Muutke küpsiste eelistusi

Connecting Networks v6 Labs & Study Guide [Pehme köide]

  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 276x216x16 mm, kaal: 656 g
  • Sari: Lab Companion
  • Ilmumisaeg: 05-Sep-2017
  • Kirjastus: Cisco Press
  • ISBN-10: 1587134292
  • ISBN-13: 9781587134296
Teised raamatud teemal:
  • Pehme köide
  • Hind: 45,47 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • soodushind kehtib ainult laos olevatele toodetele
  • Tavahind: 66,69 €
  • Säästad 32%
  • Kaupluses 1 eks Tule tutvuma - Raekoja plats 11, Tartu, E-R 10-18
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Saadame välja 1 tööpäeva jooksul
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 320 pages, kõrgus x laius x paksus: 276x216x16 mm, kaal: 656 g
  • Sari: Lab Companion
  • Ilmumisaeg: 05-Sep-2017
  • Kirjastus: Cisco Press
  • ISBN-10: 1587134292
  • ISBN-13: 9781587134296
Teised raamatud teemal:
The only authorized Lab Manual for the Cisco Networking Academy Connecting Networks course in the CCNA Routing and Switching curriculum







Each chapter of this book is divided into a Study Guide section followed by a Lab section.







The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCNA R&S exam candidate. Each chapter is slightly different and includes some or all the following types of exercises:











Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios







The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.
Introduction xxii
Chapter 1 WAN Concepts 1(14)
WAN Technologies Overview
1(2)
Network Types and Their Evolving WAN Needs
1(1)
WAN Operations and Terminology
1(2)
Selecting a WAN Technology
3(3)
Varieties of WAN Link Connections
3(1)
Private and Public WAN Access Options
4(2)
Labs and Activities
6(1)
1.0.1.2 Class Activity-Branching Out
7(2)
Objective
7(1)
Scenario
7(1)
Resources
7(2)
1.2A.3 Lab-Researching WAN Technologies
9(4)
Objectives
9(1)
Background/Scenario
9(1)
Required Resources
9(1)
Part 1: Investigate Dedicated WAN Technologies and Providers
9(1)
Part 2: Investigate a Dedicated Leased Line Service Provider in Your Area
10(2)
Reflection
12(1)
1.3.1.1 Class Activity-WAN Device Modules
13(2)
Objective
13(1)
Scenario
13(1)
Resources
13(1)
Directions
13(2)
Chapter 2 Point-to-Point Connections 15(54)
Serial Point-to-Point Overview
15(2)
Serial Communications
15(1)
WAN Protocols
15(1)
HDLC Encapsulation
16(1)
HDLC Configuration and Troubleshooting
16(1)
Troubleshooting Serial Interfaces
16(1)
PPP Operation
17(4)
PPP Components
17(2)
PPP Sessions
19(2)
Configure PPP
21(4)
Basic PPP Configuration with Options
21(2)
PPP Authentication
23(1)
PAP Configuration
24(1)
CHAP Configuration
25(1)
Packet Tracer Exercise 2-1: PPP Implementation
25(1)
Troubleshoot WAN Connectivity
25(2)
Labs and Activities
27(1)
Command Reference
27(1)
2.0.1.2 Class Activity-PPP Persuasion
28(1)
Objectives
28(1)
Scenario
28(1)
Resources
28(1)
2.1.2.5 Packet Tracer-Troubleshooting Serial Interfaces
29(3)
Topology
29(1)
Addressing Table
29(1)
Objectives
29(1)
Scenario
29(1)
Part 1: Diagnose and Repair the Physical Layer
30(1)
Part 2: Diagnose and Repair the Data Link Layer
30(1)
Part 3: Diagnose and Repair the Network Layer
31(1)
2.3.2.6 Packet Tracer-Configuring PAP and CHAP Authentication
32(3)
Topology
32(1)
Addressing Table
32(1)
Objectives
32(1)
Background
33(1)
Part 1: Review Routing Configurations
33(1)
Part 2: Configure PPP as the Encapsulation Method
33(1)
Part 3: Configure PPP Authentication
34(1)
2.3.2.7 Lab-Configuring Basic PPP with Authentication
35(17)
Topology
35(1)
Addressing Table
35(1)
Objectives
36(1)
Background/Scenario
36(1)
Required Resources
36(1)
Part 1: Configure Basic Device Settings
36(1)
Part 2: Configure PPP Encapsulation
37(9)
Part 3: Configure PPP CHAP Authentication
46(5)
Reflection
51(1)
Router Interface Summary Table
51(1)
2.4.1.4 Packet Tracer-Troubleshooting PPP with Authentication
52(4)
Topology
52(1)
Addressing Table
52(1)
Objectives
52(1)
Scenario
53(1)
Part 1: Diagnose and Repair the Physical Layer
53(1)
Part 2: Diagnose and Repair the Data Link Layer
53(2)
Part 3: Diagnose and Repair the Network Layer
55(1)
2.4.1.5 Lab-Troubleshooting Basic PPP with Authentication
56(8)
Topology
56(1)
Addressing Table
56(1)
Objectives
57(1)
Background/Scenario
57(1)
Required Resources
57(1)
Part 1: Build the Network and Load Device Configurations
57(3)
Part 2: Troubleshoot the Data Link Layer
60(2)
Part 3: Troubleshoot the Network Layer
62(1)
Router Interface Summary Table
63(1)
2.5.1.1 Class Activity-PPP Validation
64(2)
Objective
64(1)
Scenario
64(1)
Resources
64(2)
2.5.1.2 Packet Tracer-Skills Integration Challenge
66(3)
Topology
66(1)
Addressing Table
66(1)
Background
67(1)
Requirements
67(2)
Chapter 3 Branch Connections 69(64)
Broadband Connections
69(3)
Cable
69(1)
DSL
70(1)
Broadband Wireless
71(1)
Select a Broadband Solution Connection
72(1)
PPPoE
72(2)
PPPoE Overview
72(1)
Configuring PPPoE
73(1)
VPNs
74(2)
Fundamentals of VPNs
74(1)
Types of VPNs
75(1)
GRE
76(3)
Fundamentals of Generic Routing Encapsulation
76(1)
Configuring GRE Tunnels
77(1)
Packet Tracer Exercise 3-1: GRE Implementation
78(1)
eBGP
79(3)
BGP Overview
79(1)
eBGP Branch Configuration
79(1)
Packet Tracer Exercise 3-2: BGP Branch Configuration
80(1)
Requirements
81(1)
Labs and Activities
82(1)
Command Reference
82(1)
3.0.1.2 Class Activity-Broadband Varieties
83(1)
Objective
83(1)
Scenario
83(1)
Resources
83(1)
3.1.2.2 Lab-Researching Broadband Internet Access Technologies
84(6)
Objectives
84(1)
Background/Scenario
84(1)
Required Resources
84(1)
Part 1: Investigate Broadband Distribution
84(3)
Part 2: Research Broadband Access Options for Specific Scenarios
87(2)
Reflection
89(1)
3.2.2.7 Lab-Configuring a Router as a PPPoE Client for DSL Connectivity
90(5)
Topology
90(1)
Addressing Table
90(1)
Objectives
90(1)
Background/Scenario
90(1)
Required Resources
91(1)
Part 1: Build the Network
91(1)
Part 2: Configure the ISP Router
91(1)
Part 3: Configure the Custl Router
92(2)
Reflection
94(1)
Router Interface Summary Table
94(1)
3.2.2.8 Lab-Troubleshoot PPPoE
95(7)
Topology
95(1)
Addressing Table
95(1)
Objectives
95(1)
Background/Scenario
95(1)
Required Resources
96(1)
Part 1: Build the Network
96(1)
Part 2: Troubleshoot PPPoE on Custl
97(3)
Reflection
100(1)
Router Interface Summary Table
101(1)
3.4.2.4 Packet Tracer-Configuring GRE
102(3)
Topology
102(1)
Addressing Table
102(1)
Objectives
102(1)
Scenario
102(1)
Part 1: Verify Router Connectivity
103(1)
Part 2: Configure GRE Tunnels
103(1)
Part 3: Verify Router Connectivity
104(1)
3.4.2.5 Packet Tracer-Troubleshooting GRE
105(2)
Topology
105(1)
Addressing Table
105(1)
Objectives
105(1)
Scenario
105(1)
Part 1: Find and Correct All Network Errors
106(1)
Part 2: Verify Connectivity
106(1)
3.4.2.6 Lab-Configuring a Point-to-Point GRE VPN Tunnel
107(7)
Topology
107(1)
Addressing Table
107(1)
Objectives
108(1)
Background/Scenario
108(1)
Required Resources
108(1)
Part 1: Configure Basic Device Settings
108(1)
Part 2: Configure a GRE Tunnel
109(2)
Part 3: Enable Routing over the GRE Tunnel
111(1)
Reflection
112(1)
Router Interface Summary Table
113(1)
3.5.3.5 Packet Tracer-Configure and Verify eBGP
114(2)
Topology
114(1)
Objectives
114(1)
Background/Scenario
114(1)
Address Table
114(2)
3.5.3.5 Lab-Configure and Verify eBGP
116(5)
Topology
116(1)
Addressing Table
116(1)
Objectives
116(1)
Background/Scenario
116(1)
Required Resources
116(1)
Part 1: Build the Network and Configure Basic Device Settings
117(1)
Part 2: Configure eBGP on R2
117(1)
Part 3: Verify eBGP Configuration
118(1)
Reflection
119(1)
Router Interface Summary Table
120(1)
3.6.1.1 Class Activity-VPN Planning Design
121(1)
Objective
121(1)
Scenario
121(1)
Resources
121(1)
3.6.1.2 Packet Tracer-Skills Integration Challenge
122(3)
Topology
122(1)
Addressing Table
122(1)
Background/Scenario
123(1)
Requirements
123(2)
3.6.1.3 Lab-Configure a Branch Connection
125(8)
Topology
125(1)
Addressing Table
125(1)
Objectives
125(1)
Background/Scenario
126(1)
Required Resources
126(1)
Part 1: Build the Network and Load Device Configurations
126(2)
Part 2: Configure a PPPoE Client Connection
128(1)
Part 3: Configure a GRE Tunnel
129(1)
Part 4: Configure BGP over PPPoE and BGP over a GRE Tunnel
130(1)
Router Interface Summary Table
131(2)
Chapter 4 Access Control Lists 133(72)
ACL Operation
133(4)
Guidelines for ACL Creation
134(1)
Calculating Wildcard Masks
134(1)
Wildcard Mask in Operation
135(1)
Standard Versus Extended IPv4 ACLs
136(1)
Guidelines for ACL Placement
136(1)
Standard IPv4 ACLs
137(4)
Configuring Standard IPv4 ACLs
137(3)
Modifying IPv4 ACLs
140(1)
Extended IPv4 ACLs
141(5)
Configuring Extended IPv4 ACL Statements
141(1)
Extended ACL Configuration Scenarios
141(1)
Evaluating Extended IPv4 ACL Statements
142(2)
Extended ACL Quiz
144(2)
IPv6 ACLs
146(1)
Comparing IPv4 and IPv6 ACLs
146(1)
Configuring IPv6 ACLs
146(1)
Troubleshoot ACLs
147(2)
Labs and Activities
149(1)
Command Reference
149(1)
4.1.3.5 Packet Tracer-Configure Standard IPv4 ACLs
150(4)
Topology
150(1)
Addressing Table
150(1)
Objectives
151(1)
Background/Scenario
151(1)
Part 1: Configure a Standard IPv4 ACL to Restrict Access to the Pink LAN
151(1)
Part 2: Configure a Standard IPv4 ACL to Restrict Access to the Blue LAN
152(1)
Part 3: Configure a Named Standard IPv4 ACL
152(1)
Reflection
153(1)
4.2.2.10 Packet Tracer-Configuring Extended ACLs-Scenario 1
154(4)
Topology
154(1)
Addressing Table
154(1)
Objectives
154(1)
Background/Scenario
154(1)
Part 1: Configure, Apply, and Verify an Extended Numbered ACL
154(3)
Part 2: Configure, Apply, and Verify an Extended Named ACL
157(1)
4.2.2.11 Packet Tracer-Configuring Extended ACLs-Scenario 2
158(3)
Topology
158(1)
Addressing Table
158(1)
Objectives
158(1)
Background/Scenario
158(1)
Part 1: Configure, Apply, and Verify an Extended Numbered ACL
158(2)
Part 2: Reflection Questions
160(1)
Suggested Scoring Rubric
160(1)
4.2.2.12 Packet Tracer-Configuring Extended ACLs-Scenario 3
161(3)
Topology
161(1)
Addressing Table
161(1)
Objectives
161(1)
Background/Scenario
161(1)
Part 1: Configure a Named Extended ACL
161(2)
Part 2: Apply and Verify the Extended ACL
163(1)
4.2.2.13 Lab-Configuring and Verifying Extended ACLs
164(9)
Topology
164(1)
Addressing Table
164(1)
Objectives
165(1)
Background/Scenario
165(1)
Required Resources
165(1)
Part 1: Set Up the Topology and Initialize Devices
166(1)
Part 2: Configure Devices and Verify Connectivity
166(2)
Part 3: Configure and Verify Extended Numbered and Named ACLs
168(2)
Part 4: Modify and Verify Extended ACLs
170(1)
Reflection
171(1)
Router Interface Summary Table
172(1)
4.3.2.6 Packet Tracer-Configuring IPv6 ACLs
173(2)
Topology
173(1)
Addressing Table
173(1)
Objectives
173(1)
Part 1: Configure, Apply, and Verify an IPv6 ACL
173(1)
Part 2: Configure, Apply, and Verify a Second IPv6 ACL
174(1)
4.3.2.7 Lab-Configuring and Verifying IPv6 ACLs
175(9)
Topology
175(1)
Addressing Table
175(1)
Objectives
176(1)
Background/Scenario
176(1)
Required Resources
176(1)
Part 1: Set Up the Topology and Initialize Devices
176(1)
Part 2: Configure Devices and Verify Connectivity
176(4)
Part 3: Configure and Verify\IPv6 ACLs
180(1)
Part 4: Edit IPv6 ACLs
181(1)
Reflection
182(1)
Router Interface Summary Table
183(1)
4.4.2.9 Packet Tracer-Troubleshooting IPv4 ACLs
184(3)
Topology
184(1)
Addressing Table
184(1)
Objectives
184(1)
Scenario
185(1)
Part 1: Troubleshoot ACL Issue 1
185(1)
Part 2: Troubleshoot ACL Issue 2
185(1)
Part 3: Troubleshoot ACL Issue 3
186(1)
Suggested Scoring Rubric
186(1)
4.4.2.10 Packet Tracer-Troubleshooting IPv6 ACLs
187(4)
Topology
187(1)
Addressing Table
187(1)
Objectives
187(1)
Scenario
188(1)
Part 1: Troubleshoot HTTP Access
188(1)
Part 2: Troubleshoot FTP Access
189(1)
Part 3: Troubleshoot SSH Access
189(1)
Suggested Scoring Rubric
190(1)
4.4.2.11 Lab-Troubleshooting ACL Configuration and Placement
191(11)
Topology
191(1)
Addressing Table
192(1)
Objectives
192(1)
Background/Scenario
192(1)
Required Resources
193(1)
Part 1: Build the Network and Configure Basic Device Settings
194(2)
Part 2: Troubleshoot Internal Access
196(2)
Part 3: Troubleshoot Remote Access
198(1)
Part 4: Troubleshoot IPv6 ACL
199(1)
Reflection
200(1)
Router Interface Summary Table
201(1)
4.5.1.1 Packet Tracer-Skills Integration Challenge
202(3)
Topology
202(1)
Addressing Table
202(1)
Scenario
203(1)
Requirements
203(2)
Chapter 5 Network Security and Monitoring 205(36)
LAN Security
205(2)
Common Security Attacks
206(1)
LAN Attack Mitigation
206(1)
SNMP
207(4)
SNMP Operation
207(2)
Configuring SNMP v2c
209(1)
Configuring SNMP v3
210(1)
Cisco Switch Port Analyzer
211(2)
SPAN Terminology
211(1)
SPAN Configuration
212(1)
Labs and Activities
213(1)
Command Reference
213(1)
5.0.1.2 Class Activity-Network Maintenance Development
214(1)
Objective
214(1)
Scenario
214(1)
Resources
214(1)
Directions
214(1)
5.2.1.9 Lab-Researching Network Monitoring Software
215(3)
Objectives
215(1)
Background/Scenario
215(1)
Required Resources
215(1)
Part 1: Survey Your Understanding of Network Monitoring
215(1)
Part 2: Research Network Monitoring Tools
215(1)
Part 3: Select a Network Monitoring Tool
216(1)
Reflection
217(1)
5.2.2.6 Lab-Configuring SNMP
218(11)
Topology
218(1)
Addressing Table
218(1)
Objectives
218(1)
Background/Scenario
218(1)
Required Resources
219(1)
Part 1: Build the Network and Configure Basic Device Settings
219(1)
Part 2: Configure SNMPv2 Manager and Agent
220(3)
Part 3: Configure SNMPv3 Manager and Agent
223(4)
Reflection
227(1)
Router Interface Summary Table
228(1)
5.3.2.3 Lab-Implement Local SPAN
229(6)
Topology
229(1)
Addressing Table
229(1)
Objectives
229(1)
Background/Scenario
229(1)
Required Resources
230(1)
Part 1: Build the Network and Verify Connectivity
230(1)
Part 2: Configure Local SPAN and Capture Copied Traffic with Wireshark
231(3)
Reflection
234(1)
Router Interface Summary Table
234(1)
5.3.3.2 Lab-Troubleshoot LAN Traffic Using SPAN
235(6)
Topology
235(1)
Addressing Table
235(1)
Objectives
235(1)
Background/Scenario
235(1)
Required Resources
236(1)
Part 1: Build the Network and Verify Connectivity
236(1)
Part 2: Configure Local SPAN and Capture Copied Traffic with Wireshark
237(3)
Reflection
240(1)
Router Interface Summary Table
240(1)
Chapter 6 Quality of Service 241(10)
QoS Overview
241(5)
Network Transmission Quality Terminology
242(1)
Traffic Characteristics
243(1)
Queuing Algorithms
243(2)
Queuing Algorithm Characteristics
245(1)
QoS Mechanisms
246(4)
QoS Models
246(1)
QoS Implementation Techniques
246(4)
Labs and Activities
250(1)
Chapter 7 Network Evolution 251(6)
Internet of Things
252(1)
Cloud and Virtualization
252(2)
Cloud Computing Terminology
253(1)
Virtualization Terminology
254(1)
Network Programming
254(2)
Control and Data Plane
254(1)
Types of SDN Controllers
255(1)
APIC-EM Features and Terminology
255(1)
Labs and Activities
256(1)
Chapter 8 Network Troubleshooting 257
Troubleshooting Methodology
257(4)
Network Documentation
257(2)
Troubleshooting Process
259(2)
Troubleshooting Scenarios
261(4)
Using IP SLA
261(1)
Troubleshooting Tools
262(1)
Network Troubleshooting and IP Connectivity
263(2)
Labs and Activities
265(1)
Command Reference
265(1)
8.0.1.2 Class Activity-Network Breakdown
266(1)
Objective
266(1)
Scenario
266(1)
Resources
266(1)
Directions
266(1)
8.1.1.8 Packet Tracer-Troubleshooting Challenge-Documenting the Network
267(5)
Topology
267(1)
Addressing Table
267(1)
Objectives
268(1)
Background/Scenario
268(1)
Part 1: Test Connectivity
268(1)
Part 2: Discover PC Configuration Information
268(1)
Part 3: Discover the Configuration Information of the Default Gateway
269(1)
Part 4: Discover Routes and Neighbors in the Network
269(1)
Part 5: Draw the Network Topology
270(1)
Suggested Scoring Rubric
271(1)
8.2.1.5 Lab-Configure IP SLA ICMP Echo
272(5)
Topology
272(1)
Addressing Table
272(1)
Objectives
272(1)
Background/Scenario
272(1)
Required Resources
273(1)
Part 1: Build the Network and Verify Connectivity
273(1)
Part 2: Configure IP SLA ICMP Echo on R1
274(1)
Part 3: Test and Monitor the IP SLA Operation
274(1)
Reflection
275(1)
Router Interface Summary Table
276(1)
8.2.4.12 Packet Tracer-Troubleshooting Enterprise Networks 1
277(3)
Topology
277(1)
Addressing Table
277(1)
Background
278(1)
Requirements
278(1)
Troubleshooting Documentation
279(1)
Verification Documentation
279(1)
Suggested Scoring Rubric
279(1)
8.2.4.13 Packet Tracer-Troubleshooting Enterprise Networks 2
280(3)
Topology
280(1)
Addressing Table
280(1)
Background
280(1)
Requirements
281(1)
Troubleshooting Documentation
281(1)
Verification Documentation
282(1)
Suggested Scoring Rubric
282(1)
8.2.4.14 Packet Tracer-Troubleshooting Enterprise Networks 3
283(3)
Topology
283(1)
Addressing Table
283(1)
Background
284(1)
Requirements
284(1)
Troubleshooting Documentation
285(1)
Verification Documentation
285(1)
Suggested Scoring Rubric
285(1)
8.2.4.15 Packet Tracer-Troubleshooting Challenge-Using Documentation to Solve Issues
286(4)
Topology
286(1)
Addressing Table
286(1)
Objectives
287(1)
Scenario
287(1)
Part 1: Gather Documentation
287(1)
Part 2: Test Connectivity
287(1)
Part 3: Gather Data and Implement Solutions
288(1)
Part 4: Test Connectivity
288(1)
Suggested Scoring Rubric
289(1)
8.3.1.1 Class Activity-Documentation Development
290
Objective
290(1)
Scenario
290(1)
Resources
290(2)
Topology
292(1)
Addressing Table
292(1)
VLAN Configurations and Port Mappings
293(1)
Scenario
293(1)
Requirements
293
Allan Johnson entered the academic world in 1999 after 10 years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed in occupational training and development. He taught a variety of technology courses to high school students and is an adjunct instructor at Del Mar College in Corpus Christi, Texas. Since 2006, Allan has worked full time for Cisco Networking Academy in several roles. He is currently engaged as Curriculum Lead.