<p>Introduction xxvi</p> <p>Chapter 1 Single-Area OSPFv2 Concepts 1</p> <p> Study Guide 2</p> <p> OSPF Features and Characteristics 2</p> <p> OSPF Packets 5</p> <p> OSPF Operation 8</p> <p> Labs and Activities 13</p> <p>Chapter 2 Single-Area OSPFv2 Configuration 15</p> <p> Study Guide 16</p> <p> OSPF Router ID 16</p> <p> Point-to-Point OSPF Networks 19</p> <p> Multiaccess OSPF Networks 21</p> <p> Modify Single-Area OSPFv2 24</p> <p> Default Route Propagation 28</p> <p> Verify Single-Area OSPFv2 29</p> <p> Labs and Activities 33</p> <p> Command Reference 33</p> <p> 2.2.13 Packet Tracer—Point-to-Point Single-Area OSPFv2 Configuration 34</p> <p> 2.3.11 Packet Tracer—Determine the DR and BDR 37</p> <p> 2.4.11 Packet Tracer—Modify Single-Area OSPFv2 41</p> <p> 2.5.3 Packet Tracer—Propagate a Default Route in OSPFv2 44</p> <p> 2.6.6 Packet Tracer—Verify Single-Area OSPFv2 46</p> <p> 2.7.1 Packet Tracer—Single-Area OSPFv2 Configuration 50</p> <p> 2.7.2 Lab—Configure Single-Area OSPFv2 52</p> <p>Chapter 3 Network Security Concepts 57</p> <p> Study Guide 58</p> <p> Current State of Cybersecurity 58</p> <p> Threat Actors 60</p> <p> Threat Actor Tools 62</p> <p> Malware 65</p> <p> Common Network Attacks 68</p> <p> IP Vulnerabilities and Threats 71</p> <p> TCP and UDP Vulnerabilities 75</p> <p> IP Services 78</p> <p> Network Security Best Practices 81</p> <p> Cryptography 85</p> <p> Labs and Activities 91</p> <p> 3.5.7 Lab—Social Engineering 91</p> <p> 3.8.8 Lab—Explore DNS Traffic 93</p> <p>Chapter 4 ACL Concepts 101</p> <p> Study Guide 102</p> <p> Purpose of ACLs 102</p> <p> Wildcard Masks in ACLs 103</p> <p> Guidelines for ACL Creation 106</p> <p> Types of IPv4 ACLs 107</p> <p> Labs and Activities 110</p> <p> 4.1.4 Packet Tracer—Access Control List Demonstration 110</p> <p>Chapter 5 ACLs for IPv4 Configuration 113</p> <p> Study Guide 114</p> <p> Configure Standard IPv4 ACLs 114</p> <p> Modify IPv4 ACLs 117</p> <p> Secure VTY Ports with a Standard IPv4 ACL 118</p> <p> Configure Extended IPv4 ACLs 118</p> <p> Labs and Activities 124</p> <p> Command Reference 124</p> <p> 5.1.8 Packet Tracer—Configure Numbered Standard IPv4 ACLs 125</p> <p> 5.1.9 Packet Tracer—Configure Named Standard IPv4 ACLs 128</p> <p> 5.2.7 Packet Tracer—Configure and Modify Standard IPv4 ACLs 130</p> <p> 5.4.12 Packet Tracer—Configure Extended ACLs—Scenario 1 137</p> <p> 5.4.13 Packet Tracer—Configure Extended IPv4 ACLs—Scenario 2 142</p> <p> 5.5.1 Packet Tracer—IPv4 ACL Implementation Challenge 146</p> <p> 5.5.2 Lab—Configure and Verify Extended IPv4 ACLs 149</p> <p>Chapter 6 NAT for IPv4 155</p> <p> Study Guide 156</p> <p> NAT Characteristics 156</p> <p> Types of NAT 157</p> <p> NAT Advantages and Disadvantages 158</p> <p> Static NAT 159</p> <p> Dynamic NAT 161</p> <p> PAT 162</p> <p> NAT64 165</p> <p> Labs and Activities 166</p> <p> Command Reference 166</p> <p> 6.2.7 Packet Tracer—Investigate NAT Operations 166</p> <p> 6.4.5 Packet Tracer—Configure Static NAT 170</p> <p> 6.5.6 Packet Tracer—Configure Dynamic NAT 172</p> <p> 6.6.7 Packet Tracer—Configure PAT 173</p> <p> 6.8.1 Packet Tracer—Configure NAT for IPv4 175</p> <p> 6.8.2 Lab—Configure NAT for IPv4 176</p> <p>Chapter 7 WAN Concepts 185</p> <p> Study Guide 186</p> <p> Purpose of WANs 186</p> <p> WAN Operations 188</p> <p> Traditional WAN Connectivity 191</p> <p> Modern WAN Connectivity 193</p> <p> Internet-Based Connectivity 194</p> <p> Labs and Activities 196</p> <p> 7.5.11 Lab—Research Broadband Internet Access Technologies 196</p> <p> 7.6.1 Packet Tracer—WAN Concepts 199</p> <p>Chapter 8 VPN and IPsec Concepts 203</p> <p> Study Guide 204</p> <p> VPN Technology 204</p> <p> Types of VPNs 207</p> <p> IPsec 211</p> <p> Labs and Activities 219</p> <p>Chapter 9 QoS Concepts 221</p> <p> Study Guide 222</p> <p> Network Transmission Quality 222</p> <p> Traffic Characteristics 224</p> <p> Queuing Algorithms 225</p> <p> QoS Models 229</p> <p> QoS Implementation Techniques 231</p> <p> Labs and Activities 236</p> <p>Chapter 10 Network Management 237</p> <p> Study Guide 238</p> <p> Device Discovery with CDP and LLDP 238</p> <p> NTP 241</p> <p> SNMP 243</p> <p> Syslog 245</p> <p> Router and Switch File Maintenance 247</p> <p> IOS Image Management 251</p> <p> Labs and Activities 254</p> <p> Command Reference 254</p> <p> 10.1.5 Packet Tracer—Use CDP to Map a Network 255</p> <p> 10.2.6 Packet Tracer—Use LLDP to Map a Network 259</p> <p> 10.3.4 Packet Tracer—Configure and Verify NTP 264</p> <p> 10.4.10 Lab—Research Network Monitoring Software 266</p> <p> 10.6.10 Packet Tracer—Back Up Configuration Files 269</p> <p> 10.6.11 Lab—Use Tera Term to Manage Router Configuration Files 271</p> <p> 10.6.12 Lab—Use TFTP, Flash, and USB to Manage Configuration Files 277</p> <p> 10.6.13 Lab—Research Password Recovery Procedures 290</p> <p> 10.7.6 Packet Tracer—Use a TFTP Server to Upgrade a Cisco IOS Image 293</p> <p> 10.8.1 Packet Tracer—Configure CDP, LLDP, and NTP 296</p> <p> 10.8.2 Lab—Configure CDP, LLDP, and NTP 298</p> <p>Chapter 11 Network Design 305</p> <p> Study Guide 306</p> <p> Hierarchical Networks 306</p> <p> Scalable Networks 309</p> <p> Switch Hardware 310</p> <p> Router Hardware 312</p> <p> Labs and Activities 315</p> <p> 11.5.1 Packet Tracer—Compare Layer 2 and Layer 3 Devices 315</p> <p>Chapter 12 Network Troubleshooting 319</p> <p> Study Guide 320</p> <p> Network Documentation 320</p> <p> Troubleshooting Process 325</p> <p> Troubleshooting Tools 330</p> <p> Symptoms and Causes of Network Problems 333</p> <p> Troubleshooting IP Connectivity 335</p> <p> Labs and Activities 336</p> <p> 12.5.13 Packet Tracer—Troubleshoot Enterprise Network 336</p> <p> 12.6.1 Packet Tracer—Troubleshooting Challenge—Document the Network 343</p> <p> 12.6.2 Packet Tracer—Troubleshooting Challenge—Use Documentation to Solve Issues 346</p> <p>Chapter 13 Network Virtualization 349</p> <p> Study Guide 350</p> <p> Cloud Computing 350</p> <p> Virtualization and Virtual Network Infrastructure 351</p> <p> Software-Defined Networking 353</p> <p> Controllers 355</p> <p> Labs and Activities 358</p> <p> 13.6.1 Lab—Install Linux in a Virtual Machine and Explore the GUI 358</p> <p>Chapter 14 Network Automation 363</p> <p> Study Guide 364</p> <p> Automation Overview 364</p> <p> Data Formats 365</p> <p> APIs 367</p> <p> REST 369</p> <p> Configuration Management 371</p> <p> IBN and Cisco DNA Center 372</p> <p> Labs and Activities 378</p> <p>TOC, 9780136634690, 8/6/2020</p>