Introduction xxx <br> Chapter 1 Single-Area OSPFv2 Concepts 1 <br>Introduction - 1.0 1 <br> Why should I take this module? - 1.0.1 1 <br> What will I learn to do in this module? - 1.0.2 1 <br>OSPF Features and Characteristics - 1.1 1 <br> Introduction to OSPF - 1.1.1 1 <br> Components of OSPF - 1.1.2 2 <br> Link-State Operation - 1.1.3 3 <br> Single-Area and Multiarea OSPF - 1.1.4 4 <br> Multiarea OSPF - 1.1.5 4 <br> OSPFv3 - 1.1.6 5 <br> Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 <br>OSPF Packets - 1.2 6 <br> Video - OSPF Packets - 1.2.1 6 <br> Types of OSPF Packets - 1.2.2 6 <br> Link-State Updates - 1.2.3 7 <br> Hello Packet - 1.2.4 7 <br> Check Your Understanding - OSPF Packets - 1.2.5 7 <br>OSPF Operation - 1.3 7 <br> Video - OSPF Operation - 1.3.1 7 <br> OSPF Operational States - 1.3.2 7 <br> Establish Neighbor Adjacencies - 1.3.3 8 <br> Synchronizing OSPF Databases - 1.3.4 9 <br> The Need for a DR - 1.3.5 10 <br> LSA Flooding With a DR - 1.3.6 11 <br> Check Your Understanding - OPSF Operation - 1.3.7 11 <br>Module Practice and Quiz - 1.4 11 <br> What did I learn in this module? - 1.4.1 11 <br>Chapter Quiz - Single-Area OSPFv2 Concepts 14 <br>Your Chapter Notes 14 <br> Chapter 2 Single-Area OSPFv2 Configuration 15 <br>Introduction - 2.0 15 <br> Why should I take this module? - 2.0.1 15 <br> What will I learn to do in this module? - 2.0.2 15 <br>OSPF Router ID - 2.1 15 <br> OSPF Reference Topology - 2.1.1 15 <br> Router Configuration Mode for OSPF - 2.1.2 16 <br> Router IDs - 2.1.3 16 <br> Router ID Order of Precedence - 2.1.4 17 <br> Configure a Loopback Interface as the Router ID - 2.1.5 17 <br> Explicitly Configure a Router ID - 2.1.6 18 <br> Modify a Router ID - 2.1.7 18 <br> Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 <br> Check Your Understanding - OSPF Router ID - 2.1.9 19 <br>Point-to-Point OSPF Networks - 2.2 20 <br> The network Command Syntax - 2.2.1 20 <br> The Wildcard Mask - 2.2.2 20 <br> Check Your Understanding - The Wildcard Masks - 2.2.3 20 <br> Configure OSPF Using the network Command - 2.2.4 20 <br> Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 <br> Configure OSPF Using the ip ospf Command - 2.2.6 21 <br> Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22 <br> Passive Interface - 2.2.8 22 <br> Configure Passive Interfaces - 2.2.9 23 <br> Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 <br> OSPF Point-to-Point Networks - 2.2.11 24 <br> Loopbacks and Point-to-Point Networks - 2.2.12 26 <br> Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 <br>Multiaccess OSPF Networks - 2.3 27 <br> OSPF Network Types - 2.3.1 27 <br> OSPF Designated Router - 2.3.2 27 <br> OSPF Multiaccess Reference Topology - 2.3.3 27 <br> Verify OSPF Router Roles - 2.3.4 28 <br> Verify DR/BDR Adjacencies - 2.3.5 30 <br> Default DR/BDR Election Process - 2.3.6 32 <br> DR Failure and Recovery - 2.3.7 33 <br> The ip ospf priority Command - 2.3.8 33 <br> Configure OSPF Priority - 2.3.9 34 <br> Syntax Checker - Configure OSPF Priority - 2.3.10 35 <br> Packet Tracer - Determine the DR and BDR - 2.3.11 35 <br>Modify Single-Area OSPFv2 - 2.4 36 <br> Cisco OSPF Cost Metric - 2.4.1 36 <br> Adjust the Reference Bandwidth - 2.4.2 36 <br> OSPF Accumulates Costs - 2.4.3 38 <br> Manually Set OSPF Cost Value - 2.4.4 38 <br> Test Failover to Backup Route - 2.4.5 39 <br> Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40 <br> Hello Packet Intervals - 2.4.7 40 <br> Verify Hello and Dead Intervals - 2.4.8 40 <br> Modify OSPFv2 Intervals - 2.4.9 42 <br> Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43 <br> Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 <br>Default Route Propagation - 2.5 43 <br> Propagate a Default Static Route in OSPFv2 - 2.5.1 43 <br> Verify the Propagated Default Route - 2.5.2 44 <br> Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 <br>Verify Single-Area OSPFv2 - 2.6 46 <br> Verify OSPF Neighbors - 2.6.1 46 <br> Verify OSPF Protocol Settings - 2.6.2 48 <br> Verify OSPF Process Information - 2.6.3 48 <br> Verify OSPF Interface Settings - 2.6.4 50 <br> Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 <br> Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 <br>Module Practice and Quiz - 2.7 51 <br> Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51 <br> Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 <br> What did I learn in this module? - 2.7.3 52 <br>Chapter Quiz - Single-Area OSPFv2 Configuration 56 <br>Your Chapter Notes 56 <br> Chapter 3 Network Security Concepts 57 <br>Introduction - 3.0 57 <br> Why should I take this module? - 3.0.1 57 <br> What will I learn in this module? - 3.0.2 57 <br> Ethical Hacking Statement - 3.0.3 57 <br>Current State of Cybersecurity - 3.1 58 <br> Current State of Affairs - 3.1.1 58 <br> Vectors of Network Attacks - 3.1.2 58 <br> Data Loss - 3.1.3 59 <br> Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 <br>Threat Actors - 3.2 60 <br> The Hacker - 3.2.1 60 <br> Evolution of Hackers - 3.2.2 61 <br> Cyber Criminals - 3.2.3 61 <br> Hacktivists - 3.2.4 61 <br> State-Sponsored Hackers - 3.2.5 61 <br> Check Your Understanding - Threat Actors - 3.2.6 62 <br>Threat Actor Tools - 3.3 62 <br> Video - Threat Actor Tools - 3.3.1 62 <br> Introduction to Attack Tools - 3.3.2 62 <br> Evolution of Security Tools - 3.3.3 62 <br> Attack Types - 3.3.4 63 <br> Check Your Understanding - Threat Actor Tools - 3.3.5 64 <br>Malware - 3.4 64 <br> Overview of Malware - 3.4.1 64 <br> Viruses and Trojan Horses - 3.4.2 64 <br> Other Types of Malware - 3.4.3 65 <br> Check Your Understanding - Malware - 3.4.4 66 <br>Common Network Attacks - 3.5 66 <br> Overview of Network Attacks - 3.5.1 66 <br> Video - Reconnaissance Attacks - 3.5.2 67 <br> Reconnaissance Attacks - 3.5.3 67 <br> Video - Access and Social Engineering Attacks - 3.5.4 68 <br> Access Attacks - 3.5.5 68 <br> Social Engineering Attacks - 3.5.6 69 <br> Lab - Social Engineering - 3.5.7 70 <br> Video - Denial of Service Attacks - 3.5.8 70 <br> DoS and DDoS Attacks - 3.5.9 70 <br> Check Your Understanding - Common Network Attacks - 3.5.10 71 <br>IP Vulnerabilities and Threats - 3.6 71 <br> Video - Common IP and ICMP Attacks - 3.6.1 71 <br> IPv4 and IPv6 - 3.6.2 71 <br> ICMP Attacks - 3.6.3 71 <br> Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 <br> Amplification and Reflection Attacks - 3.6.5 72 <br> Address Spoofing Attacks - 3.6.6 72 <br> Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 <br>TCP and UDP Vulnerabilities - 3.7 73 <br> TCP Segment Header - 3.7.1 73 <br> TCP Services - 3.7.2 73 <br> TCP Attacks - 3.7.3 74 <br> UDP Segment Header and Operation - 3.7.4 74 <br> UDP Attacks - 3.7.5 75 <br> Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 <br>IP Services - 3.8 75 <br> ARP Vulnerabilities - 3.8.1 75 <br> ARP Cache Poisoning - 3.8.2 76 <br> Video - ARP Spoofing - 3.8.3 76 <br> DNS Attacks - 3.8.4 76 <br> DNS Tunneling - 3.8.5 78 <br> DHCP - 3.8.6 78 <br> DHCP Attacks - 3.8.7 78 <br> Lab - Explore DNS Traffic - 3.8.8 79 <br>Network Security Best Practices - 3.9 80 <br> Confidentiality, Integrity, and Availability - 3.9.1 80 <br> The Defense-in-Depth Approach - 3.9.2 80 <br> Firewalls - 3.9.3 80 <br> IPS - 3.9.4 81 <br> Content Security Appliances - 3.9.5 81 <br> Check Your Understanding - Network Security Best Practices - 3.9.6 82 <br>Cryptography - 3.10 82 <br> Video - Cryptography - 3.10.1 82 <br> Securing Communications - 3.10.2 82 <br> Data Integrity - 3.10.3 83 <br> Hash Functions - 3.10.4 83 <br> Origin Authentication - 3.10.5 84 <br> Data Confidentiality - 3.10.6 85 <br> Symmetric Encryption - 3.10.7 85 <br> Asymmetric Encryption - 3.10.8 86 <br> Diffie-Hellman - 3.10.9 87 <br> Check Your Understanding - Cryptography - 3.10.10 88 <br>Module Practice and Quiz - 3.11 88 <br> What did I learn in this module? - 3.11.1 88 <br>Chapter Quiz - Network Security Concepts 91 <br>Your Chapter Notes 91 <br> Chapter 4 ACL Concepts 93 <br>Introduction - 4.0 93 <br> Why should I take this module? - 4.0.1 93 <br> What will I learn to do in this module? - 4.0.2 93 <br>Purpose of ACLs - 4.1 93 <br> What is an ACL? - 4.1.1 93 <br> Packet Filtering - 4.1.2 95 <br> ACL Operation - 4.1.3 95 <br> Packet Tracer - ACL Demonstration - 4.1.4 96 <br> Check Your Understanding - Purpose of ACLs - 4.1.5 96 <br>Wildcard Masks in ACLs - 4.2 96 <br> Wildcard Mask Overview - 4.2.1 96 <br> Wildcard Mask Types - 4.2.2 97 <br> Wildcard Mask Calculation - 4.2.3 97 <br> Wildcard Mask Keywords - 4.2.4 98 <br> Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 <br>Guidelines for ACL Creation - 4.3 99 <br> Limited Number of ACLs per Interface - 4.3.1 99 <br> ACL Best Practices - 4.3.2 99 <br> Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 <br>Types of IPv4 ACLs - 4.4 100 <br> Standard and Extended ACLs - 4.4.1 100 <br> Numbered and Named ACLs - 4.4.2 101 <br> Where to Place ACLs - 4.4.3 102 <br> Standard ACL Placement Example - 4.4.4 102 <br> Extended ACL Placement Example - 4.4.5 103 <br> Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 <br>Module Practice and Quiz - 4.5 103 <br> What did I learn in this module? - 4.5.1 103 <br>Chapter Quiz - ACL Concepts 106 <br>Your Chapter Notes 106 <br> Chapter 5 ACLs for IPv4 Configuration 107 <br>Introduction - 5.0 107 <br> Why should I take this module? - 5.0.1 107 <br> What will I learn to do in this module? - 5.0.2 107 <br>Configure Standard IPv4 ACLs - 5.1 107 <br> Create an ACL - 5.1.1 107 <br> Numbered Standard IPv4 ACL Syntax - 5.1.2 108 <br> Named Standard IPv4 ACL Syntax - 5.1.3 109 <br> Apply a Standard IPv4 ACL - 5.1.4 109 <br> Numbered Standard IPv4 ACL Example - 5.1.5 110 <br> Named Standard IPv4 ACL Example - 5.1.6 111 <br> Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112 <br> Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113 <br> Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 <br>Modify IPv4 ACLs - 5.2 113 <br> Two Methods to Modify an ACL - 5.2.1 113 <br> Text Editor Method - 5.2.2 113 <br> Sequence Numbers Method - 5.2.3 114 <br> Modify a Named ACL Example - 5.2.4 115 <br> ACL Statistics - 5.2.5 116 <br> Syntax Checker - Modify IPv4 ACLs - 5.2.6 116 <br> Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 <br>Secure VTY Ports with a Standard IPv4 ACL - 5.3 116 <br> The access-class Command - 5.3.1 116 <br> Secure VTY Access Example - 5.3.2 117 <br> Verify the VTY Port is Secured - 5.3.3 118 <br> Syntax Checker - Secure the VTY Ports - 5.3.4 118 <br>Configure Extended IPv4 ACLs - 5.4 119 <br> Extended ACLs - 5.4.1 119 <br> Numbered Extended IPv4 ACL Syntax - 5.4.2 119 <br> Protocols and Ports - 5.4.3 120 <br> Protocols and Port Numbers Configuration Examples - 5.4.4 123 <br> Apply a Numbered Extended IPv4 ACL - 5.4.5 123 <br> TCP Established Extended ACL - 5.4.6 123 <br> Named Extended IPv4 ACL Syntax - 5.4.7 124 <br> Named Extended IPv4 ACL Example - 5.4.8 125 <br> Edit Extended ACLs - 5.4.9 126 <br> Another Named Extended IPv4 ACL Example - 5.4.10 127 <br> Verify Extended ACLs - 5.4.11 128 <br> Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130 <br> Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 <br>Module Practice and Quiz - 5.5 130 <br> Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130 <br> Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131 <br> What did I learn in this module? - 5.5.3 131 <br>Chapter Quiz - ACLs for IPv4 Implementation 133 <br>Your Chapter Notes 133 <br> Chapter 6 NAT for IPv4 135 <br>Introduction - 6.0 135 <br> Why should I take this module? - 6.0.1 135 <br> What will I learn to do in this module? - 6.0.2 135 <br>NAT Characteristics - 6.1 135 <br> IPv4 Private Address Space - 6.1.1 135 <br> What is NAT - 6.1.2 136 <br> How NAT Works - 6.1.3 137 <br> NAT Terminology - 6.1.4 137 <br> Check Your Understanding - NAT Characteristics - 6.1.5 138 <br>Types of NAT - 6.2 139 <br> Static NAT - 6.2.1 139 <br> Dynamic NAT - 6.2.2 139 <br> Port Address Translation - 6.2.3 139 <br> Next Available Port - 6.2.4 140 <br> NAT and PAT Comparison - 6.2.5 140 <br> Packets without a Layer 4 Segment - 6.2.6 141 <br> Packet Tracer - Investigate NAT Operations - 6.2.7 141 <br>NAT Advantages and Disadvantages - 6.3 142 <br> Advantages of NAT - 6.3.1 142 <br> Disadvantages of NAT - 6.3.2 142 <br> Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 <br>Static NAT - 6.4 143 <br> Static NAT Scenario - 6.4.1 143 <br> Configure Static NAT - 6.4.2 143 <br> Analyze Static NAT - 6.4.3 144 <br> Verify Static NAT - 6.4.4 144 <br> Packet Tracer - Configure Static NAT - 6.4.5 145 <br>Dynamic NAT - 6.5 146 <br> Dynamic NAT Scenario - 6.5.1 146 <br> Configure Dynamic NAT - 6.5.2 146 <br> Analyze Dynamic NAT - Inside to Outside - 6.5.3 147 <br> Analyze Dynamic NAT - Outside to Inside - 6.5.4 147 <br> Verify Dynamic NAT - 6.5.5 148 <br> Packet Tracer - Configure Dynamic NAT - 6.5.6 150 <br>PAT - 6.6 150 <br> PAT Scenario - 6.6.1 150 <br> Configure PAT to Use a Single IPv4 Address - 6.6.2 150 <br> Configure PAT to Use an Address Pool - 6.6.3 151 <br> Analyze PAT - PC to Server - 6.6.4 151 <br> Analyze PAT - Server to PC - 6.6.5 151 <br> Verify PAT - 6.6.6 151 <br> Packet Tracer - Configure PAT - 6.6.7 152 <br>NAT64 - 6.7 153 <br> NAT for IPv6? - 6.7.1 153 <br> NAT64 - 6.7.2 153 <br>Module Practice and Quiz - 6.8 153 <br> Packet Tracer - Configure NAT for IPv4 - 6.8.1 153 <br> Lab - Configure NAT for IPv4 - 6.8.2 154 <br> What did I learn in this module? - 6.8.3 154 <br>Chapter Quiz - NAT for IPv4 158 <br>Your Chapter Notes 158 <br> Chapter 7 WAN Concepts 159 <br>Introduction - 7.0 159 <br> Why should I take this module? - 7.0.1 159 <br> What will I learn to do in this module? - 7.0.2 159 <br>Purpose of WANs - 7.1 159 <br> LANs and WANs - 7.1.1 159 <br> Private and Public WANs - 7.1.2 160 <br> WAN Topologies - 7.1.3 160 <br> Carrier Connections - 7.1.4 162 <br> Evolving Networks - 7.1.5 162 <br> Check Your Understanding - Purpose of WANs - 7.1.6 164 <br>WAN Operations - 7.2 164 <br> WAN Standards - 7.2.1 164 <br> WANs in the OSI Model - 7.2.2 164 <br> Common WAN Terminology - 7.2.3 165 <br> WAN Devices - 7.2.4 166 <br> Serial Communication - 7.2.5 167 <br> Circuit-Switched Communication - 7.2.6 168 <br> Packet-Switched Communications - 7.2.7 168 <br> SDH, SONET, and DWDM - 7.2.8 169 <br> Check Your Understanding - WAN Operations - 7.2.9 169 <br>Traditional WAN Connectivity - 7.3 169 <br> Traditional WAN Connectivity Options - 7.3.1 169 <br> Common WAN Terminology - 7.3.2 169 <br> Circuit-Switched Options - 7.3.3 170 <br> Packet-Switched Options - 7.3.4 171 <br> Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 <br>Modern WAN Connectivity - 7.4 172 <br> Modern WANs - 7.4.1 172 <br> Modern WAN Connectivity Options - 7.4.2 172 <br> Ethernet WAN - 7.4.3 173 <br> MPLS - 7.4.4 174 <br> Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 <br>Internet-Based Connectivity - 7.5 174 <br> Internet-Based Connectivity Options - 7.5.1 174 <br> DSL Technology - 7.5.2 175 <br> DSL Connections - 7.5.3 175 <br> DSL and PPP - 7.5.4 176 <br> Cable Technology - 7.5.5 176 <br> Optical Fiber - 7.5.6 177 <br> Wireless Internet-Based Broadband - 7.5.7 177 <br> VPN Technology - 7.5.8 179 <br> ISP Connectivity Options - 7.5.9 179 <br> Broadband Solution Comparison - 7.5.10 180 <br> Lab - Research Broadband Internet Access Options - 7.5.11 181 <br>Module Practice and Quiz - 7.6 181 <br> Packet Tracer - WAN Concepts - 7.6.1 181 <br> What did I learn in this module? - 7.6.2 181 <br>Chapter Quiz - WAN Concepts 184 <br>Your Chapter Notes 184 <br> Chapter 8 VPN and IPsec Concepts 185 <br>Introduction - 8.0 185 <br> Why should I take this module? - 8.0.1 185 <br> What will I learn in this module? - 8.0.2 185 <br>VPN Technology - 8.1 185 <br> Virtual Private Networks - 8.1.1 185 <br> VPN Benefits - 8.1.2 186 <br> Site-to-Site and Remote-Access VPNs - 8.1.3 186 <br> Enterprise and Service Provider VPNs - 8.1.4 186 <br> Check Your Understanding - VPN Technology - 8.1.5 187 <br>Types of VPNs - 8.2 187 <br> Remote-Access VPNs - 8.2.1 187 <br> SSL VPNs - 8.2.2 187 <br> Site-to-Site IPsec VPNs - 8.2.3 188 <br> GRE over IPsec - 8.2.4 188 <br> Dynamic Multipoint VPNs - 8.2.5 189 <br> IPsec Virtual Tunnel Interface - 8.2.6 189 <br> Service Provider MPLS VPNs - 8.2.7 190 <br> Check Your Understanding - Types of VPNs - 8.2.8 190 <br>IPsec - 8.3 190 <br> Video - IPsec Concepts - 8.3.1 190 <br> IPsec Technologies - 8.3.2 190 <br> IPsec Protocol Encapsulation - 8.3.3 191 <br> Confidentiality - 8.3.4 192 <br> Integrity - 8.3.5 192 <br> Authentication - 8.3.6 192 <br> Secure Key Exchange with Diffie-Hellman - 8.3.7 193 <br> Video - IPsec Transport and Tunnel Mode - 8.3.8 193 <br> Check Your Understanding - IPsec - 8.3.9 193 <br>Module Practice and Quiz - 8.4 193 <br> What did I learn in this module? - 8.4.1 193 <br>Chapter Quiz - VPN and IPsec Concepts 195 <br>Your Chapter Notes 195 <br> Chapter 9 QoS Concepts 197 <br>Introduction - 9.0 197 <br> Why should I take this module? - 9.0.1 197 <br> What will I learn to do in this module? - 9.0.2 197 <br>Network Transmission Quality - 9.1 197 <br> Video Tutorial - The Purpose of QoS - 9.1.1 197 <br> Prioritizing Traffic - 9.1.2 197 <br> Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198 <br> Packet Loss - 9.1.4 199 <br> Check Your Understanding - Network Transmission Quality - 9.1.5 199 <br>Traffic Characteristics - 9.2 199 <br> Video Tutorial - Traffic Characteristics - 9.2.1 199 <br> Network Traffic Trends - 9.2.2 199 <br> Voice - 9.2.3 200 <br> Video - 9.2.4 200 <br> Data - 9.2.5 201 <br> Check Your Understanding - Traffic Characteristics - 9.2.6 202 <br>Queuing Algorithms - 9.3 202 <br> Video Tutorial - QoS Algorithms - 9.3.1 202 <br> Queuing Overview - 9.3.2 202 <br> First In First Out - 9.3.3 202 <br> Weighted Fair Queuing (WFQ) - 9.3.4 203 <br> Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203 <br> Low Latency Queuing (LLQ) - 9.3.6 204 <br> Check Your Understanding - Queuing Algorithms - 9.3.7 204 <br>QoS Models - 9.4 204 <br> Video Tutorial - QoS Models - 9.4.1 204 <br> Selecting an Appropriate QoS Policy Model - 9.4.2 204 <br> Best Effort - 9.4.3 205 <br> Integrated Services - 9.4.4 206 <br> Differentiated Services - 9.4.5 206 <br> Check Your Understanding - QoS Models - 9.4.6 208 <br>QoS Implementation Techniques - 9.5 208 <br> Video Tutorial - QoS Implementation Techniques - 9.5.1 208 <br> Avoiding Packet Loss - 9.5.2 208 <br> QoS Tools - 9.5.3 208 <br> Classification and Marking - 9.5.4 209 <br> Marking at Layer 2 - 9.5.5 210 <br> Marking at Layer 3 - 9.5.6 210 <br> Type of Service and Traffic Class Field - 9.5.7 211 <br> DSCP Values - 9.5.8 211 <br> Class Selector Bits - 9.5.9 211 <br> Trust Boundaries - 9.5.10 211 <br> Congestion Avoidance - 9.5.11 212 <br> Shaping and Policing - 9.5.12 212 <br> QoS Policy Guidelines - 9.5.13 213 <br> Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 <br>Module Practice and Quiz - 9.6 213 <br> What did I learn in this module? - 9.6.1 213 <br>Chapter Quiz - QoS Concepts 216 <br>Your Chapter Notes 216 <br> Chapter 10 Network Management 217 <br>Introduction - 10.0 217 <br> Why should I take this module? - 10.0.1 217 <br> What will I learn to do in this module? - 10.0.2 217 <br>Device Discovery with CDP - 10.1 217 <br> CDP Overview - 10.1.1 217 <br> Configure and Verify CDP - 10.1.2 218 <br> Discover Devices by Using CDP - 10.1.3 220 <br> Syntax Checker - Configure and Verify CDP - 10.1.4 222 <br> Packet Tracer - Use CDP to Map a Network - 10.1.5 222 <br>Device Discovery with LLDP - 10.2 222 <br> LLDP Overview - 10.2.1 222 <br> Configure and Verify LLDP - 10.2.2 222 <br> Discover Devices by Using LLDP - 10.2.3 223 <br> Syntax Checker - Configure and Verify LLDP - 10.2.4 225 <br> Check Your Understanding - Compare CDP and LLDP - 10.2.5 225 <br> Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 <br>NTP - 10.3 225 <br> Time and Calendar Services - 10.3.1 225 <br> NTP Operation - 10.3.2 226 <br> Configure and Verify NTP - 10.3.3 227 <br> Packet Tracer - Configure and Verify NTP - 10.3.4 229 <br>SNMP - 10.4 229 <br> Introduction to SNMP - 10.4.1 229 <br> SNMP Operation - 10.4.2 230 <br> SNMP Agent Traps - 10.4.3 230 <br> SNMP Versions - 10.4.4 231 <br> Check Your Understanding - SNMP Versions - 10.4.5 232 <br> Community Strings - 10.4.6 232 <br> MIB Object ID - 10.4.7 233 <br> SNMP Polling Scenario - 10.4.8 233 <br> SNMP Object Navigator - 10.4.9 233 <br> Lab - Research Network Monitoring Software - 10.4.10 234 <br>Syslog - 10.5 234 <br> Introduction to Syslog - 10.5.1 234 <br> Syslog Operation - 10.5.2 234 <br> Syslog Message Format - 10.5.3 235 <br> Syslog Facilities - 10.5.4 236 <br> Configure Syslog Timestamp - 10.5.5 236 <br> Check Your Understanding - Syslog Operation - 10.5.6 237 <br>Router and Switch File Maintenance - 10.6 237 <br> Router File Systems - 10.6.1 237 <br> Switch File Systems - 10.6.2 240 <br> Use a Text File to Back Up a Configuration - 10.6.3 241 <br> Use a Text File to Restore a Configuration - 10.6.4 241 <br> Use TFTP to Back Up and Restore a Configuration - 10.6.5 242 <br> USB Ports on a Cisco Router - 10.6.6 242 <br> Use USB to Back Up and Restore a Configuration - 10.6.7 243 <br> Password Recovery Procedures - 10.6.8 245 <br> Password Recovery Example - 10.6.9 245 <br> Packet Tracer - Back Up Configuration Files - 10.6.10 247 <br> Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248 <br> Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248 <br> Lab - Research Password Recovery Procedures - 10.6.13 248 <br>IOS Image Management - 10.7 248 <br> Video - Managing Cisco IOS Images - 10.7.1 248 <br> TFTP Servers as a Backup Location - 10.7.2 248 <br> Backup IOS Image to TFTP Server Example - 10.7.3 249 <br> Copy an IOS Image to a Device Example - 10.7.4 250 <br> The boot system Command - 10.7.5 251 <br> Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 <br>Module Practice and Quiz - 10.8 253 <br> Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253 <br> Lab - Configure CDP, LLDP, and NTP - 10.8.2 253 <br> What did I learn in this module? - 10.8.3 253 <br>Chapter Quiz - Network Management 257 <br>Your Chapter Notes 257 <br> Chapter 11 Network Design 259 <br>Introduction - 11.0 259 <br> Why should I take this module? - 11.0.1 259 <br> What will I learn to do in this module? - 11.0.2 259 <br>Hierarchical Networks - 11.1 259 <br> Video - Three-Layer Network Design - 11.1.1 259 <br> The Need to Scale the Network - 11.1.2 259 <br> Borderless Switched Networks - 11.1.3 260 <br> Hierarchy in the Borderless Switched Network - 11.1.4 261 <br> Access, Distribution, and Core Layer Functions - 11.1.5 262 <br> Three-Tier and Two-Tier Examples - 11.1.6 262 <br> Role of Switched Networks - 11.1.7 263 <br> Check Your Understanding - Hierarchical Networks - 11.1.8 263 <br>Scalable Networks - 11.2 263 <br> Design for Scalability - 11.2.1 263 <br> Plan for Redundancy - 11.2.2 264 <br> Reduce Failure Domain Size - 11.2.3 265 <br> Increase Bandwidth - 11.2.4 265 <br> Expand the Access Layer - 11.2.5 266 <br> Tune Routing Protocols - 11.2.6 266 <br> Check Your Understanding - Scalable Networks - 11.2.7 266 <br>Switch Hardware - 11.3 266 <br> Switch Platforms - 11.3.1 266 <br> Switch Form Factors - 11.3.2 267 <br> Port Density - 11.3.3 268 <br> Forwarding Rates - 11.3.4 268 <br> Power over Ethernet - 11.3.5 269 <br> Multilayer Switching - 11.3.6 269 <br> Business Considerations for Switch Selection - 11.3.7 270 <br> Check Your Understanding - Switch Hardware - 11.3.8 270 <br>Router Hardware - 11.4 270 <br> Router Requirements - 11.4.1 270 <br> Cisco Routers - 11.4.2 271 <br> Router Form Factors - 11.4.3 271 <br> Check Your Understanding - Router Hardware - 11.4.4 272 <br>Module Practice and Quiz - 11.5 272 <br> Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272 <br> What did I learn in this module? - 11.5.2 273 <br>Chapter Quiz - Network Design 275 <br>Your Chapter Notes 275 <br> Chapter 12 Network Troubleshooting 277 <br>Introduction - 12.0 277 <br> Why should I take this module? - 12.0.1 277 <br> What will I learn to do in this module? - 12.0.2 277 <br>Network Documentation - 12.1 277 <br> Documentation Overview - 12.1.1 277 <br> Network Topology Diagrams - 12.1.2 278 <br> Network Device Documentation - 12.1.3 279 <br> Establish a Network Baseline - 12.1.4 279 <br> Step 1 - Determine What Types of Data to Collect - 12.1.5 280 <br> Step 2 - Identify Devices and Ports of Interest - 12.1.6 280 <br> Step 3 - Determine the Baseline Duration - 12.1.7 280 <br> Data Measurement - 12.1.8 281 <br> Check Your Understanding - Network Documentation - 12.1.9 282 <br>Troubleshooting Process - 12.2 282 <br> General Troubleshooting Procedures - 12.2.1 282 <br> Seven-Step Troubleshooting Process - 12.2.2 282 <br> Question End Users - 12.2.3 284 <br> Gather Information - 12.2.4 285 <br> Troubleshooting with Layered Models - 12.2.5 286 <br> Structured Troubleshooting Methods - 12.2.6 286 <br> Guidelines for Selecting a Troubleshooting Method - 12.2.7 288 <br> Check Your Understanding - Troubleshooting Process - 12.2.8 288 <br>Troubleshooting Tools - 12.3 288 <br> Software Troubleshooting Tools - 12.3.1 288 <br> Protocol Analyzers - 12.3.2 289 <br> Hardware Troubleshooting Tools - 12.3.3 289 <br> Syslog Server as a Troubleshooting Tool - 12.3.4 290 <br> Check Your Understanding - Troubleshooting Tools - 12.3.5 292 <br>Symptoms and Causes of Network Problems - 12.4 292 <br> Physical Layer Troubleshooting - 12.4.1 292 <br> Data Link Layer Troubleshooting - 12.4.2 294 <br> Network Layer Troubleshooting - 12.4.3 295 <br> Transport Layer Troubleshooting - ACLs - 12.4.4 297 <br> Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298 <br> Application Layer Troubleshooting - 12.4.6 299 <br> Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 <br>Troubleshooting IP Connectivity - 12.5 300 <br> Components of Troubleshooting End-to-End Connectivity - 12.5.1 300 <br> End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301 <br> Step 1 - Verify the Physical Layer - 12.5.3 303 <br> Step 2 - Check for Duplex Mismatches - 12.5.4 304 <br> Step 3 - Verify Addressing on the Local Network - 12.5.5 306 <br> Step 4 - Verify Default Gateway - 12.5.7 310 <br> Troubleshoot IPv6 Default Gateway Example - 12.5.8 311 <br> Step 5 - Verify Correct Path - 12.5.9 314 <br> Step 6 - Verify the Transport Layer - 12.5.10 315 <br> Step 7 - Verify ACLs - 12.5.11 317 <br> Step 8 - Verify DNS - 12.5.12 318 <br> Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 <br>Module Practice and Quiz - 12.6 319 <br> Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319 <br> Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319 <br> What did I learn in this module? - 12.6.3 320 <br>Chapter Quiz - Network Troubleshooting 324 <br>Your Chapter Notes 324 <br> Chapter 13 Network Virtualization 325 <br>Introduction - 13.0 325 <br> Why should I take this module? - 13.0.1 325 <br> What will I learn to do in this module? - 13.0.2 325 <br>Cloud Computing - 13.1 325 <br> Video - Cloud and Virtualization - 13.1.1 325 <br> Cloud Overview - 13.1.2 325 <br> Cloud Services - 13.1.3 326 <br> Cloud Models - 13.1.4 326 <br> Cloud Computing versus Data Center - 13.1.5 327 <br> Check Your Understanding - Cloud Computing - 13.1.6 327 <br>Virtualization - 13.2 327 <br> Cloud Computing and Virtualization - 13.2.1 327 <br> Dedicated Servers - 13.2.2 328 <br> Server Virtualization - 13.2.3 328 <br> Advantages of Virtualization - 13.2.4 328 <br> Abstraction Layers - 13.2.5 329 <br> Type 2 Hypervisors - 13.2.6 330 <br> Check Your Understanding - Virtualization - 13.2.7 330 <br>Virtual Network Infrastructure - 13.3 330 <br> Type 1 Hypervisors - 13.3.1 330 <br> Installing a VM on a Hypervisor - 13.3.2 330 <br> The Complexity of Network Virtualization - 13.3.3 331 <br> Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 <br>Software-Defined Networking - 13.4 332 <br> Video - Software-Defined Networking - 13.4.1 332 <br> Control Plane and Data Plane - 13.4.2 332 <br> Network Virtualization Technologies - 13.4.3 333 <br> Traditional and SDN Architectures - 13.4.4 334 <br> Check Your Understanding - Software-Defined Networking - 13.4.5 334 <br>Controllers - 13.5 334 <br> SDN Controller and Operations - 13.5.1 334 <br> Video - Cisco ACI - 13.5.2 335 <br> Core Components of ACI - 13.5.3 335 <br> Spine-Leaf Topology - 13.5.4 335 <br> SDN Types - 13.5.5 336 <br> APIC-EM Features - 13.5.6 336 <br> APIC-EM Path Trace - 13.5.7 336 <br> Check Your Understanding - Controllers - 13.5.8 337 <br>Module Practice and Quiz - 13.6 337 <br> Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337 <br> What did I learn in this module? - 13.6.2 337 <br>Chapter Quiz - Network Virtualization 341 <br>Your Chapter Notes 341 <br> Chapter 14 Network Automation 343 <br>Introduction - 14.0 343 <br> Why should I take this module? - 14.0.1 343 <br> What will I learn in this module? - 14.0.2 343 <br>Automation Overview - 14.1 343 <br> Video - Automation Everywhere - 14.1.1 343 <br> The Increase in Automation - 14.1.2 344 <br> Thinking Devices - 14.1.3 344 <br> Check Your Understanding - Benefits of Automation - 14.1.4 344 <br>Data Formats - 14.2 344 <br> Video - Data Formats - 14.2.1 344 <br> The Data Formats Concept - 14.2.2 345 <br> Data Format Rules - 14.2.3 345 <br> Compare Data Formats - 14.2.4 346 <br> JSON Data Format - 14.2.5 347 <br> JSON Syntax Rules - 14.2.6 348 <br> YAML Data Format - 14.2.7 349 <br> XML Data Format - 14.2.8 350 <br> Check Your Understanding - Data Formats - 14.2.9 351 <br>APIs - 14.3 351 <br> Video - APIs - 14.3.1 351 <br> The API Concept - 14.3.2 352 <br> An API Example - 14.3.3 352 <br> Open, Internal, and Partner APIs - 14.3.4 352 <br> Types of Web Service APIs - 14.3.5 353 <br> Check Your Understanding - APIs - 14.3.6 354 <br>REST - 14.4 354 <br> Video - REST - 14.4.1 354 <br> REST and RESTful API - 14.4.2 354 <br> RESTful Implementation - 14.4.3 354 <br> URI, URN, and URL - 14.4.4 355 <br> Anatomy of a RESTful Request - 14.4.5 355 <br> RESTful API Applications - 14.4.6 356 <br> Check Your Understanding - REST - 14.4.7 357 <br>Configuration Management Tools - 14.5 357 <br> Video - Configuration Management Tools - 14.5.1 357 <br> Traditional Network Configuration - 14.5.2 358 <br> Network Automation - 14.5.3 358 <br> Configuration Management Tools - 14.5.4 358 <br> Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359 <br> Check Your Understanding - Configuration Management - 14.5.6 360 <br>IBN and Cisco DNA Center - 14.6 360 <br> Video - Intent-Based Networking - 14.6.1 360 <br> Intent-Based Networking Overview - 14.6.2 360 <br> Network Infrastructure as Fabric - 14.6.3 360 <br> Cisco Digital Network Architecture (DNA) - 14.6.4 361 <br> Cisco DNA Center - 14.6.5 362 <br> Video - DNA Center Overview and Platform APIs - 14.6.6 362 <br> Video - DNA Center Design and Provision - 14.6.7 363 <br> Video - DNA Center Policy and Assurance - 14.6.8 363 <br> Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363 <br> Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 <br>Module Practice and Quiz - 14.7 363 <br> What did I learn in this module? - 14.7.1 363 <br>Chapter Quiz - Network Automation 365 <br>Your Chapter Notes 365 <br> <br> <br>9780136634737 TOC 6/18/2020 <br> <br> <br>