Muutke küpsiste eelistusi

Connecting Networks Companion Guide [Kõva köide]

  • Formaat: Hardback, 576 pages, kõrgus x laius x paksus: 238x209x31 mm, kaal: 1220 g
  • Ilmumisaeg: 15-May-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133326
  • ISBN-13: 9781587133329
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 576 pages, kõrgus x laius x paksus: 238x209x31 mm, kaal: 1220 g
  • Ilmumisaeg: 15-May-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133326
  • ISBN-13: 9781587133329

Connecting Networks Companion Guide is the official supplemental textbook for the Connecting Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. You will also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with 195 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
  • How To–Look for this icon to study the steps you need to learn to perform certain tasks.
  • Interactive Activities–Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon.
  • Videos–Watch the videos embedded within the online course.
  • Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.

Introduction xix
Chapter 1 Hierarchical Network Designs
1(34)
Objectives
1(1)
Key Terms
1(1)
Introduction (1.0.1.1)
2(1)
Hierarchical Network Design Overview (1.1)
2(8)
Enterprise Network Campus Design (1.1.1)
2(1)
Network Requirements (1.1.1.1)
3(1)
Structured Engineering Principles (1.1.1.2)
4(1)
Hierarchical Network Design (1.1.2)
4(1)
Network Hierarchy (1.1.2.1)
4(2)
The Access Layer (1.1.2.2)
6(1)
The Distribution Layer (1.1.2.3)
7(2)
The Core Layer (1.1.2.4)
9(1)
Two- Tier Collapsed Core Design (1.1.2.5)
10(1)
Cisco Enterprise Architecture (1.2)
10(4)
Modular Design (1.2.1.1)
11(1)
Modules in the Enterprise Architecture (1.2.1.2)
12(2)
Cisco Enterprise Architecture Model (1.2.2)
14(8)
Cisco Enterprise Architecture Model (1.2.2.1)
14(1)
Cisco Enterprise Campus (1.2.2.2)
15(2)
Cisco Enterprise Edge (1.2.2.3)
17(1)
Service Provider Edge (1.2.2.4)
18(3)
Remote Functional Area (1.2.2.5)
21(1)
Enterprise Branch
21(1)
Enterprise Teleworker
22(1)
Enterprise Data Center
22(1)
Evolving Network Architectures (1.3)
22(2)
IT Challenges (1.3.1.1)
22(1)
Emerging Enterprise Architectures (1.3.1.2)
23(1)
Emerging Network Architectures (1.3.2)
24(5)
Cisco Borderless Networks (1.3.2.1)
24(1)
Collaboration Architecture (1.3.2.2)
25(1)
Data Center and Virtualization (1.3.2.3)
26(1)
Expanding the Network (1.3.2.4)
27(2)
Summary (1.4)
29(1)
Practice
30(1)
Class Activities
30(1)
Packet Tracer Activities
30(1)
Check Your Understanding Questions
31(4)
Chapter 2 Connecting the WAN
35(44)
Objectives
35(1)
Key Terms
35(2)
Introduction (2.0.1.1)
37(1)
WAN Technologies Overview (2.1)
37(7)
Why a WAN? (2.1.1.1)
37(1)
Are WANs Necessary? (2.1.1.2)
38(1)
Evolving Networks (2.1.1.3)
39(1)
Small Office (2.1.1.4)
39(1)
Campus Network (2.1.1.5)
40(2)
Branch Networks (2.1.1.6)
42(1)
Distributed Network (2.1.1.7)
43(1)
WAN Operations (2.1.2)
44(3)
WANs in the OSI Model (2.1.2.1)
44(1)
Common WAN Terminology (2.1.2.2)
45(2)
WAN Devices (2.1.2.3)
47(4)
Circuit-Switched Networks (2.1.2.4)
48(2)
Packet-Switched Networks (2.1.2.5)
50(1)
Selecting a WAN Technology (2.2)
51(1)
WAN Link Connection Options (2.2.1.1)
51(3)
Service Provider Network Infrastructure (2.2.1.2)
52(2)
Private WAN Infrastructures (2.2.2)
54(10)
Leased Lines (2.2.2.1)
54(1)
Dialup (2.2.2.2)
55(1)
ISDN (2.2.2.3)
56(2)
Frame Relay (2.2.2.4)
58(1)
ATM (2.2.2.5)
59(1)
Ethernet WAN (2.2.2.6)
60(2)
MPLS (2.2.2.7)
62(1)
VSAT (2.2.2.8)
63(1)
Public WAN Infrastructure (2.2.3)
64(9)
DSL (2.2.3.1)
64(1)
Cable (2.2.3.2)
65(1)
Wireless (2.2.3.3)
66(1)
3G/4G Cellular (2.2.3.4)
67(1)
VPN Technology (2.2.3.5)
68(2)
Selecting WAN Services (2.2.4)
70(1)
Choosing a WAN Link Connection (2.2.4.1, 2.2.4.2)
70(1)
What Is the Purpose of the WAN?
70(1)
What Is the Geographic Scope?
70(1)
What Are the Traffic Requirements?
71(2)
Summary (2.3)
73(1)
Practice
74(1)
Class Activities
74(1)
Labs
74(1)
Check Your Understanding Questions
74(5)
Chapter 3 Point-to-Point Connections
79(74)
Objectives
79(1)
Key Terms
79(1)
Introduction (3.0.1.1)
80(16)
Serial Point-to-Point Overview (3.1)
80(1)
Serial Communications (3.1.1)
81(1)
Serial and Parallel Ports (3.1.1.1)
81(1)
Serial Communication (3.1.1.2)
82(2)
Point-to-Point Communication Links (3.1.1.3)
84(1)
Time-Division Multiplexing (3.1.1.4)
85(1)
Statistical Time-Division Multiplexing (3.1.1.5)
86(1)
TDM Examples -- Sonet and SDM (3.1.1.6)
87(1)
Demarcation Point (3.1.1.7)
88(2)
DTE-DCE (3.1.1.8)
90(1)
Serial Cables (3.1.1.9)
91(3)
Serial Bandwidth (3.1.1.10)
94(2)
HDLC Encapsulation (3.1.2)
96(1)
WAN Encapsulation Protocols (3.1.2.1)
96(49)
HDLC Encapsulation (3.1.2.2)
97(1)
HDLC Frame Types (3.1.2.3)
98(2)
Configuring HDLC Encapsulation (3.1.2.4)
100(1)
Troubleshooting a Serial Interface (3.1.2.5)
100(4)
PPP Operation (3.2)
104(1)
Benefits of PPP (3.2.1)
104(1)
Introducing PPP (3.2.1.1)
104(2)
Advantages of PPP (3.2.1.2)
106(1)
LCP and NCP (3.2.2)
106(1)
PPP Layered Architecture (3.2.2.1)
106(1)
PPP - Link Control Protocol (LCP) (3.2.2.2)
107(1)
PPP - Network Control Protocol (NCP) (3.2.2.3)
108(1)
PPP Frame Structure (3.2.2.4)
108(1)
PPP Sessions (3.2.3)
109(1)
Establishing a PPP Session (3.2.3.1)
110(1)
LCP Operation (3.2.3.2)
111(2)
LCP Packet (3.2.3.3)
113(2)
PPP Configuration Options (3.2.3.4)
115(2)
NCP Explained (3.2.3.5)
117(1)
Configure PPP (3.3)
118(1)
Configure PPP (3.3.1)
118(1)
PPP Configuration Options (3.3.1.1)
119(1)
PPP Basic Configuration Command (3.3.1.2)
120(1)
PPP Compression Commands (3.3.1.3)
121(1)
PPP Link Quality Monitoring Command (3.3.1.4)
122(1)
PPP Multilink Commands (3.3.1.5)
123(2)
Verifying PPP Configuration (3.3.1.6)
125(1)
PPP Authentication (3.3.2)
126(1)
PPP Authentication Protocols (3.3.2.1)
127(1)
Password Authentication Protocol (PAP) (3.3.2.2)
127(2)
Challenge Handshake Authentication Protocol (CHAP) (3.3.2.3)
129(2)
PPP Encapsulation and Authentication Process (3.3.2.4)
131(3)
Configuring PPP Authentication (3.3.2.5)
134(2)
Configuring PPP with Authentication (3.3.2.6)
136(2)
Troubleshoot WAN Connectivity (3.4)
138(1)
Troubleshoot PPP (3.4.1)
138(1)
Troubleshooting PPP Serial Encapsulation (3.4.1.1)
138(2)
Debug PPP (3.4.1.2)
140(2)
Troubleshooting a PPP Configuration with Authentication (3.4.1.3)
142(3)
Summary (3.5)
145(1)
Practice
146(1)
Class Activities
146(1)
Labs
146(1)
Packet Tracer Activities
146(1)
Check Your Understanding Questions
147(6)
Chapter 4 Frame Relay
153(64)
Objectives
153(1)
Key Terms
153(1)
Introduction (4.0.1.1)
154(1)
Introduction to Frame Relay (4.1)
154(55)
Benefits of Frame Relay (4.1.1)
155(1)
Introducing Frame Relay (4.1.1.1)
155(1)
Benefits of Frame Relay WAN Technology (4.1.1.2)
156(1)
Dedicated Line Requirements (4.1.1.3)
157(2)
Cost-Effectiveness and Flexibility of Frame Relay (4.1.1.4)
159(1)
Frame Relay Operation (4.1.2)
160(1)
Virtual Circuits (4.1.2.1)
160(3)
Multiple Virtual Circuits (4.1.2.2)
163(2)
Frame Relay Encapsulation (4.1.2.3)
165(2)
Frame Relay Topologies (4.1.2.4, 4.1.2.5)
167(4)
Frame Relay Address Mapping (4.1.2.6)
171(3)
Local Management Interface (LMI) (4.1.2.7)
174(1)
LMI Extensions (4.1.2.8)
175(3)
Using LMI and Inverse ARP to Map Addresses (4.1.2.9)
178(2)
Advanced Frame Relay Concepts (4.1.3)
180(1)
Access Rate and Committed Information Rate (4.1.3.1)
180(1)
Frame Relay Example (4.1.3.2)
181(2)
Bursting (4.1.3.3)
183(1)
Frame Relay Flow Control (4.1.3.4)
184(3)
Configure Frame Relay (4.2)
187(1)
Configure Basic Frame Relay (4.2.1)
187(1)
Basic Frame Relay Configuration Commands (4.2.1.1)
187(3)
Configuring a Static Frame Relay Map (4.2.1.2)
190(2)
Verify a Static Frame Relay Map (4.2.1.3)
192(1)
Configure Subinterfaces (4.2.2)
193(1)
Reachability Issues (4.2.2.1)
193(3)
Solving Reachability Issues (4.2.2.2)
196(3)
Configuring Point-to-Point Subinterfaces (4.2.2.3)
199(1)
Example: Configuring Point-to-Point Subinterfaces (4.2.2.4)
200(3)
Troubleshoot Connectivity (4.3)
203(1)
Troubleshoot Frame Relay (4.3.1)
203(1)
Verifying Frame Relay Operation: Frame Relay Interface (4.3.1.1)
203(1)
Verifying Frame Relay Operation: LMI Operations (4.3.1.2)
204(1)
Verifying Frame Relay Operation: PVC Status (4.3.1.3)
205(1)
Verifying Frame Relay Operation: Inverse ARP (4.3.1.4)
205(2)
Troubleshooting Frame Relay Operation (4.3.1.5)
207(2)
Summary (4.4)
209(1)
Practice
210(1)
Class Activities
210(1)
Labs
210(1)
Packet Tracer Activities
210(1)
Check Your Understanding Questions
211(6)
Chapter 5 Network Address Translation for IPv4
217(62)
Objectives
217(1)
Key Terms
217(1)
Introduction (5.0.1.1)
218(53)
NAT Operation (5.1)
219(1)
NAT Characteristics (5.1.1)
219(1)
IPv4 Private Address Space (5.1.1.1)
219(1)
What Is NAT? (5.1.1.2)
220(1)
NAT Terminology (5.1.1.3)
221(3)
How NAT Works (5.1.1.5)
224(1)
Types of NAT (5.1.2)
225(1)
Static NAT (5.1.2.1)
225(1)
Dynamic NAT (5.1.2.2)
226(1)
Port Address Translation (PAT) (5.1.2.3)
227(1)
Next Available Port (5.1.2.4)
228(2)
Comparing NAT and PAT (5.1.2.5)
230(1)
Benefits of NAT (5.1.3)
231(1)
Benefits of NAT (5.1.3.1)
231(1)
Disadvantages of NAT (5.1.3.2)
232(1)
Configuring NAT (5.2)
233(1)
Configuring Static NAT (5.2.1)
233(1)
Configuring Static NAT (5.2.1.1)
233(2)
Analyzing Static NAT (5.2.1.2)
235(2)
Verifying Static NAT (5.2.1.3)
237(1)
Configuring Dynamic NAT (5.2.2)
238(1)
Dynamic NAT Operation (5.2.2.1)
238(1)
Configuring Dynamic NAT (5.2.2.2)
239(3)
Analyzing Dynamic NAT (5.2.2.3)
242(2)
Verifying Dynamic NAT (5.2.2.4)
244(3)
Configuring Port Address Translation (PAT) (5.2.3)
247(1)
Configuring PAT: Address Pool (5.2.3.1)
247(2)
Configuring PAT: Single Address (5.2.3.2)
249(2)
Analyzing PAT (5.2.3.3)
251(2)
Verifying PAT (5.2.3.4)
253(2)
Port Forwarding (5.2.4)
255(1)
Port Forwarding (5.2.4.1)
255(2)
SOHO Example (5.2.4.2)
257(1)
Configuring Port Forwarding with IOS (5.2.4.3)
258(2)
Configuring NAT and IPv6 (5.2.5)
260(1)
NAT for IPv6? (5.2.5.1)
260(2)
IPv6 Unique Local Addresses (5.2.5.2)
262(1)
NAT for IPv6 (5.2.5.3)
263(1)
Troubleshooting NAT (5.3)
264(1)
Troubleshooting NAT: show Commands (5.3.1.1)
264(2)
Troubleshooting NAT: debug Command (5.3.1.2)
266(2)
Case Study (5.3.1.3)
268(3)
Summary (5.4)
271(1)
Practice
272(1)
Class Activities
272(1)
Labs
272(1)
Packet Tracer Activities
272(1)
Check Your Understanding Questions
273(6)
Chapter 6 Broadband Solutions
279(34)
Objectives
279(1)
Key Terms
279(1)
Introduction (6.0.1.1)
280(29)
Teleworking (6.1)
280(1)
Benefits of Teleworking (6.1.1)
280(1)
Introducing Teleworking (6.1.1.1)
281(1)
Employer Benefits of Teleworking (6.1.1.2)
281(1)
Community and Government Benefits (6.1.1.3)
282(1)
Individual Benefits of Teleworking (6.1.1.4)
283(1)
Detriments to Telework (6.1.1.5)
283(1)
Business Requirements for Teleworker Services (6.1.2)
284(1)
Teleworker Solution (6.1.2.1)
284(2)
Teleworker Connectivity Requirements (6.1.2.2)
286(1)
Comparing Broadband Solutions (6.2)
287(1)
Cable (6.2.1)
287(1)
What is a Cable System? (6.2.1.1)
287(2)
Cable and the Electromagnetic Spectrum (6.2.1.2)
289(1)
DOCSIS (6.2.1.3)
290(1)
Cable Components (6.2.1.4)
291(2)
DSL (6.2.2)
293(1)
What is DSL? (6.2.2.1)
293(1)
DSL Connections (6.2.2.2)
294(1)
Separating Voice and Data in ADSL (6.2.2.3)
295(3)
Broadband Wireless (6.2.3)
298(1)
Types of Broadband Wireless Technologies (6.2.3.1, 6.2.3.2)
298(5)
Selecting Broadband Solutions (6.2.4)
303(1)
Comparing Broadband Solutions (6.2.4.1)
303(1)
Configuring xDSL Connectivity (6.3)
304(1)
PPPoE Overview (6.3.1)
304(1)
PPPoE Motivation (6.3.1.1)
304(2)
PPPoE Concepts (6.3.1.2)
306(1)
Configuring PPPoE (6.3.2)
306(1)
PPPoE Configuration (6.3.2.1)
307(2)
Summary (6.4)
309(1)
Practice
310(1)
Class Activities
310(1)
Labs
310(1)
Check Your Understanding Questions
310(3)
Chapter 7 Securing Site-to-Site Connectivity
313(38)
Objectives
313(1)
Key Terms
313(1)
Introduction (7.0.1.1)
314(5)
VPNs (7.1)
314(1)
Fundamentals of VPNs (7.1.1)
314(2)
Introducing VPNs (7.1.1.1) 315-Benefits of VPNs (7.1.1.2)
316(1)
Types of VPNs (7.1.2)
317(1)
Remote-Access VPNs (7.1.2.2)
318(1)
Site-to-Site GRE Tunnels (7.2)
319(1)
Fundamentals of Generic Routing Encapsulation (7.2.1)
319(1)
Introduction to GRE (7.2.1.1)
319(28)
Characteristics of GRE (7.2.1.2)
320(1)
Configuring GRE Tunnels (7.2.2)
321(1)
GRE Tunnel Configuration (7.2.2.1)
322(2)
GRE Tunnel Verification (7.2.2.2)
324(2)
Introducing IPsec (7.3)
326(1)
Internet Protocol Security (7.3.1)
326(1)
IPsec (7.3.1.1)
326(1)
IPsec Security Services (7.3.1.2)
327(1)
IPsec Framework (7.3.2)
328(1)
Confidentiality with Encryption (7.3.2.1)
328(2)
Encryption Algorithms (7.3.2.2)
330(2)
Diffie-Hellman Key Exchange (7.3.2.3)
332(1)
Integrity with Hash Algorithms (7.3.2.4)
332(2)
IPsec Authentication (7.3.2.5)
334(1)
IPsec Protocol Framework (7.3.2.6)
335(2)
Remote Access (7.4)
337(1)
Remote-Access VPN Solutions (7.4.1)
337(1)
Types of Remote-Access VPNs (7.4.1.1)
337(1)
Cisco SSL VPN (7.4.1.2)
338(2)
Cisco SSL VPN Solutions (7.4.1.3)
340(1)
IPsec Remote-Access VPNs (7.4.2)
341(1)
IPsec Remote Access (7.4.2.1)
341(1)
Cisco Easy VPN Server and Remote (7.4.2.2)
342(1)
Cisco Easy VPN Client (7.4.2.3)
343(2)
Comparing IPsec and SSL (7.4.2.4)
345(2)
Summary (7.5)
347(1)
Practice
348(1)
Class Activities
348(1)
Labs
348(1)
Packet Tracer Activities
348(1)
Check Your Understanding Questions
348(3)
Chapter 8 Monitoring the Network
351(50)
Objectives
351(1)
Key Terms
351(1)
Introduction (8.0.1.1)
352(1)
Syslog (8.1)
352(1)
Syslog Operation (8.1.1)
352(1)
Introduction to Syslog (8.1.1.1)
352(12)
Syslog Operation (8.1.1.2)
354(1)
Syslog Message Format (8.1.1.3)
355(2)
Service Timestamp (8.1.1.4)
357(1)
Configuring Syslog (8.1.2)
358(1)
Syslog Server (8.1.2.1)
358(1)
Default Logging (8.1.2.2)
359(1)
Router and Switch Commands for Syslog Clients (8.1.2.3)
360(2)
Verifying Syslog (8.1.2.4)
362(2)
SNMP (8.2)
364(1)
SNMP Operation (8.2.1)
364(1)
Introduction to SNMP (8.2.1.1)
364(33)
SNMP Operation (8.2.1.2)
365(1)
SNMP Agent Traps (8.2.1.3)
366(2)
SNMP Versions (8.2.1.4)
368(2)
Community Strings (8.2.1.5)
370(1)
Management Information Base Object ID (8.2.1.6)
371(3)
Configuring SNMP (8.2.2)
374(1)
Steps for Configuring SNMP (8.2.2.1)
374(1)
Verifying SNMP Configuration (8.2.2.2)
375(3)
Security Best Practices (8.2.2.3)
378(2)
NetFlow (8.3)
380(1)
NetFlow Operation (8.3.1)
380(1)
Introducing NetFlow (8.3.1.1)
380(1)
Understanding NetFlow (8.3.1.2)
381(2)
Network Flows (8.3.1.3)
383(1)
Configuring NetFlow (8.3.2)
384(2)
Verifying NetFlow (8.3.2.2)
386(4)
Examining Traffic Patterns (8.3.3)
390(1)
Identifying NetFlow Collector Functions (8.3.3.1)
390(2)
NetFlow Analysis with a NetFlow Collector (8.3.3.2)
392(5)
Summary (8.4)
397(1)
Practice
397(1)
Class Activities
398(1)
Labs
398(1)
Packet Tracer Activities
398(1)
Check Your Understanding Questions
398(3)
Chapter 9 Troubleshooting the Network
401(78)
Objectives
401(1)
Key Terms
401(1)
Introduction (9.0.1.1)
402(72)
Troubleshooting with a Systematic Approach (9.1)
402(1)
Network Documentation (9.1.1)
402(1)
Documenting the Network (9.1.1.1)
403(3)
Network Topology Diagrams (9.1.1.2)
406(2)
Network Baseline Performance Level (9.1.1.3)
408(1)
Establishing a Network Baseline (9.1.1.4)
409(3)
Measuring Data (9.1.1.5)
412(3)
Troubleshooting Process (9.1.2)
415(1)
General Troubleshooting Procedures (9.1.2.1)
415(2)
Gathering Symptoms (9.1.2.2)
417(1)
Questioning End Users (9.1.2.3)
418(1)
Isolating the Issue Using Layered Models (9.1.3)
419(1)
Using Layered Models for Troubleshooting (9.1.3.1)
419(3)
Troubleshooting Methods (9.1.3.2, 9.1.3.3)
422(3)
Guidelines for Selecting a Troubleshooting Method (9.1.3.4)
425(1)
Network Troubleshooting (9.2)
426(1)
Troubleshooting Tools (9.2.1)
426(1)
Software Troubleshooting Tools (9.2.1.1, 9.2.1.2)
426(5)
Hardware Troubleshooting Tools (9.2.1.3)
431(4)
Using a Syslog Server for Troubleshooting (9.2.1.4)
435(2)
Symptoms and Causes of Network Troubleshooting (9.2.2)
437(1)
Physical Layer Troubleshooting (9.2.2.1)
437(2)
Data Link Layer Troubleshooting (9.2.2.2)
439(2)
Network Layer Troubleshooting (9.2.2.3)
441(2)
Transport Layer Troubleshooting -- ACLs (9.2.2.4)
443(2)
Transport Layer Troubleshooting -- NAT for IPv4 (9.2.2.5)
445(1)
Application Layer Troubleshooting (9.2.2.6)
446(2)
Troubleshooting IP Connectivity (9.2.3)
448(1)
Components of Troubleshooting End-to-End Connectivity (9.2.3.1)
448(2)
End-to-End Connectivity Problem Initiates Troubleshooting (9.2.3.2)
450(2)
Step 1 Verify the Physical Layer (9.2.3.3)
452(2)
Step 2 Check for Duplex Mismatches (9.2.3.4)
454(2)
Step 3 Verify Layer 2 and Layer 3 Addressing on the Local Network (9.2.3.5)
456(5)
Step 4 Verify Default Gateway (9.2.3.6)
461(3)
Step 5 Verify Correct Path (9.2.3.7)
464(4)
Step 6 Verify the Transport Layer (9.2.3.8)
468(1)
Step 7 Verify ACLs (9.2.3.9)
469(2)
Step 8 Verify DNS (9.2.3.10)
471(3)
Summary (9.3)
474(1)
Practice
475(1)
Class Activities
475(1)
Packet Tracer Activities
475(1)
Check Your Understanding Questions
476(3)
Appendix A Answers to the "Check Your Understanding" Questions 479(20)
Glossary 499(16)
Index 515
Rick Graziani teaches computer science and computer networking courses at Cabrillo College in Aptos, California. Prior to teaching, Rick worked in the informationtechnology field for Santa Cruz Operation, Tandem Computers, and Lockheed Missiles and Space Corporation. He holds an M.A. in Computer Science and Systems Theory from California State University Monterey Bay. Rick is also a member of the Curriculum Development team for the Cisco Networking Academy since 1999.

 

Rick has authored multiple books for Cisco Press and multiple online courses for the Cisco Networking Academy. Rick is the author of the Cisco Press book IPv6 Fundamentals and has presented on IPv6 at several Cisco Academy conferences. He is the coauthor of the Cisco Press book Routing Protocols Companion Guide.

 

When Rick is not working, he is most likely surfing at one of his favorite Santa Cruz surf breaks.

 

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has over 30 years of work and teaching experience in the computer networking and information technology field.

 

Since 2001, Bob has collaborated as team lead, lead author, and subject matter expert on various CCNA, CCNA-S, and CCNP projects for Cisco and the Cisco Networking Academy. He also authored the CCNA Accessing the WAN Companion Guide and the CCNA Security (640-554) Portable Command Guide. He is the coauthor of the Cisco Press book Routing Protocols Companion Guide.

 

In his downtime, Bob enjoys playing the guitar, shooting darts or pool, and either working in his gardens or white-water canoe tripping.