Introduction |
|
xxxv | |
Your Study Plan |
|
2 | (9) |
|
A Brief Perspective on Cisco Certification Exams |
|
|
2 | (1) |
|
|
3 | (4) |
|
Step 1: Think in Terms of Parts and Chapters |
|
|
3 | (1) |
|
Step 2: Build Your Study Habits Around the Chapter |
|
|
4 | (1) |
|
Step 3: Use Book Parts for Major Milestones |
|
|
5 | (1) |
|
Step 4: Use Volume 2's Final Review Chapter |
|
|
6 | (1) |
|
Step 5: Set Goals and Track Your Progress |
|
|
6 | (1) |
|
Things to Do Before Starting the First Chapter |
|
|
7 | (2) |
|
Bookmark the Companion Website |
|
|
7 | (1) |
|
Bookmark/Install Pearson Test Prep |
|
|
7 | (1) |
|
Understand This Book's PTP Databases and Modes |
|
|
8 | (1) |
|
Practice Viewing Per-Chapter DIKTA Questions |
|
|
9 | (1) |
|
Practice Viewing Per-Part Review Questions |
|
|
9 | (1) |
|
Join the Cisco Learning Network CCNA Study Group |
|
|
9 | (1) |
|
|
9 | (2) |
Part I Introduction to Networking |
|
11 | (72) |
|
Chapter 1 Introduction to TCP/IP Networking |
|
|
12 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
12 | (2) |
|
|
14 | (1) |
|
Perspectives on Networking |
|
|
14 | (2) |
|
|
16 | (11) |
|
History Leading to TCP/IP |
|
|
16 | (2) |
|
Overview of the TCP/IP Networking Model |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
TCP Error Recovery Basics |
|
|
21 | (1) |
|
Same-Layer and Adjacent-Layer Interactions |
|
|
21 | (1) |
|
|
22 | (3) |
|
Internet Protocol and the Postal Service |
|
|
22 | (1) |
|
Internet Protocol Addressing Basics |
|
|
23 | (1) |
|
|
24 | (1) |
|
TCP/IP Data-Link and Physical Layers |
|
|
25 | (2) |
|
Data Encapsulation Terminology |
|
|
27 | (3) |
|
|
28 | (1) |
|
OSI Networking Model and Terminology |
|
|
28 | (6) |
|
Comparing OSI and TCP/IP Layer Names and Numbers |
|
|
29 | (1) |
|
OSI Data Encapsulation Terminology |
|
|
30 | (1) |
|
|
30 | (2) |
|
Chapter 2 Fundamentals of Ethernet LANs |
|
|
32 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
34 | (5) |
|
|
35 | (1) |
|
|
36 | (1) |
|
The Variety of Ethernet Physical Layer Standards |
|
|
37 | (1) |
|
Consistent Behavior over All Links Using the Ethernet Data-Link Layer |
|
|
38 | (1) |
|
Building Physical Ethernet LANs with UTP |
|
|
39 | (7) |
|
Transmitting Data Using Twisted Pairs |
|
|
39 | (1) |
|
Breaking Down a UTP Ethernet Link |
|
|
40 | (2) |
|
UTP Cabling Pinouts for 10BASE-T and 100BASE-T |
|
|
42 | (3) |
|
Straight-Through Cable Pinout |
|
|
42 | (2) |
|
Choosing the Right Cable Pinouts |
|
|
44 | (1) |
|
UTP Cabling Pinouts for 1000BASE-T |
|
|
45 | (1) |
|
Building Physical Ethernet LANs with Fiber |
|
|
46 | (3) |
|
Fiber Cabling Transmission Concepts |
|
|
46 | (2) |
|
Using Fiber with Ethernet |
|
|
48 | (1) |
|
Sending Data in Ethernet Networks |
|
|
49 | (7) |
|
Ethernet Data-Link Protocols |
|
|
49 | (4) |
|
|
50 | (2) |
|
Identifying Network Layer Protocols with the Ethernet Type Field |
|
|
52 | (1) |
|
|
53 | (1) |
|
Sending Ethernet Frames with Switches and Hubs |
|
|
53 | (7) |
|
Sending in Modern Ethernet LANs Using Full Duplex |
|
|
53 | (1) |
|
Using Half Duplex with LAN Hubs |
|
|
54 | (2) |
|
|
56 | (2) |
|
Chapter 3 Fundamentals of WANs and IP Routing |
|
|
58 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
60 | (8) |
|
|
61 | (4) |
|
Physical Details of Leased Lines |
|
|
61 | (2) |
|
HDLC Data-Link Details of Leased Lines |
|
|
63 | (1) |
|
How Routers Use a WAN Data Link |
|
|
64 | (1) |
|
Ethernet as a WAN Technology |
|
|
65 | (3) |
|
Ethernet WANs That Create a Layer 2 Service |
|
|
66 | (1) |
|
How Routers Route IP Packets Using Ethernet Emulation |
|
|
67 | (1) |
|
|
68 | (7) |
|
Network Layer Routing (Forwarding) Logic |
|
|
68 | (2) |
|
Host Forwarding Logic: Send the Packet to the Default Router |
|
|
69 | (1) |
|
R1 and R2's Logic: Routing Data Across the Network |
|
|
70 | (1) |
|
R3's Logic: Delivering Data to the End Destination |
|
|
70 | (1) |
|
How Network Layer Routing Uses LANs and WANs |
|
|
70 | (2) |
|
How IP Addressing Helps IP Routing |
|
|
72 | (2) |
|
Rules for Groups of IP Addresses (Networks and Subnets) |
|
|
73 | (1) |
|
|
73 | (1) |
|
How IP Routing Protocols Help IP Routing |
|
|
74 | (1) |
|
Other Network Layer Features |
|
|
75 | (4) |
|
Using Names and the Domain Name System |
|
|
76 | (1) |
|
The Address Resolution Protocol |
|
|
77 | (1) |
|
ICMP Echo and the ping Command |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (3) |
Part II Implementing Ethernet LANs |
|
83 | (92) |
|
Chapter 4 Using the Command-Line Interface |
|
|
84 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
84 | (2) |
|
|
86 | (1) |
|
Accessing the Cisco Catalyst Switch CLI |
|
|
86 | (10) |
|
|
86 | (1) |
|
Accessing the Cisco IOS CLI |
|
|
87 | (7) |
|
Cabling the Console Connection |
|
|
88 | (2) |
|
Accessing the CLI with Telnet and SSH |
|
|
90 | (1) |
|
User and Enable (Privileged) Modes |
|
|
91 | (2) |
|
Password Security for CLI Access from the Console |
|
|
93 | (1) |
|
|
94 | (1) |
|
The debug and show Commands |
|
|
95 | (1) |
|
Configuring Cisco IOS Software |
|
|
96 | (6) |
|
Configuration Submodes and Contexts |
|
|
97 | (2) |
|
Storing Switch Configuration Files |
|
|
99 | (2) |
|
Copying and Erasing Configuration Files |
|
|
101 | (1) |
|
|
102 | (4) |
|
Chapter 5 Analyzing Ethernet LAN Switching |
|
|
106 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (8) |
|
Overview of Switching Logic |
|
|
109 | (1) |
|
Forwarding Known Unicast Frames |
|
|
110 | (3) |
|
|
113 | (1) |
|
Flooding Unknown Unicast and Broadcast Frames |
|
|
114 | (1) |
|
Avoiding Loops Using Spanning Tree Protocol |
|
|
114 | (1) |
|
|
115 | (1) |
|
Verifying and Analyzing Ethernet Switching |
|
|
116 | (8) |
|
Demonstrating MAC Learning |
|
|
117 | (1) |
|
|
118 | (2) |
|
Finding Entries in the MAC Address Table |
|
|
120 | (1) |
|
Managing the MAC Address Table (Aging, Clearing) |
|
|
121 | (2) |
|
MAC Address Tables with Multiple Switches |
|
|
123 | (1) |
|
|
124 | (2) |
|
Chapter 6 Configuring Basic Switch Management |
|
|
126 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (11) |
|
Securing User Mode and Privileged Mode with Simple Passwords |
|
|
129 | (4) |
|
Securing User Mode Access with Local Usernames and Passwords |
|
|
133 | (2) |
|
Securing User Mode Access with External Authentication Servers |
|
|
135 | (1) |
|
Securing Remote Access with Secure Shell |
|
|
136 | (3) |
|
Enabling IPv4 for Remote Access |
|
|
139 | (5) |
|
Host and Switch IP Settings |
|
|
140 | (2) |
|
Configuring IPv4 on a Switch |
|
|
142 | (1) |
|
Configuring a Switch to Learn Its IP Address with DHCP |
|
|
143 | (1) |
|
Verifying IPv4 on a Switch |
|
|
143 | (1) |
|
Miscellaneous Settings Useful in the Lab |
|
|
144 | (2) |
|
|
144 | (1) |
|
The logging synchronous, exec-timeout, and no ip domain-lookup Commands |
|
|
145 | (1) |
|
|
146 | (4) |
|
Chapter 7 Configuring and Verifying Switch Interfaces |
|
|
150 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
150 | (2) |
|
|
152 | (1) |
|
Configuring Switch Interfaces |
|
|
152 | (10) |
|
Configuring Speed, Duplex, and Description |
|
|
152 | (2) |
|
Configuring Multiple Interfaces with the interface range Command |
|
|
154 | (1) |
|
Administratively Controlling Interface State with shutdown |
|
|
155 | (2) |
|
Removing Configuration with the no Command |
|
|
157 | (1) |
|
|
158 | (4) |
|
Autonegotiation Under Working Conditions |
|
|
158 | (2) |
|
Autonegotiation Results When Only One Node Uses Autonegotiation |
|
|
160 | (1) |
|
Autonegotiation and LAN Hubs |
|
|
161 | (1) |
|
Analyzing Switch Interface Status and Statistics |
|
|
162 | (6) |
|
Interface Status Codes and Reasons for Nonworking States |
|
|
162 | (1) |
|
Interface Speed and Duplex Issues |
|
|
163 | (3) |
|
Common Layer 1 Problems on Working Interfaces |
|
|
166 | (2) |
|
|
168 | (4) |
|
|
172 | (3) |
Part III Implementing VLANs and STP |
|
175 | (88) |
|
Chapter 8 Implementing Ethernet Virtual LANs |
|
|
176 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (6) |
|
Creating Multiswitch VLANs Using Trunking |
|
|
180 | (3) |
|
|
181 | (1) |
|
The 802.1Q and ISL VLAN Trunking Protocols |
|
|
182 | (1) |
|
Forwarding Data Between VLANs |
|
|
183 | (2) |
|
The Need for Routing Between VLANs |
|
|
183 | (1) |
|
Routing Packets Between VLANs with a Router |
|
|
184 | (1) |
|
VLAN and VLAN Trunking Configuration and Verification |
|
|
185 | (15) |
|
Creating VLANs and Assigning Access VLANs to an Interface |
|
|
185 | (4) |
|
VLAN Configuration Example 1: Full VLAN Configuration |
|
|
186 | (3) |
|
VLAN Configuration Example 2: Shorter VLAN Configuration |
|
|
189 | (1) |
|
|
189 | (2) |
|
VLAN Trunking Configuration |
|
|
191 | (5) |
|
Implementing Interfaces Connected to Phones |
|
|
196 | (4) |
|
Data and Voice VLAN Concepts |
|
|
196 | (2) |
|
Data and Voice VLAN Configuration and Verification |
|
|
198 | (2) |
|
Summary: IP Telephony Ports on Switches |
|
|
200 | (1) |
|
Troubleshooting VLANs and VLAN Trunks |
|
|
200 | (5) |
|
Access VLANs Undefined or Disabled |
|
|
201 | (1) |
|
Mismatched Trunking Operational States |
|
|
202 | (1) |
|
The Supported VLAN List on Trunks |
|
|
203 | (2) |
|
Mismatched Native VLAN on a Trunk |
|
|
205 | (1) |
|
|
205 | (5) |
|
Chapter 9 Spanning Tree Protocol Concepts |
|
|
210 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
212 | (12) |
|
The Need for Spanning Tree |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
216 | (7) |
|
The STP Bridge ID and Hello BPDU |
|
|
218 | (1) |
|
|
218 | (2) |
|
Choosing Each Switch's Root Port |
|
|
220 | (2) |
|
Choosing the Designated Port on Each LAN Segment |
|
|
222 | (1) |
|
Configuring to Influence the STP Topology |
|
|
223 | (1) |
|
Details Specific to STP (and Not RSTP) |
|
|
224 | (4) |
|
STP Activity When the Network Remains Stable |
|
|
224 | (1) |
|
STP Timers That Manage STP Convergence |
|
|
225 | (2) |
|
Changing Interface States with STP |
|
|
227 | (1) |
|
|
228 | (8) |
|
|
229 | (1) |
|
RSTP and the Alternate (Root) Port Role |
|
|
230 | (2) |
|
RSTP States and Processes |
|
|
232 | (1) |
|
RSTP and the Backup (Designated) Port Role |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (6) |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (2) |
|
Chapter 10 RSTP and EtherChannel Configuration |
|
|
238 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
238 | (2) |
|
|
240 | (1) |
|
Understanding RSTP Through Configuration |
|
|
240 | (7) |
|
The Need for Multiple Spanning Trees |
|
|
241 | (1) |
|
|
242 | (1) |
|
The Bridge ID and System ID Extension |
|
|
243 | (2) |
|
How Switches Use the Priority and System ID Extension |
|
|
245 | (1) |
|
RSTP Methods to Support Multiple Spanning Trees |
|
|
246 | (1) |
|
Other RSTP Configuration Options |
|
|
247 | (1) |
|
Configuring Layer 2 EtherChannel |
|
|
247 | (10) |
|
Configuring a Manual Layer 2 EtherChannel |
|
|
248 | (2) |
|
Configuring Dynamic EtherChannels |
|
|
250 | (1) |
|
Physical Interface Configuration and EtherChannels |
|
|
251 | (2) |
|
EtherChannel Load Distribution |
|
|
253 | (13) |
|
Configuration Options for EtherChannel Load Distribution |
|
|
254 | (1) |
|
The Effects of the EtherChannel Load Distribution Algorithm |
|
|
255 | (2) |
|
|
257 | (3) |
|
|
260 | (3) |
Part IV IPv4 Addressing |
|
263 | (84) |
|
Chapter 11 Perspectives on IPv4 Subnetting |
|
|
264 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
264 | (2) |
|
|
266 | (1) |
|
Introduction to Subnetting |
|
|
266 | (2) |
|
Subnetting Defined Through a Simple Example |
|
|
267 | (1) |
|
Operational View Versus Design View of Subnetting |
|
|
267 | (1) |
|
Analyze Subnetting and Addressing Needs |
|
|
268 | (7) |
|
Rules About Which Hosts Are in Which Subnet |
|
|
268 | (2) |
|
Determining the Number of Subnets |
|
|
270 | (1) |
|
Determining the Number of Hosts per Subnet |
|
|
271 | (1) |
|
One Size Subnet Fits All-Or Not |
|
|
272 | (3) |
|
Defining the Size of a Subnet |
|
|
272 | (1) |
|
|
273 | (1) |
|
Multiple Subnet Sizes (Variable-Length Subnet Masks) |
|
|
274 | (1) |
|
One Mask for All Subnets, or More Than One |
|
|
274 | (1) |
|
|
275 | (9) |
|
Choose a Classful Network |
|
|
275 | (4) |
|
|
276 | (1) |
|
Growth Exhausts the Public IP Address Space |
|
|
276 | (2) |
|
|
278 | (1) |
|
Choosing an IP Network During the Design Phase |
|
|
278 | (1) |
|
|
279 | (4) |
|
Classful IP Networks Before Subnetting |
|
|
279 | (1) |
|
Borrowing Host Bits to Create Subnet Bits |
|
|
280 | (1) |
|
Choosing Enough Subnet and Host Bits |
|
|
281 | (1) |
|
Example Design: 172.16.0.0, 200 Subnets, 200 Hosts |
|
|
282 | (1) |
|
|
282 | (1) |
|
Build a List of All Subnets |
|
|
283 | (1) |
|
|
284 | (3) |
|
Assigning Subnets to Different Locations |
|
|
285 | (1) |
|
Choose Static and Dynamic Ranges per Subnet |
|
|
286 | (1) |
|
|
287 | (1) |
|
Chapter 12 Analyzing Classful IPv4 Networks |
|
|
288 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
288 | (1) |
|
|
289 | (1) |
|
Classful Network Concepts |
|
|
289 | (7) |
|
IPv4 Network Classes and Related Facts |
|
|
290 | (3) |
|
The Number and Size of the Class A, B, and C Networks |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
Number of Hosts per Network |
|
|
293 | (1) |
|
Deriving the Network ID and Related Numbers |
|
|
293 | (2) |
|
Unusual Network IDs and Network Broadcast Addresses |
|
|
295 | (1) |
|
Practice with Glassful Networks |
|
|
296 | (2) |
|
Practice Deriving Key Facts Based on an IP Address |
|
|
296 | (1) |
|
Practice Remembering the Details of Address Classes |
|
|
297 | (1) |
|
|
298 | (4) |
|
Chapter 13 Analyzing Subnet Masks |
|
|
302 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
302 | (2) |
|
|
304 | (1) |
|
|
304 | (5) |
|
|
304 | (1) |
|
Converting Between Binary and Prefix Masks |
|
|
305 | (1) |
|
Converting Between Binary and DDN Masks |
|
|
306 | (2) |
|
Converting Between Prefix and DDN Masks |
|
|
308 | (1) |
|
Practice Converting Subnet Masks |
|
|
309 | (1) |
|
Identifying Subnet Design Choices Using Masks |
|
|
309 | (6) |
|
Masks Divide the Subnet's Addresses into Two Parts |
|
|
311 | (1) |
|
Masks and Class Divide Addresses into Three Parts |
|
|
312 | (1) |
|
Classless and Classful Addressing |
|
|
312 | (1) |
|
Calculations Based on the IPv4 Address Format |
|
|
313 | (2) |
|
Practice Analyzing Subnet Masks |
|
|
315 | (1) |
|
|
315 | (5) |
|
Chapter 14 Analyzing Existing Subnets |
|
|
320 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
320 | (2) |
|
|
322 | (1) |
|
|
322 | (4) |
|
An Example with Network 172.16.0.0 and Four Subnets |
|
|
322 | (2) |
|
|
324 | (1) |
|
|
325 | (1) |
|
Range of Usable Addresses |
|
|
325 | (1) |
|
Analyzing Existing Subnets: Binary |
|
|
326 | (5) |
|
Finding the Subnet ID: Binary |
|
|
326 | (1) |
|
Finding the Subnet Broadcast Address: Binary |
|
|
327 | (1) |
|
|
328 | (2) |
|
Shortcut for the Binary Process |
|
|
330 | (1) |
|
Brief Note About Boolean Math |
|
|
331 | (1) |
|
Finding the Range of Addresses |
|
|
331 | (1) |
|
Analyzing Existing Subnets: Decimal |
|
|
331 | (7) |
|
|
332 | (1) |
|
Predictability in the Interesting Octet |
|
|
333 | (1) |
|
Finding the Subnet ID: Difficult Masks |
|
|
334 | (2) |
|
Resident Subnet Example 1 |
|
|
334 | (1) |
|
Resident Subnet Example 2 |
|
|
335 | (1) |
|
Resident Subnet Practice Problems |
|
|
336 | (1) |
|
Finding the Subnet Broadcast Address: Difficult Masks |
|
|
336 | (2) |
|
Subnet Broadcast Example 1 |
|
|
337 | (1) |
|
Subnet Broadcast Example 2 |
|
|
337 | (1) |
|
Subnet Broadcast Address Practice Problems |
|
|
338 | (1) |
|
Practice Analyzing Existing Subnets |
|
|
338 | (1) |
|
A Choice: Memorize or Calculate |
|
|
338 | (1) |
|
|
339 | (5) |
|
|
344 | (3) |
Part V IPv4 Routing |
|
347 | (92) |
|
Chapter 15 Operating Cisco Routers |
|
|
348 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
348 | (2) |
|
|
350 | (1) |
|
|
350 | (5) |
|
Installing Enterprise Routers |
|
|
350 | (4) |
|
Cisco Integrated Services Routers |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
Enabling IPv4 Support on Cisco Router Interfaces |
|
|
355 | (7) |
|
|
355 | (1) |
|
|
356 | (6) |
|
|
358 | (2) |
|
Router Interface IP Addresses |
|
|
360 | (1) |
|
Bandwidth and Clock Rate on Serial Interfaces |
|
|
361 | (1) |
|
|
362 | (1) |
|
|
362 | (4) |
|
Chapter 16 Configuring IPv4 Addresses and Static Routes |
|
|
366 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
367 | (2) |
|
|
369 | (1) |
|
|
369 | (7) |
|
IPv4 Routing Process Reference |
|
|
369 | (2) |
|
|
371 | (5) |
|
Host Forwards the IP Packet to the Default Router (Gateway) |
|
|
372 | (1) |
|
Routing Step 1: Decide Whether to Process the Incoming Frame |
|
|
373 | (1) |
|
Routing Step 2: De-encapsulation of the IP Packet |
|
|
373 | (1) |
|
Routing Step 3: Choosing Where to Forward the Packet |
|
|
374 | (1) |
|
Routing Step 4: Encapsulating the Packet in a New Frame |
|
|
375 | (1) |
|
Routing Step 5: Transmitting the Frame |
|
|
376 | (1) |
|
Configuring IP Addresses and Connected Routes |
|
|
376 | (3) |
|
Connected Routes and the ip address Command |
|
|
376 | (2) |
|
The ARP Table on a Cisco Router |
|
|
378 | (1) |
|
Configuring Static Routes |
|
|
379 | (7) |
|
|
379 | (2) |
|
|
381 | (1) |
|
|
381 | (2) |
|
|
383 | (1) |
|
Troubleshooting Static Routes |
|
|
384 | (2) |
|
Troubleshooting Incorrect Static Routes That Appear in the IP Routing Table |
|
|
385 | (1) |
|
The Static Route Does Not Appear in the IP Routing Table |
|
|
385 | (1) |
|
The Correct Static Route Appears but Works Poorly |
|
|
386 | (1) |
|
IP Forwarding with the Longest Prefix Match |
|
|
386 | (4) |
|
Using show ip route to Find the Best Route |
|
|
386 | (2) |
|
Using show ip route address to Find the Best Route |
|
|
388 | (1) |
|
Interpreting the IP Routing Table |
|
|
388 | (2) |
|
|
390 | (2) |
|
Chapter 17 IP Routing in the LAN |
|
|
392 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
393 | (2) |
|
|
395 | (1) |
|
VLAN Routing with Router 802.1Q Trunks |
|
|
395 | (6) |
|
|
396 | (2) |
|
|
398 | (2) |
|
|
400 | (1) |
|
VLAN Routing with Layer 3 Switch SVIs |
|
|
401 | (5) |
|
Configuring Routing Using Switch SVIs |
|
|
401 | (2) |
|
Verifying Routing with SVIs |
|
|
403 | (1) |
|
Troubleshooting Routing with SVIs |
|
|
404 | (2) |
|
VLAN Routing with Layer 3 Switch Routed Ports |
|
|
406 | (8) |
|
Implementing Routed Interfaces on Switches |
|
|
407 | (3) |
|
Implementing Layer 3 EtherChannels |
|
|
410 | (3) |
|
Troubleshooting Layer 3 EtherChannels |
|
|
413 | (1) |
|
|
414 | (4) |
|
Chapter 18 Troubleshooting IPv4 Routing |
|
|
418 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
418 | (1) |
|
|
419 | (1) |
|
Problem Isolation Using the ping Command |
|
|
419 | (9) |
|
|
419 | (1) |
|
Strategies and Results When Testing with the ping Command |
|
|
420 | (7) |
|
Testing Longer Routes from Near the Source of the Problem |
|
|
421 | (2) |
|
Using Extended Ping to Test the Reverse Route |
|
|
423 | (2) |
|
Testing LAN Neighbors with Standard Ping |
|
|
425 | (1) |
|
Testing LAN Neighbors with Extended Ping |
|
|
426 | (1) |
|
Testing WAN Neighbors with Standard Ping |
|
|
427 | (1) |
|
Using Ping with Names and with IP Addresses |
|
|
427 | (1) |
|
Problem Isolation Using the traceroute Command |
|
|
428 | (4) |
|
|
429 | (3) |
|
How the traceroute Command Works |
|
|
429 | (2) |
|
Standard and Extended traceroute |
|
|
431 | (1) |
|
|
432 | (3) |
|
Common Reasons to Use the IOS Telnet and SSH Client |
|
|
432 | (1) |
|
IOS Telnet and SSH Examples |
|
|
433 | (2) |
|
|
435 | (1) |
|
|
436 | (3) |
Part VI OSPF |
|
439 | (82) |
|
Chapter 19 Understanding OSPF Concepts |
|
|
440 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
440 | (2) |
|
|
442 | (1) |
|
Comparing Dynamic Routing Protocol Features |
|
|
442 | (7) |
|
Routing Protocol Functions |
|
|
443 | (1) |
|
Interior and Exterior Routing Protocols |
|
|
444 | (1) |
|
|
445 | (3) |
|
IGP Routing Protocol Algorithms |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
OSPF Concepts and Operation |
|
|
449 | (10) |
|
|
449 | (2) |
|
Topology Information and LSAs |
|
|
450 | (1) |
|
Applying Dijkstra SPF Math to Find the Best Routes |
|
|
451 | (1) |
|
|
451 | (3) |
|
The Basics of OSPF Neighbors |
|
|
451 | (1) |
|
Meeting Neighbors and Learning Their Router ID |
|
|
452 | (2) |
|
Exchanging the LSDB Between Neighbors |
|
|
454 | (3) |
|
Fully Exchanging LSAs with Neighbors |
|
|
454 | (1) |
|
Maintaining Neighbors and the LSDB |
|
|
455 | (1) |
|
Using Designated Routers on Ethernet Links |
|
|
456 | (1) |
|
Calculating the Best Routes with SPF |
|
|
457 | (2) |
|
|
459 | (6) |
|
|
460 | (1) |
|
How Areas Reduce SPF Calculation Time |
|
|
461 | (1) |
|
(OSPFv2) Link-State Advertisements |
|
|
462 | (8) |
|
Router LSAs Build Most of the Intra-Area Topology |
|
|
463 | (1) |
|
Network LSAs Complete the Intra-Area Topology |
|
|
464 | (1) |
|
|
465 | (3) |
|
Chapter 20 Implementing OSPF |
|
|
468 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
469 | (1) |
|
|
470 | (1) |
|
Implementing Single-Area OSPFv2 |
|
|
470 | (13) |
|
OSPF Single-Area Configuration |
|
|
471 | (2) |
|
Wildcard Matching with the network Command |
|
|
473 | (2) |
|
|
475 | (3) |
|
Verifying OSPF Configuration |
|
|
478 | (2) |
|
Configuring the OSPF Router ID |
|
|
480 | (2) |
|
Implementing Multiarea OSPF |
|
|
482 | (1) |
|
Using OSPFv2 Interface Subcommands |
|
|
483 | (3) |
|
OSPF Interface Configuration Example |
|
|
483 | (3) |
|
Verifying OSPF Interface Configuration |
|
|
485 | (1) |
|
Additional OSPFv2 Features |
|
|
486 | (8) |
|
|
487 | (2) |
|
|
489 | (2) |
|
|
491 | (3) |
|
Setting the Cost Directly |
|
|
491 | (1) |
|
Setting the Cost Based on Interface and Reference Bandwidth |
|
|
492 | (2) |
|
|
494 | (1) |
|
|
494 | (4) |
|
Chapter 21 OSPF Network Types and Neighbors |
|
|
498 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
498 | (2) |
|
|
500 | (1) |
|
|
500 | (8) |
|
The OSPF Broadcast Network Type |
|
|
501 | (5) |
|
Verifying Operations with Network Type Broadcast |
|
|
502 | (2) |
|
Configuring to Influence the DR/BDR Election |
|
|
504 | (2) |
|
The OSPF Point-to-Point Network Type |
|
|
506 | (2) |
|
OSPF Neighbor Relationships |
|
|
508 | (8) |
|
OSPF Neighbor Requirements |
|
|
508 | (2) |
|
Issues That Prevent Neighbor Adjacencies |
|
|
510 | (5) |
|
|
511 | (1) |
|
Finding Duplicate OSPF Router IDs |
|
|
511 | (1) |
|
Finding OSPF Hello and Dead Timer Mismatches |
|
|
512 | (1) |
|
Shutting Down the OSPF Process |
|
|
513 | (2) |
|
Issues That Allow Adjacencies but Prevent IP Routes |
|
|
515 | (9) |
|
|
515 | (1) |
|
Mismatched OSPF Network Types |
|
|
515 | (1) |
|
|
516 | (2) |
|
|
518 | (3) |
Part VII IP Version 6 |
|
521 | (88) |
|
Chapter 22 Fundamentals of IP Version 6 |
|
|
522 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
522 | (2) |
|
|
524 | (1) |
|
|
524 | (6) |
|
The Historical Reasons for IPv6 |
|
|
524 | (2) |
|
|
526 | (1) |
|
|
527 | (2) |
|
|
529 | (1) |
|
IPv6 Addressing Formats and Conventions |
|
|
530 | (6) |
|
Representing Full (Unabbreviated) IPv6 Addresses |
|
|
530 | (1) |
|
Abbreviating and Expanding IPv6 Addresses |
|
|
531 | (2) |
|
Abbreviating IPv6 Addresses |
|
|
531 | (1) |
|
Expanding Abbreviated IPv6 Addresses |
|
|
532 | (1) |
|
Representing the Prefix Length of an Address |
|
|
533 | (1) |
|
Calculating the IPv6 Prefix (Subnet ID) |
|
|
533 | (1) |
|
|
533 | (2) |
|
Working with More-Difficult IPv6 Prefix Lengths |
|
|
535 | (1) |
|
|
536 | (4) |
|
Chapter 23 IPv6 Addressing and Subnetting |
|
|
540 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
540 | (2) |
|
|
542 | (1) |
|
Global Unicast Addressing Concepts |
|
|
542 | (9) |
|
Public and Private IPv6 Addresses |
|
|
542 | (1) |
|
The IPv6 Global Routing Prefix |
|
|
543 | (1) |
|
Address Ranges for Global Unicast Addresses |
|
|
544 | (1) |
|
IPv6 Subnetting Using Global Unicast Addresses |
|
|
545 | (5) |
|
Deciding Where IPv6 Subnets Are Needed |
|
|
546 | (1) |
|
The Mechanics of Subnetting IPv6 Global Unicast Addresses |
|
|
546 | (2) |
|
Listing the IPv6 Subnet Identifier |
|
|
548 | (1) |
|
|
548 | (1) |
|
Assign Subnets to the Internetwork Topology |
|
|
549 | (1) |
|
Assigning Addresses to Hosts in a Subnet |
|
|
550 | (1) |
|
Unique Local Unicast Addresses |
|
|
551 | (2) |
|
Subnetting with Unique Local IPv6 Addresses |
|
|
551 | (1) |
|
The Need for Globally Unique Local Addresses |
|
|
552 | (1) |
|
|
553 | (1) |
|
Chapter 24 Implementing IPv6 Addressing on Routers |
|
|
554 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
554 | (2) |
|
|
556 | (1) |
|
Implementing Unicast IPv6 Addresses on Routers |
|
|
556 | (9) |
|
Static Unicast Address Configuration |
|
|
557 | (7) |
|
Configuring the Full 128-Bit Address |
|
|
557 | (1) |
|
|
558 | (1) |
|
Verifying the IPv6 Address Configuration |
|
|
558 | (2) |
|
Generating a Unique Interface ID Using Modified EUI-64 |
|
|
560 | (4) |
|
Dynamic Unicast Address Configuration |
|
|
564 | (1) |
|
Special Addresses Used by Routers |
|
|
565 | (11) |
|
|
566 | (3) |
|
Link-Local Address Concepts |
|
|
566 | (1) |
|
Creating Link-Local Addresses on Routers |
|
|
566 | (2) |
|
Routing IPv6 with Only Link-Local Addresses on an Interface |
|
|
568 | (1) |
|
|
569 | (5) |
|
Reserved Multicast Addresses |
|
|
569 | (2) |
|
|
571 | (2) |
|
Solicited-Node Multicast Addresses |
|
|
573 | (1) |
|
Miscellaneous IPv6 Addresses |
|
|
574 | (1) |
|
|
574 | (2) |
|
IPv6 Addressing Configuration Summary |
|
|
576 | (1) |
|
|
576 | (4) |
|
Chapter 25 Implementing IPv6 Routing |
|
|
580 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
580 | (3) |
|
|
583 | (1) |
|
Connected and Local IPv6 Routes |
|
|
583 | (3) |
|
Rules for Connected and Local Routes |
|
|
583 | (1) |
|
Example of Connected IPv6 Routes |
|
|
584 | (1) |
|
Examples of Local IPv6 Routes |
|
|
585 | (1) |
|
|
586 | (12) |
|
Static Routes Using the Outgoing Interface |
|
|
587 | (1) |
|
Static Routes Using Next-Hop IPv6 Address |
|
|
588 | (4) |
|
Example Static Route with a Global Unicast Next-Hop Address |
|
|
589 | (1) |
|
Example Static Route with a Link-Local Next-Hop Address |
|
|
589 | (2) |
|
Static Routes over Ethernet Links |
|
|
591 | (1) |
|
|
592 | (1) |
|
|
593 | (1) |
|
Floating Static IPv6 Routes |
|
|
593 | (2) |
|
Troubleshooting Static IPv6 Routes |
|
|
595 | (3) |
|
Troubleshooting Incorrect Static Routes That Appear in the IPv6 Routing Table |
|
|
595 | (3) |
|
The Static Route Does Not Appear in the IPv6 Routing Table |
|
|
598 | (1) |
|
The Neighbor Discovery Protocol |
|
|
598 | (5) |
|
Discovering Neighbor Link Addresses with NDP NS and NA |
|
|
598 | (2) |
|
Discovering Routers with NDP RS and RA |
|
|
600 | (1) |
|
Using SLAAC with NDP RS and RA |
|
|
601 | (1) |
|
Discovering Duplicate Addresses Using NDP NS and NA |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (3) |
|
|
606 | (3) |
Part VIII Wireless LANs |
|
609 | (82) |
|
Chapter 26 Fundamentals of Wireless Networks |
|
|
610 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
610 | (2) |
|
|
612 | (1) |
|
Comparing Wired and Wireless Networks |
|
|
612 | (1) |
|
|
613 | (7) |
|
|
614 | (2) |
|
|
616 | (2) |
|
|
618 | (1) |
|
Independent Basic Service Set |
|
|
619 | (1) |
|
Other Wireless Topologies |
|
|
620 | (3) |
|
|
620 | (1) |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
623 | (6) |
|
Wireless Bands and Channels |
|
|
626 | (2) |
|
APs and Wireless Standards |
|
|
628 | (1) |
|
|
629 | (3) |
|
Chapter 27 Analyzing Cisco Wireless Architectures |
|
|
632 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
632 | (2) |
|
|
634 | (1) |
|
Autonomous AP Architecture |
|
|
634 | (2) |
|
Cloud-based AP Architecture |
|
|
636 | (2) |
|
|
638 | (4) |
|
Comparing Wireless LAN Controller Deployments |
|
|
642 | (5) |
|
|
647 | (1) |
|
|
647 | (3) |
|
Chapter 28 Securing Wireless Networks |
|
|
650 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
650 | (2) |
|
|
652 | (1) |
|
Anatomy of a Secure Connection |
|
|
652 | (4) |
|
|
653 | (2) |
|
|
655 | (1) |
|
|
656 | (1) |
|
Wireless Client Authentication Methods |
|
|
656 | (4) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
657 | (2) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
|
660 | (1) |
|
Wireless Privacy and Integrity Methods |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
661 | (1) |
|
|
661 | (1) |
|
|
661 | (3) |
|
|
664 | (2) |
|
Chapter 29 Building a Wireless LAN |
|
|
666 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
666 | (2) |
|
|
668 | (1) |
|
|
668 | (1) |
|
|
669 | (2) |
|
|
671 | (4) |
|
|
672 | (1) |
|
|
673 | (2) |
|
|
675 | (11) |
|
Step 1. Configure a RADIUS Server |
|
|
676 | (2) |
|
Step 2. Create a Dynamic Interface |
|
|
678 | (1) |
|
Step 3. Create a New WLAN |
|
|
679 | (2) |
|
Configuring WLAN Security |
|
|
681 | (2) |
|
|
683 | (1) |
|
Configuring Advanced WLAN Settings |
|
|
684 | (1) |
|
Finalizing WLAN Configuration |
|
|
685 | (1) |
|
|
686 | (2) |
|
|
688 | (3) |
Part IX Appendixes |
|
691 | (2) |
Appendix A Numeric Reference Tables |
|
693 | (6) |
Appendix B CCNA 200-301, Volume 1 Exam Updates |
|
699 | (2) |
Appendix C Answers to the "Do I Know This Already?" Quizzes |
|
701 | (23) |
Glossary |
|
724 | (34) |
Index |
|
758 | |