Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)

E-book Engels 2021 9780136634294
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Enterprise Networking, Security, and Automation Companion Guide is the official supplemental textbook for the Enterprise Networking, Security, and Automation v7 course in the Cisco Networking Academy CCNA curriculum.

This course describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. You will implement the OSPF dynamic routing protocol, identify and protect against cybersecurity threats, configure access control lists (ACLs), implement Network Address Translation (NAT), and learn about WANs and IPsec VPNs. You will also learn about QoS mechanisms, network management tools, network virtualization, and network automation.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course:
* Chapter objectives:  Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms:  Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary:  Consult the comprehensive Glossary with more than 500 terms.
* Summary of Activities and Labs:  Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding:  Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

How To:  Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities:  Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
Videos:  Watch the videos embedded within the online course.
Packet Tracer Activities:  Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
Hands-on Labs:  Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide.

Specificaties

ISBN13:9780136634294
Taal:Engels
Bindwijze:e-book

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Introduction xxxi <br> Chapter 1 Single-Area OSPFv2 Concepts 1 <br>Objectives 1 <br>Key Terms 1 <br>Introduction (1.0) 3 <br>OSPF Features and Characteristics (1.1) 3 <br>&nbsp;&nbsp;&nbsp; Introduction to OSPF (1.1.1) 3 <br>&nbsp;&nbsp;&nbsp; Components of OSPF (1.1.2) 4 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Routing Protocol Messages 4 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data Structures 4 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Algorithm 5 <br>&nbsp;&nbsp;&nbsp; Link-State Operation (1.1.3) 6 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Establish Neighbor Adjacencies 6 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. Exchange Link-State Advertisements 6 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Build the Link-State Database 7 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4. Execute the SPF Algorithm 8 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5. Choose the Best Route 8 <br>&nbsp;&nbsp;&nbsp; Single-Area and Multiarea OSPF (1.1.4) 9 <br>&nbsp;&nbsp;&nbsp; Multiarea OSPF (1.1.5) 10 <br>&nbsp;&nbsp;&nbsp; OSPFv3 (1.1.6) 12 <br>OSPF Packets (1.2) 13 <br>&nbsp;&nbsp;&nbsp; Types of OSPF Packets (1.2.2) 13 <br>&nbsp;&nbsp;&nbsp; Link-State Updates (1.2.3) 14 <br>&nbsp;&nbsp;&nbsp; Hello Packet (1.2.4) 15 <br>OSPF Operation (1.3) 17 <br>&nbsp;&nbsp;&nbsp; OSPF Operational States (1.3.2) 17 <br>&nbsp;&nbsp;&nbsp; Establish Neighbor Adjacencies (1.3.3) 18 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Down State to Init State 18 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. The Init State 19 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Two-Way State 19 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4. Elect the DR and BDR 20 <br>&nbsp;&nbsp;&nbsp; Synchronizing OSPF Databases (1.3.4) 20 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Decide First Router 21 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. Exchange DBDs 21 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Send an LSR 22 <br>&nbsp;&nbsp;&nbsp; The Need for a DR (1.3.5) 23 <br>&nbsp;&nbsp;&nbsp; LSA Flooding with a DR (1.3.6) 24 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Flooding LSAs 24 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LSAs and DR 25 <br>Summary (1.4) 27 <br>&nbsp;&nbsp;&nbsp; OSPF Features and Characteristics 27 <br>&nbsp;&nbsp;&nbsp; OSPF Packets 28 <br>&nbsp;&nbsp;&nbsp; OSPF Operation 28 <br>Practice 29 <br>Check Your Understanding 29 <br> Chapter 2 Single-Area OSPFv2 Configuration 33 <br>Objectives 33 <br>Key Terms 33 <br>Introduction (2.0) 34 <br>OSPF Router ID (2.1) 34 <br>&nbsp;&nbsp;&nbsp; OSPF Reference Topology (2.1.1) 34 <br>&nbsp;&nbsp;&nbsp; Router Configuration Mode for OSPF (2.1.2) 35 <br>&nbsp;&nbsp;&nbsp; Router IDs (2.1.3) 36 <br>&nbsp;&nbsp;&nbsp; Router ID Order of Precedence (2.1.4) 36 <br>&nbsp;&nbsp;&nbsp; Configure a Loopback Interface as the Router ID (2.1.5) 37 <br>&nbsp;&nbsp;&nbsp; Explicitly Configure a Router ID (2.1.6) 38 <br>&nbsp;&nbsp;&nbsp; Modify a Router ID (2.1.7) 39 <br>Point-to-Point OSPF Networks (2.2) 40 <br>&nbsp;&nbsp;&nbsp; The network Command Syntax (2.2.1) 40 <br>&nbsp;&nbsp;&nbsp; The Wildcard Mask (2.2.2) 41 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Using the network Command (2.2.4) 41 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Using the ip ospf Command (2.2.6) 43 <br>&nbsp;&nbsp;&nbsp; Passive Interface (2.2.8) 44 <br>&nbsp;&nbsp;&nbsp; Configure Passive Interfaces (2.2.9) 45 <br>&nbsp;&nbsp;&nbsp; OSPF Point-to-Point Networks (2.2.11) 46 <br>&nbsp;&nbsp;&nbsp; Loopbacks and Point-to-Point Networks (2.2.12) 48 <br>Multiaccess OSPF Networks (2.3) 49 <br>&nbsp;&nbsp;&nbsp; OSPF Network Types (2.3.1) 49 <br>&nbsp;&nbsp;&nbsp; OSPF Designated Router (2.3.2) 49 <br>&nbsp;&nbsp;&nbsp; OSPF Multiaccess Reference Topology (2.3.3) 51 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Router Roles (2.3.4) 52 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R1 DROTHER 52 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R2 BDR 53 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R3 DR 53 <br>&nbsp;&nbsp;&nbsp; Verify DR/BDR Adjacencies (2.3.5) 54 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R1 Adjacencies 55 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R2 Adjacencies 55 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R3 Adjacencies 56 <br>&nbsp;&nbsp;&nbsp; Default DR/BDR Election Process (2.3.6) 56 <br>&nbsp;&nbsp;&nbsp; DR Failure and Recovery (2.3.7) 58 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R3 Fails 58 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R3 Rejoins Network 59 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R4 Joins Network 59 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R2 Fails 59 <br>&nbsp;&nbsp;&nbsp; The ip ospf priority Command (2.3.8) 61 <br>&nbsp;&nbsp;&nbsp; Configure OSPF Priority (2.3.9) 61 <br>Modify Single-Area OSPFv2 (2.4) 63 <br>&nbsp;&nbsp;&nbsp; Cisco OSPF Cost Metric (2.4.1) 63 <br>&nbsp;&nbsp;&nbsp; Adjust the Reference Bandwidth (2.4.2) 64 <br>&nbsp;&nbsp;&nbsp; OSPF Accumulates Costs (2.4.3) 66 <br>&nbsp;&nbsp;&nbsp; Manually Set OSPF Cost Value (2.4.4) 67 <br>&nbsp;&nbsp;&nbsp; Test Failover to Backup Route (2.4.5) 69 <br>&nbsp;&nbsp;&nbsp; Hello Packet Intervals (2.4.7) 69 <br>&nbsp;&nbsp;&nbsp; Verify Hello and Dead Intervals (2.4.8) 70 <br>&nbsp;&nbsp;&nbsp; Modify OSPFv2 Intervals (2.4.9) 71 <br>Default Route Propagation (2.5) 73 <br>&nbsp;&nbsp;&nbsp; Propagate a Default Static Route in OSPFv2 (2.5.1) 74 <br>&nbsp;&nbsp;&nbsp; Verify the Propagated Default Route (2.5.2) 75 <br>Verify Single-Area OSPFv2 (2.6) 77 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Neighbors (2.6.1) 77 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Protocol Settings (2.6.2) 79 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Process Information (2.6.3) 80 <br>&nbsp;&nbsp;&nbsp; Verify OSPF Interface Settings (2.6.4) 81 <br>Summary (2.7) 83 <br>&nbsp;&nbsp;&nbsp; OSPF Router ID 83 <br>&nbsp;&nbsp;&nbsp; Point-to-Point OSPF Networks 83 <br>&nbsp;&nbsp;&nbsp; OSPF Network Types 84 <br>&nbsp;&nbsp;&nbsp; Modify Single-Area OSPFv2 85 <br>&nbsp;&nbsp;&nbsp; Default Route Propagation 86 <br>&nbsp;&nbsp;&nbsp; Verify Single-Area OSPFv2 86 <br>Practice 87 <br>Check Your Understanding 88 <br> Chapter 3 Network Security Concepts 93 <br>Objectives 93 <br>Key Terms 93 <br>Introduction 95 <br>&nbsp;&nbsp;&nbsp; Ethical Hacking Statement (3.0.3) 95 <br>Current State of Cybersecurity (3.1) 95 <br>&nbsp;&nbsp;&nbsp; Current State of Affairs (3.1.1) 95 <br>&nbsp;&nbsp;&nbsp; Vectors of Network Attacks (3.1.2) 96 <br>&nbsp;&nbsp;&nbsp; Data Loss (3.1.3) 97 <br>Threat Actors (3.2) 98 <br>&nbsp;&nbsp;&nbsp; The Hacker (3.2.1) 98 <br>&nbsp;&nbsp;&nbsp; Evolution of Hackers (3.2.2) 99 <br>&nbsp;&nbsp;&nbsp; Cyber Criminals (3.2.3) 100 <br>&nbsp;&nbsp;&nbsp; Hacktivists (3.2.4) 100 <br>&nbsp;&nbsp;&nbsp; State-Sponsored Hackers (3.2.5) 100 <br>Threat Actor Tools (3.3) 101 <br>&nbsp;&nbsp;&nbsp; Introduction to Attack Tools (3.3.2) 101 <br>&nbsp;&nbsp;&nbsp; Evolution of Security Tools (3.3.3) 102 <br>&nbsp;&nbsp;&nbsp; Attack Types (3.3.4) 104 <br>Malware (3.4) 106 <br>&nbsp;&nbsp;&nbsp; Overview of Malware (3.4.1) 106 <br>&nbsp;&nbsp;&nbsp; Viruses and Trojan Horses (3.4.2) 106 <br>&nbsp;&nbsp;&nbsp; Other Types of Malware (3.4.3) 108 <br>Common Network Attacks (3.5) 109 <br>&nbsp;&nbsp;&nbsp; Overview of Network Attacks (3.5.1) 109 <br>&nbsp;&nbsp;&nbsp; Reconnaissance Attacks (3.5.3) 109 <br>&nbsp;&nbsp;&nbsp; Access Attacks (3.5.5) 110 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust Exploitation Example 111 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Port Redirection Example 112 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Man-in-the-Middle Attack Example 112 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Buffer Overflow Attack 112 <br>&nbsp;&nbsp;&nbsp; Social Engineering Attacks (3.5.6) 114 <br>&nbsp;&nbsp;&nbsp; DoS and DDoS Attacks (3.5.9) 115 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DoS Attack 116 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DDoS Attack 116 <br>IP Vulnerabilities and Threats (3.6) 117 <br>&nbsp;&nbsp;&nbsp; IPv4 and IPv6 (3.6.2) 118 <br>&nbsp;&nbsp;&nbsp; ICMP Attacks (3.6.3) 118 <br>&nbsp;&nbsp;&nbsp; Amplification and Reflection Attacks (3.6.5) 119 <br>&nbsp;&nbsp;&nbsp; Address Spoofing Attacks (3.6.6) 120 <br>TCP and UDP Vulnerabilities (3.7) 122 <br>&nbsp;&nbsp;&nbsp; TCP Segment Header (3.7.1) 122 <br>&nbsp;&nbsp;&nbsp; TCP Services (3.7.2) 123 <br>&nbsp;&nbsp;&nbsp; TCP Attacks (3.7.3) 124 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TCP SYN Flood Attack 124 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TCP Reset Attack 125 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TCP Session Hijacking 126 <br>&nbsp;&nbsp;&nbsp; UDP Segment Header and Operation (3.7.4) 126 <br>&nbsp;&nbsp;&nbsp; UDP Attacks (3.7.5) 127 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; UDP Flood Attacks 127 <br>IP Services 127 <br>&nbsp;&nbsp;&nbsp; ARP Vulnerabilities (3.8.1) 127 <br>&nbsp;&nbsp;&nbsp; ARP Cache Poisoning (3.8.2) 128 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ARP Request 128 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ARP Reply 129 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Spoofed Gratuitous ARP Replies 130 <br>&nbsp;&nbsp;&nbsp; DNS Attacks (3.8.4) 131 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNS Open Resolver Attacks 131 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNS Stealth Attacks 132 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DNS Domain Shadowing Attacks 132 <br>&nbsp;&nbsp;&nbsp; DNS Tunneling (3.8.5) 132 <br>&nbsp;&nbsp;&nbsp; DHCP (3.8.6) 133 <br>&nbsp;&nbsp;&nbsp; DHCP Attacks (3.8.7) 134 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1. Client Broadcasts DHCP Discovery Messages 134 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2. DHCP Servers Respond with Offers 134 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 3. Client Accepts Rogue DHCP Request 136 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 4. Rogue DHCP Acknowledges the Request 136 <br>Network Security Best Practices (3.9) 137 <br>&nbsp;&nbsp;&nbsp; Confidentiality, Integrity, and Availability (3.9.1) 137 <br>&nbsp;&nbsp;&nbsp; The Defense-in-Depth Approach (3.9.2) 138 <br>&nbsp;&nbsp;&nbsp; Firewalls (3.9.3) 139 <br>&nbsp;&nbsp;&nbsp; IPS (3.9.4) 140 <br>&nbsp;&nbsp;&nbsp; Content Security Appliances (3.9.5) 141 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Email Security Appliance (ESA) 142 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Web Security Appliance (WSA) 142 <br>Cryptography (3.10) 143 <br>&nbsp;&nbsp;&nbsp; Securing Communications (3.10.2) 143 <br>&nbsp;&nbsp;&nbsp; Data Integrity (3.10.3) 144 <br>&nbsp;&nbsp;&nbsp; Hash Functions (3.10.4) 145 <br>&nbsp;&nbsp;&nbsp; MD5 with 128-Bit Digest 145 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SHA Hashing Algorithm 146 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SHA-2 146 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SHA-3 146 <br>&nbsp;&nbsp;&nbsp; Origin Authentication (3.10.5) 147 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; HMAC Hashing Algorithm 147 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Creating the HMAC Value 148 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verifying the HMAC Value 149 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Router HMAC Example 149 <br>&nbsp;&nbsp;&nbsp; Data Confidentiality (3.10.6) 150 <br>&nbsp;&nbsp;&nbsp; Symmetric Encryption (3.10.7) 151 <br>&nbsp;&nbsp;&nbsp; Asymmetric Encryption (3.10.8) 152 <br>&nbsp;&nbsp;&nbsp; Diffie-Hellman (3.10.9) 155 <br>Summary (3.11) 157 <br>&nbsp;&nbsp;&nbsp; Current State of Cybersecurity 157 <br>&nbsp;&nbsp;&nbsp; Threat Actors 157 <br>&nbsp;&nbsp;&nbsp; Threat Actor Tools 157 <br>&nbsp;&nbsp;&nbsp; Malware 157 <br>&nbsp;&nbsp;&nbsp; Common Network Attacks 158 <br>&nbsp;&nbsp;&nbsp; IP Vulnerabilities and Threats 158 <br>&nbsp;&nbsp;&nbsp; TCP and UDP Vulnerabilities 158 <br>&nbsp;&nbsp;&nbsp; IP Services 158 <br>&nbsp;&nbsp;&nbsp; Network Security Best Practices 159 <br>&nbsp;&nbsp;&nbsp; Cryptography 159 <br>Practice 159 <br>Check Your Understanding 160 <br> Chapter 4 ACL Concepts 163 <br>Objectives 163 <br>Key Terms 163 <br>Introduction (4.0) 164 <br>Purpose of ACLs (4.1) 164 <br>&nbsp;&nbsp;&nbsp; What Is an ACL? (4.1.1) 164 <br>&nbsp;&nbsp;&nbsp; Packet Filtering (4.1.2) 165 <br>&nbsp;&nbsp;&nbsp; ACL Operation (4.1.3) 166 <br>Wildcard Masks in ACLs (4.2) 168 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Overview (4.2.1) 168 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Types (4.2.2) 169 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wildcard to Match a Host 169 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wildcard Mask to Match an IPv4 Subnet 169 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wildcard Mask to Match an IPv4 Address Range 170 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Calculation (4.2.3) 170 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Example 1 171 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Example 2 171 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Example 3 171 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Example 4 172 <br>&nbsp;&nbsp;&nbsp; Wildcard Mask Keywords (4.2.4) 172 <br>Guidelines for ACL Creation (4.3) 173 <br>&nbsp;&nbsp;&nbsp; Limited Number of ACLs per Interface (4.3.1) 173 <br>&nbsp;&nbsp;&nbsp; ACL Best Practices (4.3.2) 174 <br>Types of IPv4 ACLs (4.4) 175 <br>&nbsp;&nbsp;&nbsp; Standard and Extended ACLs (4.4.1) 175 <br>&nbsp;&nbsp;&nbsp; Numbered and Named ACLs (4.4.2) 176 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Numbered ACLs 176 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Named ACLs 177 <br>&nbsp;&nbsp;&nbsp; Where to Place ACLs (4.4.3) 177 <br>&nbsp;&nbsp;&nbsp; Standard ACL Placement Example (4.4.4) 179 <br>&nbsp;&nbsp;&nbsp; Extended ACL Placement Example (4.4.5) 180 <br>Summary (4.5) 182 <br>&nbsp;&nbsp;&nbsp; Purpose of ACLs 182 <br>&nbsp;&nbsp;&nbsp; Wildcard Masks 182 <br>&nbsp;&nbsp;&nbsp; Guidelines for ACL Creation 183 <br>&nbsp;&nbsp;&nbsp; Types of IPv4 ACLs 183 <br>Practice 184 <br>Check Your Understanding Questions 184 <br> Chapter 5 ACLs for IPv4 Configuration 187 <br>Objectives 187 <br>Key Term 187 <br>Introduction (5.0) 188 <br>Configure Standard IPv4 ACLs (5.1) 188 <br>&nbsp;&nbsp;&nbsp; Create an ACL (5.1.1) 188 <br>&nbsp;&nbsp;&nbsp; Numbered Standard IPv4 ACL Syntax (5.1.2) 188 <br>&nbsp;&nbsp;&nbsp; Named Standard IPv4 ACL Syntax (5.1.3) 189 <br>&nbsp;&nbsp;&nbsp; Apply a Standard IPv4 ACL (5.1.4) 190 <br>&nbsp;&nbsp;&nbsp; Numbered Standard IPv4 ACL Example (5.1.5) 191 <br>&nbsp;&nbsp;&nbsp; Named Standard IPv4 ACL Example (5.1.6) 193 <br>Modify IPv4 ACLs (5.2) 195 <br>&nbsp;&nbsp;&nbsp; Two Methods to Modify an ACL (5.2.1) 196 <br>&nbsp;&nbsp;&nbsp; Text Editor Method (5.2.2) 196 <br>&nbsp;&nbsp;&nbsp; Sequence Numbers Method (5.2.3) 197 <br>&nbsp;&nbsp;&nbsp; Modify a Named ACL Example (5.2.4) 198 <br>&nbsp;&nbsp;&nbsp; ACL Statistics (5.2.5) 199 <br>Secure VTY Ports with a Standard IPv4 ACL (5.3) 200 <br>&nbsp;&nbsp;&nbsp; The access-class Command (5.3.1) 200 <br>&nbsp;&nbsp;&nbsp; Secure VTY Access Example (5.3.2) 200 <br>&nbsp;&nbsp;&nbsp; Verify the VTY Port Is Secured (5.3.3) 202 <br>Configure Extended IPv4 ACLs (5.4) 203 <br>&nbsp;&nbsp;&nbsp; Extended ACLs (5.4.1) 203 <br>&nbsp;&nbsp;&nbsp; Numbered Extended IPv4 ACL Syntax (5.4.2) 204 <br>&nbsp;&nbsp;&nbsp; Protocols and Ports (5.4.3) 206 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Protocol Options 206 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Port Keyword Options 207 <br>&nbsp;&nbsp;&nbsp; Protocols and Port Numbers Configuration Examples (5.4.4) 208 <br>&nbsp;&nbsp;&nbsp; Apply a Numbered Extended IPv4 ACL (5.4.5) 209 <br>&nbsp;&nbsp;&nbsp; TCP Established Extended ACL (5.4.6) 210 <br>&nbsp;&nbsp;&nbsp; Named Extended IPv4 ACL Syntax (5.4.7) 212 <br>&nbsp;&nbsp;&nbsp; Named Extended IPv4 ACL Example (5.4.8) 212 <br>&nbsp;&nbsp;&nbsp; Edit Extended ACLs (5.4.9) 213 <br>&nbsp;&nbsp;&nbsp; Another Named Extended IPv4 ACL Example (5.4.10) 214 <br>&nbsp;&nbsp;&nbsp; Verify Extended ACLs (5.4.11) 216 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; show ip interface 216 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; show access-lists 217 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; show running-config 218 <br>Summary (5.5) 219 <br>&nbsp;&nbsp;&nbsp; Configure Standard IPv4 ACLs 219 <br>&nbsp;&nbsp;&nbsp; Modify IPv4 ACLs 219 <br>&nbsp;&nbsp;&nbsp; Secure VTY Ports with a Standard IPv4 ACL 220 <br>&nbsp;&nbsp;&nbsp; Configure Extended IPv4 ACLs 220 <br>Practice 221 <br>Check Your Understanding Questions 222 <br> Chapter 6 NAT for IPv4 225 <br>Objectives 225 <br>Key Terms 225 <br>Introduction (6.0) 226 <br>NAT Characteristics (6.1) 226 <br>&nbsp;&nbsp;&nbsp; IPv4 Private Address Space (6.1.1) 226 <br>&nbsp;&nbsp;&nbsp; What Is NAT? (6.1.2) 227 <br>&nbsp;&nbsp;&nbsp; How NAT Works (6.1.3) 228 <br>&nbsp;&nbsp;&nbsp; NAT Terminology (6.1.4) 229 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Inside Local 230 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Inside Global 230 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Outside Global 231 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Outside Local 231 <br>Types of NAT (6.2) 231 <br>&nbsp;&nbsp;&nbsp; Static NAT (6.2.1) 231 <br>&nbsp;&nbsp;&nbsp; Dynamic NAT (6.2.2) 232 <br>&nbsp;&nbsp;&nbsp; Port Address Translation (6.2.3) 233 <br>&nbsp;&nbsp;&nbsp; Next Available Port (6.2.4) 235 <br>&nbsp;&nbsp;&nbsp; NAT and PAT Comparison (6.2.5) 236 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; NAT 236 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; PAT 237 <br>&nbsp;&nbsp;&nbsp; Packets Without a Layer 4 Segment (6.2.6) 237 <br>NAT Advantages and Disadvantages (6.3) 238 <br>&nbsp;&nbsp;&nbsp; Advantages of NAT (6.3.1) 238 <br>&nbsp;&nbsp;&nbsp; Disadvantages of NAT (6.3.2) 238 <br>Static NAT (6.4) 239 <br>&nbsp;&nbsp;&nbsp; Static NAT Scenario (6.4.1) 240 <br>&nbsp;&nbsp;&nbsp; Configure Static NAT (6.4.2) 240 <br>&nbsp;&nbsp;&nbsp; Analyze Static NAT (6.4.3) 241 <br>&nbsp;&nbsp;&nbsp; Verify Static NAT (6.4.4) 242 <br>Dynamic NAT (6.5) 244 <br>&nbsp;&nbsp;&nbsp; Dynamic NAT Scenario (6.5.1) 244 <br>&nbsp;&nbsp;&nbsp; Configure Dynamic NAT (6.5.2) 245 <br>&nbsp;&nbsp;&nbsp; Analyze Dynamic NAT—Inside to Outside (6.5.3) 247 <br>&nbsp;&nbsp;&nbsp; Analyze Dynamic NAT—Outside to Inside (6.5.4) 248 <br>&nbsp;&nbsp;&nbsp; Verify Dynamic NAT (6.5.5) 249 <br>PAT (6.6) 251 <br>&nbsp;&nbsp;&nbsp; PAT Scenario (6.6.1) 251 <br>&nbsp;&nbsp;&nbsp; Configure PAT to Use a Single IPv4 Address (6.6.2) 252 <br>&nbsp;&nbsp;&nbsp; Configure PAT to Use an Address Pool (6.6.3) 253 <br>&nbsp;&nbsp;&nbsp; Analyze PAT—PC to Server (6.6.4) 254 <br>&nbsp;&nbsp;&nbsp; Analyze PAT—Server to PC (6.6.5) 255 <br>&nbsp;&nbsp;&nbsp; Verify PAT (6.6.6) 256 <br>NAT64 (6.7) 258 <br>&nbsp;&nbsp;&nbsp; NAT for IPv6? (6.7.1) 258 <br>&nbsp;&nbsp;&nbsp; NAT64 (6.7.2) 258 <br>Summary (6.8) 260 <br>&nbsp;&nbsp;&nbsp; NAT Characteristics 260 <br>&nbsp;&nbsp;&nbsp; Types of NAT 260 <br>&nbsp;&nbsp;&nbsp; NAT Advantages and Disadvantages 261 <br>&nbsp;&nbsp;&nbsp; Static NAT 261 <br>&nbsp;&nbsp;&nbsp; Dynamic NAT 262 <br>&nbsp;&nbsp;&nbsp; PAT 262 <br>&nbsp;&nbsp;&nbsp; NAT64 263 <br>Practice 264 <br>Check Your Understanding Questions 264 <br> Chapter 7 WAN Concepts 269 <br>Objectives 269 <br>Key Terms 269 <br>Introduction (7.0) 272 <br>Purpose of WANs (7.1) 272 <br>&nbsp;&nbsp;&nbsp; LANs and WANs (7.1.1) 272 <br>&nbsp;&nbsp;&nbsp; Private and Public WANs (7.1.2) 273 <br>&nbsp;&nbsp;&nbsp; WAN Topologies (7.1.3) 274 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Point-to-Point Topology 274 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hub-and-Spoke Topology 275 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dual-homed Topology 276 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fully Meshed Topology 276 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Partially Meshed Topology 277 <br>&nbsp;&nbsp;&nbsp; Carrier Connections (7.1.4) 278 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Single-Carrier WAN Connection 278 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dual-Carrier WAN Connection 278 <br>&nbsp;&nbsp;&nbsp; Evolving Networks (7.1.5) 279 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Small Network 279 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Campus Network 280 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Branch Network 281 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distributed Network 282 <br>WAN Operations (7.2) 283 <br>&nbsp;&nbsp;&nbsp; WAN Standards (7.2.1) 283 <br>&nbsp;&nbsp;&nbsp; WANs in the OSI Model (7.2.2) 284 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Layer 1 Protocols 284 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Layer 2 Protocols 284 <br>&nbsp;&nbsp;&nbsp; Common WAN Terminology (7.2.3) 285 <br>&nbsp;&nbsp;&nbsp; WAN Devices (7.2.4) 287 <br>&nbsp;&nbsp;&nbsp; Serial Communication (7.2.5) 289 <br>&nbsp;&nbsp;&nbsp; Circuit-Switched Communication (7.2.6) 290 <br>&nbsp;&nbsp;&nbsp; Packet-Switched Communications (7.2.7) 290 <br>&nbsp;&nbsp;&nbsp; SDH, SONET, and DWDM (7.2.8) 291 <br>Traditional WAN Connectivity (7.3) 292 <br>&nbsp;&nbsp;&nbsp; Traditional WAN Connectivity Options (7.3.1) 293 <br>&nbsp;&nbsp;&nbsp; Common WAN Terminology (7.3.2) 293 <br>&nbsp;&nbsp;&nbsp; Circuit-Switched Options (7.3.3) 295 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Public Service Telephone Network (PSTN) 295 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Integrated Services Digital Network (ISDN) 295 <br>&nbsp;&nbsp;&nbsp; Packet-Switched Options (7.3.4) 295 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Frame Relay 295 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Asynchronous Transfer Mode (ATM) 296 <br>Modern WAN Connectivity (7.4) 296 <br>&nbsp;&nbsp;&nbsp; Modern WANs (7.4.1) 296 <br>&nbsp;&nbsp;&nbsp; Modern WAN Connectivity Options (7.4.2) 297 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dedicated Broadband 297 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Packet-Switched 298 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Internet-Based Broadband 298 <br>&nbsp;&nbsp;&nbsp; Ethernet WAN (7.4.3) 298 <br>&nbsp;&nbsp;&nbsp; MPLS (7.4.4) 300 <br>Internet-Based Connectivity (7.5) 301 <br>&nbsp;&nbsp;&nbsp; Internet-Based Connectivity Options (7.5.1) 301 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wired Options 302 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wireless Options 302 <br>&nbsp;&nbsp;&nbsp; DSL Technology (7.5.2) 302 <br>&nbsp;&nbsp;&nbsp; DSL Connections (7.5.3) 303 <br>&nbsp;&nbsp;&nbsp; DSL and PPP (7.5.4) 303 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Host with PPPoE Client 304 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Router PPPoE Client 304 <br>&nbsp;&nbsp;&nbsp; Cable Technology (7.5.5) 305 <br>&nbsp;&nbsp;&nbsp; Optical Fiber (7.5.6) 305 <br>&nbsp;&nbsp;&nbsp; Wireless Internet-Based Broadband (7.5.7) 306 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Municipal Wi-Fi 306 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cellular 306 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Satellite Internet 307 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; WiMAX 307 <br>&nbsp;&nbsp;&nbsp; VPN Technology (7.5.8) 308 <br>&nbsp;&nbsp;&nbsp; ISP Connectivity Options (7.5.9) 309 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Single-Homed 309 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dual-Homed 309 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Multihomed 309 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dual-Multihomed 310 <br>&nbsp;&nbsp;&nbsp; Broadband Solution Comparison (7.5.10) 311 <br>Summary (7.6) 312 <br>&nbsp;&nbsp;&nbsp; Purpose of WANs 312 <br>&nbsp;&nbsp;&nbsp; WAN Operations 312 <br>&nbsp;&nbsp;&nbsp; Traditional WAN Connectivity 313 <br>&nbsp;&nbsp;&nbsp; Modern WAN Connectivity 314 <br>&nbsp;&nbsp;&nbsp; Internet-Based Connectivity 314 <br>Practice 315 <br>Check Your Understanding Questions 316 <br> Chapter 8 VPN and IPsec Concepts 319 <br>Objectives 319 <br>Key Terms 319 <br>Introduction (8.0) 321 <br>VPN Technology (8.1) 321 <br>&nbsp;&nbsp;&nbsp; Virtual Private Networks (8.1.1) 321 <br>&nbsp;&nbsp;&nbsp; VPN Benefits (8.1.2) 322 <br>&nbsp;&nbsp;&nbsp; Site-to-Site and Remote-Access VPNs (8.1.3) 323 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Site-to-Site VPN 323 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Remote-Access VPN 324 <br>&nbsp;&nbsp;&nbsp; Enterprise and Service Provider VPNs (8.1.4) 324 <br>Types of VPNs (8.2) 325 <br>&nbsp;&nbsp;&nbsp; Remote-Access VPNs (8.2.1) 325 <br>&nbsp;&nbsp;&nbsp; SSL VPNs (8.2.2) 326 <br>&nbsp;&nbsp;&nbsp; Site-to-Site IPsec VPNs (8.2.3) 327 <br>&nbsp;&nbsp;&nbsp; GRE over IPsec (8.2.4) 328 <br>&nbsp;&nbsp;&nbsp; Dynamic Multipoint VPNs (8.2.5) 330 <br>&nbsp;&nbsp;&nbsp; IPsec Virtual Tunnel Interface (8.2.6) 331 <br>&nbsp;&nbsp;&nbsp; Service Provider MPLS VPNs (8.2.7) 332 <br>IPsec (8.3) 333 <br>&nbsp;&nbsp;&nbsp; IPsec Technologies (8.3.2) 333 <br>&nbsp;&nbsp;&nbsp; IPsec Protocol Encapsulation (8.3.3) 336 <br>&nbsp;&nbsp;&nbsp; Confidentiality (8.3.4) 336 <br>&nbsp;&nbsp;&nbsp; Integrity (8.3.5) 338 <br>&nbsp;&nbsp;&nbsp; Authentication (8.3.6) 339 <br>&nbsp;&nbsp;&nbsp; Secure Key Exchange with Diffie-Hellman (8.3.7) 342 <br>Summary (8.4) 344 <br>&nbsp;&nbsp;&nbsp; VPN Technology 344 <br>&nbsp;&nbsp;&nbsp; Types of VPNs 344 <br>&nbsp;&nbsp;&nbsp; IPsec 344 <br>Practice 345 <br>Check Your Understanding Questions 345 <br> Chapter 9 QoS Concepts 351 <br>Objectives 351 <br>Key Terms 351 <br>Introduction (9.0) 353 <br>Network Transmission Quality (9.1) 353 <br>&nbsp;&nbsp;&nbsp; Prioritizing Traffic (9.1.2) 353 <br>&nbsp;&nbsp;&nbsp; Bandwidth, Congestion, Delay, and Jitter (9.1.3) 354 <br>&nbsp;&nbsp;&nbsp; Packet Loss (9.1.4) 355 <br>Traffic Characteristics (9.2) 357 <br>&nbsp;&nbsp;&nbsp; Network Traffic Trends (9.2.2) 357 <br>&nbsp;&nbsp;&nbsp; Voice (9.2.3) 358 <br>&nbsp;&nbsp;&nbsp; Video (9.2.4) 358 <br>&nbsp;&nbsp;&nbsp; Data (9.2.5) 360 <br>Queuing Algorithms (9.3) 361 <br>&nbsp;&nbsp;&nbsp; Queuing Overview (9.3.2) 361 <br>&nbsp;&nbsp;&nbsp; First-In, First Out (9.3.3) 362 <br>&nbsp;&nbsp;&nbsp; Weighted Fair Queuing (WFQ) (9.3.4) 362 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Limitations of WFQ 363 <br>&nbsp;&nbsp;&nbsp; Class-Based Weighted Fair Queuing (CBWFQ) (9.3.5) 364 <br>&nbsp;&nbsp;&nbsp; Low Latency Queuing (LLQ) (9.3.6) 365 <br>QoS Models (9.4) 366 <br>&nbsp;&nbsp;&nbsp; Selecting an Appropriate QoS Policy Model (9.4.2) 366 <br>&nbsp;&nbsp;&nbsp; Best Effort (9.4.3) 366 <br>&nbsp;&nbsp;&nbsp; Integrated Services (9.4.4) 367 <br>&nbsp;&nbsp;&nbsp; Differentiated Services (9.4.5) 369 <br>QoS Implementation Techniques (9.5) 370 <br>&nbsp;&nbsp;&nbsp; Avoiding Packet Loss (9.5.2) 371 <br>&nbsp;&nbsp;&nbsp; QoS Tools (9.5.3) 371 <br>&nbsp;&nbsp;&nbsp; Classification and Marking (9.5.4) 372 <br>&nbsp;&nbsp;&nbsp; Marking at Layer 2 (9.5.5) 373 <br>&nbsp;&nbsp;&nbsp; Marking at Layer 3 (9.5.6) 374 <br>&nbsp;&nbsp;&nbsp; Type of Service and Traffic Class Field (9.5.7) 375 <br>&nbsp;&nbsp;&nbsp; DSCP Values (9.5.8) 376 <br>&nbsp;&nbsp;&nbsp; Class Selector Bits (9.5.9) 377 <br>&nbsp;&nbsp;&nbsp; Trust Boundaries (9.5.10) 378 <br>&nbsp;&nbsp;&nbsp; Congestion Avoidance (9.5.11) 379 <br>&nbsp;&nbsp;&nbsp; Shaping and Policing (9.5.12) 380 <br>&nbsp;&nbsp;&nbsp; QoS Policy Guidelines (9.5.13) 381 <br>Summary (9.6) 382 <br>&nbsp;&nbsp;&nbsp; Network Transmission Quality 382 <br>&nbsp;&nbsp;&nbsp; Traffic Characteristics 382 <br>&nbsp;&nbsp;&nbsp; Queuing Algorithms 383 <br>&nbsp;&nbsp;&nbsp; QoS Models 383 <br>&nbsp;&nbsp;&nbsp; QoS Implementation Techniques 384 <br>Practice 385 <br>Check Your Understanding Questions 385 <br> Chapter 10 Network Management 389 <br>Objectives 389 <br>Key Terms 389 <br>Introduction (10.0) 390 <br>Device Discovery with CDP (10.1) 390 <br>&nbsp;&nbsp;&nbsp; CDP Overview (10.1.1) 390 <br>&nbsp;&nbsp;&nbsp; Configure and Verify CDP (10.1.2) 391 <br>&nbsp;&nbsp;&nbsp; Discover Devices by Using CDP (10.1.3) 393 <br>Device Discovery with LLDP (10.2) 396 <br>&nbsp;&nbsp;&nbsp; LLDP Overview (10.2.1) 396 <br>&nbsp;&nbsp;&nbsp; Configure and Verify LLDP (10.2.2) 397 <br>&nbsp;&nbsp;&nbsp; Discover Devices by Using LLDP (10.2.3) 397 <br>NTP (10.3) 400 <br>&nbsp;&nbsp;&nbsp; Time and Calendar Services (10.3.1) 400 <br>&nbsp;&nbsp;&nbsp; NTP Operation (10.3.2) 401 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stratum 0 402 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stratum 1 402 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stratum 2 and Lower 402 <br>&nbsp;&nbsp;&nbsp; Configure and Verify NTP (10.3.3) 402 <br>SNMP 405 <br>&nbsp;&nbsp;&nbsp; Introduction to SNMP (10.4.1) 405 <br>&nbsp;&nbsp;&nbsp; SNMP Operation (10.4.2) 406 <br>&nbsp;&nbsp;&nbsp; SNMP Agent Traps (10.4.3) 408 <br>&nbsp;&nbsp;&nbsp; SNMP Versions (10.4.4) 409 <br>&nbsp;&nbsp;&nbsp; Community Strings (10.4.6) 412 <br>&nbsp;&nbsp;&nbsp; MIB Object ID (10.4.7) 415 <br>&nbsp;&nbsp;&nbsp; SNMP Polling Scenario (10.4.8) 415 <br>&nbsp;&nbsp;&nbsp; SNMP Object Navigator (10.4.9) 417 <br>Syslog (10.5) 418 <br>&nbsp;&nbsp;&nbsp; Introduction to Syslog (10.5.1) 418 <br>&nbsp;&nbsp;&nbsp; Syslog Operation (10.5.2) 420 <br>&nbsp;&nbsp;&nbsp; Syslog Message Format (10.5.3) 421 <br>&nbsp;&nbsp;&nbsp; Syslog Facilities (10.5.4) 422 <br>&nbsp;&nbsp;&nbsp; Configure Syslog Timestamp (10.5.5) 422 <br>Router and Switch File Maintenance (10.6) 423 <br>&nbsp;&nbsp;&nbsp; Router File Systems (10.6.1) 424 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Flash File System 425 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The NVRAM File System 425 <br>&nbsp;&nbsp;&nbsp; Switch File Systems (10.6.2) 426 <br>&nbsp;&nbsp;&nbsp; Use a Text File to Back Up a Configuration (10.6.3) 427 <br>&nbsp;&nbsp;&nbsp; Use a Text File to Restore a Configuration (10.6.4) 428 <br>&nbsp;&nbsp;&nbsp; Use TFTP to Back Up and Restore a Configuration (10.6.5) 428 <br>&nbsp;&nbsp;&nbsp; USB Ports on a Cisco Router (10.6.6) 430 <br>&nbsp;&nbsp;&nbsp; Use USB to Back Up and Restore a Configuration (10.6.7) 430 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Restore Configurations with a USB Flash Drive 432 <br>&nbsp;&nbsp;&nbsp; Password Recovery Procedures (10.6.8) 433 <br>&nbsp;&nbsp;&nbsp; Password Recovery Example (10.6.9) 433 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 1. Enter the ROMMON mode 433 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 2. Change the configuration register 434 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 3. Copy the startup-config to the running-config 434 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 4. Change the password 435 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 5. Save the running-config as the new startup-config 435 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 6. Reload the device 435 <br>IOS Image Management 437 <br>&nbsp;&nbsp;&nbsp; TFTP Servers as a Backup Location (10.7.2) 437 <br>&nbsp;&nbsp;&nbsp; Backup IOS Image to TFTP Server Example (10.7.3) 438 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 1. Ping the TFTP server 438 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 2. Verify image size in flash 439 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 3. Copy the image to the TFTP server 439 <br>&nbsp;&nbsp;&nbsp; Copy an IOS Image to a Device Example (10.7.4) 439 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 1. Ping the TFTP server 440 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 2. Verify the amount of free flash 440 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Step 3. Copy the new IOS image to flash 441 <br>&nbsp;&nbsp;&nbsp; The boot system Command (10.7.5) 441 <br>Summary (10.8) 443 <br>&nbsp;&nbsp;&nbsp; Device Discovery with CDP 443 <br>&nbsp;&nbsp;&nbsp; Device Discovery with LLDP 443 <br>&nbsp;&nbsp;&nbsp; NTP 443 <br>&nbsp;&nbsp;&nbsp; SNMP 444 <br>&nbsp;&nbsp;&nbsp; Syslog 444 <br>&nbsp;&nbsp;&nbsp; Router and Switch File Maintenance 445 <br>&nbsp;&nbsp;&nbsp; IOS Image Management 446 <br>Practice 446 <br>Check Your Understanding Questions 447 <br> Chapter 11 Network Design 453 <br>Objectives 453 <br>Key Terms 453 <br>Introduction (11.0) 455 <br>Hierarchical Networks (11.1) 455 <br>&nbsp;&nbsp;&nbsp; The Need to Scale the Network (11.1.2) 455 <br>&nbsp;&nbsp;&nbsp; Borderless Switched Networks (11.1.3) 458 <br>&nbsp;&nbsp;&nbsp; Hierarchy in the Borderless Switched Network (11.1.4) 459 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Three-Tier Model 460 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Two-Tier Model 461 <br>&nbsp;&nbsp;&nbsp; Access, Distribution, and Core Layer Functions (11.1.5) 462 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Access Layer 462 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distribution Layer 462 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Core Layer 462 <br>&nbsp;&nbsp;&nbsp; Three-Tier and Two-Tier Examples (11.1.6) 462 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Three-Tier Example 463 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Two-Tier Example 464 <br>&nbsp;&nbsp;&nbsp; Role of Switched Networks (11.1.7) 464 <br>Scalable Networks (11.2) 465 <br>&nbsp;&nbsp;&nbsp; Design for Scalability (11.2.1) 465 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Redundant Links 466 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Multiple Links 466 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Scalable Routing Protocol 467 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wireless Connectivity 468 <br>&nbsp;&nbsp;&nbsp; Plan for Redundancy (11.2.2) 469 <br>&nbsp;&nbsp;&nbsp; Reduce Failure Domain Size (11.2.3) 470 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Edge Router 470 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; AP1 471 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S1 472 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S2 472 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; S3 473 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Limiting the Size of Failure Domains 474 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Switch Block Deployment 474 <br>&nbsp;&nbsp;&nbsp; Increase Bandwidth (11.2.4) 474 <br>&nbsp;&nbsp;&nbsp; Expand the Access Layer (11.2.5) 475 <br>&nbsp;&nbsp;&nbsp; Tune Routing Protocols (11.2.6) 476 <br>Switch Hardware (11.3) 477 <br>&nbsp;&nbsp;&nbsp; Switch Platforms (11.3.1) 477 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Campus LAN Switches 477 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cloud-Managed Switches 478 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data Center Switches 478 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Service Provider Switches 479 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Virtual Networking 479 <br>&nbsp;&nbsp;&nbsp; Switch Form Factors (11.3.2) 479 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fixed Configuration Switches 480 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Modular Configuration Switches 480 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stackable Configuration Switches 481 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Thickness 481 <br>&nbsp;&nbsp;&nbsp; Port Density (11.3.3) 482 <br>&nbsp;&nbsp;&nbsp; Forwarding Rates (11.3.4) 483 <br>&nbsp;&nbsp;&nbsp; Power over Ethernet (11.3.5) 484 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Switch 484 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IP Phone 484 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; WAP 485 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Catalyst 2960-C 485 <br>&nbsp;&nbsp;&nbsp; Multilayer Switching (11.3.6) 485 <br>&nbsp;&nbsp;&nbsp; Business Considerations for Switch Selection (11.3.7) 486 <br>Router Hardware (11.4) 487 <br>&nbsp;&nbsp;&nbsp; Router Requirements (11.4.1) 487 <br>&nbsp;&nbsp;&nbsp; Cisco Routers (11.4.2) 488 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Branch Routers 488 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Edge Routers 488 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Service Provider Routers 489 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Industrial 490 <br>&nbsp;&nbsp;&nbsp; Router Form Factors (11.4.3) 490 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco 900 Series 490 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ASR 9000 and 1000 Series 490 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5500 Series 491 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco 800 492 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fixed Configuration or Modular 492 <br>Summary (11.5) 493 <br>&nbsp;&nbsp;&nbsp; Hierarchical Networks 493 <br>&nbsp;&nbsp;&nbsp; Scalable Networks 493 <br>&nbsp;&nbsp;&nbsp; Switch Hardware 494 <br>&nbsp;&nbsp;&nbsp; Router Hardware 494 <br>Practice 495 <br>Check Your Understanding Questions 496 <br> Chapter 12 Network Troubleshooting 501 <br>Objectives 501 <br>Key Terms 501 <br>Introduction (12.0) 502 <br>Network Documentation (12.1) 502 <br>&nbsp;&nbsp;&nbsp; Documentation Overview (12.1.1) 502 <br>&nbsp;&nbsp;&nbsp; Network Topology Diagrams (12.1.2) 503 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Physical Topology 503 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Logical IPv4 Topology 504 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Logical IPv6 Topology 505 <br>&nbsp;&nbsp;&nbsp; Network Device Documentation (12.1.3) 505 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Router Device Documentation 505 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LAN Switch Device Documentation 506 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; End-System Documentation Files 506 <br>&nbsp;&nbsp;&nbsp; Establish a Network Baseline (12.1.4) 507 <br>&nbsp;&nbsp;&nbsp; Step 1—Determine What Types of Data to Collect (12.1.5) 508 <br>&nbsp;&nbsp;&nbsp; Step 2—Identify Devices and Ports of Interest (12.1.6) 508 <br>&nbsp;&nbsp;&nbsp; Step 3—Determine the Baseline Duration (12.1.7) 509 <br>&nbsp;&nbsp;&nbsp; Data Measurement (12.1.8) 510 <br>Troubleshooting Process (12.2) 512 <br>&nbsp;&nbsp;&nbsp; General Troubleshooting Procedures (12.2.1) 512 <br>&nbsp;&nbsp;&nbsp; Seven-Step Troubleshooting Process (12.2.2) 513 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Define the Problem 514 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gather Information 514 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Analyze Information 514 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Eliminate Possible Causes 514 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Propose Hypothesis 514 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Test Hypothesis 515 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Solve the Problem 515 <br>&nbsp;&nbsp;&nbsp; Question End Users (12.2.3) 515 <br>&nbsp;&nbsp;&nbsp; Gather Information (12.2.4) 516 <br>&nbsp;&nbsp;&nbsp; Troubleshooting with Layered Models (12.2.5) 517 <br>&nbsp;&nbsp;&nbsp; Structured Troubleshooting Methods (12.2.6) 518 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Bottom-Up 518 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Top-Down 519 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Divide-and-Conquer 520 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Follow-the-Path 521 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Substitution 522 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Comparison 522 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Educated Guess 522 <br>&nbsp;&nbsp;&nbsp; Guidelines for Selecting a Troubleshooting Method (12.2.7) 523 <br>Troubleshooting Tools (12.3) 524 <br>&nbsp;&nbsp;&nbsp; Software Troubleshooting Tools (12.3.1) 524 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Management System Tools 524 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Knowledge Bases 524 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Baselining Tools 524 <br>&nbsp;&nbsp;&nbsp; Protocol Analyzers (12.3.2) 525 <br>&nbsp;&nbsp;&nbsp; Hardware Troubleshooting Tools (12.3.3) 525 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Digital Multimeters 525 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cable Testers 526 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cable Analyzers 527 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Portable Network Analyzers 528 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime NAM 528 <br>&nbsp;&nbsp;&nbsp; Syslog Server as a Troubleshooting Tool (12.3.4) 529 <br>Symptoms and Causes of Network Problems (12.4) 531 <br>&nbsp;&nbsp;&nbsp; Physical Layer Troubleshooting (12.4.1) 531 <br>&nbsp;&nbsp;&nbsp; Data Link Layer Troubleshooting (12.4.2) 534 <br>&nbsp;&nbsp;&nbsp; Network Layer Troubleshooting (12.4.3) 537 <br>&nbsp;&nbsp;&nbsp; Transport Layer Troubleshooting—ACLs (12.4.4) 539 <br>&nbsp;&nbsp;&nbsp; Transport Layer Troubleshooting—NAT for IPv4 (12.4.5) 542 <br>&nbsp;&nbsp;&nbsp; Application Layer Troubleshooting (12.4.6) 543 <br>Troubleshooting IP Connectivity (12.5) 545 <br>&nbsp;&nbsp;&nbsp; Components of Troubleshooting End-to-End Connectivity (12.5.1) 545 <br>&nbsp;&nbsp;&nbsp; End-to-End Connectivity Problem Initiates Troubleshooting (12.5.2) 547 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPv4 ping 547 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPv4 traceroute 548 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPv6 ping and traceroute 548 <br>&nbsp;&nbsp;&nbsp; Step 1—Verify the Physical Layer (12.5.3) 549 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Input Queue Drops 550 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Output Queue Drops 550 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Input Errors 551 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Output Errors 551 <br>&nbsp;&nbsp;&nbsp; Step 2—Check for Duplex Mismatches (12.5.4) 551 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting Example 552 <br>&nbsp;&nbsp;&nbsp; Step 3—Verify Addressing on the Local Network (12.5.5) 553 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Windows IPv4 ARP Table 553 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Windows IPv6 Neighbor Table 554 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IOS IPv6 Neighbor Table 555 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Switch MAC Address Table 555 <br>&nbsp;&nbsp;&nbsp; Troubleshoot VLAN Assignment Example (12.5.6) 556 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Check the ARP Table 557 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Check the Switch MAC Table 557 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Correct the VLAN Assignment 557 <br>&nbsp;&nbsp;&nbsp; Step 4—Verify Default Gateway (12.5.7) 558 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting IPv4 Default Gateway Example 559 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R1 Routing Table 559 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; PC1 Routing Table 559 <br>&nbsp;&nbsp;&nbsp; Troubleshoot IPv6 Default Gateway Example (12.5.8) 560 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; R1 Routing Table 560 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; PC1 Addressing 560 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Check R1 Interface Settings 561 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Correct R1 IPv6 Routing 561 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verify PC1 Has an IPv6 Default Gateway 562 <br>&nbsp;&nbsp;&nbsp; Step 5—Verify Correct Path (12.5.9) 562 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting Example 566 <br>&nbsp;&nbsp;&nbsp; Step 6—Verify the Transport Layer (12.5.10) 566 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting Example 566 <br>&nbsp;&nbsp;&nbsp; Step 7—Verify ACLs (12.5.11) 568 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Troubleshooting Example 568 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; show ip access-lists 569 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; show ip interfaces 569 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Correct the Issue 570 <br>&nbsp;&nbsp;&nbsp; Step 8—Verify DNS (12.5.12) 570 <br>Summary (12.6) 572 <br>&nbsp;&nbsp;&nbsp; Network Documentation 572 <br>&nbsp;&nbsp;&nbsp; Troubleshooting Process 572 <br>&nbsp;&nbsp;&nbsp; Troubleshooting Tools 573 <br>&nbsp;&nbsp;&nbsp; Symptoms and Causes of Network Problems 573 <br>&nbsp;&nbsp;&nbsp; Troubleshooting IP Connectivity 574 <br>Practice 577 <br>Check Your Understanding Questions 577 <br> Chapter 13 Network Virtualization 581 <br>Objectives 581 <br>Key Terms 581 <br>Introduction (13.0) 583 <br>Cloud Computing (13.1) 583 <br>&nbsp;&nbsp;&nbsp; Cloud Overview (13.1.2) 583 <br>&nbsp;&nbsp;&nbsp; Cloud Services (13.1.3) 584 <br>&nbsp;&nbsp;&nbsp; Cloud Models (13.1.4) 584 <br>&nbsp;&nbsp;&nbsp; Cloud Computing Versus Data Center (13.1.5) 585 <br>Virtualization (13.2) 585 <br>&nbsp;&nbsp;&nbsp; Cloud Computing and Virtualization (13.2.1) 585 <br>&nbsp;&nbsp;&nbsp; Dedicated Servers (13.2.2) 586 <br>&nbsp;&nbsp;&nbsp; Server Virtualization (13.2.3) 587 <br>&nbsp;&nbsp;&nbsp; Advantages of Virtualization (13.2.4) 589 <br>&nbsp;&nbsp;&nbsp; Abstraction Layers (13.2.5) 589 <br>&nbsp;&nbsp;&nbsp; Type 2 Hypervisors (13.2.6) 591 <br>Virtual Network Infrastructure (13.3) 592 <br>&nbsp;&nbsp;&nbsp; Type 1 Hypervisors (13.3.1) 592 <br>&nbsp;&nbsp;&nbsp; Installing a VM on a Hypervisor (13.3.2) 592 <br>&nbsp;&nbsp;&nbsp; The Complexity of Network Virtualization (13.3.3) 594 <br>Software-Defined Networking (13.4) 595 <br>&nbsp;&nbsp;&nbsp; Control Plane and Data Plane (13.4.2) 595 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Layer 3 Switch and CEF 596 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SDN and Central Controller 597 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Management Plane 598 <br>&nbsp;&nbsp;&nbsp; Network Virtualization Technologies (13.4.3) 598 <br>&nbsp;&nbsp;&nbsp; Traditional and SDN Architectures (13.4.4) 599 <br>Controllers (13.5) 600 <br>&nbsp;&nbsp;&nbsp; SDN Controller and Operations (13.5.1) 600 <br>&nbsp;&nbsp;&nbsp; Core Components of ACI (13.5.3) 602 <br>&nbsp;&nbsp;&nbsp; Spine-Leaf Topology (13.5.4) 603 <br>&nbsp;&nbsp;&nbsp; SDN Types (13.5.5) 604 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Device-Based SDN 604 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Controller-Based SDN 605 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Policy-Based SDN 605 <br>&nbsp;&nbsp;&nbsp; APIC-EM Features (13.5.6) 606 <br>&nbsp;&nbsp;&nbsp; APIC-EM Path Trace (13.5.7) 606 <br>Summary (13.6) 609 <br>&nbsp;&nbsp;&nbsp; Cloud Computing 609 <br>&nbsp;&nbsp;&nbsp; Virtualization 609 <br>&nbsp;&nbsp;&nbsp; Virtual Network Infrastructure 610 <br>&nbsp;&nbsp;&nbsp; Software-Defined Networking 610 <br>&nbsp;&nbsp;&nbsp; Controllers 611 <br>Practice 612 <br>Check Your Understanding Questions 613 <br> Chapter 14 Network Automation 617 <br>Objectives 617 <br>Key Terms 617 <br>Introduction (14.0) 619 <br>Automation Overview (14.1) 619 <br>&nbsp;&nbsp;&nbsp; The Increase in Automation (14.1.2) 619 <br>&nbsp;&nbsp;&nbsp; Thinking Devices (14.1.3) 620 <br>Data Formats (14.2) 620 <br>&nbsp;&nbsp;&nbsp; The Data Formats Concept (14.2.2) 620 <br>&nbsp;&nbsp;&nbsp; Data Format Rules (14.2.3) 622 <br>&nbsp;&nbsp;&nbsp; Compare Data Formats (14.2.4) 623 <br>&nbsp;&nbsp;&nbsp; JSON Data Format (14.2.5) 624 <br>&nbsp;&nbsp;&nbsp; JSON Syntax Rules (14.2.6) 624 <br>&nbsp;&nbsp;&nbsp; YAML Data Format (14.2.7) 626 <br>&nbsp;&nbsp;&nbsp; XML Data Format (14.2.8) 627 <br>APIs (14.3) 628 <br>&nbsp;&nbsp;&nbsp; The API Concept (14.3.2) 628 <br>&nbsp;&nbsp;&nbsp; An API Example (14.3.3) 629 <br>&nbsp;&nbsp;&nbsp; Open, Internal, and Partner APIs (14.3.4) 631 <br>&nbsp;&nbsp;&nbsp; Types of Web Service APIs (14.3.5) 632 <br>REST (14.4) 633 <br>&nbsp;&nbsp;&nbsp; REST and RESTful API (14.4.2) 633 <br>&nbsp;&nbsp;&nbsp; RESTful Implementation (14.4.3) 634 <br>&nbsp;&nbsp;&nbsp; URI, URN, and URL (14.4.4) 635 <br>&nbsp;&nbsp;&nbsp; Anatomy of a RESTful Request (14.4.5) 636 <br>&nbsp;&nbsp;&nbsp; RESTful API Applications (14.4.6) 638 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Developer Website 638 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Postman 638 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Python 638 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Operating Systems 638 <br>Configuration Management Tools (14.5) 639 <br>&nbsp;&nbsp;&nbsp; Traditional Network Configuration (14.5.2) 639 <br>&nbsp;&nbsp;&nbsp; Network Automation (14.5.3) 641 <br>&nbsp;&nbsp;&nbsp; Configuration Management Tools (14.5.4) 642 <br>&nbsp;&nbsp;&nbsp; Compare Ansible, Chef, Puppet, and SaltStack (14.5.5) 642 <br>IBN and Cisco DNA Center (14.6) 644 <br>&nbsp;&nbsp;&nbsp; Intent-Based Networking Overview (14.6.2) 644 <br>&nbsp;&nbsp;&nbsp; Network Infrastructure as Fabric (14.6.3) 644 <br>&nbsp;&nbsp;&nbsp; Cisco Digital Network Architecture (DNA) (14.6.4) 647 <br>&nbsp;&nbsp;&nbsp; Cisco DNA Center (14.6.5) 648 <br>Summary (14.7) 651 <br>&nbsp;&nbsp;&nbsp; Automation Overview 651 <br>&nbsp;&nbsp;&nbsp; Data Formats 651 <br>&nbsp;&nbsp;&nbsp; APIs 651 <br>&nbsp;&nbsp;&nbsp; REST 651 <br>&nbsp;&nbsp;&nbsp; Configuration and Management 652 <br>&nbsp;&nbsp;&nbsp; IBN and Cisco DNA Center 652 <br>Practice 652 <br>Check Your Understanding Questions 653 <br>Appendix A Answers to the “Check Your Understanding” Questions 657 <br>Glossary 677 <br> <br> <br>9780136634324&nbsp;&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 6/5/2020 <br> <br>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)