Introduction |
|
xvii | |
Chapter 1 Operation of IP Data Networks |
|
1 | (54) |
|
Operation of IP Data Networks |
|
|
2 | (1) |
|
|
3 | (1) |
|
Recognize the Purpose and Functions of Various Network Devices Such as Routers, Switches, Bridges, and Hubs |
|
|
3 | (4) |
|
|
6 | (1) |
|
Select the Components Required to Meet a Given Network Specification |
|
|
7 | (2) |
|
|
9 | (1) |
|
Identify Common Applications and Their Impact on the Network |
|
|
9 | (9) |
|
|
18 | (1) |
|
Describe the Purpose and Basic Operation of the Protocols in the OSI and TCP/IP Models |
|
|
18 | (15) |
|
|
18 | (1) |
|
Advantages of Reference Models |
|
|
19 | (1) |
|
|
19 | (13) |
|
|
32 | (1) |
|
Predict the Data Flow between Two Hosts across a Network |
|
|
33 | (9) |
|
|
35 | (6) |
|
|
41 | (1) |
|
Identify the Appropriate Media, Cables, Ports, and Connectors to Connect Cisco Network Devices to Other Network Devices and Hosts in a LAN |
|
|
42 | (9) |
|
|
43 | (6) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (4) |
Chapter 2 LAN Switching Technologies |
|
55 | (80) |
|
Determine the Technology and Media Access Control Method for Ethernet Networks |
|
|
57 | (4) |
|
|
57 | (2) |
|
Half- and Full-Duplex Ethernet |
|
|
59 | (2) |
|
|
61 | (1) |
|
Identify Basic Switching Concepts and the Operation of Cisco Switches |
|
|
61 | (7) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (3) |
|
|
67 | (1) |
|
Configure and Verify Initial Switch Configuration Including Remote Access Management |
|
|
68 | (21) |
|
Cisco IOS Commands to Perform Basic Switch Setup |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (2) |
|
Editing and Help Features |
|
|
72 | (5) |
|
Administrative Configurations |
|
|
77 | (10) |
|
|
87 | (2) |
|
Verify Network Status and Switch Operation Using Basic Utilities Such as Ping, Telnet, and SSH |
|
|
89 | (5) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
|
Identify Enhanced Switching Technologies |
|
|
94 | (6) |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
Describe How VLANs Create Logically Separate Networks and the Need for Routing between Them |
|
|
100 | (7) |
|
|
102 | (1) |
|
Explain Network Segmentation and Basic Traffic Management Concepts |
|
|
103 | (1) |
|
|
104 | (2) |
|
VLAN Identification Methods |
|
|
106 | (1) |
|
|
107 | (1) |
|
Configure and Verify VLANs |
|
|
107 | (5) |
|
Assigning Switch Ports to VLANs |
|
|
110 | (2) |
|
|
112 | (1) |
|
Configure and Verify Trunking on Cisco Switches |
|
|
112 | (6) |
|
Defining the Allowed VLANs on a Trunk |
|
|
114 | (1) |
|
Changing or Modifying the Trunk Native VLAN |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
Configure and Verify PVSTP Operation |
|
|
118 | (14) |
|
Describe Root Bridge Election |
|
|
124 | (6) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (3) |
Chapter 3 IP Addressing (IPv4/IPv6) |
|
135 | (28) |
|
Describe the Operation and Necessity of Using Private and Public IP Addresses for IPv4 Addressing |
|
|
136 | (7) |
|
|
136 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
137 | (5) |
|
Private IP Addresses (RFC 1918) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Identify the Appropriate IPv6 Addressing Scheme to Satisfy Addressing Requirements in a LAN/WAN Environment |
|
|
143 | (2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Identify the Appropriate IPv4 Addressing Scheme Using VLSM and Summarization to Satisfy Addressing Requirements in a LAN/WAN Environment |
|
|
145 | (5) |
|
|
147 | (1) |
|
Implementing VLSM Networks |
|
|
147 | (1) |
|
|
148 | (2) |
|
Describe the Technological Requirements for Running IPv6 in Conjunction with IPv4 Such as Dual Stack |
|
|
150 | (6) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (5) |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (2) |
Chapter 4 IP Routing Technologies |
|
163 | (102) |
|
Describe Basic Routing Concepts |
|
|
166 | (3) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Describe the Boot Process of Cisco IOS Routers |
|
|
169 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
Configure and Verify Utilizing the CLI to Set Basic Router Configuration |
|
|
171 | (15) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (2) |
|
Cisco IOS Commands to Perform Basic Router Setup |
|
|
174 | (8) |
|
Encrypting Your Passwords |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Configure and Verify Operation Status of a Device Interface, Both Serial and Ethernet |
|
|
186 | (9) |
|
|
189 | (5) |
|
|
194 | (1) |
|
Verify Router Configuration and Network Connectivity |
|
|
195 | (10) |
|
Cisco IOS Commands to Review Basic Router Information and Network Connectivity |
|
|
195 | (10) |
|
|
205 | (1) |
|
Configure and Verify Routing Configuration for a Static or Default Route Given Specific Routing Requirements |
|
|
205 | (3) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (19) |
|
|
209 | (6) |
|
|
215 | (5) |
|
|
220 | (6) |
|
|
226 | (1) |
|
Differentiate Methods of Routing and Routing Protocols |
|
|
227 | (4) |
|
|
227 | (1) |
|
Link State vs. Distance Vector |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Configure and Verify OSPF (Single Area) |
|
|
231 | (15) |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (1) |
|
|
238 | (5) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Configure and Verify EIGRP (Single AS) |
|
|
246 | (8) |
|
Feasible Distance/Feasible Successors/Administrative Distance |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Configure and Verify InterVLAN Routing (Router on a Stick) |
|
|
254 | (6) |
|
|
258 | (1) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
|
260 | (2) |
|
|
261 | (1) |
|
|
262 | (3) |
Chapter 5 IP Services |
|
265 | (42) |
|
Configure and Verify DHCP (IOS Router) |
|
|
267 | (2) |
|
Configuring Router Interfaces to Use DHCP |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Describe the Types, Features, and Applications of ACLs |
|
|
269 | (3) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Configure and Verify ACLs in a Network Environment |
|
|
272 | (4) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Identify the Basic Operation of NAT |
|
|
276 | (4) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Configure and Verify NAT for Given Network Requirements |
|
|
280 | (5) |
|
|
280 | (1) |
|
Dynamic NAT Configuration |
|
|
281 | (1) |
|
PAT (Overloading) Configuration |
|
|
282 | (1) |
|
Simple Verification of NAT |
|
|
282 | (1) |
|
|
283 | (2) |
|
Configure and Verify NTP as a Client |
|
|
285 | (2) |
|
|
286 | (1) |
|
Recognize High Availability (FHRP) |
|
|
287 | (9) |
|
|
289 | (1) |
|
|
289 | (4) |
|
|
293 | (3) |
|
|
296 | (1) |
|
Configure and Verify Syslog |
|
|
296 | (5) |
|
|
298 | (3) |
|
|
301 | (1) |
|
|
301 | (3) |
|
|
303 | (1) |
|
|
304 | (3) |
Chapter 6 Network Device Security |
|
307 | (34) |
|
Configure and Verify Network Device Security Features |
|
|
309 | (7) |
|
|
309 | (1) |
|
Enable Secret vs. Enable Password |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
Describe External Authentication Methods |
|
|
315 | (1) |
|
|
316 | (1) |
|
Configure and Verify Switch Port Security Features |
|
|
316 | (6) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
Assign Unused Ports to an Unused VLAN |
|
|
321 | (1) |
|
Setting Native VLAN to Other than VLAN 1 |
|
|
321 | (1) |
|
|
321 | (1) |
|
Configure and Verify ACLs to Filter Network Traffic |
|
|
322 | (13) |
|
|
335 | (1) |
|
Configure and Verify ACLs to Limit Telnet and SSH Access to the Router |
|
|
335 | (2) |
|
|
336 | (1) |
|
|
337 | (4) |
Chapter 7 Troubleshooting |
|
341 | (98) |
|
Identify and Correct Common Network Problems |
|
|
344 | (11) |
|
|
355 | (1) |
|
|
355 | (3) |
|
|
357 | (1) |
|
Troubleshoot and Correct Common Problems Associated with IP Addressing and Host Configurations |
|
|
358 | (4) |
|
|
361 | (1) |
|
Troubleshoot and Resolve VLAN Problems |
|
|
362 | (3) |
|
Identify That VLANs Are Configured |
|
|
362 | (1) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
Troubleshoot and Resolve Trunking Problems on Cisco Switches |
|
|
365 | (3) |
|
|
365 | (1) |
|
Correct Encapsulation Configured |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
Troubleshoot and Resolve Spanning Tree Operation Issues |
|
|
368 | (3) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
370 | (1) |
|
Troubleshoot and Resolve Routing Issues |
|
|
371 | (3) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (1) |
|
Troubleshoot and Resolve OSPF Problems |
|
|
374 | (7) |
|
|
378 | (1) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
Troubleshoot and Resolve EIGRP Problems |
|
|
381 | (12) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
389 | (2) |
|
|
391 | (2) |
|
|
393 | (1) |
|
Troubleshoot and Resolve InterVLAN Routing Problems |
|
|
393 | (9) |
|
|
393 | (5) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (2) |
|
|
402 | (1) |
|
Troubleshoot and Resolve ACL Issues |
|
|
402 | (3) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
Troubleshoot and Resolve WAN Implementation Issues |
|
|
405 | (13) |
|
|
407 | (1) |
|
|
407 | (4) |
|
|
411 | (7) |
|
|
418 | (1) |
|
Troubleshoot and Resolve Layer 1 Problems |
|
|
418 | (11) |
|
|
418 | (2) |
|
Verifying Your Interfaces |
|
|
420 | (5) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Verifying Interface Configuration |
|
|
426 | (3) |
|
|
429 | (1) |
|
Monitor NetFlow Statistics |
|
|
429 | (2) |
|
|
431 | (1) |
|
Troubleshoot EtherChannel Problems |
|
|
431 | (4) |
|
|
434 | (1) |
|
|
435 | (4) |
Chapter 8 WAN Technologies |
|
439 | (34) |
|
Identify Different WAN Technologies |
|
|
440 | (4) |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Configure and Verify a Basic WAN Serial Connection |
|
|
444 | (2) |
|
|
446 | (1) |
|
Configure and Verify a PPP Connection between Cisco Routers |
|
|
446 | (6) |
|
Configuring PPP on Cisco Routers |
|
|
446 | (1) |
|
Configuring PPP Authentication |
|
|
446 | (1) |
|
Verifying and Troubleshooting Serial Links |
|
|
447 | (5) |
|
|
452 | (1) |
|
Configure and Verify Frame Relay on Cisco Routers |
|
|
452 | (15) |
|
|
453 | (3) |
|
Frame Relay Implementation and Monitoring |
|
|
456 | (7) |
|
Troubleshooting Frame Relay Networks |
|
|
463 | (4) |
|
|
467 | (1) |
|
Implement and Troubleshoot PPPoE |
|
|
467 | (2) |
|
|
468 | (1) |
|
|
469 | (4) |
Appendix A Answers to Review Questions |
|
473 | (10) |
|
Chapter 1: Operation of IP Data Networks |
|
|
474 | (1) |
|
Chapter 2: LAN Switching Technologies |
|
|
475 | (1) |
|
Chapter 3: IP Addressing (IPv4/IPv6) |
|
|
475 | (1) |
|
Chapter 4: IP Routing Technologies |
|
|
476 | (1) |
|
|
477 | (1) |
|
Chapter 6: Network Device Security |
|
|
478 | (1) |
|
Chapter 7: Troubleshooting |
|
|
479 | (1) |
|
Chapter 8: WAN Technologies |
|
|
480 | (3) |
Appendix B About the Additional Study Tools |
|
483 | (4) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
|
485 | (2) |
|
|
486 | (1) |
Index |
|
487 | |