Muutke küpsiste eelistusi

Enterprise Networking, Security, and Automation Labs and Study Guide (CCNAv7) [Pehme köide]

  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 276x216x25 mm, kaal: 1020 g
  • Sari: Lab Companion
  • Ilmumisaeg: 04-Nov-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0136634699
  • ISBN-13: 9780136634690
Teised raamatud teemal:
  • Formaat: Paperback / softback, 416 pages, kõrgus x laius x paksus: 276x216x25 mm, kaal: 1020 g
  • Sari: Lab Companion
  • Ilmumisaeg: 04-Nov-2020
  • Kirjastus: Cisco Press
  • ISBN-10: 0136634699
  • ISBN-13: 9780136634690
Teised raamatud teemal:
The only authorized Labs & Study Guide for the Cisco Networking Academy Enterprise Networking, Security, and Automation course in the CCNA curriculum

Each chapter of this book is divided into a Study Guide section followed by a Lab section.

The Study Guide section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all the following types of exercises:









Vocabulary Matching Exercises Concept Questions Exercises Skill-Building Activities and Scenarios Configuration Scenarios Packet Tracer Exercises Troubleshooting Scenarios





The Labs & Activities include all the online course Labs and Packet Tracer activity instructions. If applicable, this section begins with a Command Reference that you will complete to highlight all the commands introduced in the chapter.

This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.Related titles: CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 Enterprise Networking, Security, and Automation Companion Guide CCNAv7 Book: 9780136634324 eBook: 9780136634249 Enterprise Networking, Security, and Automation Course Booklet CCNAv7 Book: 9780136634737
Introduction xxvi
Chapter 1 Single-Area Ospfv2 Concepts
1(14)
Study Guide
2(1)
OSPF Features and Characteristics
2(3)
Components of OSPF
2(1)
Link-State Operation
2(1)
Single-Area and Multiarea OSPF
3(1)
OSPFv3
3(1)
Check Your Understanding---OSPF Features and Characteristics
4(1)
OSPF Packets
5(3)
Types of OSPF Packets
5(1)
Link-State Updates
5(1)
Hello Packet
6(1)
Check Your Understanding---OSPF Packets
7(1)
OSPF Operation
8(5)
OSPF Operational States
8(2)
The Need for a DR
10(1)
LSA Flooding with a DR
10(1)
Check Your Understanding---OSPF Operation
11(2)
Labs and Activities
13(2)
Chapter 2 Single-Area Ospfv2 Configuration
15(42)
Study Guide
16(1)
OSPF Router ID
16(3)
OSPF Reference Topology
16(1)
Router IDs
16(1)
Router ID Order of Precedence
17(1)
Configure a Loopback Interface as the Router ID
17(1)
Explicitly Configure a Router ID
17(1)
Modify the Router ID
18(1)
Check Your Understanding---OSPF Router ID
18(1)
Point-to-Point OSPF Networks
19(2)
The network Command Syntax
19(1)
The Wildcard Mask
19(1)
Configure OSPF Using the network Command
19(1)
Configure OSPF Using the ip ospf Command
20(1)
Passive Interface
20(1)
Configure Passive Interfaces
20(1)
Packet Tracer Exercise 2-1 Point-to-Point Single-Area OSPFv2 Configuration
21(1)
Multiaccess OSPF Networks
21(3)
OSPF Designated Router
21(1)
OSPF Multiaccess Reference Topology
22(1)
Verify OSPF Multiaccess Router Roles
22(1)
DR Failure and Recovery
23(1)
Configure OSPF Priority
24(1)
Modify Single-Area OSPFv2
24(4)
Cisco OSPF Cost Metric
24(1)
Adjust the Reference Bandwidth
25(1)
OSPF Accumulates Cost
25(1)
Manually Set OSPF Cost Value
26(1)
Modify OSPFv2 Intervals
27(1)
Default Route Propagation
28(1)
Propagate and Verify a Default Route
28(1)
Packet Tracer Exercise 2-2 Modify a Point-to-Point Single-Area OSPFv2 Configuration
28(1)
Verify Single-Area OSPFv2
29(4)
Verify OSPF Neighbors
29(1)
Verify OSPF Protocol Settings
30(1)
Verify OSPF Process Information
31(1)
Verify OSPF Interface Settings
31(2)
Labs and Activities
33(1)
Command Reference
33(1)
2.2.13 Packet Tracer---Point-to-Point Single-Area OSPFv2 Configuration
34(3)
Addressing Table
34(1)
Objectives
34(1)
Background
34(1)
Instructions
34(1)
Part 1 Configure Router IDs
34(1)
Part 2 Configure Networks for OSPF Routing
35(1)
Part 3 Configure Passive Interfaces
36(1)
Part 4 Verify OSPF Configuration
36(1)
2.3.11 Packet Tracer---Determine the DR and BDR
37(4)
Addressing Table
37(1)
Objectives
37(1)
Scenario
37(1)
Instructions
37(1)
Part 1 Examine DR and BDR Changing Roles
37(2)
Part 2 Modify OSPF Priority and Force Elections
39(2)
2.4.11 Packet Tracer---Modify Single-Area OSPFv2
41(3)
Addressing Table
41(1)
Objectives
41(1)
Scenario
41(1)
Instructions
41(1)
Part 1 Modify OSPF Default Settings
41(2)
Part 2 Verify Connectivity
43(1)
2.5.3 Packet Tracer---Propagate a Default Route in OSPFv2
44(2)
Addressing Table
44(1)
Objectives
44(1)
Background
44(1)
Instructions
44(1)
Part 1 Propagate a Default Route
44(1)
Part 2 Verify Connectivity
45(1)
2.6.6 Packet Tracer---Verify Single-Area OSPFv2
46(4)
Addressing Table
46(1)
Objectives
46(1)
Background / Scenario
46(1)
Instructions
47(1)
Part 1 Verify the Existing OSPFv2 Network Operation
47(2)
Part 2 Add the New Branch Office LAN to the OSPFv2 Network
49(1)
2.7.1 Packet Tracer---Single-Area OSPFv2 Configuration
50(2)
Addressing Table
50(1)
Objectives
50(1)
Background
50(1)
Instructions
51(1)
Requirements
51(1)
2.7.2 Lab---Configure Single-Area OSPFv2
52(5)
Topology
52(1)
Addressing Table
52(1)
Objectives
52(1)
Background / Scenario
52(1)
Required Resources
53(1)
Instructions
53(1)
Part 1 Build the Network and Configure Basic Device Settings
53(1)
Part 2 Configure and Verify Single-Area OSPFv2 for Basic Operation
54(1)
Part 3 Optimize the Single-Area OSPFv2 Configuration
54(1)
Router Interface Summary Table
55(2)
Chapter 3 Network Security Concepts
57(44)
Study Guide
58(1)
Current State of Cybersecurity
58(2)
Current State of Affairs
58(1)
Vectors of Network Attacks
58(1)
Data Loss
59(1)
Check Your Understanding---Current State of Cybersecurity
59(1)
Threat Actors
60(2)
The Hacker
60(1)
Evolution of Hackers
61(1)
Check Your Understanding---Threat Actors
61(1)
Threat Actor Tools
62(3)
Video---Threat Actor Tools
62(1)
Evolution of Security Tools
62(1)
Attack Types
63(1)
Check Your Understanding---Threat Actor Tools
64(1)
Malware
65(3)
Viruses and Trojan Horses
65(1)
Other Types of Malware
66(1)
Check Your Understanding---Malware
66(2)
Common Network Attacks
68(3)
Overview of Network Attacks
68(1)
Video---Reconnaissance Attacks
68(1)
Reconnaissance Attacks
68(1)
Video---Access and Social Engineering Attacks
69(1)
Access Attacks
69(1)
Social Engineering Attacks
69(1)
Video---Denial of Service Attacks
70(1)
DoS and DDoS Attacks
70(1)
Check Your Understanding---Common Network Attacks
70(1)
IP Vulnerabilities and Threats
71(4)
Video---Common IP and ICMP Attacks
71(1)
IPv4 and IPv6
71(1)
ICMP Attacks
72(1)
Video---Amplification, Reflection, and Spoofing Attacks
72(1)
Amplification and Reflection Attacks
72(1)
Address Spoofing Attacks
73(1)
Check Your Understanding---IP Vulnerabilities and Threats
74(1)
TCP and UDP Vulnerabilities
75(3)
TCP Segment Header
75(1)
TCP Services
75(1)
TCP Attacks
76(1)
Check Your Understanding---TCP and UDP Vulnerabilities
77(1)
IP Services
78(3)
ARP Vulnerabilities
78(1)
Video---ARP Spoofing
79(1)
DNS Attacks
79(1)
DHCP
80(1)
DCHP Spoofing Attacks
80(1)
Network Security Best Practices
81(4)
Confidentiality, Integrity, and Availability (CIA)
81(1)
The Defense-in-Depth Approach
81(1)
IPS
82(1)
Content Security Appliances
83(1)
Check Your Understanding---Network Security Best Practices
84(1)
Cryptography
85(6)
Video---Cryptography
85(1)
Securing Communications
85(1)
Data Integrity
85(1)
Origin Authentication
86(1)
Data Confidentiality
86(1)
Symmetric Encryption
87(1)
Asymmetric Encryption
87(1)
Diffie-Hellman
88(1)
Check Your Understanding---Cryptography
89(2)
Labs and Activities
91(1)
3.5.7 Lab---Social Engineering
91(2)
Objective
91(1)
Resources
91(1)
Instructions
91(2)
3.8.8 Lab---Explore DNS Traffic
93(8)
Objectives
93(1)
Background / Scenario
93(1)
Required Resources
93(1)
Instructions
93(6)
Reflection Question
99(2)
Chapter 4 Acl Concepts
101(12)
Study Guide
102(1)
Purpose of ACLs
102(1)
ACL Operation
102(1)
Check Your Understanding---Purpose of ACLs
102(1)
Wildcard Masks in ACLs
103(3)
Wildcard Mask Overview
103(1)
Wildcard Mask Types
104(1)
Wildcard Mask Calculation
104(1)
Wildcard Mask Keywords
105(1)
Check Your Understanding---Wildcard Masks in ACLs
105(1)
Guidelines for ACL Creation
106(1)
Limited Number of ACLs per Interface
106(1)
ACL Best Practices
107(1)
Check Your Understanding---Guidelines for ACL Creation
107(1)
Types of IPv4 ACLs
107(3)
Standard and Extended ACLs
108(1)
Numbered and Named ACLs
108(1)
Standard and Extended ACL Placement
108(1)
Check Your Understanding---Types of IPv4 ACLs
109(1)
Labs and Activities
110(1)
4.1.4 Packet Tracer---Access Control List Demonstration
110(3)
Objectives
110(1)
Background
110(1)
Addressing Table
110(1)
Instructions
110(1)
Part 1 Verify Local Connectivity and Test Access Control List
110(1)
Part 2 Remove the ACL and Repeat the Test
111(2)
Chapter 5 Acls For Ipv4 Configuration
113(42)
Study Guide
114(1)
Configure Standard IPv4 ACLs
114(3)
Create an ACL
114(1)
Numbered Standard IPv4 ACLs
114(1)
Apply a Standard IPv4 ACL
115(1)
Named Standard IPv4 ACLs
115(1)
Standard IPv4 ACL Scenarios
116(1)
Modify IPv4 ACLs
117(1)
Sequence Numbers Method
117(1)
Secure VTY Ports with a Standard IPv4 ACL
118(1)
The access-class Command
118(1)
Secure VTP Access Example
118(1)
Configure Extended IPv4 ACLs
118(6)
Extended ACLs
119(1)
Numbered Extended IPv4 ACLs
119(1)
Numbered Extended ACL Configuration Scenarios
119(1)
Evaluate Extended IPv4 ACL Statements
120(2)
Extended ACL Quiz
122(2)
Labs and Activities
124(1)
Command Reference
124(1)
5.1.8 Packet Tracer---Configure Numbered Standard IPv4 ACLs
125(3)
Addressing Table
125(1)
Objectives
125(1)
Background / Scenario
125(1)
Instructions
125(1)
Part 1 Plan an ACL Implementation
125(1)
Part 2 Configure, Apply, and Verify a Standard ACL
126(2)
5.1.9 Packet Tracer---Configure Named Standard IPv4 ACLs
128(2)
Addressing Table
128(1)
Objectives
128(1)
Background / Scenario
128(1)
Instructions
128(1)
Part 1 Configure and Apply a Named Standard ACL
128(1)
Part 2 Verify the ACL Implementation
129(1)
5.2.7 Packet Tracer---Configure and Modify Standard IPv4 ACLs
130(7)
Addressing Table
130(1)
Objectives
130(1)
Background / Scenario
130(1)
Instructions
131(1)
Part 1 Verify Connectivity
131(1)
Part 2 Configure and Verify Standard Numbered and Named ACLs
131(4)
Part 3 Modify a Standard ACL
135(1)
Reflection Questions
136(1)
5.4.12 Packet Tracer---Configure Extended ACLs---Scenario 1
137(5)
Addressing Table
137(1)
Objectives
137(1)
Background / Scenario
137(1)
Instructions
137(1)
Part 1 Configure, Apply, and Verify an Extended Numbered ACL
137(3)
Part 2 Configure, Apply, and Verify an Extended Named ACL
140(2)
5.4.13 Packet Tracer---Configure Extended IPv4 ACLs---Scenario 2
142(4)
Addressing Table
142(1)
Objectives
142(1)
Background / Scenario
142(1)
Instructions
142(1)
Part 1 Configure a Named Extended ACL
142(2)
Part 2 Apply and Verify the Extended ACL
144(2)
5.5.1 Packet Tracer---IPv4 ACL Implementation Challenge
146(3)
Addressing Table
146(1)
Objectives
146(1)
Background / Scenario
146(1)
Instructions
146(3)
5.5.2 Lab---Configure and Verify Extended IPv4 ACLs
149(6)
Topology
149(1)
Addressing Table
149(1)
VLAN Table
149(1)
Objectives
150(1)
Background / Scenario
150(1)
Required Resources
150(1)
Instructions
150(1)
Part 1 Build the Network and Configure Basic Device Settings
150(1)
Part 2 Configure VLANs on the Switches
151(1)
Part 3 Configure Trunking
151(1)
Part 4 Configure Routing
152(1)
Part 5 Configure Remote Access
152(1)
Part 6 Verify Connectivity
153(1)
Part 7 Configure and Verify Extended Access Control Lists
153(2)
Chapter 6 Nat For Ipv4
155(30)
Study Guide
156(1)
NAT Characteristics
156(1)
IPv4 Private Address Space
156(1)
NAT Terminology
156(1)
Check Your Understanding---NAT Characteristics
157(1)
Types of NAT
157(1)
Static NAT
157(1)
Dynamic NAT
158(1)
Port Address Translation
158(1)
NAT and PAT Comparison
158(1)
NAT Advantages and Disadvantages
158(1)
Check Your Understanding---NAT Advantages and Disadvantages
159(1)
Static NAT
159(2)
Configure Static NAT
159(1)
Packet Tracer Exercise 6-1 Configure Static NAT
160(1)
Dynamic NAT
161(1)
Configure Dynamic NAT
161(1)
Packet Tracer Exercise 6-2 Configure Dynamic NAT
162(1)
PAT
162(3)
Configure PAT
162(3)
NAT64
165(1)
Labs and Activities
166(1)
Command Reference
166(1)
6.2.7 Packet Tracer---Investigate NAT Operations
166(4)
Addressing Table
166(1)
Objectives
167(1)
Scenario
167(1)
Instructions
167(1)
Part 1 Investigate NAT Operation Across the Intranet
167(1)
Part 2 Investigate NAT Operation Across the Internet
168(1)
Part 3 Conduct Further Investigations
169(1)
6.4.5 Packet Tracer---Configure Static NAT
170(2)
Objectives
170(1)
Scenario
170(1)
Instructions
170(1)
Part 1 Test Access Without NAT
170(1)
Part 2 Configure Static NAT
171(1)
Part 3 Test Access with NAT
171(1)
6.5.6 Packet Tracer---Configure Dynamic NAT
172(1)
Objectives
172(1)
Instructions
172(1)
Part 1 Configure Dynamic NAT
172(1)
Part 2 Verify NAT Implementation
172(1)
6.6.7 Packet Tracer---Configure PAT
173(2)
Objectives
173(1)
Part 1 Configure Dynamic NAT with Overload
173(1)
Part 2 Verify Dynamic NAT with Overload Implementation
173(1)
Part 3 Configure PAT Using an Interface
174(1)
Part 4 Verify PAT Interface Implementation
174(1)
6.8.1 Packet Tracer---Configure NAT for IPv4
175(1)
Addressing Table
175(1)
Objectives
175(1)
Background / Scenario
175(1)
Instructions
175(1)
6.8.2 Lab---Configure NAT for IPv4
176(9)
Topology
176(1)
Addressing Table
176(1)
Objectives
176(1)
Background / Scenario
176(1)
Required Resources
177(1)
Instructions
177(1)
Part 1 Build the Network and Configure Basic Device Settings
177(1)
Part 2 Configure and Verify NAT for IPv4
178(2)
Part 3 Configure and Verify PAT for IPv4
180(3)
Part 4 Configure and Verify Static NAT for IPv4
183(1)
Router Interface Summary Table
184(1)
Chapter 7 Wan Concepts
185(18)
Study Guide
186(1)
Purpose of WANs
186(2)
LANs and WANs
186(1)
WAN Topologies
186(1)
Evolving Networks
187(1)
Check Your Understanding---Purpose of WANs
188(1)
WAN Operations
188(3)
WAN Standards
188(1)
WAN Terminology and Devices
189(1)
Check Your Understanding---WAN Operations
190(1)
Traditional WAN Connectivity
191(2)
Traditional WAN Connectivity Options
191(1)
Leased Lines
191(1)
Legacy Switched WAN Options
192(1)
Check Your Understanding---Traditional WAN Connectivity
193(1)
Modern WAN Connectivity
193(1)
Modern WANs
193(1)
Modern WAN Connectivity Options
194(1)
Check Your Understanding---Modern WAN Connectivity
194(1)
Internet-Based Connectivity
194(2)
Internet-Based Connectivity Terminology
194(2)
Labs and Activities
196(3)
7.5.11 Lab---Research Broadband Internet Access Technologies
196(1)
Objectives
196(1)
Background / Scenario
196(1)
Required Resources
196(1)
Part 1 Investigate Broadband Distribution
196(1)
Part 2 Research Broadband Access Options for Specific Scenarios
197(1)
Reflection Question
198(1)
7.6.1 Packet Tracer---WAN Concepts
199(4)
Objectives
199(1)
Background / Scenario
199(1)
Instructions
199(1)
Part 1 Investigate Consumer WAN Technologies for Home and Mobile Devices
199(2)
Part 2 Explore Connectivity
201(2)
Chapter 8 Vpn And Ipsec Concepts
203(18)
Study Guide
204(1)
VPN Technology
204(3)
Virtual Private Networks
204(1)
VPN Benefits
204(1)
Site-to-Site and Remote-Access VPNs
205(1)
Enterprise and Service Provider VPNs
205(1)
Check Your Understanding---VPN Technology
206(1)
Types of VPNs
207(4)
Remote-Access VPNs
207(1)
SSL and IPsec
208(1)
Site-to-Site IPsec VPNs
208(1)
GRE over IPsec
208(1)
Dynamic Multipoint VPNs
209(1)
IPsec Virtual Tunnel Interface
210(1)
Service Provider MPLS VPNs
210(1)
Check Your Understanding---Types of VPNs
210(1)
IPsec
211(8)
Video---IPsec Concepts
211(1)
IPsec Technologies
211(2)
IPsec Protocol Encapsulation
213(1)
Confidentiality
213(1)
Integrity
214(1)
Authentication
215(1)
Secure Key Exchange with Diffie-Hellman
215(1)
Video---IPsec Transport and Tunnel Mode
216(1)
Check Your Understanding---IPsec
216(3)
Labs and Activities
219(2)
Chapter 9 Qos Concepts
221(16)
Study Guide
222(1)
Network Transmission Quality
222(2)
Video Tutorial---The Purpose of QoS
222(1)
Network Transmission Quality Terminology
222(1)
Check Your Understanding---Network Transmission Quality
223(1)
Traffic Characteristics
224(1)
Video Tutorial---Traffic Characteristics
224(1)
Traffic Characteristics
224(1)
Check Your Understanding---Traffic Characteristics
224(1)
Queuing Algorithms
225(4)
Video Tutorial---QoS Algorithms
225(1)
Identify the Queuing Algorithm
225(2)
Queuing Algorithm Characteristics
227(1)
Check Your Understanding---Queuing Algorithms
228(1)
QoS Models
229(2)
Video Tutorial---QoS Models
229(1)
QoS Model Characteristics
229(1)
Check Your Understanding---QoS Models
230(1)
QoS Implementation Techniques
231(5)
Video Tutorial---QoS Implementation Techniques
231(1)
QoS Implementation Techniques Overview
231(1)
Traffic Marking Tools
231(1)
Marking at Layer 2
232(1)
Marking at Layer 3
232(1)
QoS Mechanism Terminology
233(2)
Check Your Understanding---QoS Implementation Techniques
235(1)
Labs and Activities
236(1)
Chapter 10 Network Management
237(68)
Study Guide
238(1)
Device Discovery with CDP and LLDP
238(3)
Configure and Verify CDP
238(1)
Configure and Verify LLDP
239(1)
Draw and Label the Network Topology
240(1)
Compare CDP and LLDP
241(1)
NTP
241(2)
Set the Clock
242(1)
NTP Operation
242(1)
Configure and Verify NTP
242(1)
SNMP
243(2)
SNMP Operation
243(1)
SNMP Versions
244(1)
Community Strings
244(1)
MIB Object ID
244(1)
Syslog
245(2)
Introduction to Syslog
245(1)
Syslog Operation
245(1)
Syslog Message Format
246(1)
Check Your Understanding---Syslog Operation
246(1)
Router and Switch File Maintenance
247(4)
Router File Systems
247(2)
Use a Text File to Back Up a Configuration
249(1)
Use a Text File to Restore a Configuration
250(1)
Use TFTP to Back Up and Restore a Configuration
250(1)
Use USB to Back Up and Restore a Configuration
251(1)
Password Recovery Procedures
251(1)
Labs and Packet Tracers
251(1)
IOS Image Management
251(3)
Video---Managing Cisco IOS Images
252(1)
Back Up an IOS Image to a TFTP Server
252(1)
The boot system Command
253(1)
Labs and Activities
254(1)
Command Reference
254(1)
10.1.5 Packet Tracer---Use CDP to Map a Network
255(4)
Addressing Table
255(1)
Objectives
255(1)
Background / Scenario
255(1)
Instructions
256(1)
Part 1 Use SSH to Remotely Access Network Devices
256(1)
Part 2 Use CDP to Discover Neighboring Devices
256(3)
10.2.6 Packet Tracer---Use LLDP to Map a Network
259(5)
Addressing Table
259(1)
Objectives
259(1)
Background / Scenario
259(1)
Instructions
260(1)
Part 1 Use SSH to Remotely Access Network Devices
260(1)
Part 2 Use LLDP to Discover Neighboring Devices
261(3)
10.3.4 Packet Tracer---Configure and Verify NTP
264(2)
Addressing Table
264(1)
Objectives
264(1)
Background / Scenario
264(1)
Instructions
264(2)
10.4.10 Lab---Research Network Monitoring Software
266(3)
Objectives
266(1)
Background / Scenario
266(1)
Required Resources
266(1)
Instructions
266(1)
Part 1 Survey Your Understanding of Network Monitoring
266(1)
Part 2 Research Network Monitoring Tools
266(1)
Part 3 Select a Network Monitoring Tool
267(1)
Reflection Question
268(1)
10.6.10 Packet Tracer---Back Up Configuration Files
269(2)
Objectives
269(1)
Background / Scenario
269(1)
Instructions
269(1)
Part 1 Establish Connectivity to the TFTP Server
269(1)
Part 2 Transfer the Configuration File from the TFTP Server
269(1)
Part 3 Back Up Configuration and IOS to TFTP Server
270(1)
10.6.11 Lab---Use Tera Term to Manage Router Configuration Files
271(6)
Topology
271(1)
Addressing Table
271(1)
Objectives
271(1)
Background / Scenario
271(1)
Required Resources
272(1)
Part 1 Configure Basic Device Settings
272(1)
Part 2 Create a Backup Configuration File
273(1)
Part 3 Use a Backup Configuration File to Restore a Router and Switch Configuration
273(2)
Reflection Question
275(1)
Router Interface Summary Table
275(2)
10.6.12 Lab---Use TFTP, Flash, and USB to Manage Configuration Files
277(13)
Topology
277(1)
Addressing Table
277(1)
Objectives
277(1)
Background / Scenario
277(1)
Required Resources
278(1)
Instructions
278(1)
Part 1 Build the Network and Configure Basic Device Settings
278(1)
Part 2 Use TFTP to Back Up and Restore the Switch Running Configuration
279(4)
Part 3 Use TFTP to Back Up and Restore the Router Running Configuration
283(1)
Part 4 Back Up and Restore Configurations Using Router Flash Memory
284(2)
Part 5 (Optional) Use a USB Drive to Back Up and Restore the Running Configuration
286(3)
Reflection Questions
289(1)
Router Interface Summary Table
289(1)
10.6.13 Lab---Research Password Recovery Procedures
290(3)
Objectives
290(1)
Background / Scenario
290(1)
Required Resources
290(1)
Instructions
290(1)
Part 1 Research the Configuration Register
290(1)
Part 2 Document the Password Recovery Procedure for a Specific Cisco Router
291(1)
Reflection Question
292(1)
10.7.6 Packet Tracer---Use a TFTP Server to Upgrade a Cisco IOS Image
293(3)
Addressing Table
293(1)
Objectives
293(1)
Scenario
293(1)
Instructions
293(1)
Part 1 Upgrade an IOS Image on a Cisco Device
293(2)
Part 2 Back Up an IOS Image to a TFTP Server
295(1)
10.8.1 Packet Tracer---Configure CDP, LLDP, and NTP
296(2)
Addressing Table
296(1)
Objectives
296(1)
Background / Scenario
296(1)
Instructions
297(1)
10.8.2 Lab---Configure COP, LLDP, and NTP
298(7)
Topology
298(1)
Addressing Table
298(1)
Objectives
298(1)
Background / Scenario
298(1)
Required Resources
299(1)
Part 1 Build the Network and Configure Basic Device Settings
299(1)
Part 2 Network Discovery with CDP
300(2)
Part 3 Network Discovery with LLDP
302(1)
Part 4 Configure NTP
303(1)
Reflection Question
304(1)
Router Interface Summary Table
304(1)
Chapter 11 Network Design
305(14)
Study Guide
306(1)
Hierarchical Networks
306(3)
Video---Three-Layer Network Design
306(1)
Borderless Switched Networks
306(1)
Hierarchy in the Borderless Switched Network
306(2)
Access, Distribution, and Core Layer Functions
308(1)
Check Your Understanding---Hierarchical Networks
308(1)
Scalable Networks
309(1)
Identify Scalability Terminology
309(1)
Check Your Understanding---Scalable Networks
310(1)
Switch Hardware
310(2)
Switch Hardware Features
310(1)
Check Your Understanding---Switch Hardware
311(1)
Router Hardware
312(3)
Router Categories
312(1)
Check Your Understanding---Router Hardware
313(2)
Labs and Activities
315(1)
11.5.1 Packet Tracer---Compare Layer 2 and Layer 3 Devices
315(4)
Objective
315(1)
Background
315(1)
Instructions
315(4)
Chapter 12 Network Troubleshooting
319(30)
Study Guide
320(1)
Network Documentation
320(5)
Documentation Overview
320(1)
Network Topology Diagrams
320(2)
Network Device Documentation
322(2)
Establish a Network Baseline
324(1)
Data Measurement
324(1)
Check Your Understanding---Network Documentation
325(1)
Troubleshooting Process
325(5)
General Troubleshooting Procedures
326(1)
Seven-Step Troubleshooting Process
326(1)
Gather Information
327(1)
Structured Troubleshooting Methods
328(1)
Check Your Understanding---Troubleshooting Process
329(1)
Troubleshooting Tools
330(3)
Identify the Troubleshooting Tool
330(1)
Syslog Server as a Troubleshooting Tool
331(1)
Check Your Understanding---Troubleshooting Tools
332(1)
Symptoms and Causes of Network Problems
333(2)
Isolate the OSI Layer
333(1)
Check Your Understanding---Symptoms and Causes of Network Problems
334(1)
Troubleshooting IP Connectivity
335(1)
Labs and Activities
336(1)
12.5.13 Packet Tracer---Troubleshoot Enterprise Network
336(7)
Objectives
336(1)
Scenario
336(1)
Addressing Table
336(1)
Instructions
337(1)
Part 1 Verify Switching Technologies
337(2)
Part 2 Verify DHCP
339(1)
Part 3 Verify Routing
340(1)
Part 4 Verify WAN Technologies
341(1)
Part 5 Verify Connectivity
342(1)
12.6.1 Packet Tracer---Troubleshooting Challenge---Document the Network
343(3)
Addressing Table
343(1)
Objectives
343(1)
Background / Scenario
343(1)
Instructions
344(1)
Part 1 Test Connectivity
344(1)
Part 2 Discover PC Configuration Information
344(1)
Part 3 Discover Information About the Default Gateway Devices
344(1)
Part 4 Reconstruct the Network Topology
344(1)
Part 5 Further Explore Device Configurations and Interconnections
344(1)
Reflection
345(1)
12.6.2 Packet Tracer---Troubleshooting Challenge---Use Documentation to Solve Issues
346(3)
Addressing Table
346(1)
Objectives
346(1)
Background / Scenario
346(1)
Instructions
347(1)
Part 1 Assess Connectivity
347(1)
Part 2 Access Network Devices
347(1)
Part 3 Repair the Network
347(1)
Part 4 Document the Issues
347(2)
Chapter 13 Network Virtualization
349(14)
Study Guide
350(1)
Cloud Computing
350(1)
Video---Cloud and Virtualization
350(1)
Cloud Computing Terminology
350(1)
Check Your Understanding---Cloud Computing
351(1)
Virtualization and Virtual Network Infrastructure
351(2)
Virtualization Terminology
352(1)
Check Your Understanding---Virtualization and Virtual Network Infrastructure
352(1)
Software-Defined Networking
353(2)
Video---Software-Defined Networking
354(1)
Control Plane and Data Plane
354(1)
Check Your Understanding---Software-Defined Networking
354(1)
Controllers
355(3)
Video---Cisco ACI
355(1)
Types of SDN Controllers
356(1)
Check Your Understanding---Controllers
356(2)
Labs and Activities
358(1)
13.6.1 Lab---Install Linux in a Virtual Machine and Explore the GUI
358(5)
Objectives
358(1)
Background / Scenario
358(1)
Required Resources
358(1)
Instructions
358(1)
Part 1 Prepare a Computer for Virtualization
358(1)
Part 2 Install Ubuntu on the Virtual Machine
359(2)
Part 3 Explore the GUI
361(1)
Reflection Question
362(1)
Chapter 14 Network Automation
363
Study Guide
364(1)
Automation Overview
364(1)
Video---Automation Everywhere
364(1)
Check Your Understanding---Benefits of Automation
364(1)
Data Formats
365(2)
Video---Data Formats
365(1)
Identify the Data Formats
365(1)
Check Your Understanding---Data Formats
366(1)
APIs
367(2)
Video---APIs
367(1)
An API Example
367(1)
Types of Web Service APIs
367(1)
Check Your Understanding---APIs
368(1)
Rest
369(2)
Video---REST
369(1)
RESTful Implementation
369(1)
URI, URN, and URL
369(1)
Anatomy of a RESTful Request
370(1)
Check Your Understanding---REST
370(1)
Configuration Management
371(1)
Video---Configuration Management
371(1)
Compare Ansible, Chef, Puppet, and SaltStack
371(1)
Check Your Understanding---Configuration Management
372(1)
IBN and Cisco DNA Center
372(6)
Video---Intent-Based Networking
373(1)
Intent-Based Networking Overview
373(1)
Network Infrastructure as Fabric
373(2)
Cisco Digital Network Architecture (DNA)
375(1)
Cisco DNA Center
376(1)
Videos---Cisco DNA Center
377(1)
Check Your Understanding---IBN and Cisco DNA Center
377(1)
Labs and Activities
378
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.

Author:

Allan Johnson entered the academic world in 1999, after 10 years as a business owner/operator, to dedicate his efforts to his passion for teaching. He holds both an M.B.A. and an M.Ed. in training and development. He taught CCNA courses at the high school level for 7 years and has taught both CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full time for Cisco Networking Academy as Curriculum Lead.

Technical Reviewer:

Dave Holzinger has been a curriculum developer, project manager, author, and technical editor for Cisco Networking Academy in Phoenix since 2001. Dave works on the team that develops Cisco Networking Academys online curricula, including CCNA, CCNP, and IT Essentials. He has been working with computer hardware and software since 1981. Dave has certifications from Cisco, BICSI, and CompTIA.