Chapter 0 Course Introduction |
|
1 | (4) |
|
|
1 | (4) |
|
0.0.1 Message to the Student |
|
|
1 | (4) |
|
|
1 | (1) |
|
0.0.1.2 A Global Community |
|
|
1 | (1) |
|
0.0.1.3 More Than Just Information |
|
|
1 | (1) |
|
|
2 | (1) |
|
0.0.1.5 Practice Leads to Mastery |
|
|
2 | (1) |
|
|
2 | (1) |
|
0.0.1.7 Engineering Journals |
|
|
2 | (1) |
|
0.0.1.8 Explore the World of Networking |
|
|
2 | (1) |
|
0.0.1.9 Create Your Own Worlds |
|
|
3 | (1) |
|
0.0.1.10 How Packet Tracer Helps Master Concepts |
|
|
3 | (1) |
|
|
3 | (2) |
Chapter 1 WAN Concepts |
|
5 | (22) |
|
|
5 | (1) |
|
1.0.1.1 Chapter 1: WAN Concepts |
|
|
5 | (1) |
|
1.0.1.2 Class Activity-Branching Out |
|
|
5 | (1) |
|
1.1 WAN Technologies Overview |
|
|
5 | (8) |
|
|
5 | (5) |
|
|
5 | (1) |
|
1.1.1.2 Are WANs Necessary? |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.1.1.4 Evolving Networks |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
1.1.1.8 Distributed Network |
|
|
9 | (1) |
|
1.1.1.9 Activity-Identify WAN Topologies |
|
|
9 | (1) |
|
|
10 | (3) |
|
1.1.2.1 WANs in the OSI Model |
|
|
10 | (1) |
|
1.1.2.2 Common WAN Terminology |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.1.2.4 Circuit Switching |
|
|
12 | (1) |
|
|
12 | (1) |
|
1.1.2.6 Activity-Identify WAN Terminology |
|
|
13 | (1) |
|
1.2 Selecting a WAN Technology |
|
|
13 | (11) |
|
|
13 | (1) |
|
1.2.1.1 WAN Link Connection Options |
|
|
13 | (1) |
|
1.2.1.2 Service Provider Network Infrastructure |
|
|
14 | (1) |
|
1.2.1.3 Activity-Classify WAN Access Options |
|
|
14 | (1) |
|
1.2.2 Private WAN Infrastructures |
|
|
14 | (5) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
1.2.2.9 Activity-Identify Private WAN Infrastructure Terminology |
|
|
19 | (1) |
|
1.2.3 Public WAN Infrastructure |
|
|
19 | (3) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
1.2.3.6 Activity-Identify Public WAN Infrastructure Terminology |
|
|
22 | (1) |
|
1.2.4 Selecting WAN Services |
|
|
22 | (6) |
|
1.2.4.1 Choosing a WAN Link Connection |
|
|
22 | (1) |
|
1.2.4.2 Choosing a WAN Link Connection (Cont.) |
|
|
23 | (1) |
|
1.2.4.3 Lab-Researching WAN Technologies |
|
|
24 | (1) |
|
|
24 | (2) |
|
1.3.1.1 Class Activity-WAN Device Modules |
|
|
24 | (1) |
|
1.3.1.2 Chapter 1: WAN Concepts |
|
|
24 | (2) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
Chapter 2 Point-to-Point Connections |
|
27 | (20) |
|
|
27 | (1) |
|
2.0.1.1 Chapter 2: Point-to-Point Connections |
|
|
27 | (1) |
|
2.0.1.2 Class Activity-PPP Persuasion |
|
|
27 | (1) |
|
2.1 Serial Point-to-Point Overview |
|
|
28 | (4) |
|
2.1.1 Serial Communications |
|
|
28 | (2) |
|
2.1.1.1 Serial and Parallel Ports |
|
|
28 | (1) |
|
2.1.1.2 Point-to-Point Communication Links |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
2.1.2.1 WAN Encapsulation Protocols |
|
|
30 | (1) |
|
2.1.2.2 HDLC Encapsulation |
|
|
30 | (1) |
|
2.1.2.3 Configuring HDLC Encapsulation |
|
|
31 | (1) |
|
2.1.2.4 Troubleshooting a Serial Interface |
|
|
31 | (1) |
|
2.1.2.5 Packet Tracer-Troubleshooting Serial Interfaces |
|
|
32 | (1) |
|
|
32 | (5) |
|
|
32 | (1) |
|
|
32 | (1) |
|
2.2.1.2 Advantages of PPP |
|
|
33 | (1) |
|
|
33 | (1) |
|
2.2.2.1 PPP Layered Architecture |
|
|
33 | (1) |
|
2.2.2.2 PPP-Link Control Protocol (LCP) |
|
|
33 | (1) |
|
2.2.2.3 PPP-Network Control Protocol (NCP) |
|
|
34 | (1) |
|
2.2.2.4 PPP Frame Structure |
|
|
34 | (1) |
|
2.2.2.5 Activity-Identify PPP Features and Operations |
|
|
34 | (1) |
|
|
34 | (3) |
|
2.2.3.1 Establishing a PPP Session |
|
|
34 | (1) |
|
|
35 | (1) |
|
2.2.3.3 PPP Configuration Options |
|
|
36 | (1) |
|
|
36 | (1) |
|
2.2.3.5 Activity-Identify the Steps in the LCP Link Negotiation Process |
|
|
37 | (1) |
|
|
37 | (5) |
|
|
37 | (3) |
|
2.3.1.1 PPP Configuration Options |
|
|
37 | (1) |
|
2.3.1.2 PPP Basic Configuration Command |
|
|
38 | (1) |
|
2.3.1.3 PPP Compression Commands |
|
|
38 | (1) |
|
2.3.1.4 PPP Link Quality Monitoring Command |
|
|
38 | (1) |
|
2.3.1.5 PPP Multilink Commands |
|
|
38 | (1) |
|
2.3.1.6 Verifying PPP Configuration |
|
|
39 | (1) |
|
2.3.2 Configure PPP Authentication |
|
|
40 | (2) |
|
2.3.2.1 PPP Authentication Protocols |
|
|
40 | (1) |
|
2.3.2.2 Password Authentication Protocol (PAP) |
|
|
40 | (1) |
|
2.3.2.3 Challenge Handshake Authentication Protocol (CHAP) |
|
|
41 | (1) |
|
2.3.2.4 PPP Authentication Command |
|
|
41 | (1) |
|
2.3.2.5 Configuring PPP with Authentication |
|
|
41 | (1) |
|
2.3.2.6 Packet Tracer-Configuring PAP and CHAP Authentication |
|
|
42 | (1) |
|
2.3.2.7 Lab-Configuring Basic PPP with Authentication |
|
|
42 | (1) |
|
2.4 Troubleshoot WAN Connectivity |
|
|
42 | (2) |
|
|
42 | (6) |
|
2.4.1.1 Troubleshooting PPP Serial Encapsulation |
|
|
42 | (1) |
|
|
43 | (1) |
|
2.4.1.3 Troubleshooting a PPP Configuration with Authentication |
|
|
43 | (1) |
|
2.4.1.4 Packet Tracer-Troubleshooting PPP with Authentication |
|
|
44 | (1) |
|
2.4.1.5 Lab-Troubleshooting Basic PPP with Authentication |
|
|
44 | (1) |
|
|
44 | (2) |
|
2.5.1.1 Class Activity-PPP Validation |
|
|
44 | (1) |
|
2.5.1.2 Packet Tracer-Skills Integration Challenge |
|
|
45 | (1) |
|
2.5.1.3 Chapter 2: Point-to-Point Connections |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
Chapter 3 Branch Connections |
|
47 | (22) |
|
|
47 | (1) |
|
3.0.1.1 Chapter 3: Branch Connections |
|
|
47 | (1) |
|
3.0.1.2 Class Activity-Broadband Varieties |
|
|
47 | (1) |
|
3.1 Remote Access Connections |
|
|
48 | (4) |
|
3.1.1 Broadband Connections |
|
|
48 | (3) |
|
3.1.1.1 What is a Cable System? |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
3.1.1.5 Wireless Connection |
|
|
50 | (1) |
|
3.1.1.6 Activity-Identify Broadband Connection Terminology |
|
|
51 | (1) |
|
3.1.2 Select a Broadband Connection |
|
|
51 | (1) |
|
3.1.2.1 Comparing Broadband Solutions |
|
|
51 | (1) |
|
3.1.2.2 Lab-Researching Broadband Internet Access Technologies |
|
|
51 | (1) |
|
|
52 | (3) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (3) |
|
3.2.2.1 PPPoE Configuration |
|
|
52 | (1) |
|
3.2.2.2 PPPoE Verification |
|
|
53 | (1) |
|
3.2.2.3 PPPoE Troubleshooting |
|
|
53 | (1) |
|
3.2.2.4 PPPoE Negotiation |
|
|
54 | (1) |
|
3.2.2.5 PPPoE Authentication |
|
|
54 | (1) |
|
|
54 | (1) |
|
3.2.2.7 Lab-Configuring a Router as a PPPoE Client for DSL Connectivity |
|
|
55 | (1) |
|
3.2.2.8 Lab-Troubleshoot PPPoE |
|
|
55 | (1) |
|
|
55 | (3) |
|
3.3.1 Fundamentals of VPNs |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
3.3.1.3 Activity-Identify the Benefits of VPNs |
|
|
56 | (1) |
|
|
56 | (2) |
|
3.3.2.1 Site-to-Site VPNs |
|
|
56 | (1) |
|
3.3.2.2 Remote Access VPNs |
|
|
57 | (1) |
|
|
57 | (1) |
|
3.3.2.4 Activity-Compare Types of VPNs |
|
|
58 | (1) |
|
|
58 | (3) |
|
|
58 | (1) |
|
|
58 | (1) |
|
3.4.1.2 GRE Characteristics |
|
|
58 | (1) |
|
3.4.1.3 Activity-Identify GRE Characteristics |
|
|
59 | (1) |
|
|
59 | (2) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
3.4.2.4 Packet Tracer-Configuring GRE |
|
|
60 | (1) |
|
3.4.2.5 Packet Tracer-Troubleshooting GRE |
|
|
61 | (1) |
|
3.4.2.6 Lab-Configuring a Point-to-Point GRE VPN Tunnel |
|
|
61 | (1) |
|
|
61 | (4) |
|
|
61 | (1) |
|
3.5.1.1 IGP and EGP Routing Protocols |
|
|
61 | (1) |
|
|
62 | (1) |
|
3.5.2 BGP Design Considerations |
|
|
62 | (1) |
|
|
62 | (1) |
|
3.5.2.2 When not to use BGP |
|
|
62 | (1) |
|
|
63 | (1) |
|
3.5.2.4 Activity-Identify BPG Terminology and Designs |
|
|
63 | (1) |
|
3.5.3 eBGP Branch Configuration |
|
|
63 | (6) |
|
3.5.3.1 Steps to Configure eBGP |
|
|
63 | (1) |
|
3.5.3.2 BGP Sample Configuration |
|
|
64 | (1) |
|
|
64 | (1) |
|
3.5.3.4 Packet Tracer-Configure and Verify eBGP |
|
|
65 | (1) |
|
3.5.3.5 Lab-Configure and Verify eBGP |
|
|
65 | (1) |
|
|
65 | (2) |
|
3.6.1.1 Class Activity-VPN Planning Design |
|
|
65 | (1) |
|
3.6.1.2 Packet Tracer-Skills Integration Challenge |
|
|
65 | (1) |
|
3.6.1.3 Lab-Configure a Branch Connection |
|
|
66 | (1) |
|
3.6.1.4 Chapter 3: Summary |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
Chapter 4 Access Control Lists |
|
69 | (24) |
|
|
69 | (1) |
|
4.0.1.1 Chapter 4: Access Control Lists |
|
|
69 | (1) |
|
4.1 Standard ACL Operation and Configuration Review |
|
|
69 | (7) |
|
4.1.1 ACL Operation Overview |
|
|
69 | (2) |
|
4.1.1.1 ACLs and the Wildcard Mask |
|
|
69 | (1) |
|
4.1.1.2 Applying ACLs to an Interface |
|
|
70 | (1) |
|
4.1.1.3 A TCP Conversation |
|
|
70 | (1) |
|
4.1.1.4 ACL Packet Filtering |
|
|
71 | (1) |
|
4.1.1.5 Activity-Determine the Correct Wildcard Mask |
|
|
71 | (1) |
|
4.1.1.6 Activity-ACL Operation |
|
|
71 | (1) |
|
|
71 | (3) |
|
4.1.2.1 Standard and Extended IPv4 ACLs |
|
|
71 | (1) |
|
4.1.2.2 Numbered and Named ACLs |
|
|
72 | (1) |
|
4.1.2.3 Where to Place ACLs |
|
|
72 | (1) |
|
4.1.2.4 Standard ACL Placement Example |
|
|
73 | (1) |
|
4.1.2.5 Extended ACL Placement Example |
|
|
73 | (1) |
|
4.1.2.6 Activity-Placing Standard and Extended ACLs |
|
|
74 | (1) |
|
4.1.3 Standard IPv4 ACL Implementation |
|
|
74 | (2) |
|
4.1.3.1 Configure a Standard IPv4 ACL |
|
|
74 | (1) |
|
4.1.3.2 Apply a Standard IPv4 ACL |
|
|
74 | (1) |
|
4.1.3.3 Named Standard IPv4 ACLs |
|
|
74 | (1) |
|
|
75 | (1) |
|
4.1.3.5 Packet Tracer-Configure Standard IPv4 ACLs |
|
|
75 | (1) |
|
4.1.3.6 Video Demonstration-Standard ACL Configuration Part 1 |
|
|
75 | (1) |
|
4.1.3.7 Video Demonstration-Standard ACL Configuration Part 2 |
|
|
75 | (1) |
|
|
76 | (4) |
|
4.2.1 Structure of an Extended IPv4 ACLs |
|
|
76 | (1) |
|
|
76 | (1) |
|
4.2.1.2 Filtering Ports and Services |
|
|
76 | (1) |
|
4.2.2 Configure Extended IPv4 ACLs |
|
|
76 | (4) |
|
4.2.2.1 Configuring Extended ACLs |
|
|
76 | (1) |
|
4.2.2.2 Applying Extended ACLs to Interfaces |
|
|
77 | (1) |
|
4.2.2.3 Filtering Traffic with Extended ACLs |
|
|
77 | (1) |
|
4.2.2.4 Creating Named Extended ACLs |
|
|
78 | (1) |
|
4.2.2.5 Verifying Extended ACLs |
|
|
78 | (1) |
|
4.2.2.6 Editing Extended ACLs |
|
|
79 | (1) |
|
4.2.2.7 Activity-Creating an Extended ACL Statement |
|
|
79 | (1) |
|
4.2.2.8 Activity-Evaluating Extended ACES |
|
|
79 | (1) |
|
4.2.2.9 Activity-ACL Testlet |
|
|
79 | (1) |
|
4.2.2.10 Packet Tracer-Configuring Extended ACLs-Scenario 1 |
|
|
79 | (1) |
|
4.2.2.11 Packet Tracer-Configuring Extended ACLs-Scenario 2 |
|
|
80 | (1) |
|
4.2.2.12 Packet Tracer-Configuring Extended ACLs-Scenario 3 |
|
|
80 | (1) |
|
4.2.2.13 Lab-Configuring and Verifying Extended ACLs |
|
|
80 | (1) |
|
|
80 | (4) |
|
|
80 | (1) |
|
4.3.1.1 Types of IPv6 ACLs |
|
|
80 | (1) |
|
4.3.1.2 Comparing IPv4 and IPv6 ACLs |
|
|
80 | (1) |
|
4.3.2 Configuring IPv6 ACLs |
|
|
81 | (3) |
|
4.3.2.1 Configuring IPv6 Topology |
|
|
81 | (1) |
|
4.3.2.2 Configuring IPv6 ACLs |
|
|
81 | (1) |
|
4.3.2.3 Applying an IPv6 ACL to an Interface |
|
|
82 | (1) |
|
4.3.2.4 IPv6 ACL Examples |
|
|
82 | (1) |
|
4.3.2.5 Verifying IPv6 ACLs |
|
|
83 | (1) |
|
4.3.2.6 Packet Tracer-Configuring IPv6 ACLs |
|
|
83 | (1) |
|
4.3.2.7 Lab-Configuring and Verifying IPv6 ACLs |
|
|
83 | (1) |
|
|
84 | (5) |
|
4.4.1 Processing Packets with ACLs |
|
|
84 | (1) |
|
4.4.1.1 Inbound and Outbound ACL Logic |
|
|
84 | (1) |
|
4.4.1.2 ACL Logic Operations |
|
|
84 | (1) |
|
4.4.1.3 Standard ACL Decision Process |
|
|
85 | (1) |
|
4.4.1.4 Extended ACL Decision Process |
|
|
85 | (1) |
|
4.4.1.5 Activity-Place in Order the Steps of the ACL Decision Making Process |
|
|
85 | (1) |
|
|
85 | (9) |
|
4.4.2.1 Troubleshooting IPv4 ACLs-Example 1 |
|
|
85 | (1) |
|
4.4.2.2 Troubleshooting IPv4 ACLs-Example 2 |
|
|
86 | (1) |
|
4.4.2.3 Troubleshooting IPv4 ACLs-Example 3 |
|
|
86 | (1) |
|
4.4.2.4 Troubleshooting IPv4 ACLs-Example 4 |
|
|
86 | (1) |
|
4.4.2.5 Troubleshooting IPv4 ACLs-Example 5 |
|
|
87 | (1) |
|
4.4.2.6 Troubleshooting IPv6 ACLs-Example 1 |
|
|
87 | (1) |
|
4.4.2.7 Troubleshooting IPv6 ACLs-Example 2 |
|
|
87 | (1) |
|
4.4.2.8 Troubleshooting IPv6 ACLs-Example 3 |
|
|
88 | (1) |
|
4.4.2.9 Packet Tracer-Troubleshooting IPv4 ACLs |
|
|
88 | (1) |
|
4.4.2.10 Packet Tracer-Troubleshooting IPv6 ACLs |
|
|
89 | (1) |
|
4.4.2.11 Lab-Troubleshooting ACL Configuration and Placement |
|
|
89 | (1) |
|
|
89 | (2) |
|
4.5.1.1 Packet Tracer-Skills Integration Challenge |
|
|
89 | (1) |
|
4.5.1.2 Chapter 4: Access Control Lists |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
Chapter 5 Network Security and Monitoring |
|
93 | (22) |
|
|
93 | (1) |
|
5.0.1.1 Chapter 5: Network Security and Monitoring |
|
|
93 | (1) |
|
5.0.1.2 Class Activity-Network Maintenance Development |
|
|
93 | (1) |
|
|
94 | (8) |
|
5.1.1 LAN Security Attacks |
|
|
94 | (4) |
|
5.1.1.1 Common LAN Attacks |
|
|
94 | (1) |
|
5.1.1.2 CDP Reconnaissance Attack |
|
|
94 | (1) |
|
|
95 | (1) |
|
5.1.1.4 MAC Address Table Flooding Attack |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
5.1.1.7 Activity-Identify Common Security Attacks |
|
|
98 | (1) |
|
5.1.2 LAN Security Best Practices |
|
|
98 | (4) |
|
|
98 | (1) |
|
5.1.2.2 Mitigate MAC Address Flooding Table Attacks |
|
|
98 | (1) |
|
5.1.2.3 Mitigate VLAN Attacks |
|
|
99 | (1) |
|
5.1.2.4 Mitigate DHCP Attacks |
|
|
99 | (1) |
|
5.1.2.5 Secure Administrative Access using AAA |
|
|
100 | (1) |
|
5.1.2.6 Secure Device Access using 802.1X |
|
|
101 | (1) |
|
5.1.2.7 Activity: Identify the Security Best Practice |
|
|
102 | (1) |
|
|
102 | (8) |
|
|
102 | (5) |
|
5.2.1.1 Introduction to SNMP |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
5.2.1.5 Community Strings |
|
|
104 | (1) |
|
5.2.1.6 Management Information Base Object ID |
|
|
105 | (1) |
|
|
106 | (1) |
|
5.2.1.8 Activity-Identify Characteristics of SNMP Versions |
|
|
106 | (1) |
|
5.2.1.9 Lab-Researching Network Monitoring Software |
|
|
106 | (1) |
|
|
107 | (3) |
|
5.2.2.1 Steps for Configuring SNMP |
|
|
107 | (1) |
|
5.2.2.2 Verifying SNMP Configuration |
|
|
107 | (1) |
|
5.2.2.3 SNMP Best Practices |
|
|
108 | (1) |
|
5.2.2.4 Steps for Configuring SNMPv3 |
|
|
109 | (1) |
|
5.2.2.5 Verifying SNMPv3 Configuration |
|
|
109 | (1) |
|
5.2.2.6 Lab-Configuring SNMP |
|
|
110 | (1) |
|
5.3 Cisco Switch Port Analyzer |
|
|
110 | (3) |
|
|
110 | (2) |
|
|
110 | (1) |
|
5.3.1.2 Analyzing Suspicious Traffic |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
5.3.1.5 Activity-Identify SPAN Terminology |
|
|
112 | (1) |
|
|
112 | (1) |
|
5.3.2.1 Configuring Local SPAN |
|
|
112 | (1) |
|
5.3.2.2 Verifying Local SPAN |
|
|
112 | (1) |
|
5.3.2.3 Lab-Implement a Local SPAN |
|
|
112 | (1) |
|
5.3.3 SPAN as a Troubleshooting Tool |
|
|
113 | (2) |
|
5.3.3.1 Troubleshooting with SPAN Overview |
|
|
113 | (1) |
|
5.3.3.2 Lab-Troubleshoot LAN Traffic Using SPAN |
|
|
113 | (1) |
|
|
113 | (1) |
|
5.4.1.1 Chapter 5: Network Security and Monitoring |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
Chapter 6 Quality of Service |
|
115 | (16) |
|
|
115 | (1) |
|
6.0.1.1 Chapter 6: Quality of Service |
|
|
115 | (1) |
|
|
115 | (5) |
|
6.1.1 Network Transmission Quality |
|
|
115 | (2) |
|
6.1.1.1 Video Tutorial-The Purpose of QoS |
|
|
115 | (1) |
|
6.1.1.2 Prioritizing Traffic |
|
|
115 | (1) |
|
6.1.1.3 Bandwidth, Congestion, Delay, and Jitter |
|
|
116 | (1) |
|
|
116 | (1) |
|
6.1.1.5 Activity-Identify Network Transmission Quality Terminology |
|
|
117 | (1) |
|
6.1.2 Traffic Characteristics |
|
|
117 | (1) |
|
6.1.2.1 Video Tutorial-Traffic Characteristics |
|
|
117 | (1) |
|
6.1.2.2 Network Traffic Trends |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
6.1.2.6 Activity-Compare Traffic Characteristics |
|
|
118 | (1) |
|
6.1.3 Queueing Algorithms |
|
|
118 | (2) |
|
6.1.3.1 Video Tutorial-QoS Algorithms |
|
|
118 | (1) |
|
|
118 | (1) |
|
6.1.3.3 First In First Out (FIFO) |
|
|
119 | (1) |
|
6.1.3.4 Weighted Fair Queuing (WFQ) |
|
|
119 | (1) |
|
6.1.3.5 Class-Based Weighted Fair Queuing (CBWFQ) |
|
|
119 | (1) |
|
6.1.3.6 Low Latency Queuing (LLQ) |
|
|
120 | (1) |
|
6.1.3.7 Activity-Compare Queuing Algorithms |
|
|
120 | (1) |
|
|
120 | (7) |
|
|
120 | (3) |
|
6.2.1.1 Video Tutorial-QoS Models |
|
|
120 | (1) |
|
6.2.1.2 Selecting an Appropriate QoS Policy Model |
|
|
121 | (1) |
|
|
121 | (1) |
|
6.2.1.4 Integrated Services |
|
|
121 | (1) |
|
6.2.1.5 Differentiated Services |
|
|
122 | (1) |
|
6.2.1.6 Activity-Compare QoS Models |
|
|
123 | (1) |
|
6.2.2 QoS Implementation Techniques |
|
|
123 | (8) |
|
6.2.2.1 Video Tutorial-QoS Implementation Techniques |
|
|
123 | (1) |
|
6.2.2.2 Avoiding Packet Loss |
|
|
123 | (1) |
|
|
123 | (1) |
|
6.2.2.4 Classification and Marking |
|
|
124 | (1) |
|
6.2.2.5 Marking at Layer 2 |
|
|
124 | (1) |
|
6.2.2.6 Marking at Layer 3 |
|
|
125 | (1) |
|
|
125 | (1) |
|
6.2.2.8 Congestion Avoidance |
|
|
126 | (1) |
|
6.2.2.9 Shaping and Policing |
|
|
126 | (1) |
|
6.2.2.10 Activity-Identify QoS Mechanism Terminology |
|
|
127 | (1) |
|
|
127 | (2) |
|
6.3.1.1 Chapter 6: Quality of Service |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
129 | (2) |
Chapter 7 Network Evolution |
|
131 | (18) |
|
|
131 | (1) |
|
7.0.1.1 Chapter 7: Network Evolution |
|
|
131 | (1) |
|
|
131 | (4) |
|
|
131 | (1) |
|
|
131 | (1) |
|
7.1.1.2 The Converged Network and Things |
|
|
131 | (1) |
|
7.1.1.3 Challenges to Connecting Things |
|
|
132 | (1) |
|
7.1.1.4 The Six Pillars of the Cisco IoT System |
|
|
132 | (1) |
|
|
132 | (3) |
|
7.1.2.1 The Network Connectivity Pillar |
|
|
132 | (1) |
|
Z.1.2.2 The Fog Computing Pillar |
|
|
133 | (1) |
|
7.1.2.3 The Security Pillar |
|
|
133 | (1) |
|
7.1.2.4 Data Analytics Pillar |
|
|
134 | (1) |
|
7.1.2.5 Management and Automation Pillar |
|
|
134 | (1) |
|
7.1.2.6 Application Enablement Platform Pillar |
|
|
134 | (1) |
|
7.1.2.7 Activity-Identify the IoT Pillars |
|
|
135 | (1) |
|
7.2 Cloud and Virtualization |
|
|
135 | (6) |
|
|
135 | (2) |
|
7.2.1.1 Video Tutorial-Cloud and Virtualization |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
7.2.1.5 Cloud Computing versus Data Center |
|
|
136 | (1) |
|
7.2.1.6 Activity-Identify Cloud Computing Terminology |
|
|
137 | (1) |
|
|
137 | (3) |
|
7.2.2.1 Cloud Computing and Virtualization |
|
|
137 | (1) |
|
7.2.2.2 Dedicated Servers |
|
|
137 | (1) |
|
7.2.2.3 Server Virtualization |
|
|
137 | (1) |
|
7.2.2.4 Advantages of Virtualization |
|
|
138 | (1) |
|
7.2.2.5 Abstraction Layers |
|
|
139 | (1) |
|
7.2.2.6 Type 2 Hypervisors |
|
|
139 | (1) |
|
7.2.2.7 Activity-Identify Virtualization Terminology |
|
|
140 | (1) |
|
7.2.3 Virtual Network Infrastructure |
|
|
140 | (1) |
|
7.2.3.1 Type 1 Hypervisors |
|
|
140 | (1) |
|
7.2.3.2 Installing a VM on a Hypervisor |
|
|
140 | (1) |
|
7.2.3.3 Network Virtualization |
|
|
140 | (1) |
|
7.2.3.4 Activity-Identify Hypervisor Terminology |
|
|
141 | (1) |
|
|
141 | (7) |
|
7.3.1 Software-Defined Networking |
|
|
141 | (2) |
|
7.3.1.1 Video Tutorial-Network Programming, SDN, and Controllers |
|
|
141 | (1) |
|
7.3.1.2 Control Plane and Data Plane |
|
|
141 | (1) |
|
7.3.1.3 Virtualizing the Network |
|
|
142 | (1) |
|
|
142 | (1) |
|
7.3.1.5 Activity-Identify Control Plane and Data Plane Characteristics |
|
|
143 | (1) |
|
|
143 | (6) |
|
7.3.2.1 SDN Controller and Operations |
|
|
143 | (1) |
|
7.3.2.2 Cisco Application Centric Infrastructure |
|
|
143 | (1) |
|
7.3.2.3 Core Components of ACI |
|
|
144 | (1) |
|
7.3.2.4 Spine-Leaf Topology |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
7.3.2.7 APIC-EM ACL Analysis |
|
|
146 | (1) |
|
7.3.2.8 Activity-Identify SDN Types |
|
|
146 | (2) |
|
|
148 | (1) |
|
7.4.1.1 Chapter 7: Network Evolution |
|
|
146 | (2) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
Chapter 8 Network Troubleshooting |
|
149 | (36) |
|
|
149 | (1) |
|
|
149 | (1) |
|
8.0.1.2 Class Activity-Network Breakdown |
|
|
149 | (1) |
|
8.1 Troubleshooting Methodology |
|
|
149 | (11) |
|
8.1.1 Network Documentation |
|
|
149 | (5) |
|
8.1.1.1 Documenting the Network |
|
|
149 | (2) |
|
8.1.1.2 Network Topology Diagrams |
|
|
151 | (1) |
|
8.1.1.3 Establishing a Network Baseline |
|
|
152 | (1) |
|
8.1.1.4 Steps to Establish a Network Baseline |
|
|
152 | (1) |
|
|
153 | (1) |
|
8.1.1.6 Activity-Identify Benefits for Establishing a Network Baseline |
|
|
154 | (1) |
|
8.1.1.7 Activity-Identify Commands Used for Measuring Data |
|
|
154 | (1) |
|
8.1.1.8 Packet Tracer-Troubleshooting Challenge-Documenting the Network |
|
|
154 | (1) |
|
8.1.2 Troubleshooting Process |
|
|
154 | (3) |
|
8.1.2.1 General Troubleshooting Procedures |
|
|
154 | (1) |
|
8.1.2.2 Gathering Symptoms |
|
|
155 | (1) |
|
8.1.2.3 Questioning End Users |
|
|
156 | (1) |
|
8.1.2.4 Activity-Identify Commands for Gathering Symptoms |
|
|
157 | (1) |
|
8.1.3 Isolating the Issue Using Layered Models |
|
|
157 | (3) |
|
8.1.3.1 Using Layered Models for Troubleshooting |
|
|
157 | (1) |
|
8.1.3.2 Troubleshooting Methods |
|
|
158 | (1) |
|
8.1.3.3 Other Troubleshooting Methods |
|
|
159 | (1) |
|
8.1.3.4 Guidelines for Selecting a Troubleshooting Method |
|
|
159 | (1) |
|
8.1.3.5 Activity-Troubleshooting Methods |
|
|
160 | (1) |
|
8.2 Troubleshooting Scenarios |
|
|
160 | (21) |
|
|
160 | (2) |
|
|
160 | (1) |
|
8.2.1.2 IP SLA Configuration |
|
|
161 | (1) |
|
8.2.1.3 Sample IP SLA Configuration |
|
|
161 | (1) |
|
8.2.1.4 Verifying an IP SLA Configuration |
|
|
162 | (1) |
|
8.2.1.5 Lab-Configure IP SLA ICMP Echo |
|
|
162 | (1) |
|
8.2.2 Troubleshooting Tools |
|
|
162 | (3) |
|
8.2.2.1 Software Troubleshooting Tools |
|
|
162 | (1) |
|
8.2.2.2 Protocol Analyzers |
|
|
163 | (1) |
|
8.2.2.3 Hardware Troubleshooting Tools |
|
|
163 | (1) |
|
8.2.2.4 Using a Syslog Server for Troubleshooting |
|
|
164 | (1) |
|
8.2.2.5 Activity-Identify Common Troubleshooting Tools |
|
|
165 | (1) |
|
8.2.3 Symptoms and Causes of Network Troubleshooting |
|
|
165 | (6) |
|
8.2.3.1 Physical Layer Troubleshooting |
|
|
165 | (1) |
|
8.2.3.2 Data Link Layer Troubleshooting |
|
|
166 | (2) |
|
8.2.3.3 Network Layer Troubleshooting |
|
|
168 | (1) |
|
8.2.3.4 Transport Layer Troubleshooting-ACLs |
|
|
169 | (1) |
|
8.2.3.5 Transport Layer Troubleshooting-NAT for IPv4 |
|
|
170 | (1) |
|
8.2.3.6 Application Layer Troubleshooting |
|
|
171 | (1) |
|
8.2.3.7 Activity-Identify the OSI Layer Associated with a Network Issue |
|
|
171 | (1) |
|
8.2.4 Troubleshooting IP Connectivity |
|
|
171 | (10) |
|
8.2.4.1 Components of Troubleshooting End-to-End Connectivity |
|
|
171 | (1) |
|
8.2.4.2 End-to-End Connectivity Problem Initiates Troubleshooting |
|
|
172 | (1) |
|
8.2.4.3 Step 1-Verify the Physical Layer |
|
|
173 | (1) |
|
8.2.4.4 Step 2-Check for Duplex Mismatches |
|
|
174 | (1) |
|
8.2.4.5 Step 3-Verify Layer 2 and Layer 3 Addressing on the Local Network |
|
|
175 | (1) |
|
8.2.4.6 Step 4-Verify Default Gateway |
|
|
176 | (2) |
|
8.2.4.7 Step 5-Verify Correct Path |
|
|
178 | (1) |
|
8.2.4.8 Step 6-Verify the Transport Layer |
|
|
179 | (1) |
|
8.2.4.9 Step 7-Verify ACLs |
|
|
179 | (1) |
|
8.2.4.10 Step 8-Verify DNS |
|
|
180 | (1) |
|
8.2.4.11 Activity-Identify Commands to Troubleshoot a Network Issue |
|
|
180 | (1) |
|
8.2.4.12 Packet Tracer-Troubleshooting Enterprise Networks 1 |
|
|
180 | (1) |
|
8.2.4.13 Packet Tracer-Troubleshooting Enterprise Networks 2 |
|
|
181 | (1) |
|
8.2.4.14 Packet Tracer-Troubleshooting Enterprise Networks 3 |
|
|
181 | (1) |
|
8.2.4.15 Packet Tracer-Troubleshooting Challenge-Using Documentation to Solve Issues |
|
|
181 | (1) |
|
|
181 | (2) |
|
8.3.1.1 Class Activity-Documentation Development |
|
|
181 | (1) |
|
8.3.1.2 Packet Tracer-CCNA Skills Integration Challenge |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
183 | (2) |
Index |
|
185 | |