Introduction |
|
xiii | |
|
Chapter 1 Describe How a Network Works |
|
|
1 | (56) |
|
Describe the Purpose and Functions of Various Network Devices |
|
|
2 | (6) |
|
Use the OSI and TCP/IP Models and Their Associated Protocols to Explain How Data Flows in a Network |
|
|
8 | (2) |
|
Describe Common Networked Applications, Including Web Applications |
|
|
10 | (5) |
|
Describe the Purpose and Basic Operation of the Protocols in the OSI and TCP Models |
|
|
15 | (4) |
|
Describe the Impact of Applications (Voice over IP and Video over IP) on a Network |
|
|
19 | (4) |
|
Interpret Network Diagrams |
|
|
23 | (8) |
|
Determine the Path between Two Hosts across a Network |
|
|
31 | (4) |
|
Describe the Components Required for Network and Internet Communications |
|
|
35 | (4) |
|
Identify and Correct Common Network Problems at Layers 1, 2, 3, and 7 Using a Layered Model Approach |
|
|
39 | (3) |
|
Differentiate between LAN/WAN Operation and Features |
|
|
42 | (12) |
|
|
54 | (2) |
|
Answers to Review Questions |
|
|
56 | (1) |
|
Chapter 2 Configure, Verify, and Troubleshoot a Switch with VLANs and Interswitch Communications |
|
|
57 | (62) |
|
Select the Appropriate Media, Cables, Ports, and Connectors to Connect Switches to Other Network Devices and Hosts |
|
|
59 | (3) |
|
Explain the Technology and Media Access Control Method for Ethernet Networks |
|
|
62 | (5) |
|
Explain Network Segmentation and Basic Traffic Management Concepts |
|
|
67 | (2) |
|
Explain Basic Switching Concepts and the Operation of Cisco Switches |
|
|
69 | (5) |
|
Perform and Verify Initial Switch Configuration Tasks, Including Remote Access Management |
|
|
74 | (3) |
|
Verify Network Status and Switch Operation Using Basic Utilities (Including ping, traceroute, Telnet, SSH, arp, and ipconfig) and SHOW and DEBUG Commands |
|
|
77 | (6) |
|
Identify, Prescribe, and Resolve Common Switched Network Media Issues, Configuration Issues, Auto Negotiation, and Switch Hardware Failures |
|
|
83 | (1) |
|
Describe Enhanced Switching Technologies (Including VTP, RSTP, VLAN, PVSTP, and 802.1q) |
|
|
84 | (4) |
|
Describe How VLANs Create Logically Separate Networks and the Need for Routing between Them |
|
|
88 | (4) |
|
Configure, Verify, and Troubleshoot VLANs |
|
|
92 | (3) |
|
Configure, Verify, and Troubleshoot Trunking on Cisco Switches |
|
|
95 | (4) |
|
Configure, Verify, and Troubleshoot InterVLAN Routing |
|
|
99 | (4) |
|
Configure, Verify, and Troubleshoot VTP |
|
|
103 | (6) |
|
Configure, Verify, and Troubleshoot RSTP Operation |
|
|
109 | (2) |
|
Interpret the Output of Various SHOW and DEBUG Commands to Verify the Operational Status of a Cisco Switched Network |
|
|
111 | (1) |
|
Implement Basic Switch Security (Including Port Security, Trunk Access, Management VLAN Other Than VLAN 1, Etc.) |
|
|
111 | (3) |
|
|
114 | (4) |
|
Answers to Review Questions |
|
|
118 | (1) |
|
Chapter 3 Implement an IP Addressing Scheme and IP Services to Meet Network Requirements in a Medium-Sized Enterprise Branch Office Network |
|
|
119 | (34) |
|
Describe the Operation and Benefits of Using Private and Public IP Addressing |
|
|
121 | (3) |
|
Explain the Operation and Benefits of Using DHCP and DNS |
|
|
124 | (1) |
|
Configure, Verify, and Troubleshoot DHCP and DNS Operation on a Router (Including CLI/SDM) |
|
|
124 | (3) |
|
Implement Static and Dynamic Addressing Services for Hosts in a LAN Environment |
|
|
127 | (5) |
|
Calculate and Apply an Addressing Scheme, Including VLSM IP Addressing Design, to a Network |
|
|
132 | (2) |
|
Determine the Appropriate Classless Addressing Scheme Using VLSM and Summarization to Satisfy Addressing Requirements in a LAN/WAN Environment |
|
|
134 | (8) |
|
Describe the Technological Requirements for Running IPv6 in Conjunction with IPv4 (Including Protocols, Dual Stack, Tunneling, Etc.) |
|
|
142 | (3) |
|
|
145 | (4) |
|
Identify and Correct Common Problems Associated with IP Addressing and Host Configurations |
|
|
149 | (1) |
|
|
150 | (2) |
|
Answer to Review Questions |
|
|
152 | (1) |
|
Chapter 4 Configure, Verify, and Troubleshoot Basic Router Operation and Routing on Cisco Devices |
|
|
153 | (82) |
|
Describe Basic Routing Concepts (Including Packet Forwarding and the Router Lookup Process) |
|
|
155 | (3) |
|
Describe the Operation of Cisco Routers (Including the Router Bootup Process, POST, and Router Components) |
|
|
158 | (2) |
|
Select the Appropriate Media, Cables, Ports, and Connectors to Connect Routers to Other Network Devices and Hosts |
|
|
160 | (2) |
|
Configure, Verify, and Troubleshoot RIPv2 |
|
|
162 | (3) |
|
Access and Utilize the Router to Set Basic Parameters (Including CLI/SDM) |
|
|
165 | (10) |
|
Connect, Configure, and Verify the Operational Status of a Device Interface |
|
|
175 | (14) |
|
Verify Device Configuration and Network Connectivity Using ping, traceroute, Telnet, SSH, or Other Utilities |
|
|
189 | (1) |
|
Perform and Verify Routing Configuration Tasks for a Static or Default Route Given Specific Routing Requirements |
|
|
189 | (3) |
|
Manage IOS Configuration Files (Including Save, Edit, Upgrade, and Restore) |
|
|
192 | (4) |
|
|
196 | (4) |
|
Compare and Contrast Methods of Routing and Routing Protocols |
|
|
200 | (2) |
|
Configure, Verify, and Troubleshoot OSPF |
|
|
202 | (9) |
|
Configure, Verify, and Troubleshoot EIGRP |
|
|
211 | (5) |
|
Verify Network Connectivity (Including Using ping, traceroute, and Telnet or SSH) |
|
|
216 | (1) |
|
Troubleshoot Routing Issues |
|
|
216 | (5) |
|
Verify Router Hardware and Software Operation Using the show and debug Commands |
|
|
221 | (6) |
|
Implement Basic Router Security |
|
|
227 | (4) |
|
|
231 | (2) |
|
Answers to Review Questions |
|
|
233 | (2) |
|
Chapter 5 Explain and Select the Appropriate Administrative Tasks Required for a WLAN |
|
|
235 | (20) |
|
Describe Standards Associated with Wireless Media (Including IEEE, Wi-Fi Alliance, and ITU/FCC) |
|
|
236 | (7) |
|
Identify and Describe the Purpose of the Components in a Small Wireless Network (Including SSID, BSS, and ESS) |
|
|
243 | (3) |
|
Identify the Basic Parameters to Configure on a Wireless Network to Ensure That Devices Connect to the Correct Access Point |
|
|
246 | (2) |
|
Compare and Contrast Wireless Security Features and Capabilities of WPA Security (Including Open, WEP, and WPA-1/2) |
|
|
248 | (3) |
|
Identify Common Issues with Implementing Wireless Networks (Including Interfaces and Misconfigurations) |
|
|
251 | (1) |
|
|
252 | (2) |
|
Answers to Review Questions |
|
|
254 | (1) |
|
Chapter 6 Identify Security Threats to a Network and Describe General Methods to Mitigate Those Threats |
|
|
255 | (14) |
|
Describe Today's Increasing Network Security Threats and Explain the Need to Implement a Comprehensive Security Policy to Mitigate the Threats |
|
|
256 | (4) |
|
Explain General Methods to Mitigate Common Security Threats to Network Devices, Hosts, and Applications |
|
|
260 | (1) |
|
Describe the Functions of Common Security Appliances and Applications |
|
|
261 | (3) |
|
Describe Security Recommended Practices, Including Initial Steps to Secure Network Devices |
|
|
264 | (2) |
|
|
266 | (2) |
|
Answers to Review Questions |
|
|
268 | (1) |
|
Chapter 7 Implement, Verify, and Troubleshoot NAT and ACLs in a Medium-Sized Enterprise Branch Office Network |
|
|
269 | (30) |
|
Describe the Purpose and Types of ACLs |
|
|
270 | (1) |
|
Configure and Apply ACLs Based on Network Filtering Requirements (Including CLI/SDM) |
|
|
270 | (13) |
|
Configure and Apply ACLs to Limit Telnet and SSH Access to the Router Using (Including SDM/CLI) |
|
|
283 | (2) |
|
Verify and Monitor ACLs in a Network Environment |
|
|
285 | (3) |
|
|
288 | (1) |
|
Explain the Basic Operation of NAT |
|
|
288 | (2) |
|
Configure NAT for Given Network Requirements Using (Including CLI/SDM) |
|
|
290 | (3) |
|
|
293 | (2) |
|
|
295 | (2) |
|
Answers to Review Questions |
|
|
297 | (2) |
|
Chapter 8 Implement and Verify WAN Links |
|
|
299 | (26) |
|
Describe Different Methods for Connecting to a WAN |
|
|
300 | (1) |
|
Configure and Verify a Basic WAN Serial Connection |
|
|
301 | (3) |
|
Configure and Verify Frame Relay on Cisco Routers |
|
|
304 | (6) |
|
Troubleshoot WAN Implementation Issues |
|
|
310 | (4) |
|
Describe VPN Technology (Including Importance, Benefits, Role, Impact, and Components) |
|
|
314 | (1) |
|
Configure and Verify a PPP Connection between Cisco Routers |
|
|
315 | (4) |
|
|
319 | (4) |
|
Answers to Review Questions |
|
|
323 | (2) |
Appendix About the Companion CD |
|
325 | (4) |
Index |
|
329 | |