Muutke küpsiste eelistusi

Routing Protocols Companion Guide [Kõva köide]

  • Formaat: Hardback, 792 pages, kõrgus x laius x paksus: 235x209x39 mm, kaal: 1544 g
  • Sari: Companion Guide
  • Ilmumisaeg: 06-Mar-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133237
  • ISBN-13: 9781587133237
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 792 pages, kõrgus x laius x paksus: 235x209x39 mm, kaal: 1544 g
  • Sari: Companion Guide
  • Ilmumisaeg: 06-Mar-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133237
  • ISBN-13: 9781587133237

Routing Protocols Companion Guide is the official supplemental textbook for the Routing Protocols course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of routers, and explains the principles of routing and routing protocols. You learn how to configure a router for basic and advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and resolve common issues with RIPv1, RIPv2, EIGRP, and OSPF in both IPv4 and IPv6 networks.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with more than 150 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
  • How To–Look for this icon to study the steps you need to learn to perform certain tasks.
  • Interactive Activities–Reinforce your understanding of topics by doing all the exercises from the online course identified throughout the book with this icon.
  • Videos–Watch the videos embedded within the online course.
  • Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs–Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual.

Introduction xxiv
Chapter 1 Routing Concepts
1(72)
Objectives
1(1)
Key Terms
1(2)
Introduction (1.0.1.1)
3(1)
Initial Configuration of a Router (1.1)
4(8)
Characteristics of a Network (1.1.1.1)
4(1)
Why Routing? (1.1.1.2)
5(1)
Routers Are Computers (1.1.1.3)
6(1)
Routers Interconnect Networks (1.1.1.4)
7(2)
Routers Choose Best Paths (1.1.1.5)
9(1)
Packet Forwarding Mechanisms (1.1.1.6)
9(3)
Connect Devices (1.1.2)
12(10)
Connect to a Network (1.1.2.1)
13(1)
Default Gateways (1.1.2.2)
14(1)
Document Network Addressing (1.1.2.3)
15(1)
Enable IP on a Host (1.1.2.4)
16(2)
Device LEDs (1.1.2.5)
18(1)
Console Access (1.1.2.6)
19(1)
Enable IP on a Switch (1.1.2.7)
20(2)
Basic Settings on a Router (1.1.3)
22(7)
Configure Basic Router Settings (1.1.3.1)
22(2)
Configure an IPv4 Router Interface (1.1.3.2)
24(1)
Configure an IPv6 Router Interface (1.1.3.3)
25(3)
Configure an IPv4 Loopback Interface (1.1.3.4)
28(1)
Verify Connectivity of Directly Connected Networks (1.1.4)
29(9)
Verify Interface Settings (1.1.4.1)
29(2)
Verify IPv6 Interface Settings (1.1.4.2)
31(3)
Filter Show Command Output (1.1.4.3)
34(2)
Command History Feature (1.1.4.4)
36(2)
Routing Decisions (1.2)
38(5)
Router Switching Function (1.2.1.1)
38(1)
Send a Packet (1.2.1.2)
39(1)
Forward to the Next Hop (1.2.1.3)
40(1)
Packet Routing (1.2.1.4)
41(1)
Reach the Destination (1.2.1.5)
42(1)
Path Determination (1.2.2)
43(4)
Routing Decisions (1.2.2.1)
43(1)
Best Path (1.2.2.2)
44(1)
Load Balancing (1.2.2.3)
45(1)
Administrative Distance (1.2.2.4)
46(1)
Router Operation (1.3)
47(19)
Analyze the Routing Table (1.3.1)
47(1)
The Routing Table (1.3.1.1)
47(1)
Routing Table Sources (1.3.1.2)
48(1)
Remote Network Routing Entries (1.3.1.3)
49(2)
Directly Connected Routes (1.3.2)
51(1)
Directly Connected Interfaces (1.3.2.1)
51(1)
Directly Connected Route Table Entries (1.3.2.2)
51(1)
Directly Connected Examples (1.3.2.3)
52(1)
Directly Connected IPv6 Example (1.3.2.4)
53(3)
Statically Learned Routes (1.3.3)
56(1)
Static Routes (1.3.3.1)
56(1)
Static Route Examples (1.3.3.2)
57(2)
Static IPv6 Route Examples (1.3.3.3)
59(2)
Dynamic Routing Protocols (1.3.4)
61(1)
Dynamic Routing (1.3.4.1)
61(1)
IPv4 Routing Protocols (1.3.4.2)
62(1)
IPv4 Dynamic Routing Examples (1.3.4.3)
63(1)
IPv6 Routing Protocols (1.3.4.4)
64(1)
IPv6 Dynamic Routing Examples (1.3.4.5)
64(2)
Summary (1.4)
66(1)
Practice
67(1)
Class Activities
67(1)
Labs
67(1)
Packet Tracer Activities
67(1)
Check Your Understanding Questions
68(5)
Chapter 2 Static Routing
73(82)
Objectives
73(1)
Key Terms
73(1)
Introduction (2.0.1.1)
74(1)
Static Routing Implementation (2.1)
75(7)
Reach Remote Networks (2.1.1.1)
75(1)
Why Use Static Routing? (2.1.1.2)
76(1)
When to Use Static Routes (2.1.1.3)
77(1)
Static Route Applications (2.1.2.1)
78(1)
Standard Static Route (2.1.2.2)
79(1)
Default Static Route (2.1.2.3)
79(1)
Summary Static Route (2.1.2.4)
80(1)
Floating Static Route (2.1.2.5)
81(1)
Configure Static and Default Routes (2.2)
82(27)
Configure IPv4 Static Routes (2.2.1)
82(1)
IP Route Command (2.2.1.1)
82(2)
Next-Hop Options (2.2.1.2)
84(1)
Configure a Next-Hop Static Route (2.2.1.3)
85(2)
Configure a Directly Connected Static Route (2.2.1.4)
87(2)
Configure a Fully Specified Static Route (2.2.1.5)
89(2)
Verify a Static Route (2.2.1.6)
91(2)
Configure IPv4 Default Routes (2.2.2)
93(1)
Default Static Route (2.2.2.1)
93(1)
Configure a Default Static Route (2.2.2.2)
94(1)
Verify a Default Static Route (2.2.2.3)
94(2)
Configure IPv6 Static Routes (2.2.3)
96(1)
The ipv6 route Command (2.2.3.1)
96(1)
Next-Hop Options (2.2.3.2)
97(3)
Configure a Next-Hop Static IPv6 Route (2.2.3.3)
100(2)
Configure a Directly Connected Static IPv6 Route (2.2.3.4)
102(2)
Configure a Fully Specified Static IPv6 Route (2.2.3.5)
104(1)
Verify IPv6 Static Routes (2.2.3.6)
105(1)
Configure IPv6 Default Routes (2.2.4)
106(1)
Default Static IPv6 Route (2.2.4.1)
106(1)
Configure a Default Static IPv6 Route (2.2.4.2)
107(1)
Verify a Default Static Route (2.2.4.3)
108(1)
Review of CIDR and VLSM (2.3)
109(19)
Classful Addressing (2.3.1)
109(1)
Classful Network Addressing (2.3.1.1)
109(1)
Classful Subnet Masks (2.3.1.2)
110(2)
Classful Routing Protocol Example (2.3.1.3)
112(1)
Classful Addressing Waste (2.3.1.4)
113(1)
CIDR (2.3.2)
114(1)
Classless Inter-Domain Routing (2.3.2.1)
114(1)
Classless Inter-Domain Routing (2.3.2.2)
115(2)
Static Routing CIDR Example (2.3.2.3)
117(1)
Classless Routing Protocol Example (2.3.2.4)
118(1)
VLSM (2.3.3)
119(1)
Fixed-Length Subnet Masking (2.3.3.1)
119(2)
Variable-Length Subnet Masking (2.3.3.2)
121(1)
VLSM in Action (2.3.3.3)
122(1)
Subnetting Subnets (2.3.3.4)
123(2)
VLSM Example (2.3.3.5)
125(3)
Configure Summary and Floating Static Routes (2.4)
128(14)
Configure IPv4 Summary Routes (2.4.1)
128(1)
Route Summarization (2.4.1.1)
128(1)
Calculate a Summary Route (2.4.1.2)
129(1)
Summary Static Route Example (2.4.1.3)
130(3)
Configure IPv6 Summary Routes (2.4.1)
133(1)
Summarize IPv6 Network Addresses (2.4.2.1)
133(1)
Calculate IPv6 Network Addresses (2.4.2.2)
134(3)
Configure an IPv6 Summary Address (2.4.2.3)
137(1)
Configure Floating Static Routes (2.4.3)
138(1)
Floating Static Routes (2.4.3.1)
138(2)
Configure a Floating Static Route (2.4.3.2)
140(1)
Test the Floating Static Route (2.4.3.3)
141(1)
Troubleshoot Static and Default Route Issues (2.5)
142(8)
Packet Processing with Static Routes (2.5.1)
143(1)
Static Routes and Packet Forwarding (2.5.1.1)
143(1)
Troubleshoot IPv4 Static and Default Route Configuration (2.5.2)
144(1)
Troubleshooting a Missing Route (2.5.2.1)
144(3)
Solve a Connectivity Problem (2.5.2.2)
147(3)
Summary (2.6)
150(1)
Practice
151(1)
Class Activities
151(1)
Labs
152(1)
Packet Tracer Activities
152(1)
Check Your Understanding Questions
152(3)
Chapter 3 Routing Dynamically
155(84)
Objectives
155(1)
Key Terms
155(2)
Introduction (3.0.1.1)
157(1)
Dynamic Routing Protocols (3.1)
158(3)
The Evolution of Dynamic Routing Protocols (3.1.1.1)
158(1)
Purpose of Dynamic Routing Protocols (3.1.1.2)
159(1)
The Role of Dynamic Routing Protocols (3.1.1.3)
160(1)
Dynamic versus Static Routing (3.1.2)
161(3)
Using Static Routing (3.1.2.1)
161(1)
Static Routing Scorecard (3.1.2.2)
162(1)
Using Dynamic Routing Protocols (3.1.2.3)
163(1)
Dynamic Routing Scorecard (3.1.2.4)
163(1)
Routing Protocol Operating Fundamentals (3.1.3)
164(7)
Dynamic Routing Protocol Operation (3.1.3.1)
165(1)
Cold Start (3.1.3.2)
165(1)
Network Discovery (3.1.3.3)
166(2)
Exchanging the Routing Information (3.1.3.4)
168(2)
Achieving Convergence (3.1.3.5)
170(1)
Types of Routing Protocols (3.1.4)
171(10)
Classifying Routing Protocols (3.1.4.1)
171(1)
IGP and EGP Routing Protocols (3.1.4.2)
172(1)
Distance Vector Routing Protocols (3.1.4.3)
173(1)
Link-State Routing Protocols (3.1.4.4)
174(1)
Classful Routing Protocols (3.1.4.5)
175(2)
Classless Routing Protocols (3.1.4.6)
177(2)
Routing Protocol Characteristics (3.1.4.7)
179(1)
Routing Protocol Metrics (3.1.4.8)
180(1)
Distance Vector Dynamic Routing (3.2)
181(2)
Distance Vector Technologies (3.2.1.1)
181(1)
Distance Vector Algorithm (3.2.1.2)
182(1)
Types of Distance Vector Routing Protocols (3.2.2)
183(3)
Routing Information Protocol (3.2.2.1)
183(1)
Enhanced Interior Gateway Routing Protocol (3.2.2.2)
184(2)
RIP and RIPng Routing (3.3)
186(14)
Configuring the RIP Protocol (3.3.1)
186(1)
Router RIP Configuration Mode (3.3.1.1)
186(2)
Advertising Networks (3.3.1.2)
188(1)
Examining Default RIP Settings (3.3.1.3)
189(1)
Enabling RIPv2 (3.3.1.4)
190(2)
Disabling Auto Summarization (3.3.1.5)
192(1)
Configuring Passive Interfaces (3.3.1.6)
193(2)
Propagating a Default Route (3.3.1.7)
195(1)
Configuring the RIPng Protocol (3.3.2)
196(1)
Advertising IPv6 Networks (3.3.2.1)
196(2)
Examining the RIPng Configuration (3.3.2.2)
198(2)
Link-State Dynamic Routing (3.4)
200(15)
Link-State Routing Protocol Operation (3.4.1)
200(1)
Shortest Path First Protocols (3.4.1.1)
200(1)
Dijkstra's Algorithm (3.4.1.2)
201(1)
SPF Example (3.4.1.3)
202(1)
Link-State Updates (3.4.2)
203(1)
Link-State Routing Process (3.4.2.1)
203(1)
Link and Link-State (3.4.2.2)
204(3)
Say Hello (3.4.2.3)
207(1)
Building the Link-State Packet (3.4.2.4)
208(1)
Flooding the LSP (3.4.2.5)
209(1)
Building the Link-State Database (3.4.2.6)
210(1)
Building the SPF Tree (3.4.2.7)
211(1)
Adding OSPF Routes to the Routing Table (3.4.2.8)
212(1)
Why Use Link-State Routing Protocols? (3.4.3)
213(1)
Why Use Link-State Protocols? (3.4.3.1)
213(1)
Link-State Protocols Support Multiple Areas (3.4.3.2)
214(1)
Protocols that Use Link-State (3.4.3.3)
214(1)
The Routing Table (3.5)
215(17)
Parts of an IPv4 Route Entry (3.5.1)
215(1)
Routing Table Entries (3.5.1.1)
215(2)
Directly Connected Entries (3.5.1.2)
217(1)
Remote Network Entries (3.5.1.3)
218(1)
Dynamically Learned IPv4 Routes (3.5.2)
219(1)
Routing Table Terms (3.5.2.1)
219(1)
Ultimate Route (3.5.2.2)
220(1)
Level 1 Route (3.5.2.3)
220(1)
Level 1 Parent Route (3.5.2.4)
221(1)
Level 2 Child Route (3.5.2.5)
222(2)
The IPv4 Route Lookup Process (3.5.3)
224(1)
Route Lookup Process (3.5.3.1)
224(2)
Best Route = Longest Match (3.5.3.2)
226(1)
Analyze an IPv6 Routing Table (3.5.4)
227(1)
IPv6 Routing Table Entries (3.5.4.1)
227(1)
Directly Connected Entries (3.5.4.2)
228(2)
Remote IPv6 Network Entries (3.5.4.3)
230(2)
Summary (3.6)
232(1)
Practice
233(1)
Class Activities
233(1)
Lab
233(1)
Packet Tracer Activities
234(1)
Check Your Understanding Questions
234(5)
Chapter 4 Eigrp
239(94)
Objectives
239(1)
Key Terms
239(1)
Introduction (4.0.1)
240(1)
Characteristics of EIGRP (4.1)
240(15)
Basic Features of EIGRP (4.1.1)
240(1)
Features of EIGRP (4.1.1.1)
241(1)
Protocol-Dependent Modules (4.1.1.2)
242(1)
Reliable Transport Protocol (4.1.1.3)
243(1)
Authentication (4.1.1.4)
244(1)
Types of EIGRP Packets (4.1.2)
245(1)
EIGRP Packet Types (4.1.2.1)
245(2)
EIGRP Hello Packets (4.1.2.2)
247(1)
EIGRP Update and Acknowledgment Packets (4.1.2.3)
248(1)
EIGRP Query and Reply Packets (4.1.2.4)
249(2)
EIGRP Messages (4.1.3)
251(1)
Encapsulating EIGRP Messages (4.1.3.1)
251(1)
EIGRP Packet Header and TLV (4.1.3.2)
252(3)
Configuring EIGRP for IPv4 (4.2)
255(22)
Configuring EIGRP with IPv4 (4.2.1)
255(1)
EIGRP Network Topology (4.2.1.1)
255(2)
Autonomous System Numbers (4.2.1.2)
257(2)
The Router EIGRP Command (4.2.1.3)
259(2)
EIGRP Router ID (4.2.1.4)
261(1)
Configuring the EIGRP Router ID (4.2.1.5)
262(2)
The Network Command (4.2.1.6)
264(2)
The Network Command and Wildcard Mask (4.2.1.7)
266(2)
Passive Interface (4.2.1.8)
268(2)
Verifying EIGRP with IPv4 (4.2.2)
270(1)
Verifying EIGRP: Examining Neighbors (4.2.2.1)
270(2)
Verifying EIGRP: show ip protocols Command (4.2.2.2)
272(1)
Verifying EIGRP: Examine the IPv4 Routing Table (4.2.2.3)
273(4)
Operation of EIGRP (4.3)
277(14)
EIGRP Initial Route Discover (4.3.1)
277(1)
EIGRP Neighbor Adjacency (4.3.1.1)
277(1)
EIGRP Topology Table (4.3.1.2)
278(2)
EIGRP Convergence (4.3.1.3)
280(1)
Metrics (4.3.2)
280(1)
EIGRP Composite Metric (4.3.2.1)
281(2)
Examining Interface Values (4.3.2.2)
283(1)
Bandwidth Metric (4.3.2.3)
284(2)
Delay Metric (4.3.2.4)
286(1)
Calculating the EIGRP Metric (4.3.2.5)
287(1)
Calculating the EIGRP Metric: Example (4.3.2.6)
288(2)
Dual and the Topology Table (4.3.3)
290(1)
Dual Concepts (4.3.3.1)
291(1)
Introduction to Dual (4.3.3.2)
291(17)
Successor and Feasible Distance (4.3.3.3)
293(2)
Feasible Successors, Feasibility Condition, and Reported Distance (4.3.3.4)
295(2)
Topology Table: show ip eigrp topology Command (4.3.3.5)
297(3)
Topology Table: No Feasible Successor (4.3.3.7)
300(2)
Dual and Convergence (4.3.4)
302(1)
Dual Finite State Machine (FSM) (4.3.4.1)
302(2)
Dual: Feasible Successor (4.3.4.2)
304(2)
Dual: No Feasible Successor (4.3.4.3)
306(2)
Configuring EIGRP for IPv6 (4.4)
308(18)
EIGRP for IPv4 vs. IPv6 (4.4.1)
308(1)
EIGRP for IPv6 (4.4.1.1)
308(2)
Comparing EIGRP for IPv4 and IPv6 (4.4.1.2)
310(1)
IPv6 Link-local Addresses (4.4.1.3)
311(1)
Configuring EIGRP for IPv6 (4.4.2)
312(1)
EIGRP for IPv6 Network Topology (4.4.2.1)
312(2)
Configuring IPv6 Link-local Addresses (4.4.2.2)
314(2)
Configuring the EIGRP for IPv6 Routing Process (4.4.2.3)
316(2)
ipv6 eigrp Interface Command (4.4.2.4)
318(1)
Verifying EIGRP for IPv6 (4.4.3)
319(1)
Verifying EIGRP for IPv6: Examining Neighbors (4.4.3.1)
319(2)
Verifying EIGRP for IPv6: show ip protocols Command (4.4.3.2)
321(1)
Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (4.4.3.3)
322(4)
Summary (4.5)
326(1)
Practice
327(1)
Class Activities
328(1)
Labs
328(1)
Packet Tracer Activities
328(1)
Check Your Understanding Questions
328(5)
Chapter 5 EIGRP Advanced Configurations and Troubleshooting
333(60)
Objectives
333(1)
Key Terms
333(1)
Introduction (5.0.1.1)
334(1)
Advanced EIGRP Configurations (5.1)
334(11)
Auto-summarization (5.1.1)
335(1)
Network Topology (5.1.1.1)
335(2)
EIGRP Auto-summarization (5.1.1.2)
337(1)
Configuring EIGRP Auto-summarization (5.1.1.3)
338(2)
Verifying Auto-Summary: show ip protocols (5.1.1.4)
340(2)
Verifying Auto-Summary: Topology Table (5.1.1.5)
342(1)
Verifying Auto-Summary: Routing Table (5.1.1.6)
343(2)
Summary Route (5.1.1.7, 5.1.1.8)
345(25)
Manual Summarization (5.1.2)
347(1)
Manual Summary Routes (5.1.2.1)
347(2)
Configuring EIGRP Manual Summary Routes (5.1.2.2)
349(2)
Verifying Manual Summary Routes (5.1.2.3)
351(1)
EIGRP for IPv6: Manual Summary Routes (5.1.2.4)
351(2)
Default Route Propagation (5.1.3)
353(1)
Propagating a Default Static Route (5.1.3.1)
353(2)
Verifying the Propagated Default Route (5.1.3.2)
355(1)
EIGRP for IPv6: Default Route (5.1.3.3)
355(2)
Fine-tuning EIGRP Interfaces (5.1.4)
357(1)
EIGRP Bandwidth Utilization (5.1.4.1)
357(2)
Hello and Hold Timers (5.1.4.2)
359(2)
Load Balancing IPv4 (5.1.4.3)
361(2)
Load Balancing IPv6 (5.1.4.4)
363(1)
Secure EIGRP (5.1.5)
364(1)
Routing Protocol Authentication Overview (5.1.5.1)
364(1)
Configuring EIGRP with MD5 Authentication (5.1.5.2)
365(1)
EIGRP Authentication Example (5.1.5.3)
366(3)
Verify Authentication (5.1.5.4)
369(1)
Troubleshoot EIGRP (5.2)
370(16)
Components of Troubleshooting EIGRP (5.2.1)
370(1)
Basic EIGRP Troubleshooting Commands (5.2.1.1)
370(2)
Components (5.2.1.2)
372(2)
Troubleshoot EIGRP Neighbor Issues (5.2.2)
374(1)
Layer 3 Connectivity (5.2.2.1)
374(1)
EIGRP Parameters (5.2.2.2)
375(1)
EIGRP Interfaces (5.2.2.3)
376(2)
Troubleshooting EIGRP Routing Table Issues (5.2.3)
378(1)
Passive Interface (5.2.3.1)
378(2)
Missing Network Statement (5.2.3.2)
380(2)
Auto-summarization (5.2.3.3)
382(4)
Summary (5.3)
386(2)
Practice
388(1)
Class Activities
388(1)
Labs
388(1)
Packet Tracer Activities
388(1)
Check Your Understanding Questions
389(4)
Chapter 6 Single-Area OSPF
393(68)
Objectives
393(1)
Key Terms
393(1)
Introduction (6.0.1.1)
394(1)
Characteristics of OSPF (6.1)
394(7)
Evolution of OSPF (6.1.1.1)
394(1)
Features of OSPF (6.1.1.2)
395(1)
Components of OSPF (6.1.1.3)
396(2)
Link-State Operation (6.1.1.4)
398(1)
Single-Area and Multiarea OSPF (6.1.1.5)
399(2)
OSPF Messages (6.1.2)
401(5)
Encapsulating OSPF Messages (6.1.2.1)
402(1)
Types of OSPF Packets (6.1.2.2)
402(1)
Hello Packet (6.1.2.3)
403(1)
Hello Packet Intervals (6.1.2.4)
404(1)
Link-State Updates (6.1.2.5)
405(1)
OSPF Operation (6.1.3)
406(8)
OSPF Operational States (6.1.3.1)
406(1)
Establish Neighbor Adjacencies (6.1.3.2)
407(1)
OSPF DR and BDR (6.1.3.3)
408(3)
Synchronizing OSPF Databases (6.1.3.4)
411(3)
Configuring Single-Area OSPFv2 (6.2)
414(6)
OSPF Network Topology (6.2.1.1)
414(1)
Router OSPF Configuration Mode (6.2.1.2)
415(1)
Router IDs (6.2.1.3)
415(2)
Configuring an OSPF Router ID (6.2.1.4)
417(1)
Modifying a Router ID (6.2.1.5)
418(1)
Using a Loopback Interface as the Router ID (6.2.1.6)
419(1)
Configure Single-Area OSPFv2 (6.2.2)
420(15)
Enabling OSPF on Interfaces (6.2.2.1)
420(1)
Wildcard Mask (6.2.2.2)
420(1)
The network Command (6.2.2.3)
421(1)
Passive Interface (6.2.2.4)
422(1)
Configuring Passive Interfaces (6.2.2.5)
423(2)
OSPF Cost (6.2.3)
425(1)
OSPF Metric = Cost (6.2.3.1)
425(1)
OSPF Accumulates Costs (6.2.3.2)
426(1)
Adjusting the Reference Bandwidth (6.2.3.3)
427(3)
Default Interface Bandwidths (6.2.3.4)
430(3)
Adjusting the Interface Bandwidths (6.2.3.5)
433(1)
Manually Setting the OSPF Cost (6.2.3.6)
434(1)
Verify OSPF (6.2.4)
435(4)
Verify OSPF Neighbors (6.2.4.1)
435(1)
Verify OSPF Protocol Settings (6.2.4.2)
436(1)
Verify OSPF Process Information (6.2.4.3)
437(1)
Verify OSPF Interface Settings (6.2.4.4)
438(1)
Configure Single-Area OSPFv3 (6.3)
439(4)
OSPFv3 (6.3.1.1)
439(1)
Similarities Between OSPFv2 and OSPFv3 (6.3.1.2)
440(1)
Differences Between OSPFv2 and OSPFv3 (6.3.1.3)
441(1)
Link-Local Addresses (6.3.1.4)
442(1)
Configuring OSPFv3 (6.3.2)
443(8)
OSPFv3 Network Topology (6.3.2.1)
443(1)
Link-Local Addresses (6.3.2.2)
444(1)
Assigning Link-Local Addresses (6.3.2.3)
445(1)
Configuring the OSPFv3 Router ID (6.3.2.4)
446(3)
Modifying an OSPFv3 Router ID (6.3.2.5)
449(1)
Enabling OSPFv3 on Interfaces (6.3.2.6)
450(1)
Verify OSPFv3 (6.3.3)
451(4)
Verify OSPFv3 Neighbors (6.3.3.1)
451(1)
Verify OSPFv3 Protocol Settings (6.3.3.2)
452(1)
Verify OSPFv3 Interfaces (6.3.3.3)
453(1)
Verify the IPv6 Routing Table (6.3.3.4)
453(2)
Summary (6.4)
455(1)
Practice
456(1)
Class Activities
456(1)
Labs
456(1)
Packet Tracer Activities
456(1)
Check Your Understanding Questions
457(4)
Chapter 7 Adjust and Troubleshoot Single-Area OSPF
461(66)
Objectives
461(1)
Key Terms
461(1)
Introduction (7.0.1.1)
462(1)
Advanced Single-Area OSPF Configurations (7.1)
462(18)
OSPF Network Types (7.1.1.1)
462(3)
Challenges in Multiaccess Networks (7.1.1.2)
465(2)
OSPF Designated Router (7.1.1.3)
467(2)
Verifying DR/BDR Roles (7.1.1.4)
469(3)
Verifying DR/BDR Adjacencies (7.1.1.5)
472(2)
Default DR/BDR Election Process (7.1.1.6)
474(1)
DR/BDR Election Process (7.1.1.7)
475(2)
The OSPF Priority (7.1.1.8)
477(1)
Changing the OSPF Priority (7.1.1.9)
478(2)
Default Route Propagation (7.1.2)
480(5)
Propagating a Default Static Route in OSPFv2 (7.1.2.1)
480(1)
Verifying the Propagated Default Route (7.1.2.2)
481(1)
Propagating a Default Static Route in OSPFv3 (7.1.2.3)
482(2)
Verifying the Propagated IPv6 Default Route (7.1.2.4)
484(1)
Fine-tuning OSPF Interfaces (7.1.3)
485(4)
OSPF Hello and Dead Intervals (7.1.3.1)
485(1)
Modifying OSPFv2 Intervals (7.1.3.2)
486(2)
Modifying OSPFv3 Intervals (7.1.3.3)
488(1)
Secure OSPF (7.1.4)
489(12)
Routers Are Targets (7.1.4.1)
489(3)
Secure Routing Updates (7.1.4.2)
492(3)
MD5 Authentication (7.1.4.3)
495(1)
Configuring OSPF MD5 Authentication (7.1.4.4)
496(1)
OSPF MD5 Authentication Example (7.1.4.5)
497(2)
Verifying OSPF MD5 Authentication (7.1.4.6)
499(2)
Troubleshooting Single-Area OSPF Implementations (7.2)
501(7)
OSPF States (7.2.1.2)
501(1)
OSPF Troubleshooting Commands (7.2.1.3)
502(3)
Components of Troubleshooting OSPF (7.2.1.4)
505(3)
Troubleshoot Single-Area OSPFv2 Routing Issues (7.2.2)
508(6)
Troubleshooting Neighbor Issues (7.2.2.1)
508(3)
Troubleshooting OSPF Routing Table Issues (7.2.2.2)
511(3)
Troubleshoot Single-Area OSPFv3 Routing Issues (7.2.3)
514(7)
OSPFv3 Troubleshooting Commands (7.2.3.1)
514(3)
Troubleshooting OSPFv3 (7.2.3.2)
517(4)
Summary (7.3)
521(2)
Practice
523(1)
Class Activities
523(1)
Labs
523(1)
Packet Tracer Activities
523(1)
Check Your Understanding Questions
524(3)
Chapter 8 Multiarea OSPF
527(38)
Objectives
527(1)
Key Terms
527(1)
Introduction (8.0.1.1)
528(1)
Multiarea OSPF Operation (8.1)
528(6)
Single-Area OSPF (8.1.1.1)
528(1)
Multiarea OSPF (8.1.1.2)
529(1)
OSPF Two-Layer Area Hierarchy (8.1.1.3)
530(2)
Types of OSPF Routers (8.1.1.4)
532(2)
Multiarea OSPF LSA Operation (8.1.2)
534(5)
OSPF LSA Types (8.1.2.1)
534(1)
OSPF LSA Type 1 (8.1.2.2)
535(1)
OSPF LSA Type 2 (8.1.2.3)
536(1)
OSPF LSA Type 3 (8.1.2.4)
536(1)
OSPF LSA Type 4 (8.1.2.5)
537(1)
OSPF LSA Type 5 (8.1.2.6)
538(1)
OSPF Routing Table and Types of Routes (8.1.3)
539(2)
OSPF Routing Table Entries (8.1.3.1)
539(1)
OSPF Route Calculation (8.1.3.2)
540(1)
Configuring Multiarea OSPF (8.2)
541(4)
Implementing Multiarea OSPF (8.2.1.1)
541(1)
Configuring Multiarea OSPF (8.2.1.2)
542(2)
Configuring Multiarea OSPFv3 (8.2.1.3)
544(1)
OSPF Route Summarization (8.2.2.1)
545(1)
Interarea and External Route Summarization (8.2.2.2)
546(2)
Interarea Route Summarization (8.2.2.3)
548(2)
Calculating the Summary Route (8.2.2.4)
550(1)
Configuring Interarea Route Summarization (8.2.2.5)
550(2)
Verifying Multiarea OSPF (8.2.3.1)
552(1)
Verify General Multiarea OSPF Settings (8.2.3.2)
553(1)
Verify the OSPF Routes (8.2.3.3)
554(1)
Verify the Multiarea OSPF LSDB (8.2.3.4)
555(1)
Verify Multiarea OSPFv3 (8.2.3.5)
556(4)
Summary (8.3)
560(2)
Practice
562(1)
Class Activities
562(1)
Labs
562(1)
Packet Tracer Activities
562(1)
Check Your Understanding Questions
562(3)
Chapter 9 Access Control Lists
565(88)
Objectives
565(1)
Key Terms
565(1)
Introduction (9.0.1.1)
566(1)
IP ACL Operation (9.1)
567(24)
Purpose of ACLs (9.1.1)
567(1)
What Is an ACL? (9.1.1.1)
567(1)
A TCP Conversation (9.1.1.2)
568(4)
Packet Filtering (9.1.1.3)
572(1)
Packet Filtering Example (9.1.1.4)
573(1)
ACL Operation (9.1.1.5)
574(1)
Standard Versus Extended IPv4 ACLs (9.1.2)
575(1)
Types of Cisco IPv4 ACLs (9.1.2.1)
575(1)
Numbering and Naming ACLs (9.1.2.2)
576(1)
Wildcard Masks in ACLs (9.1.3)
577(1)
Introducing ACL Wildcard Masking (9.1.3.1)
577(2)
Wildcard Mask Examples (9.1.3.2)
579(2)
Calculating the Wildcard Mask (9.1.3.3)
581(1)
Wildcard Mask Keywords (9.1.3.4)
582(2)
Examples Wildcard Mask Keywords (9.1.3.5)
584(1)
Guidelines for ACL Creation (9.1.4)
584(1)
General Guidelines for Creating ACLs (9.1.4.1)
585(1)
ACL Best Practices (9.1.4.2)
586(1)
Guidelines for ACL Placement (9.1.5)
587(1)
Where to Place ACLs (9.1.5.1)
587(1)
Standard ACL Placement (9.1.5.2)
588(1)
Extended ACL Placement (9.1.5.3)
589(2)
Standard IPv4 ACLs (9.2)
591(23)
Configure Standard IPv4 ACLs (9.2.1)
591(1)
Entering Criteria Statements (9.2.1.1)
591(1)
Standard ACL Logic (9.2.1.2)
592(1)
Configuring a Standard ACL (9.2.1.3)
593(2)
Internal Logic (9.2.1.4)
595(1)
Applying Standard ACLs to Interfaces: Permit a Specific Subnet (9.2.1.5)
596(2)
Applying Standard ACLs to Interfaces: Deny a Specific Host (9.2.1.6)
598(2)
Creating Named Standard ACLs (9.2.1.7)
600(1)
Commenting ACLs (9.2.1.8)
601(2)
Modifying IPv4 ACLs (9.2.2)
603(1)
Editing Standard Numbered ACLs: Using a Text Editor (9.2.2.1)
603(1)
Editing Standard Numbered ACLs: Using the Sequence Number (9.2.2.2)
604(1)
Editing Standard Named ACLs (9.2.2.3)
605(1)
Verifying ACLs (9.2.2.4)
606(1)
ACL Statistics (9.2.2.5)
607(1)
Standard ACL Sequence Numbers (9.2.2.6)
608(3)
Securing VTY Ports with a Standard IPv4 ACL (9.2.3)
611(1)
Configuring a Standard ACL to Secure a VTY Port (9.2.3.1)
611(1)
Verifying a Standard ACL Used to Secure a VTY Port (9.2.3.2)
612(2)
Extended IPv4 ACLs (9.3)
614(11)
Structure of an Extended IPv4 ACL (9.3.1)
614(1)
Extended ACLs: Testing Packets (9.3.1.1)
614(1)
Extended ACLs: Testing Ports and Services (9.3.1.2)
615(1)
Configure Extended IPv4 ACLs (9.3.2)
616(1)
Configuring Extended ACLs (9.3.2.1)
616(2)
Applying Extended ACLs to Interfaces (9.3.2.2)
618(2)
Filtering Traffic with Extended ACLs (9.3.2.3)
620(1)
Creating Named Extended ACLs (9.3.2.4)
621(1)
Verifying Extended ACLs (9.3.2.5)
622(1)
Editing Extended ACLs (9.3.2.6)
623(2)
Troubleshoot ACLs (9.4)
625(10)
Processing Packets with ACLs (9.4.1)
625(1)
Inbound and Outbound ACL Logic (9.4.1.1)
625(2)
ACL Logic Operations (9.4.1.2)
627(1)
Standard ACL Decision Process (9.4.1.3)
628(1)
Extended ACL Decision Process (9.4.1.4)
629(1)
Common ACL Errors (9.4.2)
629(1)
Troubleshooting Common ACL Errors - Example 1 (9.4.2.1)
629(1)
Troubleshooting Common ACL Errors - Example 2 (9.4.2.2)
630(2)
Troubleshooting Common ACL Errors - Example 3 (9.4.2.3)
632(1)
Troubleshooting Common ACL Errors - Example 4 (9.4.2.4)
632(1)
Troubleshooting Common ACL Errors - Example 5 (9.4.2.5)
633(2)
IPv6 ACLs (9.5)
635(11)
IPv6 ACL Creation (9.5.1)
635(1)
Type of IPv6 ACLs (9.5.1.1)
635(1)
Comparing IPv4 and IPv6 ACLs (9.5.1.2)
636(1)
Configuring IPv6 ACLs (9.5.2)
637(1)
Configuring IPv6 Topology (9.5.2.1)
637(2)
Syntax for Configuring IPv6 ACLs (9.5.2.2)
639(2)
Applying an IPv6 ACL to an Interface (9.5.2.3)
641(1)
IPv6 ACL Examples (9.5.2.4)
642(1)
Verifying IPv6 ACLs (9.5.2.5)
643(3)
Summary (9.6)
646(2)
Practice
648(1)
Class Activities
648(1)
Labs
648(1)
Packet Tracer Activities
648(1)
Check Your Understanding Questions
649(4)
Chapter 10 IOS Images and Licensing
653(40)
Objectives
653(1)
Key Terms
653(1)
Introduction (10.0.1.1)
654(1)
Managing IOS System Files (10.1)
654(18)
Naming Conventions (10.1.1)
654(1)
Cisco IOS Software Release Families and Trains (10.1.1.1)
655(1)
Cisco IOS 12.4 Mainline and T Trains (10.1.1.2)
655(2)
Cisco IOS 12.4 Mainline and T Numbering (10.1.1.3)
657(1)
Cisco IOS 12.4 System Image Packaging (10.1.1.4)
658(1)
Cisco IOS 15.0 M and T Trains (10.1.1.5)
659(2)
Cisco IOS 15 Train Numbering (10.1.1.6)
661(1)
IOS 15 System Image Packaging (10.1.1.7)
662(1)
IOS Image Filenames (10.1.1.8)
663(4)
Managing Cisco IOS Images (10.1.2)
667(1)
TFTP Servers as a Backup Location (10.1.2.1)
667(1)
Creating Cisco IOS Image Backup (10.1.2.2)
667(2)
Copying a Cisco IOS Image (10.1.2.3)
669(1)
Boot System (10.1.2.4)
670(2)
IOS Licensing (10.2)
672(13)
Software Licensing (10.2.1)
672(1)
Licensing Overview (10.2.1.1)
672(2)
Licensing Process (10.2.1.2)
674(1)
Step 1 Purchase the Software Package or Feature to Install (10.2.1.3)
675(1)
Step 2 Obtain a License (10.2.1.4)
675(2)
Step 3 Install the License (10.2.1.5)
677(1)
License Verification and Management (10.2.2)
678(1)
License Verification (10.2.2.1)
678(2)
Activate an Evaluation Right-To-Use License (10.2.2.2)
680(2)
Back Up the License (10.2.2.3)
682(1)
Uninstall the License (10.2.2.4)
682(3)
Summary (10.3)
685(3)
Practice
688(1)
Class Activities
688(1)
Packet Tracer Activities
688(1)
Check Your Understanding Questions
688(5)
Appendix A Answers to the "Check Your Understanding" Questions 693(16)
Glossary 709(14)
Index 723
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain, networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industry -- developing foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."