Muutke küpsiste eelistusi

CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource [Pehme köide]

  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 226x152x23 mm, kaal: 553 g
  • Sari: Portable Command Guide
  • Ilmumisaeg: 08-Jul-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0135768160
  • ISBN-13: 9780135768167
  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 226x152x23 mm, kaal: 553 g
  • Sari: Portable Command Guide
  • Ilmumisaeg: 08-Jul-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0135768160
  • ISBN-13: 9780135768167
All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource
Use this fully updated quick reference resource to help memorize commands and concepts as you earn your CCNP or CCIE certification. Filled with valuable, easy-to-access information, it&;s portable enough to use anywhere.

This guide summarizes all Cisco IOS software commands, keywords, command arguments, and associated prompts associated with the CCNP and CCIE Enterprise Core (ENCOR 350-401) and CCNP Enterprise Advanced Routing and Services (ENARSI 300-410) certification exams. Tips and examples help you apply commands to real-world scenarios, and configuration samples show their use in network designs.
Coverage includes:
  • Layer 2: VLANs, STP, Inter-VLAN Routing
  • Layer 3: EIGRP, OSPF, Redistribution, Path Control, BGP
  • Infrastructure Services and Management
  • Infrastructure Security
  • Network Assurance
  • Wireless Security and Troubleshooting
  • Overlays and Virtualization

This Portable Command Guide provides:
  • Logical how-to topic groupings for a one-stop resource
  • Great for review before your ENCOR 350-401 and ENARSI 300-410 certification exams
  • Compact size makes it easy to carry with you wherever you go
  • &;Create Your Own Journal&; section with blank, lined pages enables you to personalize the book for your needs

This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

About the Authors xvi
Introduction xix
Part I Layer 2 Infrastructure
Chapter 1 Vlans
1(22)
Virtual LANs
1(10)
Creating Static VLANs Using VLAN Configuration Mode
2(1)
Assigning Ports to Data and Voice VLANs
2(1)
Using the range Command
3(1)
Dynamic Trunking Protocol (DTP)
3(1)
Setting the Trunk Encapsulation and Allowed VLANs
4(1)
VLAN Trunking Protocol (VTP)
5(1)
Verifying VTP
6(1)
Verifying VLAN Information
7(1)
Saving VLAN Configurations
7(1)
Erasing VLAN Configurations
7(1)
Configuration Example: VLANs
8(3)
Layer 2 Link Aggregation
11(12)
Interface Modes in EtherChannel
12(1)
Default EtherChannel Configuration
12(1)
Guidelines for Configuring EtherChannel
12(2)
Configuring Layer 2 EtherChannel
14(1)
Configuring Layer 3 EtherChannel
14(1)
Configuring EtherChannel Load Balancing
15(1)
Configuring LACP Hot-Standby Ports
16(1)
Monitoring and Verifying EtherChannel
17(1)
Configuration Example: EtherChannel
18(5)
Chapter 2 Spanning Tree Protocol
23(22)
Spanning Tree Protocol Definition
24(1)
Enabling Spanning Tree Protocol
24(1)
Changing the Spanning-Tree Mode
25(1)
Configuring the Root Switch
25(1)
Configuring a Secondary Root Switch
26(1)
Configuring Port Priority
26(1)
Configuring the Path Cost
27(1)
Configuring the Switch Priority of a VLAN
27(1)
Configuring STP Timers
27(1)
Configuring Optional Spanning-Tree Features
28(5)
PortFast
28(1)
BPDU Guard (2xxx/older 3xxx Series)
29(1)
BPDU Guard (3650/9xxx Series)
29(1)
BPDU Filter
30(1)
UplinkFast
30(1)
BackboneFast
31(1)
Root Guard
31(1)
Loop Guard
32(1)
Unidirectional Link Detection
33(1)
Configuring and Verifying Port Error Conditions
33(3)
Enabling Rapid Spanning Tree
36(1)
Rapid Spanning Tree Link Types
36(1)
Enabling Multiple Spanning Tree
37(2)
Verifying the Extended System ID
39(1)
Verifying STP
39(1)
Troubleshooting Spanning Tree Protocol
40(1)
Configuration Example: PVST+
40(3)
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+
43(2)
Chapter 3 Implementing Inter-VLAN Routing
45(16)
Inter-VLAN Communication Using an External Router: Router-on-a-Stick
45(1)
Inter-VLAN Communication Tips
46(1)
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface
46(1)
Configuring Inter-VLAN Communication on an L3 Switch
47(1)
Removing L2 Switchport Capability of an Interface on an L3 Switch
47(1)
Configuration Example: Inter-VLAN Communication
47(8)
Configuration Example: IPv6 Inter-VLAN Communication
55(6)
Part II Layer 3 Infrastructure
Chapter 4 EIGRP
61(26)
Enhanced Interior Gateway Routing Protocol (EIGRP)
62(1)
Enabling EIGRP for IPv4 Using Classic Mode Configuration
62(1)
Enabling EIGRP for IPv6 Using Classic Mode Configuration
63(1)
EIGRP Using Named Mode Configuration
64(2)
EIGRP Named Mode Subconfiguration Modes
66(1)
Upgrading Classic Mode to Named Mode Configuration
66(1)
EIGRP Router ID
67(1)
Authentication for EIGRP
67(3)
Configuring Authentication in Classic Mode
67(1)
Configuring Authentication in Named Mode
68(2)
Verifying and Troubleshooting EIGRP Authentication
70(1)
Auto-Summarization for EIGRP
70(1)
IPv4 Manual Summarization for EIGRP
70(1)
IPv6 Manual Summarization for EIGRP
71(1)
Timers for EIGRP
71(1)
Passive Interfaces for EIGRP
72(1)
"Pseudo" Passive EIGRP Interfaces
72(1)
Injecting a Default Route into EIGRP: Redistribution of a Static Route
73(1)
Injecting a Default Route into EIGRP: ip default-network
74(1)
Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0
74(1)
Accepting Exterior Routing Information: default-information
75(1)
Equal-cost Load Balancing: maximum-paths
75(1)
Unequal-cost Load Balancing: variance
76(1)
EIGRP Traffic Sharing
76(1)
Bandwidth Use for EIGRP
77(1)
Stub Routing for EIGRP
77(2)
EIGRP Unicast Neighbors
79(1)
EIGRP Wide Metrics
79(1)
Adjusting the EIGRP Metric Weights
80(1)
Verifying EIGRP
80(2)
Troubleshooting EIGRP
82(1)
Configuration Example: EIGRP for IPv4 and IPv6 Using Named Mode
83(4)
Chapter 5 OSPF
87(40)
Comparing OSPFv2 and OSPFv3
88(1)
Configuring OSPF
89(1)
Configuring Multiarea OSPF
89(1)
Using Wildcard Masks with OSPF Areas
90(1)
Configuring Traditional OSPFv3
91(2)
Enabling OSPF for IPv6 on an Interface
91(1)
OSPFv3 and Stub/NSSA Areas
92(1)
Interarea 0SPFv3 Route Summarization
92(1)
Enabling an IPv4 Router ID for OSPFv3
93(1)
Forcing an SPF Calculation
93(1)
OSPFv3 Address Families
93(2)
Configuring the IPv6 Address Family in OSPFv3
94(1)
Configuring the IPv4 Address Family in OSPFv3
94(1)
Applying Parameters in Address Family Configuration Mode
94(1)
Authentication for OSPF
95(3)
Configuring OSPFv2 Authentication: Simple Password
95(1)
Configuring OSPFv2 Cryptographic Authentication: SHA-256
96(1)
Configuring OSPFv3 Authentication and Encryption
97(1)
Verifying OSPFv2 and OSPFv3 Authentication
98(1)
Optimizing OSPF Parameters
98(4)
Loopback Interfaces
98(1)
Router ID
99(1)
DR/BDR Elections
99(1)
Passive Interfaces
100(1)
Modifying Cost Metrics
100(1)
OSPF Reference Bandwidth
101(1)
OSPF LSDB Overload Protection
101(1)
Timers
101(1)
IP MTU
102(1)
Propagating a Default Route
102(1)
Route Summarization
103(1)
Interarea Route Summarization
103(1)
External Route Summarization
103(1)
OSPF Route Filtering
104(1)
Using the filter-list Command
104(1)
Using the area range not-advertise Command
104(1)
Using the distribute-list in Command
104(1)
Using the summary-address not-advertise Command
105(1)
OSPF Special Area Types
105(3)
Stub Areas
105(1)
Totally Stubby Areas
106(1)
Not-So-Stubby Areas (NSSA)
106(1)
Totally NSSA
107(1)
Virtual Links
108(1)
Configuration Example: Virtual Links
108(1)
Verifying OSPF Configuration
109(2)
Troubleshooting OSPF
111(1)
Configuration Example: Single-Area OSPF
111(3)
Configuration Example: Multiarea OSPF
114(3)
Configuration Example: Traditional OSPFv3
117(3)
Configuration Example: OSPFv3 with Address Families
120(7)
Chapter 6 Redistribution and Path Control
127(28)
Defining Seed and Default Metrics
128(1)
Redistributing Connected Networks
129(1)
Redistributing Static Routes
129(1)
Redistributing Subnets into OSPF
130(1)
Assigning El or E2 Routes in OSPF
130(1)
Redistributing OSPF Internal and External Routes
131(1)
Configuration Example: Route Redistribution for IPv4
131(1)
Configuration Example: Route Redistribution for IPv6
132(2)
Verifying Route Redistribution
134(1)
Route Filtering Using the distribute-list Command
134(3)
Configuration Example: Inbound and Outbound Distribute List Route Filters
134(1)
Configuration Example: Controlling Redistribution with Outbound Distribute Lists
135(1)
Verifying Route Filters
136(1)
Route Filtering Using Prefix Lists
137(3)
Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution
139(1)
Verifying Prefix Lists
140(1)
Using Route Maps with Route Redistribution
140(2)
Configuration Example: Route Maps
141(1)
Manipulating Redistribution Using Route Tagging
142(1)
Changing Administrative Distance
143(1)
Path Control with Policy-Based Routing
144(1)
Verifying Policy-Based Routing
145(1)
Configuration Example: PBR with Route Maps
146(1)
Cisco IOS IP SLA
147(3)
Configuring Authentication for IP SLA
149(1)
Monitoring IP SLA Operations
150(1)
PBR with Cisco IOS IP SLA
150(5)
Step 1 Define Probe(s)
151(1)
Step 2 Define Tracking Object(s)
152(1)
Step 3a Define the Action on the Tracking Object(s)
152(1)
Step 3b Define Policy Routing Using the Tracking Object(s)
152(1)
Step 4 Verify IP SLA Operations
152(3)
Chapter 7 BGP
155(30)
Configuring BGP: Classic Configuration
156(1)
Configuring Multiprotocol BGP (MP-BGP)
157(1)
Configuring BGP: Address Families
158(1)
Configuration Example: Using MP-BGP Address Families to Exchange IPv4 and IPv6 Routes
159(1)
BGP Support for 4-Byte AS Numbers
160(1)
BGP Timers
161(1)
BGP and update-source
161(1)
IBGP Next-Hop Behavior
162(1)
EBGP Multihop
162(2)
Attributes
164(10)
Route Selection Decision Process-The BGP Best Path Algorithm
164(1)
Weight Attribute
164(2)
Using AS Path Access Lists to Manipulate the Weight Attribute
166(1)
Using Prefix Lists and Route Maps to Manipulate the Weight Attribute
166(1)
Local Preference Attribute
167(1)
Using AS Path Access Lists with Route Maps to Manipulate the Local Preference Attribute
167(2)
AS Path Attribute Prepending
169(2)
AS Path: Removing Private Autonomous Systems
171(1)
Multi-Exit Discriminator (MED) Attribute
171(3)
Verifying BGP
174(1)
Troubleshooting BGP
175(2)
Default Routes
177(1)
Route Aggregation
177(1)
Route Reflectors
177(1)
Regular Expressions
178(1)
Regular Expressions: Examples
179(1)
BGP Route Filtering Using Access Lists and Distribute Lists
180(1)
Configuration Example: Using Prefix Lists and AS Path Access Lists
181(1)
BGP Peer Groups
182(2)
Authentication for BGP
184(1)
Configuring Authentication Between BGP Peers
184(1)
Verifying BGP Authentication
184(1)
Part III Infrastructure Services
Chapter 8 IP Services
185(46)
Network Address Translation (NAT)
186(8)
Private IP Addresses: RFC 1918
186(1)
Configuring Static NAT
187(1)
Configuring Dynamic NAT
188(1)
Configuring Port Address Translation (PAT)
189(1)
Configuring a NAT Virtual Interface
190(1)
Verifying NAT and PAT Configurations
190(1)
Troubleshooting NAT and PAT Configurations
191(1)
Configuration Example: PAT
191(2)
Configuration Example: NAT Virtual Interfaces and Static NAT
193(1)
First-Hop Redundancy Protocols
194(23)
Hot Standby Router Protocol
194(7)
Virtual Router Redundancy Protocol
201(3)
IPv4 Configuration Example: HSRP on L3 Switch
204(5)
IPv4 Configuration Example: VRRPv2 on Router and L3 Switch with IP SLA Tracking
209(3)
IPv6 Configuration Example: HSRPv2 on Router and L3 Switch
212(5)
Dynamic Host Control Protocol (DHCP)
217(14)
Implementing DHCP for IPv4
217(4)
Implementing DHCP for IPv6
221(3)
Configuration Example: DHCP for IPv4
224(2)
Configuration Example: DHCP for IPv6
226(5)
Chapter 9 Device Management
231(14)
Configuring Passwords
231(2)
Cleartext Password Encryption
232(1)
Password Encryption Algorithm Types
233(2)
Configuring SSH
234(1)
Verifying SSH
235(1)
Boot System Commands
235(1)
The Cisco IOS File System
236(1)
Viewing the Cisco IOS File System
236(1)
Commonly Used URL Prefixes for Cisco Network Devices
236(1)
Deciphering IOS Image Filenames
237(1)
Backing Up Configurations to a TFTP Server
238(1)
Restoring Configurations from a TFTP Server
238(1)
Backing Up the Cisco IOS Software to a TFTP Server
239(1)
Restoring/Upgrading the Cisco IOS Software from a TFTP Server
239(1)
Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command
240(1)
Secure Copy Protocol (SCP)
241(1)
Configuring an SCP Server
241(1)
Verifying and Troubleshooting SCP
241(1)
Configuration Example: SCP
241(1)
Disabling Unneeded Services
242(1)
Useful Device Management Options
243(2)
Part IV Infrastructure Security
Chapter 10 Infrastructure Security
245(16)
IPv4 Access Control Lists (ACLs)
246(1)
Configuring and Applying Standard IPv4 ACLs
246(1)
Configuring and Applying Extended IPv4 ACLs
247(3)
Configuring and Applying Time-based ACLs
248(1)
Configuring and Applying VTY ACLs
249(1)
IPv6 ACLs
250(1)
Configuring and Applying IPv6 ACLs
250(1)
Verifying IPv4 and IPv6 ACLs
251(1)
Implementing Authentication Methods
251(6)
Simple Local Database Authentication
252(1)
AAA-based Local Database Authentication
252(1)
RADIUS Authentication
253(2)
TACACS+ Authentication
255(1)
Configuring Authorization and Accounting
256(1)
Troubleshooting AAA
257(1)
Control Plane Policing (CoPP)
257(3)
Step 1 Define ACLs to Identify Permitted CoPP Traffic Flows
258(1)
Step 2 Define Class Maps for Matched Traffic
258(1)
Step 3 Define a Policy Map to Police Matched Traffic
259(1)
Step 4 Assign a Policy Map to the Control Plane
259(1)
Verifying CoPP
260(1)
Unicast Reverse Path Forwarding (uRPF)
260(1)
Configuring uRPF
260(1)
Verifying and Troubleshooting uRPF
260(1)
Part V Network Assurance
Chapter 11 Network Assurance
261(38)
Internet Control Message Protocol Redirect Messages
262(1)
The ping Command
262(1)
Examples of Using the ping and the Extended ping Commands
263(2)
The traceroute Command
265(1)
The debug Command
265(1)
Conditionally Triggered Debugs
266(1)
Configuring Secure SNMP
267(2)
Securing SNMPvl or SNMPv2c
267(1)
Securing SNMPv3
268(1)
Verifying SNMP
269(1)
Implementing Logging
269(2)
Configuring Syslog
269(1)
Syslog Message Format
269(1)
Syslog Severity Levels
270(1)
Syslog Message Example
270(1)
Configuring NetFlow
271(1)
Configuring Flexible NetFlow
272(1)
Step 1 Configure a Flow Record
272(1)
Step 2 Configure a Flow Exporter
272(1)
Step 3 Configure a Flow Monitor
272(1)
Step 4 Apply the Flow Monitor to an Interface
273(1)
Verifying NetFlow
273(1)
Implementing Port Mirroring
273(8)
Default SPAN and RSPAN Configuration
273(1)
Configuring Local SPAN
274(1)
Local SPAN Guidelines for Configuration
274(1)
Configuration Example: Local SPAN
274(3)
Configuring Remote SPAN
277(1)
Remote SPAN Guidelines for Configuration
278(1)
Configuration Example: Remote SPAN
278(2)
Configuring Encapsulated RSPAN (ERSPAN)
280(1)
Verifying and Troubleshooting Local and Remote SPAN
281(1)
Configuring Network Time Protocol
281(13)
NTP Configuration
281(1)
NTP Design
282(2)
Securing NTP
284(2)
Verifying and Troubleshooting NTP
286(1)
Setting the Clock on a Router
286(4)
Using Time Stamps
290(1)
Configuration Example: NTP
290(4)
Tool Command Language (Tel)
294(1)
Embedded Event Manager (EEM)
295(4)
EEM Configuration Examples
296(2)
EEM and Tel Scripts
298(1)
Verifying EEM
298(1)
Part VI Wireless
Chapter 12 Wireless Security and Troubleshooting
299(26)
Authenticating Wireless Clients
299(13)
Open Authentication
300(2)
Authenticating with a Pre-shared Key
302(2)
Authenticating with EAP
304(6)
Authenticating with WebAuth
310(2)
Troubleshooting from the Wireless LAN Controller
312(6)
Troubleshooting Wireless Client Connectivity
318(7)
Cisco AireOS Monitoring Dashboard GUI
318(4)
Cisco IOS XE GUI
322(3)
Part VII Overlays and Virtualization
Chapter 13 Overlay Tunnels and VRF
325(22)
Generic Routing Encapsulation (GRE)
325(6)
Configuring an IPv4 GRE Tunnel
326(1)
Configuring an IPv6 GRE Tunnel
326(1)
Verifying IPv4 and IPv6 GRE Tunnels
327(1)
Configuration Example: IPv4 and IPv6 GRE Tunnels with OSPFv3
327(4)
Site-to-Site GRE over IPsec
331(4)
GRE/IPsec Using Crypto Maps
332(1)
GRE/IPsec Using IPsec Profiles
333(2)
Verifying GRE/IPsec
335(1)
Site-to-Site Virtual Tunnel Interface (VTI) over IPsec
335(1)
Cisco Dynamic Multipoint VPN (DMVPN)
336(7)
Configuration Example: Cisco DMVPN for IPv4
337(5)
Verifying Cisco DMVPN
342(1)
VRF-Lite
343(4)
Configuring VRF-Lite
343(2)
Verifying VRF-Lite
345(2)
Appendix A Create Your Own Journal Here 347(14)
Index 361
Scott Empson is an instructor in the Department of Information Systems Technology at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he has taught for over 21 years. He teaches technical courses in Cisco routing and switching, along with courses in professional development and leadership. Scott created the CCNA Command Quick Reference in 2004 as a companion guide to the Cisco Networking Academy Program, and this guide became the CCNA Portable Command Guide in 2005. Other titles in the series in the areas of CCNP, Wireless, Security, Microsoft, and Linux followed beginning in 2006.

Scott has a Master of Education degree along with three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/language arts; and a Bachelor of Applied Information Systems Technology, with a major in network management.

Patrick Gargano has been an educator since 1996, a Cisco Networking Academy Instructor since 2000, and a Certified Cisco Systems Instructor (CCSI) since 2005. He is currently based in Australia, where he is a Content Development Engineer at Skyline ATS, responsible for CCNP Enterprise course development with Learning@Cisco. He previously led the Networking Academy program at College La Cite in Ottawa, Canada, where he taught CCNA/CCNP-level courses, and he has also worked for Cisco Learning Partners Fast Lane UK, ARP Technologies, and NterOne.

In 2018 Patrick was awarded the Networking Academy Above and Beyond Instructor award for leading CCNA CyberOps early adoption and instructor training in Quebec, Canada. Patrick has also twice led the Cisco Networking Academy Dream Team at Cisco Live US.

Patricks previous Cisco Press publications include the CCNP Routing and Switching Portable Command Guide (2014) and 31 Days Before Your CCNA Security Exam (2016). His certifications include CCNA (R&S), CCNA Wireless, CCNA Security, CCNA CyberOps, and CCNP (R&S). He holds Bachelor of Education and Bachelor of Arts degrees from the University of Ottawa, and is completing a Master of Professional Studies in Computer Networking at Fort Hays State University (Kansas).