Muutke küpsiste eelistusi

CCNA 200-301 Portable Command Guide 5th edition [Pehme köide]

  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 226x152x15 mm, kaal: 440 g
  • Sari: Portable Command Guide
  • Ilmumisaeg: 17-Dec-2019
  • Kirjastus: Cisco Press
  • ISBN-10: 0135937825
  • ISBN-13: 9780135937822
Teised raamatud teemal:
  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 226x152x15 mm, kaal: 440 g
  • Sari: Portable Command Guide
  • Ilmumisaeg: 17-Dec-2019
  • Kirjastus: Cisco Press
  • ISBN-10: 0135937825
  • ISBN-13: 9780135937822
Teised raamatud teemal:

CCNA 200-301 Portable Command Guide is filled with valuable, easy-to-access information–and it’s portable enough to use whether you’re in the server room or the equipment closet.



The guide summarizes all CCNA certification-level Cisco IOS Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Throughout, configuration examples give you a better understanding of how these commands are used in simple network designs.



This book has been completely updated to cover topics in the new 200-301 exam. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA certification exam. Coverage includes


·         Network Fundamentals: IPv4 addressing, subnetting, VLSM, route summarization, IPv6 addressing, cables/connections, CLI

·         LAN Switching Technologies: Switch configuration, VLANs, VLAN trunking protocol, inter-VLAN communication, STP, EtherChannel, CDP, LLDP

·         Routing Technologies: Router configuration, static routing, OSPF

·         IP Services: DHCP, NAT, NTP

·         Security Fundamentals: Layer 2 security, ACL traffic management, device monitoring and hardening

·         Wireless Technologies: Configuring and securing a WLAN AP

 


 

·         Quick, offline access to all CCNA commands for research and solutions

·         Logical how-to topic groupings for a one-stop resource

·         Great for review before CCNA certification exams

·         Compact size makes it easy to carry with you wherever you go

·         “Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs



This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Introduction xix
Part I Network Fundamentals
Chapter 1 I Pv4 Addressing--- How It Works
1(10)
What Are IPv4 Addresses Used For?
1(1)
What Does an IPv4 Address Look Like?
2(1)
Network and Subnetwork Masks
2(1)
Ways to Write a Network or Subnet Mask
3(1)
Network, Node, and Broadcast Addresses
3(1)
Classes of IPv4 Addresses
4(3)
Network vs. Node (Host) Bits
5(1)
RFC (Private) 1918 Addresses
6(1)
Local vs. Remote Addresses
7(1)
Classless Addressing
7(2)
Lessons Learned
9(2)
Chapter 2 How to Subnet IPv4 Addresses
11(12)
Subnetting a Class C Network Using Binary
12(3)
Subnetting a Class B Network Using Binary
15(2)
Binary ANDing
17(6)
So Why AND?
19(1)
Shortcuts in Binary ANDing
20(3)
Chapter 3 Variable Length Subnet Masking (VLSM)
23(10)
IP Subnet Zero
23(1)
VLSM Example
24(9)
Step 1 Determine How Many H Bits Will Be Needed to Satisfy the Largest Network
25(1)
Step 2 Pick a Subnet for the Largest Network to Use
25(1)
Step 3 Pick the Next Largest Network to Work With
26(2)
Step 4 Pick the Third Largest Network to Work With
28(2)
Step 5 Determine Network Numbers for Serial Links
30(3)
Chapter 4 Route Summarization
33(6)
Example for Understanding Route Summarization
33(5)
Step 1 Summarize Winnipeg's Routes
34(1)
Step 2 Summarize Calgary's Routes
35(1)
Step 3 Summarize Edmonton's Routes
35(1)
Step 4 Summarize Vancouver's Routes
36(2)
Route Summarization and Route Flapping
38(1)
Requirements for Route Summarization
38(1)
Chapter 5 IPv6 Addressing---How It Works
39(12)
IPv6: A Very Brief Introduction
39(1)
What Does an IPv6 Address Look Like?
40(1)
Reducing the Notation of an IPv6 Address
41(2)
Rule 1: Omit Leading 0s
41(1)
Rule 2: Omit All-Os Hextet
42(1)
Combining Rule 1 and Rule 2
42(1)
Prefix Length Notation
43(1)
IPv6 Address Types
44(7)
Unicast Addresses
45(3)
Multicast Addresses
48(2)
Anycast Addresses
50(1)
Chapter 6 Cables and Connections
51(8)
Connecting a Rollover Cable to Your Router or Switch
51(1)
Using a USB Cable to Connect to Your Router or Switch
51(1)
Terminal Settings
52(1)
LAN Connections
53(1)
Serial Cable Types
53(2)
Which Cable to Use?
55(1)
ANSI/TIA Cabling Standards
56(3)
T568A Versus T568B Cables
57(2)
Chapter 7 The Command-Line Interface
59(8)
Shortcuts for Entering Commands
59(1)
Using the Tab Key to Complete Commands
60(1)
Console Error Messages
60(1)
Using the Question Mark for Help
60(1)
Enable Command
61(1)
Exit Command
61(1)
End Command
61(1)
Disable Command
61(1)
Logout Command
62(1)
Setup Mode
62(1)
Keyboard Help
62(1)
History Commands
63(1)
Terminal Commands
64(1)
Show Commands
64(1)
Using the Pipe Parameter (|) with the show or more Commands
64(2)
Using the no and default Forms of Commands
66(1)
Part II LAN Switching Technologies
Chapter 8 Configuring a Switch
67(8)
Help Commands
68(1)
Command Modes
68(1)
Verifying Commands
68(1)
Resetting Switch Configuration
69(1)
Setting Host Names
69(1)
Setting Passwords
69(1)
Setting IP Addresses and Default Gateways
70(1)
Setting Interface Descriptions
70(1)
The mdix auto Command
70(1)
Setting Duplex Operation
71(1)
Setting Operation Speed
71(1)
Managing the MAC Address Table
72(1)
Configuration Example
72(3)
Chapter 9 VLANs
75(8)
Creating Static VLANs
75(1)
Creating Static VLANs Using VLAN Configuration Mode
75(1)
Assigning Ports to VLANs
76(1)
Using the range Command
76(1)
Configuring a Voice VLAN
76(2)
Configuring Voice and Data with Trust
77(1)
Configuring Voice and Data Without Trust
78(1)
Verifying VLAN Information
78(1)
Saving VLAN Configurations
79(1)
Erasing VLAN Configurations
79(1)
Configuration Example: VLANs
80(3)
2960 Switch
80(3)
Chapter 10 VLAN Trunking Protocol and Inter-VLAN Communication
83(14)
Dynamic Trunking Protocol (DTP)
83(1)
Setting the VLAN Encapsulation Type
84(1)
VLAN Trunking Protocol (VTP)
84(2)
Verifying VTP
86(1)
Inter-VLAN Communication Using an External Router: Router-on-a-Stick
87(1)
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface
88(1)
Removing L2 Switchport Capability of an Interface on an L3 Switch
88(1)
Configuring Inter-VLAN Communication on an L3 Switch
88(1)
Inter-VLAN Communication Tips
88(1)
Configuration Example: Inter-VLAN Communication
89(8)
ISP Router
89(1)
CORP Router
90(2)
L2Switch2 (Catalyst 2960)
92(2)
L3Switch1 (Catalyst 3560/3650/3750)
94(1)
L2Switch1 (Catalyst 2960)
95(2)
Chapter 11 Spanning Tree Protocol
97(14)
Spanning Tree Protocol Definition
97(1)
Enabling Spanning Tree Protocol
98(1)
Changing the Spanning-Tree Mode
99(1)
BPDU Guard (3650/9xxx Series)
99(1)
Configuring the Root Switch
100(1)
Configuring a Secondary Root Switch
100(1)
Configuring Port Priority
100(1)
Configuring the Path Cost
101(1)
Configuring the Switch Priority of a VLAN
101(1)
Configuring STP Timers
102(1)
Configuring Optional Spanning-Tree Features
102(1)
PortFast
102(1)
BPDU Guard (2xxx/01der 3xxx Series)
103(1)
Enabling the Extended System ID
103(1)
Verifying STP
104(1)
Troubleshooting Spanning Tree Protocol
104(1)
Configuration Example: PVST+
104(4)
Core Switch (3650)
105(1)
Distribution 1 Switch (3650)
106(1)
Distribution 2 Switch (3650)
106(1)
Access 1 Switch (2960)
107(1)
Access 2 Switch (2960)
107(1)
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+
108(3)
Access 1 Switch (2960)
108(1)
Access 2 Switch (2960)
108(1)
Distribution 1 Switch (3650)
109(1)
Distribution 2 Switch (3650)
109(1)
Core Switch (3650)
109(2)
Chapter 12 EtherChannel
111(10)
EtherChannel
111(6)
Interface Modes in EtherChannel
111(1)
Default EtherChannel Configuration
112(1)
Guidelines for Configuring EtherChannel
112(1)
Configuring Layer 2 EtherChannel
113(1)
Configuring Layer 3 EtherChannel
114(1)
Configuring EtherChannel Load Balancing
114(1)
Configuring LACP Hot-Standby Ports
115(1)
Monitoring and Verifying EtherChannel
116(1)
Configuration Example: EtherChannel
117(4)
DLSwitch (3560 or 9300)
117(1)
ALS witch1 (2960 or 9200)
118(1)
ALS witch2 (2960 or 9200)
119(2)
Chapter 13 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP)
121(4)
Cisco Discovery Protocol
121(1)
Configuring CDP
121(1)
Verifying and Troubleshooting CDP
122(1)
CDP Design Tips
122(1)
Link Layer Discovery Protocol (802.1AB)
123(1)
Configuring LLDP (802.1AB)
123(1)
Verifying and Troubleshooting LLDP
124(1)
Part III Routing Technologies
Chapter 14 Configuring a Cisco Router
125(16)
Router Modes
126(1)
Entering Global Configuration Mode
126(1)
Configuring a Router Name
126(1)
Configuring Passwords
126(1)
Password Encryption
127(1)
Interface Names
127(4)
Moving Between Interfaces
131(1)
Configuring a Serial Interface
132(1)
Assigning an IPv4 Address to a Fast Ethernet Interface
132(1)
Assigning an IPv4 Address to a Gigabit Ethernet Interface
132(1)
Assigning IPv6 Addresses to Interfaces
133(1)
Creating a Message-of-the-Day Banner
133(1)
Creating a Login Banner
134(1)
Mapping a Local Host Name to a Remote IP Address
134(1)
The no ip domain-lookup Command
134(1)
Working with DNS on a Router
134(1)
The logging synchronous Command
135(1)
The exec-timeout Command
136(1)
Saving Configurations
136(1)
Erasing Configurations
136(1)
The write Command
137(1)
Verifying Your Configurations Using show Commands
137(1)
EXEC Commands in Configuration Mode: The do Command
138(1)
Configuration Example: Basic Router Configuration
138(3)
Boston Router
138(3)
Chapter 15 Static Routing
141(8)
Configuring an IPv4 Static Route
141(1)
Static Routes and Recursive Lookups
142(1)
The permanent Keyword
142(1)
Floating Static Routes in IPv4 and Administrative Distance
143(1)
Configuring an IPv4 Default Route
144(1)
Verifying IPv4 Static Routes
144(1)
Configuration Example: IPv4 Static Routes
144(2)
Ketchikan Router
145(1)
Juneau Router
145(1)
Sitka Router
146(1)
Configuring an IPv6 Static Route
146(1)
Floating Static Routes in IPv6
147(1)
Configuring an IPv6 Default Route
147(1)
Verifying IPv6 Static Routes
147(2)
Chapter 16 Open Shortest Path First (OSPF)
149(10)
OSPFv2 Versus OSPFv3
149(1)
Configuring OSPF
150(1)
Using Wildcard Masks with OSPF Areas
150(2)
Loopback Interfaces
152(1)
Router ID
152(1)
DR/BDR Elections
153(1)
Timers
153(1)
Verifying OSPFv2 Configurations
153(1)
Troubleshooting OSPFv2
154(1)
Configuration Example: Single-Area OSPF
154(5)
Austin Router
155(1)
Houston Router
156(1)
Galveston Router
157(2)
Part IV IP Services
Chapter 17 DHCP
159(6)
Configuring a DHCP Server on an IOS Router
159(1)
Using Cisco IP Phones with a DHCP Server
160(1)
Verifying and Troubleshooting DHCP Configuration
160(1)
Configuring a DHCP Helper Address
161(1)
Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface
162(1)
Configuration Example: DHCP
162(3)
Edmonton Router
162(2)
Gibbons Router
164(1)
Chapter 18 Network Address Translation (NAT)
165(10)
Private IP Addresses: RFC 1918
165(1)
Configuring Dynamic NAT: One Private to One Public Address Translation
165(2)
Configuring PAT: Many Private to One Public Address Translation
167(2)
Configuring Static NAT: One Private to One Permanent Public Address Translation
169(1)
Verifying NAT and PAT Configurations
170(1)
Troubleshooting NAT and PAT Configurations
171(1)
Configuration Example: PAT
171(4)
ISP Router
171(1)
Company Router
172(3)
Chapter 19 Configuring Network Time Protocol (NTP)
175(12)
NTP Configuration
175(1)
NTP Design
176(1)
Securing NTP
177(1)
Enabling NTP Authentication
177(1)
Limiting NTP Access with Access Lists
178(1)
Verifying and Troubleshooting NTP
178(1)
Setting the Clock on a Router
179(3)
Using Time Stamps
182(1)
Configuration Example: NTP
182(5)
Corel Router
183(1)
Core2 Router
184(1)
DLSwitch1
185(1)
DLSwitch2
185(1)
ALSwitch1
186(1)
ALSwitch2
186(1)
Part V Security Fundamentals
Chapter 20 Layer Two Security Features
187(10)
Setting Passwords on a Switch
187(1)
Configuring Static MAC Addresses
188(1)
Configuring Switch Port Security
188(1)
Configuring Sticky MAC Addresses
189(1)
Verifying Switch Port Security
189(1)
Recovering Automatically from Error-Disabled Ports
190(1)
Verifying Autorecovery of Error-Disabled Ports
190(1)
Configuring DHCP Snooping
191(2)
Verifying DHCP Snooping
192(1)
Configuring Dynamic ARP Inspection (DAI)
193(1)
Verifying Dynamic ARP Inspection
193(1)
Configuration Example: Switch Security
194(3)
Chapter 21 Managing Traffic Using Access Control Lists (ACLs)
197(16)
Access List Numbers
197(1)
Using Wildcard Masks
198(1)
ACL Keywords
198(1)
Creating Standard ACLs
198(1)
Applying Standard ACLs to an Interface
199(1)
Verifying ACLs
200(1)
Removing ACLs
200(1)
Creating Extended ACLs
200(1)
Applying Extended ACLs to an Interface
201(1)
The established Keyword
201(1)
The log Keyword
202(1)
Creating Named ACLs
203(1)
Using Sequence Numbers in Named ACLs
203(1)
Removing Specific Lines in Named ACLs Using Sequence Numbers
204(1)
Sequence Number Tips
204(1)
Including Comments About Entries in ACLs
205(1)
Restricting Virtual Terminal Access
206(1)
Tips for Configuring ACLs
206(1)
IPv6 ACLs
207(1)
Verifying IPv6 ACLs
207(1)
Configuration Examples: IPv4 ACLs
208(2)
Configuration Examples: IPv6 ACLs
210(3)
Chapter 22 Device Monitoring and Hardening
213(10)
Device Monitoring
213(1)
Configuration Backups
213(1)
Implementing Logging
214(3)
Configuring Syslog
215(1)
Syslog Message Format
215(1)
Syslog Severity Levels
216(1)
Syslog Message Example
216(1)
Device Hardening
217(6)
Configuring Passwords
217(1)
Password Encryption
218(1)
Password Encryption Algorithm Types
218(1)
Configuring SSH
219(1)
Verifying SSH
220(1)
Restricting Virtual Terminal Access
220(1)
Disabling Unneeded Services
221(2)
Part VI Wireless Technologies
Chapter 23 Configuring and Securing a WLAN AP
223(28)
Initial Setup of a Wireless LAN Controller (WLC)
223(6)
Monitoring the WLC
229(1)
Configuring a VLAN (Dynamic) Interface
230(4)
Configuring a DHCP Scope
234(3)
Configuring a WLAN
237(2)
Defining a RADIUS Server
239(3)
Exploring Management Options
242(4)
Configuring a WLAN Using WPA2 PSK
246(5)
Part VII Appendices
APPENDIX A How to Count in Decimal, Binary, and Hexadecimal
251(8)
How to Count in Decimal
251(2)
How to Count in Binary
253(1)
How to Count in Hexadecimal
254(2)
Representing Decimal, Binary, and Hexadecimal Numbers
256(3)
APPENDIX B How to Convert Between Number Systems
259(8)
How to Convert from Decimal to Binary
259(1)
How to Convert from Binary to Decimal
260(1)
How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal
261(1)
A Bit of Perspective
262(1)
How to Convert from Hexadecimal to Binary
262(1)
How to Convert from Binary to Hexadecimal
263(1)
How to Convert from Decimal to Hexadecimal
264(1)
How to Convert from Hexadecimal to Decimal
265(2)
APPENDIX C Binary/Hex/Decimal Conversion Chart
267(8)
APPENDIX D Create Your Own Journal Here
275(2)
Index 277
Scott Empson is an instructor in the Department of Information Systems Technology at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he has taught for more than 20 years. He teaches technical courses in Cisco routing and switching, along with courses in professional development and leadership. He has a Master of Education degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/language arts; and a Bachelor of Applied Information Systems Technology, with a major in network management. Scott lives in Edmonton, Alberta, with his wife, Trina, and two university-attending-but-still-havent-moved-out-yet-but-hope-to-move-out-as- soon-aspossible-after-graduation-so-Dad-can-have-the-TV-room-back children, Zachariah and Shaelyn.