Muutke küpsiste eelistusi

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7) [Pehme köide]

  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 862 g
  • Sari: Course Booklets
  • Ilmumisaeg: 25-Sep-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0136634737
  • ISBN-13: 9780136634737
  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 862 g
  • Sari: Course Booklets
  • Ilmumisaeg: 25-Sep-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0136634737
  • ISBN-13: 9780136634737
Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section. Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes.

The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy Enterprise Networking, Security, and Automation v7.0 (ENSA) online course.

This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.

Related titles: 

CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709

Enterprise Networking, Security, and Automation Companion Guide CCNAv7

Book: 9780136634324 eBook: 9780136634249

Enterprise Networking, Security, and Automation Labs & Study Guide CCNAv7 Book: 9780136634690
Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts
1(14)
Introduction - 1.0
1(1)
Why should I take this module? - 1.0.1
1(1)
What will I learn to do in this module? - 1.0.2
1(1)
OSPF Features and Characteristics - 1.1
1(5)
Introduction to OSPF - 1.1.1
1(1)
Components of OSPF - 1.1.2
2(1)
Routing Protocol Messages
2(1)
Data Structures
2(1)
Algorithm
3(1)
Link-State Operation - 1.1.3
3(1)
1 Establish Neighbor Adjacencies
3(1)
2 Exchange Link-State Advertisements
3(1)
3 Build the Link State Database
3(1)
4 Execute the SPF Algorithm
4(1)
5 Choose the Best Route
4(1)
Single-Area and Multiarea OSPF - 1.1.4
4(1)
Single-Area OSPF
4(1)
Multiarea OSPF
4(1)
Multiarea OSPF - 1.1.5
4(1)
OSPFv3-1.1.6
5(1)
Check Your Understanding - OSPF Features and Characteristics - 1.1.7
6(1)
OSPF Packets-1.2
6(1)
Video - OSPF Packets - 1.2.1
6(1)
Types of OSPF Packets - 1.2.2
6(1)
Link-State Updates - 1.2.3
7(1)
Hello Packet - 1.2.4
7(1)
Check Your Understanding - OSPF Packets - 1.2.5
7(1)
OSPF Operation - 1.3
7(4)
Video - OSPF Operation - 1.3.1
7(1)
OSPF Operational States - 1.3.2
7(1)
Establish Neighbor Adjacencies - 1.3.3
8(1)
1 Down State to Init State
8(1)
2 The Init State
9(1)
3 Two-Way State
9(1)
4 Elect the DR and BDR
9(1)
Synchronizing OSPF Databases - 1.3.4
9(1)
1 Decide First Router
9(1)
2 Exchange DBDs
10(1)
3 Send an LSR
10(1)
The Need for a DR - 1.3.5
10(1)
LSA Flooding With a DR - 1.3.6
11(1)
Flooding LSAs
11(1)
LSAs and DR
11(1)
Check Your Understanding - OPSF Operation - 1.3.7
11(1)
Module Practice and Quiz - 1.4
11(3)
What did I learn in this module? - 1.4.1
11(1)
OSPF Features and Characteristics
11(1)
OSPF Packets
12(1)
OSPF Operation
13(1)
Chapter Quiz - Single-Area OSPFv2 Concepts
14(1)
Your
Chapter Notes
14(1)
Chapter 2 Single-Area OSPFv2 Configuration
15(42)
Introduction - 2.0
15(1)
Why should I take this module? - 2.0.1
15(1)
What will I learn to do in this module? - 2.0.2
15(1)
OSPF Router ID - 2.1
15(5)
OSPF Reference Topology - 2.1.1
15(1)
Router Configuration Mode for OSPF - 2.1.2
16(1)
Router IDs - 2.1.3
16(1)
Router ID Order of Precedence - 2.1.4
17(1)
Configure a Loopback Interface as the Router ID - 2.1.5
17(1)
Explicitly Configure a Router ID - 2.1.6
18(1)
Modify a Router ID - 2.1.7
18(1)
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8
19(1)
Check Your Understanding - OSPF Router ID - 2.1.9
19(1)
Point-to-Point OSPF Networks - 2.2
20(7)
The network Command Syntax - 2.2.1
20(1)
The Wildcard Mask - 2.2.2
20(1)
Check Your Understanding - The Wildcard Masks - 2.2.3
20(1)
Configure OSPF Using the network Command - 2.2.4
20(1)
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5
21(1)
Configure OSPF Using the ip ospf Command - 2.2.6
21(1)
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7
22(1)
Passive Interface - 2.2.8
22(1)
Configure Passive Interfaces - 2.2.9
23(1)
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10
24(1)
OSPF Point-to-Point Networks - 2.2.11
24(2)
Loopbacks and Point-to-Point Networks - 2.2.12
26(1)
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13
26(1)
Multiaccess OSPF Networks - 2.3
27(9)
OSPF Network Types - 2.3.1
27(1)
OSPF Designated Router - 2.3.2
27(1)
OSPF Multiaccess Reference Topology - 2.3.3
27(1)
Verify OSPF Router Roles - 2.3.4
28(1)
R1 DROTHER
28(1)
R2 BDR
29(1)
R3 DR
29(1)
Verify DR/BDR Adjacencies - 2.3.5
30(1)
R1 Adjacencies
31(1)
R2 Adjacencies
31(1)
R3 Adjacencies
32(1)
Default DR/BDR Election Process - 2.3.6
32(1)
DR Failure and Recovery - 2.3.7
33(1)
R3 Fails
33(1)
R3 Re-joins Network
33(1)
R4 Joins Network
33(1)
R2 Fails
33(1)
The ip ospf priority Command - 2.3.8
33(1)
Configure OSPF Priority - 2.3.9
34(1)
Syntax Checker - Configure OSPF Priority - 2.3.10
35(1)
Packet Tracer - Determine the DR and BDR - 2.3.11
35(1)
Modify Single-Area OSPFv2 - 2.4
36(7)
Cisco OSPF Cost Metric - 2.4.1
36(1)
Adjust the Reference Bandwidth - 2.4.2
36(2)
OSPF Accumulates Costs - 2.4.3
38(1)
Manually Set OSPF Cost Value - 2.4.4
38(1)
Test Failover to Backup Route - 2.4.5
39(1)
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6
40(1)
Hello Packet Intervals - 2.4.7
40(1)
Verify Hello and Dead Intervals - 2.4.8
40(2)
Modify OSPFv2 Intervals - 2.4.9
42(1)
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10
43(1)
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11
43(1)
Default Route Propagation - 2.5
43(3)
Propagate a Default Static Route in OSPFv2 - 2.5.1
43(1)
Verify the Propagated Default Route - 2.5.2
44(1)
R2 Routing Table
45(1)
R1 Routing Table
45(1)
R3 Routing Table
46(1)
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3
46(1)
Verify Single-Area OSPFv2 - 2.6
46(5)
Verify OSPF Neighbors - 2.6.1
46(2)
Verify OSPF Protocol Settings - 2.6.2
48(1)
Verify OSPF Process Information - 2.6.3
48(2)
Verify OSPF Interface Settings - 2.6.4
50(1)
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5
51(1)
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6
51(1)
Module Practice and Quiz - 2.7
51(5)
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1
51(1)
Lab - Single-Area OSPFv2 Configuration - 2.7.2
51(1)
What did I learn in this module? - 2.7.3
52(1)
OSPF Router ID
52(1)
Point-to-Point OSPF Networks
52(1)
OSPF Network Types
53(1)
Modify Single-Area OSPFv2
54(1)
Default Route Propagation
54(1)
Verify Single-Area OSPFv2
54(2)
Chapter Quiz - Single-Area OSPFv2 Configuration
56(1)
Your
Chapter Notes
56(1)
Chapter 3 Network Security Concepts
57(36)
Introduction - 3.0
57(1)
Why should I take this module? - 3.0.1
57(1)
What will I learn in this module? - 3.0.2
57(1)
Ethical Hacking Statement - 3.0.3
57(1)
Current State of Cybersecurity - 3.1
58(2)
Current State of Affairs - 3.1.1
58(1)
Vectors of Network Attacks - 3.1.2
58(1)
Data Loss - 3.1.3
59(1)
Check Your Understanding - Current State of Cybersecurity - 3.1.4
60(1)
Threat Actors - 3.2
60(2)
The Hacker - 3.2.1
60(1)
Evolution of Hackers - 3.2.2
61(1)
Cyber Criminals - 3.2.3
61(1)
Hacktivists - 3.2.4
61(1)
State-Sponsored Hackers - 3.2.5
61(1)
Check Your Understanding - Threat Actors - 3.2.6
62(1)
Threat Actor Tools - 3.3
62(2)
Video - Threat Actor Tools - 3.3.1
62(1)
Introduction to Attack Tools - 3.3.2
62(1)
Evolution of Security Tools - 3.3.3
62(1)
Attack Types - 3.3.4
63(1)
Check Your Understanding - Threat Actor Tools - 3.3.5
64(1)
Malware - 3.4
64(2)
Overview of Malware - 3.4.1
64(1)
Viruses and Trojan Horses - 3.4.2
64(1)
Other Types of Malware - 3.4.3
65(1)
Check Your Understanding - Malware - 3.4.4
66(1)
Common Network Attacks - 3.5
66(5)
Overview of Network Attacks - 3.5.1
66(1)
Video - Reconnaissance Attacks - 3.5.2
67(1)
Reconnaissance Attacks - 3.5.3
67(1)
Internet Information Queries
67(1)
Performing Ping Sweeps
67(1)
Performing Port Scans
68(1)
Video - Access and Social Engineering Attacks - 3.5.4
68(1)
Access Attacks - 3.5.5
68(1)
Password Attacks
68(1)
Spoofing Attacks
68(1)
Trust Exploitation Example
68(1)
Port Redirection Example
68(1)
Man-in-the-Middle Attack Example
69(1)
Buffer Overflow Attack
69(1)
Social Engineering Attacks - 3.5.6
69(1)
Lab - Social Engineering - 3.5.7
70(1)
Video - Denial of Service Attacks - 3.5.8
70(1)
DoS and DDoS Attacks - 3.5.9
70(1)
DoS Attack
70(1)
DDoS Attack
70(1)
Check Your Understanding - Common Network Attacks - 3.5.10
71(1)
IP Vulnerabilities and Threats - 3.6
71(2)
Video - Common IP and ICMP Attacks - 3.6.1
71(1)
IPv4 and IPv6 - 3.6.2
71(1)
ICMP Attacks - 3.6.3
71(1)
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4
72(1)
Amplification and Reflection Attacks - 3.6.5
72(1)
Address Spoofing Attacks - 3.6.6
72(1)
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7
73(1)
TCP and UDP Vulnerabilities - 3.7
73(2)
TCP Segment Header - 3.7.1
73(1)
TCP Services - 3.7.2
73(1)
TCP Attacks - 3.7.3
74(1)
TCP SYN Flood Attack
74(1)
CP Reset Attack
74(1)
TCP Session Hijacking
74(1)
UDP Segment Header and Operation - 3.7.4
74(1)
UDP Attacks - 3.7.5
75(1)
UDP Flood Attacks
75(1)
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6
75(1)
IP Services - 3.8
75(5)
ARP Vulnerabilities - 3.8.1
75(1)
ARP Cache Poisoning - 3.8.2
76(1)
ARP Request
76(1)
ARP Reply
76(1)
Spoofed Gratuitous ARP Replies
76(1)
Video - ARP Spoofing - 3.8.3
76(1)
DNS Attacks - 3.8.4
76(1)
DNS Open Resolver Attacks
77(1)
DNS Stealth Attacks
77(1)
DNS Domain Shadowing Attacks
78(1)
DNS Tunneling - 3.8.5
78(1)
DHCP - 3.8.6
78(1)
DHCP Attacks - 3.8.7
78(1)
DHCP Spoofing Attack
78(1)
1 Client Broadcasts DHCP Discovery Messages
79(1)
2 DHCP Servers Respond with Offers
79(1)
3 Client Accepts Rogue DHCP Request
79(1)
4 Rogue DHCP Acknowledges the Request
79(1)
Lab - Explore DNS Traffic - 3.8.8
79(1)
Network Security Best Practices - 3.9
80(2)
Confidentiality, Integrity, and Availability - 3.9.1
80(1)
The Defense-in-Depth Approach - 3.9.2
80(1)
Firewalls - 3.9.3
80(1)
IPS-3.9.4
81(1)
Content Security Appliances - 3.9.5
81(1)
Cisco Email Security Appliance (ESA)
82(1)
Cisco Web Security Appliance (WSA)
82(1)
Check Your Understanding - Network Security Best Practices - 3.9.6
82(1)
Cryptography - 3.10
82(6)
Video - Cryptography - 3.10.1
82(1)
Securing Communications - 3.10.2
82(1)
Data Integrity - 3.10.3
83(1)
Hash Functions - 3.10.4
83(1)
MD5 with 128-bit Digest
83(1)
SHA Hashing Algorithm
83(1)
SHA-2
83(1)
Origin Authentication - 3.10.5
84(1)
HMAC Hashing Algorithm
84(1)
Creating the HMAC Value
84(1)
Verifying the HMAC Value
84(1)
Cisco Router HMAC Example
84(1)
Data Confidentiality - 3.10.6
85(1)
Symmetric Encryption - 3.10.7
85(1)
Asymmetric Encryption - 3.10.8
86(1)
Diffie-Hellman - 3.10.9
87(1)
Check Your Understanding - Cryptography - 3.10.10
88(1)
Module Practice and Quiz - 3.11
88(3)
What did I learn in this module? - 3.1 U
88(3)
Chapter Quiz - Network Security Concepts
91(1)
Your
Chapter Notes
91(2)
Chapter 4 ACL Concepts
93(14)
Introduction - 4.0
93(1)
Why should I take this module? - 4.0.1
93(1)
What will I learn to do in this module? - 4.0.2
93(1)
Purpose of ACLs - 4.1
93(3)
What is an ACL? - 4.1.1
93(2)
Packet Filtering - 4.1.2
95(1)
ACL Operation - 4.1.3
95(1)
Packet Tracer - ACL Demonstration - 4.1.4
96(1)
Check Your Understanding - Purpose of ACLs - 4.1.5
96(1)
Wildcard Masks in ACLs - 4.2
96(3)
Wildcard Mask Overview - 4.2.1
96(1)
Wildcard Mask Types - 4.2.2
97(1)
Wildcard to Match a Host
97(1)
Wildcard Mask to Match an IPv4 Subnet
97(1)
Wildcard Mask to Match an IPv4 Address Range
97(1)
Wildcard Mask Calculation - 4.2.3
97(1)
Example 1
98(1)
Example 2
98(1)
Example 3
98(1)
Example 4
98(1)
Wildcard Mask Keywords - 4.2.4
98(1)
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5
99(1)
Guidelines for ACL Creation - 4.3
99(1)
Limited Number of ACLs per Interface - 4.3.1
99(1)
ACL Best Practices - 4.3.2
99(1)
Check Your Understanding - Guidelines for ACL Creation - 4.3.3
100(1)
Types of IPv4 ACLs - 4.4
100(3)
Standard and Extended ACLs - 4.4.1
100(1)
Numbered and Named ACLs - 4.4.2
101(1)
Numbered ACLs
101(1)
Named ACLs
101(1)
Where to Place ACLs - 4.4.3
102(1)
Standard ACL Placement Example - 4.4.4
102(1)
Extended ACL Placement Example - 4.4.5
103(1)
Check Your Understanding - Guidelines for ACL Placement - 4.4.6
103(1)
Module Practice and Quiz - 4.5
103(3)
What did I learn in this module? - 4.5.1
103(1)
Purpose of ACLs
103(1)
Wildcard Masks
104(1)
Guidelines for ACL creation
104(2)
Types of IPv4 ACLs
106(1)
Chapter Quiz - ACL Concepts
106(1)
Your
Chapter Notes
106(1)
Chapter 5 ACLs for IPv4 Configuration
107(28)
Introduction - 5.0
107(1)
Why should I take this module? - 5.0.1
107(1)
What will I learn to do in this module? - 5.0.2
107(1)
Configure Standard IPv4 ACLs - 5.1
107(6)
Create an ACL - 5.1.1
107(1)
Numbered Standard IPv4 ACL Syntax - 5.1.2
108(1)
Named Standard IPv4 ACL Syntax - 5.1.3
109(1)
Apply a Standard IPv4 ACL - 5.1.4
109(1)
Numbered Standard IPv4 ACL Example - 5.1.5
110(1)
Named Standard IPv4 ACL Example - 5.1.6
111(1)
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7
112(1)
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8
113(1)
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9
113(1)
Modify IPv4 ACLs - 5.2
113(3)
Two Methods to Modify an ACL - 5.2.1
113(1)
Text Editor Method - 5.2.2
113(1)
Sequence Numbers Method - 5.2.3
114(1)
Modify a Named ACL Example - 5.2.4
115(1)
ACL Statistics - 5.2.5
116(1)
Syntax Checker - Modify IPv4 ACLs - 5.2.6
116(1)
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7
116(1)
Secure VTY Ports with a Standard IPv4 ACL - 5.3
116(3)
The access-class Command - 5.3.1
116(1)
Secure VTY Access Example - 5.3.2
117(1)
Verify the VTY Port is Secured - 5.3.3
118(1)
Syntax Checker - Secure the VTY Ports - 5.3.4
118(1)
Configure Extended IPv4 ACLs - 5.4
119(11)
Extended ACLs - 5.4.1
119(1)
Numbered Extended IPv4 ACL Syntax - 5.4.2
119(1)
Protocols and Ports - 5.4.3
120(1)
Protocol Options
121(1)
Port Keyword Options
121(2)
Protocols and Port Numbers Configuration Examples - 5.4.4
123(1)
Apply a Numbered Extended IPv4 ACL - 5.4.5
123(1)
TCP Established Extended ACL - 5.4.6
123(1)
Named Extended IPv4 ACL Syntax - 5.4.7
124(1)
Named Extended IPv4 ACL Example - 5.4.8
125(1)
Edit Extended ACLs - 5.4.9
126(1)
Another Named Extended IPv4 ACL Example - 5.4.10
127(1)
Verify Extended ACLs - 5.4.11
128(1)
Show ip interface
128(1)
Show access-lists
129(1)
Show running-config
130(1)
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12
130(1)
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13
130(1)
Module Practice and Quiz - 5.5
130(3)
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1
130(1)
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2
131(1)
What did I learn in this module? - 5.5.3
131(1)
Configure Standard IPv4 ACLs
131(1)
Modify IPv4 ACLs
131(1)
Secure VTY Ports with a Standard IPv4 ACL
131(1)
Configure Extended IPv4 ACLs
132(1)
Chapter Quiz - ACLs for IPv4 Implementation
133(1)
Your
Chapter Notes
133(2)
Chapter 6 NAT for IPv4
135(24)
Introduction - 6.0
135(1)
Why should I take this module? - 6.0.1
135(1)
What will I learn to do in this module? - 6.0.2
135(1)
NAT Characteristics - 6.1
135(4)
IPv4 Private Address Space - 6.1.1
135(1)
Private Internet Addresses are Defined in RFC 1918
136(1)
What is NAT - 6.1.2
136(1)
How NAT Works - 6.1.3
137(1)
NAT Terminology - 6.1.4
137(1)
Inside Local
138(1)
Inside Global
138(1)
Outside Global
138(1)
Outside Local
138(1)
Check Your Understanding - NAT Characteristics - 6.1.5
138(1)
Types of NAT - 6.2
139(3)
Static NAT - 6.2.1
139(1)
Dynamic NAT - 6.2.2
139(1)
Port Address Translation - 6.2.3
139(1)
Next Available Port - 6.2.4
140(1)
NAT and PAT Comparison - 6.2.5
140(1)
NAT
141(1)
PAT
141(1)
Packets without a Layer 4 Segment - 6.2.6
141(1)
Packet Tracer - Investigate NAT Operations - 6.2.7
141(1)
NAT Advantages and Disadvantages - 6.3
142(1)
Advantages of NAT - 6.3.1
142(1)
Disadvantages of NAT - 6.3.2
142(1)
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3
143(1)
Static NAT - 6.4
143(3)
Static NAT Scenario - 6.4.1
143(1)
Configure Static NAT - 6.4.2
143(1)
Analyze Static NAT - 6.4.3
144(1)
Verify Static NAT - 6.4.4
144(1)
Packet Tracer - Configure Static NAT - 6.4.5
145(1)
Dynamic NAT - 6.5
146(4)
Dynamic NAT Scenario - 6.5.1
146(1)
Configure Dynamic NAT - 6.5.2
146(1)
Step 1
146(1)
Step 2
147(1)
Step 3
147(1)
Step 4
147(1)
Step 5
147(1)
Analyze Dynamic NAT - Inside to Outside - 6.5.3
147(1)
Analyze Dynamic NAT - Outside to Inside - 6.5.4
147(1)
Verify Dynamic NAT - 6.5.5
148(2)
Packet Tracer - Configure Dynamic NAT - 6.5.6
150(1)
PAT-6.6
150(3)
PAT Scenario - 6.6.1
150(1)
Configure PAT to Use a Single IPv4 Address - 6.6.2
150(1)
Configure PAT to Use an Address Pool - 6.6.3
151(1)
Analyze PAT - PC to Server - 6.6.4
151(1)
Analyze PAT - Server to PC - 6.6.5
151(1)
Verify PAT - 6.6.6
151(1)
Packet Tracer - Configure PAT - 6.6.7
152(1)
NAT64-6.7
153(1)
NAT for IPv6? - 6.7.1
153(1)
NAT64 - 6.7.2
153(1)
Module Practice and Quiz - 6.8
153(5)
Packet Tracer - Configure NAT for IPv4 - 6.8.1
153(1)
Lab - Configure NAT for IPv4 - 6.8.2
154(1)
What did I learn in this module? - 6.8.3
154(1)
NAT Characteristics
154(1)
Types of NAT
154(1)
NAT Advantages and Disadvantages
155(1)
Static NAT
155(1)
Dynamic NAT
155(1)
PAT
156(1)
NAT64
156(2)
Chapter Quiz - NAT for IPv4
158(1)
Your
Chapter Notes
158(1)
Chapter 7 WAN Concepts
159(26)
Introduction - 7.0
159(1)
Why should I take this module? - 7.0.1
159(1)
What will I learn to do in this module? - 7.0.2
159(1)
Purpose of WANs - 7.1
159(5)
LANs and WANs - 7.1.1
159(1)
Private and Public WANs - 7.1.2
160(1)
WAN Topologies - 7.1.3
160(1)
Point-to-Point Topology
161(1)
Hub-and-Spoke Topology
161(1)
Dual-homed Topology
161(1)
Fully Meshed Topology
162(1)
Partially Meshed Topology
162(1)
Carrier Connections - 7.1.4
162(1)
Single-Carrier WAN Connection
162(1)
Dual-Carrier WAN Connection
162(1)
Evolving Networks - 7.1.5
162(1)
Small Network
163(1)
Campus Network
163(1)
Branch Network
163(1)
Distributed Network
163(1)
Check Your Understanding - Purpose of WANs - 7.1.6
164(1)
WAN Operations - 7.2
164(5)
WAN Standards - 7.2.1
164(1)
WANs in the OSI Model - 7.2.2
164(1)
Layer 1 Protocols
164(1)
Layer 2 Protocols
165(1)
Common WAN Terminology - 7.2.3
165(1)
WAN Devices - 7.2.4
166(1)
Serial Communication - 7.2.5
167(1)
Circuit-Switched Communication - 7.2.6
168(1)
Packet-Switched Communications - 7.2.7
168(1)
SDH, SONET, and DWDM - 7.2.8
169(1)
Check Your Understanding - WAN Operations - 7.2.9
169(1)
Traditional WAN Connectivity - 7.3
169(3)
Traditional WAN Connectivity Options - 7.3.1
169(1)
Common WAN Terminology - 7.3.2
169(1)
Circuit-Switched Options - 7.3.3
170(1)
Public Service Telephone Network (PSTN)
171(1)
Integrated Services Digital Network (ISDN)
171(1)
Packet-Switched Options - 7.3.4
171(1)
Frame Relay
171(1)
Asynchronous Transfer Mode (ATM)
171(1)
Check Your Understanding - Traditional WAN Connectivity - 7.3.5
172(1)
Modern WAN Connectivity - 7.4
172(2)
Modern WANs - 7.4.1
172(1)
Modern WAN Connectivity Options - 7.4.2
172(1)
Dedicated Broadband
172(1)
Packet-Switched
172(1)
Internet-based Broadband
173(1)
Ethernet WAN - 7.4.3
173(1)
MPLS - 7.4.4
174(1)
Check Your Understanding - Modern WAN Connectivity - 7.4.5
174(1)
Internet-Based Connectivity - 7.5
174(7)
Internet-Based Connectivity Options - 7.5.1
174(1)
Wired options
174(1)
Wireless options
175(1)
DSL Technology - 7.5.2
175(1)
DSL Connections - 7.5.3
175(1)
DSL and PPP - 7.5.4
176(1)
Host with PPPoE Client
176(1)
Router PPPoE Client
176(1)
Cable Technology - 7.5.5
176(1)
Optical Fiber - 7.5.6
177(1)
Wireless Internet-Based Broadband - 7.5.7
177(1)
Municipal Wi-Fi
177(1)
Cellular
178(1)
Satellite Internet
178(1)
WiMAX
178(1)
VPN Technology - 7.5.8
179(1)
ISP Connectivity Options - 7.5.9
179(1)
Single-homed
180(1)
Dual-homed
180(1)
Multihomed
180(1)
Dual-multihomed
180(1)
Broadband Solution Comparison - 7.5.10
180(1)
Lab - Research Broadband Internet Access Options - 7.5.11
181(1)
Module Practice and Quiz - 7.6
181(3)
Packet Tracer - WAN Concepts - 7.6.1
181(1)
What did I learn in this module? - 7.6.2
181(1)
Purpose of WANs
181(1)
WAN Operations
181(1)
Traditional WAN Connectivity
182(1)
Modern WAN Connectivity
182(1)
Internet-Based Connectivity
183(1)
Chapter Quiz - WAN Concepts
184(1)
Your
Chapter Notes
184(1)
Chapter 8 VPN and IPsec Concepts
185(12)
Introduction - 8.0
185(1)
Why should I take this module? - 8.0.1
185(1)
What will I learn in this module? - 8.0.2
185(1)
VPN Technology - 8.1
185(1)
Virtual Private Networks - 8.1.1
185(1)
VPN Benefits - 8.1.2
186(1)
Site-to-Site and Remote-Access VPNs - 8.1.3
186(1)
Site-to-Site VPN
186(1)
Remote-Access VPN
186(1)
Enterprise and Service Provider VPNs - 8.1.4
186(1)
Check Your Understanding - VPN Technology - 8.1.5
187(1)
Types of VPNs-8.2
187(3)
Remote-Access VPNs - 8.2.1
187(1)
SSL VPNs - 8.2.2
187(1)
Site-to-Site IPsec VPNs - 8.2.3
188(1)
GRE over IPsec - 8.2.4
188(1)
Dynamic Multipoint VPNs - 8.2.5
189(1)
IPsec Virtual Tunnel Interface - 8.2.6
189(1)
Service Provider MPLS VPNs - 8.2.7
190(1)
Check Your Understanding - Types of VPNs - 8.2.8
190(1)
IPsec-8.3
190(3)
Video - IPsec Concepts - 8.3.1
190(1)
IPsec Technologies - 8.3.2
190(1)
IPsec Protocol Encapsulation - 8.3.3
191(1)
Confidentiality - 8.3.4
192(1)
Integrity - 8.3.5
192(1)
Authentication - 8.3.6
192(1)
Secure Key Exchange with Diffie-Hellman - 8.3.7
193(1)
Video - IPsec Transport and Tunnel Mode - 8.3.8
193(1)
Check Your Understanding - IPsec - 8.3.9
193(1)
Module Practice and Quiz - 8.4
193(2)
What did I learn in this module? - 8.4.1
193(2)
Chapter Quiz - VPN and IPsec Concepts
195(1)
Your
Chapter Notes
195(2)
Chapter 9 QoS Concepts
197(20)
Introduction - 9.0
197(1)
Why should I take this module? - 9.0.1
197(1)
What will I learn to do in this module? - 9.0.2
197(1)
Network Transmission Quality - 9.1
197(2)
Video Tutorial - The Purpose of QoS - 9.1.1
197(1)
Prioritizing Traffic - 9.1.2
197(1)
Bandwidth, Congestion, Delay, and Jitter - 9.1.3
198(1)
Sources of Delay
198(1)
Packet Loss - 9.1.4
199(1)
Check Your Understanding - Network Transmission Quality - 9.1.5
199(1)
Traffic Characteristics - 9.2
199(3)
Video Tutorial - Traffic Characteristics - 9.2.1
199(1)
Network Traffic Trends - 9.2.2
199(1)
Voice - 9.2.3
200(1)
Video-9.2.4
200(1)
Data - 9.2.5
201(1)
Factors to Consider for Data Delay
202(1)
Check Your Understanding - Traffic Characteristics - 9.2.6
202(1)
Queuing Algorithms - 9.3
202(2)
Video Tutorial - QoS Algorithms - 9.3.1
202(1)
Queuing Overview - 9.3.2
202(1)
First In First Out - 9.3.3
202(1)
Weighted Fair Queuing (WFQ) - 9.3.4
203(1)
Limitations
203(1)
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5
203(1)
Low Latency Queuing (LLQ) - 9.3.6
204(1)
Check Your Understanding - Queuing Algorithms - 9.3.7
204(1)
QoS Models - 9.4
204(4)
Video Tutorial - QoS Models - 9.4.1
204(1)
Selecting an Appropriate QoS Policy Model - 9.4.2
204(1)
Models for Implementing QoS
205(1)
Best Effort - 9.4.3
205(1)
Benefits and Drawbacks of Best-Effort Model
205(1)
Integrated Services - 9.4.4
206(1)
Benefits and Drawbacks of IntServ Model
206(1)
Differentiated Services - 9.4.5
206(1)
Benefits and Drawbacks of DiffServ Model
207(1)
Check Your Understanding - QoS Models - 9.4.6
208(1)
QoS Implementation Techniques - 9.5
208(5)
Video Tutorial - QoS Implementation Techniques - 9.5.1
208(1)
Avoiding Packet Loss - 9.5.2
208(1)
QoS Tools - 9.5.3
208(1)
Tools for Implementing QoS
208(1)
Classification and Marking - 9.5.4
209(1)
Traffic Marking for QoS
210(1)
Marking at Layer 2 - 9.5.5
210(1)
Ethernet Class of Service (CoS) Values
210(1)
Marking at Layer 3 - 9.5.6
210(1)
Type of Service and Traffic Class Field - 9.5.7
211(1)
DSCP Values - 9.5.8
211(1)
Class Selector Bits - 9.5.9
211(1)
Trust Boundaries - 9.5.10
211(1)
Congestion Avoidance - 9.5.11
212(1)
Shaping and Policing - 9.5.12
212(1)
QoS Policy Guidelines - 9.5.13
213(1)
Check Your Understanding - QoS Implementation Techniques - 9.5.14
213(1)
Module Practice and Quiz - 9.6
213(3)
What did I learn in this module? - 9.6.1
213(1)
Network Transmission Quality
213(1)
Traffic Characteristics
214(1)
Queuing Algorithms
214(1)
QoS Models
214(1)
QoS Implementation Techniques
215(1)
Chapter Quiz - QoS Concepts
216(1)
Your
Chapter Notes
216(1)
Chapter 10 Network Management
217(42)
Introduction - 10.0
217(1)
Why should I take this module? - 10.0.1
217(1)
What will I learn to do in this module? - 10.0.2
217(1)
Device Discovery with CDP - 10.1
217(5)
CDP Overview - 10.1.1
217(1)
Configure and Verify CDP - 10.1.2
218(2)
Discover Devices by Using CDP - 10.1.3
220(2)
Syntax Checker - Configure and Verify CDP - 10.1.4
222(1)
Packet Tracer - Use CDP to Map a Network - 10.1.5
222(1)
Device Discovery with LLDP - 10.2
222(3)
LLDP Overview - 10.2.1
222(1)
Configure and Verify LLDP - 10.2.2
222(1)
Discover Devices by Using LLDP - 10.2.3
223(2)
Syntax Checker - Configure and Verify LLDP - 10.2.4
225(1)
Check Your Understanding - Compare CDP and LLDP - 10.2.5
225(1)
Packet Tracer - Use LLDP to Map a Network - 10.2.6
225(1)
NTP-10.3
225(4)
Time and Calendar Services - 10.3.1
225(1)
NTP Operation - 10.3.2
226(1)
Stratum 0
226(1)
Stratum 1
226(1)
Stratum 2 and Lower
227(1)
Configure and Verify NTP - 10.3.3
227(2)
Packet Tracer - Configure and Verify NTP - 10.3.4
229(1)
SNMP - 10.4
229(5)
Introduction to SNMP - 10.4.1
229(1)
SNMP Operation - 10.4.2
230(1)
SNMP Agent Traps - 10.4.3
230(1)
SNMP Versions - 10.4.4
231(1)
SNMPv1
232(1)
SNMPv2c
232(1)
SNMPv3 no Auth No Priv
232(1)
SNMPv3 auth No Priv
232(1)
SNMPu3 auth Priv
232(1)
Check Your Understanding - SNMP Versions - 10.4.5
232(1)
Community Strings - 10.4.6
232(1)
MIB Object ID - 10.4.7
233(1)
SNMP Polling Scenario - 10.4.8
233(1)
SNMP Object Navigator - 10.4.9
233(1)
Lab - Research Network Monitoring Software - 10.4.10
234(1)
Syslog - 10.5
234(3)
Introduction to Syslog - 10.5.1
234(1)
Syslog Operation - 10.5.2
234(1)
Syslog Message Format - 10.5.3
235(1)
Syslog Facilities - 10.5.4
236(1)
Configure Syslog Timestamp - 10.5.5
236(1)
Check Your Understanding - Syslog Operation - 10.5.6
237(1)
Router and Switch File Maintenance - 10.6
237(11)
Outer File Systems - 10.6.1
237(1)
The Flash File System
238(1)
The NVRAM File System
239(1)
Switch File Systems - 10.6.2
240(1)
Use a Text File to Back Up a Configuration - 10.6.3
241(1)
Use a Text File to Restore a Configuration - 10.6.4
241(1)
Use TFTP to Back Up and Restore a Configuration - 10.6.5
242(1)
Use TFTP to Back Up a Configuration
242(1)
Use TFTP to Restore a Configuration
242(1)
USB Ports on a Cisco Router - 10.6.6
242(1)
Use USB to Back Up and Restore a Configuration - 10.6.7
243(2)
Restore Configurations with a USB Flash Drive
245(1)
Password Recovery Procedures - 10.6.8
245(1)
Password Recovery Example - 10.6.9
245(1)
Step 1 Enter the ROMMON mode
246(1)
Step 2 Change the configuration register
246(1)
Step 3 Copy the startup-config to the running-con fig
246(1)
Step 4 Change the password
247(1)
Step 5 Save the running-config as the new startup-config
247(1)
Step 6 Reload the device
247(1)
Packet Tracer - Back Up Configuration Files - 10.6.10
247(1)
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11
248(1)
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12
248(1)
Lab - Research Password Recovery Procedures - 10.6.13
248(1)
IOS Image Management - 10.7
248(5)
Video - Managing Cisco IOS Images - 10.7.1
248(1)
TFTP Servers as a Backup Location - 10.7.2
248(1)
Backup IOS Image to TFTP Server Example - 10.7.3
249(1)
Step 1 Ping the TFTP server
249(1)
Step 2 Verify image size in flash
249(1)
Step 3 Copy the image to the TFTP server
249(1)
Copy an IOS Image to a Device Example - 10.7.4
250(1)
Step 1 Ping the TFTP server
250(1)
Step 2 Verify the amount of free flash
250(1)
Step 3 Copy the new IOS image to flash
251(1)
The boot system Command - 10.7.5
251(1)
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6
252(1)
Module Practice and Quiz - 10.8
253(4)
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1
253(1)
Lab - Configure CDP, LLDP, and NTP - 10.8.2
253(1)
What did I learn in this module? - 10.8.3
253(1)
Device Discovery with CDP
253(1)
Device Discovery with LLDP
254(1)
NTP
254(1)
SNMP
254(1)
Syslog
255(1)
Router and Switch File Maintenance
255(1)
IOS Image Management
256(1)
Chapter Quiz - Network Management
257(1)
Your
Chapter Notes
257(2)
Chapter 11 Network Design
259(18)
Introduction - 11.0
259(1)
Why should I take this module? - 11.0.1
259(1)
What will I learn to do in this module? - 11.0.2
259(1)
Hierarchical Networks - 11.1
259(4)
Video - Three-Layer Network Design - 11.1.1
259(1)
The Need to Scale the Network - 11.1.2
259(1)
Borderless Switched Networks - 11.1.3
260(1)
Hierarchy in the Borderless Switched Network - 11.1.4
261(1)
Three-Tier Model
261(1)
Two-Tier Model
261(1)
Access, Distribution, and Core Layer Functions - 11.1.5
262(1)
Access Layer
262(1)
Distribution Layer
262(1)
Core Layer
262(1)
Three-Tier and Two-Tier Examples - 11.1.6
262(1)
Three-Tier Example
262(1)
Two-Tier Example
263(1)
Role of Switched Networks - 11.1.7
263(1)
Check Your Understanding - Hierarchical Networks - 11.1.8
263(1)
Scalable Networks - 11.2
263(3)
Design for Scalability - 11.2.1
263(1)
Redundant Links
264(1)
Multiple Links
264(1)
Scalable Routing Protocol
264(1)
Wireless Connectivity
264(1)
Plan for Redundancy - 11.2.2
264(1)
Reduce Failure Domain Size - 11.2.3
265(1)
Edge Router
265(1)
AP1
265(1)
S1
265(1)
S2
265(1)
S3
265(1)
Increase Bandwidth - 11.2.4
265(1)
Expand the Access Layer - 11.2.5
266(1)
Tune Routing Protocols - 11.2.6
266(1)
Check Your Understanding - Scalable Networks - 11.2.7
266(1)
Switch Hardware - 11.3
266(4)
Switch Platforms-11.3.1
266(1)
Campus LAN Switches
267(1)
Cloud-Managed Switches
267(1)
Data Center Switches
267(1)
Service Provider Switches
267(1)
Virtual Networking
267(1)
Switch Form Factors - 11.3.2
267(1)
Fixed configuration switches
267(1)
Modular configuration switches
268(1)
Stackable configuration switches
268(1)
Thickness
268(1)
Port Density - 11.3.3
268(1)
Forwarding Rates - 11.3.4
268(1)
Power over Ethernet - 11.3.5
269(1)
Switch
269(1)
IP Phone
269(1)
WAP
269(1)
Cisco Catalyst 2960-C
269(1)
Multilayer Switching - 11.3.6
269(1)
Business Considerations for Switch Selection - 11.3.7
270(1)
Check Your Understanding - Switch Hardware - 11.3.8
270(1)
Router Hardware - 11.4
270(2)
Router Requirements - 11.4.1
270(1)
Cisco Routers - 11.4.2
271(1)
Branch Routers
271(1)
Network Edge Routers
271(1)
Service Provider Routers
271(1)
Industrial
271(1)
Router Form Factors - 11.4.3
271(1)
Cisco 900 Series
272(1)
ASR 9000 and 1000 Series
272(1)
5500 Series
272(1)
Cisco 800
272(1)
Check Your Understanding - Router Hardware - 11.4.4
272(1)
Module Practice and Quiz - 11.5
272(3)
Packet Tracer - Compare Layer 2 and Layer
3(269)
Devices - 11.5.1
272(1)
What did I learn in this module? - 11.5.2
273(1)
Hierarchical Networks
273(1)
Scalable Networks
273(1)
Switch Hardware
273(1)
Router Hardware
274(1)
Chapter Quiz - Network Design
275(1)
Your
Chapter Notes
275(2)
Chapter 12 Network Troubleshooting
277(48)
Introduction - 12.0
277(1)
Why should I take this module? - 12.0.1
277(1)
What will I learn to do in this module? - 12.0.2
277(1)
Network Documentation - 12.1
277(5)
Documentation Overview - 12.1.1
277(1)
Network Topology Diagrams - 12.1.2
278(1)
Physical Topology
278(1)
Logical IPv4 Topology
278(1)
Logical IPv6 Topology
279(1)
Network Device Documentation - 12.1.3
279(1)
Router Device Documentation
279(1)
LAN Switch Device Documentation
279(1)
End-system Documentation Files
279(1)
Establish a Network Baseline - 12.1.4
279(1)
Step 1 - Determine What Types of Data to Collect - 12.1.5
280(1)
Step 2 - Identify Devices and Ports of Interest - 12.1.6
280(1)
Step 3 - Determine the Baseline Duration - 12.1.7
280(1)
Data Measurement - 12.1.8
281(1)
Check Your Understanding - Network Documentation - 12.1.9
282(1)
Troubleshooting Process - 12.2
282(6)
General Troubleshooting Procedures - 12.2.1
282(1)
Seven-Step Troubleshooting Process - 12.2.2
282(1)
Define the Problem
282(1)
Gather Information
283(1)
Analyze information
283(1)
Eliminate Possible Causes
283(1)
Propose Hypothesis
283(1)
Test Hypothesis
283(1)
Solve the problem
284(1)
Question End Users - 12.2.3
284(1)
Gather Information - 12.2.4
285(1)
Troubleshooting with Layered Models - 12.2.5
286(1)
Structured Troubleshooting Methods - 12.2.6
286(1)
Bottom-Up
286(1)
Top-Down
286(1)
Divide-and-Conquer
287(1)
Follow-the-Path
287(1)
Substitution
287(1)
Comparison
287(1)
Educated Guess
287(1)
Guidelines for Selecting a Troubleshooting Method - 12.2.7
288(1)
Check Your Understanding - Troubleshooting Process - 12.2.8
288(1)
Troubleshooting Tools - 12.3
288(4)
Software Troubleshooting Tools - 12.3.1
288(1)
Network Management System Tools
288(1)
Knowledge Bases
289(1)
Baselining Tools
289(1)
Protocol Analyzers - 12.3.2
289(1)
Hardware Troubleshooting Tools - 12.3.3
289(1)
Digital Multimeters
289(1)
Cable Testers
289(1)
Cable Analyzers
290(1)
Portable Network Analyzers
290(1)
Cisco Prime NAM
290(1)
Syslog Server as a Troubleshooting Tool - 12.3.4
290(2)
Check Your Understanding - Troubleshooting Tools - 12.3.5
292(1)
Symptoms and Causes of Network Problems - 12.4
292(8)
Physical Layer Troubleshooting - 12.4.1
292(2)
Data Link Layer Troubleshooting - 12.4.2
294(1)
Network Layer Troubleshooting - 12.4.3
295(2)
Transport Layer Troubleshooting - ACLs - 12.4.4
297(1)
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5
298(1)
Application Layer Troubleshooting - 12.4.6
299(1)
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7
300(1)
Troubleshooting IP Connectivity - 12.5
300(19)
Components of Troubleshooting End-to-End Connectivity - 12.5.1
300(1)
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2
301(1)
IPv4 ping
301(1)
IPv4 traceroute
301(1)
IPv6 ping and traceroute
302(1)
Step 1 Verify the Physical Layer - 12.5.3
303(1)
Input queue drops
304(1)
Output queue drops
304(1)
Input errors
304(1)
Output errors
304(1)
Step 2 Check for Duplex Mismatches - 12.5.4
304(1)
Troubleshooting Example
305(1)
Step 3 Verify Addressing on the Local Network - 12.5.5
306(1)
Windows IPv4 ARP Table
306(1)
Windows IPv6 Neighbor Table
307(1)
IOS IPv6 Neighbor Table
307(1)
Switch MAC Address Table
308(1)
Troubleshoot VLAN Assignment Example - 12.5.6
308(1)
Check the ARP Table
309(1)
Check the Switch MAC Table
309(1)
Correct the VLAN Assignment
309(1)
Step 4 Verify Default Gateway - 12.5.7
310(1)
Troubleshooting IPv4 Default Gateway Example
310(1)
R1 Routing Table
310(1)
PC1 Routing Table
311(1)
Troubleshoot IPv6 Default Gateway Example - 12.5.8
311(1)
R1 Routing Table
311(1)
PC1 Addressing
312(1)
Check R1 Interface Settings
312(1)
Correct R1 IPv6 Routing
313(1)
Verify PC1 Has an IPv6 Default Gateway
313(1)
Step 5 Verify Correct Path - 12.5.9
314(1)
R1 IPv4 Routing Table
314(1)
R1 IPv6 Routing Table
314(1)
Troubleshooting Example
315(1)
Step 6 Verify the Transport Layer - 12.5.10
315(1)
Troubleshooting Example
316(1)
Step 7 Verify ACLs - 12.5.11
317(1)
Troubleshooting Example
317(1)
Show ip access-lists
317(1)
Show ip interfaces
317(1)
Correct the Issue
318(1)
Step 8 Verify DNS - 12.5.12
318(1)
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13
319(1)
Module Practice and Quiz - 12.6
319(5)
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1
319(1)
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2
319(1)
What did I learn in this module? - 12.6.3
320(1)
Network Documentation
320(1)
Troubleshooting Process
320(1)
Troubleshooting Tools
321(1)
Symptoms and Causes of Network Problems
321(1)
Troubleshooting IP Connectivity
322(2)
Chapter Quiz - Network Troubleshooting
324(1)
Your
Chapter Notes
324(1)
Chapter 13 Network Virtualization
325(18)
Introduction - 13.0
325(1)
Why should I take this module? - 13.0.1
325(1)
What will I learn to do in this module? - 13.0.2
325(1)
Cloud Computing - 13.1
325(2)
Video - Cloud and Virtualization - 13.1.1
325(1)
Cloud Overview - 13.1.2
325(1)
Cloud Services - 13.1.3
326(1)
Cloud Models - 13.1.4
326(1)
Cloud Computing versus Data Center - 13.1.5
327(1)
Check Your Understanding - Cloud Computing - 13.1.6
327(1)
Virtualization - 13.2
327(3)
Cloud Computing and Virtualization - 13.2.1
327(1)
Dedicated Servers - 13.2.2
328(1)
Server Virtualization - 13.2.3
328(1)
Advantages of Virtualization - 13.2.4
328(1)
Abstraction Layers - 13.2.5
329(1)
Type 2 Hypervisors - 13.2.6
330(1)
Check Your Understanding - Virtualization - 13.2.7
330(1)
Virtual Network Infrastructure - 13.3
330(2)
Type 1 Hypervisors - 13.3.1
330(1)
Installing a VM on a Hypervisor - 13.3.2
330(1)
The Complexity of Network Virtualization - 13.3.3
331(1)
Check Your Understanding - Virtual Network Infrastructure - 13.3.4
332(1)
Software-Defined Networking - 13.4
332(2)
Video - Software-Defined Networking - 13.4.1
332(1)
Control Plane and Data Plane - 13.4.2
332(1)
Layer 3 Switch and CEF
332(1)
SDN and Central Controller
333(1)
Management Plane
333(1)
Network Virtualization Technologies - 13.4.3
333(1)
Traditional and SDN Architectures - 13.4.4
334(1)
Check Your Understanding - Software-Defined Networking - 13.4.5
334(1)
Controllers - 13.5
334(3)
SDN Controller and Operations - 13.5.1
334(1)
Video - Cisco ACI - 13.5.2
335(1)
Core Components of ACI - 13.5.3
335(1)
Spine-Leaf Topology - 13.5.4
335(1)
SDN Types - 13.5.5
336(1)
Device-based SDN
336(1)
Controller-based SDN
336(1)
Policy-based SDN
336(1)
APIC-EM Features - 13.5.6
336(1)
APIC-EM Path Trace - 13.5.7
336(1)
Check Your Understanding - Controllers - 13.5.8
337(1)
Module Practice and Quiz - 13.6
337(4)
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1
337(1)
What did I learn in this module? - 13.6.2
337(1)
Cloud Computing
337(1)
Virtualization
338(1)
Virtual Network Infrastructure
338(1)
Software-Defined Networking
338(1)
Controllers
339(2)
Chapter Quiz - Network Virtualization
341(1)
Your
Chapter Notes
341(2)
Chapter 14 Network Automation
343(24)
Introduction - 14.0
343(1)
Why should I take this module? - 14.0.1
343(1)
What will I learn in this module? - 14.0.2
343(1)
Automation Overview - 14.1
343(1)
Video - Automation Everywhere - 14.1.1
343(1)
The Increase in Automation - 14.1.2
344(1)
Thinking Devices - 14.1.3
344(1)
Check Your Understanding - Benefits of Automation - 14.1.4
344(1)
Data Formats - 14.2
344(7)
Video - Data Formats - 14.2.1
344(1)
The Data Formats Concept - 14.2.2
345(1)
Data Format Rules - 14.2.3
345(1)
Compare Data Formats - 14.2.4
346(1)
JSON Format
346(1)
YAML Format
346(1)
XML Format
347(1)
JSON Data Format - 14.2.5
347(1)
IOS Router Output
347(1)
JSON Output
347(1)
JSON Syntax Rules - 14.2.6
348(1)
JSON List of IPv4 Addresses
348(1)
YAML Data Format - 14.2.7
349(1)
JSON for GigabitEthernet2
349(1)
YAML for GigabitEthernet2
350(1)
XML Data Format - 14.2.8
350(1)
XML for GigabitEthernet2
351(1)
Check Your Understanding - Data Formats - 14.2.9
351(1)
APIs-14.3
351(3)
Video - APIs - 14.3.1
351(1)
The API Concept - 14.3.2
352(1)
An API Example - 14.3.3
352(1)
Open, Internal, and Partner APIs - 14.3.4
352(1)
Types of Web Service APIs - 14.3.5
353(1)
Check Your Understanding - APIs - 14.3.6
354(1)
REST-14.4
354(3)
Video - REST - 14.4.1
354(1)
REST and RESTful API - 14.4.2
354(1)
REST ful Implementation - 14.4.3
354(1)
URI, URN, and URL - 14.4.4
355(1)
Anatomy of a RESTful Request - 14.4.5
355(1)
RESTful API Applications - 14.4.6
356(1)
Developer Web Site
356(1)
Postman
356(1)
Python
357(1)
Network Operating Systems
357(1)
Check Your Understanding - REST - 14.4.7
357(1)
Configuration Management Tools - 14.5
357(3)
Video - Configuration Management Tools - 14.5.1
357(1)
Traditional Network Configuration - 14.5.2
358(1)
Network Automation - 14.5.3
358(1)
Configuration Management Tools - 14.5.4
358(1)
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5
359(1)
Check Your Understanding - Configuration Management - 14.5.6
360(1)
IBN and Cisco DNA Center - 14.6
360(3)
Video - Intent-Based Networking - 14.6.1
360(1)
Intent-Based Networking Overview - 14.6.2
360(1)
Network Infrastructure as Fabric - 14.6.3
360(1)
Cisco Digital Network Architecture (DNA) - 14.6.4
361(1)
Cisco DNA Center - 14.6.5
362(1)
Video - DNA Center Overview and Platform APIs - 14.6.6
362(1)
Video - DNA Center Design and Provision - 14.6.7
363(1)
Video - DNA Center Policy and Assurance - 14.6.8
363(1)
Video - DNA Center Troubleshooting User Connectivity - 14.6.9
363(1)
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10
363(1)
Module Practice and Quiz - 14.7
363(2)
What did I learn in this module? - 14.7.1
363(2)
Chapter Quiz - Network Automation
365(1)
Your
Chapter Notes
365(2)
Index 367
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."