Muutke küpsiste eelistusi

Routing and Switching Essentials Companion Guide [Kõva köide]

  • Formaat: Hardback, 864 pages, kõrgus x laius x paksus: 239x211x39 mm, kaal: 1692 g
  • Ilmumisaeg: 06-Mar-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133180
  • ISBN-13: 9781587133183
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 864 pages, kõrgus x laius x paksus: 239x211x39 mm, kaal: 1692 g
  • Ilmumisaeg: 06-Mar-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133180
  • ISBN-13: 9781587133183

Routing and Switching Essentials Companion Guide is the official supplemental textbook for the Routing and Switching Essentials course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with more than 200 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title:

Routing and Switching Essentials Lab Manual

How To–Look for this icon to study the steps you need to learn to perform certain tasks.

Interactive Activities–Reinforce your understanding of topics by doing all the exercises from the online course identified throughout the book with this icon.

Videos–Watch the videos embedded within the online course.

Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.

Hands-on Labs–Work through all the course labs and additional Class Activities that are included in the course and published in the separate Lab Manual.

Introduction xxviii
Chapter 1 Introduction to Switched Networks
1(32)
Objectives
1(1)
Key Terms
1(1)
Introduction (1.0.1.1)
2(1)
LAN Design (1.1)
2(12)
Converged Networks (1.1.1)
3(1)
Growing Complexity of Networks (1.1.1.1)
3(1)
Elements of a Converged Network (1.1.1.2)
4(1)
Borderless Switched Networks (1.1.1.3)
5(1)
Hierarchy in the Borderless Switched Network (1.1.1.4)
6(1)
Core Distribution Access (1.1.1.5)
7(3)
Switched Networks (1.1.2)
10(1)
Role of Switched Networks (1.1.2.1)
10(1)
Form Factors (1.1.2.2)
11(3)
The Switched Environment (1.2)
14(19)
Frame Forwarding (1.2.1)
14(1)
Switching as a General Concept in Networking and Telecommunications (1.2.1.1)
14(1)
Dynamically Populating a Switch MAC Address Table (1.2.1.2)
15(4)
Switch Forwarding Methods (1.2.1.3)
19(1)
Store-and-Forward Switching (1.2.1.4)
20(1)
Cut-Through Switching (1.2.1.5)
21(1)
Switching Domains (1.2.2)
22(1)
Collision Domains (1.2.2.1)
22(1)
Broadcast Domains (1.2.2.2)
23(2)
Alleviating Network Congestion (1.2.2.3)
25(1)
Summary (1.3)
26(1)
Practice
27(1)
Class Activities
28(1)
Packet Tracer Activities
28(1)
Check Your Understanding Questions
28(5)
Chapter 2 Basic Switching Concepts and Configuration
33(56)
Objectives
33(1)
Key Terms
33(2)
Introduction (2.0.1.1)
35(1)
Basic Switch Configuration (2.1)
36(8)
Switch Boot Sequence (2.1.1.1)
36(1)
Recovering from a System Crash (2.1.1.2)
37(1)
Switch LED Indicators (2.1.1.3)
38(2)
Preparing for Basic Switch Management (2.1.1.4)
40(1)
Configuring Basic Switch Management Access with IPv4 (2.1.1.5)
41(3)
Configure Switch Ports (2.1.2)
44(10)
Duplex Communication (2.1.2.1)
44(1)
Configure Switch Ports at the Physical Layer (2.1.2.2)
45(1)
Duplex and Speed
45(1)
Auto-MDIX (2.1.2.3)
46(2)
Verifying Switch Port Configuration (2.1.2.4)
48(2)
Network Access Layer Issues (2.1.2.5)
50(3)
Troubleshooting Network Access Layer Issues (2.1.2.6)
53(1)
Switch Security: Management and Implementation (2.2)
54(35)
Secure Remote Access (2.2.1)
54(1)
SSH Operation (2.2.1.1)
55(1)
Configuring SSH (2.2.1.2)
56(1)
Verifying SSH (2.2.1.3)
57(2)
Security Concerns in LANs (2.2.2)
59(1)
Common Security Attacks: MAC Address Flooding (2.2.2.1)
59(4)
Common Security Attacks: DHCP Spoofing (2.2.2.2)
63(1)
Common Security Attacks: Leveraging CDP (2.2.2.3)
64(2)
Security Best Practices (2.2.3)
66(1)
Best Practices (2.2.3.1)
66(1)
Network Security Tools and Testing (2.2.3.2)
66(1)
Network Security Audits (2.2.3.3)
67(1)
Switch Port Security (2.2.4)
68(1)
Secure Unused Ports (2.2.4.1)
68(1)
DHCP Snooping (2.2.4.2)
69(2)
Port Security: Operation (2.2.4.3)
71(2)
Port Security: Violation Modes (2.2.4.4)
73(1)
Port Security: Configuring (2.2.4.5)
74(1)
Port Security: Verifying (2.2.4.6)
75(2)
Ports in Error Disabled State (2.2.4.7)
77(1)
Network Time Protocol (NTP) (2.2.4.8)
78(3)
Summary (2.3)
81(2)
Practice
83(1)
Class Activities
83(1)
Labs
83(1)
Packet Tracer Activities
84(1)
Check Your Understanding Questions
84(5)
Chapter 3 VLANs
89(60)
Objectives
89(1)
Key Terms
89(1)
Introduction (3.0.1.1)
90(1)
VLAN Segmentation (3.1)
91(6)
VLAN Definitions (3.1.1.1)
91(1)
Benefits of VLANs (3.1.1.2)
92(1)
Types of VLANs (3.1.1.3)
93(1)
Data VLAN
93(1)
Default VLAN
93(1)
Native VLAN
94(1)
Management VLAN
95(1)
Voice VLANs (3.1.1.4)
96(1)
VLANs in a Multiswitched Environment (3.1.2)
97(8)
VLAN Trunks (3.1.2.1)
97(1)
Controlling Broadcast Domains with VLANs (3.1.2.2)
98(1)
Network Without VLANs
98(1)
Network with VLANs
99(2)
Tagging Ethernet Frames for VLAN Identification (3.1.2.3)
101(1)
Native VLANs and 802.1Q Tagging (3.1.2.4)
102(1)
Tagged Frames on the Native VLAN
102(1)
Untagged Frames on the Native VLAN
102(1)
Voice VLAN Tagging (3.1.2.5)
103(1)
Sample Configuration
104(1)
VLAN Implementations (3.2)
105(9)
VLAN Ranges on Catalyst Switches (3.2.1.1)
105(1)
Creating a VLAN (3.2.1.2)
106(2)
Assigning Ports to VLANs (3.2.1.3)
108(1)
Changing VLAN Port Membership (3.2.1.4)
109(2)
Deleting VLANs (3.2.1.5)
111(1)
Verifying VLAN Information (3.2.1.6)
112(2)
VLAN Trunks (3.2.2)
114(6)
Configuring IEEE 802.1Q Trunk Links (3.2.2.1)
114(2)
Resetting the Trunk to Default State (3.2.2.2)
116(2)
Verifying Trunk Configuration (3.2.2.3)
118(2)
Dynamic Trunking Protocol (3.2.3)
120(3)
Introduction to DTP (3.2.3.1)
120(1)
Negotiated Interface Modes (3.2.3.2)
121(2)
Troubleshoot VLANs and Trunks (3.2.4)
123(11)
IP Addressing Issues with VLAN (3.2.4.1)
123(2)
Missing VLANs (3.2.4.2)
125(2)
Introduction to Troubleshooting Trunks (3.2.4.3)
127(1)
Common Problems with Trunks (3.2.4.4)
128(1)
Trunk Mode Mismatches (3.2.4.5)
129(2)
Incorrect VLAN List (3.2.4.6)
131(3)
VLAN Security and Design (3.3)
134(4)
Switch Spoofing Attack (3.3.1.1)
134(1)
Double-Tagging Attack (3.3.1.2)
135(1)
PVLAN Edge (3.3.1.3)
136(2)
Design Best Practices for VLANs (3.3.2)
138(11)
VLAN Design Guidelines (3.3.2.1)
138(2)
Summary (3.4)
140(2)
Practice
142(1)
Class Activities
142(1)
Labs
142(1)
Packet Tracer Activities
143(1)
Check Your Understanding Questions
143(6)
Chapter 4 Routing Concepts
149(82)
Objectives
149(1)
Key Terms
149(2)
Introduction (4.0.1.1)
151(1)
Functions of a Router (4.1.1)
152(10)
Characteristics of a Network (4.1.1.1)
152(1)
Why Routing? (4.1.1.2)
153(1)
Routers Are Computers (4.1.1.3)
154(2)
Routers Interconnect Networks (4.1.1.4)
156(2)
Routers Choose Best Paths (4.1.1.5)
158(1)
Packet-Forwarding Mechanisms (4.1.1.6)
158(4)
Connect Devices (4.1.2)
162(10)
Connect to a Network (4.1.2.1)
162(2)
Default Gateways (4.1.2.2)
164(1)
Document Network Addressing (4.1.2.3)
165(1)
Enable IP on a Host (4.1.2.4)
166(1)
Device LEDs (4.1.2.5)
167(2)
Console Access (4.1.2.6)
169(2)
Enable IP on a Switch (4.1.2.7)
171(1)
Basic Settings on a Router (4.1.3)
172(11)
Configure Basic Router Settings (4.1.3.1)
172(3)
Configure an IPv4 Router Interface (4.1.3.2)
175(2)
Configure an IPv6 Router Interface (4.1.3.3)
177(4)
Configure an IPv4 Loopback Interface (4.1.3.4)
181(2)
Verify Connectivity of Directly Connected Networks (4.1.4)
183(10)
Verify Interface Settings (4.1.4.1)
183(3)
Verify IPv6 Interface Settings (4.1.4.2)
186(3)
Filter Show Command Output (4.1.4.3)
189(2)
Command History Feature (4.1.4.4)
191(2)
Switching Packets Between Networks (4.2.1)
193(5)
Router Switching Function (4.2.1.1)
193(1)
Send a Packet (4.2.1.2)
194(1)
Forward to the Next Hop (4.2.1.3)
195(1)
Packet Routing (4.2.1.4)
196(1)
Reach the Destination (4.2.1.5)
197(1)
Path Determination (4.2.2)
198(4)
Routing Decisions (4.2.2.1)
198(1)
Best Path (4.2.2.2)
199(1)
Load Balancing (4.2.2.3)
200(1)
Administrative Distance (4.2.2.4)
200(2)
Analyze the Routing Table (4.3.1)
202(3)
The Routing Table (4.3.1.1)
202(1)
Routing Table Sources (4.3.1.2)
203(1)
Remote Network Routing Entries (4.3.1.3)
204(1)
Directly Connected Routes (4.3.2)
205(9)
Directly Connected Interfaces (4.3.2.1)
205(1)
Directly Connected Routing Table Entries (4.3.2.2)
206(1)
Directly Connected Examples (4.3.2.3)
207(3)
Directly Connected IPv6 Example (4.3.2.4)
210(4)
Statically Learned Routes (4.3.3)
214(5)
Static Routes (4.3.3.1)
214(1)
Static Route Examples (4.3.3.2)
214(2)
Static IPv6 Route Examples (4.3.3.3)
216(3)
Dynamic Routing Protocols (4.3.4)
219(12)
Dynamic Routing (4.3.4.1)
219(1)
IPv4 Routing Protocols (4.3.4.2)
220(1)
IPv4 Dynamic Routing Examples (4.3.4.3)
221(1)
IPv6 Routing Protocols (4.3.4.4)
222(1)
IPv6 Dynamic Routing Examples (4.3.4.5)
223(1)
Summary (4.4)
224(1)
Practice
225(1)
Class Activities
225(1)
Labs
226(1)
Packet Tracer Activities
226(1)
Check Your Understanding Questions
226(5)
Chapter 5 Inter-VLAN Routing
231(52)
Objectives
231(1)
Key Terms
231(1)
Introduction (5.0.1.1)
232(1)
Inter-VLAN Routing Configuration (5.1)
232(7)
What Is Inter-VLAN Routing? (5.1.1.1)
233(1)
Legacy Inter-VLAN Routing (5.1.1.2)
233(2)
Router-on-a-Stick Inter-VLAN Routing (5.1.1.3)
235(2)
Multilayer Switch Inter-VLAN Routing (5.1.1.4)
237(2)
Configure Legacy Inter-VLAN Routing (5.1.2)
239(5)
Configure Legacy Inter-VLAN Routing: Preparation (5.1.2.1)
239(1)
Configure Legacy Inter-VLAN Routing: Switch Configuration (5.1.2.2)
240(1)
Configure Legacy Inter-VLAN Routing: Router Interface Configuration (5.1.2.3)
241(3)
Configure Router-on-a-Stick Inter-VLAN Routing (5.1.3)
244(8)
Configure Router-on-a-Stick: Preparation (5.1.3.1)
244(1)
Configure Router-on-a-Stick: Switch Configuration (5.1.3.2)
245(1)
Configure Router-on-a-Stick: Router Subinterface Configuration (5.1.3.3)
246(2)
Configure Router-on-a-Stick: Verifying Subinterfaces (5.1.3.4)
248(2)
Configure Router-on-a-Stick: Verifying Routing (5.1.3.5)
250(1)
Ping Test
251(1)
Tracert Test
251(1)
Troubleshoot Inter-VLAN Routing (5.2)
252(9)
Inter-VLAN Configuration Issues (5.2.1)
252(1)
Switch Port Issues (5.2.1.1)
252(2)
Verify Switch Configuration (5.2.1.2)
254(1)
Interface Issues (5.2.1.3)
255(1)
Verify Router Configuration (5.2.1.4)
256(2)
IP Addressing Issues (5.2.2)
258(1)
Errors with IP Addresses and Subnet Masks (5.2.2.1)
258(2)
Verifying IP Address and Subnet Mask Configuration Issues (5.2.2.2)
260(1)
Layer 3 Switching (5.3)
261(13)
Introduction to Layer 3 Switching (5.3.1.1)
261(2)
Inter-VLAN Routing with Switch Virtual Interfaces (5.3.1.2, 5.3.1.3)
263(2)
Inter-VLAN Routing with Routed Ports (5.3.1.4)
265(1)
Routed Ports and Access Ports on a Switch
265(1)
Configuring Static Routes on a Catalyst 2960 (5.3.1.5)
266(8)
Troubleshoot Layer 3 Switching (5.3.2)
274(9)
Layer 3 Switch Configuration Issues (5.3.2.1)
274(1)
Example: Troubleshooting Layer 3 Switching (5.3.2.2)
275(3)
Summary (5.4)
278(1)
Practice
279(1)
Class Activities
279(1)
Labs
279(1)
Packet Tracer Activities
279(1)
Check Your Understanding Questions
280(3)
Chapter 6 Static Routing
283(96)
Objectives
283(1)
Key Terms
283(2)
Introduction (6.0.1.1)
285(1)
Static Routing (6.1.1)
286(3)
Reach Remote Networks (6.1.1.1)
286(1)
Why Use Static Routing? (6.1.1.2)
286(2)
When to Use Static Routes (6.1.1.3)
288(1)
Types of Static Routes
289(3)
Static Route Applications (6.1.2.1)
289(1)
Standard Static Route (6.1.2.2)
289(1)
Default Static Route (6.1.2.3)
290(1)
Summary Static Route (6.1.2.4)
290(1)
Floating Static Route (6.1.2.5)
291(1)
Configure IPv4 Static Routes (6.2.1)
292(14)
ip route Command (6.2.1.1)
292(1)
Next-Hop Options (6.2.1.2)
293(4)
Configure a Next-Hop Static Route (6.2.1.3)
297(2)
Configure a Directly Connected Static Route (6.2.1.4)
299(2)
Configure a Fully Specified Static Route (6.2.1.5)
301(3)
Verify a Static Route (6.2.1.6)
304(2)
Configure IPv4 Default Routes (6.2.2)
306(4)
Default Static Route (6.2.2.1)
306(1)
Configure a Default Static Route (6.2.2.2)
307(1)
Verify a Default Static Route (6.2.2.3)
308(2)
Configure IPv6 Static Routes (6.2.3)
310(12)
The ipv6 route Command (6.2.3.1)
310(1)
Next-Hop Options (6.2.3.2)
311(4)
Configure a Next-Hop Static IPv6 Route (6.2.3.3)
315(2)
Configure a Directly Connected Static IPv6 Route (6.2.3.4)
317(2)
Configure a Fully Specified Static IPv6 Route (6.2.3.5)
319(1)
Verify IPv6 Static Routes (6.2.3.6)
320(2)
Configure IPv6 Default Routes (6.2.4)
322(3)
Default Static IPv6 Route (6.2.4.1)
322(1)
Configure a Default Static IPv6 Route (6.2.4.2)
323(1)
Verify a Default Static Route (6.2.4.3)
323(2)
Review of CIDR and VLSM (6.3)
325(6)
Classful Network Addressing (6.3.1.1)
326(1)
Classful Subnet Masks (6.3.1.2)
327(1)
Classful Routing Protocol Example (6.3.1.3)
328(1)
Classful Addressing Waste (6.3.1.4)
329(2)
CIDR (6.3.2)
331(4)
Classless Inter-Domain Routing (6.3.2.1)
331(1)
CIDR and Route Summarization (6.3.2.2)
332(1)
Static Routing CIDR Example (6.3.2.3)
333(2)
Classless Routing Protocol Example (6.3.2.4)
335(1)
VLSM (6.3.3)
335(17)
Fixed-Length Subnet Masking (6.3.3.1)
336(1)
Variable-Length Subnet Masking (6.3.3.2)
337(1)
VLSM in Action (6.3.3.3)
338(1)
Subnetting Subnets (6.3.3.4)
339(2)
VLSM Example (6.3.3.5)
341(5)
Configure IPv4 Summary Routes (6.4.1)
346(1)
Route Summarization (6.4.1.1)
346(1)
Calculate a Summary Route (6.4.1.2)
346(2)
Summary Static Route Example (6.4.1.3)
348(4)
Configure IPv6 Summary Routes (6.4.2)
352(6)
Summarize IPv6 Network Addresses (6.4.2.1)
352(2)
Calculate IPv6 Summary Addresses (6.4.2.2)
354(2)
Configure an IPv6 Summary Address (6.4.2.3)
356(2)
Configure Floating Static Routes (6.4.3)
358(5)
Floating Static Routes (6.4.3.1)
358(1)
Configure a Floating Static Route (6.4.3.2)
359(1)
Test the Floating Static Route (6.4.3.3)
360(3)
Troubleshoot Static and Default Route Issues (6.5)
363(16)
Static Routes and Packet Forwarding (6.5.1.1)
364(1)
Troubleshoot a Missing Route (6.5.2.1)
364(4)
Solve a Connectivity Problem (6.5.2.2)
368(5)
Summary (6.6)
373(1)
Practice
374(1)
Class Activities
375(1)
Labs
375(1)
Packet Tracer Activities
375(1)
Check Your Understanding Questions
376(3)
Chapter 7 Routing Dynamically
379(96)
Objectives
379(1)
Key Terms
379(2)
Introduction (7.0.1.1)
381(1)
Dynamic Routing Protocol Operation (7.1.1)
382(3)
The Evolution of Dynamic Routing Protocols (7.1.1.1)
382(1)
Purpose of Dynamic Routing Protocols (7.1.1.2)
383(1)
The Role of Dynamic Routing Protocols (7.1.1.3)
384(1)
Dynamic Versus Static Routing (7.1.2)
385(4)
Using Static Routing (7.1.2.1)
386(1)
Static Routing Scorecard (7.1.2.2)
386(1)
Using Dynamic Routing Protocols (7.1.2.3)
387(1)
Dynamic Routing Scorecard (7.1.2.4)
388(1)
Routing Protocol Operating Fundamentals (7.1.3)
389(7)
Dynamic Routing Protocol Operation (7.1.3.1)
389(1)
Cold Start (7.1.3.2)
390(1)
Network Discovery (7.1.3.3)
391(1)
Exchanging the Routing Information (7.1.3.4)
392(2)
Achieving Convergence (7.1.3.5)
394(2)
Types of Routing Protocols (7.1.4)
396(15)
Classifying Routing Protocols (7.1.4.1)
396(3)
IGP and EGP Routing Protocols (7.1.4.2)
399(2)
Distance Vector Routing Protocols (7.1.4.3)
401(1)
Link-State Routing Protocols (7.1.4.4)
402(1)
Classful Routing Protocols (7.1.4.5)
402(4)
Classless Routing Protocols (7.1.4.6)
406(3)
Routing Protocol Characteristics (7.1.4.7)
409(1)
Routing Protocol Metrics (7.1.4.8)
410(1)
Distance Vector Routing Protocol Operation (7.2.1)
411(2)
Distance Vector Technologies (7.2.1.1)
411(1)
Distance Vector Algorithm (7.2.1.2)
412(1)
Types of Distance Vector Routing Protocols (7.2.2)
413(3)
Routing Information Protocol (7.2.2.1)
413(2)
Enhanced Interior-Gateway Routing Protocol (7.2.2.2)
415(1)
RIP and RIPng Routing (7.3)
416(13)
Router RIP Configuration Mode (7.3.1.1)
416(2)
Advertising Networks (7.3.1.2)
418(1)
Examining Default RIP Settings (7.3.1.3)
419(2)
Enabling RIPv2 (7.3.1.4)
421(2)
Disabling Auto Summarization (7.3.1.5)
423(2)
Configuring Passive Interfaces (7.3.1.6)
425(2)
Propagating a Default Route (7.3.1.7)
427(2)
Configuring the RIPng Protocol (7.3.2)
429(4)
Advertising IPv6 Networks (7.3.2.1)
429(1)
Examining the RIPng Configuration (7.3.2.2)
430(3)
Link-State Dynamic Routing (7.4)
433(14)
Shortest Path First Protocols (7.4.1.1)
433(1)
Dijkstra's Algorithm (7.4.1.2)
434(1)
SPF Example (7.4.1.3)
435(3)
Link-State Updates (7.4.2)
438(1)
Link-State Routing Process (7.4.2.1)
438(1)
Link and Link-State (7.4.2.2)
438(4)
Say Hello (7.4.2.3)
442(1)
Building the Link-State Packet (7.4.2.4)
442(1)
Flooding the LSP (7.4.2.5)
443(1)
Building the Link-State Database (7.4.2.6)
443(2)
Building the SPF Tree (7.4.2.7)
445(1)
Adding OSPF Routes to the Routing Table (7.4.2.8)
446(1)
Why Use Link-State Routing Protocols (7.4.3)
447(2)
Why Use Link-State Protocols? (7.4.3.1)
447(1)
Disadvantages of Link-State Protocols (7.4.3.2)
448(1)
Protocols That Use Link-State (7.4.3.3)
449(1)
Parts of an IPv4 Route Entry (7.5.1)
449(5)
Routing Table Entries (7.5.1.1)
449(2)
Directly Connected Entries (7.5.1.2)
451(2)
Remote Network Entries (7.5.1.3)
453(1)
Dynamically Learned IPv4 Routes (7.5.2)
454(6)
Routing Table Terms (7.5.2.1)
454(1)
Ultimate Route (7.5.2.2)
455(1)
Level 1 Route (7.5.2.3)
455(1)
Level 1 Parent Route (7.5.2.4)
456(2)
Level 2 Child Route (7.5.2.5)
458(2)
The IPv4 Route Lookup Process (7.5.3)
460(3)
Route Lookup Process (7.5.3.1)
460(2)
Best Route = Longest Match (7.5.3.2)
462(1)
Analyze an IPv6 Routing Table (7.5.4)
463(12)
IPv6 Routing Table Entries (7.5.4.1)
463(1)
Directly Connected Entries (7.5.4.2)
464(2)
Remote IPv6 Network Entries (7.5.4.3)
466(3)
Summary (7.6)
469(1)
Practice
470(1)
Class Activities
470(1)
Labs
471(1)
Packet Tracer Activities
471(1)
Check Your Understanding Questions
471(4)
Chapter 8 Single-Area OSPF
475(74)
Objectives
475(1)
Key Terms
475(2)
Introduction (8.0.1.1)
477(1)
Characteristics of OSPF (8.1)
477(10)
Evolution of OSPF (8.1.1.1)
477(2)
Features of OSPF (8.1.1.2)
479(1)
Components of OSPF (8.1.1.3)
479(1)
Data Structures
479(1)
Routing Protocol Messages
480(1)
Algorithm
481(1)
Link-State Operation (8.1.1.4)
481(3)
Single-Area and Multiarea OSPF (8.1.1.5)
484(3)
OSPF Messages (8.1.2)
487(6)
Encapsulating OSPF Messages (8.1.2.1)
487(2)
Types of OSPF Packets (8.1.2.2)
489(1)
Hello Packet (8.1.2.3)
489(2)
Hello Packet Intervals (8.1.2.4)
491(1)
Link-State Updates (8.1.2.5)
492(1)
OSPF Operation (8.1.3)
493(7)
OSPF Operational States (8.1.3.1)
493(1)
Establish Neighbor Adjacencies (8.1.3.2)
494(2)
OSPF DR and BDR (8.1.3.3)
496(1)
Synchronizing OSPF Databases (8.1.3.4)
497(3)
Configuring Single-Area OSPFv2 (8.2.1)
500(7)
OSPF Network Topology (8.2.1.1)
500(1)
Router OSPF Configuration Mode (8.2.1.2)
501(1)
Router IDs (8.2.1.3)
502(1)
Configuring an OSPF Router ID (8.2.1.4)
503(2)
Modifying a Router ID (8.2.1.5)
505(2)
Using a Loopback Interface as the Router ID (8.2.1.6)
507(1)
Configure Single-Area OSPFv2 (8.2.2)
507(5)
Enabling OSPF on Interfaces (8.2.2.1)
507(1)
Wildcard Mask (8.2.2.2)
508(1)
The network Command (8.2.2.3)
509(1)
Passive Interface (8.2.2.4)
510(1)
Configuring Passive Interfaces (8.2.2.5)
511(1)
OSPF Cost (8.2.3)
512(11)
OSPF Metric = Cost (8.2.3.1)
513(1)
OSPF Accumulates Costs (8.2.3.2)
514(1)
Adjusting the Reference Bandwidth (8.2.3.3)
515(1)
Adjusting the Reference Bandwidth
515(4)
Default Interface Bandwidths (8.2.3.4)
519(2)
Adjusting the Interface Bandwidths (8.2.3.5)
521(1)
Manually Setting the OSPF Cost (8.2.3.6)
522(1)
Verify OSPF (8.2.4)
523(4)
Verify OSPF Neighbors (8.2.4.1)
523(2)
Verify OSPF Protocol Settings (8.2.4.2)
525(1)
Verify OSPF Process Information (8.2.4.3)
526(1)
Verify OSPF Interface Settings (8.2.4.4)
526(1)
OSPFv2 vs. OSPFv3 (8.3.1)
527(4)
OSPFv3 (8.3.1.1)
528(1)
Similarities Between OSPFv2 to OSPFv3 (8.3.1.2)
529(1)
Differences Between OSPFv2 and OSPFv3 (8.3.1.3)
529(1)
Link-Local Addresses (8.3.1.4)
530(1)
Configuring OSPFv3 (8.3.2)
531(9)
OSPFv3 Network Topology (8.3.2.1)
531(2)
Link-Local Addresses (8.3.2.2)
533(1)
Assigning Link-Local Addresses (8.3.2.3)
534(1)
Configuring the OSPFv3 Router ID (8.3.2.4)
535(3)
Modifying an OSPFv3 Router ID (8.3.2.5)
538(1)
Enabling OSPFv3 on Interfaces (8.3.2.6)
539(1)
Verify OSPFv3 (8.3.3)
540(9)
Verify OSPFv3 Neighbors (8.3.3.1)
540(1)
Verify OSPFv3 Protocol Settings (8.3.3.2)
541(1)
Verify OSPFv3 Interfaces (8.3.3.3)
542(1)
Verify the IPv6 Routing Table (8.3.3.4)
543(1)
Summary (8.4)
544(1)
Practice
545(1)
Class Activities
545(1)
Labs
545(1)
Packet Tracer Activities
546(1)
Check Your Understanding Questions
546(3)
Chapter 9 Access Control Lists
549(90)
Objectives
549(1)
Key Terms
549(1)
Introduction (9.0.1.1)
550(1)
IP ACL Operation (9.1)
551(7)
What Is an ACL? (9.1.1.1)
551(1)
A TCP Conversation (9.1.1.2)
552(1)
TCP Communication
552(3)
Packet Filtering (9.1.1.3, 9.1.1.4)
555(2)
ACL Operation (9.1.1.5)
557(1)
Standard Versus Extended IPv4 ACLS (9.1.2)
558(2)
Types of Cisco IPv4 ACLs (9.1.2.1)
558(1)
Standard ACLs
558(1)
Extended ACLs
559(1)
Numbering and Naming ACLs (9.1.2.2)
559(1)
Wildcard Masks in ACLs (9.1.3)
560(8)
Introducing ACL Wildcard Masking (9.1.3.1)
560(1)
Wildcard Masking
560(2)
Using a Wildcard Mask
562(1)
Wildcard Mask Examples (9.1.3.2)
562(1)
Wildcard Masks to Match IPv4 Subnets
562(1)
Wildcard Masks to Match Ranges
563(1)
Calculating the Wildcard Mask (9.1.3.3)
564(1)
Wildcard Mask Keywords (9.1.3.4)
565(1)
Wildcard Bit Mask Keywords
566(1)
Examples Wildcard Mask Keywords (9.1.3.5)
567(1)
The any and host Keywords
567(1)
Guidelines for ACL Creation (9.1.4)
568(2)
General Guidelines for Creating ACLs (9.1.4.1)
568(1)
ACL Best Practices (9.1.4.2)
569(1)
Guidelines for ACL Placement (9.1.5)
570(4)
Where to Place ACLs (9.1.5.1)
570(1)
Standard ACL Placement (9.1.5.2)
571(2)
Extended ACL Placement (9.1.5.3)
573(1)
Standard IPv4 ACLs (9.2)
574(12)
Entering Criteria Statements (9.2.1.1)
574(1)
Configuring a Standard ACL -- Standard ACL Logic (9.2.1.2)
575(1)
Configuring a Standard ACL -- Configuring Standard ACLs (9.2.1.3)
576(2)
Internal Logic (9.2.1.4)
578(1)
Applying Standard ACLs to Interfaces -- Standard ACL Configuration Procedures (9.2.1.5, 9.2.1.6)
579(3)
Creating Named Standard ACLs (9.2.1.7)
582(2)
Commenting ACLs (9.2.1.8)
584(2)
Modify IPv4 ACLs (9.2.2)
586(9)
Editing Standard Numbered ACLs (9.2.2.1, 9.2.2.2)
586(1)
Method 1 Using a Text Editor
586(1)
Method 2 Using the Sequence Number
587(2)
Editing Standard Named ACLs (9.2.2.3)
589(1)
Verifying ACLs (9.2.2.4)
590(1)
ACL Statistics (9.2.2.5)
591(1)
Standard ACL Sequence Numbers (9.2.2.6)
592(3)
Securing VTY Ports with a Standard IPv4 ACL (9.2.3)
595(3)
Configuring a Standard ACL to Secure a VTY Port (9.2.3.1)
595(1)
Verifying a Standard ACL Used to Secure a VTY Port (9.2.3.2)
596(2)
Structure of an Extended IPv4 ACL (9.3.1)
598(13)
Extended ACLs -- Testing Packets with Extended ACLs (9.3.1.1)
598(1)
Extended ACLs -- Testing for Ports and Services (9.3.1.2)
599(2)
Configure Extended IPv4 ACLs (9.3.2)
601(1)
Configuring Extended ACLs (9.3.2.1)
601(2)
Applying Extended ACLs to Interfaces (9.3.2.2)
603(2)
Filtering Traffic with Extended ACLs (9.3.2.3)
605(1)
Creating Named Extended ACLs (9.3.2.4)
606(1)
Verifying Extended ACLs (9.3.2.5)
607(1)
Editing Extended ACLs (9.3.2.6)
608(3)
Troubleshoot ACLs (9.4)
611(5)
Inbound and Outbound ACL Logic (9.4.1.1)
611(2)
ACL Logic Operations (9.4.1.2)
613(1)
Standard ACL Decision Process (9.4.1.3)
614(1)
Extended ACL Decision Process (9.4.1.4)
615(1)
Common ACL Errors (9.4.2)
616(5)
Troubleshooting Common ACL Errors - Example 1 (9.4.2.1)
616(1)
Troubleshooting Common ACL Errors - Example 2 (9.4.2.2)
617(1)
Troubleshooting Common ACL Errors - Example 3 (9.4.2.3)
618(1)
Troubleshooting Common ACL Errors - Example 4 (9.4.2.4)
619(1)
Troubleshooting Common ACL Errors - Example 5 (9.4.2.5)
619(2)
IPv6 ACLs (9.5)
621(18)
Type of IPv6 ACLs (9.5.1.1)
621(1)
Comparing IPv4 and IPv6 ACLs (9.5.1.2)
621(2)
Configuring IPv6 Topology (9.5.2.1)
623(2)
Configuring IPv6 ACLs (9.5.2.2)
625(2)
Applying an IPv6 ACL to an Interface (9.5.2.3)
627(1)
IPv6 ACL Examples (9.5.2.4)
628(1)
Deny FTP
629(1)
Restricted Access
629(1)
Verifying IPv6 ACLs (9.5.2.5)
630(3)
Summary (9.6)
633(2)
Practice
635(1)
Class Activities
635(1)
Labs
635(1)
Packet Tracer Activities
635(1)
Check Your Understanding Questions
636(3)
Chapter 10 DHCP
639(56)
Objectives
639(1)
Key Terms
639(1)
Introduction (10.0.1.1)
640(1)
Dynamic Host Configuration Protocol v4 (10.1)
641(7)
Introducing DHCPv4 (10.1.1.1)
641(1)
DHCPv4 Operation (10.1.1.2)
642(1)
Lease Origination
642(2)
Lease Renewal
644(1)
DHCPv4 Message Format (10.1.1.3)
645(1)
DHCPv4 Discover and Offer Messages (10.1.1.4)
646(2)
Configuring a Basic DHCPv4 Server (10.1.2)
648(11)
Configuring a Basic DHCPv4 Server (10.1.2.1)
648(3)
DHCPv4 Example
651(1)
Disabling DHCPv4
651(1)
Verifying DHCPv4 (10.1.2.2)
651(4)
DHCPv4 Relay (10.1.2.3)
655(1)
What Is DHCP Relay?
655(4)
Configure DHCPv4 Client (10.1.3)
659(2)
Configuring a Router as DHCPv4 Client (10.1.3.1)
659(1)
Configuring a SOHO Router as a DHCPv4 Client (10.1.3.2)
660(1)
Troubleshoot DHCPv4 (10.1.4)
661(4)
Troubleshooting Tasks (10.1.4.1)
661(1)
Troubleshooting Task 1 Resolve IPv4 Address Conflicts
662(1)
Troubleshooting Task 2 Verify Physical Connectivity
662(1)
Troubleshooting Task 3 Test Connectivity Using a Static IP Address
662(1)
Troubleshooting Task 4 Verify Switch Port Configuration
662(1)
Troubleshooting Task 5 Test DHCPv4 Operation on the Same Subnet or VLAN
663(1)
Verify Router DHCPv4 Configuration (10.1.4.2)
663(1)
Debugging DHCPv4 (10.1.4.3)
664(1)
Dynamic Host Configuration Protocol v6 (10.2)
665(8)
Stateless Address Autoconfiguration (SLAAC) (10.2.1.1)
665(1)
SLAAC Operation (10.2.1.2)
666(2)
SLAAC and DHCPv6 (10.2.1.3)
668(1)
SLAAC Option (10.2.1.4)
669(1)
SLAAC Option (Router Advertisement Only)
669(1)
Stateless DHCPv6 Option (10.2.1.5)
670(1)
Stateless DHCPv6 Option (Router Advertisement and DHCPv6)
670(1)
Stateful DHCPv6 Option (10.2.1.6)
671(1)
Stateful DHCPv6 (DHCPv6 Only)
671(1)
DHCPv6 Operations (10.2.1.7)
671(1)
DHCPv6 Communications
672(1)
Stateless DHCPv6 (10.2.2)
673(5)
Configuring a Router as a Stateless DHCPv6 Server (10.2.2.1)
673(1)
DHCPv6 Stateless Server Example
674(1)
Configuring a Router as a Stateless DHCPv6 Client (10.2.2.2)
675(1)
Verifying Stateless DHCPv6 (10.2.2.3)
675(1)
Verifying the Stateless DHCPv6 Server
675(1)
Verifying the Stateless DHCPv6 Client
676(2)
Stateful DHCPv6 Server (10.2.3)
678(5)
Configuring a Router as a Stateful DHCPv6 Server (10.2.3.1)
678(1)
DHCPv6 Stateful Server Example
679(1)
Configuring a Router as a Stateful DHCPv6 Client (10.2.3.2)
679(1)
Verifying Stateful DHCPv6 (10.2.3.3)
680(1)
Verifying the Stateful DHCPv6 Client
681(1)
Configuring a Router as a DHCPv6 Relay Agent (10.2.3.4)
682(1)
Configuring the DHCPv6 Relay Agent
683(1)
Troubleshoot DHCPv6 (10.2.4)
683(12)
Troubleshooting Tasks (10.2.4.1)
683(1)
Troubleshooting Task 1 Resolve Conflicts
684(1)
Troubleshooting Task 2 Verify Allocation Method
684(1)
Troubleshooting Task 3 Test with a Static IPv6 Address
684(1)
Troubleshooting Task 4 Verify Switch Port Configuration
684(1)
Troubleshooting Task 5 Test DHCPv6 Operation on the Same Subnet or VLAN
684(1)
Verify Router DHCPv6 Configuration (10.2.4.2)
685(1)
Stateful DHCPv6
685(1)
Stateless DHCPv6
685(1)
Debugging DHCPv6 (10.2.4.3)
686(2)
Summary (10.3)
688(2)
Practice
690(1)
Class Activities
690(1)
Packet Tracer Activities
690(1)
Check Your Understanding Questions
691(4)
Chapter 11 Network Address Translation for IPv4
695(60)
Objectives
695(1)
Key Terms
695(1)
Introduction (11.0.1.1)
696(1)
NAT Operation (11.1)
697(6)
IPv4 Private Address Space (11.1.1.1)
697(1)
What Is NAT? (11.1.1.2)
698(1)
NAT Terminology (11.1.1.3, 11.1.1.4)
699(3)
How NAT Works (11.1.1.5)
702(1)
Types of NAT (11.1.2)
703(6)
Static NAT (11.1.2.1)
703(1)
Dynamic NAT (11.1.2.2)
704(1)
Port Address Translation (PAT) (11.1.2.3)
705(1)
Next Available Port (11.1.2.4)
706(1)
Comparing NAT and PAT (11.1.2.5)
707(1)
Packets Without a Layer 4 Segment
708(1)
Benefits of NAT (11.1.3)
709(1)
Benefits of NAT (11.1.3.1)
709(1)
Disadvantages of NAT (11.1.3.2)
710(6)
Configuring NAT (11.2)
710(1)
Configuring Static NAT (11.2.1.1)
711(2)
Analyzing Static NAT (11.2.1.2)
713(1)
Verifying Static NAT (11.2.1.3)
714(2)
Configuring Dynamic NAT (11.2.2)
716(8)
Dynamic NAT Operation (11.2.2.1)
716(1)
Configuring Dynamic NAT (11.2.2.2)
717(2)
Analyzing Dynamic NAT (11.2.2.3)
719(2)
Verifying Dynamic NAT (11.2.2.4)
721(3)
Configuring Port Address Translation (PAT) (11.2.3)
724(7)
Configuring PAT: Address Pool (11.2.3.1)
724(1)
Configuring PAT for a Pool of Public IP Addresses
724(2)
Configuring PAT: Single Address (11.2.3.2)
726(1)
Analyzing PAT (11.2.3.3)
727(1)
PC to Server Process
728(1)
Server to PC Process
729(1)
Verifying PAT (11.2.3.4)
730(1)
Port Forwarding (11.2.4)
731(5)
SOHO Example (11.2.4.2)
733(1)
Configuring Port Forwarding with IOS (11.2.4.3)
734(2)
Configuring NAT and IPv6 (11.2.5)
736(4)
NAT for IPv6? (11.2.5.1)
737(1)
IPv6 Unique Local Addresses (11.2.5.2)
738(1)
NAT for IPv6 (11.2.5.3)
739(1)
Troubleshooting NAT (11.3)
740(15)
Troubleshooting NAT: show Commands (11.3.1.1)
740(2)
Troubleshooting NAT: debug Command (11.3.1.2)
742(2)
Case Study (11.3.1.3)
744(1)
Case Study 1
744(3)
Summary (11.4)
747(1)
Practice
748(1)
Class Activities
748(1)
Labs
748(1)
Packet Tracer Activities
749(1)
Check Your Understanding Questions
749(6)
Appendix A Answers to the "Check Your Understanding" Questions 755(16)
Glossary 771(16)
Index 787
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain, networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industry -- developing foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."