Introduction |
|
xxvi | |
|
Chapter 1 Single-Area Ospfv2 Concepts |
|
|
1 | (14) |
|
|
2 | (1) |
|
OSPF Features and Characteristics |
|
|
2 | (3) |
|
|
2 | (1) |
|
|
2 | (1) |
|
Single-Area and Multiarea OSPF |
|
|
3 | (1) |
|
|
3 | (1) |
|
Check Your Understanding---OSPF Features and Characteristics |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Check Your Understanding---OSPF Packets |
|
|
7 | (1) |
|
|
8 | (5) |
|
|
8 | (2) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Check Your Understanding---OSPF Operation |
|
|
11 | (2) |
|
|
13 | (2) |
|
Chapter 2 Single-Area Ospfv2 Configuration |
|
|
15 | (42) |
|
|
16 | (1) |
|
|
16 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Router ID Order of Precedence |
|
|
17 | (1) |
|
Configure a Loopback Interface as the Router ID |
|
|
17 | (1) |
|
Explicitly Configure a Router ID |
|
|
17 | (1) |
|
|
18 | (1) |
|
Check Your Understanding---OSPF Router ID |
|
|
18 | (1) |
|
Point-to-Point OSPF Networks |
|
|
19 | (2) |
|
The network Command Syntax |
|
|
19 | (1) |
|
|
19 | (1) |
|
Configure OSPF Using the network Command |
|
|
19 | (1) |
|
Configure OSPF Using the ip ospf Command |
|
|
20 | (1) |
|
|
20 | (1) |
|
Configure Passive Interfaces |
|
|
20 | (1) |
|
Packet Tracer Exercise 2-1 Point-to-Point Single-Area OSPFv2 Configuration |
|
|
21 | (1) |
|
Multiaccess OSPF Networks |
|
|
21 | (3) |
|
|
21 | (1) |
|
OSPF Multiaccess Reference Topology |
|
|
22 | (1) |
|
Verify OSPF Multiaccess Router Roles |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
Modify Single-Area OSPFv2 |
|
|
24 | (4) |
|
|
24 | (1) |
|
Adjust the Reference Bandwidth |
|
|
25 | (1) |
|
|
25 | (1) |
|
Manually Set OSPF Cost Value |
|
|
26 | (1) |
|
|
27 | (1) |
|
Default Route Propagation |
|
|
28 | (1) |
|
Propagate and Verify a Default Route |
|
|
28 | (1) |
|
Packet Tracer Exercise 2-2 Modify a Point-to-Point Single-Area OSPFv2 Configuration |
|
|
28 | (1) |
|
Verify Single-Area OSPFv2 |
|
|
29 | (4) |
|
|
29 | (1) |
|
Verify OSPF Protocol Settings |
|
|
30 | (1) |
|
Verify OSPF Process Information |
|
|
31 | (1) |
|
Verify OSPF Interface Settings |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
33 | (1) |
|
2.2.13 Packet Tracer---Point-to-Point Single-Area OSPFv2 Configuration |
|
|
34 | (3) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
Part 1 Configure Router IDs |
|
|
34 | (1) |
|
Part 2 Configure Networks for OSPF Routing |
|
|
35 | (1) |
|
Part 3 Configure Passive Interfaces |
|
|
36 | (1) |
|
Part 4 Verify OSPF Configuration |
|
|
36 | (1) |
|
2.3.11 Packet Tracer---Determine the DR and BDR |
|
|
37 | (4) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
Part 1 Examine DR and BDR Changing Roles |
|
|
37 | (2) |
|
Part 2 Modify OSPF Priority and Force Elections |
|
|
39 | (2) |
|
2.4.11 Packet Tracer---Modify Single-Area OSPFv2 |
|
|
41 | (3) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Part 1 Modify OSPF Default Settings |
|
|
41 | (2) |
|
Part 2 Verify Connectivity |
|
|
43 | (1) |
|
2.5.3 Packet Tracer---Propagate a Default Route in OSPFv2 |
|
|
44 | (2) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
Part 1 Propagate a Default Route |
|
|
44 | (1) |
|
Part 2 Verify Connectivity |
|
|
45 | (1) |
|
2.6.6 Packet Tracer---Verify Single-Area OSPFv2 |
|
|
46 | (4) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Part 1 Verify the Existing OSPFv2 Network Operation |
|
|
47 | (2) |
|
Part 2 Add the New Branch Office LAN to the OSPFv2 Network |
|
|
49 | (1) |
|
2.7.1 Packet Tracer---Single-Area OSPFv2 Configuration |
|
|
50 | (2) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
2.7.2 Lab---Configure Single-Area OSPFv2 |
|
|
52 | (5) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
Part 1 Build the Network and Configure Basic Device Settings |
|
|
53 | (1) |
|
Part 2 Configure and Verify Single-Area OSPFv2 for Basic Operation |
|
|
54 | (1) |
|
Part 3 Optimize the Single-Area OSPFv2 Configuration |
|
|
54 | (1) |
|
Router Interface Summary Table |
|
|
55 | (2) |
|
Chapter 3 Network Security Concepts |
|
|
57 | (44) |
|
|
58 | (1) |
|
Current State of Cybersecurity |
|
|
58 | (2) |
|
|
58 | (1) |
|
Vectors of Network Attacks |
|
|
58 | (1) |
|
|
59 | (1) |
|
Check Your Understanding---Current State of Cybersecurity |
|
|
59 | (1) |
|
|
60 | (2) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Check Your Understanding---Threat Actors |
|
|
61 | (1) |
|
|
62 | (3) |
|
Video---Threat Actor Tools |
|
|
62 | (1) |
|
Evolution of Security Tools |
|
|
62 | (1) |
|
|
63 | (1) |
|
Check Your Understanding---Threat Actor Tools |
|
|
64 | (1) |
|
|
65 | (3) |
|
Viruses and Trojan Horses |
|
|
65 | (1) |
|
|
66 | (1) |
|
Check Your Understanding---Malware |
|
|
66 | (2) |
|
|
68 | (3) |
|
Overview of Network Attacks |
|
|
68 | (1) |
|
Video---Reconnaissance Attacks |
|
|
68 | (1) |
|
|
68 | (1) |
|
Video---Access and Social Engineering Attacks |
|
|
69 | (1) |
|
|
69 | (1) |
|
Social Engineering Attacks |
|
|
69 | (1) |
|
Video---Denial of Service Attacks |
|
|
70 | (1) |
|
|
70 | (1) |
|
Check Your Understanding---Common Network Attacks |
|
|
70 | (1) |
|
IP Vulnerabilities and Threats |
|
|
71 | (4) |
|
Video---Common IP and ICMP Attacks |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Video---Amplification, Reflection, and Spoofing Attacks |
|
|
72 | (1) |
|
Amplification and Reflection Attacks |
|
|
72 | (1) |
|
|
73 | (1) |
|
Check Your Understanding---IP Vulnerabilities and Threats |
|
|
74 | (1) |
|
TCP and UDP Vulnerabilities |
|
|
75 | (3) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
Check Your Understanding---TCP and UDP Vulnerabilities |
|
|
77 | (1) |
|
|
78 | (3) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Network Security Best Practices |
|
|
81 | (4) |
|
Confidentiality, Integrity, and Availability (CIA) |
|
|
81 | (1) |
|
The Defense-in-Depth Approach |
|
|
81 | (1) |
|
|
82 | (1) |
|
Content Security Appliances |
|
|
83 | (1) |
|
Check Your Understanding---Network Security Best Practices |
|
|
84 | (1) |
|
|
85 | (6) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
Check Your Understanding---Cryptography |
|
|
89 | (2) |
|
|
91 | (1) |
|
3.5.7 Lab---Social Engineering |
|
|
91 | (2) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
3.8.8 Lab---Explore DNS Traffic |
|
|
93 | (8) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
93 | (6) |
|
|
99 | (2) |
|
|
101 | (12) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Check Your Understanding---Purpose of ACLs |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Wildcard Mask Calculation |
|
|
104 | (1) |
|
|
105 | (1) |
|
Check Your Understanding---Wildcard Masks in ACLs |
|
|
105 | (1) |
|
Guidelines for ACL Creation |
|
|
106 | (1) |
|
Limited Number of ACLs per Interface |
|
|
106 | (1) |
|
|
107 | (1) |
|
Check Your Understanding---Guidelines for ACL Creation |
|
|
107 | (1) |
|
|
107 | (3) |
|
Standard and Extended ACLs |
|
|
108 | (1) |
|
|
108 | (1) |
|
Standard and Extended ACL Placement |
|
|
108 | (1) |
|
Check Your Understanding---Types of IPv4 ACLs |
|
|
109 | (1) |
|
|
110 | (1) |
|
4.1.4 Packet Tracer---Access Control List Demonstration |
|
|
110 | (3) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
Part 1 Verify Local Connectivity and Test Access Control List |
|
|
110 | (1) |
|
Part 2 Remove the ACL and Repeat the Test |
|
|
111 | (2) |
|
Chapter 5 Acls For Ipv4 Configuration |
|
|
113 | (42) |
|
|
114 | (1) |
|
Configure Standard IPv4 ACLs |
|
|
114 | (3) |
|
|
114 | (1) |
|
Numbered Standard IPv4 ACLs |
|
|
114 | (1) |
|
Apply a Standard IPv4 ACL |
|
|
115 | (1) |
|
|
115 | (1) |
|
Standard IPv4 ACL Scenarios |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Secure VTY Ports with a Standard IPv4 ACL |
|
|
118 | (1) |
|
|
118 | (1) |
|
Secure VTP Access Example |
|
|
118 | (1) |
|
Configure Extended IPv4 ACLs |
|
|
118 | (6) |
|
|
119 | (1) |
|
Numbered Extended IPv4 ACLs |
|
|
119 | (1) |
|
Numbered Extended ACL Configuration Scenarios |
|
|
119 | (1) |
|
Evaluate Extended IPv4 ACL Statements |
|
|
120 | (2) |
|
|
122 | (2) |
|
|
124 | (1) |
|
|
124 | (1) |
|
5.1.8 Packet Tracer---Configure Numbered Standard IPv4 ACLs |
|
|
125 | (3) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
Part 1 Plan an ACL Implementation |
|
|
125 | (1) |
|
Part 2 Configure, Apply, and Verify a Standard ACL |
|
|
126 | (2) |
|
5.1.9 Packet Tracer---Configure Named Standard IPv4 ACLs |
|
|
128 | (2) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Part 1 Configure and Apply a Named Standard ACL |
|
|
128 | (1) |
|
Part 2 Verify the ACL Implementation |
|
|
129 | (1) |
|
5.2.7 Packet Tracer---Configure and Modify Standard IPv4 ACLs |
|
|
130 | (7) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Part 1 Verify Connectivity |
|
|
131 | (1) |
|
Part 2 Configure and Verify Standard Numbered and Named ACLs |
|
|
131 | (4) |
|
Part 3 Modify a Standard ACL |
|
|
135 | (1) |
|
|
136 | (1) |
|
5.4.12 Packet Tracer---Configure Extended ACLs---Scenario 1 |
|
|
137 | (5) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
Part 1 Configure, Apply, and Verify an Extended Numbered ACL |
|
|
137 | (3) |
|
Part 2 Configure, Apply, and Verify an Extended Named ACL |
|
|
140 | (2) |
|
5.4.13 Packet Tracer---Configure Extended IPv4 ACLs---Scenario 2 |
|
|
142 | (4) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
142 | (1) |
|
Part 1 Configure a Named Extended ACL |
|
|
142 | (2) |
|
Part 2 Apply and Verify the Extended ACL |
|
|
144 | (2) |
|
5.5.1 Packet Tracer---IPv4 ACL Implementation Challenge |
|
|
146 | (3) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (3) |
|
5.5.2 Lab---Configure and Verify Extended IPv4 ACLs |
|
|
149 | (6) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
Part 1 Build the Network and Configure Basic Device Settings |
|
|
150 | (1) |
|
Part 2 Configure VLANs on the Switches |
|
|
151 | (1) |
|
Part 3 Configure Trunking |
|
|
151 | (1) |
|
|
152 | (1) |
|
Part 5 Configure Remote Access |
|
|
152 | (1) |
|
Part 6 Verify Connectivity |
|
|
153 | (1) |
|
Part 7 Configure and Verify Extended Access Control Lists |
|
|
153 | (2) |
|
|
155 | (30) |
|
|
156 | (1) |
|
|
156 | (1) |
|
IPv4 Private Address Space |
|
|
156 | (1) |
|
|
156 | (1) |
|
Check Your Understanding---NAT Characteristics |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
NAT Advantages and Disadvantages |
|
|
158 | (1) |
|
Check Your Understanding---NAT Advantages and Disadvantages |
|
|
159 | (1) |
|
|
159 | (2) |
|
|
159 | (1) |
|
Packet Tracer Exercise 6-1 Configure Static NAT |
|
|
160 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Packet Tracer Exercise 6-2 Configure Dynamic NAT |
|
|
162 | (1) |
|
|
162 | (3) |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
6.2.7 Packet Tracer---Investigate NAT Operations |
|
|
166 | (4) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Part 1 Investigate NAT Operation Across the Intranet |
|
|
167 | (1) |
|
Part 2 Investigate NAT Operation Across the Internet |
|
|
168 | (1) |
|
Part 3 Conduct Further Investigations |
|
|
169 | (1) |
|
6.4.5 Packet Tracer---Configure Static NAT |
|
|
170 | (2) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
Part 1 Test Access Without NAT |
|
|
170 | (1) |
|
Part 2 Configure Static NAT |
|
|
171 | (1) |
|
Part 3 Test Access with NAT |
|
|
171 | (1) |
|
6.5.6 Packet Tracer---Configure Dynamic NAT |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
Part 1 Configure Dynamic NAT |
|
|
172 | (1) |
|
Part 2 Verify NAT Implementation |
|
|
172 | (1) |
|
6.6.7 Packet Tracer---Configure PAT |
|
|
173 | (2) |
|
|
173 | (1) |
|
Part 1 Configure Dynamic NAT with Overload |
|
|
173 | (1) |
|
Part 2 Verify Dynamic NAT with Overload Implementation |
|
|
173 | (1) |
|
Part 3 Configure PAT Using an Interface |
|
|
174 | (1) |
|
Part 4 Verify PAT Interface Implementation |
|
|
174 | (1) |
|
6.8.1 Packet Tracer---Configure NAT for IPv4 |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
6.8.2 Lab---Configure NAT for IPv4 |
|
|
176 | (9) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Part 1 Build the Network and Configure Basic Device Settings |
|
|
177 | (1) |
|
Part 2 Configure and Verify NAT for IPv4 |
|
|
178 | (2) |
|
Part 3 Configure and Verify PAT for IPv4 |
|
|
180 | (3) |
|
Part 4 Configure and Verify Static NAT for IPv4 |
|
|
183 | (1) |
|
Router Interface Summary Table |
|
|
184 | (1) |
|
|
185 | (18) |
|
|
186 | (1) |
|
|
186 | (2) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Check Your Understanding---Purpose of WANs |
|
|
188 | (1) |
|
|
188 | (3) |
|
|
188 | (1) |
|
WAN Terminology and Devices |
|
|
189 | (1) |
|
Check Your Understanding---WAN Operations |
|
|
190 | (1) |
|
Traditional WAN Connectivity |
|
|
191 | (2) |
|
Traditional WAN Connectivity Options |
|
|
191 | (1) |
|
|
191 | (1) |
|
Legacy Switched WAN Options |
|
|
192 | (1) |
|
Check Your Understanding---Traditional WAN Connectivity |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
Modern WAN Connectivity Options |
|
|
194 | (1) |
|
Check Your Understanding---Modern WAN Connectivity |
|
|
194 | (1) |
|
Internet-Based Connectivity |
|
|
194 | (2) |
|
Internet-Based Connectivity Terminology |
|
|
194 | (2) |
|
|
196 | (3) |
|
7.5.11 Lab---Research Broadband Internet Access Technologies |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
Part 1 Investigate Broadband Distribution |
|
|
196 | (1) |
|
Part 2 Research Broadband Access Options for Specific Scenarios |
|
|
197 | (1) |
|
|
198 | (1) |
|
7.6.1 Packet Tracer---WAN Concepts |
|
|
199 | (4) |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
199 | (1) |
|
Part 1 Investigate Consumer WAN Technologies for Home and Mobile Devices |
|
|
199 | (2) |
|
Part 2 Explore Connectivity |
|
|
201 | (2) |
|
Chapter 8 Vpn And Ipsec Concepts |
|
|
203 | (18) |
|
|
204 | (1) |
|
|
204 | (3) |
|
|
204 | (1) |
|
|
204 | (1) |
|
Site-to-Site and Remote-Access VPNs |
|
|
205 | (1) |
|
Enterprise and Service Provider VPNs |
|
|
205 | (1) |
|
Check Your Understanding---VPN Technology |
|
|
206 | (1) |
|
|
207 | (4) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
IPsec Virtual Tunnel Interface |
|
|
210 | (1) |
|
Service Provider MPLS VPNs |
|
|
210 | (1) |
|
Check Your Understanding---Types of VPNs |
|
|
210 | (1) |
|
|
211 | (8) |
|
|
211 | (1) |
|
|
211 | (2) |
|
IPsec Protocol Encapsulation |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Secure Key Exchange with Diffie-Hellman |
|
|
215 | (1) |
|
Video---IPsec Transport and Tunnel Mode |
|
|
216 | (1) |
|
Check Your Understanding---IPsec |
|
|
216 | (3) |
|
|
219 | (2) |
|
|
221 | (16) |
|
|
222 | (1) |
|
Network Transmission Quality |
|
|
222 | (2) |
|
Video Tutorial---The Purpose of QoS |
|
|
222 | (1) |
|
Network Transmission Quality Terminology |
|
|
222 | (1) |
|
Check Your Understanding---Network Transmission Quality |
|
|
223 | (1) |
|
|
224 | (1) |
|
Video Tutorial---Traffic Characteristics |
|
|
224 | (1) |
|
|
224 | (1) |
|
Check Your Understanding---Traffic Characteristics |
|
|
224 | (1) |
|
|
225 | (4) |
|
Video Tutorial---QoS Algorithms |
|
|
225 | (1) |
|
Identify the Queuing Algorithm |
|
|
225 | (2) |
|
Queuing Algorithm Characteristics |
|
|
227 | (1) |
|
Check Your Understanding---Queuing Algorithms |
|
|
228 | (1) |
|
|
229 | (2) |
|
Video Tutorial---QoS Models |
|
|
229 | (1) |
|
QoS Model Characteristics |
|
|
229 | (1) |
|
Check Your Understanding---QoS Models |
|
|
230 | (1) |
|
QoS Implementation Techniques |
|
|
231 | (5) |
|
Video Tutorial---QoS Implementation Techniques |
|
|
231 | (1) |
|
QoS Implementation Techniques Overview |
|
|
231 | (1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
232 | (1) |
|
QoS Mechanism Terminology |
|
|
233 | (2) |
|
Check Your Understanding---QoS Implementation Techniques |
|
|
235 | (1) |
|
|
236 | (1) |
|
Chapter 10 Network Management |
|
|
237 | (68) |
|
|
238 | (1) |
|
Device Discovery with CDP and LLDP |
|
|
238 | (3) |
|
|
238 | (1) |
|
Configure and Verify LLDP |
|
|
239 | (1) |
|
Draw and Label the Network Topology |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (2) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (2) |
|
|
245 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
Check Your Understanding---Syslog Operation |
|
|
246 | (1) |
|
Router and Switch File Maintenance |
|
|
247 | (4) |
|
|
247 | (2) |
|
Use a Text File to Back Up a Configuration |
|
|
249 | (1) |
|
Use a Text File to Restore a Configuration |
|
|
250 | (1) |
|
Use TFTP to Back Up and Restore a Configuration |
|
|
250 | (1) |
|
Use USB to Back Up and Restore a Configuration |
|
|
251 | (1) |
|
Password Recovery Procedures |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (3) |
|
Video---Managing Cisco IOS Images |
|
|
252 | (1) |
|
Back Up an IOS Image to a TFTP Server |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
254 | (1) |
|
10.1.5 Packet Tracer---Use CDP to Map a Network |
|
|
255 | (4) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Part 1 Use SSH to Remotely Access Network Devices |
|
|
256 | (1) |
|
Part 2 Use CDP to Discover Neighboring Devices |
|
|
256 | (3) |
|
10.2.6 Packet Tracer---Use LLDP to Map a Network |
|
|
259 | (5) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
|
260 | (1) |
|
Part 1 Use SSH to Remotely Access Network Devices |
|
|
260 | (1) |
|
Part 2 Use LLDP to Discover Neighboring Devices |
|
|
261 | (3) |
|
10.3.4 Packet Tracer---Configure and Verify NTP |
|
|
264 | (2) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (2) |
|
10.4.10 Lab---Research Network Monitoring Software |
|
|
266 | (3) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
Part 1 Survey Your Understanding of Network Monitoring |
|
|
266 | (1) |
|
Part 2 Research Network Monitoring Tools |
|
|
266 | (1) |
|
Part 3 Select a Network Monitoring Tool |
|
|
267 | (1) |
|
|
268 | (1) |
|
10.6.10 Packet Tracer---Back Up Configuration Files |
|
|
269 | (2) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
Part 1 Establish Connectivity to the TFTP Server |
|
|
269 | (1) |
|
Part 2 Transfer the Configuration File from the TFTP Server |
|
|
269 | (1) |
|
Part 3 Back Up Configuration and IOS to TFTP Server |
|
|
270 | (1) |
|
10.6.11 Lab---Use Tera Term to Manage Router Configuration Files |
|
|
271 | (6) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Part 1 Configure Basic Device Settings |
|
|
272 | (1) |
|
Part 2 Create a Backup Configuration File |
|
|
273 | (1) |
|
Part 3 Use a Backup Configuration File to Restore a Router and Switch Configuration |
|
|
273 | (2) |
|
|
275 | (1) |
|
Router Interface Summary Table |
|
|
275 | (2) |
|
10.6.12 Lab---Use TFTP, Flash, and USB to Manage Configuration Files |
|
|
277 | (13) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
Part 1 Build the Network and Configure Basic Device Settings |
|
|
278 | (1) |
|
Part 2 Use TFTP to Back Up and Restore the Switch Running Configuration |
|
|
279 | (4) |
|
Part 3 Use TFTP to Back Up and Restore the Router Running Configuration |
|
|
283 | (1) |
|
Part 4 Back Up and Restore Configurations Using Router Flash Memory |
|
|
284 | (2) |
|
Part 5 (Optional) Use a USB Drive to Back Up and Restore the Running Configuration |
|
|
286 | (3) |
|
|
289 | (1) |
|
Router Interface Summary Table |
|
|
289 | (1) |
|
10.6.13 Lab---Research Password Recovery Procedures |
|
|
290 | (3) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Part 1 Research the Configuration Register |
|
|
290 | (1) |
|
Part 2 Document the Password Recovery Procedure for a Specific Cisco Router |
|
|
291 | (1) |
|
|
292 | (1) |
|
10.7.6 Packet Tracer---Use a TFTP Server to Upgrade a Cisco IOS Image |
|
|
293 | (3) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
Part 1 Upgrade an IOS Image on a Cisco Device |
|
|
293 | (2) |
|
Part 2 Back Up an IOS Image to a TFTP Server |
|
|
295 | (1) |
|
10.8.1 Packet Tracer---Configure CDP, LLDP, and NTP |
|
|
296 | (2) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (1) |
|
10.8.2 Lab---Configure COP, LLDP, and NTP |
|
|
298 | (7) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
Part 1 Build the Network and Configure Basic Device Settings |
|
|
299 | (1) |
|
Part 2 Network Discovery with CDP |
|
|
300 | (2) |
|
Part 3 Network Discovery with LLDP |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
Router Interface Summary Table |
|
|
304 | (1) |
|
Chapter 11 Network Design |
|
|
305 | (14) |
|
|
306 | (1) |
|
|
306 | (3) |
|
Video---Three-Layer Network Design |
|
|
306 | (1) |
|
Borderless Switched Networks |
|
|
306 | (1) |
|
Hierarchy in the Borderless Switched Network |
|
|
306 | (2) |
|
Access, Distribution, and Core Layer Functions |
|
|
308 | (1) |
|
Check Your Understanding---Hierarchical Networks |
|
|
308 | (1) |
|
|
309 | (1) |
|
Identify Scalability Terminology |
|
|
309 | (1) |
|
Check Your Understanding---Scalable Networks |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
310 | (1) |
|
Check Your Understanding---Switch Hardware |
|
|
311 | (1) |
|
|
312 | (3) |
|
|
312 | (1) |
|
Check Your Understanding---Router Hardware |
|
|
313 | (2) |
|
|
315 | (1) |
|
11.5.1 Packet Tracer---Compare Layer 2 and Layer 3 Devices |
|
|
315 | (4) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
315 | (4) |
|
Chapter 12 Network Troubleshooting |
|
|
319 | (30) |
|
|
320 | (1) |
|
|
320 | (5) |
|
|
320 | (1) |
|
Network Topology Diagrams |
|
|
320 | (2) |
|
Network Device Documentation |
|
|
322 | (2) |
|
Establish a Network Baseline |
|
|
324 | (1) |
|
|
324 | (1) |
|
Check Your Understanding---Network Documentation |
|
|
325 | (1) |
|
|
325 | (5) |
|
General Troubleshooting Procedures |
|
|
326 | (1) |
|
Seven-Step Troubleshooting Process |
|
|
326 | (1) |
|
|
327 | (1) |
|
Structured Troubleshooting Methods |
|
|
328 | (1) |
|
Check Your Understanding---Troubleshooting Process |
|
|
329 | (1) |
|
|
330 | (3) |
|
Identify the Troubleshooting Tool |
|
|
330 | (1) |
|
Syslog Server as a Troubleshooting Tool |
|
|
331 | (1) |
|
Check Your Understanding---Troubleshooting Tools |
|
|
332 | (1) |
|
Symptoms and Causes of Network Problems |
|
|
333 | (2) |
|
|
333 | (1) |
|
Check Your Understanding---Symptoms and Causes of Network Problems |
|
|
334 | (1) |
|
Troubleshooting IP Connectivity |
|
|
335 | (1) |
|
|
336 | (1) |
|
12.5.13 Packet Tracer---Troubleshoot Enterprise Network |
|
|
336 | (7) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
Part 1 Verify Switching Technologies |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
340 | (1) |
|
Part 4 Verify WAN Technologies |
|
|
341 | (1) |
|
Part 5 Verify Connectivity |
|
|
342 | (1) |
|
12.6.1 Packet Tracer---Troubleshooting Challenge---Document the Network |
|
|
343 | (3) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Part 2 Discover PC Configuration Information |
|
|
344 | (1) |
|
Part 3 Discover Information About the Default Gateway Devices |
|
|
344 | (1) |
|
Part 4 Reconstruct the Network Topology |
|
|
344 | (1) |
|
Part 5 Further Explore Device Configurations and Interconnections |
|
|
344 | (1) |
|
|
345 | (1) |
|
12.6.2 Packet Tracer---Troubleshooting Challenge---Use Documentation to Solve Issues |
|
|
346 | (3) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
346 | (1) |
|
|
347 | (1) |
|
Part 1 Assess Connectivity |
|
|
347 | (1) |
|
Part 2 Access Network Devices |
|
|
347 | (1) |
|
Part 3 Repair the Network |
|
|
347 | (1) |
|
Part 4 Document the Issues |
|
|
347 | (2) |
|
Chapter 13 Network Virtualization |
|
|
349 | (14) |
|
|
350 | (1) |
|
|
350 | (1) |
|
Video---Cloud and Virtualization |
|
|
350 | (1) |
|
Cloud Computing Terminology |
|
|
350 | (1) |
|
Check Your Understanding---Cloud Computing |
|
|
351 | (1) |
|
Virtualization and Virtual Network Infrastructure |
|
|
351 | (2) |
|
Virtualization Terminology |
|
|
352 | (1) |
|
Check Your Understanding---Virtualization and Virtual Network Infrastructure |
|
|
352 | (1) |
|
Software-Defined Networking |
|
|
353 | (2) |
|
Video---Software-Defined Networking |
|
|
354 | (1) |
|
Control Plane and Data Plane |
|
|
354 | (1) |
|
Check Your Understanding---Software-Defined Networking |
|
|
354 | (1) |
|
|
355 | (3) |
|
|
355 | (1) |
|
|
356 | (1) |
|
Check Your Understanding---Controllers |
|
|
356 | (2) |
|
|
358 | (1) |
|
13.6.1 Lab---Install Linux in a Virtual Machine and Explore the GUI |
|
|
358 | (5) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
Part 1 Prepare a Computer for Virtualization |
|
|
358 | (1) |
|
Part 2 Install Ubuntu on the Virtual Machine |
|
|
359 | (2) |
|
|
361 | (1) |
|
|
362 | (1) |
|
Chapter 14 Network Automation |
|
|
363 | |
|
|
364 | (1) |
|
|
364 | (1) |
|
Video---Automation Everywhere |
|
|
364 | (1) |
|
Check Your Understanding---Benefits of Automation |
|
|
364 | (1) |
|
|
365 | (2) |
|
|
365 | (1) |
|
Identify the Data Formats |
|
|
365 | (1) |
|
Check Your Understanding---Data Formats |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
367 | (1) |
|
|
367 | (1) |
|
Types of Web Service APIs |
|
|
367 | (1) |
|
Check Your Understanding---APIs |
|
|
368 | (1) |
|
|
369 | (2) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Anatomy of a RESTful Request |
|
|
370 | (1) |
|
Check Your Understanding---REST |
|
|
370 | (1) |
|
|
371 | (1) |
|
Video---Configuration Management |
|
|
371 | (1) |
|
Compare Ansible, Chef, Puppet, and SaltStack |
|
|
371 | (1) |
|
Check Your Understanding---Configuration Management |
|
|
372 | (1) |
|
|
372 | (6) |
|
Video---Intent-Based Networking |
|
|
373 | (1) |
|
Intent-Based Networking Overview |
|
|
373 | (1) |
|
Network Infrastructure as Fabric |
|
|
373 | (2) |
|
Cisco Digital Network Architecture (DNA) |
|
|
375 | (1) |
|
|
376 | (1) |
|
Videos---Cisco DNA Center |
|
|
377 | (1) |
|
Check Your Understanding---IBN and Cisco DNA Center |
|
|
377 | (1) |
|
|
378 | |