Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
portes grátis
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
Johnson, Allan; Cisco Networking Academy
Pearson Education (US)
09/2020
416
Mole
Inglês
9780136634737
15 a 20 dias
862
Descrição não disponível.
Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365
9780136634737 TOC 6/18/2020
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365
9780136634737 TOC 6/18/2020
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
CCNA; CCNA exam prep; Cisco Networking Academy; networking for beginners; networking tutorial; learn networking; study networking; CNA; Scaling Networks; v7; enterprise networking; enterprise security; automation; ENSA
Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365
9780136634737 TOC 6/18/2020
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365
9780136634737 TOC 6/18/2020
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.