Introduction |
|
xix | |
|
Chapter 1 Introduction to Switched Networks |
|
|
1 | (40) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (20) |
|
Converged Networks (1.1.1) |
|
|
3 | (1) |
|
Growing Complexity of Networks (1.1.1.1) |
|
|
3 | (2) |
|
Elements of a Converged Network (1.1.1.2) |
|
|
5 | (1) |
|
Cisco Borderless Network (1.1.1.3) |
|
|
6 | (1) |
|
Hierarchy in the Borderless Switched Network (1.1.1.4) |
|
|
7 | (2) |
|
Access, Distribution, and Core Layers (1.1.1.5) |
|
|
9 | (2) |
|
Switched Networks (1.1.2) |
|
|
11 | (1) |
|
Role of Switched Networks (1.1.2.1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
|
15 | (1) |
|
Multilayer Switching (1.1.2.4) |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (2) |
|
Forwarding Rates (1.1.3.2) |
|
|
19 | (1) |
|
Power over Ethernet (1.1.3.3) |
|
|
19 | (2) |
|
Cisco Catalyst Switch Breakdown (1.1.3.4) |
|
|
21 | (2) |
|
The Switched Environment (1.2) |
|
|
23 | (12) |
|
|
23 | (1) |
|
Switching as a General Concept in Networking and Telecommunications (1.2.1.1) |
|
|
23 | (2) |
|
Dynamically Populating a Switch MAC Address Table (1.2.1.2) |
|
|
25 | (3) |
|
Switch Forwarding Methods (1.2.1.3) |
|
|
28 | (1) |
|
Store-and-Forward Switching (1.2.1.4) |
|
|
29 | (1) |
|
Cut-Through Switching (1.2.1.5) |
|
|
30 | (1) |
|
Switching Domains (1.2.2) |
|
|
31 | (1) |
|
Collision Domains (1.2.2.1) |
|
|
32 | (1) |
|
Broadcast Domains (1.2.2.2) |
|
|
32 | (1) |
|
Alleviating Network Congestion (1.2.2.3) |
|
|
33 | (2) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
Check Your Understanding Questions |
|
|
37 | (4) |
|
Chapter 2 Basic Switching Concepts and Configuration |
|
|
41 | (54) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
Basic Switch Configuration (2.1) |
|
|
43 | (16) |
|
Configure a Switch with Initial Settings (2.1.1) |
|
|
43 | (1) |
|
Switch Boot Sequence (2.1.1.1) |
|
|
43 | (1) |
|
Recovering From a System Crash (2.1.1.2) |
|
|
44 | (1) |
|
Switch LED Indicators (2.1.1.3) |
|
|
45 | (2) |
|
Preparing for Basic Switch Management (2.1.1.4) |
|
|
47 | (1) |
|
Configuring Basic Switch Management Access with IPv4 (2.1.1.5) |
|
|
47 | (3) |
|
Configure Switch Ports (2.1.2) |
|
|
50 | (1) |
|
Duplex Communication (2.1.2.1) |
|
|
50 | (1) |
|
Configure Switch Ports at the Physical Layer (2.1.2.2) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Verifying Switch Port Configuration (2.1.2.4) |
|
|
53 | (2) |
|
Network Access Layer Issues (2.1.2.5) |
|
|
55 | (3) |
|
Troubleshooting Network Access Layer Issues (2.1.2.6) |
|
|
58 | (1) |
|
Switch Security: Management and Implementation (2.2) |
|
|
59 | (29) |
|
Secure Remote Access (2.2.1) |
|
|
60 | (1) |
|
|
60 | (2) |
|
Configuring SSH (2.2.1.2) |
|
|
62 | (2) |
|
|
64 | (2) |
|
Security Concerns in LANs (2.2.2) |
|
|
66 | (1) |
|
Common Security Attacks: MAC Address Flooding (2.2.2.1) |
|
|
66 | (3) |
|
Common Security Attacks: DHCP Spoofing (2.2.2.2) |
|
|
69 | (1) |
|
Common Security Attacks: Leveraging CDP (2.2.2.3) |
|
|
70 | (2) |
|
Security Best Practices (2.2.3) |
|
|
72 | (1) |
|
|
72 | (1) |
|
Network Security Tools and Testing (2.2.3.2) |
|
|
73 | (1) |
|
Network Security Audits (2.2.3.3) |
|
|
74 | (1) |
|
Switch Port Security (2.2.4) |
|
|
74 | (1) |
|
Secure Unused Ports (2.2.4.1) |
|
|
74 | (1) |
|
|
75 | (2) |
|
Port Security: Operation (2.2.4.3) |
|
|
77 | (1) |
|
Port Security: Violation Modes (2.2.4.4) |
|
|
78 | (2) |
|
Port Security: Configuring (2.2.4.5) |
|
|
80 | (1) |
|
Port Security: Verifying (2.2.4.6) |
|
|
81 | (2) |
|
Ports in Error-Disabled State (2.2.4.7) |
|
|
83 | (2) |
|
Network Time Protocol (NTP) (2.2.4.8) |
|
|
85 | (3) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
|
Check Your Understanding Questions |
|
|
91 | (4) |
|
|
95 | (56) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
97 | (12) |
|
Overview of VLANs (3.1.1) |
|
|
97 | (1) |
|
VLAN Definitions (3.1.1.1) |
|
|
97 | (1) |
|
Benefits of VLANs (3.1.1.2) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
VLANs in a Multiswitch Environment (3.1.2) |
|
|
102 | (1) |
|
|
102 | (1) |
|
Controlling Broadcast Domains with VLANs (3.1.2.2) |
|
|
103 | (2) |
|
Tagging Ethernet Frames for VLAN Identification (3.1.2.3) |
|
|
105 | (1) |
|
Native VLANs and 802.1Q Tagging (3.1.2.4) |
|
|
106 | (1) |
|
Voice VLAN Tagging (3.1.2.5) |
|
|
107 | (2) |
|
VLAN Implementations (3.2) |
|
|
109 | (29) |
|
|
109 | (1) |
|
VLAN Ranges on Catalyst Switches (3.2.1.1) |
|
|
110 | (1) |
|
Creating a VLAN (3.2.1.2) |
|
|
111 | (1) |
|
Assigning Ports to VLANs (3.2.1.3) |
|
|
112 | (1) |
|
Changing VLAN Port Membership (3.2.1.4) |
|
|
113 | (3) |
|
|
116 | (1) |
|
Verifying VLAN Information (3.2.1.6) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Configuring IEEE 802.1Q Trunk Links (3.2.2.1) |
|
|
119 | (2) |
|
Resetting the Trunk to the Default State (3.2.2.2) |
|
|
121 | (2) |
|
Verifying Trunk Configuration (3.2.2.3) |
|
|
123 | (1) |
|
Dynamic Trunking Protocol (3.2.3) |
|
|
124 | (1) |
|
Introduction to DTP (3.2.3.1) |
|
|
125 | (1) |
|
Negotiated Interface Modes (3.2.3.2) |
|
|
126 | (2) |
|
Troubleshoot VLANs and Trunks (3.2.4) |
|
|
128 | (1) |
|
IP Addressing Issues with VLAN (3.2.4.1) |
|
|
128 | (1) |
|
|
129 | (2) |
|
Introduction to Troubleshooting Trunks (3.2.4.3) |
|
|
131 | (1) |
|
Common Problems with Trunks (3.2.4.4) |
|
|
132 | (1) |
|
Trunk Mode Mismatches (3.2.4.5) |
|
|
133 | (2) |
|
Incorrect VLAN List (3.2.4.6) |
|
|
135 | (3) |
|
VLAN Security and Design (3.3) |
|
|
138 | (6) |
|
|
138 | (1) |
|
Switch Spoofing Attack (3.3.1.1) |
|
|
138 | (1) |
|
Double-Tagging Attack (3.3.1.2) |
|
|
139 | (1) |
|
|
140 | (2) |
|
VLAN Best Practices (3.3.2) |
|
|
142 | (1) |
|
VLAN Design Guidelines (3.3.2.1) |
|
|
142 | (2) |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Check Your Understanding Questions |
|
|
147 | (4) |
|
|
151 | (76) |
|
|
151 | (1) |
|
|
151 | (2) |
|
|
153 | (1) |
|
Spanning Tree Concepts (4.1) |
|
|
154 | (28) |
|
|
154 | (1) |
|
Redundancy at OSI Layers 1 and 2 (4.1.1.1) |
|
|
154 | (2) |
|
Issues with Layer 1 Redundancy: MAC Database Instability (4.1.1.2) |
|
|
156 | (5) |
|
Issues with Layer 1 Redundancy: Broadcast Storms (4.1.1.3) |
|
|
161 | (1) |
|
Issues with Layer 1 Redundancy: Duplicate Unicast Frames (4.1.1.4) |
|
|
161 | (1) |
|
|
162 | (1) |
|
Spanning Tree Algorithm: Introduction (4.1.2.1) |
|
|
162 | (3) |
|
Spanning Tree Algorithm: Port Roles (4.1.2.2) |
|
|
165 | (2) |
|
Spanning Tree Algorithm: Root Bridge (4.1.2.3) |
|
|
167 | (1) |
|
Spanning Tree Algorithm: Path Cost (4.1.2.4) |
|
|
168 | (3) |
|
802.1D BPDU Frame Format (4.1.2.5) |
|
|
171 | (2) |
|
BPDU Propagation and Process (4.1.2.6) |
|
|
173 | (5) |
|
Extended System ID (4.1.2.7) |
|
|
178 | (4) |
|
Varieties of Spanning Tree Protocols (4.2) |
|
|
182 | (11) |
|
|
182 | (1) |
|
List of Spanning Tree Protocols (4.2.1.1) |
|
|
182 | (1) |
|
Characteristics of the Spanning Tree Protocols (4.2.1.2) |
|
|
183 | (2) |
|
|
185 | (1) |
|
Overview of PVST+ (4.2.2.1) |
|
|
185 | (1) |
|
Port States and PVST+ Operation (4.2.2.2) |
|
|
186 | (2) |
|
Extended System ID and PVST+ Operation (4.2.2.3) |
|
|
188 | (1) |
|
|
189 | (1) |
|
Overview of Rapid PVST+ (4.2.3.1) |
|
|
189 | (1) |
|
|
190 | (2) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Spanning Tree Configuration (4.3) |
|
|
193 | (17) |
|
PVST+ Configuration (4.3.1) |
|
|
193 | (1) |
|
Catalyst 2960 Default Configuration (4.3.1.1) |
|
|
194 | (1) |
|
Configuring and Verifying the Bridge ID (4.3.1.2) |
|
|
194 | (2) |
|
PortFast and BPDU Guard (4.3.1.3) |
|
|
196 | (3) |
|
PVST+ Load Balancing (4.3.1.4) |
|
|
199 | (3) |
|
Rapid PVST+ Configuration (4.3.2) |
|
|
202 | (1) |
|
Spanning Tree Mode (4.3.2.1) |
|
|
202 | (3) |
|
STP Configuration Issues (4.3.3) |
|
|
205 | (1) |
|
Analyzing the STP Topology (4.3.3.1) |
|
|
205 | (1) |
|
Expected Topology Versus Actual Topology (4.3.3.2) |
|
|
206 | (1) |
|
Overview of Spanning Tree Status (4.3.3.3) |
|
|
207 | (1) |
|
Spanning Tree Failure Consequences (4.3.3.4) |
|
|
207 | (3) |
|
Repairing a Spanning Tree Problem (4.3.3.5) |
|
|
210 | (1) |
|
First Hop Redundancy Protocols (4.4) |
|
|
210 | (10) |
|
Concept of First Hop Redundancy Protocols (4.4.1) |
|
|
211 | (1) |
|
Default Gateway Limitations (4.4.1.1) |
|
|
211 | (1) |
|
Router Redundancy (4.4.1.2) |
|
|
212 | (1) |
|
Steps for Router Failover (4.4.1.3) |
|
|
213 | (1) |
|
Varieties of First Hop Redundancy Protocols (4.4.2) |
|
|
214 | (1) |
|
First Hop Redundancy Protocols (4.4.2.1) |
|
|
214 | (1) |
|
FHRP Verification (4.4.3) |
|
|
215 | (1) |
|
HSRP Verification (4.4.3.1) |
|
|
216 | (1) |
|
GLBP Verification (4.4.3.2) |
|
|
217 | (3) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
Check Your Understanding Questions |
|
|
222 | (5) |
|
Chapter 5 Link Aggregation |
|
|
227 | (24) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Link Aggregation Concepts (5.1) |
|
|
228 | (7) |
|
|
229 | (1) |
|
Introduction to Link Aggregation (5.1.1.1) |
|
|
229 | (1) |
|
Advantages of EtherChannel (5.1.1.2) |
|
|
230 | (1) |
|
EtherChannel Operation (5.1.2) |
|
|
231 | (1) |
|
Implementation Restrictions (5.1.2.1) |
|
|
231 | (1) |
|
Port Aggregation Protocol (5.1.2.2) |
|
|
232 | (2) |
|
Link Aggregation Control Protocol (5.1.2.3) |
|
|
234 | (1) |
|
Link Aggregation Configuration (5.2) |
|
|
235 | (10) |
|
Configuring EtherChannel (5.2.1) |
|
|
235 | (1) |
|
Configuration Guidelines (5.2.1.1) |
|
|
236 | (1) |
|
Configuring Interfaces (5.2.1.2) |
|
|
237 | (1) |
|
Verifying and Troubleshooting EtherChannel (5.2.2) |
|
|
238 | (1) |
|
Verifying EtherChannel (5.2.2.1) |
|
|
238 | (3) |
|
Troubleshooting EtherChannel (5.2.2.2) |
|
|
241 | (4) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
Check Your Understanding Questions |
|
|
247 | (4) |
|
Chapter 6 Inter-VLAN Routing |
|
|
251 | (52) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Inter-VLAN Routing Configuration (6.1) |
|
|
252 | (18) |
|
Inter-VLAN Routing Operation (6.1.1) |
|
|
253 | (1) |
|
What Is Inter-VLAN Routing? (6.1.1.1) |
|
|
253 | (1) |
|
Legacy Inter-VLAN Routing (6.1.1.2) |
|
|
254 | (1) |
|
Router-on-a-Stick Inter-VLAN Routing (6.1.1.3) |
|
|
255 | (1) |
|
Multilayer Switch Inter-VLAN Routing (6.1.1.4) |
|
|
256 | (1) |
|
Configure Legacy Inter-VLAN Routing (6.1.2) |
|
|
257 | (1) |
|
Configure Legacy Inter-VLAN Routing: Preparation (6.1.2.1) |
|
|
257 | (2) |
|
Configure Legacy Inter-VLAN Routing: Switch Configuration (6.1.2.2) |
|
|
259 | (1) |
|
Configure Legacy Inter-VLAN Routing: Router Interface Configuration (6.1.2.3) |
|
|
260 | (2) |
|
Configure Router-on-a-Stick Inter-VLAN Routing (6.1.3) |
|
|
262 | (1) |
|
Configure Router-on-a-Stick: Preparation (6.1.3.1) |
|
|
262 | (2) |
|
Configure Router-on-a-Stick: Switch Configuration (6.1.3.2) |
|
|
264 | (1) |
|
Configure Router-on-a-Stick: Router Subinterface Configuration (6.1.3.3) |
|
|
265 | (1) |
|
Configure Router-on-a-Stick: Verifying Subinterfaces (6.1.3.4) |
|
|
266 | (2) |
|
Configure Router-on-a-Stick: Verifying Routing (6.1.3.5) |
|
|
268 | (2) |
|
Troubleshoot Inter-VLAN Routing (6.2) |
|
|
270 | (10) |
|
Inter-VLAN Configuration Issues (6.2.1) |
|
|
270 | (1) |
|
Switch Port Issues (6.2.1.1) |
|
|
270 | (2) |
|
Verify Switch Configuration (6.2.1.2) |
|
|
272 | (1) |
|
Interface Issues (6.2.1.3) |
|
|
273 | (1) |
|
Verify Router Configuration (6.2.1.4) |
|
|
274 | (2) |
|
IP Addressing Issues (6.2.2) |
|
|
276 | (1) |
|
Errors with IP Addresses and Subnet Masks (6.2.2.1) |
|
|
276 | (2) |
|
Verifying IP Address and Subnet Mask Configuration Issues (6.2.2.2) |
|
|
278 | (2) |
|
|
280 | (15) |
|
Layer 3 Switching Operation and Configuration (6.3.1) |
|
|
280 | (1) |
|
Introduction to Layer 3 Switching (6.3.1.1) |
|
|
280 | (2) |
|
Inter-VLAN Routing with Switch Virtual Interfaces (6.3.1.2) |
|
|
282 | (2) |
|
Inter-VLAN Routing with Routed Ports (6.3.1.4) |
|
|
284 | (1) |
|
Configuring Static Routes on a Catalyst 2960 Switch (6.3.1.5) |
|
|
285 | (6) |
|
Troubleshoot Layer 3 Switching (6.3.2) |
|
|
291 | (1) |
|
Layer 3 Switch Configuration Issues (6.3.2.1) |
|
|
291 | (1) |
|
Example: Troubleshooting Layer 3 Switching (6.3.2.2) |
|
|
292 | (3) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Check Your Understanding Questions |
|
|
297 | (6) |
|
|
303 | (60) |
|
|
303 | (1) |
|
|
303 | (2) |
|
|
305 | (1) |
|
Dynamic Host Configuration Protocol v4 (7.1) |
|
|
306 | (25) |
|
|
306 | (1) |
|
Introducing DHCPv4 (7.1.1.1) |
|
|
306 | (1) |
|
DHCPv4 Operation (7.1.1.2) |
|
|
307 | (4) |
|
DHCPv4 Message Format (7.1.1.3) |
|
|
311 | (2) |
|
DHCPv4 Discover and Offer Messages (7.1.1.4) |
|
|
313 | (2) |
|
Configuring a Basic DHCPv4 Server (7.1.2) |
|
|
315 | (1) |
|
Configuring a Basic DHCPv4 Server (7.1.2.1) |
|
|
315 | (3) |
|
Verifying DHCPv4 (7.1.2.2) |
|
|
318 | (4) |
|
|
322 | (3) |
|
Configure DHCPv4 Client (7.1.3) |
|
|
325 | (1) |
|
Configuring a Router as DHCPv4 Client (7.1.3.1) |
|
|
325 | (1) |
|
Configuring a SOHO Router as a DHCPv4 Client (7.1.3.2) |
|
|
326 | (1) |
|
Troubleshoot DHCPv4 (7.1.4) |
|
|
327 | (1) |
|
Troubleshooting Tasks (7.1.4.1) |
|
|
327 | (2) |
|
Verify Router DHCPv4 Configuration (7.1.4.2) |
|
|
329 | (1) |
|
Debugging DHCPv4 (7.1.4.3) |
|
|
330 | (1) |
|
Dynamic Host Configuration Protocol for IPv6 (DHCPv6) (7.2) |
|
|
331 | (26) |
|
|
331 | (1) |
|
Stateless Address Autoconfiguration (SLAAC) (7.2.1.1) |
|
|
331 | (2) |
|
SLAAC Operation (7.2.1.2) |
|
|
333 | (2) |
|
SLAAC and DHCPv6 (7.2.1.3) |
|
|
335 | (1) |
|
|
336 | (1) |
|
Stateless DHCPv6 Option (7.2.1.5) |
|
|
337 | (1) |
|
Stateful DHCPv6 Option (7.2.1.6) |
|
|
338 | (1) |
|
DHCPv6 Operations (7.2.1.7) |
|
|
339 | (3) |
|
|
342 | (1) |
|
Configuring a Router as a Stateless DHCPv6 Server (7.2.2.1) |
|
|
342 | (2) |
|
Configuring a Router as a Stateless DHCPv6 Client (7.2.2.2) |
|
|
344 | (1) |
|
Verifying Stateless DHCPv6 (7.2.2.3) |
|
|
344 | (2) |
|
Stateful DHCPv6 Server (7.2.3) |
|
|
346 | (1) |
|
Configuring a Router as a Stateful DHCPv6 Server (7.2.3.1) |
|
|
346 | (3) |
|
Configuring a Router as a Stateful DHCPv6 Client (7.2.3.2) |
|
|
349 | (1) |
|
Verifying Stateful DHCPv6 (7.2.3.3) |
|
|
349 | (2) |
|
Configuring a Router as a DHCPv6 Relay Agent (7.2.3.4) |
|
|
351 | (1) |
|
Troubleshoot DHCPv6 (7.2.4) |
|
|
352 | (1) |
|
Troubleshooting Tasks (7.2.4.1) |
|
|
353 | (1) |
|
Verify Router DHCPv6 Configuration (7.2.4.2) |
|
|
354 | (1) |
|
Debugging DHCPv6 (7.2.4.3) |
|
|
355 | (2) |
|
|
357 | (2) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
|
359 | (1) |
|
Check Your Understanding Questions |
|
|
360 | (3) |
|
|
363 | (102) |
|
|
363 | (1) |
|
|
363 | (4) |
|
|
367 | (1) |
|
|
367 | (28) |
|
Introduction to Wireless (8.1.1) |
|
|
367 | (1) |
|
Supporting Mobility (8.1.1.1) |
|
|
368 | (1) |
|
Benefits of Wireless (8.1.1.2) |
|
|
368 | (1) |
|
Wireless Technologies (8.1.1.3) |
|
|
369 | (1) |
|
Radio Frequencies (8.1.1.4) |
|
|
370 | (1) |
|
802.11 Standards (8.1.1.5) |
|
|
371 | (2) |
|
Wi-Fi Certification (8.1.1.6) |
|
|
373 | (2) |
|
Comparing WLANs to a LAN (8.1.1.7) |
|
|
375 | (1) |
|
Components of WLANs (8.1.2) |
|
|
376 | (1) |
|
|
376 | (1) |
|
Wireless Home Router (8.1.2.2) |
|
|
377 | (2) |
|
Business Wireless Solutions (8.1.2.3) |
|
|
379 | (1) |
|
Wireless Access Points (8.1.2.4) |
|
|
380 | (2) |
|
Small Wireless Deployment Solutions (8.1.2.5) |
|
|
382 | (3) |
|
Large Wireless Deployment Solutions (8.1.2.6) |
|
|
385 | (2) |
|
Large Wireless Deployment Solutions, Cont. (8.1.2.7) |
|
|
387 | (2) |
|
Wireless Antennas (8.1.2.8) |
|
|
389 | (2) |
|
802.11 WLAN Topologies (8.1.3) |
|
|
391 | (1) |
|
802.11 Wireless Topology Modes (8.1.3.1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Infrastructure Mode (8.1.3.3) |
|
|
393 | (2) |
|
Wireless LAN Operations (8.2) |
|
|
395 | (25) |
|
802.11 Frame Structure (8.2.1) |
|
|
395 | (1) |
|
Wireless 802.11 Frame (8.2.1.1) |
|
|
395 | (2) |
|
Frame Control Field (8.2.1.2) |
|
|
397 | (2) |
|
Wireless Frame Type (8.2.1.3) |
|
|
399 | (1) |
|
Management Frames (8.2.1.4) |
|
|
400 | (2) |
|
|
402 | (1) |
|
Wireless Operation (8.2.2) |
|
|
403 | (1) |
|
Carrier Sense Multiple Access with Collision Avoidance (8.2.2.1) |
|
|
404 | (1) |
|
Wireless Clients and Access Point Association (8.2.2.2) |
|
|
405 | (1) |
|
Association Parameters (8.2.2.3) |
|
|
406 | (3) |
|
Discovering APs (8.2.2.4) |
|
|
409 | (2) |
|
|
411 | (2) |
|
Channel Management (8.2.3) |
|
|
413 | (1) |
|
Frequency Channel Saturation (8.2.3.1) |
|
|
413 | (2) |
|
Selecting Channels (8.2.3.2) |
|
|
415 | (3) |
|
Planning a WLAN Deployment (8.2.3.3) |
|
|
418 | (2) |
|
Wireless LAN Security (8.3) |
|
|
420 | (15) |
|
|
420 | (1) |
|
Securing Wireless (8.3.1.1) |
|
|
420 | (2) |
|
|
422 | (1) |
|
Management Frame DoS Attacks (8.3.1.3) |
|
|
423 | (2) |
|
Rogue Access Points (8.3.1.4) |
|
|
425 | (1) |
|
Man-in-the-Middle Attack (8.3.1.5) |
|
|
426 | (2) |
|
|
428 | (1) |
|
Wireless Security Overview (8.3.2.1) |
|
|
428 | (2) |
|
Shared Key Authentication Methods (8.3.2.2) |
|
|
430 | (2) |
|
Encryption Methods (8.3.2.3) |
|
|
432 | (1) |
|
Authenticating a Home User (8.3.2.4) |
|
|
432 | (2) |
|
Authentication in the Enterprise (8.3.2.5) |
|
|
434 | (1) |
|
Wireless LAN Configuration (8.4) |
|
|
435 | (25) |
|
Configure a Wireless Router (8.4.1) |
|
|
435 | (1) |
|
Configuring a Wireless Router (8.4.1.1) |
|
|
435 | (2) |
|
Setting Up and Installing Initial Linksys EA6500 (8.4.1.2) |
|
|
437 | (4) |
|
Configuring the Linksys Smart Wi-Fi Home Page (8.4.1.3) |
|
|
441 | (2) |
|
Smart Wi-Fi Settings (8.4.1.4) |
|
|
443 | (3) |
|
Smart Wi-Fi Tools (8.4.1.5) |
|
|
446 | (4) |
|
Backing Up a Configuration (8.4.1.6) |
|
|
450 | (2) |
|
Configuring Wireless Clients (8.4.2) |
|
|
452 | (1) |
|
Connecting Wireless Clients (8.4.2.1) |
|
|
452 | (1) |
|
Troubleshoot WLAN Issues (8.4.3) |
|
|
453 | (1) |
|
Troubleshooting Approaches (8.4.3.1) |
|
|
453 | (2) |
|
Wireless Client Not Connecting (8.4.3.2) |
|
|
455 | (1) |
|
Troubleshooting When the Network Is Slow (8.4.3.3) |
|
|
456 | (2) |
|
Updating Firmware (8.4.3.4) |
|
|
458 | (2) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
Check Your Understanding Questions |
|
|
462 | (3) |
Appendix A Answers to "Check Your Understanding" Questions |
|
465 | (12) |
Glossary |
|
477 | (26) |
Index |
|
503 | |