|
513 | (1) |
|
IPv4 Default Static RQute |
|
|
513 | (1) |
|
IPv6 Default Static Route |
|
|
514 | (1) |
|
Configure a Default Static Route (15.3.2) |
|
|
514 | (1) |
|
Verify a Default Static Route (15.3.3) |
|
|
515 | (2) |
|
Configure Floating Static Routes (15.4) |
|
|
517 | (4) |
|
Floating Static Routes (15.4.1) |
|
|
517 | (1) |
|
Configure IPv4 and IPv6 Floating Static Routes (15.4.2) |
|
|
518 | (2) |
|
Test the Floating Static Route (15.4.3) |
|
|
520 | (1) |
|
Configure Static Host Routes (15.5) |
|
|
521 | (4) |
|
|
521 | (1) |
|
Automatically Installed Host Routes (15.5.2) |
|
|
522 | (1) |
|
Static Host Routes (15.5.3) |
|
|
523 | (1) |
|
Configure Static Host Routes (15.5.4) |
|
|
523 | (1) |
|
Verify Static Host Routes (15.5.5) |
|
|
523 | (1) |
|
Configure IPv6 Static Host Route with Link-Local Next-Hop (15.5.6) |
|
|
524 | (1) |
|
|
525 | (2) |
|
|
525 | (1) |
|
Configure IP Static Routes |
|
|
525 | (1) |
|
Configure IP Default Static Routes |
|
|
525 | (1) |
|
Configure Floating Static Routes |
|
|
526 | (1) |
|
Configure Static Host Routes |
|
|
526 | (1) |
|
|
527 | (1) |
|
Check Your Understanding Questions |
|
|
527 | (4) |
|
Chapter 16 Troubleshoot Static and Default Routes |
|
|
531 | (14) |
|
|
531 | (1) |
|
|
532 | (1) |
|
Packet Processing with Static Routes (16.1) |
|
|
532 | (1) |
|
Static Routes and Packet Forwarding (16.1.1) |
|
|
532 | (1) |
|
Troubleshoot IPv4 Static and Default Route Configuration (16.2) |
|
|
533 | (7) |
|
|
534 | (1) |
|
Common Troubleshooting Commands (16.2.2) |
|
|
534 | (2) |
|
Solve a Connectivity Problem (16.2.3) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (1) |
|
|
537 | (1) |
|
Verify the R2 Routing Table |
|
|
538 | (1) |
|
Correct the R2 Static Route Configuration |
|
|
538 | (1) |
|
Verify New Static Route Is Installed |
|
|
538 | (1) |
|
Ping the Remote LAN Again |
|
|
539 | (1) |
|
|
540 | (1) |
|
Packet Processing with Static Routes |
|
|
540 | (1) |
|
Troubleshoot IPv4 Static and Default Route Configuration |
|
|
540 | (1) |
|
|
541 | (1) |
|
Check Your Understanding Questions |
|
|
542 | (3) |
Appendix A Answers to the "Check Your Understanding" Questions |
|
545 | (16) |
Glossary |
|
561 | (26) |
Index |
|
587 | |