Introduction |
|
xxi | |
Assessment Test |
|
xxviii | |
Chapter 1 Networking Fundamentals |
|
1 | (28) |
|
|
2 | (5) |
|
The Upper Layers: Application, Presentation, and Session |
|
|
4 | (1) |
|
|
4 | (2) |
|
The Lower Layers: Physical, Data Link, Network, and Transport |
|
|
6 | (1) |
|
Layer 1: The Physical Layer |
|
|
7 | (1) |
|
Layer 2: The Data Link Layer |
|
|
8 | (5) |
|
A Brief History of Ethernet |
|
|
8 | (2) |
|
|
10 | (2) |
|
Maximum Transmission Unit |
|
|
12 | (1) |
|
|
12 | (1) |
|
Layer 3: The Network Layer |
|
|
13 | (5) |
|
Forwarding within a Subnet |
|
|
14 | (1) |
|
Forwarding between Subnets |
|
|
14 | (2) |
|
Address Resolution Protocol |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Layer 4: The Transport Layer |
|
|
18 | (4) |
|
Transmission Control Protocol |
|
|
19 | (2) |
|
Encapsulation and Decapsulation |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (5) |
Chapter 2 Spanning Tree Protocols |
|
29 | (38) |
|
The Need for Spanning Tree |
|
|
31 | (1) |
|
|
32 | (6) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (2) |
|
Rapid Per-VLAN Spanning Tree |
|
|
38 | (12) |
|
|
38 | (3) |
|
Calculating the Root Ports |
|
|
41 | (3) |
|
Calculating the Root Ports of Indirectly Connected Switches |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Calculating Blocked Ports |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (5) |
|
Root Bridges and Port Priority |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Topology Change Detection |
|
|
55 | (1) |
|
|
55 | (3) |
|
|
55 | (2) |
|
BPDU Guard and BPDU Filter |
|
|
57 | (1) |
|
Unidirectional Link Detection |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (2) |
|
|
62 | (5) |
Chapter 3 Enterprise Network Design |
|
67 | (38) |
|
Physical Network Architectures |
|
|
68 | (6) |
|
Comparing Campus and Data. Center Networks |
|
|
69 | (1) |
|
The Three-Tier Architecture |
|
|
70 | (3) |
|
The Two-Tier Collapsed Core: A Cheaper Alternative |
|
|
73 | (1) |
|
|
74 | (8) |
|
Switched and Routed Interfaces |
|
|
75 | (1) |
|
|
76 | (5) |
|
|
81 | (1) |
|
|
82 | (9) |
|
|
83 | (1) |
|
|
84 | (4) |
|
Port Aggregation Control Protocol |
|
|
88 | (2) |
|
Link Aggregation Control Protocol |
|
|
90 | (1) |
|
First-Hop Redundancy Protocols |
|
|
91 | (6) |
|
Hot Standby Router Protocol |
|
|
92 | (2) |
|
Virtual Router Redundancy Protocol |
|
|
94 | (1) |
|
Gateway Load-Balancing Protocol |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (5) |
Chapter 4 Wireless LAN (WLAN) |
|
105 | (30) |
|
Radio Frequency Fundamentals |
|
|
106 | (9) |
|
|
107 | (2) |
|
|
109 | (1) |
|
|
110 | (5) |
|
|
115 | (9) |
|
The Physical Layer: Frequencies and Channels |
|
|
115 | (4) |
|
Layer 2: 802.11 Media Access Control (MAC) |
|
|
119 | (5) |
|
|
124 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
Wireless LAN Controller Selection Process |
|
|
125 | (1) |
|
Roaming and Location Services |
|
|
126 | (2) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (5) |
Chapter 5 Open Shortest Path First (OSPF) |
|
135 | (36) |
|
Link-State Advertisements |
|
|
136 | (5) |
|
|
137 | (1) |
|
|
137 | (4) |
|
|
141 | (1) |
|
|
142 | (21) |
|
Configuring Area 0 on a Broadcast Network |
|
|
142 | (1) |
|
Viewing Neighbor Adjacencies |
|
|
143 | (1) |
|
Rigging the Designated Router Election |
|
|
144 | (2) |
|
Viewing and Understanding LSAs |
|
|
146 | (8) |
|
|
154 | (4) |
|
|
158 | (1) |
|
Injecting a Default Route |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (2) |
|
|
166 | (5) |
Chapter 6 Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
171 | (26) |
|
|
172 | (6) |
|
|
172 | (1) |
|
The Diffusing Update Algorithm (DUAL) |
|
|
173 | (3) |
|
|
176 | (2) |
|
|
178 | (12) |
|
|
181 | (1) |
|
|
182 | (4) |
|
|
186 | (1) |
|
Unequal Cost Multipathing |
|
|
187 | (3) |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (5) |
Chapter 7 The Border Gateway Protocol (BGP) |
|
197 | (36) |
|
|
198 | (4) |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (23) |
|
|
204 | (1) |
|
|
205 | (5) |
|
Route Redistribution among BGP, OSPF, and EIGRP |
|
|
210 | (4) |
|
Testing IP Reachability Using Tcl Scripts |
|
|
214 | (1) |
|
|
215 | (3) |
|
|
218 | (2) |
|
Advertising Summary Routes Using Route Aggregation |
|
|
220 | (2) |
|
Route Filtering Using Route Maps and Prefix Lists |
|
|
222 | (3) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (2) |
|
|
228 | (5) |
Chapter 8 Network Address Translation and Multicast |
|
233 | (42) |
|
Network Address Translation |
|
|
234 | (18) |
|
|
234 | (2) |
|
|
236 | (5) |
|
|
241 | (6) |
|
NAT Overload with Port Address Translation |
|
|
247 | (3) |
|
|
250 | (1) |
|
Removing NAT Configurations |
|
|
251 | (1) |
|
|
252 | (13) |
|
|
253 | (1) |
|
|
253 | (4) |
|
|
257 | (1) |
|
|
258 | (4) |
|
Configuring a Multicast Receiver |
|
|
262 | (2) |
|
IP Multicast and Ethernet |
|
|
264 | (1) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
268 | (2) |
|
|
270 | (5) |
Chapter 9 Quality of Service |
|
275 | (28) |
|
Understanding Quality of Service |
|
|
276 | (1) |
|
Classification and Marking |
|
|
277 | (7) |
|
|
277 | (3) |
|
|
280 | (1) |
|
Class Maps and Policy Maps |
|
|
280 | (1) |
|
|
281 | (3) |
|
|
284 | (4) |
|
Single-Rate, Two-Color Policing |
|
|
284 | (1) |
|
Single-Rate, Three-Color Policing |
|
|
285 | (2) |
|
|
287 | (1) |
|
|
288 | (7) |
|
Class-Based Weighted Fair Queuing |
|
|
288 | (5) |
|
|
293 | (2) |
|
Explicit Congestion Notification |
|
|
295 | (1) |
|
|
295 | (2) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (4) |
Chapter 10 Network Virtualization |
|
303 | (50) |
|
Virtual Machines, Hypervisors, and Network Virtualization |
|
|
304 | (8) |
|
Virtual Machines and Server Virtualization |
|
|
305 | (2) |
|
|
307 | (5) |
|
Generic Routing Encapsulation Tunnels |
|
|
312 | (7) |
|
Configuring a GRE Tunnel to Tunnel IPv4 and IPv6 over IPv4 |
|
|
312 | (6) |
|
|
318 | (1) |
|
|
319 | (7) |
|
|
320 | (1) |
|
Encapsulating Security Payload |
|
|
320 | (1) |
|
Configuring IPsec in Transport Mode with a GRE Tunnel |
|
|
321 | (3) |
|
Configuring IPsec in Tunnel Mode |
|
|
324 | (2) |
|
Location/ID Separation Protocol |
|
|
326 | (8) |
|
|
328 | (1) |
|
|
328 | (4) |
|
|
332 | (2) |
|
Is LISP a Routing Protocol? |
|
|
334 | (1) |
|
Virtual Extensible Local Area Network |
|
|
334 | (6) |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
Virtual Routing and Forwarding |
|
|
340 | (5) |
|
|
340 | (2) |
|
Configuring Multi-VRF EIGRP |
|
|
342 | (3) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (6) |
Chapter 11 Software-Defined Networking and Network Programmability |
|
353 | (44) |
|
What Is Software-Defined Networking? |
|
|
355 | (1) |
|
|
356 | (13) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
359 | (4) |
|
|
363 | (1) |
|
|
364 | (5) |
|
|
369 | (3) |
|
vManage Network Management System |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
Network Programmability and Automation |
|
|
372 | (19) |
|
The Cisco DNA Center Intent API |
|
|
372 | (7) |
|
|
379 | (4) |
|
|
383 | (3) |
|
|
386 | (2) |
|
Configuration Management Platforms |
|
|
388 | (3) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (4) |
Chapter 12 Network Security and Monitoring |
|
397 | (46) |
|
|
398 | (16) |
|
|
399 | (3) |
|
Authentication, Authorization, and Accounting |
|
|
402 | (5) |
|
|
407 | (5) |
|
|
412 | (2) |
|
|
414 | (4) |
|
AnyConnect Secure Mobility Client |
|
|
414 | (1) |
|
|
414 | (1) |
|
Advanced Malware Protection ThreatGrid |
|
|
414 | (1) |
|
Advanced Malware Protection for Endpoints |
|
|
415 | (1) |
|
Firepower Next-Generation Firewall |
|
|
415 | (1) |
|
|
416 | (2) |
|
|
418 | (1) |
|
|
418 | (7) |
|
|
418 | (4) |
|
Configuring WPA2 with 802.1X |
|
|
422 | (1) |
|
Configuring 802.1X on the Client |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
425 | (11) |
|
|
425 | (1) |
|
Simple Network Management Protocol (SNMP) |
|
|
425 | (1) |
|
|
426 | (2) |
|
|
428 | (1) |
|
NetFlow and Flexible NetFlow |
|
|
429 | (3) |
|
|
432 | (2) |
|
IP Service Level Agreement |
|
|
434 | (2) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
439 | (4) |
Appendix Answers to Review Questions |
|
443 | |
|
Chapter 1: Networking Fundamentals |
|
|
444 | (1) |
|
Chapter 2: Spanning Tree Protocols |
|
|
445 | (2) |
|
Chapter 3: Enterprise Network Design |
|
|
447 | (1) |
|
Chapter 4: Wireless LAN (WLAN) |
|
|
448 | (2) |
|
Chapter 5: Open Shortest Path First (OSPF) |
|
|
450 | (1) |
|
Chapter 6: Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
|
451 | (2) |
|
Chapter 7: The Border Gateway Protocol (BGP) |
|
|
453 | (1) |
|
Chapter 8: Network Address Translation and Multicast |
|
|
454 | (2) |
|
Chapter 9: Quality of Service |
|
|
456 | (1) |
|
Chapter 10: Network Virtualization |
|
|
457 | (2) |
|
Chapter 11: Software-Defined Networking and Network Programmability |
|
|
459 | (1) |
|
Chapter 12: Network Security and Monitoring |
|
|
460 | |
Index |
|
46 | |