larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Switching, Routing, and Wireless Essentials Course Booklet (CCNAv7)

Book

  • Your Price: $36.00
  • List Price: $40.00
  • Usually ships in 24 hours.
  • About
  • Description
  • Sample Content
  • Updates

Features

  • Easy to read, highlight, and review on the go, wherever the Internet is not available
  • Extracted directly from the online course, making this the perfect complement for students taking the online course
  • An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic Flash-based activities

  • Copyright 2020
  • Dimensions: 8-1/2" x 10-7/8"
  • Pages: 384
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-663472-9
  • ISBN-13: 978-0-13-663472-0

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

  • The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section.
  • Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.
  • An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes.
The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy Switching, Routing, and Wireless Essentials v7.0 (SRWE) online course.

This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.

Related titles: 

CCNA 200-301 Portable Command Guide
Book: 9780135937822
eBook: 9780135937709

Switching, Routing, and Wireless Essentials Companion Guide CCNAv7
Book: 9780136729358
eBook: 9780136729488

Switching, Routing, and Wireless Essentials Labs & Study Guide CCNAv7
Book: 9780136634386

Table of Contents

Introduction xxviii
Chapter 1 Basic Device Configuration 1
Introduction - 1.0 1
    Why should I take this module? - 1.0.1 1
    What will I learn to do in this module? - 1.0.2 1
Configure a Switch with Initial Settings - 1.1 1
    Switch Boot Sequence - 1.1.1 1
    The boot system Command - 1.1.2 2
    Switch LED Indicators - 1.1.3 2
    Recovering from a System Crash - 1.1.4 4
    Switch Management Access - 1.1.5 5
    Switch SVI Configuration Example - 1.1.6 5
    Lab: Basic Switch Configuration - 1.1.7 6
Configure Switch Ports - 1.2 7
    Duplex Communication - 1.2.1 7
    Configure Switch Ports at the Physical Layer - 1.2.2 7
    Auto-MDIX - 1.2.3 8
    Switch Verification Commands - 1.2.4 9
    Verify Switch Port Configuration - 1.2.5 9
    Network Access Layer Issues - 1.2.6 10
    Interface Input and Output Errors - 1.2.7 12
    Troubleshooting Network Access Layer Issues - 1.2.8 13
    Syntax Checker - Configure Switch Ports - 1.2.9 13
Secure Remote Access - 1.3 13
    Telnet Operation - 1.3.1 13
    SSH Operation - 1.3.2 14
    Verify the Switch Supports SSH - 1.3.3 14
    Configure SSH - 1.3.4 14
    Verify SSH is Operational - 1.3.5 16
    Packet Tracer - Configure SSH - 1.3.6 16
Basic Router Configuration - 1.4 17
    Configure Basic Router Settings - 1.4.1 17
    Syntax Checker - Configure Basic Router Settings - 1.4.2 18
    Dual Stack Topology - 1.4.3 18
    Configure Router Interfaces - 1.4.4 18
    Syntax Checker - Configure Router Interfaces - 1.4.5 19
    IPv4 Loopback Interfaces - 1.4.6 19
    Packet Tracer - Configure Router Interfaces - 1.4.7 20
Verify Directly Connected Networks - 1.5 20
    Interface Verification Commands - 1.5.1 20
    Verify Interface Status - 1.5.2 20
    Verify IPv6 Link Local and Multicast Addresses - 1.5.3 21
    Verify Interface Configuration - 1.5.4 22
    Verify Routes - 1.5.5 22
    Filter Show Command Output - 1.5.6 24
    Syntax Checker - Filter Show Command Output - 1.5.7 26
    Command History Feature - 1.5.8 26
    Syntax Checker - Command History Features - 1.5.9 26
    Packet Tracer - Verify Directly Connected Networks - 1.5.10 26
    Check Your Understanding - Verify Directly Connected Networks - 1.5.11 27
Module Practice and Quiz - 1.6 27
    Packet Tracer - Implement a Small Network - 1.6.1 27
    Lab - Configure Basic Router Settings - 1.6.2 27
    What did I learn in this module? - 1.6.3 27
Chapter Quiz - Basic Device Configuration 29
Your Chapter Notes 29
Chapter 2 Switching Concepts 31
Introduction - 2.0 31
    Why should I take this module? - 2.0.1 31
    What will I learn to do in this module? - 2.0.2 31
Frame Forwarding - 2.1 31
    Switching in Networking - 2.1.1 31
    The Switch MAC Address Table - 2.1.2 32
    The Switch Learn and Forward Method - 2.1.3 32
    Video - MAC Address Tables on Connected Switches - 2.1.4 33
    Switching Forwarding Methods - 2.1.5 33
    Store-and-Forward Switching - 2.1.6 33
    Cut-Through Switching - 2.1.7 33
    Activity - Switch It! 34
Switching Domains - 2.2 34
    Collision Domains - 2.2.1 34
    Broadcast Domains - 2.2.2 34
    Alleviate Network Congestion - 2.2.3 35
    Check Your Understanding - Switching Domains - 2.2.4 36
Module Practice and Quiz - 2.3 36
    What did I learn in this module? - 2.3.1 36
Chapter Quiz - Switching Concepts 37
Your Chapter Notes 37
Chapter 3 VLANs 39
Introduction - 3.0 39
    Why should I take this module? - 3.0.1 39
    What will I learn to do in this module? - 3.0.2 39
Overview of VLANs - 3.1 39
    VLAN Definitions - 3.1.1 39
    Benefits of a VLAN Design - 3.1.2 40
    Types of VLANs - 3.1.3 41
    Packet Tracer - Who Hears the Broadcast? - 3.1.4 43
    Check Your Understanding - Overview of VLANs - 3.1.5 43
VLANs in a Multi-Switched Environment - 3.2 43
    Defining VLAN Trunks - 3.2.1 43
    Network without VLANs - 3.2.2 43
    Network with VLANs - 3.2.3 43
    VLAN Identification with a Tag - 3.2.4 44
    Native VLANs and 802.1Q Tagging - 3.2.5 44
    Voice VLAN Tagging - 3.2.6 45
    Voice VLAN Verification Example - 3.2.7 46
    Packet Tracer - Investigate a VLAN Implementation - 3.2.8 46
    Check Your Understanding - VLANs in a Multi-Switch Environment - 3.2.9 46
VLAN Configuration - 3.3 46
    VLAN Ranges on Catalyst Switches - 3.3.1 46
    VLAN Creation Commands - 3.3.2 48
    VLAN Creation Example - 3.3.3 48
    VLAN Port Assignment Commands - 3.3.4 48
    VLAN Port Assignment Example - 3.3.5 49
    Data and Voice VLANs - 3.3.6 49
    Data and Voice VLAN Example - 3.3.7 49
    Verify VLAN Information - 3.3.8 50
    Change VLAN Port Membership - 3.3.9 51
    Delete VLANs - 3.3.10 52
    Syntax Checker - VLAN Configuration - 3.3.11 53
    Packet Tracer - VLAN Configuration - 3.3.12 53
VLAN Trunks - 3.4 53
    Trunk Configuration Commands - 3.4.1 53
    Trunk Configuration Example - 3.4.2 54
    Verify Trunk Configuration - 3.4.3 54
    Reset the Trunk to the Default State - 3.4.4 55
    Packet Tracer - Configure Trunks - 3.4.5 56
    Lab - Configure VLANs and Trunking - 3.4.6 57
Dynamic Trunking Protocol - 3.5 57
    Introduction to DTP - 3.5.1 57
    Negotiated Interface Modes - 3.5.2 58
    Results of a DTP Configuration - 3.5.3 58
    Verify DTP Mode - 3.5.4 59
    Packet Tracer - Configure DTP - 3.5.5 59
    Check Your Understanding - Dynamic Trunking Protocol - 3.5.6 59
Module Practice and Quiz - 3.6 59
    Packet Tracer - Implement VLANs and Trunking - 3.6.1 59
    Lab - Implement VLANs and Trunking - 3.6.2 60
    What did I learn in this module? - 3.6.3 60
Chapter Quiz - VLANs 62
Your Chapter Notes 62
Chapter 4 Inter-VLAN Routing 63
Introduction - 4.0 63
    Why should I take this module? - 4.0.1 63
    What will I learn to do in this module? - 4.0.2 63
Inter-VLAN Routing Operation - 4.1 63
    What is Inter-VLAN Routing? - 4.1.1 63
    Legacy Inter-VLAN Routing - 4.1.2 64
    Router-on-a-Stick Inter-VLAN Routing - 4.1.3 64
    Inter-VLAN Routing on a Layer 3 Switch - 4.1.4 65
    Check Your Understanding - Inter-VLAN Routing Operation - 4.1.5 66
Router-on-a-Stick Inter-VLAN Routing - 4.2 66
    Router-on-a-Stick Scenario - 4.2.1 66
    S1 VLAN and Trunking Configuration - 4.2.2 66
    S2 VLAN and Trunking Configuration - 4.2.3 68
    R1 Subinterface Configuration - 4.2.4 69
    Verify Connectivity Between PC1 and PC2 - 4.2.5 70
    Router-on-a-Stick Inter-VLAN Routing Verification - 4.2.6 71
    Packet Tracer - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.7 73
    Lab - Configure Router-on-a-Stick Inter-VLAN Routing - 4.2.8 74
Inter-VLAN Routing using Layer 3 Switches - 4.3 74
    Layer 3 Switch Inter-VLAN Routing - 4.3.1 74
    Layer 3 Switch Scenario - 4.3.2 74
    Layer 3 Switch Configuration - 4.3.3 75
    Layer 3 Switch Inter-VLAN Routing Verification - 4.3.4 76
    Routing on a Layer 3 Switch - 4.3.5 77
    Routing Scenario on a Layer 3 Switch - 4.3.6 77
    Routing Configuration on a Layer 3 Switch - 4.3.7 77
    Packet Tracer - Configure Layer 3 Switching and Inter-VLAN Routing - 4.3.8 80
Troubleshoot Inter-VLAN Routing - 4.4 80
    Common Inter-VLAN Issues - 4.4.1 80
    Troubleshoot Inter-VLAN Routing Scenario - 4.4.2 81
    Missing VLANs - 4.4.3 81
    Switch Trunk Port Issues - 4.4.4 84
    Switch Access Port Issues - 4.4.5 85
    Router Configuration Issues - 4.4.6 87
    Check Your Understanding - Troubleshoot Inter-VLAN Routing - 4.4.7 89
    Packet Tracer - Troubleshoot Inter-VLAN Routing - 4.4.8 89
    Lab - Troubleshoot Inter-VLAN Routing - 4.4.9 89
Module Practice and Quiz - 4.5 89
    Packet Tracer - Inter-VLAN Routing Challenge - 4.5.1 89
    Lab - Implement Inter-VLAN Routing - 4.5.2 89
    What did I learn in this module? - 4.5.3 89
Chapter Quiz - Inter-VLAN Routing 92
Your Chapter Notes 92
Chapter 5 STP Concepts 93
Introduction - 5.0 93
    Why should I take this module? - 5.0.1 93
    What will I learn to do in this module? - 5.0.2 93
Purpose of STP - 5.1 94
    Redundancy in Layer 2 Switched Networks - 5.1.1 94
    Spanning Tree Protocol - 5.1.2 94
    STP Recalculation - 5.1.3 94
    Issues with Redundant Switch Links - 5.1.4 94
    Layer 2 Loops - 5.1.5 94
    Broadcast Storm - 5.1.6 95
    The Spanning Tree Algorithm - 5.1.7 95
    Video - Observe STP Operation - 5.1.8 97
    Packet Tracer - Investigate STP Loop Prevention - 5.1.9 97
    Check Your Understanding - Purpose of STP - 5.1.10 97
STP Operations - 5.2 97
    Steps to a Loop-Free Topology - 5.2.1 97
    1. Elect the Root Bridge - 5.2.2 98
    Impact of Default BIDs - 5.2.3 98
    Determine the Root Path Cost - 5.2.4 99
    2. Elect the Root Ports - 5.2.5 99
    3. Elect Designated Ports - 5.2.6 100
    4. Elect Alternate (Blocked) Ports - 5.2.7 100
    Elect a Root Port from Multiple Equal-Cost Paths - 5.2.8 100
    STP Timers and Port States - 5.2.9 101
    Operational Details of Each Port State - 5.2.10 102
    Per-VLAN Spanning Tree - 5.2.11 103
    Check Your Understanding - STP Operations - 5.2.12 103
Evolution of STP - 5.3 103
    Different Versions of STP - 5.3.1 103
    RSTP Concepts - 5.3.2 104
    RSTP Port States and Port Roles - 5.3.3 104
    PortFast and BPDU Guard - 5.3.4 105
    Alternatives to STP - 5.3.5 105
    Check Your Understanding - Evolution of STP - 5.3.6 106
Module Practice and Quiz - 5.4 106
    What did I learn in this module? - 5.4.1 106
Chapter Quiz - STP Concepts 109
Your Chapter Notes 109
Chapter 6 EtherChannel 111
Introduction - 6.0 111
    Why should I take this module? - 6.0.1 111
    What will I learn to do in this module? - 6.0.2 111
EtherChannel Operation - 6.1 111
    Link Aggregation - 6.1.1 111
    EtherChannel - 6.1.2 112
    Advantages of EtherChannel - 6.1.3 112
    Implementation Restrictions - 6.1.4 112
    AutoNegotiation Protocols - 6.1.5 113
    PAgP Operation - 6.1.6 113
    PAgP Mode Settings Example - 6.1.7 114
    LACP Operation - 6.1.8 114
    LACP Mode Settings Example - 6.1.9 115
    Check Your Understanding - EtherChannel Operation 116
Configure EtherChannel - 6.2 116
    Configuration Guidelines - 6.2.1 116
    LACP Configuration Example - 6.2.2 116
    Syntax Checker - Configure EtherChannel - 6.2.3 117
    Packet Tracer - Configure EtherChannel 117
Verify and Troubleshoot EtherChannel - 6.3 117
    Verify EtherChannel - 6.3.1 117
    Common Issues with EtherChannel Configurations - 6.3.2 120
    Troubleshoot EtherChannel Example - 6.3.3 120
    Packet Tracer - Troubleshoot EtherChannel - 6.3.4 123
Module Practice and Quiz - 6.4 123
    Packet Tracer - Implement EtherChannel - 6.4.1 123
    Lab - Implement EtherChannel - 6.4.2 124
    What did I learn in this module? - 6.4.3 124
Chapter Quiz - EtherChannel 126
Your Chapter Notes 126
Chapter 7 DHCPv4 127
Introduction - 7.0 127
    Why should I take this module? - 7.0.1 127
    What will I learn to do in this module? - 7.0.2 127
DHCPv4 Concepts - 7.1 127
    DHCPv4 Server and Client - 7.1.1 127
    DHCPv4 Operation - 7.1.2 128
    Steps to Obtain a Lease - 7.1.3 128
    Steps to Renew a Lease - 7.1.4 129
    Check Your Understanding - DHCPv4 Concepts - 7.1.5 130
Configure a Cisco IOS DHCPv4 Server - 7.2 130
    Cisco IOS DHCPv4 Server - 7.2.1 130
    Steps to Configure a Cisco IOS DHCPv4 Server - 7.2.2 130
    Configuration Example - 7.2.3 131
    DHCPv4 Verification Commands - 7.2.4 132
    Verify DHCPv4 is Operational - 7.2.5 132
    Syntax Checker - Configure DHCPv4 - 7.2.6 134
    Disable the Cisco IOS DHCPv4 Server - 7.2.7 134
    DHCPv4 Relay - 7.2.8 135
    Other Service Broadcasts Relayed - 7.2.9 137
    Packet Tracer - Configure DHCPv4 - 7.2.10 137
Configure a DHCPv4 Client - 7.3 137
    Cisco Router as a DHCPv4 Client - 7.3.1 137
    Configuration Example - 7.3.2 138
    Home Router as a DHCPv4 Client - 7.3.3 138
    Syntax Checker - Configure a Cisco Router as DHCP Client - 7.3.4 138
Module Practice and Quiz - 7.4 138
    Packet Tracer - Implement DHCPv4 - 7.4.1 138
    Lab - Implement DHCPv4 - 7.4.2 139
    What did I learn in this module? - 7.4.3 139
Chapter Quiz - DHCPv4 141
Your Chapter Notes 141
Chapter 8 SLAAC and DHCPv6 143
Introduction - 8.0 143
    Welcome - 8.0.1 143
    What will I learn to do in this module? - 8.0.2 143
IPv6 GUA Assignment - 8.1 143
    IPv6 Host Configuration - 8.1.1 143
    IPv6 Host Link-Local Address - 8.1.2 144
    IPv6 GUA Assignment - 8.1.3 144
    Three RA Message Flags - 8.1.4 145
    Check Your Understanding - IPv6 GUA Assignment - 8.1.5 145
SLAAC - 8.2 145
    SLAAC Overview - 8.2.1 145
    Enabling SLAAC - 8.2.2 146
    SLAAC Only Method - 8.2.3 147
    ICMPv6 RS Messages - 8.2.4 147
    Host Process to Generate Interface ID - 8.2.5 148
    Duplicate Address Detection - 8.2.6 148
    Check Your Understanding - SLAAC - 8.2.7 149
DHCPv6 - 8.3 149
    DHCPv6 Operation Steps - 8.3.1 149
    Stateless DHCPv6 Operation - 8.3.2 150
    Enable Stateless DHCPv6 on an Interface - 8.3.3 151
    Stateful DHCPv6 Operation - 8.3.4 151
    Enable Stateful DHCPv6 on an Interface - 8.3.5 152
    Check Your Understanding - DHCPv6 - 8.3.6 152
Configure DHCPv6 Server - 8.4 152
    DHCPv6 Router Roles - 8.4.1 152
    Configure a Stateless DHCPv6 Server - 8.4.2 153
    Configure a Stateless DHCPv6 Client - 8.4.3 155
    Configure a Stateful DHCPv6 Server - 8.4.4 157
    Configure a Stateful DHCPv6 Client - 8.4.5 160
    DHCPv6 Server Verification Commands - 8.4.6 162
    Configure a DHCPv6 Relay Agent - 8.4.7 163
    Verify the DHCPv6 Relay Agent - 8.4.8 164
    Check Your Understanding - Configure DHCPv6 Server - 8.4.9 165
Module Practice and Quiz - 8.5 165
    Lab - Configure DHCPv6 - 8.5.1 165
    What did I learn in this module? - 8.5.2 166
Chapter Quiz - SLAAC and DHCPv6 168
Your Chapter Notes 168
Chapter 9 FHRP Concepts 169
Introduction - 9.0 169
    Why should I take this module? - 9.0.1 169
    What will I learn to do in this module? - 9.0.2 169
First Hop Redundancy Protocols - 9.1 169
    Default Gateway Limitations - 9.1.1 169
    Router Redundancy - 9.1.2 170
    Steps for Router Failover - 9.1.3 171
    FHRP Options - 9.1.4 171
    Check Your Understanding - First Hop Redundancy Protocols - 9.1.5 172
HSRP - 9.2 172
    HSRP Overview - 9.2.1 172
    HSRP Priority and Preemption - 9.2.2 172
    HSRP States and Timers - 9.2.3 173
    Check Your Understanding - 9.2.4 174
Module Practice and Quiz - 9.3 174
    What did I learn in this module? - 9.3.1 174
Chapter Quiz - FHRP Concepts 176
Packet Tracer - HSRP Configuration Guide 176
Your Chapter Notes 176
Chapter 10 LAN Security Concepts 177
Introduction - 10.0 177
    Why should I take this module? - 10.0.1 177
    What will I learn in this module? - 10.0.2 177
Endpoint Security - 10.1 177
    Network Attacks Today - 10.1.1 177
    Network Security Devices - 10.1.2 178
    Endpoint Protection - 10.1.3 178
    Cisco Email Security Appliance - 10.1.4 179
    Cisco Web Security Appliance - 10.1.5 179
    Check Your Understanding - Endpoint Security 180
Access Control - 10.2 180
    Authentication with a Local Password - 10.2.1 180
    AAA Components - 10.2.2 181
    Authentication - 10.2.3 181
    Authorization - 10.2.4 181
    Accounting - 10.2.5 181
    802.1X - 10.2.6 182
    Check Your Understanding - Access Control - 10.2.7 182
Layer 2 Security Threats 182
    Layer 2 Vulnerabilities - 10.3.1 182
    Switch Attack Categories - 10.3.2 183
    Switch Attack Mitigation Techniques - 10.3.3 183
    Check Your Understanding - Layer 2 Security Threats - 10.3.4 184
MAC Address Table Attack - 10.4 184
    Switch Operation Review - 10.4.1 184
    MAC Address Table Flooding - 10.4.2 184
    MAC Address Table Attack Mitigation - 10.4.3 185
    Check Your Understanding - MAC Address Table Attacks - 10.4.4 186
LAN Attacks - 10.5 186
    Video - VLAN and DHCP Attacks - 10.5.1 186
    VLAN Hopping Attacks - 10.5.2 186
    VLAN Double-Tagging Attack - 10.5.3 186
    DHCP Messages - 10.5.4 187
    DHCP Attacks - 10.5.5 187
    Video - ARP Attacks, STP Attacks, and CDP Reconnaissance - 10.5.6 188
    ARP Attacks - 10.5.7 188
    Address Spoofing Attack - 10.5.8 189
    STP Attack - 10.5.9 190
    CDP Reconnaissance - 10.5.10 190
    Check Your Understanding - LAN Attacks - 10.5.11 191
Module Practice and Quiz - 10.6 191
    What did I learn in this module? - 10.6.1 191
Chapter Quiz - LAN Security Concepts 193
Your Chapter Notes 193
Chapter 11 Switch Security Configuration 195
Introduction - 11.0 195
    Why should I take this module? - 11.0.1 195
    What will I learn in this module? - 11.0.2 195
Implement Port Security - 11.1 195
    Secure Unused Ports - 11.1.1 195
    Mitigate MAC Address Table Attacks - 11.1.2 196
    Enable Port Security - 11.1.3 196
    Limit and Learn MAC Addresses - 11.1.4 198
    Port Security Aging - 11.1.5 200
    Port Security Violation Modes - 11.1.6 201
    Ports in error-disabled State - 11.1.7 202
    Verify Port Security - 11.1.8 203
    Syntax Checker - Implement Port Security - 11.1.9 205
    Packet Tracer - Implement Port Security 205
Mitigate VLAN Attacks - 11.2 206
    VLAN Attacks Review - 11.2.1 206
    Steps to Mitigate VLAN Hopping Attacks - 11.2.2 206
    Syntax Checker - Mitigate VLAN Hopping Attacks - 11.2.3 207
Mitigate DHCP Attacks - 11.3 207
    DHCP Attack Review - 11.3.1 207
    DHCP Snooping - 11.3.2 207
    Steps to Implement DHCP Snooping - 11.3.3 208
    DHCP Snooping Configuration Example - 11.3.4 208
    Syntax Checker - Mitigate DHCP Attacks - 11.3.5 209
Mitigate ARP Attacks - 11.4 210
    Dynamic ARP Inspection - 11.4.1 210
    DAI Implementation Guidelines - 11.4.2 210
    DAI Configuration Example - 11.4.3 210
    Syntax Checker - Mitigate ARP Attacks - 11.4.4 211
Mitigate STP Attacks - 11.5 211
    PortFast and BPDU Guard - 11.5.1 211
    Configure PortFast - 11.5.2 212
    Configure BPDU Guard - 11.5.3 213
    Syntax Checker - Mitigate STP Attacks - 11.5.4 214
Module Practice and Quiz - 11.6 214
    Packet Tracer - Switch Security Configuration - 11.6.1 214
    Lab - Switch Security Configuration - 11.6.2 215
    What did I learn in this module? - 11.6.3 215
Chapter Quiz - Switch Security Configuration 217
Your Chapter Notes 217
Chapter 12 WLAN Concepts 219
Introduction - 12.0 219
    Why should I take this module? - 12.0.1 219
    What will I learn in this module? - 12.0.2 219
Introduction to Wireless - 12.1 219
    Benefits of Wireless - 12.1.1 219
    Types of Wireless Networks - 12.1.2 220
    Wireless Technologies - 12.1.3 220
    802.11 Standards - 12.1.4 221
    Radio Frequencies - 12.1.5 222
    Wireless Standards Organizations - 12.1.6 223
    Check Your Understanding - Introduction to Wireless - 12.1.7 223
WLAN Components - 12.2 223
    Video - WLAN Components - 12.2.1 223
    Wireless NICs - 12.2.2 223
    Wireless Home Router - 12.2.3 224
    Wireless Access Points - 12.2.4 224
    AP Categories - 12.2.5 224
    Wireless Antennas - 12.2.6 225
    Check Your Understanding - WLAN Components - 12.2.7 226
WLAN Operation - 12.3 226
    Video - WLAN Operation - 12.3.1 226
    802.11 Wireless Topology Modes - 12.3.2 226
    BSS and ESS - 12.3.3 226
    802.11 Frame Structure - 12.3.4 227
    CSMA/CA - 12.3.5 227
    Wireless Client and AP Association - 12.3.6 228
    Passive and Active Discover Mode - 12.3.7 229
    Check Your Understanding - WLAN Operation - 12.3.8 229
CAPWAP Operation - 12.4 229
    Video - CAPWAP - 12.4.1 229
    Introduction to CAPWAP - 12.4.2 229
    Split MAC Architecture - 12.4.3 230
    DTLS Encryption - 12.4.4 230
    FlexConnect APs - 12.4.5 230
    Check Your Understanding - CAPWAP Operation - 12.4.6 231
Channel Management - 12.5 231
    Frequency Channel Saturation - 12.5.1 231
    Channel Selection - 12.5.2 231
    Plan a WLAN Deployment - 12.5.3 232
    Check Your Understanding - Channel Management - 12.5.4 233
WLAN Threats - 12.6 233
    Video - WLAN Threats - 12.6.1 233
    Wireless Security Overview - 12.6.2 233
    DoS Attacks - 12.6.3 233
    Rogue Access Points - 12.6.4 234
    Man-in-the-Middle Attack - 12.6.5 234
    Check Your Understanding - WLAN Threats - 12.6.6 234
Secure WLANs - 12.7 234
    Video - Secure WLANs - 12.7.1 234
    SSID Cloaking and MAC Address Filtering - 12.7.2 235
    802.11 Original Authentication Methods - 12.7.3 235
    Shared Key Authentication Methods - 12.7.4 235
    Authenticating a Home User - 12.7.5 236
    Encryption Methods - 12.7.6 236
    Authentication in the Enterprise - 12.7.7 237
    WPA3 - 12.7.8 237
    Check Your Understanding - Secure WLANs - 12.7.9 238
Module Practice and Quiz - 12.8 238
    What did I learn in this module? - 12.8.1 238
Chapter Quiz - WLAN Concepts 241
Your Chapter Notes 241
Chapter 13 WLAN Configuration 243
Introduction - 13.0 243
    Why should I take this module? - 13.0.1 243
    What will I learn to do in this module? - 13.0.2 243
Remote Site WLAN Configuration - 13.1 243
    Video - Configure a Wireless Network - 13.1.1 243
    The Wireless Router - 13.1.2 244
    Log in to the Wireless Router - 13.1.3 244
    Basic Network Setup - 13.1.4 244
    Basic Wireless Setup - 13.1.5 245
    Configure a Wireless Mesh Network - 13.1.6 247
    NAT for IPv4 - 13.1.7 247
    Quality of Service - 13.1.8 247
    Port Forwarding - 13.1.9 248
    Packet Tracer - Configure a Wireless Network - 13.1.10 248
    Lab - Configure a Wireless Network - 13.1.11 248
Configure a Basic WLAN on the WLC - 13.2 248
    Video - Configure a Basic WLAN on the WLC - 13.2.1 248
    WLC Topology - 13.2.2 249
    Log in to the WLC - 13.2.3 249
    View AP Information - 13.2.4 249
    Advanced Settings - 13.2.5 250
    Configure a WLAN - 13.2.6 250
    Packet Tracer - Configure a Basic WLAN on the WLC - 13.2.7 252
Configure a WPA2 Enterprise WLAN on the WLC - 13.3 252
    Video - Define an SNMP and RADIUS Server on the WLC - 13.3.1 252
    SNMP and RADIUS - 13.3.2 252
    Configure SNMP Server Information - 13.3.3 253
    Configure RADIUS Server Information - 13.3.4 253
    Video - Configure a VLAN for a New WLAN - 13.3.5 253
    Topology with VLAN 5 Addressing - 13.3.6 253
    Configure a New Interface - 13.3.7 254
    Video - Configure a DHCP Scope - 13.3.8 255
    Configure a DHCP Scope - 13.3.9 255
    Video - Configure a WPA2 Enterprise WLAN - 13.3.10 256
    Configure a WPA2 Enterprise WLAN - 13.3.11 256
    Packet Tracer - Configure a WPA2 Enterprise WLAN on the WLC - 13.3.12 257
Troubleshoot WLAN Issues - 13.4 257
    Troubleshooting Approaches - 13.4.1 257
    Wireless Client Not Connecting - 13.4.2 258
    Troubleshooting When the Network Is Slow - 13.4.3 259
    Updating Firmware - 13.4.4 259
    Packet Tracer - Troubleshoot WLAN Issues - 13.4.5 260
Module Practice and Summary - 13.5 260
    Packet Tracer - WLAN Configuration - 13.5.1 260
    What did I learn in this module? - 13.5.2 260
Chapter Quiz - WLAN Configuration 262
Your Chapter Notes 262
Chapter 14 Routing Concepts 263
Introduction - 14.0 263
    Why should I take this module? - 14.0.1 263
    What will I learn to do in this module? - 14.0.2 263
Path Determination - 14.1 263
    Two Functions of Router - 14.1.1 263
    Router Functions Example - 14.1.2 264
    Best Path Equals Longest Match - 14.1.3 264
    IPv4 Address Longest Match Example - 14.1.4 264
    IPv6 Address Longest Match Example - 14.1.5 265
    Build the Routing Table - 14.1.6 265
    Check Your Understanding - Path Determination - 14.1.7 266
Packet Forwarding - 14.2 266
    Packet Forwarding Decision Process - 14.2.1 266
    End-to-End Packet Forwarding - 14.2.2 267
    Packet Forwarding Mechanisms - 14.2.3 268
    Check Your Understanding - Packet Forwarding - 14.2.4 269
Basic Router Configuration Review - 14.3 269
    Topology - 14.3.1 269
    Configuration Commands - 14.3.2 269
    Verification Commands - 14.3.3 271
    Filter Command Output - 14.3.4 276
    Packet Tracer - Basic Router Configuration Review - 14.3.5 278
IP Routing Table - 14.4 278
    Route Sources - 14.4.1 278
    Routing Table Principles - 14.4.2 280
    Routing Table Entries - 14.4.3 281
    Directly Connected Networks - 14.4.4 281
    Static Routes - 14.4.5 282
    Static Routes in the IP Routing Table - 14.4.6 282
    Dynamic Routing Protocols - 14.4.7 283
    Dynamic Routes in the IP Routing Table - 14.4.8 283
    Default Route - 14.4.9 284
    Structure of an IPv4 Routing Table - 14.4.10 285
    Structure of an IPv6 Routing Table - 14.4.11 286
    Administrative Distance - 14.4.12 287
    Check Your Understanding - IP Routing Table - 14.4.13 288
Static and Dynamic Routing - 14.5 288
    Static or Dynamic? - 14.5.1 288
    Dynamic Routing Evolution - 14.5.2 289
    Dynamic Routing Protocol Concepts - 14.5.3 290
    Best Path - 14.5.4 291
    Load Balancing - 14.5.5 291
    Check Your Understanding - Dynamic and Static Routing - 14.5.6 292
Module Practice and Quiz - 14.6 292
    What did I learn in this module? - 14.6.1 292
Chapter Quiz - Routing Concepts 295
Your Chapter Notes 295
Chapter 15 IP Static Routing 297
Introduction - 15.0 297
    Why should I take this module? - 15.0.1 297
    What will I learn to do in this module? - 15.0.2 297
Static Routes - 15.1 297
    Types of Static Routes - 15.1.1 297
    Next-Hop Options - 15.1.2 298
    IPv4 Static Route Command - 15.1.3 298
    IPv6 Static Route Command - 15.1.4 299
    Dual-Stack Topology - 15.1.5 300
    IPv4 Starting Routing Tables - 15.1.6 300
    IPv6 Starting Routing Tables - 15.1.7 301
    Check Your Understanding - Static Routes - 15.1.8 303
Configure IP Static Routes - 15.2 303
    IPv4 Next-Hop Static Route - 15.2.1 303
    IPv6 Next-Hop Static Route - 15.2.2 304
    IPv4 Directly Connected Static Route - 15.2.3 305
    IPv6 Directly Connected Static Route - 15.2.4 306
    IPv4 Fully Specified Static Route - 15.2.5 307
    IPv6 Fully Specified Static Route - 15.2.6 308
    Verify a Static Route - 15.2.7 308
    Syntax Checker - Configure Static Routes - 15.2.8 310
Configure IP Default Static Routes - 15.3 311
    Default Static Route - 15.3.1 311
    Configure a Default Static Route - 15.3.2 311
    Verify a Default Static Route - 15.3.3 312
    Syntax Checker - Configure Default Static Routes - 15.3.4 313
Configure Floating Static Routes - 15.4 313
    Floating Static Routes - 15.4.1 313
    Configure IPv4 and IPv6 Floating Static Routes - 15.4.2 314
    Test the Floating Static Route - 15.4.3 315
    Syntax Checker - Configure Floating Static Route - 15.4.4 316
Configure Static Host Routes - 15.5 316
    Host Routes - 15.5.1 316
    Automatically Installed Host Routes - 15.5.2 316
    Static Host Routes - 15.5.3 317
    Configure Static Host Routes - 15.5.4 317
    Verify Static Host Routes - 15.5.5 317
    Configure IPv6 Static Host Route with Link-Local Next-Hop - 15.5.6 318
    Syntax Checker - Configure Static Host Routes - 15.5.7 318
Module Practice and Quiz - 15.6 318
    Packet Tracer - Configure IPv4 and IPv6 Static and Default Routes - 15.6.1 318
    Lab - Configure IPv4 and IPv6 Static and Default Routes - 15.6.2 318
    What did I learn in this module? - 15.6.3 319
Chapter Quiz - IP Static Routing 321
Your Chapter Notes 321
Chapter 16 Troubleshoot Static and Default Routes 323
Introduction - 16.0 323
    Why should I take this module? - 16.0.1 323
    What will I learn to do in this module? - 16.0.2 323
Packet Processing with Statics Routes - 16.1 323
    Static Routes and Packet Forwarding - 16.1.1 323
    Check Your Understanding - Packet Processing with Static Routes - 16.1.2 324
Troubleshoot IPv4 Static and Default Route Configuration - 16.2 324
    Network Changes - 16.2.1 324
    Common Troubleshooting Commands - 16.2.2 324
    Solve a Connectivity Problem - 16.2.3 326
    Syntax Checker - Troubleshoot IPv4 Static and Default Routes - 16.2.4 329
Module Practice and Quiz - 16.3 329
    Packet Tracer - Troubleshoot Static and Default Routes - 16.3.1 329
    Lab - Troubleshoot Static and Default Routes - 16.3.2 330
    What did I learn in this module? - 16.3.3 330
Chapter Quiz - Troubleshoot Static and Default Routes 332
Your Chapter Notes 332


9780136634720    TOC    6/25/2020


Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020