Introduction |
|
xxx | |
|
Chapter 1 Single-Area OSPFv2 Concepts |
|
|
1 | (14) |
|
|
1 | (1) |
|
Why should I take this module? - 1.0.1 |
|
|
1 | (1) |
|
What will I learn to do in this module? - 1.0.2 |
|
|
1 | (1) |
|
OSPF Features and Characteristics - 1.1 |
|
|
1 | (5) |
|
Introduction to OSPF - 1.1.1 |
|
|
1 | (1) |
|
Components of OSPF - 1.1.2 |
|
|
2 | (1) |
|
Routing Protocol Messages |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Link-State Operation - 1.1.3 |
|
|
3 | (1) |
|
1 Establish Neighbor Adjacencies |
|
|
3 | (1) |
|
2 Exchange Link-State Advertisements |
|
|
3 | (1) |
|
3 Build the Link State Database |
|
|
3 | (1) |
|
4 Execute the SPF Algorithm |
|
|
4 | (1) |
|
|
4 | (1) |
|
Single-Area and Multiarea OSPF - 1.1.4 |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 |
|
|
6 | (1) |
|
|
6 | (1) |
|
Video - OSPF Packets - 1.2.1 |
|
|
6 | (1) |
|
Types of OSPF Packets - 1.2.2 |
|
|
6 | (1) |
|
Link-State Updates - 1.2.3 |
|
|
7 | (1) |
|
|
7 | (1) |
|
Check Your Understanding - OSPF Packets - 1.2.5 |
|
|
7 | (1) |
|
|
7 | (4) |
|
Video - OSPF Operation - 1.3.1 |
|
|
7 | (1) |
|
OSPF Operational States - 1.3.2 |
|
|
7 | (1) |
|
Establish Neighbor Adjacencies - 1.3.3 |
|
|
8 | (1) |
|
1 Down State to Init State |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
Synchronizing OSPF Databases - 1.3.4 |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
The Need for a DR - 1.3.5 |
|
|
10 | (1) |
|
LSA Flooding With a DR - 1.3.6 |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Check Your Understanding - OPSF Operation - 1.3.7 |
|
|
11 | (1) |
|
Module Practice and Quiz - 1.4 |
|
|
11 | (3) |
|
What did I learn in this module? - 1.4.1 |
|
|
11 | (1) |
|
OSPF Features and Characteristics |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Chapter Quiz - Single-Area OSPFv2 Concepts |
|
|
14 | (1) |
|
|
14 | (1) |
|
Chapter 2 Single-Area OSPFv2 Configuration |
|
|
15 | (42) |
|
|
15 | (1) |
|
Why should I take this module? - 2.0.1 |
|
|
15 | (1) |
|
What will I learn to do in this module? - 2.0.2 |
|
|
15 | (1) |
|
|
15 | (5) |
|
OSPF Reference Topology - 2.1.1 |
|
|
15 | (1) |
|
Router Configuration Mode for OSPF - 2.1.2 |
|
|
16 | (1) |
|
|
16 | (1) |
|
Router ID Order of Precedence - 2.1.4 |
|
|
17 | (1) |
|
Configure a Loopback Interface as the Router ID - 2.1.5 |
|
|
17 | (1) |
|
Explicitly Configure a Router ID - 2.1.6 |
|
|
18 | (1) |
|
Modify a Router ID - 2.1.7 |
|
|
18 | (1) |
|
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 |
|
|
19 | (1) |
|
Check Your Understanding - OSPF Router ID - 2.1.9 |
|
|
19 | (1) |
|
Point-to-Point OSPF Networks - 2.2 |
|
|
20 | (7) |
|
The network Command Syntax - 2.2.1 |
|
|
20 | (1) |
|
The Wildcard Mask - 2.2.2 |
|
|
20 | (1) |
|
Check Your Understanding - The Wildcard Masks - 2.2.3 |
|
|
20 | (1) |
|
Configure OSPF Using the network Command - 2.2.4 |
|
|
20 | (1) |
|
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 |
|
|
21 | (1) |
|
Configure OSPF Using the ip ospf Command - 2.2.6 |
|
|
21 | (1) |
|
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 |
|
|
22 | (1) |
|
Passive Interface - 2.2.8 |
|
|
22 | (1) |
|
Configure Passive Interfaces - 2.2.9 |
|
|
23 | (1) |
|
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 |
|
|
24 | (1) |
|
OSPF Point-to-Point Networks - 2.2.11 |
|
|
24 | (2) |
|
Loopbacks and Point-to-Point Networks - 2.2.12 |
|
|
26 | (1) |
|
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 |
|
|
26 | (1) |
|
Multiaccess OSPF Networks - 2.3 |
|
|
27 | (9) |
|
OSPF Network Types - 2.3.1 |
|
|
27 | (1) |
|
OSPF Designated Router - 2.3.2 |
|
|
27 | (1) |
|
OSPF Multiaccess Reference Topology - 2.3.3 |
|
|
27 | (1) |
|
Verify OSPF Router Roles - 2.3.4 |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
Verify DR/BDR Adjacencies - 2.3.5 |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Default DR/BDR Election Process - 2.3.6 |
|
|
32 | (1) |
|
DR Failure and Recovery - 2.3.7 |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
The ip ospf priority Command - 2.3.8 |
|
|
33 | (1) |
|
Configure OSPF Priority - 2.3.9 |
|
|
34 | (1) |
|
Syntax Checker - Configure OSPF Priority - 2.3.10 |
|
|
35 | (1) |
|
Packet Tracer - Determine the DR and BDR - 2.3.11 |
|
|
35 | (1) |
|
Modify Single-Area OSPFv2 - 2.4 |
|
|
36 | (7) |
|
Cisco OSPF Cost Metric - 2.4.1 |
|
|
36 | (1) |
|
Adjust the Reference Bandwidth - 2.4.2 |
|
|
36 | (2) |
|
OSPF Accumulates Costs - 2.4.3 |
|
|
38 | (1) |
|
Manually Set OSPF Cost Value - 2.4.4 |
|
|
38 | (1) |
|
Test Failover to Backup Route - 2.4.5 |
|
|
39 | (1) |
|
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 |
|
|
40 | (1) |
|
Hello Packet Intervals - 2.4.7 |
|
|
40 | (1) |
|
Verify Hello and Dead Intervals - 2.4.8 |
|
|
40 | (2) |
|
Modify OSPFv2 Intervals - 2.4.9 |
|
|
42 | (1) |
|
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 |
|
|
43 | (1) |
|
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 |
|
|
43 | (1) |
|
Default Route Propagation - 2.5 |
|
|
43 | (3) |
|
Propagate a Default Static Route in OSPFv2 - 2.5.1 |
|
|
43 | (1) |
|
Verify the Propagated Default Route - 2.5.2 |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 |
|
|
46 | (1) |
|
Verify Single-Area OSPFv2 - 2.6 |
|
|
46 | (5) |
|
Verify OSPF Neighbors - 2.6.1 |
|
|
46 | (2) |
|
Verify OSPF Protocol Settings - 2.6.2 |
|
|
48 | (1) |
|
Verify OSPF Process Information - 2.6.3 |
|
|
48 | (2) |
|
Verify OSPF Interface Settings - 2.6.4 |
|
|
50 | (1) |
|
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 |
|
|
51 | (1) |
|
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 |
|
|
51 | (1) |
|
Module Practice and Quiz - 2.7 |
|
|
51 | (5) |
|
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 |
|
|
51 | (1) |
|
Lab - Single-Area OSPFv2 Configuration - 2.7.2 |
|
|
51 | (1) |
|
What did I learn in this module? - 2.7.3 |
|
|
52 | (1) |
|
|
52 | (1) |
|
Point-to-Point OSPF Networks |
|
|
52 | (1) |
|
|
53 | (1) |
|
Modify Single-Area OSPFv2 |
|
|
54 | (1) |
|
Default Route Propagation |
|
|
54 | (1) |
|
Verify Single-Area OSPFv2 |
|
|
54 | (2) |
|
Chapter Quiz - Single-Area OSPFv2 Configuration |
|
|
56 | (1) |
|
|
56 | (1) |
|
Chapter 3 Network Security Concepts |
|
|
57 | (36) |
|
|
57 | (1) |
|
Why should I take this module? - 3.0.1 |
|
|
57 | (1) |
|
What will I learn in this module? - 3.0.2 |
|
|
57 | (1) |
|
Ethical Hacking Statement - 3.0.3 |
|
|
57 | (1) |
|
Current State of Cybersecurity - 3.1 |
|
|
58 | (2) |
|
Current State of Affairs - 3.1.1 |
|
|
58 | (1) |
|
Vectors of Network Attacks - 3.1.2 |
|
|
58 | (1) |
|
|
59 | (1) |
|
Check Your Understanding - Current State of Cybersecurity - 3.1.4 |
|
|
60 | (1) |
|
|
60 | (2) |
|
|
60 | (1) |
|
Evolution of Hackers - 3.2.2 |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
State-Sponsored Hackers - 3.2.5 |
|
|
61 | (1) |
|
Check Your Understanding - Threat Actors - 3.2.6 |
|
|
62 | (1) |
|
|
62 | (2) |
|
Video - Threat Actor Tools - 3.3.1 |
|
|
62 | (1) |
|
Introduction to Attack Tools - 3.3.2 |
|
|
62 | (1) |
|
Evolution of Security Tools - 3.3.3 |
|
|
62 | (1) |
|
|
63 | (1) |
|
Check Your Understanding - Threat Actor Tools - 3.3.5 |
|
|
64 | (1) |
|
|
64 | (2) |
|
Overview of Malware - 3.4.1 |
|
|
64 | (1) |
|
Viruses and Trojan Horses - 3.4.2 |
|
|
64 | (1) |
|
Other Types of Malware - 3.4.3 |
|
|
65 | (1) |
|
Check Your Understanding - Malware - 3.4.4 |
|
|
66 | (1) |
|
Common Network Attacks - 3.5 |
|
|
66 | (5) |
|
Overview of Network Attacks - 3.5.1 |
|
|
66 | (1) |
|
Video - Reconnaissance Attacks - 3.5.2 |
|
|
67 | (1) |
|
Reconnaissance Attacks - 3.5.3 |
|
|
67 | (1) |
|
Internet Information Queries |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Video - Access and Social Engineering Attacks - 3.5.4 |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
Trust Exploitation Example |
|
|
68 | (1) |
|
|
68 | (1) |
|
Man-in-the-Middle Attack Example |
|
|
69 | (1) |
|
|
69 | (1) |
|
Social Engineering Attacks - 3.5.6 |
|
|
69 | (1) |
|
Lab - Social Engineering - 3.5.7 |
|
|
70 | (1) |
|
Video - Denial of Service Attacks - 3.5.8 |
|
|
70 | (1) |
|
DoS and DDoS Attacks - 3.5.9 |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Check Your Understanding - Common Network Attacks - 3.5.10 |
|
|
71 | (1) |
|
IP Vulnerabilities and Threats - 3.6 |
|
|
71 | (2) |
|
Video - Common IP and ICMP Attacks - 3.6.1 |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 |
|
|
72 | (1) |
|
Amplification and Reflection Attacks - 3.6.5 |
|
|
72 | (1) |
|
Address Spoofing Attacks - 3.6.6 |
|
|
72 | (1) |
|
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 |
|
|
73 | (1) |
|
TCP and UDP Vulnerabilities - 3.7 |
|
|
73 | (2) |
|
TCP Segment Header - 3.7.1 |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
UDP Segment Header and Operation - 3.7.4 |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 |
|
|
75 | (1) |
|
|
75 | (5) |
|
ARP Vulnerabilities - 3.8.1 |
|
|
75 | (1) |
|
ARP Cache Poisoning - 3.8.2 |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
Spoofed Gratuitous ARP Replies |
|
|
76 | (1) |
|
Video - ARP Spoofing - 3.8.3 |
|
|
76 | (1) |
|
|
76 | (1) |
|
DNS Open Resolver Attacks |
|
|
77 | (1) |
|
|
77 | (1) |
|
DNS Domain Shadowing Attacks |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
1 Client Broadcasts DHCP Discovery Messages |
|
|
79 | (1) |
|
2 DHCP Servers Respond with Offers |
|
|
79 | (1) |
|
3 Client Accepts Rogue DHCP Request |
|
|
79 | (1) |
|
4 Rogue DHCP Acknowledges the Request |
|
|
79 | (1) |
|
Lab - Explore DNS Traffic - 3.8.8 |
|
|
79 | (1) |
|
Network Security Best Practices - 3.9 |
|
|
80 | (2) |
|
Confidentiality, Integrity, and Availability - 3.9.1 |
|
|
80 | (1) |
|
The Defense-in-Depth Approach - 3.9.2 |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Content Security Appliances - 3.9.5 |
|
|
81 | (1) |
|
Cisco Email Security Appliance (ESA) |
|
|
82 | (1) |
|
Cisco Web Security Appliance (WSA) |
|
|
82 | (1) |
|
Check Your Understanding - Network Security Best Practices - 3.9.6 |
|
|
82 | (1) |
|
|
82 | (6) |
|
Video - Cryptography - 3.10.1 |
|
|
82 | (1) |
|
Securing Communications - 3.10.2 |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
Origin Authentication - 3.10.5 |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Cisco Router HMAC Example |
|
|
84 | (1) |
|
Data Confidentiality - 3.10.6 |
|
|
85 | (1) |
|
Symmetric Encryption - 3.10.7 |
|
|
85 | (1) |
|
Asymmetric Encryption - 3.10.8 |
|
|
86 | (1) |
|
|
87 | (1) |
|
Check Your Understanding - Cryptography - 3.10.10 |
|
|
88 | (1) |
|
Module Practice and Quiz - 3.11 |
|
|
88 | (3) |
|
What did I learn in this module? - 3.1 U |
|
|
88 | (3) |
|
Chapter Quiz - Network Security Concepts |
|
|
91 | (1) |
|
|
91 | (2) |
|
|
93 | (14) |
|
|
93 | (1) |
|
Why should I take this module? - 4.0.1 |
|
|
93 | (1) |
|
What will I learn to do in this module? - 4.0.2 |
|
|
93 | (1) |
|
|
93 | (3) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (1) |
|
Packet Tracer - ACL Demonstration - 4.1.4 |
|
|
96 | (1) |
|
Check Your Understanding - Purpose of ACLs - 4.1.5 |
|
|
96 | (1) |
|
Wildcard Masks in ACLs - 4.2 |
|
|
96 | (3) |
|
Wildcard Mask Overview - 4.2.1 |
|
|
96 | (1) |
|
Wildcard Mask Types - 4.2.2 |
|
|
97 | (1) |
|
|
97 | (1) |
|
Wildcard Mask to Match an IPv4 Subnet |
|
|
97 | (1) |
|
Wildcard Mask to Match an IPv4 Address Range |
|
|
97 | (1) |
|
Wildcard Mask Calculation - 4.2.3 |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Wildcard Mask Keywords - 4.2.4 |
|
|
98 | (1) |
|
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 |
|
|
99 | (1) |
|
Guidelines for ACL Creation - 4.3 |
|
|
99 | (1) |
|
Limited Number of ACLs per Interface - 4.3.1 |
|
|
99 | (1) |
|
ACL Best Practices - 4.3.2 |
|
|
99 | (1) |
|
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 |
|
|
100 | (1) |
|
|
100 | (3) |
|
Standard and Extended ACLs - 4.4.1 |
|
|
100 | (1) |
|
Numbered and Named ACLs - 4.4.2 |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
Where to Place ACLs - 4.4.3 |
|
|
102 | (1) |
|
Standard ACL Placement Example - 4.4.4 |
|
|
102 | (1) |
|
Extended ACL Placement Example - 4.4.5 |
|
|
103 | (1) |
|
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 |
|
|
103 | (1) |
|
Module Practice and Quiz - 4.5 |
|
|
103 | (3) |
|
What did I learn in this module? - 4.5.1 |
|
|
103 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Guidelines for ACL creation |
|
|
104 | (2) |
|
|
106 | (1) |
|
Chapter Quiz - ACL Concepts |
|
|
106 | (1) |
|
|
106 | (1) |
|
Chapter 5 ACLs for IPv4 Configuration |
|
|
107 | (28) |
|
|
107 | (1) |
|
Why should I take this module? - 5.0.1 |
|
|
107 | (1) |
|
What will I learn to do in this module? - 5.0.2 |
|
|
107 | (1) |
|
Configure Standard IPv4 ACLs - 5.1 |
|
|
107 | (6) |
|
|
107 | (1) |
|
Numbered Standard IPv4 ACL Syntax - 5.1.2 |
|
|
108 | (1) |
|
Named Standard IPv4 ACL Syntax - 5.1.3 |
|
|
109 | (1) |
|
Apply a Standard IPv4 ACL - 5.1.4 |
|
|
109 | (1) |
|
Numbered Standard IPv4 ACL Example - 5.1.5 |
|
|
110 | (1) |
|
Named Standard IPv4 ACL Example - 5.1.6 |
|
|
111 | (1) |
|
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 |
|
|
112 | (1) |
|
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 |
|
|
113 | (1) |
|
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 |
|
|
113 | (1) |
|
|
113 | (3) |
|
Two Methods to Modify an ACL - 5.2.1 |
|
|
113 | (1) |
|
Text Editor Method - 5.2.2 |
|
|
113 | (1) |
|
Sequence Numbers Method - 5.2.3 |
|
|
114 | (1) |
|
Modify a Named ACL Example - 5.2.4 |
|
|
115 | (1) |
|
|
116 | (1) |
|
Syntax Checker - Modify IPv4 ACLs - 5.2.6 |
|
|
116 | (1) |
|
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 |
|
|
116 | (1) |
|
Secure VTY Ports with a Standard IPv4 ACL - 5.3 |
|
|
116 | (3) |
|
The access-class Command - 5.3.1 |
|
|
116 | (1) |
|
Secure VTY Access Example - 5.3.2 |
|
|
117 | (1) |
|
Verify the VTY Port is Secured - 5.3.3 |
|
|
118 | (1) |
|
Syntax Checker - Secure the VTY Ports - 5.3.4 |
|
|
118 | (1) |
|
Configure Extended IPv4 ACLs - 5.4 |
|
|
119 | (11) |
|
|
119 | (1) |
|
Numbered Extended IPv4 ACL Syntax - 5.4.2 |
|
|
119 | (1) |
|
Protocols and Ports - 5.4.3 |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
Protocols and Port Numbers Configuration Examples - 5.4.4 |
|
|
123 | (1) |
|
Apply a Numbered Extended IPv4 ACL - 5.4.5 |
|
|
123 | (1) |
|
TCP Established Extended ACL - 5.4.6 |
|
|
123 | (1) |
|
Named Extended IPv4 ACL Syntax - 5.4.7 |
|
|
124 | (1) |
|
Named Extended IPv4 ACL Example - 5.4.8 |
|
|
125 | (1) |
|
Edit Extended ACLs - 5.4.9 |
|
|
126 | (1) |
|
Another Named Extended IPv4 ACL Example - 5.4.10 |
|
|
127 | (1) |
|
Verify Extended ACLs - 5.4.11 |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 |
|
|
130 | (1) |
|
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 |
|
|
130 | (1) |
|
Module Practice and Quiz - 5.5 |
|
|
130 | (3) |
|
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 |
|
|
130 | (1) |
|
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 |
|
|
131 | (1) |
|
What did I learn in this module? - 5.5.3 |
|
|
131 | (1) |
|
Configure Standard IPv4 ACLs |
|
|
131 | (1) |
|
|
131 | (1) |
|
Secure VTY Ports with a Standard IPv4 ACL |
|
|
131 | (1) |
|
Configure Extended IPv4 ACLs |
|
|
132 | (1) |
|
Chapter Quiz - ACLs for IPv4 Implementation |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (24) |
|
|
135 | (1) |
|
Why should I take this module? - 6.0.1 |
|
|
135 | (1) |
|
What will I learn to do in this module? - 6.0.2 |
|
|
135 | (1) |
|
NAT Characteristics - 6.1 |
|
|
135 | (4) |
|
IPv4 Private Address Space - 6.1.1 |
|
|
135 | (1) |
|
Private Internet Addresses are Defined in RFC 1918 |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Check Your Understanding - NAT Characteristics - 6.1.5 |
|
|
138 | (1) |
|
|
139 | (3) |
|
|
139 | (1) |
|
|
139 | (1) |
|
Port Address Translation - 6.2.3 |
|
|
139 | (1) |
|
Next Available Port - 6.2.4 |
|
|
140 | (1) |
|
NAT and PAT Comparison - 6.2.5 |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
Packets without a Layer 4 Segment - 6.2.6 |
|
|
141 | (1) |
|
Packet Tracer - Investigate NAT Operations - 6.2.7 |
|
|
141 | (1) |
|
NAT Advantages and Disadvantages - 6.3 |
|
|
142 | (1) |
|
Advantages of NAT - 6.3.1 |
|
|
142 | (1) |
|
Disadvantages of NAT - 6.3.2 |
|
|
142 | (1) |
|
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 |
|
|
143 | (1) |
|
|
143 | (3) |
|
Static NAT Scenario - 6.4.1 |
|
|
143 | (1) |
|
Configure Static NAT - 6.4.2 |
|
|
143 | (1) |
|
Analyze Static NAT - 6.4.3 |
|
|
144 | (1) |
|
Verify Static NAT - 6.4.4 |
|
|
144 | (1) |
|
Packet Tracer - Configure Static NAT - 6.4.5 |
|
|
145 | (1) |
|
|
146 | (4) |
|
Dynamic NAT Scenario - 6.5.1 |
|
|
146 | (1) |
|
Configure Dynamic NAT - 6.5.2 |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
Analyze Dynamic NAT - Inside to Outside - 6.5.3 |
|
|
147 | (1) |
|
Analyze Dynamic NAT - Outside to Inside - 6.5.4 |
|
|
147 | (1) |
|
Verify Dynamic NAT - 6.5.5 |
|
|
148 | (2) |
|
Packet Tracer - Configure Dynamic NAT - 6.5.6 |
|
|
150 | (1) |
|
|
150 | (3) |
|
|
150 | (1) |
|
Configure PAT to Use a Single IPv4 Address - 6.6.2 |
|
|
150 | (1) |
|
Configure PAT to Use an Address Pool - 6.6.3 |
|
|
151 | (1) |
|
Analyze PAT - PC to Server - 6.6.4 |
|
|
151 | (1) |
|
Analyze PAT - Server to PC - 6.6.5 |
|
|
151 | (1) |
|
|
151 | (1) |
|
Packet Tracer - Configure PAT - 6.6.7 |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Module Practice and Quiz - 6.8 |
|
|
153 | (5) |
|
Packet Tracer - Configure NAT for IPv4 - 6.8.1 |
|
|
153 | (1) |
|
Lab - Configure NAT for IPv4 - 6.8.2 |
|
|
154 | (1) |
|
What did I learn in this module? - 6.8.3 |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
NAT Advantages and Disadvantages |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (2) |
|
Chapter Quiz - NAT for IPv4 |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (26) |
|
|
159 | (1) |
|
Why should I take this module? - 7.0.1 |
|
|
159 | (1) |
|
What will I learn to do in this module? - 7.0.2 |
|
|
159 | (1) |
|
|
159 | (5) |
|
|
159 | (1) |
|
Private and Public WANs - 7.1.2 |
|
|
160 | (1) |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Partially Meshed Topology |
|
|
162 | (1) |
|
Carrier Connections - 7.1.4 |
|
|
162 | (1) |
|
Single-Carrier WAN Connection |
|
|
162 | (1) |
|
Dual-Carrier WAN Connection |
|
|
162 | (1) |
|
Evolving Networks - 7.1.5 |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
Check Your Understanding - Purpose of WANs - 7.1.6 |
|
|
164 | (1) |
|
|
164 | (5) |
|
|
164 | (1) |
|
WANs in the OSI Model - 7.2.2 |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
Common WAN Terminology - 7.2.3 |
|
|
165 | (1) |
|
|
166 | (1) |
|
Serial Communication - 7.2.5 |
|
|
167 | (1) |
|
Circuit-Switched Communication - 7.2.6 |
|
|
168 | (1) |
|
Packet-Switched Communications - 7.2.7 |
|
|
168 | (1) |
|
SDH, SONET, and DWDM - 7.2.8 |
|
|
169 | (1) |
|
Check Your Understanding - WAN Operations - 7.2.9 |
|
|
169 | (1) |
|
Traditional WAN Connectivity - 7.3 |
|
|
169 | (3) |
|
Traditional WAN Connectivity Options - 7.3.1 |
|
|
169 | (1) |
|
Common WAN Terminology - 7.3.2 |
|
|
169 | (1) |
|
Circuit-Switched Options - 7.3.3 |
|
|
170 | (1) |
|
Public Service Telephone Network (PSTN) |
|
|
171 | (1) |
|
Integrated Services Digital Network (ISDN) |
|
|
171 | (1) |
|
Packet-Switched Options - 7.3.4 |
|
|
171 | (1) |
|
|
171 | (1) |
|
Asynchronous Transfer Mode (ATM) |
|
|
171 | (1) |
|
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 |
|
|
172 | (1) |
|
Modern WAN Connectivity - 7.4 |
|
|
172 | (2) |
|
|
172 | (1) |
|
Modern WAN Connectivity Options - 7.4.2 |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Check Your Understanding - Modern WAN Connectivity - 7.4.5 |
|
|
174 | (1) |
|
Internet-Based Connectivity - 7.5 |
|
|
174 | (7) |
|
Internet-Based Connectivity Options - 7.5.1 |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Wireless Internet-Based Broadband - 7.5.7 |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
ISP Connectivity Options - 7.5.9 |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
Broadband Solution Comparison - 7.5.10 |
|
|
180 | (1) |
|
Lab - Research Broadband Internet Access Options - 7.5.11 |
|
|
181 | (1) |
|
Module Practice and Quiz - 7.6 |
|
|
181 | (3) |
|
Packet Tracer - WAN Concepts - 7.6.1 |
|
|
181 | (1) |
|
What did I learn in this module? - 7.6.2 |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
Traditional WAN Connectivity |
|
|
182 | (1) |
|
|
182 | (1) |
|
Internet-Based Connectivity |
|
|
183 | (1) |
|
Chapter Quiz - WAN Concepts |
|
|
184 | (1) |
|
|
184 | (1) |
|
Chapter 8 VPN and IPsec Concepts |
|
|
185 | (12) |
|
|
185 | (1) |
|
Why should I take this module? - 8.0.1 |
|
|
185 | (1) |
|
What will I learn in this module? - 8.0.2 |
|
|
185 | (1) |
|
|
185 | (1) |
|
Virtual Private Networks - 8.1.1 |
|
|
185 | (1) |
|
|
186 | (1) |
|
Site-to-Site and Remote-Access VPNs - 8.1.3 |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Enterprise and Service Provider VPNs - 8.1.4 |
|
|
186 | (1) |
|
Check Your Understanding - VPN Technology - 8.1.5 |
|
|
187 | (1) |
|
|
187 | (3) |
|
Remote-Access VPNs - 8.2.1 |
|
|
187 | (1) |
|
|
187 | (1) |
|
Site-to-Site IPsec VPNs - 8.2.3 |
|
|
188 | (1) |
|
|
188 | (1) |
|
Dynamic Multipoint VPNs - 8.2.5 |
|
|
189 | (1) |
|
IPsec Virtual Tunnel Interface - 8.2.6 |
|
|
189 | (1) |
|
Service Provider MPLS VPNs - 8.2.7 |
|
|
190 | (1) |
|
Check Your Understanding - Types of VPNs - 8.2.8 |
|
|
190 | (1) |
|
|
190 | (3) |
|
Video - IPsec Concepts - 8.3.1 |
|
|
190 | (1) |
|
IPsec Technologies - 8.3.2 |
|
|
190 | (1) |
|
IPsec Protocol Encapsulation - 8.3.3 |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Secure Key Exchange with Diffie-Hellman - 8.3.7 |
|
|
193 | (1) |
|
Video - IPsec Transport and Tunnel Mode - 8.3.8 |
|
|
193 | (1) |
|
Check Your Understanding - IPsec - 8.3.9 |
|
|
193 | (1) |
|
Module Practice and Quiz - 8.4 |
|
|
193 | (2) |
|
What did I learn in this module? - 8.4.1 |
|
|
193 | (2) |
|
Chapter Quiz - VPN and IPsec Concepts |
|
|
195 | (1) |
|
|
195 | (2) |
|
|
197 | (20) |
|
|
197 | (1) |
|
Why should I take this module? - 9.0.1 |
|
|
197 | (1) |
|
What will I learn to do in this module? - 9.0.2 |
|
|
197 | (1) |
|
Network Transmission Quality - 9.1 |
|
|
197 | (2) |
|
Video Tutorial - The Purpose of QoS - 9.1.1 |
|
|
197 | (1) |
|
Prioritizing Traffic - 9.1.2 |
|
|
197 | (1) |
|
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
Check Your Understanding - Network Transmission Quality - 9.1.5 |
|
|
199 | (1) |
|
Traffic Characteristics - 9.2 |
|
|
199 | (3) |
|
Video Tutorial - Traffic Characteristics - 9.2.1 |
|
|
199 | (1) |
|
Network Traffic Trends - 9.2.2 |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
Factors to Consider for Data Delay |
|
|
202 | (1) |
|
Check Your Understanding - Traffic Characteristics - 9.2.6 |
|
|
202 | (1) |
|
|
202 | (2) |
|
Video Tutorial - QoS Algorithms - 9.3.1 |
|
|
202 | (1) |
|
|
202 | (1) |
|
First In First Out - 9.3.3 |
|
|
202 | (1) |
|
Weighted Fair Queuing (WFQ) - 9.3.4 |
|
|
203 | (1) |
|
|
203 | (1) |
|
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 |
|
|
203 | (1) |
|
Low Latency Queuing (LLQ) - 9.3.6 |
|
|
204 | (1) |
|
Check Your Understanding - Queuing Algorithms - 9.3.7 |
|
|
204 | (1) |
|
|
204 | (4) |
|
Video Tutorial - QoS Models - 9.4.1 |
|
|
204 | (1) |
|
Selecting an Appropriate QoS Policy Model - 9.4.2 |
|
|
204 | (1) |
|
Models for Implementing QoS |
|
|
205 | (1) |
|
|
205 | (1) |
|
Benefits and Drawbacks of Best-Effort Model |
|
|
205 | (1) |
|
Integrated Services - 9.4.4 |
|
|
206 | (1) |
|
Benefits and Drawbacks of IntServ Model |
|
|
206 | (1) |
|
Differentiated Services - 9.4.5 |
|
|
206 | (1) |
|
Benefits and Drawbacks of DiffServ Model |
|
|
207 | (1) |
|
Check Your Understanding - QoS Models - 9.4.6 |
|
|
208 | (1) |
|
QoS Implementation Techniques - 9.5 |
|
|
208 | (5) |
|
Video Tutorial - QoS Implementation Techniques - 9.5.1 |
|
|
208 | (1) |
|
Avoiding Packet Loss - 9.5.2 |
|
|
208 | (1) |
|
|
208 | (1) |
|
Tools for Implementing QoS |
|
|
208 | (1) |
|
Classification and Marking - 9.5.4 |
|
|
209 | (1) |
|
|
210 | (1) |
|
Marking at Layer 2 - 9.5.5 |
|
|
210 | (1) |
|
Ethernet Class of Service (CoS) Values |
|
|
210 | (1) |
|
Marking at Layer 3 - 9.5.6 |
|
|
210 | (1) |
|
Type of Service and Traffic Class Field - 9.5.7 |
|
|
211 | (1) |
|
|
211 | (1) |
|
Class Selector Bits - 9.5.9 |
|
|
211 | (1) |
|
Trust Boundaries - 9.5.10 |
|
|
211 | (1) |
|
Congestion Avoidance - 9.5.11 |
|
|
212 | (1) |
|
Shaping and Policing - 9.5.12 |
|
|
212 | (1) |
|
QoS Policy Guidelines - 9.5.13 |
|
|
213 | (1) |
|
Check Your Understanding - QoS Implementation Techniques - 9.5.14 |
|
|
213 | (1) |
|
Module Practice and Quiz - 9.6 |
|
|
213 | (3) |
|
What did I learn in this module? - 9.6.1 |
|
|
213 | (1) |
|
Network Transmission Quality |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
QoS Implementation Techniques |
|
|
215 | (1) |
|
Chapter Quiz - QoS Concepts |
|
|
216 | (1) |
|
|
216 | (1) |
|
Chapter 10 Network Management |
|
|
217 | (42) |
|
|
217 | (1) |
|
Why should I take this module? - 10.0.1 |
|
|
217 | (1) |
|
What will I learn to do in this module? - 10.0.2 |
|
|
217 | (1) |
|
Device Discovery with CDP - 10.1 |
|
|
217 | (5) |
|
|
217 | (1) |
|
Configure and Verify CDP - 10.1.2 |
|
|
218 | (2) |
|
Discover Devices by Using CDP - 10.1.3 |
|
|
220 | (2) |
|
Syntax Checker - Configure and Verify CDP - 10.1.4 |
|
|
222 | (1) |
|
Packet Tracer - Use CDP to Map a Network - 10.1.5 |
|
|
222 | (1) |
|
Device Discovery with LLDP - 10.2 |
|
|
222 | (3) |
|
|
222 | (1) |
|
Configure and Verify LLDP - 10.2.2 |
|
|
222 | (1) |
|
Discover Devices by Using LLDP - 10.2.3 |
|
|
223 | (2) |
|
Syntax Checker - Configure and Verify LLDP - 10.2.4 |
|
|
225 | (1) |
|
Check Your Understanding - Compare CDP and LLDP - 10.2.5 |
|
|
225 | (1) |
|
Packet Tracer - Use LLDP to Map a Network - 10.2.6 |
|
|
225 | (1) |
|
|
225 | (4) |
|
Time and Calendar Services - 10.3.1 |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
Configure and Verify NTP - 10.3.3 |
|
|
227 | (2) |
|
Packet Tracer - Configure and Verify NTP - 10.3.4 |
|
|
229 | (1) |
|
|
229 | (5) |
|
Introduction to SNMP - 10.4.1 |
|
|
229 | (1) |
|
|
230 | (1) |
|
SNMP Agent Traps - 10.4.3 |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
Check Your Understanding - SNMP Versions - 10.4.5 |
|
|
232 | (1) |
|
Community Strings - 10.4.6 |
|
|
232 | (1) |
|
|
233 | (1) |
|
SNMP Polling Scenario - 10.4.8 |
|
|
233 | (1) |
|
SNMP Object Navigator - 10.4.9 |
|
|
233 | (1) |
|
Lab - Research Network Monitoring Software - 10.4.10 |
|
|
234 | (1) |
|
|
234 | (3) |
|
Introduction to Syslog - 10.5.1 |
|
|
234 | (1) |
|
Syslog Operation - 10.5.2 |
|
|
234 | (1) |
|
Syslog Message Format - 10.5.3 |
|
|
235 | (1) |
|
Syslog Facilities - 10.5.4 |
|
|
236 | (1) |
|
Configure Syslog Timestamp - 10.5.5 |
|
|
236 | (1) |
|
Check Your Understanding - Syslog Operation - 10.5.6 |
|
|
237 | (1) |
|
Router and Switch File Maintenance - 10.6 |
|
|
237 | (11) |
|
Outer File Systems - 10.6.1 |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
Switch File Systems - 10.6.2 |
|
|
240 | (1) |
|
Use a Text File to Back Up a Configuration - 10.6.3 |
|
|
241 | (1) |
|
Use a Text File to Restore a Configuration - 10.6.4 |
|
|
241 | (1) |
|
Use TFTP to Back Up and Restore a Configuration - 10.6.5 |
|
|
242 | (1) |
|
Use TFTP to Back Up a Configuration |
|
|
242 | (1) |
|
Use TFTP to Restore a Configuration |
|
|
242 | (1) |
|
USB Ports on a Cisco Router - 10.6.6 |
|
|
242 | (1) |
|
Use USB to Back Up and Restore a Configuration - 10.6.7 |
|
|
243 | (2) |
|
Restore Configurations with a USB Flash Drive |
|
|
245 | (1) |
|
Password Recovery Procedures - 10.6.8 |
|
|
245 | (1) |
|
Password Recovery Example - 10.6.9 |
|
|
245 | (1) |
|
Step 1 Enter the ROMMON mode |
|
|
246 | (1) |
|
Step 2 Change the configuration register |
|
|
246 | (1) |
|
Step 3 Copy the startup-config to the running-con fig |
|
|
246 | (1) |
|
Step 4 Change the password |
|
|
247 | (1) |
|
Step 5 Save the running-config as the new startup-config |
|
|
247 | (1) |
|
|
247 | (1) |
|
Packet Tracer - Back Up Configuration Files - 10.6.10 |
|
|
247 | (1) |
|
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 |
|
|
248 | (1) |
|
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 |
|
|
248 | (1) |
|
Lab - Research Password Recovery Procedures - 10.6.13 |
|
|
248 | (1) |
|
IOS Image Management - 10.7 |
|
|
248 | (5) |
|
Video - Managing Cisco IOS Images - 10.7.1 |
|
|
248 | (1) |
|
TFTP Servers as a Backup Location - 10.7.2 |
|
|
248 | (1) |
|
Backup IOS Image to TFTP Server Example - 10.7.3 |
|
|
249 | (1) |
|
Step 1 Ping the TFTP server |
|
|
249 | (1) |
|
Step 2 Verify image size in flash |
|
|
249 | (1) |
|
Step 3 Copy the image to the TFTP server |
|
|
249 | (1) |
|
Copy an IOS Image to a Device Example - 10.7.4 |
|
|
250 | (1) |
|
Step 1 Ping the TFTP server |
|
|
250 | (1) |
|
Step 2 Verify the amount of free flash |
|
|
250 | (1) |
|
Step 3 Copy the new IOS image to flash |
|
|
251 | (1) |
|
The boot system Command - 10.7.5 |
|
|
251 | (1) |
|
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 |
|
|
252 | (1) |
|
Module Practice and Quiz - 10.8 |
|
|
253 | (4) |
|
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 |
|
|
253 | (1) |
|
Lab - Configure CDP, LLDP, and NTP - 10.8.2 |
|
|
253 | (1) |
|
What did I learn in this module? - 10.8.3 |
|
|
253 | (1) |
|
Device Discovery with CDP |
|
|
253 | (1) |
|
Device Discovery with LLDP |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
Router and Switch File Maintenance |
|
|
255 | (1) |
|
|
256 | (1) |
|
Chapter Quiz - Network Management |
|
|
257 | (1) |
|
|
257 | (2) |
|
Chapter 11 Network Design |
|
|
259 | (18) |
|
|
259 | (1) |
|
Why should I take this module? - 11.0.1 |
|
|
259 | (1) |
|
What will I learn to do in this module? - 11.0.2 |
|
|
259 | (1) |
|
Hierarchical Networks - 11.1 |
|
|
259 | (4) |
|
Video - Three-Layer Network Design - 11.1.1 |
|
|
259 | (1) |
|
The Need to Scale the Network - 11.1.2 |
|
|
259 | (1) |
|
Borderless Switched Networks - 11.1.3 |
|
|
260 | (1) |
|
Hierarchy in the Borderless Switched Network - 11.1.4 |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Access, Distribution, and Core Layer Functions - 11.1.5 |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
262 | (1) |
|
Three-Tier and Two-Tier Examples - 11.1.6 |
|
|
262 | (1) |
|
|
262 | (1) |
|
|
263 | (1) |
|
Role of Switched Networks - 11.1.7 |
|
|
263 | (1) |
|
Check Your Understanding - Hierarchical Networks - 11.1.8 |
|
|
263 | (1) |
|
|
263 | (3) |
|
Design for Scalability - 11.2.1 |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
Scalable Routing Protocol |
|
|
264 | (1) |
|
|
264 | (1) |
|
Plan for Redundancy - 11.2.2 |
|
|
264 | (1) |
|
Reduce Failure Domain Size - 11.2.3 |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
Increase Bandwidth - 11.2.4 |
|
|
265 | (1) |
|
Expand the Access Layer - 11.2.5 |
|
|
266 | (1) |
|
Tune Routing Protocols - 11.2.6 |
|
|
266 | (1) |
|
Check Your Understanding - Scalable Networks - 11.2.7 |
|
|
266 | (1) |
|
|
266 | (4) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Service Provider Switches |
|
|
267 | (1) |
|
|
267 | (1) |
|
Switch Form Factors - 11.3.2 |
|
|
267 | (1) |
|
Fixed configuration switches |
|
|
267 | (1) |
|
Modular configuration switches |
|
|
268 | (1) |
|
Stackable configuration switches |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
268 | (1) |
|
Forwarding Rates - 11.3.4 |
|
|
268 | (1) |
|
Power over Ethernet - 11.3.5 |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Multilayer Switching - 11.3.6 |
|
|
269 | (1) |
|
Business Considerations for Switch Selection - 11.3.7 |
|
|
270 | (1) |
|
Check Your Understanding - Switch Hardware - 11.3.8 |
|
|
270 | (1) |
|
|
270 | (2) |
|
Router Requirements - 11.4.1 |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
Router Form Factors - 11.4.3 |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
Check Your Understanding - Router Hardware - 11.4.4 |
|
|
272 | (1) |
|
Module Practice and Quiz - 11.5 |
|
|
272 | (3) |
|
Packet Tracer - Compare Layer 2 and Layer |
|
|
3 | (269) |
|
|
272 | (1) |
|
What did I learn in this module? - 11.5.2 |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Chapter Quiz - Network Design |
|
|
275 | (1) |
|
|
275 | (2) |
|
Chapter 12 Network Troubleshooting |
|
|
277 | (48) |
|
|
277 | (1) |
|
Why should I take this module? - 12.0.1 |
|
|
277 | (1) |
|
What will I learn to do in this module? - 12.0.2 |
|
|
277 | (1) |
|
Network Documentation - 12.1 |
|
|
277 | (5) |
|
Documentation Overview - 12.1.1 |
|
|
277 | (1) |
|
Network Topology Diagrams - 12.1.2 |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
Network Device Documentation - 12.1.3 |
|
|
279 | (1) |
|
Router Device Documentation |
|
|
279 | (1) |
|
LAN Switch Device Documentation |
|
|
279 | (1) |
|
End-system Documentation Files |
|
|
279 | (1) |
|
Establish a Network Baseline - 12.1.4 |
|
|
279 | (1) |
|
Step 1 - Determine What Types of Data to Collect - 12.1.5 |
|
|
280 | (1) |
|
Step 2 - Identify Devices and Ports of Interest - 12.1.6 |
|
|
280 | (1) |
|
Step 3 - Determine the Baseline Duration - 12.1.7 |
|
|
280 | (1) |
|
Data Measurement - 12.1.8 |
|
|
281 | (1) |
|
Check Your Understanding - Network Documentation - 12.1.9 |
|
|
282 | (1) |
|
Troubleshooting Process - 12.2 |
|
|
282 | (6) |
|
General Troubleshooting Procedures - 12.2.1 |
|
|
282 | (1) |
|
Seven-Step Troubleshooting Process - 12.2.2 |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
Eliminate Possible Causes |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Question End Users - 12.2.3 |
|
|
284 | (1) |
|
Gather Information - 12.2.4 |
|
|
285 | (1) |
|
Troubleshooting with Layered Models - 12.2.5 |
|
|
286 | (1) |
|
Structured Troubleshooting Methods - 12.2.6 |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
|
287 | (1) |
|
Guidelines for Selecting a Troubleshooting Method - 12.2.7 |
|
|
288 | (1) |
|
Check Your Understanding - Troubleshooting Process - 12.2.8 |
|
|
288 | (1) |
|
Troubleshooting Tools - 12.3 |
|
|
288 | (4) |
|
Software Troubleshooting Tools - 12.3.1 |
|
|
288 | (1) |
|
Network Management System Tools |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
Protocol Analyzers - 12.3.2 |
|
|
289 | (1) |
|
Hardware Troubleshooting Tools - 12.3.3 |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
289 | (1) |
|
|
290 | (1) |
|
Portable Network Analyzers |
|
|
290 | (1) |
|
|
290 | (1) |
|
Syslog Server as a Troubleshooting Tool - 12.3.4 |
|
|
290 | (2) |
|
Check Your Understanding - Troubleshooting Tools - 12.3.5 |
|
|
292 | (1) |
|
Symptoms and Causes of Network Problems - 12.4 |
|
|
292 | (8) |
|
Physical Layer Troubleshooting - 12.4.1 |
|
|
292 | (2) |
|
Data Link Layer Troubleshooting - 12.4.2 |
|
|
294 | (1) |
|
Network Layer Troubleshooting - 12.4.3 |
|
|
295 | (2) |
|
Transport Layer Troubleshooting - ACLs - 12.4.4 |
|
|
297 | (1) |
|
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 |
|
|
298 | (1) |
|
Application Layer Troubleshooting - 12.4.6 |
|
|
299 | (1) |
|
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 |
|
|
300 | (1) |
|
Troubleshooting IP Connectivity - 12.5 |
|
|
300 | (19) |
|
Components of Troubleshooting End-to-End Connectivity - 12.5.1 |
|
|
300 | (1) |
|
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Step 1 Verify the Physical Layer - 12.5.3 |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
304 | (1) |
|
Step 2 Check for Duplex Mismatches - 12.5.4 |
|
|
304 | (1) |
|
|
305 | (1) |
|
Step 3 Verify Addressing on the Local Network - 12.5.5 |
|
|
306 | (1) |
|
|
306 | (1) |
|
Windows IPv6 Neighbor Table |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
308 | (1) |
|
Troubleshoot VLAN Assignment Example - 12.5.6 |
|
|
308 | (1) |
|
|
309 | (1) |
|
Check the Switch MAC Table |
|
|
309 | (1) |
|
Correct the VLAN Assignment |
|
|
309 | (1) |
|
Step 4 Verify Default Gateway - 12.5.7 |
|
|
310 | (1) |
|
Troubleshooting IPv4 Default Gateway Example |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
Troubleshoot IPv6 Default Gateway Example - 12.5.8 |
|
|
311 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
Check R1 Interface Settings |
|
|
312 | (1) |
|
|
313 | (1) |
|
Verify PC1 Has an IPv6 Default Gateway |
|
|
313 | (1) |
|
Step 5 Verify Correct Path - 12.5.9 |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
Step 6 Verify the Transport Layer - 12.5.10 |
|
|
315 | (1) |
|
|
316 | (1) |
|
Step 7 Verify ACLs - 12.5.11 |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Step 8 Verify DNS - 12.5.12 |
|
|
318 | (1) |
|
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 |
|
|
319 | (1) |
|
Module Practice and Quiz - 12.6 |
|
|
319 | (5) |
|
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 |
|
|
319 | (1) |
|
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 |
|
|
319 | (1) |
|
What did I learn in this module? - 12.6.3 |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
Symptoms and Causes of Network Problems |
|
|
321 | (1) |
|
Troubleshooting IP Connectivity |
|
|
322 | (2) |
|
Chapter Quiz - Network Troubleshooting |
|
|
324 | (1) |
|
|
324 | (1) |
|
Chapter 13 Network Virtualization |
|
|
325 | (18) |
|
|
325 | (1) |
|
Why should I take this module? - 13.0.1 |
|
|
325 | (1) |
|
What will I learn to do in this module? - 13.0.2 |
|
|
325 | (1) |
|
|
325 | (2) |
|
Video - Cloud and Virtualization - 13.1.1 |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
Cloud Computing versus Data Center - 13.1.5 |
|
|
327 | (1) |
|
Check Your Understanding - Cloud Computing - 13.1.6 |
|
|
327 | (1) |
|
|
327 | (3) |
|
Cloud Computing and Virtualization - 13.2.1 |
|
|
327 | (1) |
|
Dedicated Servers - 13.2.2 |
|
|
328 | (1) |
|
Server Virtualization - 13.2.3 |
|
|
328 | (1) |
|
Advantages of Virtualization - 13.2.4 |
|
|
328 | (1) |
|
Abstraction Layers - 13.2.5 |
|
|
329 | (1) |
|
Type 2 Hypervisors - 13.2.6 |
|
|
330 | (1) |
|
Check Your Understanding - Virtualization - 13.2.7 |
|
|
330 | (1) |
|
Virtual Network Infrastructure - 13.3 |
|
|
330 | (2) |
|
Type 1 Hypervisors - 13.3.1 |
|
|
330 | (1) |
|
Installing a VM on a Hypervisor - 13.3.2 |
|
|
330 | (1) |
|
The Complexity of Network Virtualization - 13.3.3 |
|
|
331 | (1) |
|
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 |
|
|
332 | (1) |
|
Software-Defined Networking - 13.4 |
|
|
332 | (2) |
|
Video - Software-Defined Networking - 13.4.1 |
|
|
332 | (1) |
|
Control Plane and Data Plane - 13.4.2 |
|
|
332 | (1) |
|
|
332 | (1) |
|
SDN and Central Controller |
|
|
333 | (1) |
|
|
333 | (1) |
|
Network Virtualization Technologies - 13.4.3 |
|
|
333 | (1) |
|
Traditional and SDN Architectures - 13.4.4 |
|
|
334 | (1) |
|
Check Your Understanding - Software-Defined Networking - 13.4.5 |
|
|
334 | (1) |
|
|
334 | (3) |
|
SDN Controller and Operations - 13.5.1 |
|
|
334 | (1) |
|
Video - Cisco ACI - 13.5.2 |
|
|
335 | (1) |
|
Core Components of ACI - 13.5.3 |
|
|
335 | (1) |
|
Spine-Leaf Topology - 13.5.4 |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
APIC-EM Features - 13.5.6 |
|
|
336 | (1) |
|
APIC-EM Path Trace - 13.5.7 |
|
|
336 | (1) |
|
Check Your Understanding - Controllers - 13.5.8 |
|
|
337 | (1) |
|
Module Practice and Quiz - 13.6 |
|
|
337 | (4) |
|
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 |
|
|
337 | (1) |
|
What did I learn in this module? - 13.6.2 |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (1) |
|
Virtual Network Infrastructure |
|
|
338 | (1) |
|
Software-Defined Networking |
|
|
338 | (1) |
|
|
339 | (2) |
|
Chapter Quiz - Network Virtualization |
|
|
341 | (1) |
|
|
341 | (2) |
|
Chapter 14 Network Automation |
|
|
343 | (24) |
|
|
343 | (1) |
|
Why should I take this module? - 14.0.1 |
|
|
343 | (1) |
|
What will I learn in this module? - 14.0.2 |
|
|
343 | (1) |
|
Automation Overview - 14.1 |
|
|
343 | (1) |
|
Video - Automation Everywhere - 14.1.1 |
|
|
343 | (1) |
|
The Increase in Automation - 14.1.2 |
|
|
344 | (1) |
|
Thinking Devices - 14.1.3 |
|
|
344 | (1) |
|
Check Your Understanding - Benefits of Automation - 14.1.4 |
|
|
344 | (1) |
|
|
344 | (7) |
|
Video - Data Formats - 14.2.1 |
|
|
344 | (1) |
|
The Data Formats Concept - 14.2.2 |
|
|
345 | (1) |
|
Data Format Rules - 14.2.3 |
|
|
345 | (1) |
|
Compare Data Formats - 14.2.4 |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
JSON Data Format - 14.2.5 |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
347 | (1) |
|
JSON Syntax Rules - 14.2.6 |
|
|
348 | (1) |
|
JSON List of IPv4 Addresses |
|
|
348 | (1) |
|
YAML Data Format - 14.2.7 |
|
|
349 | (1) |
|
JSON for GigabitEthernet2 |
|
|
349 | (1) |
|
YAML for GigabitEthernet2 |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
Check Your Understanding - Data Formats - 14.2.9 |
|
|
351 | (1) |
|
|
351 | (3) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
Open, Internal, and Partner APIs - 14.3.4 |
|
|
352 | (1) |
|
Types of Web Service APIs - 14.3.5 |
|
|
353 | (1) |
|
Check Your Understanding - APIs - 14.3.6 |
|
|
354 | (1) |
|
|
354 | (3) |
|
|
354 | (1) |
|
REST and RESTful API - 14.4.2 |
|
|
354 | (1) |
|
REST ful Implementation - 14.4.3 |
|
|
354 | (1) |
|
URI, URN, and URL - 14.4.4 |
|
|
355 | (1) |
|
Anatomy of a RESTful Request - 14.4.5 |
|
|
355 | (1) |
|
RESTful API Applications - 14.4.6 |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Network Operating Systems |
|
|
357 | (1) |
|
Check Your Understanding - REST - 14.4.7 |
|
|
357 | (1) |
|
Configuration Management Tools - 14.5 |
|
|
357 | (3) |
|
Video - Configuration Management Tools - 14.5.1 |
|
|
357 | (1) |
|
Traditional Network Configuration - 14.5.2 |
|
|
358 | (1) |
|
Network Automation - 14.5.3 |
|
|
358 | (1) |
|
Configuration Management Tools - 14.5.4 |
|
|
358 | (1) |
|
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 |
|
|
359 | (1) |
|
Check Your Understanding - Configuration Management - 14.5.6 |
|
|
360 | (1) |
|
IBN and Cisco DNA Center - 14.6 |
|
|
360 | (3) |
|
Video - Intent-Based Networking - 14.6.1 |
|
|
360 | (1) |
|
Intent-Based Networking Overview - 14.6.2 |
|
|
360 | (1) |
|
Network Infrastructure as Fabric - 14.6.3 |
|
|
360 | (1) |
|
Cisco Digital Network Architecture (DNA) - 14.6.4 |
|
|
361 | (1) |
|
Cisco DNA Center - 14.6.5 |
|
|
362 | (1) |
|
Video - DNA Center Overview and Platform APIs - 14.6.6 |
|
|
362 | (1) |
|
Video - DNA Center Design and Provision - 14.6.7 |
|
|
363 | (1) |
|
Video - DNA Center Policy and Assurance - 14.6.8 |
|
|
363 | (1) |
|
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 |
|
|
363 | (1) |
|
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 |
|
|
363 | (1) |
|
Module Practice and Quiz - 14.7 |
|
|
363 | (2) |
|
What did I learn in this module? - 14.7.1 |
|
|
363 | (2) |
|
Chapter Quiz - Network Automation |
|
|
365 | (1) |
|
|
365 | (2) |
Index |
|
367 | |