Muutke küpsiste eelistusi

CCNP 2: Remote Access Companion Guide (Cisco Networking Academy Program) 2nd edition [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 640 pages, kõrgus x laius x paksus: 203x242x41 mm, kaal: 1379 g, Contains 1 Hardback and 1 CD-ROM
  • Ilmumisaeg: 26-Aug-2004
  • Kirjastus: Cisco Press
  • ISBN-10: 1587131455
  • ISBN-13: 9781587131455
Teised raamatud teemal:
  • Multiple-component retail product
  • Hind: 89,39 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, 640 pages, kõrgus x laius x paksus: 203x242x41 mm, kaal: 1379 g, Contains 1 Hardback and 1 CD-ROM
  • Ilmumisaeg: 26-Aug-2004
  • Kirjastus: Cisco Press
  • ISBN-10: 1587131455
  • ISBN-13: 9781587131455
Teised raamatud teemal:
The only authorized textbook for the Cisco Networking Academy Program.

This book provides the following reference, study, and review tools:





Each chapter has a list of objectives referencing the key concepts for focused study. Key terms are highlighted in color throughout the chapter where they are used in context. The definitions are provided in a comprehensive glossary to serve as a study aid. Check Your Understanding review questions, presented at the end of each chapter, act as a review and study guide. They reinforce the concepts introduced in the chapter and help test your understanding before you move on to a new chapter. The answers to the questions are provided in an appendix.

Throughout this book, you see references to the lab activities found in the Cisco Networking Academy Program CCNP 2: Remote Access Lab Companion, Second Edition. Completing these labs gives you hands-on experience so that you can apply theory to practice.

This Cisco authorized textbook is a portable desk reference designed to complement the CCNP 2: Remote Access course in the Cisco Networking Academy Program.

CCNP 2: Remote Access is one of four courses leading to the CCNP certification. CCNP 2 introduces you to the implementation of Cisco routers in WAN applications. The course focuses on selecting and implementing the appropriate Cisco IOS services required to build intranet remote-access links.

Cisco Networking Academy Program CCNP 2: Remote Access Companion Guide, Second Edition, contains all the information from the online curriculum, plus pedagogical aids to help you study. Use this Companion Guide to help prepare for the Building Cisco Remote Access Networks exam (BCRAN 642-821), which is one of the four required exams to obtain the CCNP certification.

You will develop skills with specific WAN technologies including analog dialup, ISDN BRI and PRI, Frame Relay, broadband, and VPN. In addition, the course details important remote-access techniques such as NAT, AAA, and queuing and compression.

With Cisco Networking Academy Program CCNP 2: Remote Access Companion Guide, Second Edition, you have access to the course information anytime, anywhere.

Companion Title: Cisco Networking Academy Program CCNP 2: Remote Access Lab Companion Second Edition ISBN: 1-58713-146-3

Companion CD-ROM The CD-ROM included with this book provides Interactive Media Activities referred to throughout the book, a test engine of more than 200 questions, and Study Guides for each chapter to enhance your learning experience.

This book is part of the Cisco Networking Academy Program Series from Cisco Press. The products in this series support and complement the Cisco Networking Academy Program.

Muu info

This is the only Cisco-approved textbook for CCNP 2 Remote Access course of the Cisco Networking Academy Program online curriculum. This portable desk reference supports the web-based curriculum, and reinforces concepts pertaining to CCNP BCRAN certification exam. The second edition maps to the most current version of the Web-based curriculum, and contains new information on VPN concepts and configuration and broadband concepts and configuration. The companion CD-ROM includes exclusive enrichment materials such as interactive e-Lab activities, animations, and CCNP BCRAN questions that prepare you for the practical portion of the CCNP BCRAN exam. Each chapter contains chapter objectives, review questions, and summaries to assist the students in reviewing the concepts and studying. A command summary adds to the students understanding of commands used to configure Cisco routers and references the chapters in which the commands appear.
Foreword xxi
Introduction xxiii
Wide-Area Networks
3(36)
Remote Access
4(12)
WAN Connection Types
5(1)
Dedicated Connections
6(4)
Circuit-Switched Connections
10(1)
Asynchronous Dialup Connections
11(1)
ISDN Connections
12(1)
Packet-Switched Networks
13(2)
WAN Protocols
15(1)
Selecting Appropriate WAN Technologies
16(6)
Choosing a WAN Connections
16(2)
Identifying Site Requirements and Solutions
18(1)
Central Site Considerations
18(1)
Branch Office Considerations
19(2)
Telecommuter Site Considerations
21(1)
Selecting Cisco Remote-Access Solutions
22(2)
Fixed Interfaces
22(1)
Modular Interfaces
23(1)
Selecting Site-Specific WAN Components
24(8)
Network Overview
24(1)
Central Site Router Equipment
25(3)
Branch Office Router Equipment
28(3)
Telecommuter Site Router Equipment
31(1)
Basic Router Configuration Lab Exercises
32(1)
Summary
33(1)
Key Terms
34(1)
Check Your Understanding
35(4)
Moderns and Asynchronous Dialup Connections
39(58)
Modem Functions
39(19)
Digital-to-Analog Conversion
40(1)
Role of the Modem
41(1)
Modem Signaling and Cabling
42(2)
The EIA/TIA-232-C Standard
44(2)
Modem Control Group
46(1)
Data Flow Control Group
47(1)
Data Transfer Group
47(1)
DTE Communication Termination
47(1)
Modem Cabling Components
48(2)
Connecting a Modem to a Router
50(1)
Connecting to the AUX Port
51(1)
Connecting to the Console Port
51(1)
Connecting to a Serial Interface
51(1)
Connecting a Modem to an Access Server---Async Lines
52(1)
Connecting a Modem to a PC
52(1)
Directly Connecting a DTE to Another DTE---Null Modem Cable
53(2)
Modem Modulation Standards
55(1)
Error Control and Data Compression
56(2)
Configuring Asynchronous Interfaces and Terminal Lines
58(19)
Connecting to the Modem---Reverse Telnet
58(3)
Line Types and Numbering
61(4)
Configuring Reverse Telnet
65(2)
Asynchronous Interfaces and Line Configuration
67(2)
Basic Terminal Line Configuration
69(2)
Basic Auxiliary Port Configuration
71(1)
Configurating the Console Port to Use a Modem
72(1)
Configuring a Serial Interface to Use a Modem
73(1)
Configuring Asynchronous Interfaces
73(1)
Asynchronous Interface Configuration Example
74(2)
Introduction to DDR---Dialer List
76(1)
Modem Configuration
77(11)
Modem Configuration Methods
78(1)
Manual Configuration of Modems with Standard Commands
79(1)
Manual Configuration of Modems with Nonstandard Modem Commands
80(1)
Modem Initialization Strings
81(1)
Automatic Configuration of Modems
81(1)
Modem Capability Database
81(1)
Modem Autodiscovery
82(1)
Modem Autoconfiguration
83(1)
Fine-Tuning Modem Autoconfiguration
84(1)
Chat Scripts for Async Lines
85(1)
Configuring Asynchronous Connections Between Remote Routers
86(2)
Verifying Modem Configuration
88(2)
Verifying and Debugging Modem Autoconfiguration
89(1)
Troubleshooting Modem Autoconfiguration
89(1)
Summary
90(1)
Key Terms
91(1)
Check Your Understanding
92(5)
PPP Overview
97(42)
PPP Overview
97(12)
Point-to-Point Links
98(1)
PPP Architecture
99(2)
Configuring PPP
101(1)
Dialup PPP versus Dialup EXEC Sessions
101(1)
Synchronous PPP Connection
102(1)
Asynchronous PPP Connection
102(1)
Configuring Dedicated PPP Sessions
103(1)
Configuring Interactive PPP Sessions
103(3)
Configuring the Interface Addressing Method for Local Devices
106(1)
Configuring the Interface Addressing Method for Remote Devices
107(1)
PPP LCP Options
107(2)
PPP Authentication
109(6)
PAP and CHAP Authentication
109(1)
PAP Is Not as Secure as CHAP
109(2)
Configuring PAP Authentication
111(2)
Configuring CHAP Authentication
113(1)
Configuring CHAP and PAP Authentication
114(1)
PPP Callback
115(6)
Dialup PPP Callback Overview
115(1)
PPP Callback Operation
115(3)
Configuring the Callback Server
118(2)
Configuring the Callback Client
120(1)
PPP Compression
121(4)
Data Compression
121(2)
Configuring Compression
123(1)
Verifying Compression
123(1)
Uncompressed Bytes
124(1)
Throughput Ratio
124(1)
Buffer Allocation
124(1)
Bytes Transmitted
124(1)
Bytes Received
124(1)
Interpreting the show compress Output
124(1)
PPP Multilink
125(3)
PPP Multilink Overview
125(1)
MLP Operation and Configuration
126(1)
Multilink PPP Example
127(1)
Verifying PPP Configuration
128(4)
Verifying and Troubleshooting PPP
129(1)
PPP Configuration Example
130(2)
Summary
132(1)
Key Terms
133(1)
Check Your Understanding
133(6)
ISDN and DDR
139(64)
ISDN Architecture
140(10)
ISDN versus Asynchronous Dialup
140(1)
ISDN Services and Channelized El and Tl
141(2)
BRI Call Processing
143(1)
BRI Functional Groups and Reference Points
144(2)
Physical Representation of BRI Reference Points
146(3)
PRI Reference Points
149(1)
ISDN Protocol Layers
150(5)
ISDN Layer 1
150(1)
ISDN Layer 2---Q.921
150(2)
ISDN Layer 3---Q.931
152(1)
ISDN Call Setup
153(1)
ISDN Call Teardown
154(1)
Configuring ISDN BRI
155(5)
ISDN BRI Configuration Overview
155(1)
Configuring the ISDN Switch Type
156(1)
Configuring the SPIDs
157(2)
Configuring the Encapsulation Protocol
159(1)
Configuring Dial-on-Demand Routing (DDR)
160(5)
DDR Configuration Overview
160(1)
Defining Interesting Traffic
160(2)
Assigning the Dialer List to an Interface
162(1)
Defining Destination Parameters
162(1)
Defining Optional Call Parameters
163(2)
Static and Default Routing
165(10)
Use of Static and Default Routes
165(1)
Configuring Static Routes
166(1)
Configuring Default Routes
167(1)
Configuring Route Redistribution
168(1)
Deactivating Routing Updates
169(1)
Snapshot Routing
170(1)
Snapshot Routing Model
171(1)
Enabling Snapshot Routing
172(1)
Snapshot Routing Configuration Example
173(2)
Optional Configurations
175(7)
B Channel Aggregation
175(1)
Cisco Proprietary BOD
176(1)
Multilink PPP
177(1)
ISDN Caller Identification
178(1)
Called-Party Number Answering
179(1)
ISDN Rate Adaptation
180(1)
ISDN BRI Configuration Example
181(1)
Monitoring the ISDN Interface
182(5)
The show interface bri Command
182(1)
ISDN show Commands
183(2)
Verifying and Troubleshooting PPP Multilink
185(1)
ISDN debug Command
186(1)
Configuring ISDN PRI
187(11)
PRI Configuration Tasks
187(1)
Selecting the PRI Switch
188(1)
Configuring the Tl/El Controller for PRI
189(2)
Additional ISDN PRI Configuration Parameters
191(1)
PRI Configuration Example
192(1)
ISDN BRI to PRI Connection Example Using DDR
193(5)
Summary
198(1)
Key Terms
199(1)
Check Your Understanding
200(3)
Dialer Profiles
203(30)
Legacy DDR
203(11)
Legacy DDR with a Single Destination
203(2)
Legacy DDR with Multiple Destinations
205(3)
Rotary Group Overview
208(1)
Using Rotary Groups
209(1)
Configuring Rotary Groups
210(1)
Configuring ISDN for Rotary Groups
211(1)
Asynchronous Interface Groups
212(1)
Legacy DDR Limitations
213(1)
Dialer Profiles
214(13)
Overview of Dialer Profiles
214(2)
Configuring Dialer Profiles
216(2)
Dialer Pools
218(1)
Placing Calls with Dialer Profiles
219(1)
Receiving Calls with Dialer Profiles
220(2)
Using Dialer Profiles with ISDN B Channels
222(1)
Using Dialer Profiles with ISDN PRI
223(2)
Dialer Map Class
225(2)
Summary
227(1)
Key Terms
228(1)
Check Your Understanding
229(4)
Frame Relay
233(28)
Frame Relay Concepts
233(10)
Frame Relay Overview
234(1)
Frame Relay Devices
235(1)
Frame Relay Operation
235(2)
Frame Relay DLCIs
237(3)
Frame Relay LMI
240(2)
Inverse ARP
242(1)
Configuring Frame Relay
243(6)
Configuring Frame Relay Encapsulation
243(1)
Configuring Frame Relay Maps
244(2)
Configuring Encapsulation per PVC
246(1)
Verifying Frame Relay Interface Configuration
246(2)
Verifying Frame Relay Operation
248(1)
Frame Relay Topologies
249(6)
Frame Relay Topologies
249(1)
Reachability Issues with Routing Updates
250(2)
Solution for Split Horizon Issue---Subinterfaces
252(1)
Configuring Frame Relay Subinterfaces
253(2)
Summary
255(1)
Key Terms
256(2)
Check Your Understanding
258(3)
Managing Frame Relay Traffic
261(26)
Frame Relay Traffic Shaping
262(17)
Frame Relay Traffic Shaping Terminology
262(1)
Overview of Frame Relay Traffic Shaping
263(2)
Types of Frame Relay Traffic Management
265(1)
Configuring Traffic Shaping over Frame Relay
265(2)
Traffic Shaping Configuration Steps
267(2)
Traffic Shaping through Rate Enforcement
269(3)
Traffic Shaping through Rate Dynamic Enforcement
272(1)
Traffic Shaping with Queuing
273(3)
Verifying Frame Relay Traffic Shaping
276(3)
On Demand Routing
279(2)
ODR Overview
279(1)
Configuring ODR
280(1)
Summary
281(1)
Key Terms
282(1)
Check Your Understanding
282(5)
WAN Backup
287(28)
Dial Backup
287(6)
Configuring Dial Backup
287(2)
Example of Dial Backup for Link Failure
289(1)
Activating a Dial Backup to Support Primary Line Traffic
290(2)
Example of Dial Backup for Excessive Traffic Load
292(1)
Backup Interface Operations
293(6)
Standby Mode
293(1)
Dialer Profiles as Backup Interfaces
294(1)
Configuring Dial Backups with Dialer Profiles
295(4)
Routing with the Load-Backup Feature
299(3)
Load Backup with OSPF
299(2)
Load Backup with IGRP and EIGRP
301(1)
Verifying Dial Backup Configuration
302(2)
show interface type slot/port Command
302(2)
Floating Static Routes
304(2)
Configuring Floating Static Routes as Backup
304(2)
Dialer Watch
306(2)
Dialer Watch Overview
306(1)
Configuring Dialer Watch
307(1)
Summary
308(1)
Key Terms
309(1)
Check Your Understanding
310(5)
Managing Network Performance with Queuing and Compression
315(34)
Queuing
315(5)
Queuing Overview
315(1)
Effective Use of Traffic Prioritization
316(1)
Establishing a Queuing Policy
317(1)
Choosing a Cisco IOS Queuing Option
318(2)
Configuring Weighted Fair Queuing
320(5)
WFQ Overview
320(2)
WFQ Operation
322(2)
Configuring WFQ
324(1)
Class-Based Weighted Fair Queuing
325(8)
Class-Based WFQ Overview
325(1)
CBWFQ versus Flow-Based WFQ
326(1)
CBWFQ and Tail Drops
326(1)
Weighted Random Early Detect
327(2)
Configuring CBWFQ---Step 1
329(1)
Configuring CBWFQ---Step 2
330(1)
Configuring CBWFQ with WRED---Step 2
331(1)
Configuring CBWFQ Default Class---Step 2
331(1)
Configuring CBWFQ---Step 3
332(1)
CBWFQ Queuing Examples
332(1)
Configuring Low-Latency Queuing
333(2)
LLQ
333(1)
Configuring LLQ
334(1)
Verifying Queuing Operation
335(2)
Verifying Queuing Operation Overview
335(1)
Queuing Comparison Summary
335(2)
Optimizing Traffic Flow with Data Compression
337(5)
Implementing Compression Overview
337(1)
Implementing Link Compression over a Point-to-Point Connection
338(1)
Implementing Payload Compression
339(1)
Using TCP/IP Header Compression
340(1)
Implementing MPPC
340(1)
Other Compression Considerations
341(1)
Configuring Data Compression
342(1)
Summary
342(1)
Key Terms
343(1)
Check Your Understanding
344(5)
Scaling IP Addresses with NAT
349(30)
NAT Overview
350(4)
NAT Topology
350(2)
Private Addressing
352(1)
NAT Terminology
353(1)
NAT Functions
354(1)
Configuring NAT
354(14)
Dynamic NAT
355(1)
Configuring Dynamic NAT
355(1)
Dynamic NAT Configuration Example
356(2)
Static NAT
358(1)
Configuring Static NAT
359(1)
NAT Overload
359(2)
Configuring NAT Overload
361(1)
TCP Load Distribution
362(1)
Configuring TCP Load Distribution
363(1)
TCP Load Distribution Configuration Example
364(1)
Overlapping Networks
364(4)
Verifying NAT Configuration
368(2)
Verifying NAT Translations
368(1)
Troubleshooting NAT Translations
369(1)
Clearing NAT Translations
370(1)
NAT Considerations
370(2)
NAT Advantages
370(1)
NAT Disadvantages
371(1)
Traffic Types Supported by Cisco
371(1)
Summary
372(1)
Key Terms
373(1)
Check Your Understanding
374(5)
Using AAA to Scale Access Control
379(32)
AAA Overview
379(7)
Introduction to AAA
380(1)
Security Protocols
381(1)
TACACS+
382(1)
Radius
383(1)
CiscoSecure Access Control Server
383(3)
Configuring AAA
386(18)
The aaa new-model Command
386(1)
Configuring TACACS+ and RADIUS Clients
386(3)
Configuring AAA Authentication
389(2)
Configuring Login Authentication
391(3)
Enabling Password Protection at the Privileged Level
394(1)
Configuring PPP Authentication Using AAA
395(2)
Configuring AAA Authorization
397(3)
IOS Command Privilege Levels
400(1)
Configuring Command Authorization
400(1)
Configuring AAA Accounting
401(3)
Summary
404(1)
Key Terms
405(1)
Check Your Understanding
406(5)
Broadband Connections
411(42)
Broadband Overview
411(5)
Why Broadband?
411(1)
Cable Options
412(1)
DSL Options
412(1)
Satellite Options
413(1)
Wireless Options
414(2)
Cable Technology
416(10)
The Original Cable Plant
416(1)
Data Over Cable
417(2)
Hybrid Fiber-Coaxial (HFC) Architecture
419(1)
Digital Signals over RF Channels
420(2)
Identifying Cable Technology Terms
422(1)
Cable Standards and Organizations
422(1)
RF Signaling Terms
423(1)
Putting Cable Technology All Together
424(1)
Process for Provisioning a Cable Modem
425(1)
DSL Technology
426(12)
What Is DSL?
426(1)
Types of DSL
427(1)
DSL Limitations
428(1)
ADSL
429(1)
ADSL and POTS Coexistence
430(1)
ADSL Channels and Encoding
431(1)
Data over ADSL with Bridging
432(2)
Data Over ADSL: PPPoE
434(1)
How Does PPPoE Work?
435(2)
Data over ADSL with PPPoA
437(1)
Configuring the CPE as the PPPoE Client
438(4)
Configuration Tasks for DSL
438(1)
Configure PPPoE in a VPDN Group
438(1)
Configuring a PPPoE Client
439(1)
Configure the PPPoE DSL Dialer Interface
439(1)
Configuring PAT
440(1)
PAT for Use with DSL Example
441(1)
Using DHCP to Scale DSL
442(1)
Configuring a Static Default Route
442(1)
Configuring DSL with PPPoA
442(2)
Configuration Tasks for DSL
442(1)
DSL Modulation Configuration
443(1)
Configure the DSL ATM Interface
443(1)
Configure the DSL Dialer Interface
443(1)
Troubleshooting DSL
444(3)
Determining the Layer to Troubleshoot
444(1)
Layer 1 Issues
445(1)
Cisco 827 xDSL Port Pinouts
445(1)
Is the ATM Interface in an Administratively Down State?
446(1)
Is the Correct Power Supply Being Used?
446(1)
Is the DSL Operating Mode Correct?
446(1)
Layer 2 Issues
446(1)
Is Data Being Received from the ISP?
446(1)
Is PPP Negotiating Properly?
447(1)
Summary
447(1)
Key Terms
448(1)
Check Your Understanding
449(4)
Virtual Private Networks
453(64)
VPN Overview: Types, Tunnels, and Terms
453(13)
VPN Overview
453(3)
Tunneling and Encryption
456(1)
VPN Usage Scenarios
457(3)
Selecting VPN Technologies
460(2)
Layer 2 Tunneling Protocol (L2TP)
462(1)
Cisco Generic Routing Encapsulation (GRE)
462(1)
IP Security Protocol (IPSec)
463(1)
Identifying VPN and IPSec Terms
464(2)
Cisco IOS Cryptosystem Overview
466(6)
Cryptosystem Overview
466(1)
Symmetric Encryption
467(2)
Asymmetric Encryption
469(1)
Key Exchange---Diffie-Hellman Algorithm
470(1)
Hashing
470(2)
IPSec Technologies
472(9)
IPSec
472(1)
Authentication Header
472(1)
Encapsulating Security Payload
473(1)
Tunnel versus Transport Mode
474(1)
Security Association
475(1)
Five Steps to IPSec
476(1)
How IPSec Uses IKE
477(2)
IKE and IPSec Flowchart
479(1)
Tasks to Configure IPSec
480(1)
Task 1 --- Prepare for IKE and IPSec
481(10)
Step 1 --- Determine IKE (IKE Phase 1) Policy
482(1)
IKE Phase 1 Policy Parameters
482(1)
Create IKE Policies for a Purpose
483(1)
Define IKE Policy Parameters
483(1)
IKE Policy Parameters
483(1)
Step 2 --- Determine IPSec (IKE Phase 2) Policy
484(1)
IPSec Transforms Supported in Cisco IOS Software
485(1)
Authentication Header
485(1)
Encapsulating Security Payload
485(2)
IPSec Policy Example
487(1)
Identify IPSec Peers
488(1)
Step 3---Check Current Configuration
488(2)
Step 4---Ensure the Network Works
490(1)
Step 5---Ensure ACLs Are Compatible with IPSec
490(1)
Task 2---Configure IKE
491(6)
Step 1---Enable IKE
492(1)
Step 2---Create IKE Policies
492(1)
Create IKE Policies with the crypto isakmp Command
492(2)
IKE Policy Negotiation
494(1)
Step 3---Configure ISAKMP Identity
494(2)
Step 4---Configure Preshared Keys
496(1)
Step 5---Verify IKE Configuration
497(1)
Task 3---Configure IPSec
497(10)
Step 1---Configure Transform Set Suites
498(1)
Transform Set Negotiation
499(1)
Step 2---Configure Global IPSec Security Association Lifetimes
500(1)
Purpose of Crypto ACLs
501(1)
Step 3---Create Crypto ACLs Using Extended Access Lists
501(1)
Configure Symmetrical Peer Crypto ACLs
501(1)
Purpose of Crypto Maps
502(1)
Crypto Map Parameters
503(1)
Step 4---Configure IPSec Crypto Maps
503(1)
Example crypto map Commands
504(1)
Step 5---Apply Crypto Maps to Interfaces
505(1)
IPSec Configuration Examples
505(2)
Task 4---Test and Verify IPSec
507(3)
The show crypto isakmp policy Command
507(1)
The show crypto ipsec transform-set Command
507(1)
The show crypto ipsec sa Command
507(1)
The show crypto map Command
508(1)
The clear Commands
508(1)
The debug crypto Commands
509(1)
Crypto System Error Messages for ISAKMP
509(1)
Summary
510(1)
Key Terms
511(1)
Check Your Understanding
512(5)
Appendix A Glossary of Key Terms 517(14)
Appendix B Check Your Understanding Answer Key 531(34)
Appendix C Case Studies 565(10)
Index 575
Cisco Press is a collaboration between Cisco Systems, Inc., and Pearson Education that is charged with developing high-quality, cutting-edge educational and reference products for the networking industry. The products in the Cisco Networking Academy Program series are designed to prepare students for careers in the exciting networking field. These products have proven to be strong supplements to the web-based curriculum and are the only print companions that have been reviewed and endorsed by Cisco Systems for Cisco Networking Academy Program use.