Muutke küpsiste eelistusi

CCNP Routing and Switching Foundation Learning Guide Library: (ROUTE 300-101, SWITCH 300-115, TSHOOT 300-135) [Multiple-component retail product, shrink-wrapped]

  • Formaat: Multiple-component retail product, shrink-wrapped, 2088 pages, kõrgus x laius x paksus: 249x206x117 mm, kaal: 3600 g, Contains 3 hardbacks and 1 Multiple-component retail product, shrink-wrapped and 3 paperbacks
  • Ilmumisaeg: 11-Jun-2015
  • Kirjastus: Cisco Press
  • ISBN-10: 1587144395
  • ISBN-13: 9781587144394
  • Multiple-component retail product, shrink-wrapped
  • Hind: 190,21 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Multiple-component retail product, shrink-wrapped, 2088 pages, kõrgus x laius x paksus: 249x206x117 mm, kaal: 3600 g, Contains 3 hardbacks and 1 Multiple-component retail product, shrink-wrapped and 3 paperbacks
  • Ilmumisaeg: 11-Jun-2015
  • Kirjastus: Cisco Press
  • ISBN-10: 1587144395
  • ISBN-13: 9781587144394

CCNP Routing and Switching Foundation Learning Guide Libraryis a comprehensive foundation learning package for the three CCNP Routing and Switching exams: ROUTE, SWITCH, and TSHOOT. The three books contained in this package,Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide, Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide, andTroubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide build your knowledge of CCNP Routing and Switching topics. These authorized CCNP Foundation Learning Guides are written by experts, bringing years of teaching and consulting experience together in an ideal self-study format.

Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide teaches you how to select and implement the appropriate Cisco IOS services required to build a scalable, routed network.Implementing Cisco IP Switched Networks (SWITCH) Foundation Learning Guide ensures that you have the skills to plan, configure, and verify the implementation of complex enterprise switching solutions.Troubleshooting and Maintaining Cisco IP Networks (TSHOOT) Foundation Learning Guide helps you master planning tasks, performance measurements, configuring and verifying, and correct troubleshooting procedures and documentation tasks.

Each of these official learning guides provides a list of topics covered to clearly identify the focus of each chapter, a summary of key concepts for quick study, and review questions that provide you with an opportunity to assess and reinforce your understanding of the material.

CCNP Routing and Switching Foundation Learning Guide Library is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visithttp://www.cisco.com/web/learning/index.html.

These foundation learning guides help you understand the topics on the three CCNP Routing and Switching exams:

ROUTE:

  • Internet Protocol (IP) routing protocol principles
  • Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Open Shortest Path First (OSPF)
  • IP Version 6 (IPv6)
  • Border Gateway Protocol (BGP)

SWITCH:

  • VLANs, trunks, VTP, and STP
  • Inter-VLAN Routing
  • Multilayer switching
  • High availability and redundancy
  • Switch security fundamentals

TSHOOT:

  • Defines structured troubleshooting and reviews its subprocesses
  • Shows how to integrate troubleshooting into day-to-day network maintenance processes
  • Covers information gathering on Layer 2 switching and Layer 3 routing with IOS show and debug commands, ping, and telnet
  • Introduces specialized tools for capturing traffic, gathering information (SNMP and NetFlow), and receiving network event notifications (EEM)

Introduction xxv
Chapter 1 Basic Network and Routing Concepts
1(58)
Differentiating Routing Protocols
2(8)
Enterprise Network Infrastructure
2(1)
Role of Dynamic Routing Protocols
3(2)
Choosing a of Dynamic Routing Protocols
5(1)
IGP versus EGP
5(2)
Types of Routing Protocols
7(1)
Convergence
8(1)
Route Summarization
9(1)
Route Protocol Scalability
10(8)
Understanding Network Technologies
10(1)
Traffic Types
11(2)
IPv6 Address Types
13(1)
ICMPv6 Neighbor Discovery
14(1)
Network Types
15(1)
NBMA Networks
16(2)
Routing Over the Internet
18(1)
Connecting Remote Locations with Headquarters
18(22)
Principles of Static Routing
19(1)
Configuring an IPv4 Static Route
20(2)
Configuring a Static Default Route
22(1)
Basic PPP Overview
23(1)
PPP Authentication Overview
23(3)
PPPoE
26(2)
Basic Frame Relay Overview
28(3)
VPN Connectivity Overview
31(1)
MPLS-based VPNs
31(1)
Tunneling VPNs
32(1)
Hybrid VPNs
32(1)
Routing Across MPLS VPNs
32(2)
Routing Over GRE Tunnel
34(1)
Dynamic Multipoint Virtual Private Network
35(1)
Multipoint GRE
36(1)
NHRP
37(2)
IPsec
39(1)
Routing and TCP/IP Operations
40(3)
MSS, Fragmentation, and PMTUD
40(1)
IPv4 Fragmentation and PMTUD
41(1)
Bandwidth Delay Product
41(1)
TCP Starvation
42(1)
Latency
42(1)
ICMP Redirect
42(1)
Implementing RIPng
43(12)
RIP Overview
43(2)
RIPv2 Overview
45(2)
Configuring RIPng
47(1)
Basic RIPng Configuration
47(3)
Propagating a Default Route
50(3)
Investigating the RIPng Database
53(2)
Summary
55(1)
Review Questions
56(3)
Chapter 2 EIGRP Implementation
59(96)
Establishing EIGRP Neighbor Relationships
60(16)
EIGRP Features
60(2)
EIGRP Features
62(1)
EIGRP Operation Overview
63(1)
Configuring and Verifying Basic EIGRP for IPv4
64(9)
Manipulating EIGRP Timers
73(1)
EIGRP Neighbor Relationship over Frame Relay
74(1)
Establishing EIGRP over Layer 3 MPLS VPN
74(1)
Establishing EIGRP over Layer 2 MPLS VPN
75(1)
Building the EIGRP Topology Table
76(18)
Building and Examining the EIGRP Topology Table
77(3)
Choosing the Best Path
80(8)
Exchange of Routing Knowledge in EIGRP
88(1)
EIGRP Metric
88(1)
EIGRP Metric Calculation
89(1)
EIGRP Wide Metrics
90(1)
EIGRP Metric Calculation Example
90(1)
EIGRP Metric Calculation Example
91(1)
EIGRP Path Calculation Example
92(2)
Optimizing EIGRP Behavior
94(34)
EIGRP Queries
95(1)
EIGRP Stub Routers
96(1)
Configuring EIGRP Stub Routing
97(3)
EIGRP Stub Options
100(8)
Stuck in Active
108(1)
Reducing Query Scope by Using Summary Routes
109(1)
Configuring EIGRP Summarization
110(6)
Determining the Summary Route
116(4)
Obtaining Default Route
120(3)
Load Balancing with EIGRP
123(1)
Configuring EIGRP Load Balancing
123(1)
EIGRP Load Balancing
124(2)
EIGRP Load Balancing Across Unequal-Metric Paths
126(2)
Configuring EIGRP for IPv6
128(8)
Overview of EIGRP for IPv6
128(1)
Configuring and Verifying EIGRP for IPv6
129(1)
EIGRP for IPv6 Configuration
130(4)
Determining the IPv6 Summary Route
134(2)
Named EIGRP Configuration
136(15)
Introduction to Named EIGRP Configuration
136(1)
Configuring Named EIGRP
137(2)
Address Families
139(1)
EIGRP for IPv4 Address Family
139(3)
EIGRP for IPv6 Address Family
142(6)
Named EIGRP Configuration Modes
148(2)
Classic Versus Named EIGRP Configuration
150(1)
Summary
151(1)
Review Questions
152(3)
Chapter 3 OSPF Implementation
155(112)
Establishing OSPF Neighbor Relationships
155(32)
OSPF Features
156(1)
OSPF Operation Overview
157(1)
Hierarchical Structure of OSPF
158(2)
Design Restrictions of OSPF
160(1)
OSPF Message Types
160(1)
Basic OSPF Configuration
161(9)
Optimizing OSPF Adjacency Behavior
170(4)
Using OSPF Priority in the DR/BDR Election
174(1)
OSPF Behavior in NBMA Hub-and-Spoke Topology
175(2)
The Importance of MTU
177(2)
Manipulating OSPF Timers
179(3)
OSPF Neighbor Relationship over Point-to-Point Links
182(1)
OSPF Neighbor Relationship over Layer 3 MPLS VPN
182(2)
OSPF Neighbor Relationship over Layer 2 MPLS VPN
184(1)
OSPF Neighbor States
184(2)
OSPF Network Types
186(1)
Configuring Passive Interfaces
187(1)
Building the Link-State Database
187(28)
OSPF LSA Types
188(1)
Examining the OSPF Link-State Database
189(1)
OSPF Link-State Database
190(6)
OSPF Type 2 Network LSA
196(1)
OSPF Type 3 Summary LSA
197(2)
OSPF Type 4 ASBR Summary LSA
199(2)
OSPF Type 5 External LSA
201(2)
Periodic OSPF Database Changes
203(1)
Exchanging and Synchronizing LSDBs
204(2)
Synchronizing the LSDB on Multiaccess Networks
206(1)
Running the SPF Algorithm
207(1)
Configuring OSPF Path Selection
208(1)
OSPF Path Selection
208(2)
OSPF Best Path Calculation
210(1)
Default OSPF Costs
211(3)
Calculating the Cost of Intra-Area Routes
214(1)
Calculating the Cost of Interarea Routes
214(1)
Selecting Between Intra-Area and Interarea Routes
215(1)
Optimizing OSPF Behavior
215(24)
OSPF Route Summarization
216(1)
Benefits of Route Summarization
217(1)
Configuring OSPF Route Summarization
218(5)
Summarization on ABRs
223(1)
Summarization on ASBRs
224(1)
OSPF Virtual Links
225(2)
Configuring OSPF Virtual Links
227(2)
Configuring OSPF Stub Areas
229(1)
OSPF Stub Areas
230(4)
OSPF Totally Stubby Areas
234(2)
Cost of the Default Route in a Stub Area
236(1)
The default-information originate Command
237(1)
Other Stubby Area Types
238(1)
OSPFv3
239(23)
Configuring OSPFv3
240(1)
Implementing OSPFv3
241(5)
OSPFv3 for IPv4 and IPv6
246(14)
Configuring Advanced OSPFv3
260(1)
OSPFv3 Caveats
261(1)
Summary
262(1)
Review Questions
263(4)
Chapter 4 Manipulating Routing Updates
267(60)
Using Multiple IP Routing Protocols on a Network
267(3)
Why Run Multiple Routing Protocols?
269(1)
Running Multiple Routing Protocols
269(1)
Administrative Distance
269(1)
Multiple Routing Protocols Solutions
270(1)
Implementing Route Redistribution
270(22)
Defining Route Redistribution
270(1)
Planning to Redistribute Routes
271(1)
Redistributing Routes
271(1)
Seed Metrics
272(1)
Default Seed Metrics
273(2)
Configuring and Verifying Basic Redistribution in IPv4 and IPv6
275(1)
Redistributing OSPFv2 Routes into the EIGRP Routing Domain
276(3)
Redistributing OSPFv3 Routes into the EIGRP for IPv6 Routing Domain
279(2)
Redistributing EIGRP Routes into the OSPFv2 Routing Domain
281(4)
Redistributing EIGRP for IPv6 Routes into the OSPFv3 Routing Domain
285(2)
Types of Redistribution Techniques
287(1)
One-Point Redistribution
287(1)
Multipoint Redistribution
288(1)
Redistribution Problems
289(2)
Preventing Routing Loops in a Redistribution Environment
291(1)
Verifying Redistribution Operation
292(1)
Controlling Routing Update Traffic
292(28)
Why Filter Routes?
292(1)
Route Filtering Methods
293(1)
Using Distribute Lists
294(1)
Configuring Distribute Lists
294(1)
Distribute List and ACL Example
295(2)
Using Prefix Lists
297(1)
Prefix List Characteristics
297(1)
Configuring Prefix Lists
298(1)
Distribute List and Prefix List Example
299(1)
Prefix List Examples
300(1)
Verifying Prefix Lists
301(1)
Manipulating Redistribution Using ACLs, Prefix Lists, and Distribute Lists
302(3)
Using Route Maps
305(1)
Understanding Route Maps
305(1)
Route Map Applications
305(1)
Configuring Route Maps
306(2)
Route Map Match and Set Statements
308(2)
Configuring Route Redistribution Using Route Maps
310(1)
Using Route Maps with Redistribution
310(1)
Manipulating Redistribution Using Route Maps
311(1)
Mutual Redistribution without Route Filtering
312(1)
Mutual Redistribution with Route Maps
313(2)
Change Administrative Distance to Enable Optimal Routing
315(3)
Manipulating Redistribution Using Route Tagging
318(1)
Caveats of Redistribution
319(1)
Summary
320(3)
References
323(1)
Review Questions
323(4)
Chapter 5 Path Control Implementation
327(46)
Using Cisco Express Forwarding Switching
327(16)
Control and Data Plane
328(1)
Cisco Switching Mechanisms
328(4)
Process and Fast Switching
332(1)
Cisco Express Forwarding
333(2)
Analyzing Cisco Express Forwarding
335(1)
Verify the Content of the CEF Tables
335(6)
Enable and Disable CEF by Interface and Globally
341(2)
Understanding Path Control
343(26)
The Need for Path Control
343(1)
Implementing Path Control Using Policy-Based Routing
344(1)
PBR Features
344(1)
Steps for Configuring PBR
345(1)
Configuring PBR
346(2)
Verifying PBR
348(1)
Configuring PBR Example
348(6)
Implementing Path Control Using Cisco IOS IP SLAs
354(1)
PBR and IP SLA
354(1)
IP SLA Features
354(2)
Steps for Configuring IP SLAs
356(4)
Verifying Path Control Using IOS IP SLAs
360(1)
Configuring IP SLA Example
361(3)
Configuring PBR and IP SLA Example
364(5)
Summary
369(1)
References
370(1)
Review Questions
370(3)
Chapter 6 Enterprise Internet Connectivity
373(50)
Planning Enterprise Internet Connectivity
374(7)
Connecting Enterprise Networks to an ISP
374(1)
Enterprise Connectivity Requirements
374(1)
ISP Redundancy
375(1)
Public IP Address Assignment
376(1)
The Internet Assigned Numbers Authority
376(1)
Regional Internet Registries
377(1)
Public IP Address Space
377(1)
Autonomous System Numbers
378(3)
Establishing Single-Homed IPv4 Internet Connectivity
381(17)
Configuring a Provider-Assigned IPv4 Address
381(1)
DHCP Operation
382(1)
Obtaining a Provider-Assigned IPv4 Address with DHCP
383(1)
Configuring a Router as a DHCP Server and DHCP Relay Agent
384(1)
NAT
385(3)
Configuring Static NAT
388(1)
Configuring Dynamic NAT
389(1)
Configuring PAT
390(2)
Limitations of NAT
392(1)
NAT Virtual Interface
393(1)
Configuring NAT Virtual Interface
393(3)
Verifying NAT Virtual Interface
396(2)
Establishing Single-Homed IPv6 Internet Connectivity
398(12)
Obtaining a Provider-Assigned IPv6 Address
398(1)
Manual Assignment
399(1)
Configuring Basic IPv6 Internet Connectivity
399(2)
Stateless Address Autoconfiguration
401(1)
DHCPv6 Operation
402(1)
Stateless DCHPv6
403(1)
Stateful DHCPv6
404(1)
DHCPv6 Prefix Delegation
405(1)
NAT for IPv6
405(1)
NAT64
405(1)
NPTv6
405(1)
IPv6 ACLs
405(1)
IPv6 ACL Characteristics
406(1)
Configuring IPv6 ACLs
406(3)
Securing IPv6 Internet Connectivity
409(1)
Improving Internet Connectivity Resilience
410(5)
Drawbacks of a Single-Homed Internet Connectivity
410(1)
Dual-Homed Internet Connectivity
410(1)
Dual-Homed Connectivity Options
411(1)
Configuring Best Path for Dual-Homed Internet Connectivity
411(2)
Multihomed Internet Connectivity
413(2)
Summary
415(2)
References
417(1)
Review Questions
418(5)
Chapter 7 BGP Implementation
423(104)
BGP Terminology, Concepts, and Operation
424(11)
BGP Use Between Autonomous Systems
424(1)
Comparison with Other Scalable Routing Protocols
425(1)
BGP Path Vector Characteristics
426(2)
BGP Characteristics
428(2)
BGP Tables
430(1)
BGP Message Types
431(1)
Open and Keepalive Messages
431(2)
Update Messages
433(1)
Notification Messages
433(1)
When to Use BGP
433(1)
When Not to Use BGP
434(1)
Implementing Basic BGP
435(32)
BGP Neighbor Relationships
435(1)
External BGP Neighbors
436(1)
Internal BGP Neighbors
437(1)
iBGP on All Routers in a Transit Path
438(4)
Basic BGP Configuration Requirements
442(1)
Entering BGP Configuration Mode
442(1)
Defining BGP Neighbors and Activating BGP Sessions
443(1)
Basic BGP Configuration and Verification
444(1)
Configuring and Verifying an eBGP Session
445(4)
Configuring and Verifying an iBGP Session
449(1)
Advertising Networks in BGP and Verifying That They Are Propagated
450(7)
Using the Next-Hop-Self Feature
457(1)
Understanding and Troubleshooting BGP Neighbor States
458(2)
BGP Session Resilience
460(1)
Sourcing BGP from Loopback Address
461(2)
eBGP Multihop
463(1)
Resetting BGP Sessions
464(3)
BGP Attributes and the Path-Selection Process
467(24)
BGP Path Selection
467(1)
BGP Path-Selection Process
468(1)
The Path-Selection Decision Process with a Multihomed Connection
469(2)
BGP Attributes
471(1)
Weil-Known Attributes
471(1)
Optional Attributes
472(1)
Defined BGP Attributes
472(1)
The AS-Path Attribute
473(1)
The Next-Hop Attribute
474(1)
The Origin Attribute
475(1)
The Local-Preference Attribute
475(1)
The Community Attribute
475(1)
The MED Attribute
476(2)
The Weight Attribute (Cisco Only)
478(1)
Changing the Weight for All Updates from a Neighbor
479(1)
Changing the Weight Using Route Maps
479(1)
Influencing BGP Path Selection
480(5)
Changing the Weight
485(1)
Changing Local Preference
486(2)
Setting the AS-Path
488(3)
Controlling BGP Routing Updates
491(11)
Filtering BGP Routing Updates
492(1)
BGP Filtering Using Prefix Lists
492(2)
BGP Filtering Using AS-Path Access Lists
494(2)
BGP Filtering Using Route Maps
496(2)
Filtering Order
498(1)
Clearing the BGP Session
498(1)
BGP Peer Groups
498(1)
Peer Group Operation
498(2)
Peer Group Configuration
500(1)
Peer Group Configuration Example
500(2)
Implementing BGP for IPv6 Internet Connectivity
502(18)
MP-BGP Support for IPv6
502(2)
Exchanging IPv6 Routes over an IPv4 Session
504(2)
Exchanging IPv6 Routes over an IPv6 Session
506(1)
BGP for IPv6 Configuration and Verification
507(1)
Initial State of Routers
508(3)
Enable eBGP IPv6 Route Exchange
511(5)
Enable iBGP IPv6 Route Exchange
516(2)
Comparing IPv4 to Dual (IPv4/IPv6) BGP Transport
518(1)
BGP Filtering Mechanisms for IPv6
518(1)
IPv6 Prefix List Filtering
518(1)
IPv6 Path Selection with BGP Local Preference
519(1)
Summary
520(2)
References
522(1)
Review Questions
523(4)
Chapter 8 Routers and Routing Protocol Hardening
527(80)
Securing the Management Plane on Cisco Routers
528(42)
Securing the Management Plane
529(1)
Router Security Policy
530(1)
Encrypted Passwords
531(1)
Use Strong Passwords
532(1)
Encrypting Passwords
532(4)
Authentication, Authorization, Accounting
536(1)
RADIUS and TACACS+ Overview
536(2)
Enabling AAA and Local Authentication
538(1)
Enabling AAA RADIUS Authentication with Local User for Backup
539(2)
Enabling AAA TACACS+ Authentication with Local User for Backup
541(1)
Configuring Authorization and Accounting
542(1)
Limitations of TACACS+ and RADIUS
542(1)
Use SSH Instead of Telnet
543(4)
Securing Access to the Infrastructure Using Router ACLs
547(2)
Implement Unicast Reverse Path Forwarding
549(1)
uRPF in an Enterprise Network
550(1)
uRPF Examples
550(1)
Enabling uRPF
551(1)
Implement Logging
551(1)
Implementing Network Time Protocol
552(1)
NTP Modes
552(2)
Enabling NTP
554(1)
Securing NTP
555(1)
NTP Versions
556(1)
NTP in IPv6 Environment
557(1)
Simple NTP
557(1)
Implementing SNMP
558(3)
SNMPv3
561(1)
Enabling SNMPv3
561(1)
Verifying SNMPv3
562(1)
Configuration Backups
563(1)
The archive Command
563(2)
Using SCP
565(1)
Enabling SCP on a Router
565(2)
Disabling Unused Services
567(1)
Conditional Debugging
568(1)
Enabling Conditional Debugging
569(1)
Routing Protocol Authentication Options
570(6)
The Purpose of Routing Protocol Authentication
570(1)
Plain-Text Authentication
571(1)
Hashing Authentication
572(2)
Time-Based Key Chains
574(1)
Key Chain Specifics
574(1)
Authentication Options with Different Routing Protocols
575(1)
Configuring EIGRP Authentication
576(7)
EIGRP Authentication Configuration Checklist
577(1)
Configuring EIGRP Authentication
577(1)
Configure EIGRP MD5 Authentication Mode
578(1)
Configure EIGRP Key-Based Routing Authentication
579(2)
Configuring EIGRP for IPv6 Authentication
581(1)
Configure EIGRP for IPv6 MD5 Authentication Mode
581(1)
Configuring Named EIGRP Authentication
582(1)
Configuring OSPF Authentication
583(10)
OSPF Authentication
583(1)
OSPF MD5 Authentication
584(1)
Configure OSPF MD5 Authentication
584(1)
Configure OSPF MD5 Authentication on Interfaces
585(1)
Configure OSPF MD5 Authentication in an Area
586(1)
OSPFv2 Cryptographic Authentication
587(1)
Configuring OSPFv2 Cryptographic Authentication
587(1)
Configure OSPFv2 Cryptographic Authentication Example
588(2)
OSPFv3 Authentication
590(1)
Configuring OSPFv3 Authentication
590(1)
Configuring OSPFv3 Authentication on an Interface Example
591(1)
Configuring OSPFv3 Authentication in an Area Example
592(1)
Configuring BGP Authentication
593(4)
BGP Authentication Configuration Checklist
594(1)
BGP Authentication Configuration
594(2)
BGP for IPv6 Authentication Configuration
596(1)
Implementing VRF-Lite
597(4)
VRF and VRF-Lite
597(1)
Enabling VRF
597(4)
Easy Virtual Network
601(2)
Summary
603(1)
References
604(1)
Review Questions
604(3)
Appendix A Answers to End of
Chapter Review Questions
607(6)
Chapter 1
607(1)
Chapter 2
608(1)
Chapter 3
609(1)
Chapter 4
610(1)
Chapter 5
610(1)
Chapter 6
611(1)
Chapter 7
611(1)
Chapter 8
612(1)
Appendix B IPv4 Supplement
613(58)
IPv4 Addresses and Subnetting Job Aid
614(1)
Decimal-to-Binary Conversion Chart
614(4)
IPv4 Addressing Review
618(7)
Converting IP Addresses Between Decimal and Binary
618(1)
Determining an IP Address Class
619(1)
Private Addresses
620(1)
Extending an IP Classful Address Using a Subnet Mask
620(1)
Calculating a Subnet Mask
621(2)
Calculating the Networks for a Subnet Mask
623(1)
Using Prefixes to Represent a Subnet Mask
624(1)
IPv4 Access Lists
625(23)
IP Access List Overview
625(1)
IP Standard Access Lists
626(2)
Wildcard Masks
628(1)
Access List Configuration Tasks
629(1)
IP Standard Access List Configuration
629(1)
Implicit Wildcard Masks
630(1)
Configuration Principles
631(1)
Standard Access List Example
632(1)
Location of Standard Access Lists
633(1)
IP Extended Access Lists
634(1)
Extended Access List Processing
634(1)
Extended IP Access List Configuration
635(7)
Extended Access List Examples
642(1)
Location of Extended Access Lists
643(1)
Time-Based Access Lists
644(1)
Restricting Virtual Terminal Access
645(1)
How to Control vty Access
645(1)
Virtual Terminal Line Access Configuration
646(1)
Verifying Access List Configuration
647(1)
IPv4 Address Planning
648(5)
Benefits of an Optimized IP Addressing Plan
648(2)
Scalable Network Addressing Example
650(1)
Nonscalable Network Addressing
651(1)
Update Size
651(1)
Unsummarized Internetwork Topology Changes
652(1)
Summarized Network Topology Changes
652(1)
Hierarchical Addressing Using Variable-Length Subnet Masks
653(9)
Subnet Mask
653(1)
Use of the Subnet Mask
653(1)
Subnet Mask Example
653(1)
Implementing VLSM in a Scalable Network
654(2)
VLSM Calculation Example
656(1)
LAN Addresses
657(1)
Serial Line Addresses
658(3)
Summary of Addresses Used in the VLSM Example
661(1)
Another VLSM Example
661(1)
Route Summarization
662(5)
Route Summarization Overview
662(2)
Route Summarization Calculation Example
664(1)
Summarizing Addresses in a VLSM-Designed Network
665(1)
Route Summarization Implementation
666(1)
Route Summarization Operation in Cisco Routers
666(1)
Route Summarization in IP Routing Protocols
667(1)
Classless Interdomain Routing
667(4)
CIDR Example
668(3)
Appendix C BGP Supplement
671(26)
BGP Route Summarization
671(9)
CIDR and Aggregate Addresses
671(2)
Network Boundary Summarization
673(1)
BGP Route Summarization Using the network Command
674(3)
Creating a Summary Address in the BGP Table Using the aggregate-address Command
677(3)
Redistribution with IGPs
680(2)
Advertising Networks into BGP
680(1)
Advertising from BGP into an IGP
681(1)
Communities
682(5)
Community Attribute
682(1)
Setting and Sending the Communities Configuration
682(3)
Using the Communities Configuration
685(2)
Route Reflectors
687(8)
Route Reflector Benefits
689(1)
Route Reflector Terminology
689(1)
Route Reflector Design
690(1)
Route Reflector Design Example
690(1)
Route Reflector Operation
691(1)
Route Reflector Migration Tips
692(2)
Route Reflector Configuration
694(1)
Route Reflector Example
694(1)
Verifying Route Reflectors
695(1)
Advertising a Default Route
695(1)
Not Advertising Private Autonomous System Numbers
696(1)
Appendix D Acronyms and Abbreviations
697
Index 701
Introduction xx
Chapter 1 Fundamentals Review
1(8)
Switching Introduction
2(6)
Hubs and Switches
2(1)
Bridges and Switches
2(1)
Switches of Today
3(1)
Broadcast Domains
3(1)
MAC Addresses
4(1)
The Basic Ethernet Frame Format
4(1)
Basic Switching Function
5(1)
VLANs
6(1)
The Spanning Tree Protocol
6(1)
Trunking
7(1)
Port Channels
7(1)
Multilayer Switching
8(1)
Summary
8(1)
Chapter 2 Network Design Fundamentals
9(32)
Campus Network Structure
9(13)
Hierarchical Network Design
10(2)
Access Layer
12(1)
Distribution Layer
13(1)
Core Layer (Backbone)
14(3)
Layer 3 in the Access Layer
17(2)
The Cisco Enterprise Campus Architecture
19(1)
The Need for a Core Layer
20(2)
Types of Cisco Switches
22(12)
Comparing Layer 2 and Multilayer Switches
24(1)
MAC Address Forwarding
24(1)
Layer 2 Switch Operation
25(1)
Layer 3 (Multilayer) Switch Operation
26(1)
Useful Commands for Viewing and Editing Catalyst Switch MAC Address Tables
27(1)
Frame Rewrite
28(1)
Distributed Hardware Forwarding
28(1)
Cisco Switching Methods
29(1)
Route Caching
30(1)
Topology-Based Switching
31(2)
Hardware Forward Details
33(1)
Study Tips
34(1)
Summary
34(1)
Review Questions
35(6)
Chapter 3 Campus Network Architecture
41(78)
Implementing VLANs and Trunks in Campus Environment
41(29)
VLAN Overview
42(2)
VLAN Segmentation
44(1)
End-to-End VLANs
44(1)
Local VLANs
45(1)
Comparison of End-to-End VLANs and Local VLANs
46(1)
Mapping VLANs to a Hierarchical Network
47(2)
Implementing a Trunk in a Campus Environment
49(3)
Understanding Native VLAN in 802.1Q Trunking
52(1)
Understanding DTP
53(1)
VLAN Ranges and Mappings
54(1)
Configuring, Verifying, and Troubleshooting VLANs and Trunks
55(2)
Verifying the VLAN Configuration
57(4)
Configuring VLANs and Trunks
61(4)
Best Practices for VLANs and Trunking
65(2)
Voice VLAN Overview
67(2)
Switch Configuration for Wireless Network Support
69(1)
VLAN Trunking Protocol
70(24)
VTP Overview
70(1)
VTP Modes
71(2)
VTP Versions
73(1)
VTP Pruning
74(1)
VTP Authentication
75(1)
VTP Advertisements
75(2)
VTP Messages Types
77(1)
Summary Advertisements
77(1)
Subset Advertisements
77(1)
Configuring and Verifying VTP
78(9)
Overwriting VTP Configuration (Very Common Issue with VTP)
87(6)
Best Practices for VTP Implementation
93(1)
Implementing EtherChannel in a Switched Network
94(15)
The Need for EtherChannel
94(3)
EtherChannel Mode Interactions
97(1)
LACP
97(1)
PAgP
98(1)
Layer 2 EtherChannel Configuration Guidelines
99(1)
EtherChannel Load-Balancing Options
100(2)
Configuring EtherChannel in a Switched Network
102(1)
EtherChannel Configuration and Load Balancing
103(5)
EtherChannel Guard
108(1)
Study Tips
109(1)
Summary
110(1)
Review Questions
110(9)
Chapter 4 Spanning Tree in Depth
119(84)
Spanning Tree Protocol Overview
120(13)
STP Need
120(1)
STP Standards
121(1)
STP Operations
122(2)
Bridge Protocol Data Units
124(1)
Root Bridge Election
124(2)
Root Port Election
126(2)
Designated Port Election
128(1)
STP Port States
129(1)
Per-VLAN STP Plus (PVST+)
130(1)
STP Topology Changes
131(2)
Rapid Spanning Tree Protocol
133(18)
RSTP Port Roles
134(1)
Comparison of RSTP and STP Port States
135(1)
RSTP Topology Changes
136(2)
RSTP Link Types
138(2)
Configuring and Modifying STP Behavior
140(3)
Changing STP Priority
143(2)
STP Path Manipulation
145(3)
STP Timers
148(3)
Implementing STP Stability Mechanisms
151(28)
Use UplinkFast
153(1)
Use BackboneFast
154(2)
Use PortFast
156(2)
Securing PortFast Interface with BPDU Guard
158(1)
Disabling STP with BPDU Filter
159(2)
Use Root Guard
161(3)
Loop Guard Overview
164(2)
Use UDLD
166(4)
UDLD Recommended Practices
170(1)
Use FlexLinks
171(4)
STP Stability Mechanisms Recommendations
175(4)
Configuring Multiple Spanning Tree Protocol
179(17)
Introducing MST
179(3)
MST Regions
182(1)
STP Instances with MST
183(2)
Extended System ID for MST
185(1)
Configuring and Verifying MST
185(7)
Configuring MST Path Cost
192(1)
Configuring MST Port Priority
193(1)
MST Protocol Migration
194(1)
MST Recommended Practices
194(2)
Troubleshooting STP
196(2)
Potential STP Problems
196(1)
Duplex Mismatch
196(1)
Unidirectional Link Failure
197(1)
Frame Corruption
197(1)
Resource Errors
198(1)
PortFast Configuration Errors
198(1)
Study Tips
198(1)
Summary
199(1)
Review Questions
200(3)
Chapter 5 Inter-VLAN Routing
203(44)
Describing Inter-VLAN Routing
204(21)
Introduction to Inter-VLAN Routing
204(2)
Inter-VLAN Routing Using an External Router
206(1)
Configuring Inter-VLAN Routing Using an External Router
207(1)
Routing with an External Router
208(3)
External Routers: Advantages Disadvantages
211(1)
Inter-VLAN Routing Using Switch Virtual Interfaces
212(2)
SVI: Advantages and Disadvantages
214(1)
Routing with Routed Ports
214(1)
Routed Ports: Advantages
215(1)
Configuring Inter-VLAN Routing Using SVI and Routed Ports
216(1)
Routing on a Multilayer Switch
217(3)
Using the SVI autostate exclude Command
220(1)
SVI Configuration Checklist
221(1)
Troubleshooting Inter-VLAN Problems
222(1)
Example of a Troubleshooting Plan
223(2)
Layer 2 Versus Layer 3 EtherChannel
225(6)
Layer 3 EtherChannel Configuration
226(3)
Verifying Routing Protocols
229(2)
Implementing DHCP
231(9)
DHCP Overview
231(2)
Configuring DHCP in Multilayer Switched Network
233(6)
Configuring a DHCP Relay
239(1)
Configuring DHCP Options
239(1)
Study Tips
240(1)
Summary
241(1)
Review Questions
242(5)
Chapter 6 First-Hop Redundancy
247(58)
Overview of FHRP and HSRP
247(27)
The Need for First-Hop Redundancy
248(2)
HSRP Overview
250(3)
HSRP State Transition
253(1)
Aligning HSRP with STP Topology
254(1)
Configuring and Tuning HSRP
255(2)
Forwarding Through the Active Router
257(6)
Load Sharing with HSRP
263(2)
The Need for Interface Tracking with HSRP
265(1)
HSRP Interface Tracking
266(2)
HSRP and Object Tracking
268(3)
Configuring HSRP Authentication
271(1)
Tuning HSRP Timers
272(2)
HSRP Versions
274(1)
Configuring Layer 3 Redundancy with VRRP
274(8)
About VRRP
275(1)
Configuring VRRP and Spotting the Differences from HSRP
276(3)
VRRP and Authentication
279(1)
Tracking and VRRP
280(2)
Configuring Layer 3 Redundancy with GLBP
282(18)
Introducing GLBP
282(1)
Comparing GLPB to HSRP
283(1)
GLBP States
284(1)
Configuring and Verifying GLBP
285(9)
GLBP Load-Balancing Options
294(1)
GLBP Authentication
295(1)
GLBP and STP
295(1)
Tracking and GLBP
296(4)
Study Tips
300(1)
Summary
301(1)
References
301(1)
Review Questions
302(3)
Chapter 7 Network Management
305(46)
AAA
305(11)
Authentication Options
307(1)
RADIUS and TACACS+ Overview
308(1)
RADIUS Authentication Process
309(1)
TACACS+ Authentication Process
310(1)
Configuring AAA
311(1)
Configuring RADIUS for Console and vty Access
311(1)
Configuring TACACS+ for Console and vty Access
312(1)
AAA Authorization
313(1)
AAA Accounting
314(1)
Limitations of TACACS+ and RADIUS
315(1)
Identity-Based Networking
316(3)
IEEE 802.1X Port-Based Authentication Overview
316(2)
IEEE 802.1X Configuration Checklist
318(1)
Network Time Protocols
319(17)
The Need for Accurate Time
320(1)
Configuring the System Clock Manually
320(3)
Network Time Protocol Overview
323(1)
NTP Modes
324(2)
Other NTP Configuration Options
326(1)
NTP Example
326(3)
NTP Design Principles
329(2)
Securing NTP
331(2)
NTP Source Address
333(1)
NTP Versions
333(2)
SNTP
335(1)
PTP/IEEE-1588
336(1)
SNMP
336(8)
SNMP Overview
337(2)
SNMP Versions
339(1)
SNMP Best Practices
339(1)
SNMPv3 Configuration Example
340(2)
Verifying SNMP Version 3 Configuration
342(2)
Study Tips
344(1)
Summary
345(1)
Review Questions
345(6)
Chapter 8 Switching Features and Technologies for the Campus Network
351(42)
Discovery Protocols
352(5)
Introduction to LLDP
352(1)
Basic Configuration of LLDP
353(2)
Discovering Neighbors Using LLDP
355(2)
Unidirectional Link Detection
357(3)
UDLD Mechanisms and Specifics
358(1)
UDLD Configuration
358(2)
Leveraging UDLD and STP Loop Guard Together
360(1)
Power over Ethernet
360(4)
PoE Components
362(1)
PoE Standards
362(1)
PoE Negotiation
362(1)
Configuring and Verifying PoE
363(1)
SDM Templates
364(4)
SDM Template Types
365(2)
Choosing the Right SDM Template
367(1)
System Resource Configuration on Other Platforms
367(1)
Monitoring Features
368(6)
SPAN and RSPAN Overview
368(3)
SPAN Configuration
371(1)
RSPAN Configuration
372(2)
IP SLA
374(10)
Introduction to IP SLA
375(2)
IP SLA Source and Responder
377(1)
IP SLA Configuration
377(2)
IP SLA Operation with Responder
379(2)
IP SLA Time Stamps
381(1)
Configuring Authentication for IP SLA
382(1)
IP SLA Example for UDP Jitter
383(1)
Study Tips
384(1)
Summary
385(1)
Review Questions
385(8)
Chapter 9 High Availability
393(16)
The Need for Logical Switching Architectures
394(1)
What Is StackWise?
395(2)
StackWise Benefits
396(1)
Verifying StackWise
396(1)
What Is VSS?
397(4)
VSS Benefits
398(1)
Verifying VSS
399(2)
Redundant Switch Supervisors
401(4)
Supervisor Redundancy Modes
402(1)
Stateful Switchover
403(1)
Nonstop Forwarding
404(1)
Study Tips
405(1)
Summary
405(1)
Review Questions
406(1)
References
406(3)
Chapter 10 Campus Network Security
409(60)
Overview of Switch Security Issues
410(1)
Cisco Switch Security Configuration Best Practices
411(3)
Campus Network Vulnerabilities
414(5)
Rogue Access
414(1)
Switch Vulnerabilities
415(2)
MAC Flooding Attacks
417(2)
Introducing Port Security
419(6)
Port Security Configuration
420(2)
Port Error Conditions
422(1)
Err-Disabled Automatic Recovery
423(1)
Port Access Lists
424(1)
Storm Control
425(5)
Introduction to Storm Control
426(1)
Configuring and Verifying Storm Control on an Interface
427(3)
Mitigating Spoofing Attacks
430(13)
DHCP Spoofing Attacks
430(2)
DHCP Snooping
432(1)
DHCP Option 82
433(1)
DHCP Snooping Example Configuration
433(3)
IP Source Guard
436(2)
IPSG Configuration
438(1)
ARP Spoofing
439(1)
Dynamic ARP Inspection
440(1)
DAI Configuration
441(2)
Securing VLAN Trunks
443(8)
Switch Spoofing
444(2)
VLAN Hopping
446(1)
Protecting Against VLAN Hopping
447(1)
VLAN Access Lists
448(1)
VACL Interaction with ACLs and PACLs
449(1)
Configuring VACLs
450(1)
Private VLANs
451(7)
Introduction to PVLANs
452(1)
PVLAN Port Types
453(1)
PVLAN Configuration
454(2)
PVLAN Verification
456(1)
PVLANs Across Multiple Switches
457(1)
Using the Protected Port Feature
458(1)
Study Tips
458(1)
Summary
459(1)
Review Questions
460(9)
Appendix A Answers to
Chapter Review Questions
469
Index 473
Introduction xxi
Chapter 1 Troubleshooting Methods
1(14)
Troubleshooting Principles
1(3)
Structured Troubleshooting Approaches
4(8)
The Top-Down Troubleshooting Approach
6(1)
The Bottom-Up Troubleshooting Approach
7(1)
The Divide-and-Conquer Troubleshooting Approach
8(1)
The Follow-the-Path Troubleshooting Approach
9(1)
The Compare-Configurations Troubleshooting Approach
10(1)
The Swap-Components Troubleshooting Approach
11(1)
Troubleshooting Example Using Six Different Approaches
12(1)
Summary
13(1)
Review Questions
14(1)
Chapter 2 Structured Troubleshooting
15(14)
Troubleshooting Method and Procedure
16(9)
Defining the Problem
17(1)
Gathering Information
18(2)
Analyzing the Information
20(1)
Eliminating Potential Causes
21(1)
Proposing a Hypothesis (Likely Cause of the Problem)
21(2)
Testing and Verifying Validity of the Proposed Hypothesis
23(1)
Solving the Problem and Documenting the Work
24(1)
Troubleshooting Example Based on the Structured Method and Procedures
25(1)
Summary
26(1)
Review Questions
27(2)
Chapter 3 Network Maintenance Tasks and Best Practices
29(32)
Structured Network Maintenance
29(2)
Network Maintenance Processes and Procedures
31(6)
Common Maintenance Tasks
32(1)
Network Maintenance Planning
33(1)
Scheduling Maintenance
33(1)
Formalizing Change-Control Procedures
34(1)
Establishing Network Documentation Procedures
34(1)
Establishing Effective Communication
35(1)
Defining Templates/Procedures/Conventions (Standardization)
36(1)
Planning for Disaster Recovery
36(1)
Network Maintenance Services and Tools
37(10)
Network Time Services
39(1)
Logging Services
40(2)
Performing Backup and Restore
42(5)
Integrating Troubleshooting into the Network Maintenance Process
47(7)
Network Documentation and Baseline
48(2)
Communication
50(3)
Change Control
53(1)
Summary
54(3)
Review Questions
57(4)
Chapter 4 Basic Switching and Routing Process and Effective IOS Troubleshooting Commands
61(38)
Basic Layer 2 Switching Process
61(8)
Ethernet Frame Forwarding (Layer 2 Data Plane)
62(5)
Layer 2 Switching Verification
67(2)
Basic Layer 3 Routing Process
69(7)
IP Packet Forwarding (Layer 3 Data Plane)
70(3)
Using IOS Commands to Verify IP Packet Forwarding
73(3)
Selective Information Gathering Using IOS show Commands, debug Commands, Ping, and Telnet
76(16)
Filtering and Redirecting show Command's Output
76(5)
Testing Network Connectivity Using Ping and Telnet
81(4)
Collecting Real-Time Information Using Cisco IOS debug Commands
85(1)
Diagnosing Hardware Issues Using Cisco IOS Commands
86(1)
Checking CPU Utilization
87(1)
Checking Memory Utilization
88(1)
Checking Interfaces
89(3)
Summary
92(2)
Review Questions
94(5)
Chapter 5 Using Specialized Maintenance and Troubleshooting Tools
99(18)
Categories of Troubleshooting Tools
100(1)
Traffic-Capturing Features and Tools
101(4)
SPAN
102(1)
RSPAN
103(2)
Information Gathering with SNMP
105(2)
Information Gathering with NetFlow
107(2)
Network Event Notification
109(4)
Summary
113(1)
Review Questions
114(3)
Chapter 6 Troubleshooting Case Study: SECHNIK Networking
117(56)
SECHNIK Networking Trouble Ticket 1
118(16)
Troubleshooting PCTs Connectivity Problem
118(1)
Gathering Information
119(1)
Analyzing Information, Eliminating Causes, and Gathering Further Information
119(2)
Proposing Hypotheses
121(1)
Testing the Hypotheses and Solving the Problem
121(1)
Troubleshooting Ethernet Trunks
122(1)
Troubleshooting PC2's Connectivity Problem
123(1)
Gathering Information
124(2)
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem
126(1)
Troubleshooting NAT
127(1)
Troubleshooting PC3's Connectivity Problem
128(1)
Gathering Information
129(1)
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis
129(1)
Troubleshooting Network Device Interfaces
130(1)
Troubleshooting PC4's IPv6 Connectivity Problem
131(1)
Gathering Information
131(1)
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis
132(1)
Troubleshooting IPv6 Address Assignment on Clients
133(1)
SECHNIK Networking Trouble Ticket 2
134(18)
Troubleshooting PC1's Internet Connectivity Problem
134(1)
Gathering Information
135(2)
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem
137(1)
Troubleshooting Network Layer Connectivity
138(3)
Troubleshooting PC2's SSH Connectivity Problem
141(1)
Verifying and Defining the Problem
141(1)
Gathering Information
142(1)
Proposing a Hypothesis and Testing the Hypothesis
143(2)
TCP Three-Way Handshake
145(1)
Troubleshooting PC4's DHCP Address Problem
146(1)
Verifying and Defining the Problem
146(1)
Gathering Information
147(1)
Proposing a Hypothesis, Testing a Hypothesis, and Solving the Problem
148(3)
Troubleshooting Error-Disabled Ports
151(1)
SECHNIK Networking Trouble Ticket 3
152(14)
Troubleshooting PCI and PC2's Internet Connectivity Issues
153(1)
Verifying and Defining the Problem
153(1)
Gathering Information
153(4)
Proposing a Hypothesis and Testing the Hypothesis
157(2)
Solving the Problem
159(1)
Troubleshooting DHCP
160(1)
The passive-interface Command
161(1)
Troubleshooting PC3's Internet Connectivity Issues
162(1)
Verifying and Defining the Problem
162(1)
Gathering Information
162(2)
Proposing a Hypothesis and Testing the Hypothesis
164(1)
Solving the Problem
165(1)
IPv6 Review
166(1)
Summary
166(3)
Review Questions
169(4)
Chapter 7 Troubleshooting Case Study: TINC Garbage Disposal
173(84)
TINC Garbage Disposal Trouble Ticket 1
174(19)
Troubleshooting Lack of Backup Internet Connectivity Through GW2
174(2)
Information Gathering
176(2)
Analyzing Information, Eliminating Possibilities, and Proposing a Hypothesis
178(1)
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem
178(3)
Troubleshooting BGP Neighbor Relationships
181(1)
Troubleshooting PCTs Connectivity Problem
182(1)
Gathering Information
182(1)
Analyzing Information and Gathering Further Information
183(1)
Proposing a Hypothesis, Testing the Hypothesis, and Solving the Problem
184(2)
Troubleshooting Port Security
186(1)
Troubleshooting PC2's Connectivity Problem
187(1)
Gathering Information
188(2)
Eliminating Possibilities, Proposing a Hypothesis, and Testing the Hypothesis
190(1)
Solving the Problem
191(1)
Troubleshooting VLANs
192(1)
TINC Garbage Disposal Trouble Ticket 2
193(19)
Troubleshooting GW1's OSPF Neighbor Relation Problem with Router R1
194(1)
Verifying the Problem
194(1)
Gathering Information
194(5)
Analyzing Information, Eliminating Possibilities, and Proposing a Hypothesis
199(1)
Testing the Hypothesis and Solving the Problem
199(2)
Troubleshooting OSPF Adjacency
201(1)
Troubleshooting Secure Shell Version 2 Access to Router R2 from PC4
202(1)
Verifying the Problem
202(1)
Gathering Information
203(1)
Proposing a Hypothesis and Testing the Hypothesis
204(1)
Solving the Problem
205(1)
Troubleshooting SSH and Telnet
206(1)
Troubleshooting Duplicate Address Problem Discovered Through R1 and R2's Log Messages
207(1)
Verifying the Problem
207(1)
Gathering Information
207(3)
Analyzing the Information and Proposing a Hypothesis
210(1)
Testing the Hypothesis and Solving the Problem
210(1)
Troubleshooting HSRP
211(1)
TINC Garbage Disposal Trouble Ticket 3
212(19)
Troubleshooting Sporadic Internet Connectivity Problem Experienced by Users of PCI and PC2
212(1)
Verifying and Defining the Problem
213(1)
Gathering Information
213(2)
Analyzing Information and Proposing a Hypothesis
215(2)
Testing the Hypothesis and Solving the Problem
217(1)
Troubleshooting Erroneous Routing Information
218(2)
Troubleshooting Multiple Masters within a VRRP
220(1)
Verifying and Defining the Problem
220(1)
Gathering Information
221(1)
Analyzing the Information and Proposing a Hypothesis
222(1)
Testing the Hypothesis, and Solving the Problem
222(2)
Troubleshooting VRRP
224(1)
Troubleshooting EtherChannel Between ASW4 and ASW3
224(1)
Verifying the Problem
224(1)
Defining the Problem
225(1)
Gathering Information
225(2)
Proposing a Hypothesis and Testing the Hypothesis
227(1)
Solving the Problem
228(1)
Troubleshooting EtherChannel
229(2)
TINC Garbage Disposal Trouble Ticket 4
231(21)
Troubleshooting Inconsistent and Sporadic Internet Connectivity Problem Experienced By Users of PCI and PC2
231(1)
Verifying and Defining the Problem
232(1)
Gathering Information
233(2)
Analyzing Information and Proposing a Hypothesis
235(1)
Testing the Hypotheses
235(4)
Solving the Problem
239(2)
Troubleshooting FHRPs
241(1)
Troubleshooting Sporadic Loss of Connectivity on PC4
242(1)
Verifying the Problem and Making a Troubleshooting Plan
242(1)
Gathering Information
242(2)
Analyzing the Information and Gathering Further Information
244(1)
Proposing a Hypothesis and Testing the Hypothesis
245(1)
Solving the Problem
246(2)
The Cisco IOS DHCP Snooping Feature
248(1)
Cisco Technical Assistance Center
248(1)
Troubleshooting SSH Connection from PC4 to Router GW2
249(1)
Verifying the Problem and Making a Troubleshooting Plan
249(1)
Gathering Information
250(1)
Proposing a Hypothesis and Testing the Hypothesis
251(1)
Solving the Problem
252(1)
Summary
252(3)
Review Questions
255(2)
Chapter 8 Troubleshooting Case Study: PILE Forensic Accounting
257(76)
PILE Forensic Accounting Trouble Ticket 1
258(16)
Troubleshooting PILE's Branch Connectivity to HQ and the Internet
258(1)
Verifying and Defining the Problem
258(2)
Gathering Information
260(4)
Analyzing Information
264(1)
Proposing a Hypothesis and Testing the Hypothesis
264(1)
Solving the Problem
265(1)
Troubleshooting EIGRP Adjacency
266(1)
Troubleshooting PILE's Secondary Internet Connection Through ISP2
267(1)
Verifying and Defining the Problem
267(1)
Gathering Information
268(2)
Analyzing Information and Proposing a Hypothesis
270(1)
Testing the Hypothesis
271(2)
Solving the Problem
273(1)
PILE Forensic Accounting Trouble Ticket 2
274(13)
Troubleshooting Telnet Problem: From PC3 to BR
274(1)
Gathering Information
275(1)
Troubleshooting PILE Network's Internet Access Problem
275(1)
Verifying and Defining the Problem
276(1)
Gathering Information
276(2)
Analyzing Information, Eliminating Causes, and Gathering Further Information
278(2)
Proposing and Testing a Hypothesis
280(1)
Solving the Problem
281(1)
Troubleshooting BGP
281(1)
Troubleshooting PILE Network's NTP Problem
282(1)
Verifying the Problem
283(1)
Gathering Information
283(1)
Analyzing the Gathered Information and Gathering Further Information
284(1)
Proposing a Hypothesis and Testing the Hypothesis
285(1)
Solving the Problem
286(1)
Troubleshooting NTP
286(1)
PILE Forensic Accounting Trouble Ticket 3
287(15)
Troubleshooting PC3's Lack of Internet Connectivity After the Disaster Recovery
287(1)
Verifying the Problem
288(1)
Gathering Information (First Run)
288(1)
Analyzing Information, Proposing, and Testing the First Hypothesis
289(1)
Proposing and Testing the Second Hypothesis
290(2)
Gathering Further Information (Second Run)
292(1)
Proposing and Testing the Third Hypothesis
293(1)
Solving the Problem
294(1)
Disaster Recovery Best Practices
294(2)
Troubleshooting Inter-VLAN Routing
296(1)
Troubleshooting PC4's Problem Accessing Cisco.com
297(1)
Verify the Problem and Select an Approach
297(1)
Gather Information and Analyze the Information
298(1)
Proposing and Testing a Hypothesis
299(1)
Solve the Problem
299(1)
Troubleshooting DNS
300(1)
Remote Device Management Notes
301(1)
PILE Forensic Accounting Trouble Ticket 4
302(11)
Troubleshooting Branch Site Internet Connectivity Problem After EIGRP Reconfiguration
302(1)
Verifying the Problem
302(1)
Gathering Information
303(1)
Gathering Further Information and Analyzing Information
303(2)
Proposing a Hypothesis and Testing the Hypothesis
305(2)
Solving the Problem
307(1)
The EIGRP Stub Configuration
308(1)
The New EIGRP Named Configuration
309(1)
Troubleshooting Management Access to ASW2
310(1)
Verifying the Problem
310(1)
Gathering Information
310(1)
Proposing a Hypothesis and Testing the Hypothesis
311(1)
Solving the Problem
312(1)
Providing a Default Route on Layer 2 And Multilayer Devices
313(1)
PILE Forensic Accounting Trouble Ticket 5
313(13)
Troubleshooting the Redundant Internet Access Path Through the New HQ0 Edge Router
314(1)
Verifying and Defining the Problem
314(1)
Gathering Information
315(3)
Proposing a Hypothesis and Testing the Hypothesis
318(1)
Solving the Problem
319(2)
Troubleshooting BGP Route Selection
321(1)
Troubleshooting Unauthorized Telnet Access
322(1)
Verifying the Problem
322(1)
Gathering Information
322(1)
Gathering Further Information and Analysis Information
323(1)
Proposing a Hypothesis and Testing the Hypothesis
324(1)
Solving the Problem
325(1)
Securing the Management Plane
325(1)
Summary
326(3)
Review Questions
329(4)
Chapter 9 Troubleshooting Case Study: Bank of POLONA
333(64)
Bank of POLONA Trouble Ticket 1
334(15)
Troubleshooting PC3's Lack of Connectivity to SRV2
335(1)
Verifying the Problem
335(1)
Gathering Information
336(2)
Analyzing Information and Proposing a Hypothesis, and Testing the Hypothesis
338(1)
Solving the Problem
339(1)
Troubleshooting Redistribution
339(1)
Troubleshooting VRRP with Interface Tracking
340(1)
Verifying the Problem
340(1)
Gathering Information
341(1)
Analyzing the Information
342(1)
Proposing and Testing a Hypothesis
342(1)
Solving the Problem
343(1)
FHRP Tracking Options
344(1)
Troubleshooting IP SLA Test Not Starting
345(1)
Verifying the Problem
345(1)
Gathering Information
346(1)
Proposing and Testing a Hypothesis
347(1)
Solving the Problem
348(1)
Troubleshooting IP SLA
349(1)
Bank of POLONA Trouble Ticket 2
349(15)
Troubleshooting Summarization Problem on BR3
350(1)
Verifying the Problem
350(1)
Gathering Information
350(1)
Analyzing Information
351(1)
Proposing and Testing a Hypothesis
351(1)
Solving the Problem
352(1)
Troubleshooting EIGRP Summarization
353(1)
Troubleshooting PCO's IPv6 Internet Connectivity
353(1)
Verifying the Problem
353(1)
Gathering Information
354(2)
Analyzing Information
356(1)
Proposing and Testing a Hypothesis
356(1)
Solving the Problem
357(1)
Troubleshooting RIPng
357(1)
Troubleshooting Branch 3's IPv6 Internet Connectivity
358(1)
Verifying the Problem
358(1)
Gathering Information
359(2)
Analyzing Information
361(1)
Proposing and Testing a Hypothesis
361(1)
Solving the Problem
362(1)
Troubleshooting Access Control Lists
362(2)
Bank of POLONA Trouble Ticket 3
364(14)
Troubleshooting Branch Ts IP Connectivity to the Headquarters
364(1)
Verifying the Problem
364(1)
Gathering Information
365(1)
Proposing and Testing a Hypothesis
366(1)
Gathering Further Information
367(1)
Proposing and Testing Another Hypothesis
367(1)
Solving the Problem
368(1)
Troubleshooting GRE Tunnels
368(1)
Troubleshooting Branch 3's Route Summarization
369(1)
Verifying the Problem and Choosing an Approach
369(1)
Gathering Information
370(3)
Analyzing the Information and Proposing a Hypothesis
373(1)
Testing the Hypothesis and Solving the Problem
373(1)
OSPF Summarization Tips and Commands
374(1)
Troubleshooting AAA Authentication on the Branch 1 Router
375(1)
Verifying the Problem and Choosing an Approach
375(1)
Gathering Information
375(1)
Proposing a Hypothesis
376(1)
Testing the Hypothesis and Solving the Problem
376(1)
Troubleshooting AAA
377(1)
Bank of POLONA Trouble Ticket 4
378(13)
Troubleshooting PCO's Connectivity to IPv6 Internet
378(1)
Verifying the Problem and Choosing an Approach
378(1)
Gathering Information
379(2)
Analyzing the Information and Proposing and Testing a Hypothesis
381(1)
Gathering Further Information
382(1)
Analyzing Information and Proposing and Testing Another Hypothesis
383(1)
Solving the Problem
384(1)
Troubleshooting OSPF for IPv6
385(1)
Troubleshooting the Dysfunctional Totally Stubby Branch Areas
386(1)
Verifying the Problem and Choosing an Approach
386(1)
Gathering Information
387(2)
Analyzing Information
389(1)
Proposing and Testing a Hypothesis
389(1)
Solving the Problem
390(1)
OSPF Stub Areas
391(1)
Summary
391(3)
Review Questions
394(3)
Chapter 10 Troubleshooting Case Study: RADULKO Transport
397(54)
RADULKO Transport Trouble Ticket 1
398(13)
Mitigating Unauthorized Switches Added by Employees
398(1)
Gathering Information
399(1)
Analyzing Information
400(1)
Proposing a Hypothesis and Solving the Problem
400(1)
Troubleshooting Spanning Tree Protocol
401(2)
Troubleshooting Policy-Based Routing
403(1)
Verifying and Defining the Problem
404(1)
Gathering Information
404(1)
Analyzing the Information
405(1)
Proposing and Testing a Hypothesis
405(1)
Solving the Problem
406(1)
Troubleshooting PBR
407(1)
Troubleshooting Neighbor Discovery
407(1)
Verifying and Defining the Problem
408(1)
Gathering Information
408(1)
Proposing and Testing a Hypothesis
409(1)
Solving the Problem
409(1)
Troubleshooting CDP and LLDP
410(1)
RADULKO Transport Trouble Ticket 2
411(13)
Troubleshooting VLANs and PCs Connectivity Problems
411(1)
Verifying the Problem
412(1)
Gathering Information
412(1)
Analyzing the Information
413(1)
Proposing and Testing a Hypothesis
413(1)
Solving the Problem
414(1)
Troubleshooting VTP
415(1)
Troubleshooting Branch Router's IPv6 Problems
416(1)
Verifying the Problem
416(1)
Gathering Information
417(1)
Proposing and Testing a Hypothesis
418(1)
Solving the Problem
418(1)
Troubleshooting EIGRP for IPv6
419(1)
Troubleshooting MP-BGP Session Problem
420(1)
Verifying the Problem
420(1)
Gathering Information
420(1)
Analyzing the Information and Proposing a Hypothesis
421(1)
Solving the Problem
422(1)
Troubleshooting MP-BGP
423(1)
RADULKO Transport Trouble Ticket 3
424(9)
Troubleshooting PCTs Problem Accessing the SRV Server at the Distribution Center
424(1)
Verifying and Defining the Problem
424(1)
Gathering Information
425(3)
Analyzing Information
428(1)
Proposing and Testing a Hypothesis
428(1)
Solving the Problem
429(1)
Troubleshooting the OSPFv3 Address Families Feature
429(1)
Troubleshooting OSPFv3 Authentication
430(1)
Verifying the Problem
430(1)
Gathering Information
431(1)
Analyzing Information
432(1)
Proposing and Testing a Hypothesis
432(1)
Solving the Problem
433(1)
RADULKO Transport Trouble Ticket 4
433(11)
Troubleshooting Undesired External OSPF Routes in DST's Routing Table
434(1)
Verifying and Defining the Problem
434(1)
Gathering Information
435(1)
Analyzing Information
436(1)
Proposing and Testing a Hypothesis
437(2)
Solving the Problem
439(1)
Troubleshooting PCs IPv6 Internet Access
440(1)
Verifying the Problem
440(1)
Gathering Information
440(2)
Analyzing Information
442(1)
Proposing and Testing a Hypothesis
443(1)
Solving the Problem
444(1)
Summary
444(4)
Review Questions
448(3)
Appendix A Answers to Review Questions
451(2)
Index 453
Diane Teare P.Eng, CCNP, CCDP, CCSI, PMP, is a professional in the networking, training, project management, and e-learning fields.

 

Bob Vachon, is a professor at Cambrian College in Sudbury, Ontario, Canada, where he teaches Cisco networking infrastructure courses.

 

Rick Graziani teaches computer science and computer networking courses at Cabrillo College in Aptos, California.

 

Richard E. Froom, CCIE® No. 5102, is a manager within the Solution Validation Services (SVS) team at Cisco.

 

Erum Frahim, CCIE No. 7549, is a technical leader working in the Solution Validation Services (SVS) group at Cisco.

 

Amir S. Ranjbar, CCIE No. 8669, is a Certified Cisco Systems Instructor and a senior network consultant.