Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
- By Cisco Networking Academy, Allan Johnson
- Published Aug 22, 2020 by Cisco Press. Part of the Course Booklets series.
Features
- Easy to read, highlight, and review on the go, wherever the Internet is not available
- Extracted directly from the online course, making this the perfect complement for students taking the online course
- An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic Flash-based activities
- Copyright 2020
- Dimensions: 8-1/2" x 10-7/8"
- Pages: 416
- Edition: 1st
- Book
- ISBN-10: 0-13-663473-7
- ISBN-13: 978-0-13-663473-7
Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:
- The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section.
- Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.
- An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes.
This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.
Related titles:
CCNA 200-301 Portable Command Guide
Book: 9780135937822
eBook: 9780135937709
Enterprise Networking, Security, and Automation Companion Guide CCNAv7
Book: 9780136634324
eBook: 9780136634249
Enterprise Networking, Security, and Automation Labs & Study Guide CCNAv7
Book: 9780136634690
Table of Contents
Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365
9780136634737 TOC 6/18/2020
- Request an Instructor or Media review copy.
- Corporate, Academic, and Employee Purchases
- International Buying Options