Introduction |
|
xxxi | |
|
Chapter 1 Single-Area OSPFv2 Concepts |
|
|
1 | (32) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
OSPF Features and Characteristics (1.1) |
|
|
3 | (10) |
|
Introduction to OSPF (1.1.1) |
|
|
3 | (1) |
|
Components of OSPF (1.1.2) |
|
|
4 | (1) |
|
Routing Protocol Messages |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Link-State Operation (1.1.3) |
|
|
6 | (1) |
|
1 Establish Neighbor Adjacencies |
|
|
6 | (1) |
|
2 Exchange Link-State Advertisements |
|
|
6 | (1) |
|
3 Build the Link-State Database |
|
|
7 | (1) |
|
4 Execute the SPF Algorithm |
|
|
8 | (1) |
|
|
8 | (1) |
|
Single-Area and Multiarea OSPF (1.1.4) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (4) |
|
Types of OSPF Packets (1.2.2) |
|
|
13 | (1) |
|
Link-State Updates (1.2.3) |
|
|
14 | (1) |
|
|
15 | (2) |
|
|
17 | (10) |
|
OSPF Operational States (1.3.2) |
|
|
17 | (1) |
|
Establish Neighbor Adjacencies (1.3.3) |
|
|
18 | (1) |
|
1 Down State to Init State |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Synchronizing OSPF Databases (1.3.4) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
The Need for a DR (1.3.5) |
|
|
23 | (1) |
|
LSA Flooding with a DR (1.3.6) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (2) |
|
OSPF Features and Characteristics |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (4) |
|
Chapter 2 Single-Area OSPFv2 Configuration |
|
|
33 | (60) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (6) |
|
OSPF Reference Topology (2.1.1) |
|
|
34 | (1) |
|
Router Configuration Mode for OSPF (2.1.2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
Router ID Order of Precedence (2.1.4) |
|
|
36 | (1) |
|
Configure a Loopback Interface as the Router ID (2.1.5) |
|
|
37 | (1) |
|
Explicitly Configure a Router ID (2.1.6) |
|
|
38 | (1) |
|
Modify a Router ID (2.1.7) |
|
|
39 | (1) |
|
Point-to-Point OSPF Networks (2.2) |
|
|
40 | (9) |
|
The network Command Syntax (2.2.1) |
|
|
40 | (1) |
|
The Wildcard Mask (2.2.2) |
|
|
41 | (1) |
|
Configure OSPF Using the network Command (2.2.4) |
|
|
41 | (2) |
|
Configure OSPF Using the ip ospf Command (2.2.6) |
|
|
43 | (1) |
|
Passive Interface (2.2.8) |
|
|
44 | (1) |
|
Configure Passive Interfaces (2.2.9) |
|
|
45 | (1) |
|
OSPF Point-to-Point Networks (2.2.11) |
|
|
46 | (2) |
|
Loopbacks and Point-to-Point Networks (2.2.12) |
|
|
48 | (1) |
|
Multiaccess OSPF Networks (2.3) |
|
|
49 | (14) |
|
OSPF Network Types (2.3.1) |
|
|
49 | (1) |
|
OSPF Designated Router (2.3.2) |
|
|
49 | (2) |
|
OSPF Multiaccess Reference Topology (2.3.3) |
|
|
51 | (1) |
|
Verify OSPF Router Roles (2.3.4) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
Verify DR/BDR Adjacencies (2.3.5) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Default DR/BDR Election Process (2.3.6) |
|
|
56 | (2) |
|
DR Failure and Recovery (2.3.7) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (2) |
|
The ip ospf priority Command (2.3.8) |
|
|
61 | (1) |
|
Configure OSPF Priority (2.3.9) |
|
|
61 | (2) |
|
Modify Single-Area 0SPFv2 (2.4) |
|
|
63 | (14) |
|
Cisco OSPF Cost Metric (2.4.1) |
|
|
63 | (1) |
|
Adjust the Reference Bandwidth (2.4.2) |
|
|
64 | (2) |
|
OSPF Accumulates Costs (2.4.3) |
|
|
66 | (1) |
|
Manually Set OSPF Cost Value (2.4.4) |
|
|
67 | (2) |
|
Test Failover to Backup Route (2.4.5) |
|
|
69 | (1) |
|
Hello Packet Intervals (2.4.7) |
|
|
69 | (1) |
|
Verify Hello and Dead Intervals (2.4.8) |
|
|
70 | (1) |
|
Modify OSPFv2 Intervals (2.4.9) |
|
|
71 | (3) |
|
Default Route Propagation (2.5) |
|
|
73 | (1) |
|
Propagate a Default Static Route in OSPFv2 (2.5.1) |
|
|
74 | (1) |
|
Verify the Propagated Default Route (2.5.2) |
|
|
75 | (2) |
|
Verify Single-Area OSPFv2 (2.6) |
|
|
77 | (6) |
|
Verify OSPF Neighbors (2.6.1) |
|
|
77 | (2) |
|
Verify OSPF Protocol Settings (2.6.2) |
|
|
79 | (1) |
|
Verify OSPF Process Information (2.6.3) |
|
|
80 | (1) |
|
Verify OSPF Interface Settings (2.6.4) |
|
|
81 | (2) |
|
|
83 | (4) |
|
|
83 | (1) |
|
Point-to-Point OSPF Networks |
|
|
83 | (1) |
|
|
84 | (1) |
|
Modify Single-Area OSPFv2 |
|
|
85 | (1) |
|
Default Route Propagation |
|
|
86 | (1) |
|
Verify Single-Area OSPFv2 |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (5) |
|
Chapter 3 Network Security Concepts |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
Ethical Hacking Statement (3.0.3) |
|
|
95 | (1) |
|
Current State of Cybersecurity (3.1) |
|
|
95 | (3) |
|
Current State of Affairs (3.1.1) |
|
|
95 | (1) |
|
Vectors of Network Attacks (3.1.2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (3) |
|
|
98 | (1) |
|
Evolution of Hackers (3.2.2) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
State-Sponsored Hackers (3.2.5) |
|
|
100 | (1) |
|
|
101 | (5) |
|
Introduction to Attack Tools (3.3.2) |
|
|
101 | (1) |
|
Evolution of Security Tools (3.3.3) |
|
|
102 | (2) |
|
|
104 | (2) |
|
|
106 | (3) |
|
Overview of Malware (3.4.1) |
|
|
106 | (1) |
|
Viruses and Trojan Horses (3.4.2) |
|
|
106 | (2) |
|
Other Types of Malware (3.4.3) |
|
|
108 | (1) |
|
Common Network Attacks (3.5) |
|
|
109 | (8) |
|
Overview of Network Attacks (3.5.1) |
|
|
109 | (1) |
|
Reconnaissance Attacks (3.5.3) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Trust Exploitation Example |
|
|
111 | (1) |
|
|
112 | (1) |
|
Man-in-the-Middle Attack Example |
|
|
112 | (1) |
|
|
112 | (2) |
|
Social Engineering Attacks (3.5.6) |
|
|
114 | (1) |
|
DoS and DDoS Attacks (3.5.9) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
IP Vulnerabilities and Threats (3.6) |
|
|
117 | (5) |
|
|
118 | (1) |
|
|
118 | (1) |
|
Amplification and Reflection Attacks (3.6.5) |
|
|
119 | (1) |
|
Address Spoofing Attacks (3.6.6) |
|
|
120 | (2) |
|
TCP and UDP Vulnerabilities (3.7) |
|
|
122 | (5) |
|
TCP Segment Header (3.7.1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
UDP Segment Header and Operation (3.7.4) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
ARP Vulnerabilities (3.8.1) |
|
|
127 | (1) |
|
ARP Cache Poisoning (3.8.2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
Spoofed Gratuitous ARP Replies |
|
|
130 | (1) |
|
|
131 | (1) |
|
DNS Open Resolver Attacks |
|
|
131 | (1) |
|
|
132 | (1) |
|
DNS Domain Shadowing Attacks |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
1 Client Broadcasts DHCP Discovery Messages |
|
|
134 | (1) |
|
2 DHCP Servers Respond with Offers |
|
|
134 | (2) |
|
3 Client Accepts Rogue DHCP Request |
|
|
136 | (1) |
|
4 Rogue DHCP Acknowledges the Request |
|
|
136 | (1) |
|
Network Security Best Practices (3.9) |
|
|
137 | (6) |
|
Confidentiality, Integrity, and Availability (3.9.1) |
|
|
137 | (1) |
|
The Defense-in-Depth Approach (3.9.2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
Content Security Appliances (3.9.5) |
|
|
141 | (1) |
|
Cisco Email Security Appliance (ESA) |
|
|
142 | (1) |
|
Cisco Web Security Appliance (WSA) |
|
|
142 | (1) |
|
|
143 | (14) |
|
Securing Communications (3.10.2) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Origin Authentication (3.10.5) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
Cisco Router HMAC Example |
|
|
149 | (1) |
|
Data Confidentiality (3.10.6) |
|
|
150 | (1) |
|
Symmetric Encryption (3.10.7) |
|
|
151 | (1) |
|
Asymmetric Encryption (3.10.8) |
|
|
152 | (3) |
|
|
155 | (2) |
|
|
157 | (2) |
|
Current State of Cybersecurity |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
IP Vulnerabilities and Threats |
|
|
158 | (1) |
|
TCP and UDP Vulnerabilities |
|
|
158 | (1) |
|
|
158 | (1) |
|
Network Security Best Practices |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (3) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (4) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (2) |
|
Wildcard Masks in ACLs (4.2) |
|
|
168 | (5) |
|
Wildcard Mask Overview (4.2.1) |
|
|
168 | (1) |
|
Wildcard Mask Types (4.2.2) |
|
|
169 | (1) |
|
|
169 | (1) |
|
Wildcard Mask to Match an IPv4 Subnet |
|
|
169 | (1) |
|
Wildcard Mask to Match an IPv4 Address Range |
|
|
170 | (1) |
|
Wildcard Mask Calculation (4.2.3) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Wildcard Mask Keywords (4.2.4) |
|
|
172 | (1) |
|
Guidelines for ACL Creation (4.3) |
|
|
173 | (2) |
|
Limited Number of ACLs per Interface (4.3.1) |
|
|
173 | (1) |
|
ACL Best Practices (4.3.2) |
|
|
174 | (1) |
|
|
175 | (7) |
|
Standard and Extended ACLs (4.4.1) |
|
|
175 | (1) |
|
Numbered and Named ACLs (4.4.2) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Where to Place ACLs (4.4.3) |
|
|
177 | (2) |
|
Standard ACL Placement Example (4.4.4) |
|
|
179 | (1) |
|
Extended ACL Placement Example (4.4.5) |
|
|
180 | (2) |
|
|
182 | (2) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Guidelines for ACL Creation |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
Check Your Understanding Questions |
|
|
184 | (3) |
|
Chapter 5 ACLs for IPv4 Configuration |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Configure Standard IPv4 ACLs (5.1) |
|
|
188 | (7) |
|
|
188 | (1) |
|
Numbered Standard IPv4 ACL Syntax (5.1.2) |
|
|
188 | (1) |
|
Named Standard IPv4 ACL Syntax (5.1.3) |
|
|
189 | (1) |
|
Apply a Standard IPv4 ACL (5.1.4) |
|
|
190 | (1) |
|
Numbered Standard IPv4 ACL Example (5.1.5) |
|
|
191 | (2) |
|
Named Standard IPv4 ACL Example (5.1.6) |
|
|
193 | (2) |
|
|
195 | (5) |
|
Two Methods to Modify an ACL (5.2.1) |
|
|
196 | (1) |
|
Text Editor Method (5.2.2) |
|
|
196 | (1) |
|
Sequence Numbers Method (5.2.3) |
|
|
197 | (1) |
|
Modify a Named ACL Example (5.2.4) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Secure VTY Ports with a Standard IPv4 ACL (5.3) |
|
|
200 | (3) |
|
The access-class Command (5.3.1) |
|
|
200 | (1) |
|
Secure VTY Access Example (5.3.2) |
|
|
200 | (2) |
|
Verify the VTY Port Is Secured (5.3.3) |
|
|
202 | (1) |
|
Configure Extended IPv4 ACLs (5.4) |
|
|
203 | (16) |
|
|
203 | (1) |
|
Numbered Extended IPv4 ACL Syntax (5.4.2) |
|
|
204 | (2) |
|
Protocols and Ports (5.4.3) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
Protocols and Port Numbers Configuration Examples (5.4.4) |
|
|
208 | (1) |
|
Apply a Numbered Extended IPv4 ACL (5.4.5) |
|
|
209 | (1) |
|
TCP Established Extended ACL (5.4.6) |
|
|
210 | (2) |
|
Named Extended IPv4 ACL Syntax (5.4.7) |
|
|
212 | (1) |
|
Named Extended IPv4 ACL Example (5.4.8) |
|
|
212 | (1) |
|
Edit Extended ACLs (5.4.9) |
|
|
213 | (1) |
|
Another Named Extended IPv4 ACL Example (5.4.10) |
|
|
214 | (2) |
|
Verify Extended ACLs (5.4.11) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (2) |
|
Configure Standard IPv4 ACLs |
|
|
219 | (1) |
|
|
219 | (1) |
|
Secure VTY Ports with a Standard IPv4 ACL |
|
|
220 | (1) |
|
Configure Extended IPv4 ACLs |
|
|
220 | (1) |
|
|
221 | (1) |
|
Check Your Understanding Questions |
|
|
222 | (3) |
|
|
225 | (44) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
NAT Characteristics (6.1) |
|
|
226 | (5) |
|
IPv4 Private Address Space (6.1.1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
231 | (7) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Port Address Translation (6.2.3) |
|
|
233 | (2) |
|
Next Available Port (6.2.4) |
|
|
235 | (1) |
|
NAT and PAT Comparison (6.2.5) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Packets Without a Layer 4 Segment (6.2.6) |
|
|
237 | (1) |
|
NAT Advantages and Disadvantages (6.3) |
|
|
238 | (1) |
|
Advantages of NAT (6.3.1) |
|
|
238 | (1) |
|
Disadvantages of NAT (6.3.2) |
|
|
238 | (1) |
|
|
239 | (5) |
|
Static NAT Scenario (6.4.1) |
|
|
240 | (1) |
|
Configure Static NAT (6.4.2) |
|
|
240 | (1) |
|
Analyze Static NAT (6.4.3) |
|
|
241 | (1) |
|
Verify Static NAT (6.4.4) |
|
|
242 | (2) |
|
|
244 | (7) |
|
Dynamic NAT Scenario (6.5.1) |
|
|
244 | (1) |
|
Configure Dynamic NAT (6.5.2) |
|
|
245 | (2) |
|
Analyze Dynamic NAT---Inside to Outside (6.5.3) |
|
|
247 | (1) |
|
Analyze Dynamic NAT---Outside to Inside (6.5.4) |
|
|
248 | (1) |
|
Verify Dynamic NAT (6.5.5) |
|
|
249 | (2) |
|
|
251 | (7) |
|
|
251 | (1) |
|
Configure PAT to Use a Single IPv4 Address (6.6.2) |
|
|
252 | (1) |
|
Configure PAT to Use an Address Pool (6.6.3) |
|
|
253 | (1) |
|
Analyze PAT---PC to Server (6.6.4) |
|
|
254 | (1) |
|
Analyze PAT---Server to PC (6.6.5) |
|
|
255 | (1) |
|
|
256 | (2) |
|
|
258 | (2) |
|
|
258 | (1) |
|
|
258 | (2) |
|
|
260 | (4) |
|
|
260 | (1) |
|
|
260 | (1) |
|
NAT Advantages and Disadvantages |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
264 | (1) |
|
Check Your Understanding Questions |
|
|
264 | (5) |
|
|
269 | (50) |
|
|
269 | (1) |
|
|
269 | (3) |
|
|
272 | (1) |
|
|
272 | (11) |
|
|
272 | (1) |
|
Private and Public WANs (7.1.2) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
Partially Meshed Topology |
|
|
277 | (1) |
|
Carrier Connections (7.1.4) |
|
|
278 | (1) |
|
Single-Carrier WAN Connection |
|
|
278 | (1) |
|
Dual-Carrier WAN Connection |
|
|
278 | (1) |
|
Evolving Networks (7.1.5) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
283 | (9) |
|
|
283 | (1) |
|
WANs in the OSI Model (7.2.2) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
Common WAN Terminology (7.2.3) |
|
|
285 | (2) |
|
|
287 | (2) |
|
Serial Communication (7.2.5) |
|
|
289 | (1) |
|
Circuit-Switched Communication (7.2.6) |
|
|
290 | (1) |
|
Packet-Switched Communications (7.2.7) |
|
|
290 | (1) |
|
SDH, SONET, and DWDM (7.2.8) |
|
|
291 | (1) |
|
Traditional WAN Connectivity (7.3) |
|
|
292 | (4) |
|
Traditional WAN Connectivity Options (7.3.1) |
|
|
293 | (1) |
|
Common WAN Terminology (7.3.2) |
|
|
293 | (2) |
|
Circuit-Switched Options (7.3.3) |
|
|
295 | (1) |
|
Public Service Telephone Network (PSTN) |
|
|
295 | (1) |
|
Integrated Services Digital Network (ISDN) |
|
|
295 | (1) |
|
Packet-Switched Options (7.3.4) |
|
|
295 | (1) |
|
|
295 | (1) |
|
Asynchronous Transfer Mode (ATM) |
|
|
296 | (1) |
|
Modern WAN Connectivity (7.4) |
|
|
296 | (5) |
|
|
296 | (1) |
|
Modern WAN Connectivity Options (7.4.2) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (2) |
|
|
300 | (1) |
|
Internet-Based Connectivity (7.5) |
|
|
301 | (11) |
|
Internet-Based Connectivity Options (7.5.1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Wireless Internet-Based Broadband (7.5.7) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
ISP Connectivity Options (7.5.9) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
Broadband Solution Comparison (7.5.10) |
|
|
311 | (1) |
|
|
312 | (3) |
|
|
312 | (1) |
|
|
312 | (1) |
|
Traditional WAN Connectivity |
|
|
313 | (1) |
|
|
314 | (1) |
|
Internet-Based Connectivity |
|
|
314 | (1) |
|
|
315 | (1) |
|
Check Your Understanding Questions |
|
|
316 | (3) |
|
Chapter 8 VPN and IPsec Concepts |
|
|
319 | (32) |
|
|
319 | (1) |
|
|
319 | (2) |
|
|
321 | (1) |
|
|
321 | (4) |
|
Virtual Private Networks (8.1.1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Site-to-Site and Remote-Access VPNs (8.1.3) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
324 | (1) |
|
Enterprise and Service Provider VPNs (8.1.4) |
|
|
324 | (1) |
|
|
325 | (8) |
|
Remote-Access VPNs (8.2.1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Site-to-Site IPsec VPNs (8.2.3) |
|
|
327 | (1) |
|
|
328 | (2) |
|
Dynamic Multipoint VPNs (8.2.5) |
|
|
330 | (1) |
|
IPsec Virtual Tunnel Interface (8.2.6) |
|
|
331 | (1) |
|
Service Provider MPLS VPNs (8.2.7) |
|
|
332 | (1) |
|
|
333 | (11) |
|
IPsec Technologies (8.3.2) |
|
|
333 | (3) |
|
IPsec Protocol Encapsulation (8.3.3) |
|
|
336 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
|
339 | (3) |
|
Secure Key Exchange with Diffie-Hellman (8.3.7) |
|
|
342 | (2) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
Check Your Understanding Questions |
|
|
345 | (6) |
|
|
351 | (38) |
|
|
351 | (1) |
|
|
351 | (2) |
|
|
353 | (1) |
|
Network Transmission Quality (9.1) |
|
|
353 | (4) |
|
Prioritizing Traffic (9.1.2) |
|
|
353 | (1) |
|
Bandwidth, Congestion, Delay, and Jitter (9.1.3) |
|
|
354 | (1) |
|
|
355 | (2) |
|
Traffic Characteristics (9.2) |
|
|
357 | (4) |
|
Network Traffic Trends (9.2.2) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (5) |
|
|
361 | (1) |
|
First-In, First Out (9.3.3) |
|
|
362 | (1) |
|
Weighted Fair Queuing (WFQ) (9.3.4) |
|
|
362 | (1) |
|
|
363 | (1) |
|
Class-Based Weighted Fair Queuing (CBWFQ) (9.3.5) |
|
|
364 | (1) |
|
Low Latency Queuing (LLQ) (9.3.6) |
|
|
365 | (1) |
|
|
366 | (4) |
|
Selecting an Appropriate QoS Policy Model (9.4.2) |
|
|
366 | (1) |
|
|
366 | (1) |
|
Integrated Services (9.4.4) |
|
|
367 | (2) |
|
Differentiated Services (9.4.5) |
|
|
369 | (1) |
|
QoS Implementation Techniques (9.5) |
|
|
370 | (12) |
|
Avoiding Packet Loss (9.5.2) |
|
|
371 | (1) |
|
|
371 | (1) |
|
Classification and Marking (9.5.4) |
|
|
372 | (1) |
|
Marking at Layer 2 (9.5.5) |
|
|
373 | (1) |
|
Marking at Layer 3 (9.5.6) |
|
|
374 | (1) |
|
Type of Service and Traffic Class Field (9.5.7) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Class Selector Bits (9.5.9) |
|
|
377 | (1) |
|
Trust Boundaries (9.5.10) |
|
|
378 | (1) |
|
Congestion Avoidance (9.5.11) |
|
|
379 | (1) |
|
Shaping and Policing (9.5.12) |
|
|
380 | (1) |
|
QoS Policy Guidelines (9.5.13) |
|
|
381 | (1) |
|
|
382 | (3) |
|
Network Transmission Quality |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (1) |
|
|
383 | (1) |
|
QoS Implementation Techniques |
|
|
384 | (1) |
|
|
385 | (1) |
|
Check Your Understanding Questions |
|
|
385 | (4) |
|
Chapter 10 Network Management |
|
|
389 | (64) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
Device Discovery with CDP (10.1) |
|
|
390 | (6) |
|
|
390 | (1) |
|
Configure and Verify CDP (10.1.2) |
|
|
391 | (2) |
|
Discover Devices by Using CDP (10.1.3) |
|
|
393 | (3) |
|
Device Discovery with LLDP (10.2) |
|
|
396 | (4) |
|
|
396 | (1) |
|
Configure and Verify LLDP (10.2.2) |
|
|
397 | (1) |
|
Discover Devices by Using LLDP (10.2.3) |
|
|
397 | (3) |
|
|
400 | (5) |
|
Time and Calendar Services (10.3.1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Configure and Verify NTP (10.3.3) |
|
|
402 | (3) |
|
|
405 | (13) |
|
Introduction to SNMP (10.4.1) |
|
|
405 | (1) |
|
|
406 | (2) |
|
SNMP Agent Traps (10.4.3) |
|
|
408 | (1) |
|
|
409 | (3) |
|
Community Strings (10.4.6) |
|
|
412 | (3) |
|
|
415 | (1) |
|
SNMP Polling Scenario (10.4.8) |
|
|
415 | (2) |
|
SNMP Object Navigator (10.4.9) |
|
|
417 | (1) |
|
|
418 | (5) |
|
Introduction to Syslog (10.5.1) |
|
|
418 | (2) |
|
Syslog Operation (10.5.2) |
|
|
420 | (1) |
|
Syslog Message Format (10.5.3) |
|
|
421 | (1) |
|
Syslog Facilities (10.5.4) |
|
|
422 | (1) |
|
Configure Syslog Timestamp (10.5.5) |
|
|
422 | (1) |
|
Router and Switch File Maintenance (10.6) |
|
|
423 | (14) |
|
Router File Systems (10.6.1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (1) |
|
Switch File Systems (10.6.2) |
|
|
426 | (1) |
|
Use a Text File to Back Up a Configuration (10.6.3) |
|
|
427 | (1) |
|
Use a Text File to Restore a Configuration (10.6.4) |
|
|
428 | (1) |
|
Use TFTP to Back Up and Restore a Configuration (10.6.5) |
|
|
428 | (2) |
|
USB Ports on a Cisco Router (10.6.6) |
|
|
430 | (1) |
|
Use USB to Back Up and Restore a Configuration (10.6.7) |
|
|
430 | (2) |
|
Restore Configurations with a USB Flash Drive |
|
|
432 | (1) |
|
Password Recovery Procedures (10.6.8) |
|
|
433 | (1) |
|
Password Recovery Example (10.6.9) |
|
|
433 | (1) |
|
Step 1 Enter the ROMMON mode |
|
|
433 | (1) |
|
Step 2 Change the configuration register |
|
|
434 | (1) |
|
Step 3 Copy the startup-config to the running-config |
|
|
434 | (1) |
|
Step 4 Change the password |
|
|
435 | (1) |
|
Step 5 Save the running-config as the new startup-config |
|
|
435 | (1) |
|
|
435 | (2) |
|
|
437 | (6) |
|
TFTP Servers as a Backup Location (10.7.2) |
|
|
437 | (1) |
|
Backup IOS Image to TFTP Server Example (10.7.3) |
|
|
438 | (1) |
|
Step 1 Ping the TFTP server |
|
|
438 | (1) |
|
Step 2 Verify image size in flash |
|
|
439 | (1) |
|
Step 3 Copy the image to the TFTP server |
|
|
439 | (1) |
|
Copy an IOS Image to a Device Example (10.7.4) |
|
|
439 | (1) |
|
Step 1 Ping the TFTP server |
|
|
440 | (1) |
|
Step 2 Verify the amount of free flash |
|
|
440 | (1) |
|
Step 3 Copy the new IOS image to flash |
|
|
441 | (1) |
|
The boot system Command (10.7.5) |
|
|
441 | (2) |
|
|
443 | (3) |
|
Device Discovery with CDP |
|
|
443 | (1) |
|
Device Discovery with LLDP |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
Router and Switch File Maintenance |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
Check Your Understanding Questions |
|
|
447 | (6) |
|
Chapter 11 Network Design |
|
|
453 | (48) |
|
|
453 | (1) |
|
|
453 | (2) |
|
|
455 | (1) |
|
Hierarchical Networks (11.1) |
|
|
455 | (10) |
|
The Need to Scale the Network (11.1.2) |
|
|
455 | (3) |
|
Borderless Switched Networks (11.1.3) |
|
|
458 | (1) |
|
Hierarchy in the Borderless Switched Network (11.1.4) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
Access, Distribution, and Core Layer Functions (11.1.5) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Three-Tier and Two-Tier Examples (11.1.6) |
|
|
462 | (1) |
|
|
463 | (1) |
|
|
464 | (1) |
|
Role of Switched Networks (11.1.7) |
|
|
464 | (1) |
|
|
465 | (12) |
|
Design for Scalability (11.2.1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (1) |
|
Scalable Routing Protocol |
|
|
467 | (1) |
|
|
468 | (1) |
|
Plan for Redundancy (11.2.2) |
|
|
469 | (1) |
|
Reduce Failure Domain Size (11.2.3) |
|
|
470 | (1) |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
472 | (1) |
|
|
472 | (1) |
|
|
473 | (1) |
|
Limiting the Size of Failure Domains |
|
|
474 | (1) |
|
|
474 | (1) |
|
Increase Bandwidth (11.2.4) |
|
|
474 | (1) |
|
Expand the Access Layer (11.2.5) |
|
|
475 | (1) |
|
Tune Routing Protocols (11.2.6) |
|
|
476 | (1) |
|
|
477 | (10) |
|
Switch Platforms (11.3.1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (1) |
|
Service Provider Switches |
|
|
479 | (1) |
|
|
479 | (1) |
|
Switch Form Factors (11.3.2) |
|
|
479 | (1) |
|
Fixed Configuration Switches |
|
|
480 | (1) |
|
Modular Configuration Switches |
|
|
480 | (1) |
|
Stackable Configuration Switches |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
Forwarding Rates (11.3.4) |
|
|
483 | (1) |
|
Power over Ethernet (11.3.5) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
485 | (1) |
|
Multilayer Switching (11.3.6) |
|
|
485 | (1) |
|
Business Considerations for Switch Selection (11.3.7) |
|
|
486 | (1) |
|
|
487 | (6) |
|
Router Requirements (11.4.1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
Router Form Factors (11.4.3) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
Fixed Configuration or Modular |
|
|
492 | (1) |
|
|
493 | (2) |
|
|
493 | (1) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
Check Your Understanding Questions |
|
|
496 | (5) |
|
Chapter 12 Network Troubleshooting |
|
|
501 | (80) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
Network Documentation (12.1) |
|
|
502 | (10) |
|
Documentation Overview (12.1.1) |
|
|
502 | (1) |
|
Network Topology Diagrams (12.1.2) |
|
|
503 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
|
505 | (1) |
|
Network Device Documentation (12.1.3) |
|
|
505 | (1) |
|
Router Device Documentation |
|
|
505 | (1) |
|
LAN Switch Device Documentation |
|
|
506 | (1) |
|
End-System Documentation Files |
|
|
506 | (1) |
|
Establish a Network Baseline (12.1.4) |
|
|
507 | (1) |
|
Step 1 Determine What Types of Data to Collect (12.1.5) |
|
|
508 | (1) |
|
Step 2 Identify Devices and Ports of Interest (12.1.6) |
|
|
508 | (1) |
|
Step 3 Determine the Baseline Duration (12.1.7) |
|
|
509 | (1) |
|
Data Measurement (12.1.8) |
|
|
510 | (2) |
|
Troubleshooting Process (12.2) |
|
|
512 | (12) |
|
General Troubleshooting Procedures (12.2.1) |
|
|
512 | (1) |
|
Seven-Step Troubleshooting Process (12.2.2) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
514 | (1) |
|
Eliminate Possible Causes |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
515 | (1) |
|
Question End Users (12.2.3) |
|
|
515 | (1) |
|
Gather Information (12.2.4) |
|
|
516 | (1) |
|
Troubleshooting with Layered Models (12.2.5) |
|
|
517 | (1) |
|
Structured Troubleshooting Methods (12.2.6) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
|
522 | (1) |
|
Guidelines for Selecting a Troubleshooting Method (12.2.7) |
|
|
523 | (1) |
|
Troubleshooting Tools (12.3) |
|
|
524 | (7) |
|
Software Troubleshooting Tools (12.3.1) |
|
|
524 | (1) |
|
Network Management System Tools |
|
|
524 | (1) |
|
|
524 | (1) |
|
|
524 | (1) |
|
Protocol Analyzers (12.3.2) |
|
|
525 | (1) |
|
Hardware Troubleshooting Tools (12.3.3) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
Portable Network Analyzers |
|
|
528 | (1) |
|
|
528 | (1) |
|
Syslog Server as a Troubleshooting Tool (12.3.4) |
|
|
529 | (2) |
|
Symptoms and Causes of Network Problems (12.4) |
|
|
531 | (14) |
|
Physical Layer Troubleshooting (12.4.1) |
|
|
531 | (3) |
|
Data Link Layer Troubleshooting (12.4.2) |
|
|
534 | (3) |
|
Network Layer Troubleshooting (12.4.3) |
|
|
537 | (2) |
|
Transport Layer Troubleshooting---ACLs (12.4.4) |
|
|
539 | (3) |
|
Transport Layer Troubleshooting---NAT for IPv4 (12.4.5) |
|
|
542 | (1) |
|
Application Layer Troubleshooting (12.4.6) |
|
|
543 | (2) |
|
Troubleshooting IP Connectivity (12.5) |
|
|
545 | (27) |
|
Components of Troubleshooting End-to-End Connectivity (12.5.1) |
|
|
545 | (2) |
|
End-to-End Connectivity Problem Initiates Troubleshooting (12.5.2) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
Step 1 Verify the Physical Layer (12.5.3) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
Step 2 Check for Duplex Mismatches (12.5.4) |
|
|
551 | (1) |
|
|
552 | (1) |
|
Step 3 Verify Addressing on the Local Network (12.5.5) |
|
|
553 | (1) |
|
|
553 | (1) |
|
Windows IPv6 Neighbor Table |
|
|
554 | (1) |
|
|
555 | (1) |
|
|
555 | (1) |
|
Troubleshoot VLAN Assignment Example (12.5.6) |
|
|
556 | (1) |
|
|
557 | (1) |
|
Check the Switch MAC Table |
|
|
557 | (1) |
|
Correct the VLAN Assignment |
|
|
557 | (1) |
|
Step 4 Verify Default Gateway (12.5.7) |
|
|
558 | (1) |
|
Troubleshooting IPv4 Default Gateway Example |
|
|
559 | (1) |
|
|
559 | (1) |
|
|
559 | (1) |
|
Troubleshoot IPv6 Default Gateway Example (12.5.8) |
|
|
560 | (1) |
|
|
560 | (1) |
|
|
560 | (1) |
|
Check R1 Interface Settings |
|
|
561 | (1) |
|
|
561 | (1) |
|
Verify PCI Has an IPv6 Default Gateway |
|
|
562 | (1) |
|
Step 5 Verify Correct Path (12.5.9) |
|
|
562 | (4) |
|
|
566 | (1) |
|
Step 6 Verify the Transport Layer (12.5.10) |
|
|
566 | (1) |
|
|
566 | (2) |
|
Step 7 Verify ACLs (12.5.11) |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
|
570 | (1) |
|
Step 8 Verify DNS (12.5.12) |
|
|
570 | (2) |
|
|
572 | (5) |
|
|
572 | (1) |
|
|
572 | (1) |
|
|
573 | (1) |
|
Symptoms and Causes of Network Problems |
|
|
573 | (1) |
|
Troubleshooting IP Connectivity |
|
|
574 | (3) |
|
|
577 | (1) |
|
Check Your Understanding Questions |
|
|
577 | (4) |
|
Chapter 13 Network Virtualization |
|
|
581 | (36) |
|
|
581 | (1) |
|
|
581 | (2) |
|
|
583 | (1) |
|
|
583 | (2) |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
584 | (1) |
|
Cloud Computing Versus Data Center (13.1.5) |
|
|
585 | (1) |
|
|
585 | (7) |
|
Cloud Computing and Virtualization (13.2.1) |
|
|
585 | (1) |
|
Dedicated Servers (13.2.2) |
|
|
586 | (1) |
|
Server Virtualization (13.2.3) |
|
|
587 | (2) |
|
Advantages of Virtualization (13.2.4) |
|
|
589 | (1) |
|
Abstraction Layers (13.2.5) |
|
|
589 | (2) |
|
Type 2 Hypervisors (13.2.6) |
|
|
591 | (1) |
|
Virtual Network Infrastructure (13.3) |
|
|
592 | (3) |
|
Type 1 Hypervisors (13.3.1) |
|
|
592 | (1) |
|
Installing a VM on a Hypervisor (13.3.2) |
|
|
592 | (2) |
|
The Complexity of Network Virtualization (13.3.3) |
|
|
594 | (1) |
|
Software-Defined Networking (13.4) |
|
|
595 | (5) |
|
Control Plane and Data Plane (13.4.2) |
|
|
595 | (1) |
|
|
596 | (1) |
|
SDN and Central Controller |
|
|
597 | (1) |
|
|
598 | (1) |
|
Network Virtualization Technologies (13.4.3) |
|
|
598 | (1) |
|
Traditional and SDN Architectures (13.4.4) |
|
|
599 | (1) |
|
|
600 | (9) |
|
SDN Controller and Operations (13.5.1) |
|
|
600 | (2) |
|
Core Components of ACI (13.5.3) |
|
|
602 | (1) |
|
Spine-Leaf Topology (13.5.4) |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
605 | (1) |
|
APIC-EM Features (13.5.6) |
|
|
606 | (1) |
|
APIC-EM Path Trace (13.5.7) |
|
|
606 | (3) |
|
|
609 | (3) |
|
|
609 | (1) |
|
|
609 | (1) |
|
Virtual Network Infrastructure |
|
|
610 | (1) |
|
Software-Defined Networking |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
612 | (1) |
|
Check Your Understanding Questions |
|
|
613 | (4) |
|
Chapter 14 Network Automation |
|
|
617 | (40) |
|
|
617 | (1) |
|
|
617 | (2) |
|
|
619 | (1) |
|
Automation Overview (14.1) |
|
|
619 | (1) |
|
The Increase in Automation (14.1.2) |
|
|
619 | (1) |
|
Thinking Devices (14.1.3) |
|
|
620 | (1) |
|
|
620 | (8) |
|
The Data Formats Concept (14.2.2) |
|
|
620 | (2) |
|
Data Format Rules (14.2.3) |
|
|
622 | (1) |
|
Compare Data Formats (14.2.4) |
|
|
623 | (1) |
|
JSON Data Format (14.2.5) |
|
|
624 | (1) |
|
JSON Syntax Rules (14.2.6) |
|
|
624 | (2) |
|
YAML Data Format (14.2.7) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
628 | (5) |
|
|
628 | (1) |
|
|
629 | (2) |
|
Open, Internal, and Partner APIs (14.3.4) |
|
|
631 | (1) |
|
Types of Web Service APIs (14.3.5) |
|
|
632 | (1) |
|
|
633 | (6) |
|
REST and RESTful API (14.4.2) |
|
|
633 | (1) |
|
RESTful Implementation (14.4.3) |
|
|
634 | (1) |
|
URI, URN, and URL (14.4.4) |
|
|
635 | (1) |
|
Anatomy of a RESTful Request (14.4.5) |
|
|
636 | (2) |
|
RESTful API Applications (14.4.6) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
Network Operating Systems |
|
|
638 | (1) |
|
Configuration Management Tools (14.5) |
|
|
639 | (5) |
|
Traditional Network Configuration (14.5.2) |
|
|
639 | (2) |
|
Network Automation (14.5.3) |
|
|
641 | (1) |
|
Configuration Management Tools (14.5.4) |
|
|
642 | (1) |
|
Compare Ansible, Chef, Puppet, and SaltStack (14.5.5) |
|
|
642 | (2) |
|
IBN and Cisco DNA Center (14.6) |
|
|
644 | (7) |
|
Intent-Based Networking Overview (14.6.2) |
|
|
644 | (1) |
|
Network Infrastructure as Fabric (14.6.3) |
|
|
644 | (3) |
|
Cisco Digital Network Architecture (DNA) (14.6.4) |
|
|
647 | (1) |
|
Cisco DNA Center (14.6.5) |
|
|
648 | (3) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
Configuration and Management |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
Check Your Understanding Questions |
|
|
653 | (4) |
Appendix A Answers to the "Check Your Understanding" Questions |
|
657 | (20) |
Glossary |
|
677 | (38) |
Index |
|
715 | |