,

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)

Paperback Engels 2020 9780136634737
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The Cisco Networking Academy Course Booklet is designed as a study resource students can easily read, highlight, and review on the go, wherever the Internet is not available or practical: The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section. Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes. The Course Booklet is a basic, economical paper-based resource to help students succeed with the Cisco Networking Academy Enterprise Networking, Security, and Automation v7.0 (ENSA) online course.

Specificaties

ISBN13:9780136634737
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Introduction xxx <br> Chapter 1 Single-Area OSPFv2 Concepts 1 <br>Introduction - 1.0 1 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 1.0.1 1 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 1.0.2 1 <br>OSPF Features and Characteristics - 1.1 1 <br>&nbsp;&nbsp;&nbsp; Introduction to OSPF - 1.1.1 1 <br>&nbsp;&nbsp;&nbsp; Components of OSPF - 1.1.2 2 <br>&nbsp;&nbsp;&nbsp; Link-State Operation - 1.1.3 3 <br>&nbsp;&nbsp;&nbsp; Single-Area and Multiarea OSPF - 1.1.4 4 <br>&nbsp;&nbsp;&nbsp; Multiarea OSPF - 1.1.5 4 <br>&nbsp;&nbsp;&nbsp; OSPFv3 - 1.1.6 5 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 <br>OSPF Packets - 1.2 6 <br>&nbsp;&nbsp;&nbsp; Video - OSPF Packets - 1.2.1 6 <br>&nbsp;&nbsp;&nbsp; Types of OSPF Packets - 1.2.2 6 <br>&nbsp;&nbsp;&nbsp; Link-State Updates - 1.2.3 7 <br>&nbsp;&nbsp;&nbsp; Hello Packet - 1.2.4 7 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - OSPF Packets - 1.2.5 7 <br>OSPF Operation - 1.3 7 <br>&nbsp;&nbsp;&nbsp; Video - OSPF Operation - 1.3.1 7 <br>&nbsp;&nbsp;&nbsp; OSPF Operational States - 1.3.2 7 <br>&nbsp;&nbsp;&nbsp; Establish Neighbor Adjacencies - 1.3.3 8 <br>&nbsp;&nbsp;&nbsp; Synchronizing OSPF Databases - 1.3.4 9 <br>&nbsp;&nbsp;&nbsp; The Need for a DR - 1.3.5 10 <br>&nbsp;&nbsp;&nbsp; LSA Flooding With a DR - 1.3.6 11 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - OPSF Operation - 1.3.7 11 <br>Module Practice and Quiz - 1.4 11 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 1.4.1 11 <br>Chapter Quiz - Single-Area OSPFv2 Concepts 14 <br>Your Chapter Notes 14 <br> Chapter 2 Single-Area OSPFv2 Configuration 15 <br>Introduction - 2.0 15 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 2.0.1 15 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 2.0.2 15 <br>OSPF Router ID - 2.1 15 <br>&nbsp;&nbsp;&nbsp; OSPF Reference Topology - 2.1.1 15 <br>&nbsp;&nbsp;&nbsp; Router Configuration Mode for OSPF - 2.1.2 16 <br>&nbsp;&nbsp;&nbsp; Router IDs - 2.1.3 16 <br>&nbsp;&nbsp;&nbsp; Router ID Order of Precedence - 2.1.4 17 <br>&nbsp;&nbsp;&nbsp; Configure a Loopback Interface as the Router ID - 2.1.5 17 <br>&nbsp;&nbsp;&nbsp; Explicitly Configure a Router ID - 2.1.6 18 <br>&nbsp;&nbsp;&nbsp; Modify a Router ID - 2.1.7 18 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - OSPF Router ID - 2.1.9 19 <br>Point-to-Point OSPF Networks - 2.2 20 <br>&nbsp;&nbsp;&nbsp; The network Command Syntax - 2.2.1 20 <br>&nbsp;&nbsp;&nbsp; The Wildcard Mask - 2.2.2 20 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - The Wildcard Masks - 2.2.3 20 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Using the network Command - 2.2.4 20 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Using the ip ospf Command - 2.2.6 21 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22 <br>&nbsp;&nbsp;&nbsp; Passive Interface - 2.2.8 22 <br>&nbsp;&nbsp;&nbsp; Configure Passive Interfaces - 2.2.9 23 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 <br>&nbsp;&nbsp;&nbsp; OSPF Point-to-Point Networks - 2.2.11 24 <br>&nbsp;&nbsp;&nbsp; Loopbacks and Point-to-Point Networks - 2.2.12 26 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 <br>Multiaccess OSPF Networks - 2.3 27 <br>&nbsp;&nbsp;&nbsp; OSPF Network Types - 2.3.1 27 <br>&nbsp;&nbsp;&nbsp; OSPF Designated Router - 2.3.2 27 <br>&nbsp;&nbsp;&nbsp; OSPF Multiaccess Reference Topology - 2.3.3 27 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Router Roles - 2.3.4 28 <br>&nbsp;&nbsp;&nbsp; Verify DR/BDR Adjacencies - 2.3.5 30 <br>&nbsp;&nbsp;&nbsp; Default DR/BDR Election Process - 2.3.6 32 <br>&nbsp;&nbsp;&nbsp; DR Failure and Recovery - 2.3.7 33 <br>&nbsp;&nbsp;&nbsp; The ip ospf priority Command - 2.3.8 33 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Priority - 2.3.9 34 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure OSPF Priority - 2.3.10 35 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Determine the DR and BDR - 2.3.11 35 <br>Modify Single-Area OSPFv2 - 2.4 36 <br>&nbsp;&nbsp;&nbsp; Cisco OSPF Cost Metric - 2.4.1 36 <br>&nbsp;&nbsp;&nbsp; Adjust the Reference Bandwidth - 2.4.2 36 <br>&nbsp;&nbsp;&nbsp; OSPF Accumulates Costs - 2.4.3 38 <br>&nbsp;&nbsp;&nbsp; Manually Set OSPF Cost Value - 2.4.4 38 <br>&nbsp;&nbsp;&nbsp; Test Failover to Backup Route - 2.4.5 39 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40 <br>&nbsp;&nbsp;&nbsp; Hello Packet Intervals - 2.4.7 40 <br>&nbsp;&nbsp;&nbsp; Verify Hello and Dead Intervals - 2.4.8 40 <br>&nbsp;&nbsp;&nbsp; Modify OSPFv2 Intervals - 2.4.9 42 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 <br>Default Route Propagation - 2.5 43 <br>&nbsp;&nbsp;&nbsp; Propagate a Default Static Route in OSPFv2 - 2.5.1 43 <br>&nbsp;&nbsp;&nbsp; Verify the Propagated Default Route - 2.5.2 44 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 <br>Verify Single-Area OSPFv2 - 2.6 46 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Neighbors - 2.6.1 46 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Protocol Settings - 2.6.2 48 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Process Information - 2.6.3 48 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Interface Settings - 2.6.4 50 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 <br>Module Practice and Quiz - 2.7 51 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51 <br>&nbsp;&nbsp;&nbsp; Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 2.7.3 52 <br>Chapter Quiz - Single-Area OSPFv2 Configuration 56 <br>Your Chapter Notes 56 <br> Chapter 3 Network Security Concepts 57 <br>Introduction - 3.0 57 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 3.0.1 57 <br>&nbsp;&nbsp;&nbsp; What will I learn in this module? - 3.0.2 57 <br>&nbsp;&nbsp;&nbsp; Ethical Hacking Statement - 3.0.3 57 <br>Current State of Cybersecurity - 3.1 58 <br>&nbsp;&nbsp;&nbsp; Current State of Affairs - 3.1.1 58 <br>&nbsp;&nbsp;&nbsp; Vectors of Network Attacks - 3.1.2 58 <br>&nbsp;&nbsp;&nbsp; Data Loss - 3.1.3 59 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 <br>Threat Actors - 3.2 60 <br>&nbsp;&nbsp;&nbsp; The Hacker - 3.2.1 60 <br>&nbsp;&nbsp;&nbsp; Evolution of Hackers - 3.2.2 61 <br>&nbsp;&nbsp;&nbsp; Cyber Criminals - 3.2.3 61 <br>&nbsp;&nbsp;&nbsp; Hacktivists - 3.2.4 61 <br>&nbsp;&nbsp;&nbsp; State-Sponsored Hackers - 3.2.5 61 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Threat Actors - 3.2.6 62 <br>Threat Actor Tools - 3.3 62 <br>&nbsp;&nbsp;&nbsp; Video - Threat Actor Tools - 3.3.1 62 <br>&nbsp;&nbsp;&nbsp; Introduction to Attack Tools - 3.3.2 62 <br>&nbsp;&nbsp;&nbsp; Evolution of Security Tools - 3.3.3 62 <br>&nbsp;&nbsp;&nbsp; Attack Types - 3.3.4 63 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Threat Actor Tools - 3.3.5 64 <br>Malware - 3.4 64 <br>&nbsp;&nbsp;&nbsp; Overview of Malware - 3.4.1 64 <br>&nbsp;&nbsp;&nbsp; Viruses and Trojan Horses - 3.4.2 64 <br>&nbsp;&nbsp;&nbsp; Other Types of Malware - 3.4.3 65 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Malware - 3.4.4 66 <br>Common Network Attacks - 3.5 66 <br>&nbsp;&nbsp;&nbsp; Overview of Network Attacks - 3.5.1 66 <br>&nbsp;&nbsp;&nbsp; Video - Reconnaissance Attacks - 3.5.2 67 <br>&nbsp;&nbsp;&nbsp; Reconnaissance Attacks - 3.5.3 67 <br>&nbsp;&nbsp;&nbsp; Video - Access and Social Engineering Attacks - 3.5.4 68 <br>&nbsp;&nbsp;&nbsp; Access Attacks - 3.5.5 68 <br>&nbsp;&nbsp;&nbsp; Social Engineering Attacks - 3.5.6 69 <br>&nbsp;&nbsp;&nbsp; Lab - Social Engineering - 3.5.7 70 <br>&nbsp;&nbsp;&nbsp; Video - Denial of Service Attacks - 3.5.8 70 <br>&nbsp;&nbsp;&nbsp; DoS and DDoS Attacks - 3.5.9 70 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Common Network Attacks - 3.5.10 71 <br>IP Vulnerabilities and Threats - 3.6 71 <br>&nbsp;&nbsp;&nbsp; Video - Common IP and ICMP Attacks - 3.6.1 71 <br>&nbsp;&nbsp;&nbsp; IPv4 and IPv6 - 3.6.2 71 <br>&nbsp;&nbsp;&nbsp; ICMP Attacks - 3.6.3 71 <br>&nbsp;&nbsp;&nbsp; Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 <br>&nbsp;&nbsp;&nbsp; Amplification and Reflection Attacks - 3.6.5 72 <br>&nbsp;&nbsp;&nbsp; Address Spoofing Attacks - 3.6.6 72 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 <br>TCP and UDP Vulnerabilities - 3.7 73 <br>&nbsp;&nbsp;&nbsp; TCP Segment Header - 3.7.1 73 <br>&nbsp;&nbsp;&nbsp; TCP Services - 3.7.2 73 <br>&nbsp;&nbsp;&nbsp; TCP Attacks - 3.7.3 74 <br>&nbsp;&nbsp;&nbsp; UDP Segment Header and Operation - 3.7.4 74 <br>&nbsp;&nbsp;&nbsp; UDP Attacks - 3.7.5 75 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 <br>IP Services - 3.8 75 <br>&nbsp;&nbsp;&nbsp; ARP Vulnerabilities - 3.8.1 75 <br>&nbsp;&nbsp;&nbsp; ARP Cache Poisoning - 3.8.2 76 <br>&nbsp;&nbsp;&nbsp; Video - ARP Spoofing - 3.8.3 76 <br>&nbsp;&nbsp;&nbsp; DNS Attacks - 3.8.4 76 <br>&nbsp;&nbsp;&nbsp; DNS Tunneling - 3.8.5 78 <br>&nbsp;&nbsp;&nbsp; DHCP - 3.8.6 78 <br>&nbsp;&nbsp;&nbsp; DHCP Attacks - 3.8.7 78 <br>&nbsp;&nbsp;&nbsp; Lab - Explore DNS Traffic - 3.8.8 79 <br>Network Security Best Practices - 3.9 80 <br>&nbsp;&nbsp;&nbsp; Confidentiality, Integrity, and Availability - 3.9.1 80 <br>&nbsp;&nbsp;&nbsp; The Defense-in-Depth Approach - 3.9.2 80 <br>&nbsp;&nbsp;&nbsp; Firewalls - 3.9.3 80 <br>&nbsp;&nbsp;&nbsp; IPS - 3.9.4 81 <br>&nbsp;&nbsp;&nbsp; Content Security Appliances - 3.9.5 81 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Network Security Best Practices - 3.9.6 82 <br>Cryptography - 3.10 82 <br>&nbsp;&nbsp;&nbsp; Video - Cryptography - 3.10.1 82 <br>&nbsp;&nbsp;&nbsp; Securing Communications - 3.10.2 82 <br>&nbsp;&nbsp;&nbsp; Data Integrity - 3.10.3 83 <br>&nbsp;&nbsp;&nbsp; Hash Functions - 3.10.4 83 <br>&nbsp;&nbsp;&nbsp; Origin Authentication - 3.10.5 84 <br>&nbsp;&nbsp;&nbsp; Data Confidentiality - 3.10.6 85 <br>&nbsp;&nbsp;&nbsp; Symmetric Encryption - 3.10.7 85 <br>&nbsp;&nbsp;&nbsp; Asymmetric Encryption - 3.10.8 86 <br>&nbsp;&nbsp;&nbsp; Diffie-Hellman - 3.10.9 87 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Cryptography - 3.10.10 88 <br>Module Practice and Quiz - 3.11 88 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 3.11.1 88 <br>Chapter Quiz - Network Security Concepts 91 <br>Your Chapter Notes 91 <br> Chapter 4 ACL Concepts 93 <br>Introduction - 4.0 93 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 4.0.1 93 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 4.0.2 93 <br>Purpose of ACLs - 4.1 93 <br>&nbsp;&nbsp;&nbsp; What is an ACL? - 4.1.1 93 <br>&nbsp;&nbsp;&nbsp; Packet Filtering - 4.1.2 95 <br>&nbsp;&nbsp;&nbsp; ACL Operation - 4.1.3 95 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - ACL Demonstration - 4.1.4 96 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Purpose of ACLs - 4.1.5 96 <br>Wildcard Masks in ACLs - 4.2 96 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Overview - 4.2.1 96 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Types - 4.2.2 97 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Calculation - 4.2.3 97 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Keywords - 4.2.4 98 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 <br>Guidelines for ACL Creation - 4.3 99 <br>&nbsp;&nbsp;&nbsp; Limited Number of ACLs per Interface - 4.3.1 99 <br>&nbsp;&nbsp;&nbsp; ACL Best Practices - 4.3.2 99 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 <br>Types of IPv4 ACLs - 4.4 100 <br>&nbsp;&nbsp;&nbsp; Standard and Extended ACLs - 4.4.1 100 <br>&nbsp;&nbsp;&nbsp; Numbered and Named ACLs - 4.4.2 101 <br>&nbsp;&nbsp;&nbsp; Where to Place ACLs - 4.4.3 102 <br>&nbsp;&nbsp;&nbsp; Standard ACL Placement Example - 4.4.4 102 <br>&nbsp;&nbsp;&nbsp; Extended ACL Placement Example - 4.4.5 103 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 <br>Module Practice and Quiz - 4.5 103 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 4.5.1 103 <br>Chapter Quiz - ACL Concepts 106 <br>Your Chapter Notes 106 <br> Chapter 5 ACLs for IPv4 Configuration 107 <br>Introduction - 5.0 107 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 5.0.1 107 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 5.0.2 107 <br>Configure Standard IPv4 ACLs - 5.1 107 <br>&nbsp;&nbsp;&nbsp; Create an ACL - 5.1.1 107 <br>&nbsp;&nbsp;&nbsp; Numbered Standard IPv4 ACL Syntax - 5.1.2 108 <br>&nbsp;&nbsp;&nbsp; Named Standard IPv4 ACL Syntax - 5.1.3 109 <br>&nbsp;&nbsp;&nbsp; Apply a Standard IPv4 ACL - 5.1.4 109 <br>&nbsp;&nbsp;&nbsp; Numbered Standard IPv4 ACL Example - 5.1.5 110 <br>&nbsp;&nbsp;&nbsp; Named Standard IPv4 ACL Example - 5.1.6 111 <br>&nbsp;&nbsp;&nbsp; Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 <br>Modify IPv4 ACLs - 5.2 113 <br>&nbsp;&nbsp;&nbsp; Two Methods to Modify an ACL - 5.2.1 113 <br>&nbsp;&nbsp;&nbsp; Text Editor Method - 5.2.2 113 <br>&nbsp;&nbsp;&nbsp; Sequence Numbers Method - 5.2.3 114 <br>&nbsp;&nbsp;&nbsp; Modify a Named ACL Example - 5.2.4 115 <br>&nbsp;&nbsp;&nbsp; ACL Statistics - 5.2.5 116 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Modify IPv4 ACLs - 5.2.6 116 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 <br>Secure VTY Ports with a Standard IPv4 ACL - 5.3 116 <br>&nbsp;&nbsp;&nbsp; The access-class Command - 5.3.1 116 <br>&nbsp;&nbsp;&nbsp; Secure VTY Access Example - 5.3.2 117 <br>&nbsp;&nbsp;&nbsp; Verify the VTY Port is Secured - 5.3.3 118 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Secure the VTY Ports - 5.3.4 118 <br>Configure Extended IPv4 ACLs - 5.4 119 <br>&nbsp;&nbsp;&nbsp; Extended ACLs - 5.4.1 119 <br>&nbsp;&nbsp;&nbsp; Numbered Extended IPv4 ACL Syntax - 5.4.2 119 <br>&nbsp;&nbsp;&nbsp; Protocols and Ports - 5.4.3 120 <br>&nbsp;&nbsp;&nbsp; Protocols and Port Numbers Configuration Examples - 5.4.4 123 <br>&nbsp;&nbsp;&nbsp; Apply a Numbered Extended IPv4 ACL - 5.4.5 123 <br>&nbsp;&nbsp;&nbsp; TCP Established Extended ACL - 5.4.6 123 <br>&nbsp;&nbsp;&nbsp; Named Extended IPv4 ACL Syntax - 5.4.7 124 <br>&nbsp;&nbsp;&nbsp; Named Extended IPv4 ACL Example - 5.4.8 125 <br>&nbsp;&nbsp;&nbsp; Edit Extended ACLs - 5.4.9 126 <br>&nbsp;&nbsp;&nbsp; Another Named Extended IPv4 ACL Example - 5.4.10 127 <br>&nbsp;&nbsp;&nbsp; Verify Extended ACLs - 5.4.11 128 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 <br>Module Practice and Quiz - 5.5 130 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130 <br>&nbsp;&nbsp;&nbsp; Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 5.5.3 131 <br>Chapter Quiz - ACLs for IPv4 Implementation 133 <br>Your Chapter Notes 133 <br> Chapter 6 NAT for IPv4 135 <br>Introduction - 6.0 135 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 6.0.1 135 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 6.0.2 135 <br>NAT Characteristics - 6.1 135 <br>&nbsp;&nbsp;&nbsp; IPv4 Private Address Space - 6.1.1 135 <br>&nbsp;&nbsp;&nbsp; What is NAT - 6.1.2 136 <br>&nbsp;&nbsp;&nbsp; How NAT Works - 6.1.3 137 <br>&nbsp;&nbsp;&nbsp; NAT Terminology - 6.1.4 137 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - NAT Characteristics - 6.1.5 138 <br>Types of NAT - 6.2 139 <br>&nbsp;&nbsp;&nbsp; Static NAT - 6.2.1 139 <br>&nbsp;&nbsp;&nbsp; Dynamic NAT - 6.2.2 139 <br>&nbsp;&nbsp;&nbsp; Port Address Translation - 6.2.3 139 <br>&nbsp;&nbsp;&nbsp; Next Available Port - 6.2.4 140 <br>&nbsp;&nbsp;&nbsp; NAT and PAT Comparison - 6.2.5 140 <br>&nbsp;&nbsp;&nbsp; Packets without a Layer 4 Segment - 6.2.6 141 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Investigate NAT Operations - 6.2.7 141 <br>NAT Advantages and Disadvantages - 6.3 142 <br>&nbsp;&nbsp;&nbsp; Advantages of NAT - 6.3.1 142 <br>&nbsp;&nbsp;&nbsp; Disadvantages of NAT - 6.3.2 142 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 <br>Static NAT - 6.4 143 <br>&nbsp;&nbsp;&nbsp; Static NAT Scenario - 6.4.1 143 <br>&nbsp;&nbsp;&nbsp; Configure Static NAT - 6.4.2 143 <br>&nbsp;&nbsp;&nbsp; Analyze Static NAT - 6.4.3 144 <br>&nbsp;&nbsp;&nbsp; Verify Static NAT - 6.4.4 144 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Static NAT - 6.4.5 145 <br>Dynamic NAT - 6.5 146 <br>&nbsp;&nbsp;&nbsp; Dynamic NAT Scenario - 6.5.1 146 <br>&nbsp;&nbsp;&nbsp; Configure Dynamic NAT - 6.5.2 146 <br>&nbsp;&nbsp;&nbsp; Analyze Dynamic NAT - Inside to Outside - 6.5.3 147 <br>&nbsp;&nbsp;&nbsp; Analyze Dynamic NAT - Outside to Inside - 6.5.4 147 <br>&nbsp;&nbsp;&nbsp; Verify Dynamic NAT - 6.5.5 148 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure Dynamic NAT - 6.5.6 150 <br>PAT - 6.6 150 <br>&nbsp;&nbsp;&nbsp; PAT Scenario - 6.6.1 150 <br>&nbsp;&nbsp;&nbsp; Configure PAT to Use a Single IPv4 Address - 6.6.2 150 <br>&nbsp;&nbsp;&nbsp; Configure PAT to Use an Address Pool - 6.6.3 151 <br>&nbsp;&nbsp;&nbsp; Analyze PAT - PC to Server - 6.6.4 151 <br>&nbsp;&nbsp;&nbsp; Analyze PAT - Server to PC - 6.6.5 151 <br>&nbsp;&nbsp;&nbsp; Verify PAT - 6.6.6 151 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure PAT - 6.6.7 152 <br>NAT64 - 6.7 153 <br>&nbsp;&nbsp;&nbsp; NAT for IPv6? - 6.7.1 153 <br>&nbsp;&nbsp;&nbsp; NAT64 - 6.7.2 153 <br>Module Practice and Quiz - 6.8 153 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure NAT for IPv4 - 6.8.1 153 <br>&nbsp;&nbsp;&nbsp; Lab - Configure NAT for IPv4 - 6.8.2 154 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 6.8.3 154 <br>Chapter Quiz - NAT for IPv4 158 <br>Your Chapter Notes 158 <br> Chapter 7 WAN Concepts 159 <br>Introduction - 7.0 159 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 7.0.1 159 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 7.0.2 159 <br>Purpose of WANs - 7.1 159 <br>&nbsp;&nbsp;&nbsp; LANs and WANs - 7.1.1 159 <br>&nbsp;&nbsp;&nbsp; Private and Public WANs - 7.1.2 160 <br>&nbsp;&nbsp;&nbsp; WAN Topologies - 7.1.3 160 <br>&nbsp;&nbsp;&nbsp; Carrier Connections - 7.1.4 162 <br>&nbsp;&nbsp;&nbsp; Evolving Networks - 7.1.5 162 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Purpose of WANs - 7.1.6 164 <br>WAN Operations - 7.2 164 <br>&nbsp;&nbsp;&nbsp; WAN Standards - 7.2.1 164 <br>&nbsp;&nbsp;&nbsp; WANs in the OSI Model - 7.2.2 164 <br>&nbsp;&nbsp;&nbsp; Common WAN Terminology - 7.2.3 165 <br>&nbsp;&nbsp;&nbsp; WAN Devices - 7.2.4 166 <br>&nbsp;&nbsp;&nbsp; Serial Communication - 7.2.5 167 <br>&nbsp;&nbsp;&nbsp; Circuit-Switched Communication - 7.2.6 168 <br>&nbsp;&nbsp;&nbsp; Packet-Switched Communications - 7.2.7 168 <br>&nbsp;&nbsp;&nbsp; SDH, SONET, and DWDM - 7.2.8 169 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - WAN Operations - 7.2.9 169 <br>Traditional WAN Connectivity - 7.3 169 <br>&nbsp;&nbsp;&nbsp; Traditional WAN Connectivity Options - 7.3.1 169 <br>&nbsp;&nbsp;&nbsp; Common WAN Terminology - 7.3.2 169 <br>&nbsp;&nbsp;&nbsp; Circuit-Switched Options - 7.3.3 170 <br>&nbsp;&nbsp;&nbsp; Packet-Switched Options - 7.3.4 171 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 <br>Modern WAN Connectivity - 7.4 172 <br>&nbsp;&nbsp;&nbsp; Modern WANs - 7.4.1 172 <br>&nbsp;&nbsp;&nbsp; Modern WAN Connectivity Options - 7.4.2 172 <br>&nbsp;&nbsp;&nbsp; Ethernet WAN - 7.4.3 173 <br>&nbsp;&nbsp;&nbsp; MPLS - 7.4.4 174 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 <br>Internet-Based Connectivity - 7.5 174 <br>&nbsp;&nbsp;&nbsp; Internet-Based Connectivity Options - 7.5.1 174 <br>&nbsp;&nbsp;&nbsp; DSL Technology - 7.5.2 175 <br>&nbsp;&nbsp;&nbsp; DSL Connections - 7.5.3 175 <br>&nbsp;&nbsp;&nbsp; DSL and PPP - 7.5.4 176 <br>&nbsp;&nbsp;&nbsp; Cable Technology - 7.5.5 176 <br>&nbsp;&nbsp;&nbsp; Optical Fiber - 7.5.6 177 <br>&nbsp;&nbsp;&nbsp; Wireless Internet-Based Broadband - 7.5.7 177 <br>&nbsp;&nbsp;&nbsp; VPN Technology - 7.5.8 179 <br>&nbsp;&nbsp;&nbsp; ISP Connectivity Options - 7.5.9 179 <br>&nbsp;&nbsp;&nbsp; Broadband Solution Comparison - 7.5.10 180 <br>&nbsp;&nbsp;&nbsp; Lab - Research Broadband Internet Access Options - 7.5.11 181 <br>Module Practice and Quiz - 7.6 181 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - WAN Concepts - 7.6.1 181 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 7.6.2 181 <br>Chapter Quiz - WAN Concepts 184 <br>Your Chapter Notes 184 <br> Chapter 8 VPN and IPsec Concepts 185 <br>Introduction - 8.0 185 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 8.0.1 185 <br>&nbsp;&nbsp;&nbsp; What will I learn in this module? - 8.0.2 185 <br>VPN Technology - 8.1 185 <br>&nbsp;&nbsp;&nbsp; Virtual Private Networks - 8.1.1 185 <br>&nbsp;&nbsp;&nbsp; VPN Benefits - 8.1.2 186 <br>&nbsp;&nbsp;&nbsp; Site-to-Site and Remote-Access VPNs - 8.1.3 186 <br>&nbsp;&nbsp;&nbsp; Enterprise and Service Provider VPNs - 8.1.4 186 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - VPN Technology - 8.1.5 187 <br>Types of VPNs - 8.2 187 <br>&nbsp;&nbsp;&nbsp; Remote-Access VPNs - 8.2.1 187 <br>&nbsp;&nbsp;&nbsp; SSL VPNs - 8.2.2 187 <br>&nbsp;&nbsp;&nbsp; Site-to-Site IPsec VPNs - 8.2.3 188 <br>&nbsp;&nbsp;&nbsp; GRE over IPsec - 8.2.4 188 <br>&nbsp;&nbsp;&nbsp; Dynamic Multipoint VPNs - 8.2.5 189 <br>&nbsp;&nbsp;&nbsp; IPsec Virtual Tunnel Interface - 8.2.6 189 <br>&nbsp;&nbsp;&nbsp; Service Provider MPLS VPNs - 8.2.7 190 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Types of VPNs - 8.2.8 190 <br>IPsec - 8.3 190 <br>&nbsp;&nbsp;&nbsp; Video - IPsec Concepts - 8.3.1 190 <br>&nbsp;&nbsp;&nbsp; IPsec Technologies - 8.3.2 190 <br>&nbsp;&nbsp;&nbsp; IPsec Protocol Encapsulation - 8.3.3 191 <br>&nbsp;&nbsp;&nbsp; Confidentiality - 8.3.4 192 <br>&nbsp;&nbsp;&nbsp; Integrity - 8.3.5 192 <br>&nbsp;&nbsp;&nbsp; Authentication - 8.3.6 192 <br>&nbsp;&nbsp;&nbsp; Secure Key Exchange with Diffie-Hellman - 8.3.7 193 <br>&nbsp;&nbsp;&nbsp; Video - IPsec Transport and Tunnel Mode - 8.3.8 193 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - IPsec - 8.3.9 193 <br>Module Practice and Quiz - 8.4 193 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 8.4.1 193 <br>Chapter Quiz - VPN and IPsec Concepts 195 <br>Your Chapter Notes 195 <br> Chapter 9 QoS Concepts 197 <br>Introduction - 9.0 197 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 9.0.1 197 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 9.0.2 197 <br>Network Transmission Quality - 9.1 197 <br>&nbsp;&nbsp;&nbsp; Video Tutorial - The Purpose of QoS - 9.1.1 197 <br>&nbsp;&nbsp;&nbsp; Prioritizing Traffic - 9.1.2 197 <br>&nbsp;&nbsp;&nbsp; Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198 <br>&nbsp;&nbsp;&nbsp; Packet Loss - 9.1.4 199 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Network Transmission Quality - 9.1.5 199 <br>Traffic Characteristics - 9.2 199 <br>&nbsp;&nbsp;&nbsp; Video Tutorial - Traffic Characteristics - 9.2.1 199 <br>&nbsp;&nbsp;&nbsp; Network Traffic Trends - 9.2.2 199 <br>&nbsp;&nbsp;&nbsp; Voice - 9.2.3 200 <br>&nbsp;&nbsp;&nbsp; Video - 9.2.4 200 <br>&nbsp;&nbsp;&nbsp; Data - 9.2.5 201 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Traffic Characteristics - 9.2.6 202 <br>Queuing Algorithms - 9.3 202 <br>&nbsp;&nbsp;&nbsp; Video Tutorial - QoS Algorithms - 9.3.1 202 <br>&nbsp;&nbsp;&nbsp; Queuing Overview - 9.3.2 202 <br>&nbsp;&nbsp;&nbsp; First In First Out - 9.3.3 202 <br>&nbsp;&nbsp;&nbsp; Weighted Fair Queuing (WFQ) - 9.3.4 203 <br>&nbsp;&nbsp;&nbsp; Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203 <br>&nbsp;&nbsp;&nbsp; Low Latency Queuing (LLQ) - 9.3.6 204 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Queuing Algorithms - 9.3.7 204 <br>QoS Models - 9.4 204 <br>&nbsp;&nbsp;&nbsp; Video Tutorial - QoS Models - 9.4.1 204 <br>&nbsp;&nbsp;&nbsp; Selecting an Appropriate QoS Policy Model - 9.4.2 204 <br>&nbsp;&nbsp;&nbsp; Best Effort - 9.4.3 205 <br>&nbsp;&nbsp;&nbsp; Integrated Services - 9.4.4 206 <br>&nbsp;&nbsp;&nbsp; Differentiated Services - 9.4.5 206 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - QoS Models - 9.4.6 208 <br>QoS Implementation Techniques - 9.5 208 <br>&nbsp;&nbsp;&nbsp; Video Tutorial - QoS Implementation Techniques - 9.5.1 208 <br>&nbsp;&nbsp;&nbsp; Avoiding Packet Loss - 9.5.2 208 <br>&nbsp;&nbsp;&nbsp; QoS Tools - 9.5.3 208 <br>&nbsp;&nbsp;&nbsp; Classification and Marking - 9.5.4 209 <br>&nbsp;&nbsp;&nbsp; Marking at Layer 2 - 9.5.5 210 <br>&nbsp;&nbsp;&nbsp; Marking at Layer 3 - 9.5.6 210 <br>&nbsp;&nbsp;&nbsp; Type of Service and Traffic Class Field - 9.5.7 211 <br>&nbsp;&nbsp;&nbsp; DSCP Values - 9.5.8 211 <br>&nbsp;&nbsp;&nbsp; Class Selector Bits - 9.5.9 211 <br>&nbsp;&nbsp;&nbsp; Trust Boundaries - 9.5.10 211 <br>&nbsp;&nbsp;&nbsp; Congestion Avoidance - 9.5.11 212 <br>&nbsp;&nbsp;&nbsp; Shaping and Policing - 9.5.12 212 <br>&nbsp;&nbsp;&nbsp; QoS Policy Guidelines - 9.5.13 213 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 <br>Module Practice and Quiz - 9.6 213 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 9.6.1 213 <br>Chapter Quiz - QoS Concepts 216 <br>Your Chapter Notes 216 <br> Chapter 10 Network Management 217 <br>Introduction - 10.0 217 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 10.0.1 217 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 10.0.2 217 <br>Device Discovery with CDP - 10.1 217 <br>&nbsp;&nbsp;&nbsp; CDP Overview - 10.1.1 217 <br>&nbsp;&nbsp;&nbsp; Configure and Verify CDP - 10.1.2 218 <br>&nbsp;&nbsp;&nbsp; Discover Devices by Using CDP - 10.1.3 220 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure and Verify CDP - 10.1.4 222 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Use CDP to Map a Network - 10.1.5 222 <br>Device Discovery with LLDP - 10.2 222 <br>&nbsp;&nbsp;&nbsp; LLDP Overview - 10.2.1 222 <br>&nbsp;&nbsp;&nbsp; Configure and Verify LLDP - 10.2.2 222 <br>&nbsp;&nbsp;&nbsp; Discover Devices by Using LLDP - 10.2.3 223 <br>&nbsp;&nbsp;&nbsp; Syntax Checker - Configure and Verify LLDP - 10.2.4 225 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Compare CDP and LLDP - 10.2.5 225 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 <br>NTP - 10.3 225 <br>&nbsp;&nbsp;&nbsp; Time and Calendar Services - 10.3.1 225 <br>&nbsp;&nbsp;&nbsp; NTP Operation - 10.3.2 226 <br>&nbsp;&nbsp;&nbsp; Configure and Verify NTP - 10.3.3 227 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure and Verify NTP - 10.3.4 229 <br>SNMP - 10.4 229 <br>&nbsp;&nbsp;&nbsp; Introduction to SNMP - 10.4.1 229 <br>&nbsp;&nbsp;&nbsp; SNMP Operation - 10.4.2 230 <br>&nbsp;&nbsp;&nbsp; SNMP Agent Traps - 10.4.3 230 <br>&nbsp;&nbsp;&nbsp; SNMP Versions - 10.4.4 231 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - SNMP Versions - 10.4.5 232 <br>&nbsp;&nbsp;&nbsp; Community Strings - 10.4.6 232 <br>&nbsp;&nbsp;&nbsp; MIB Object ID - 10.4.7 233 <br>&nbsp;&nbsp;&nbsp; SNMP Polling Scenario - 10.4.8 233 <br>&nbsp;&nbsp;&nbsp; SNMP Object Navigator - 10.4.9 233 <br>&nbsp;&nbsp;&nbsp; Lab - Research Network Monitoring Software - 10.4.10 234 <br>Syslog - 10.5 234 <br>&nbsp;&nbsp;&nbsp; Introduction to Syslog - 10.5.1 234 <br>&nbsp;&nbsp;&nbsp; Syslog Operation - 10.5.2 234 <br>&nbsp;&nbsp;&nbsp; Syslog Message Format - 10.5.3 235 <br>&nbsp;&nbsp;&nbsp; Syslog Facilities - 10.5.4 236 <br>&nbsp;&nbsp;&nbsp; Configure Syslog Timestamp - 10.5.5 236 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Syslog Operation - 10.5.6 237 <br>Router and Switch File Maintenance - 10.6 237 <br>&nbsp;&nbsp;&nbsp; Router File Systems - 10.6.1 237 <br>&nbsp;&nbsp;&nbsp; Switch File Systems - 10.6.2 240 <br>&nbsp;&nbsp;&nbsp; Use a Text File to Back Up a Configuration - 10.6.3 241 <br>&nbsp;&nbsp;&nbsp; Use a Text File to Restore a Configuration - 10.6.4 241 <br>&nbsp;&nbsp;&nbsp; Use TFTP to Back Up and Restore a Configuration - 10.6.5 242 <br>&nbsp;&nbsp;&nbsp; USB Ports on a Cisco Router - 10.6.6 242 <br>&nbsp;&nbsp;&nbsp; Use USB to Back Up and Restore a Configuration - 10.6.7 243 <br>&nbsp;&nbsp;&nbsp; Password Recovery Procedures - 10.6.8 245 <br>&nbsp;&nbsp;&nbsp; Password Recovery Example - 10.6.9 245 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Back Up Configuration Files - 10.6.10 247 <br>&nbsp;&nbsp;&nbsp; Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248 <br>&nbsp;&nbsp;&nbsp; Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248 <br>&nbsp;&nbsp;&nbsp; Lab - Research Password Recovery Procedures - 10.6.13 248 <br>IOS Image Management - 10.7 248 <br>&nbsp;&nbsp;&nbsp; Video - Managing Cisco IOS Images - 10.7.1 248 <br>&nbsp;&nbsp;&nbsp; TFTP Servers as a Backup Location - 10.7.2 248 <br>&nbsp;&nbsp;&nbsp; Backup IOS Image to TFTP Server Example - 10.7.3 249 <br>&nbsp;&nbsp;&nbsp; Copy an IOS Image to a Device Example - 10.7.4 250 <br>&nbsp;&nbsp;&nbsp; The boot system Command - 10.7.5 251 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 <br>Module Practice and Quiz - 10.8 253 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253 <br>&nbsp;&nbsp;&nbsp; Lab - Configure CDP, LLDP, and NTP - 10.8.2 253 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 10.8.3 253 <br>Chapter Quiz - Network Management 257 <br>Your Chapter Notes 257 <br> Chapter 11 Network Design 259 <br>Introduction - 11.0 259 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 11.0.1 259 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 11.0.2 259 <br>Hierarchical Networks - 11.1 259 <br>&nbsp;&nbsp;&nbsp; Video - Three-Layer Network Design - 11.1.1 259 <br>&nbsp;&nbsp;&nbsp; The Need to Scale the Network - 11.1.2 259 <br>&nbsp;&nbsp;&nbsp; Borderless Switched Networks - 11.1.3 260 <br>&nbsp;&nbsp;&nbsp; Hierarchy in the Borderless Switched Network - 11.1.4 261 <br>&nbsp;&nbsp;&nbsp; Access, Distribution, and Core Layer Functions - 11.1.5 262 <br>&nbsp;&nbsp;&nbsp; Three-Tier and Two-Tier Examples - 11.1.6 262 <br>&nbsp;&nbsp;&nbsp; Role of Switched Networks - 11.1.7 263 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Hierarchical Networks - 11.1.8 263 <br>Scalable Networks - 11.2 263 <br>&nbsp;&nbsp;&nbsp; Design for Scalability - 11.2.1 263 <br>&nbsp;&nbsp;&nbsp; Plan for Redundancy - 11.2.2 264 <br>&nbsp;&nbsp;&nbsp; Reduce Failure Domain Size - 11.2.3 265 <br>&nbsp;&nbsp;&nbsp; Increase Bandwidth - 11.2.4 265 <br>&nbsp;&nbsp;&nbsp; Expand the Access Layer - 11.2.5 266 <br>&nbsp;&nbsp;&nbsp; Tune Routing Protocols - 11.2.6 266 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Scalable Networks - 11.2.7 266 <br>Switch Hardware - 11.3 266 <br>&nbsp;&nbsp;&nbsp; Switch Platforms - 11.3.1 266 <br>&nbsp;&nbsp;&nbsp; Switch Form Factors - 11.3.2 267 <br>&nbsp;&nbsp;&nbsp; Port Density - 11.3.3 268 <br>&nbsp;&nbsp;&nbsp; Forwarding Rates - 11.3.4 268 <br>&nbsp;&nbsp;&nbsp; Power over Ethernet - 11.3.5 269 <br>&nbsp;&nbsp;&nbsp; Multilayer Switching - 11.3.6 269 <br>&nbsp;&nbsp;&nbsp; Business Considerations for Switch Selection - 11.3.7 270 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Switch Hardware - 11.3.8 270 <br>Router Hardware - 11.4 270 <br>&nbsp;&nbsp;&nbsp; Router Requirements - 11.4.1 270 <br>&nbsp;&nbsp;&nbsp; Cisco Routers - 11.4.2 271 <br>&nbsp;&nbsp;&nbsp; Router Form Factors - 11.4.3 271 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Router Hardware - 11.4.4 272 <br>Module Practice and Quiz - 11.5 272 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 11.5.2 273 <br>Chapter Quiz - Network Design 275 <br>Your Chapter Notes 275 <br> Chapter 12 Network Troubleshooting 277 <br>Introduction - 12.0 277 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 12.0.1 277 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 12.0.2 277 <br>Network Documentation - 12.1 277 <br>&nbsp;&nbsp;&nbsp; Documentation Overview - 12.1.1 277 <br>&nbsp;&nbsp;&nbsp; Network Topology Diagrams - 12.1.2 278 <br>&nbsp;&nbsp;&nbsp; Network Device Documentation - 12.1.3 279 <br>&nbsp;&nbsp;&nbsp; Establish a Network Baseline - 12.1.4 279 <br>&nbsp;&nbsp;&nbsp; Step 1 - Determine What Types of Data to Collect - 12.1.5 280 <br>&nbsp;&nbsp;&nbsp; Step 2 - Identify Devices and Ports of Interest - 12.1.6 280 <br>&nbsp;&nbsp;&nbsp; Step 3 - Determine the Baseline Duration - 12.1.7 280 <br>&nbsp;&nbsp;&nbsp; Data Measurement - 12.1.8 281 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Network Documentation - 12.1.9 282 <br>Troubleshooting Process - 12.2 282 <br>&nbsp;&nbsp;&nbsp; General Troubleshooting Procedures - 12.2.1 282 <br>&nbsp;&nbsp;&nbsp; Seven-Step Troubleshooting Process - 12.2.2 282 <br>&nbsp;&nbsp;&nbsp; Question End Users - 12.2.3 284 <br>&nbsp;&nbsp;&nbsp; Gather Information - 12.2.4 285 <br>&nbsp;&nbsp;&nbsp; Troubleshooting with Layered Models - 12.2.5 286 <br>&nbsp;&nbsp;&nbsp; Structured Troubleshooting Methods - 12.2.6 286 <br>&nbsp;&nbsp;&nbsp; Guidelines for Selecting a Troubleshooting Method - 12.2.7 288 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Troubleshooting Process - 12.2.8 288 <br>Troubleshooting Tools - 12.3 288 <br>&nbsp;&nbsp;&nbsp; Software Troubleshooting Tools - 12.3.1 288 <br>&nbsp;&nbsp;&nbsp; Protocol Analyzers - 12.3.2 289 <br>&nbsp;&nbsp;&nbsp; Hardware Troubleshooting Tools - 12.3.3 289 <br>&nbsp;&nbsp;&nbsp; Syslog Server as a Troubleshooting Tool - 12.3.4 290 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Troubleshooting Tools - 12.3.5 292 <br>Symptoms and Causes of Network Problems - 12.4 292 <br>&nbsp;&nbsp;&nbsp; Physical Layer Troubleshooting - 12.4.1 292 <br>&nbsp;&nbsp;&nbsp; Data Link Layer Troubleshooting - 12.4.2 294 <br>&nbsp;&nbsp;&nbsp; Network Layer Troubleshooting - 12.4.3 295 <br>&nbsp;&nbsp;&nbsp; Transport Layer Troubleshooting - ACLs - 12.4.4 297 <br>&nbsp;&nbsp;&nbsp; Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298 <br>&nbsp;&nbsp;&nbsp; Application Layer Troubleshooting - 12.4.6 299 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 <br>Troubleshooting IP Connectivity - 12.5 300 <br>&nbsp;&nbsp;&nbsp; Components of Troubleshooting End-to-End Connectivity - 12.5.1 300 <br>&nbsp;&nbsp;&nbsp; End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301 <br>&nbsp;&nbsp;&nbsp; Step 1 - Verify the Physical Layer - 12.5.3 303 <br>&nbsp;&nbsp;&nbsp; Step 2 - Check for Duplex Mismatches - 12.5.4 304 <br>&nbsp;&nbsp;&nbsp; Step 3 - Verify Addressing on the Local Network - 12.5.5 306 <br>&nbsp;&nbsp;&nbsp; Step 4 - Verify Default Gateway - 12.5.7 310 <br>&nbsp;&nbsp;&nbsp; Troubleshoot IPv6 Default Gateway Example - 12.5.8 311 <br>&nbsp;&nbsp;&nbsp; Step 5 - Verify Correct Path - 12.5.9 314 <br>&nbsp;&nbsp;&nbsp; Step 6 - Verify the Transport Layer - 12.5.10 315 <br>&nbsp;&nbsp;&nbsp; Step 7 - Verify ACLs - 12.5.11 317 <br>&nbsp;&nbsp;&nbsp; Step 8 - Verify DNS - 12.5.12 318 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 <br>Module Practice and Quiz - 12.6 319 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319 <br>&nbsp;&nbsp;&nbsp; Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 12.6.3 320 <br>Chapter Quiz - Network Troubleshooting 324 <br>Your Chapter Notes 324 <br> Chapter 13 Network Virtualization 325 <br>Introduction - 13.0 325 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 13.0.1 325 <br>&nbsp;&nbsp;&nbsp; What will I learn to do in this module? - 13.0.2 325 <br>Cloud Computing - 13.1 325 <br>&nbsp;&nbsp;&nbsp; Video - Cloud and Virtualization - 13.1.1 325 <br>&nbsp;&nbsp;&nbsp; Cloud Overview - 13.1.2 325 <br>&nbsp;&nbsp;&nbsp; Cloud Services - 13.1.3 326 <br>&nbsp;&nbsp;&nbsp; Cloud Models - 13.1.4 326 <br>&nbsp;&nbsp;&nbsp; Cloud Computing versus Data Center - 13.1.5 327 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Cloud Computing - 13.1.6 327 <br>Virtualization - 13.2 327 <br>&nbsp;&nbsp;&nbsp; Cloud Computing and Virtualization - 13.2.1 327 <br>&nbsp;&nbsp;&nbsp; Dedicated Servers - 13.2.2 328 <br>&nbsp;&nbsp;&nbsp; Server Virtualization - 13.2.3 328 <br>&nbsp;&nbsp;&nbsp; Advantages of Virtualization - 13.2.4 328 <br>&nbsp;&nbsp;&nbsp; Abstraction Layers - 13.2.5 329 <br>&nbsp;&nbsp;&nbsp; Type 2 Hypervisors - 13.2.6 330 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Virtualization - 13.2.7 330 <br>Virtual Network Infrastructure - 13.3 330 <br>&nbsp;&nbsp;&nbsp; Type 1 Hypervisors - 13.3.1 330 <br>&nbsp;&nbsp;&nbsp; Installing a VM on a Hypervisor - 13.3.2 330 <br>&nbsp;&nbsp;&nbsp; The Complexity of Network Virtualization - 13.3.3 331 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 <br>Software-Defined Networking - 13.4 332 <br>&nbsp;&nbsp;&nbsp; Video - Software-Defined Networking - 13.4.1 332 <br>&nbsp;&nbsp;&nbsp; Control Plane and Data Plane - 13.4.2 332 <br>&nbsp;&nbsp;&nbsp; Network Virtualization Technologies - 13.4.3 333 <br>&nbsp;&nbsp;&nbsp; Traditional and SDN Architectures - 13.4.4 334 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Software-Defined Networking - 13.4.5 334 <br>Controllers - 13.5 334 <br>&nbsp;&nbsp;&nbsp; SDN Controller and Operations - 13.5.1 334 <br>&nbsp;&nbsp;&nbsp; Video - Cisco ACI - 13.5.2 335 <br>&nbsp;&nbsp;&nbsp; Core Components of ACI - 13.5.3 335 <br>&nbsp;&nbsp;&nbsp; Spine-Leaf Topology - 13.5.4 335 <br>&nbsp;&nbsp;&nbsp; SDN Types - 13.5.5 336 <br>&nbsp;&nbsp;&nbsp; APIC-EM Features - 13.5.6 336 <br>&nbsp;&nbsp;&nbsp; APIC-EM Path Trace - 13.5.7 336 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Controllers - 13.5.8 337 <br>Module Practice and Quiz - 13.6 337 <br>&nbsp;&nbsp;&nbsp; Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 13.6.2 337 <br>Chapter Quiz - Network Virtualization 341 <br>Your Chapter Notes 341 <br> Chapter 14 Network Automation 343 <br>Introduction - 14.0 343 <br>&nbsp;&nbsp;&nbsp; Why should I take this module? - 14.0.1 343 <br>&nbsp;&nbsp;&nbsp; What will I learn in this module? - 14.0.2 343 <br>Automation Overview - 14.1 343 <br>&nbsp;&nbsp;&nbsp; Video - Automation Everywhere - 14.1.1 343 <br>&nbsp;&nbsp;&nbsp; The Increase in Automation - 14.1.2 344 <br>&nbsp;&nbsp;&nbsp; Thinking Devices - 14.1.3 344 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Benefits of Automation - 14.1.4 344 <br>Data Formats - 14.2 344 <br>&nbsp;&nbsp;&nbsp; Video - Data Formats - 14.2.1 344 <br>&nbsp;&nbsp;&nbsp; The Data Formats Concept - 14.2.2 345 <br>&nbsp;&nbsp;&nbsp; Data Format Rules - 14.2.3 345 <br>&nbsp;&nbsp;&nbsp; Compare Data Formats - 14.2.4 346 <br>&nbsp;&nbsp;&nbsp; JSON Data Format - 14.2.5 347 <br>&nbsp;&nbsp;&nbsp; JSON Syntax Rules - 14.2.6 348 <br>&nbsp;&nbsp;&nbsp; YAML Data Format - 14.2.7 349 <br>&nbsp;&nbsp;&nbsp; XML Data Format - 14.2.8 350 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Data Formats - 14.2.9 351 <br>APIs - 14.3 351 <br>&nbsp;&nbsp;&nbsp; Video - APIs - 14.3.1 351 <br>&nbsp;&nbsp;&nbsp; The API Concept - 14.3.2 352 <br>&nbsp;&nbsp;&nbsp; An API Example - 14.3.3 352 <br>&nbsp;&nbsp;&nbsp; Open, Internal, and Partner APIs - 14.3.4 352 <br>&nbsp;&nbsp;&nbsp; Types of Web Service APIs - 14.3.5 353 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - APIs - 14.3.6 354 <br>REST - 14.4 354 <br>&nbsp;&nbsp;&nbsp; Video - REST - 14.4.1 354 <br>&nbsp;&nbsp;&nbsp; REST and RESTful API - 14.4.2 354 <br>&nbsp;&nbsp;&nbsp; RESTful Implementation - 14.4.3 354 <br>&nbsp;&nbsp;&nbsp; URI, URN, and URL - 14.4.4 355 <br>&nbsp;&nbsp;&nbsp; Anatomy of a RESTful Request - 14.4.5 355 <br>&nbsp;&nbsp;&nbsp; RESTful API Applications - 14.4.6 356 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - REST - 14.4.7 357 <br>Configuration Management Tools - 14.5 357 <br>&nbsp;&nbsp;&nbsp; Video - Configuration Management Tools - 14.5.1 357 <br>&nbsp;&nbsp;&nbsp; Traditional Network Configuration - 14.5.2 358 <br>&nbsp;&nbsp;&nbsp; Network Automation - 14.5.3 358 <br>&nbsp;&nbsp;&nbsp; Configuration Management Tools - 14.5.4 358 <br>&nbsp;&nbsp;&nbsp; Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - Configuration Management - 14.5.6 360 <br>IBN and Cisco DNA Center - 14.6 360 <br>&nbsp;&nbsp;&nbsp; Video - Intent-Based Networking - 14.6.1 360 <br>&nbsp;&nbsp;&nbsp; Intent-Based Networking Overview - 14.6.2 360 <br>&nbsp;&nbsp;&nbsp; Network Infrastructure as Fabric - 14.6.3 360 <br>&nbsp;&nbsp;&nbsp; Cisco Digital Network Architecture (DNA) - 14.6.4 361 <br>&nbsp;&nbsp;&nbsp; Cisco DNA Center - 14.6.5 362 <br>&nbsp;&nbsp;&nbsp; Video - DNA Center Overview and Platform APIs - 14.6.6 362 <br>&nbsp;&nbsp;&nbsp; Video - DNA Center Design and Provision - 14.6.7 363 <br>&nbsp;&nbsp;&nbsp; Video - DNA Center Policy and Assurance - 14.6.8 363 <br>&nbsp;&nbsp;&nbsp; Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363 <br>&nbsp;&nbsp;&nbsp; Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 <br>Module Practice and Quiz - 14.7 363 <br>&nbsp;&nbsp;&nbsp; What did I learn in this module? - 14.7.1 363 <br>Chapter Quiz - Network Automation 365 <br>Your Chapter Notes 365 <br> <br> <br>9780136634737&nbsp;&nbsp; TOC&nbsp;&nbsp; 6/18/2020 <br> <br> <br>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)