Introduction |
|
xxi | |
|
Chapter 1 Routing Concepts |
|
|
1 | (74) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
Router Initial Configuration (1.1) |
|
|
4 | (33) |
|
|
4 | (1) |
|
Characteristics of a Network (1.1.1.1) |
|
|
4 | (2) |
|
|
6 | (1) |
|
Routers Are Computers (1.1.1.3) |
|
|
7 | (2) |
|
Routers Interconnect Networks (1.1.1.4) |
|
|
9 | (1) |
|
Routers Choose Best Paths (1.1.1.5) |
|
|
10 | (1) |
|
Packet-Forwarding Mechanisms (1.1.1.6) |
|
|
11 | (3) |
|
|
14 | (1) |
|
Connect to a Network (1.1.2.1) |
|
|
14 | (2) |
|
Default Gateways (1.1.2.2) |
|
|
16 | (1) |
|
Document Network Addressing (1.1.2.3) |
|
|
17 | (1) |
|
Enable IP on a Host (1.1.2.4) |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
21 | (1) |
|
Enable IP on a Switch (1.1.2.7) |
|
|
22 | (1) |
|
Router Basic Settings (1.1.3) |
|
|
23 | (1) |
|
Configure Basic Router Settings (1.1.3.1) |
|
|
23 | (1) |
|
Configure an IPv4 Router Interface (1.1.3.2) |
|
|
24 | (2) |
|
Configure an IPv6 Router Interface (1.1.3.3) |
|
|
26 | (3) |
|
Configure an IPv4 Loopback Interface (1.1.3.4) |
|
|
29 | (1) |
|
Verify Connectivity of Directly Connected Networks (1.1.4) |
|
|
30 | (1) |
|
Verify Interface Settings (1.1.4.1) |
|
|
30 | (2) |
|
Verify IPv6 Interface Settings (1.1.4.2) |
|
|
32 | (3) |
|
Filter Show Command Output (1.1.4.3) |
|
|
35 | (1) |
|
Command History Feature (1.1.4.4) |
|
|
36 | (1) |
|
|
37 | (11) |
|
Switching Packets Between Networks (1.2.1) |
|
|
37 | (1) |
|
Router Switching Function (1.2.1.1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
Forward to the Next Hop (1.2.1.3) |
|
|
40 | (2) |
|
|
42 | (1) |
|
Reach the Destination (1.2.1.5) |
|
|
43 | (1) |
|
Path Determination (1.2.2) |
|
|
44 | (1) |
|
Routing Decisions (1.2.2.1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Administrative Distance (1.2.2.4) |
|
|
47 | (1) |
|
|
48 | (19) |
|
Analyze the Routing Table (1.3.1) |
|
|
49 | (1) |
|
The Routing Table (1.3.1.1) |
|
|
49 | (1) |
|
Routing Table Sources (1.3.1.2) |
|
|
49 | (2) |
|
Remote Network Routing Entries (1.3.1.3) |
|
|
51 | (1) |
|
Directly Connected Routes (1.3.2) |
|
|
52 | (1) |
|
Directly Connected Interfaces (1.3.2.1) |
|
|
52 | (1) |
|
Directly Connected Routing Table Entries (1.3.2.2) |
|
|
53 | (1) |
|
Directly Connected Examples (1.3.2.3) |
|
|
54 | (1) |
|
Directly Connected IPv6 Example (1.3.2.4) |
|
|
55 | (3) |
|
Statically Learned Routes (1.3.3) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Static Route Examples (1.3.3.2) |
|
|
59 | (2) |
|
Static IPv6 Route Examples (1.3.3.3) |
|
|
61 | (1) |
|
Dynamic Routing Protocols (1.3.4) |
|
|
62 | (1) |
|
Dynamic Routing (1.3.4.1) |
|
|
62 | (1) |
|
IPv4 Routing Protocols (1.3.4.2) |
|
|
63 | (1) |
|
IPv4 Dynamic Routing Examples (1.3.4.3) |
|
|
64 | (1) |
|
IPv6 Routing Protocols (1.3.4.4) |
|
|
65 | (1) |
|
IPv6 Dynamic Routing Examples (1.3.4.5) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Check Your Understanding Questions |
|
|
69 | (6) |
|
|
75 | (52) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
Implement Static Routes (2.1) |
|
|
76 | (8) |
|
|
77 | (1) |
|
Reach Remote Networks (2.1.1.1) |
|
|
77 | (1) |
|
Why Use Static Routing? (2.1.1.2) |
|
|
78 | (1) |
|
When to Use Static Routes (2.1.1.3) |
|
|
79 | (1) |
|
Types of Static Routes (2.1.2) |
|
|
80 | (1) |
|
Static Route Applications (2.1.2.1) |
|
|
80 | (1) |
|
Standard Static Route (2.1.2.2) |
|
|
81 | (1) |
|
Default Static Route (2.1.2.3) |
|
|
81 | (1) |
|
Summary Static Route (2.1.2.4) |
|
|
82 | (1) |
|
Floating Static Route (2.1.2.5) |
|
|
83 | (1) |
|
Configure Static and Default Routes (2.2) |
|
|
84 | (31) |
|
Configure IPv4 Static Routes (2.2.1) |
|
|
84 | (1) |
|
The ip route Command (2.2.1.1) |
|
|
84 | (1) |
|
Next-Hop Options (2.2.1.2) |
|
|
85 | (2) |
|
Configure a Next-Hop Static Route (2.2.1.3) |
|
|
87 | (1) |
|
Configure a Directly Connected Static Route (2.2.1.4) |
|
|
88 | (2) |
|
Configure a Fully Specified Static Route (2.2.1.5) |
|
|
90 | (2) |
|
Verify a Static Route (2.2.1.6) |
|
|
92 | (1) |
|
Configure IPv4 Default Routes (2.2.2) |
|
|
93 | (1) |
|
Default Static Route (2.2.2.1) |
|
|
93 | (1) |
|
Configure a Default Static Route (2.2.2.2) |
|
|
93 | (1) |
|
Verify a Default Static Route (2.2.2.3) |
|
|
94 | (1) |
|
Configure IPv6 Static Routes (2.2.3) |
|
|
95 | (1) |
|
The ipv6 route Command (2.2.3.1) |
|
|
95 | (1) |
|
Next-Hop Options (2.2.3.2) |
|
|
96 | (3) |
|
Configure a Next-Hop Static IPv6 Route (2.2.3.3) |
|
|
99 | (1) |
|
Configure a Directly Connected Static IPv6 Route (2.2.3.4) |
|
|
100 | (2) |
|
Configure a Fully Specified Static IPv6 Route (2.2.3.5) |
|
|
102 | (1) |
|
Verify IPv6 Static Routes (2.2.3.6) |
|
|
103 | (1) |
|
Configure IPv6 Default Routes (2.2.4) |
|
|
104 | (1) |
|
Default Static IPv6 Route (2.2.4.1) |
|
|
104 | (1) |
|
Configure a Default Static IPv6 Route (2.2.4.2) |
|
|
105 | (1) |
|
Verify a Default Static Route (2.2.4.3) |
|
|
105 | (1) |
|
Configure Floating Static Routes (2.2.5) |
|
|
106 | (1) |
|
Floating Static Routes (2.2.5.1) |
|
|
106 | (1) |
|
Configure an IPv4 Floating Static Route (2.2.5.2) |
|
|
107 | (1) |
|
Test the IPv4 Floating Static Route (2.2.5.3) |
|
|
108 | (2) |
|
Configure an IPv6 Floating Static Route (2.2.5.4) |
|
|
110 | (1) |
|
Configure Static Host Routes (2.2.6) |
|
|
111 | (1) |
|
Automatically Installed Host Routes (2.2.6.1) |
|
|
111 | (2) |
|
Configure IPv4 and IPv6 Static Host Routes (2.2.6.2) |
|
|
113 | (2) |
|
Troubleshoot Static and Default Route (2.3) |
|
|
115 | (7) |
|
Packet Processing with Static Routes (2.3.1) |
|
|
115 | (1) |
|
Static Routes and Packet Forwarding (2.3.1.1) |
|
|
115 | (1) |
|
Troubleshoot IPv4 Static and Default Route Configuration (2.3.2) |
|
|
116 | (1) |
|
Troubleshoot a Missing Route (2.3.2.1) |
|
|
116 | (2) |
|
Solve a Connectivity Problem (2.3.2.2) |
|
|
118 | (4) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
Check Your Understanding Questions |
|
|
124 | (3) |
|
Chapter 3 Dynamic Routing |
|
|
127 | (44) |
|
|
127 | (1) |
|
|
127 | (2) |
|
|
129 | (1) |
|
Dynamic Routing Protocols (3.1) |
|
|
130 | (6) |
|
Dynamic Routing Protocol Overview (3.1.1) |
|
|
130 | (1) |
|
Dynamic Routing Protocol Evolution (3.1.1.1) |
|
|
130 | (2) |
|
Dynamic Routing Protocol Components (3.1.1.2) |
|
|
132 | (1) |
|
Dynamic Versus Static Routing (3.1.2) |
|
|
133 | (1) |
|
Static Routing Uses (3.1.2.1) |
|
|
133 | (1) |
|
Static Routing Advantages and Disadvantages (3.1.2.2) |
|
|
134 | (1) |
|
Dynamic Routing Protocols Uses (3.1.2.3) |
|
|
134 | (1) |
|
Dynamic Routing Advantages and Disadvantages (3.1.2.4) |
|
|
135 | (1) |
|
|
136 | (11) |
|
Configuring the RIP Protocol (3.2.1) |
|
|
136 | (1) |
|
Router RIP Configuration Mode (3.2.1.1) |
|
|
136 | (2) |
|
Advertise Networks (3.2.1.2) |
|
|
138 | (1) |
|
Verify RIP Routing (3.2.1.3) |
|
|
139 | (1) |
|
Enable and Verify RIPv2 (3.2.1.4) |
|
|
140 | (2) |
|
Disable Auto Summarization (3.2.1.5) |
|
|
142 | (1) |
|
Configure Passive Interfaces (3.2.1.6) |
|
|
143 | (2) |
|
Propagate a Default Route (3.2.1.7) |
|
|
145 | (2) |
|
|
147 | (18) |
|
Parts of an IPv4 Route Entry (3.3.1) |
|
|
147 | (1) |
|
Routing Table Entries (3.3.1.1) |
|
|
148 | (1) |
|
Directly Connected Entries (3.3.1.2) |
|
|
149 | (1) |
|
Remote Network Entries (3.3.1.3) |
|
|
150 | (1) |
|
Dynamically Learned IPv4 Routes (3.3.2) |
|
|
151 | (1) |
|
Routing Table Terms (3.3.2.1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Level 1 Parent Route (3.3.2.4) |
|
|
154 | (1) |
|
Level 2 Child Route (3.3.2.5) |
|
|
155 | (1) |
|
The IPv4 Route Lookup Process (3.3.3) |
|
|
156 | (1) |
|
Route Lookup Process (3.3.3.1) |
|
|
156 | (2) |
|
Best Route = Longest Match (3.3.3.2) |
|
|
158 | (1) |
|
Analyze an IPv6 Routing Table (3.3.4) |
|
|
159 | (1) |
|
IPv6 Routing Table Entries (3.3.4.1) |
|
|
159 | (1) |
|
Directly Connected Entries (3.3.4.2) |
|
|
160 | (2) |
|
Remote IPv6 Network Entries (3.3.4.3) |
|
|
162 | (3) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
Check Your Understanding Questions |
|
|
166 | (5) |
|
Chapter 4 Switched Networks |
|
|
171 | (32) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
173 | (12) |
|
Converged Networks (4.1.1) |
|
|
174 | (1) |
|
Growing Complexity of Networks (4.1.1.1) |
|
|
174 | (1) |
|
Elements of a Converged Network (4.1.1.2) |
|
|
175 | (1) |
|
Cisco Borderless Networks (4.1.1.3) |
|
|
176 | (1) |
|
Hierarchy in the Borderless Switched Network (4.1.1.4) |
|
|
177 | (2) |
|
Access, Distribution, and Core Layers (4.1.1.5) |
|
|
179 | (2) |
|
Switched Networks (4.1.2) |
|
|
181 | (1) |
|
Role of Switched Networks (4.1.2.1) |
|
|
181 | (2) |
|
|
183 | (2) |
|
The Switched Environment (4.2) |
|
|
185 | (12) |
|
|
186 | (1) |
|
Switching as a General Concept in Networking and Telecommunications (4.2.1.1) |
|
|
186 | (2) |
|
Dynamically Populating a Switch MAC Address Table (4.2.1.2) |
|
|
188 | (1) |
|
Switch Forwarding Methods (4.2.1.3) |
|
|
189 | (1) |
|
Store-and-Forward Switching (4.2.1.4) |
|
|
190 | (1) |
|
Cut-Through Switching (4.2.1.5) |
|
|
191 | (2) |
|
Switching Domains (4.2.2) |
|
|
193 | (1) |
|
Collision Domains (4.2.2.1) |
|
|
193 | (1) |
|
Broadcast Domains (4.2.2.2) |
|
|
194 | (1) |
|
Alleviating Network Congestion (4.2.2.3) |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Check Your Understanding Questions |
|
|
199 | (4) |
|
Chapter 5 Switch Configuration |
|
|
203 | (42) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
Basic Switch Configuration (5.1) |
|
|
205 | (17) |
|
Configure a Switch with Initial Settings (5.1.1) |
|
|
205 | (1) |
|
Switch Boot Sequence (5.1.1.1) |
|
|
205 | (1) |
|
Recovering from a System Crash (5.1.1.2) |
|
|
206 | (1) |
|
Switch LED Indicators (5.1.1.3) |
|
|
207 | (2) |
|
Preparing for Basic Switch Management (5.1.1.4) |
|
|
209 | (1) |
|
Configuring Basic Switch Management Access with IPv4 (5.1.1.5) |
|
|
210 | (3) |
|
Configure Switch Ports (5.1.2) |
|
|
213 | (1) |
|
Duplex Communication (5.1.2.1) |
|
|
213 | (1) |
|
Configure Switch Ports at the Physical Layer (5.1.2.2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
Verifying Switch Port Configuration (5.1.2.4) |
|
|
216 | (2) |
|
Network Access Layer Issues (5.1.2.5) |
|
|
218 | (3) |
|
Troubleshooting Network Access Layer Issues (5.1.2.6) |
|
|
221 | (1) |
|
|
222 | (17) |
|
Secure Remote Access (5.2.1) |
|
|
222 | (1) |
|
|
222 | (3) |
|
Configuring SSH (5.2.1.2) |
|
|
225 | (2) |
|
|
227 | (2) |
|
Switch Port Security (5.2.2) |
|
|
229 | (1) |
|
Secure Unused Ports (5.2.2.1) |
|
|
229 | (1) |
|
Port Security: Operation (5.2.2.2) |
|
|
230 | (2) |
|
Port Security: Violation Modes (5.2.2.3) |
|
|
232 | (1) |
|
Port Security: Configuring (5.2.2.4) |
|
|
233 | (1) |
|
Port Security: Verifying (5.2.2.5) |
|
|
234 | (2) |
|
Ports in Error-Disabled State (5.2.2.6) |
|
|
236 | (3) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
241 | (1) |
|
Check Your Understanding Questions |
|
|
241 | (4) |
|
|
245 | (64) |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
247 | (1) |
|
|
248 | (12) |
|
Overview of VLANs (6.1.1) |
|
|
248 | (1) |
|
VLAN Definitions (6.1.1.1) |
|
|
248 | (1) |
|
Benefits of VLANs (6.1.1.2) |
|
|
249 | (1) |
|
|
250 | (2) |
|
|
252 | (1) |
|
VLANs in a Multiswitched Environment (6.1.2) |
|
|
253 | (1) |
|
|
253 | (1) |
|
Controlling Broadcast Domains with VLANs (6.1.2.2) |
|
|
254 | (2) |
|
Tagging Ethernet Frames for VLAN Identification (6.1.2.3) |
|
|
256 | (1) |
|
Native VLANs and 802.1Q Tagging (6.1.2.4) |
|
|
257 | (1) |
|
Voice VLAN Tagging (6.1.2.5) |
|
|
258 | (2) |
|
VLAN Implementations (6.2) |
|
|
260 | (27) |
|
|
260 | (1) |
|
VLAJV Ranges on Catalyst Switches (6.2.1.1) |
|
|
260 | (2) |
|
Creating a VLAN (6.2.1.2) |
|
|
262 | (1) |
|
Assigning Ports to VLANs (6.2.1.3) |
|
|
263 | (1) |
|
Changing VLAN Port Membership (6.2.1.4) |
|
|
264 | (2) |
|
|
266 | (1) |
|
Verifying VLAN Information (6.2.1.6) |
|
|
267 | (3) |
|
|
270 | (1) |
|
Configuring IEEE 802.1Q Trunk Links (6.2.2.1) |
|
|
270 | (2) |
|
Resetting the Trunk to Default State (6.2.2.2) |
|
|
272 | (1) |
|
Verifying Trunk Configuration (6.2.2.3) |
|
|
273 | (2) |
|
Troubleshoot VLANs and Trunks (6.2.3) |
|
|
275 | (1) |
|
IP Addressing Issues with VLAN (6.2.3.1) |
|
|
275 | (1) |
|
|
276 | (2) |
|
Introduction to Troubleshooting Trunks (6.2.3.3) |
|
|
278 | (1) |
|
Common Problems with Trunks (6.2.3.4) |
|
|
279 | (2) |
|
Incorrect Port Mode (6.2.3.5) |
|
|
281 | (3) |
|
Incorrect VLAN List (6.2.3.6) |
|
|
284 | (3) |
|
Inter-VLAN Routing Using Routers (6.3) |
|
|
287 | (16) |
|
Inter-VLAN Routing Operation (6.3.1) |
|
|
287 | (1) |
|
What Is Inter-VLAN Routing? (6.3.1.1) |
|
|
287 | (1) |
|
Legacy Inter-VLAN Routing (6.3.1.2) |
|
|
288 | (2) |
|
Router-on-a-Stick Inter-VLAN Routing (6.3.1.3) |
|
|
290 | (2) |
|
Configure Legacy Inter-VLAN Routing (6.3.2) |
|
|
292 | (1) |
|
Configure Legacy Inter-VLAN Routing: Preparation (6.3.2.1) |
|
|
292 | (1) |
|
Configure Legacy Inter-VLAN Routing: Switch Configuration (6.3.2.2) |
|
|
293 | (1) |
|
Configure Legacy Inter-VLAN Routing: Router Interface Configuration (6.3.2.3) |
|
|
294 | (2) |
|
Configure Router-on-a-Stick Inter-VLAN Routing (6.3.3) |
|
|
296 | (1) |
|
Configure Router-on-a-Stick: Preparation (6.3.3.1) |
|
|
296 | (1) |
|
Configure Router-on-a-Stick: Switch Configuration (6.3.3.2) |
|
|
297 | (1) |
|
Configure Router-on-a-Stick: Router Subinterface Configuration (6.3.3.3) |
|
|
298 | (1) |
|
Configure Router-on-a-Stick: Verifying Subinterfaces (6.3.3.4) |
|
|
299 | (1) |
|
Configure Router-on-a-Stick: Verifying Routing (6.3.3.5) |
|
|
300 | (3) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
Check Your Understanding Questions |
|
|
305 | (4) |
|
Chapter 7 Access Control Lists |
|
|
309 | (52) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (15) |
|
|
311 | (1) |
|
What Is an ACL? (7.1.1.1) |
|
|
311 | (1) |
|
Packet Filtering (7.1.1.2) |
|
|
312 | (1) |
|
|
313 | (1) |
|
Wildcard Masks in ACLs (7.1.2) |
|
|
314 | (1) |
|
Introducing ACL Wildcard Masking (7.1.2.1) |
|
|
314 | (2) |
|
Wildcard Mask Examples (7.1.2.2) |
|
|
316 | (1) |
|
Calculating the Wildcard Mask (7.1.2.3) |
|
|
317 | (2) |
|
Wildcard Mask Keywords (7.1.2.4) |
|
|
319 | (1) |
|
Wildcard Mask Keyword Examples (7.1.2.5) |
|
|
320 | (1) |
|
Guidelines for ACL Creation (7.1.3) |
|
|
321 | (1) |
|
General Guidelines for Creating ACLs (7.1.3.1) |
|
|
321 | (1) |
|
ACL Best Practices (7.1.3.2) |
|
|
322 | (1) |
|
Guidelines for ACL Placement (7.1.4) |
|
|
322 | (1) |
|
Where to Place ACLs (7.1.4.1) |
|
|
322 | (2) |
|
Standard ACL Placement (7.1.4.2) |
|
|
324 | (1) |
|
|
325 | (17) |
|
Configure Standard IPv4 ACLs (7.2.1) |
|
|
325 | (1) |
|
Numbered Standard IPv4 ACL Syntax (7.2.1.1) |
|
|
325 | (3) |
|
Applying Standard IPv4 ACLs to Interfaces (7.2.1.2) |
|
|
328 | (1) |
|
Numbered Standard IPv4 ACL Examples (7.2.1.3) |
|
|
329 | (1) |
|
Named Standard IPv4 ACL Syntax (7.2.1.4) |
|
|
330 | (2) |
|
|
332 | (1) |
|
Method 1 Use a Text Editor (7.2.2.1) |
|
|
333 | (1) |
|
Method 2 Use Sequence Numbers (7.2.2.2) |
|
|
334 | (1) |
|
Editing Standard Named ACLs (7.2.2.3) |
|
|
335 | (1) |
|
|
336 | (2) |
|
|
338 | (1) |
|
Securing VTY Ports with a Standard IPv4 ACL (7.2.3) |
|
|
339 | (1) |
|
The access-class Command (7.2.3.1) |
|
|
339 | (2) |
|
Verifying the VTY Port Is Secured (7.2.3.2) |
|
|
341 | (1) |
|
|
342 | (13) |
|
Processing Packets with ACLs (7.3.1) |
|
|
342 | (1) |
|
The Implicit Deny Any (7.3.1.1) |
|
|
343 | (1) |
|
The Order of ACEs in an ACL (7.3.1.2) |
|
|
343 | (1) |
|
Cisco IOS Reorders Standard ACLs (7.3.1.3) |
|
|
344 | (3) |
|
Routing Processes and ACLs (7.3.1.4) |
|
|
347 | (2) |
|
Common IPv4 Standard ACL Errors (7.3.2) |
|
|
349 | (1) |
|
Troubleshooting Standard IPv4 ACLs---Example 1 (7.3.2.1) |
|
|
349 | (2) |
|
Troubleshooting Standard IPv4 ACLs---Example 2 (7.3.2.2) |
|
|
351 | (1) |
|
Troubleshooting Standard IPv4 ACLs---Example 3 (7.3.2.3) |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
357 | (1) |
|
Check Your Understanding Questions |
|
|
357 | (4) |
|
|
361 | (54) |
|
|
361 | (1) |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
363 | (24) |
|
|
363 | (1) |
|
Introducing DHCPv4 (8.1.1.1) |
|
|
364 | (1) |
|
DHCPv4 Operation (8.1.1.2) |
|
|
364 | (3) |
|
DHCPv4 Message Format (8.1.1.3) |
|
|
367 | (2) |
|
DHCPv4 Discover and Offer Messages (8.1.1.4) |
|
|
369 | (1) |
|
Configuring a Basic DHCPv4 Server (8.1.2) |
|
|
370 | (1) |
|
Configuring a Basic DHCPv4 Server (8.1.2.1) |
|
|
370 | (3) |
|
Verifying DHCPv4 (8.1.2.2) |
|
|
373 | (4) |
|
|
377 | (3) |
|
Configure DHCPv4 Client (8.1.3) |
|
|
380 | (1) |
|
Configuring a Router as a DHCPv4 Client (8.1.3.1) |
|
|
380 | (1) |
|
Configuring a Wireless Router as a DHCPv4 Client (8.1.3.2) |
|
|
381 | (1) |
|
Troubleshoot DHCPv4 (8.1.4) |
|
|
382 | (1) |
|
Troubleshooting Tasks (8.1.4.1) |
|
|
382 | (2) |
|
Verify Router DHCPv4 Configuration (8.1.4.2) |
|
|
384 | (1) |
|
Debugging DHCPv4 (8.1.4.3) |
|
|
385 | (2) |
|
|
387 | (22) |
|
|
387 | (1) |
|
Stateless Address Autoconfiguration (SLAAC) (8.2.1.1) |
|
|
387 | (2) |
|
SLAAC Operation (8.2.1.2) |
|
|
389 | (1) |
|
SLAAC and DHCPv6 (8.2.1.3) |
|
|
390 | (1) |
|
|
391 | (1) |
|
Stateless DHCPv6 Option (8.2.1.5) |
|
|
392 | (1) |
|
Stateful DHCPv6 Option (8.2.1.6) |
|
|
393 | (1) |
|
DHCPv6 Operations (8.2.1.7) |
|
|
394 | (1) |
|
|
395 | (1) |
|
Configuring a Router as a Stateless DHCPv6 Server (8.2.2.1) |
|
|
395 | (1) |
|
Configuring a Router as a Stateless DHCPv6 Client (8.2.2.2) |
|
|
396 | (1) |
|
Verifying Stateless DHCPv6 (8.2.2.3) |
|
|
397 | (2) |
|
Stateful DHCPv6 Server (8.2.3) |
|
|
399 | (1) |
|
Configuring a Router as a Stateful DHCPv6 Server (8.2.3.1) |
|
|
399 | (2) |
|
Configuring a Router as a Stateful DHCPv6 Client (8.2.3.2) |
|
|
401 | (1) |
|
Verifying Stateful DHCPv6 (8.2.3.3) |
|
|
401 | (1) |
|
Configuring a Router as a DHCPv6 Relay Agent (8.2.3.4) |
|
|
402 | (2) |
|
Troubleshoot DHCPv6 (8.2.4) |
|
|
404 | (1) |
|
Troubleshooting Tasks (8.2.4.1) |
|
|
404 | (1) |
|
Verify Router DHCPv6 Configuration (8.2.4.2) |
|
|
405 | (2) |
|
Debugging DfiGPv6 (8.2.4.3) |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
411 | (1) |
|
Check Your Understanding Questions |
|
|
411 | (4) |
|
|
415 | (60) |
|
|
415 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
418 | (13) |
|
NAT Characteristics (9.1.1) |
|
|
418 | (1) |
|
IPv4 Private Address Space (9.1.1.1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
NAT Terminology (9.1.1.3 & 9.1.1.4) |
|
|
420 | (3) |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Port Address Translation (PAT) (9.1.2.3) |
|
|
426 | (1) |
|
Next Available Port (9.1.2.4) |
|
|
427 | (1) |
|
Comparing NAT and PAT (9.1.2.5) |
|
|
428 | (2) |
|
|
430 | (1) |
|
Advantages of NAT (9.1.3.1) |
|
|
430 | (1) |
|
Disadvantages of NAT (9.1.3.2) |
|
|
430 | (1) |
|
|
431 | (28) |
|
Configuring Static NAT (9.2.1) |
|
|
432 | (1) |
|
Configure Static NAT (9.2.1.1) |
|
|
432 | (1) |
|
Analyzing Static NAT (9.2.1.2) |
|
|
433 | (1) |
|
Verifying Static NAT (9.2.1.3) |
|
|
434 | (2) |
|
Configure Dynamic NAT (9.2.2) |
|
|
436 | (1) |
|
Dynamic NAT Operation (9.2.2.1) |
|
|
436 | (1) |
|
Configuring Dynamic NAT (9.2.2.2) |
|
|
437 | (1) |
|
Analyzing Dynamic NAT (9.2.2.3) |
|
|
438 | (2) |
|
Verifying Dynamic NAT (9.2.2.4) |
|
|
440 | (3) |
|
|
443 | (1) |
|
Configuring PAT: Address Pool (9.2.3.1) |
|
|
443 | (2) |
|
Configuring PAT: Single Address (9.2.3.2) |
|
|
445 | (1) |
|
|
446 | (3) |
|
|
449 | (2) |
|
Configure Port Forwarding (9.2.4) |
|
|
451 | (1) |
|
Port Forwarding (9.2.4.1) |
|
|
451 | (1) |
|
Wireless Router Example (9.2.4.2) |
|
|
452 | (1) |
|
Configuring Port Forwarding with IOS (9.2.4.3) |
|
|
453 | (3) |
|
|
456 | (1) |
|
|
456 | (1) |
|
IPv6 Unique Local Addresses (9.2.5.2) |
|
|
457 | (1) |
|
|
458 | (1) |
|
|
459 | (9) |
|
NAT Troubleshooting Commands (9.3.1) |
|
|
460 | (1) |
|
The show ip nat Commands (9.3.1.1) |
|
|
460 | (2) |
|
The debug ip nat Command (9.3.1.2) |
|
|
462 | (2) |
|
NAT Troubleshooting Scenario (9.3.1.3) |
|
|
464 | (4) |
|
|
468 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
|
469 | (1) |
|
Check Your Understanding Questions |
|
|
470 | (5) |
|
Chapter 10 Device Discovery, Management, and Maintenance |
|
|
475 | (66) |
|
|
475 | (1) |
|
|
475 | (2) |
|
|
477 | (1) |
|
|
477 | (9) |
|
Device Discovery with CDP (10.1.1) |
|
|
477 | (1) |
|
|
477 | (1) |
|
Configure and Verify CDP (10.1.1.2) |
|
|
478 | (2) |
|
Discover Devices Using CDP (10.1.1.3) |
|
|
480 | (3) |
|
Device Discovery with LLDP (10.1.2) |
|
|
483 | (1) |
|
|
483 | (1) |
|
Configure and Verify LLDP (10.1.2.2) |
|
|
484 | (1) |
|
Discover Devices Using LLDP (10.1.2.3) |
|
|
484 | (2) |
|
|
486 | (16) |
|
|
487 | (1) |
|
Setting the System Clock (10.2.1.1) |
|
|
487 | (1) |
|
|
488 | (1) |
|
Configure and Verify NTP (10.2.1.3) |
|
|
489 | (2) |
|
Syslog Operation (10.2.2) |
|
|
491 | (1) |
|
Introduction to Syslog (10.2.2.1) |
|
|
491 | (1) |
|
Syslog Operation (10.2.2.2) |
|
|
492 | (1) |
|
Syslog Message Format (10.2.2.3) |
|
|
493 | (3) |
|
Service Timestamp (10.2.2.4) |
|
|
496 | (1) |
|
Syslog Configuration (10.2.3) |
|
|
497 | (1) |
|
|
497 | (1) |
|
Default Logging (10.2.3.2) |
|
|
497 | (2) |
|
Router and Switch Commands for Syslog Clients (10.2.3.3) |
|
|
499 | (1) |
|
Verifying Syslog (10.2.3.4) |
|
|
500 | (2) |
|
Device Maintenance (10.3) |
|
|
502 | (32) |
|
Router and Switch File Maintenance (10.3.1) |
|
|
502 | (1) |
|
Router File Systems (10.3.1.1) |
|
|
502 | (3) |
|
Switch File Systems (10.3.1.2) |
|
|
505 | (1) |
|
Backing Up and Restoring Using Text Files (10.3.1.3) |
|
|
505 | (2) |
|
Backing Up and Restoring TFTP (10.3.1.4) |
|
|
507 | (1) |
|
Using USB Ports on a Cisco Router (10.3.1.5) |
|
|
508 | (1) |
|
Backing Up and Restoring Using a USB (10.3.1.6) |
|
|
508 | (3) |
|
Password Recovery (10.3.1.7) |
|
|
511 | (3) |
|
IOS System Files (10.3.2) |
|
|
514 | (1) |
|
IOS 15 System Image Packaging (10.3.2.1) |
|
|
514 | (1) |
|
IOS Image Filenames (10.3.2.2) |
|
|
515 | (2) |
|
IOS Image Management (10.3.3) |
|
|
517 | (1) |
|
TFTP Servers as a Backup Location (10.3.3.1) |
|
|
517 | (1) |
|
Steps to Back Up IOS Image to TFTP Server (10.3.3.2) |
|
|
518 | (1) |
|
Steps to Copy an IOS Image to a Device (10.3.3.3) |
|
|
519 | (2) |
|
The boot system Command (10.3.3.4) |
|
|
521 | (1) |
|
Software Licensing (10.3.4) |
|
|
522 | (1) |
|
Licensing Overview (10.3.4.1) |
|
|
522 | (2) |
|
Licensing Process (10.3.4.2) |
|
|
524 | (1) |
|
Step 1 Purchase the Software Package or Feature to Install (10.3.4.3) |
|
|
524 | (1) |
|
Step 2 Obtain a License (10.3.4.4) |
|
|
525 | (1) |
|
Step 3 Install the License (10.3.4.5) |
|
|
526 | (1) |
|
License Verification and Management (10.3.5) |
|
|
527 | (1) |
|
License Verification (10.3.5.1) |
|
|
527 | (2) |
|
Activate an Evaluation Right-to-Use License (10.3.5.2) |
|
|
529 | (2) |
|
Back Up the License (10.3.5.3) |
|
|
531 | (1) |
|
Uninstall the License (10.3.5.4) |
|
|
532 | (2) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
Check Your Understanding Questions |
|
|
535 | (6) |
Appendix A Answers to the "Check Your Understanding" Questions |
|
541 | (14) |
Glossary |
|
555 | (20) |
Index |
|
575 | |