Introduction |
|
xix | |
|
Part I Network Fundamentals |
|
|
|
Chapter 1 I Pv4 Addressing--- How It Works |
|
|
1 | (10) |
|
What Are IPv4 Addresses Used For? |
|
|
1 | (1) |
|
What Does an IPv4 Address Look Like? |
|
|
2 | (1) |
|
Network and Subnetwork Masks |
|
|
2 | (1) |
|
Ways to Write a Network or Subnet Mask |
|
|
3 | (1) |
|
Network, Node, and Broadcast Addresses |
|
|
3 | (1) |
|
Classes of IPv4 Addresses |
|
|
4 | (3) |
|
Network vs. Node (Host) Bits |
|
|
5 | (1) |
|
RFC (Private) 1918 Addresses |
|
|
6 | (1) |
|
Local vs. Remote Addresses |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (2) |
|
Chapter 2 How to Subnet IPv4 Addresses |
|
|
11 | (12) |
|
Subnetting a Class C Network Using Binary |
|
|
12 | (3) |
|
Subnetting a Class B Network Using Binary |
|
|
15 | (2) |
|
|
17 | (6) |
|
|
19 | (1) |
|
Shortcuts in Binary ANDing |
|
|
20 | (3) |
|
Chapter 3 Variable Length Subnet Masking (VLSM) |
|
|
23 | (10) |
|
|
23 | (1) |
|
|
24 | (9) |
|
Step 1 Determine How Many H Bits Will Be Needed to Satisfy the Largest Network |
|
|
25 | (1) |
|
Step 2 Pick a Subnet for the Largest Network to Use |
|
|
25 | (1) |
|
Step 3 Pick the Next Largest Network to Work With |
|
|
26 | (2) |
|
Step 4 Pick the Third Largest Network to Work With |
|
|
28 | (2) |
|
Step 5 Determine Network Numbers for Serial Links |
|
|
30 | (3) |
|
Chapter 4 Route Summarization |
|
|
33 | (6) |
|
Example for Understanding Route Summarization |
|
|
33 | (5) |
|
Step 1 Summarize Winnipeg's Routes |
|
|
34 | (1) |
|
Step 2 Summarize Calgary's Routes |
|
|
35 | (1) |
|
Step 3 Summarize Edmonton's Routes |
|
|
35 | (1) |
|
Step 4 Summarize Vancouver's Routes |
|
|
36 | (2) |
|
Route Summarization and Route Flapping |
|
|
38 | (1) |
|
Requirements for Route Summarization |
|
|
38 | (1) |
|
Chapter 5 IPv6 Addressing---How It Works |
|
|
39 | (12) |
|
IPv6: A Very Brief Introduction |
|
|
39 | (1) |
|
What Does an IPv6 Address Look Like? |
|
|
40 | (1) |
|
Reducing the Notation of an IPv6 Address |
|
|
41 | (2) |
|
|
41 | (1) |
|
Rule 2: Omit All-Os Hextet |
|
|
42 | (1) |
|
Combining Rule 1 and Rule 2 |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (7) |
|
|
45 | (3) |
|
|
48 | (2) |
|
|
50 | (1) |
|
Chapter 6 Cables and Connections |
|
|
51 | (8) |
|
Connecting a Rollover Cable to Your Router or Switch |
|
|
51 | (1) |
|
Using a USB Cable to Connect to Your Router or Switch |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (2) |
|
|
55 | (1) |
|
ANSI/TIA Cabling Standards |
|
|
56 | (3) |
|
T568A Versus T568B Cables |
|
|
57 | (2) |
|
Chapter 7 The Command-Line Interface |
|
|
59 | (8) |
|
Shortcuts for Entering Commands |
|
|
59 | (1) |
|
Using the Tab Key to Complete Commands |
|
|
60 | (1) |
|
|
60 | (1) |
|
Using the Question Mark for Help |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
Using the Pipe Parameter (|) with the show or more Commands |
|
|
64 | (2) |
|
Using the no and default Forms of Commands |
|
|
66 | (1) |
|
Part II LAN Switching Technologies |
|
|
|
Chapter 8 Configuring a Switch |
|
|
67 | (8) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
Resetting Switch Configuration |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
Setting IP Addresses and Default Gateways |
|
|
70 | (1) |
|
Setting Interface Descriptions |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Managing the MAC Address Table |
|
|
72 | (1) |
|
|
72 | (3) |
|
|
75 | (8) |
|
|
75 | (1) |
|
Creating Static VLANs Using VLAN Configuration Mode |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (2) |
|
Configuring Voice and Data with Trust |
|
|
77 | (1) |
|
Configuring Voice and Data Without Trust |
|
|
78 | (1) |
|
Verifying VLAN Information |
|
|
78 | (1) |
|
Saving VLAN Configurations |
|
|
79 | (1) |
|
Erasing VLAN Configurations |
|
|
79 | (1) |
|
Configuration Example: VLANs |
|
|
80 | (3) |
|
|
80 | (3) |
|
Chapter 10 VLAN Trunking Protocol and Inter-VLAN Communication |
|
|
83 | (14) |
|
Dynamic Trunking Protocol (DTP) |
|
|
83 | (1) |
|
Setting the VLAN Encapsulation Type |
|
|
84 | (1) |
|
VLAN Trunking Protocol (VTP) |
|
|
84 | (2) |
|
|
86 | (1) |
|
Inter-VLAN Communication Using an External Router: Router-on-a-Stick |
|
|
87 | (1) |
|
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface |
|
|
88 | (1) |
|
Removing L2 Switchport Capability of an Interface on an L3 Switch |
|
|
88 | (1) |
|
Configuring Inter-VLAN Communication on an L3 Switch |
|
|
88 | (1) |
|
Inter-VLAN Communication Tips |
|
|
88 | (1) |
|
Configuration Example: Inter-VLAN Communication |
|
|
89 | (8) |
|
|
89 | (1) |
|
|
90 | (2) |
|
L2Switch2 (Catalyst 2960) |
|
|
92 | (2) |
|
L3Switch1 (Catalyst 3560/3650/3750) |
|
|
94 | (1) |
|
L2Switch1 (Catalyst 2960) |
|
|
95 | (2) |
|
Chapter 11 Spanning Tree Protocol |
|
|
97 | (14) |
|
Spanning Tree Protocol Definition |
|
|
97 | (1) |
|
Enabling Spanning Tree Protocol |
|
|
98 | (1) |
|
Changing the Spanning-Tree Mode |
|
|
99 | (1) |
|
BPDU Guard (3650/9xxx Series) |
|
|
99 | (1) |
|
Configuring the Root Switch |
|
|
100 | (1) |
|
Configuring a Secondary Root Switch |
|
|
100 | (1) |
|
Configuring Port Priority |
|
|
100 | (1) |
|
Configuring the Path Cost |
|
|
101 | (1) |
|
Configuring the Switch Priority of a VLAN |
|
|
101 | (1) |
|
|
102 | (1) |
|
Configuring Optional Spanning-Tree Features |
|
|
102 | (1) |
|
|
102 | (1) |
|
BPDU Guard (2xxx/01der 3xxx Series) |
|
|
103 | (1) |
|
Enabling the Extended System ID |
|
|
103 | (1) |
|
|
104 | (1) |
|
Troubleshooting Spanning Tree Protocol |
|
|
104 | (1) |
|
Configuration Example: PVST+ |
|
|
104 | (4) |
|
|
105 | (1) |
|
Distribution 1 Switch (3650) |
|
|
106 | (1) |
|
Distribution 2 Switch (3650) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ |
|
|
108 | (3) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Distribution 1 Switch (3650) |
|
|
109 | (1) |
|
Distribution 2 Switch (3650) |
|
|
109 | (1) |
|
|
109 | (2) |
|
|
111 | (10) |
|
|
111 | (6) |
|
Interface Modes in EtherChannel |
|
|
111 | (1) |
|
Default EtherChannel Configuration |
|
|
112 | (1) |
|
Guidelines for Configuring EtherChannel |
|
|
112 | (1) |
|
Configuring Layer 2 EtherChannel |
|
|
113 | (1) |
|
Configuring Layer 3 EtherChannel |
|
|
114 | (1) |
|
Configuring EtherChannel Load Balancing |
|
|
114 | (1) |
|
Configuring LACP Hot-Standby Ports |
|
|
115 | (1) |
|
Monitoring and Verifying EtherChannel |
|
|
116 | (1) |
|
Configuration Example: EtherChannel |
|
|
117 | (4) |
|
|
117 | (1) |
|
ALS witch1 (2960 or 9200) |
|
|
118 | (1) |
|
ALS witch2 (2960 or 9200) |
|
|
119 | (2) |
|
Chapter 13 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) |
|
|
121 | (4) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Verifying and Troubleshooting CDP |
|
|
122 | (1) |
|
|
122 | (1) |
|
Link Layer Discovery Protocol (802.1AB) |
|
|
123 | (1) |
|
Configuring LLDP (802.1AB) |
|
|
123 | (1) |
|
Verifying and Troubleshooting LLDP |
|
|
124 | (1) |
|
Part III Routing Technologies |
|
|
|
Chapter 14 Configuring a Cisco Router |
|
|
125 | (16) |
|
|
126 | (1) |
|
Entering Global Configuration Mode |
|
|
126 | (1) |
|
Configuring a Router Name |
|
|
126 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (4) |
|
Moving Between Interfaces |
|
|
131 | (1) |
|
Configuring a Serial Interface |
|
|
132 | (1) |
|
Assigning an IPv4 Address to a Fast Ethernet Interface |
|
|
132 | (1) |
|
Assigning an IPv4 Address to a Gigabit Ethernet Interface |
|
|
132 | (1) |
|
Assigning IPv6 Addresses to Interfaces |
|
|
133 | (1) |
|
Creating a Message-of-the-Day Banner |
|
|
133 | (1) |
|
|
134 | (1) |
|
Mapping a Local Host Name to a Remote IP Address |
|
|
134 | (1) |
|
The no ip domain-lookup Command |
|
|
134 | (1) |
|
Working with DNS on a Router |
|
|
134 | (1) |
|
The logging synchronous Command |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
Verifying Your Configurations Using show Commands |
|
|
137 | (1) |
|
EXEC Commands in Configuration Mode: The do Command |
|
|
138 | (1) |
|
Configuration Example: Basic Router Configuration |
|
|
138 | (3) |
|
|
138 | (3) |
|
Chapter 15 Static Routing |
|
|
141 | (8) |
|
Configuring an IPv4 Static Route |
|
|
141 | (1) |
|
Static Routes and Recursive Lookups |
|
|
142 | (1) |
|
|
142 | (1) |
|
Floating Static Routes in IPv4 and Administrative Distance |
|
|
143 | (1) |
|
Configuring an IPv4 Default Route |
|
|
144 | (1) |
|
Verifying IPv4 Static Routes |
|
|
144 | (1) |
|
Configuration Example: IPv4 Static Routes |
|
|
144 | (2) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
Configuring an IPv6 Static Route |
|
|
146 | (1) |
|
Floating Static Routes in IPv6 |
|
|
147 | (1) |
|
Configuring an IPv6 Default Route |
|
|
147 | (1) |
|
Verifying IPv6 Static Routes |
|
|
147 | (2) |
|
Chapter 16 Open Shortest Path First (OSPF) |
|
|
149 | (10) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Using Wildcard Masks with OSPF Areas |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Verifying OSPFv2 Configurations |
|
|
153 | (1) |
|
|
154 | (1) |
|
Configuration Example: Single-Area OSPF |
|
|
154 | (5) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (2) |
|
|
|
|
159 | (6) |
|
Configuring a DHCP Server on an IOS Router |
|
|
159 | (1) |
|
Using Cisco IP Phones with a DHCP Server |
|
|
160 | (1) |
|
Verifying and Troubleshooting DHCP Configuration |
|
|
160 | (1) |
|
Configuring a DHCP Helper Address |
|
|
161 | (1) |
|
Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface |
|
|
162 | (1) |
|
Configuration Example: DHCP |
|
|
162 | (3) |
|
|
162 | (2) |
|
|
164 | (1) |
|
Chapter 18 Network Address Translation (NAT) |
|
|
165 | (10) |
|
Private IP Addresses: RFC 1918 |
|
|
165 | (1) |
|
Configuring Dynamic NAT: One Private to One Public Address Translation |
|
|
165 | (2) |
|
Configuring PAT: Many Private to One Public Address Translation |
|
|
167 | (2) |
|
Configuring Static NAT: One Private to One Permanent Public Address Translation |
|
|
169 | (1) |
|
Verifying NAT and PAT Configurations |
|
|
170 | (1) |
|
Troubleshooting NAT and PAT Configurations |
|
|
171 | (1) |
|
Configuration Example: PAT |
|
|
171 | (4) |
|
|
171 | (1) |
|
|
172 | (3) |
|
Chapter 19 Configuring Network Time Protocol (NTP) |
|
|
175 | (12) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Enabling NTP Authentication |
|
|
177 | (1) |
|
Limiting NTP Access with Access Lists |
|
|
178 | (1) |
|
Verifying and Troubleshooting NTP |
|
|
178 | (1) |
|
Setting the Clock on a Router |
|
|
179 | (3) |
|
|
182 | (1) |
|
Configuration Example: NTP |
|
|
182 | (5) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Part V Security Fundamentals |
|
|
|
Chapter 20 Layer Two Security Features |
|
|
187 | (10) |
|
Setting Passwords on a Switch |
|
|
187 | (1) |
|
Configuring Static MAC Addresses |
|
|
188 | (1) |
|
Configuring Switch Port Security |
|
|
188 | (1) |
|
Configuring Sticky MAC Addresses |
|
|
189 | (1) |
|
Verifying Switch Port Security |
|
|
189 | (1) |
|
Recovering Automatically from Error-Disabled Ports |
|
|
190 | (1) |
|
Verifying Autorecovery of Error-Disabled Ports |
|
|
190 | (1) |
|
Configuring DHCP Snooping |
|
|
191 | (2) |
|
|
192 | (1) |
|
Configuring Dynamic ARP Inspection (DAI) |
|
|
193 | (1) |
|
Verifying Dynamic ARP Inspection |
|
|
193 | (1) |
|
Configuration Example: Switch Security |
|
|
194 | (3) |
|
Chapter 21 Managing Traffic Using Access Control Lists (ACLs) |
|
|
197 | (16) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Applying Standard ACLs to an Interface |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
Applying Extended ACLs to an Interface |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
Using Sequence Numbers in Named ACLs |
|
|
203 | (1) |
|
Removing Specific Lines in Named ACLs Using Sequence Numbers |
|
|
204 | (1) |
|
|
204 | (1) |
|
Including Comments About Entries in ACLs |
|
|
205 | (1) |
|
Restricting Virtual Terminal Access |
|
|
206 | (1) |
|
Tips for Configuring ACLs |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
Configuration Examples: IPv4 ACLs |
|
|
208 | (2) |
|
Configuration Examples: IPv6 ACLs |
|
|
210 | (3) |
|
Chapter 22 Device Monitoring and Hardening |
|
|
213 | (10) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (3) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (6) |
|
|
217 | (1) |
|
|
218 | (1) |
|
Password Encryption Algorithm Types |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Restricting Virtual Terminal Access |
|
|
220 | (1) |
|
Disabling Unneeded Services |
|
|
221 | (2) |
|
Part VI Wireless Technologies |
|
|
|
Chapter 23 Configuring and Securing a WLAN AP |
|
|
223 | (28) |
|
Initial Setup of a Wireless LAN Controller (WLC) |
|
|
223 | (6) |
|
|
229 | (1) |
|
Configuring a VLAN (Dynamic) Interface |
|
|
230 | (4) |
|
|
234 | (3) |
|
|
237 | (2) |
|
|
239 | (3) |
|
Exploring Management Options |
|
|
242 | (4) |
|
Configuring a WLAN Using WPA2 PSK |
|
|
246 | (5) |
|
|
|
APPENDIX A How to Count in Decimal, Binary, and Hexadecimal |
|
|
251 | (8) |
|
|
251 | (2) |
|
|
253 | (1) |
|
How to Count in Hexadecimal |
|
|
254 | (2) |
|
Representing Decimal, Binary, and Hexadecimal Numbers |
|
|
256 | (3) |
|
APPENDIX B How to Convert Between Number Systems |
|
|
259 | (8) |
|
How to Convert from Decimal to Binary |
|
|
259 | (1) |
|
How to Convert from Binary to Decimal |
|
|
260 | (1) |
|
How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal |
|
|
261 | (1) |
|
|
262 | (1) |
|
How to Convert from Hexadecimal to Binary |
|
|
262 | (1) |
|
How to Convert from Binary to Hexadecimal |
|
|
263 | (1) |
|
How to Convert from Decimal to Hexadecimal |
|
|
264 | (1) |
|
How to Convert from Hexadecimal to Decimal |
|
|
265 | (2) |
|
APPENDIX C Binary/Hex/Decimal Conversion Chart |
|
|
267 | (8) |
|
APPENDIX D Create Your Own Journal Here |
|
|
275 | (2) |
Index |
|
277 | |