Introduction xxxi <br> Chapter 1 Single-Area OSPFv2 Concepts 1 <br>Objectives 1 <br>Key Terms 1 <br>Introduction (1.0) 3 <br>OSPF Features and Characteristics (1.1) 3 <br> Introduction to OSPF (1.1.1) 3 <br> Components of OSPF (1.1.2) 4 <br> Routing Protocol Messages 4 <br> Data Structures 4 <br> Algorithm 5 <br> Link-State Operation (1.1.3) 6 <br> 1. Establish Neighbor Adjacencies 6 <br> 2. Exchange Link-State Advertisements 6 <br> 3. Build the Link-State Database 7 <br> 4. Execute the SPF Algorithm 8 <br> 5. Choose the Best Route 8 <br> Single-Area and Multiarea OSPF (1.1.4) 9 <br> Multiarea OSPF (1.1.5) 10 <br> OSPFv3 (1.1.6) 12 <br>OSPF Packets (1.2) 13 <br> Types of OSPF Packets (1.2.2) 13 <br> Link-State Updates (1.2.3) 14 <br> Hello Packet (1.2.4) 15 <br>OSPF Operation (1.3) 17 <br> OSPF Operational States (1.3.2) 17 <br> Establish Neighbor Adjacencies (1.3.3) 18 <br> 1. Down State to Init State 18 <br> 2. The Init State 19 <br> 3. Two-Way State 19 <br> 4. Elect the DR and BDR 20 <br> Synchronizing OSPF Databases (1.3.4) 20 <br> 1. Decide First Router 21 <br> 2. Exchange DBDs 21 <br> 3. Send an LSR 22 <br> The Need for a DR (1.3.5) 23 <br> LSA Flooding with a DR (1.3.6) 24 <br> Flooding LSAs 24 <br> LSAs and DR 25 <br>Summary (1.4) 27 <br> OSPF Features and Characteristics 27 <br> OSPF Packets 28 <br> OSPF Operation 28 <br>Practice 29 <br>Check Your Understanding 29 <br> Chapter 2 Single-Area OSPFv2 Configuration 33 <br>Objectives 33 <br>Key Terms 33 <br>Introduction (2.0) 34 <br>OSPF Router ID (2.1) 34 <br> OSPF Reference Topology (2.1.1) 34 <br> Router Configuration Mode for OSPF (2.1.2) 35 <br> Router IDs (2.1.3) 36 <br> Router ID Order of Precedence (2.1.4) 36 <br> Configure a Loopback Interface as the Router ID (2.1.5) 37 <br> Explicitly Configure a Router ID (2.1.6) 38 <br> Modify a Router ID (2.1.7) 39 <br>Point-to-Point OSPF Networks (2.2) 40 <br> The network Command Syntax (2.2.1) 40 <br> The Wildcard Mask (2.2.2) 41 <br> Configure OSPF Using the network Command (2.2.4) 41 <br> Configure OSPF Using the ip ospf Command (2.2.6) 43 <br> Passive Interface (2.2.8) 44 <br> Configure Passive Interfaces (2.2.9) 45 <br> OSPF Point-to-Point Networks (2.2.11) 46 <br> Loopbacks and Point-to-Point Networks (2.2.12) 48 <br>Multiaccess OSPF Networks (2.3) 49 <br> OSPF Network Types (2.3.1) 49 <br> OSPF Designated Router (2.3.2) 49 <br> OSPF Multiaccess Reference Topology (2.3.3) 51 <br> Verify OSPF Router Roles (2.3.4) 52 <br> R1 DROTHER 52 <br> R2 BDR 53 <br> R3 DR 53 <br> Verify DR/BDR Adjacencies (2.3.5) 54 <br> R1 Adjacencies 55 <br> R2 Adjacencies 55 <br> R3 Adjacencies 56 <br> Default DR/BDR Election Process (2.3.6) 56 <br> DR Failure and Recovery (2.3.7) 58 <br> R3 Fails 58 <br> R3 Rejoins Network 59 <br> R4 Joins Network 59 <br> R2 Fails 59 <br> The ip ospf priority Command (2.3.8) 61 <br> Configure OSPF Priority (2.3.9) 61 <br>Modify Single-Area OSPFv2 (2.4) 63 <br> Cisco OSPF Cost Metric (2.4.1) 63 <br> Adjust the Reference Bandwidth (2.4.2) 64 <br> OSPF Accumulates Costs (2.4.3) 66 <br> Manually Set OSPF Cost Value (2.4.4) 67 <br> Test Failover to Backup Route (2.4.5) 69 <br> Hello Packet Intervals (2.4.7) 69 <br> Verify Hello and Dead Intervals (2.4.8) 70 <br> Modify OSPFv2 Intervals (2.4.9) 71 <br>Default Route Propagation (2.5) 73 <br> Propagate a Default Static Route in OSPFv2 (2.5.1) 74 <br> Verify the Propagated Default Route (2.5.2) 75 <br>Verify Single-Area OSPFv2 (2.6) 77 <br> Verify OSPF Neighbors (2.6.1) 77 <br> Verify OSPF Protocol Settings (2.6.2) 79 <br> Verify OSPF Process Information (2.6.3) 80 <br> Verify OSPF Interface Settings (2.6.4) 81 <br>Summary (2.7) 83 <br> OSPF Router ID 83 <br> Point-to-Point OSPF Networks 83 <br> OSPF Network Types 84 <br> Modify Single-Area OSPFv2 85 <br> Default Route Propagation 86 <br> Verify Single-Area OSPFv2 86 <br>Practice 87 <br>Check Your Understanding 88 <br> Chapter 3 Network Security Concepts 93 <br>Objectives 93 <br>Key Terms 93 <br>Introduction 95 <br> Ethical Hacking Statement (3.0.3) 95 <br>Current State of Cybersecurity (3.1) 95 <br> Current State of Affairs (3.1.1) 95 <br> Vectors of Network Attacks (3.1.2) 96 <br> Data Loss (3.1.3) 97 <br>Threat Actors (3.2) 98 <br> The Hacker (3.2.1) 98 <br> Evolution of Hackers (3.2.2) 99 <br> Cyber Criminals (3.2.3) 100 <br> Hacktivists (3.2.4) 100 <br> State-Sponsored Hackers (3.2.5) 100 <br>Threat Actor Tools (3.3) 101 <br> Introduction to Attack Tools (3.3.2) 101 <br> Evolution of Security Tools (3.3.3) 102 <br> Attack Types (3.3.4) 104 <br>Malware (3.4) 106 <br> Overview of Malware (3.4.1) 106 <br> Viruses and Trojan Horses (3.4.2) 106 <br> Other Types of Malware (3.4.3) 108 <br>Common Network Attacks (3.5) 109 <br> Overview of Network Attacks (3.5.1) 109 <br> Reconnaissance Attacks (3.5.3) 109 <br> Access Attacks (3.5.5) 110 <br> Trust Exploitation Example 111 <br> Port Redirection Example 112 <br> Man-in-the-Middle Attack Example 112 <br> Buffer Overflow Attack 112 <br> Social Engineering Attacks (3.5.6) 114 <br> DoS and DDoS Attacks (3.5.9) 115 <br> DoS Attack 116 <br> DDoS Attack 116 <br>IP Vulnerabilities and Threats (3.6) 117 <br> IPv4 and IPv6 (3.6.2) 118 <br> ICMP Attacks (3.6.3) 118 <br> Amplification and Reflection Attacks (3.6.5) 119 <br> Address Spoofing Attacks (3.6.6) 120 <br>TCP and UDP Vulnerabilities (3.7) 122 <br> TCP Segment Header (3.7.1) 122 <br> TCP Services (3.7.2) 123 <br> TCP Attacks (3.7.3) 124 <br> TCP SYN Flood Attack 124 <br> TCP Reset Attack 125 <br> TCP Session Hijacking 126 <br> UDP Segment Header and Operation (3.7.4) 126 <br> UDP Attacks (3.7.5) 127 <br> UDP Flood Attacks 127 <br>IP Services 127 <br> ARP Vulnerabilities (3.8.1) 127 <br> ARP Cache Poisoning (3.8.2) 128 <br> ARP Request 128 <br> ARP Reply 129 <br> Spoofed Gratuitous ARP Replies 130 <br> DNS Attacks (3.8.4) 131 <br> DNS Open Resolver Attacks 131 <br> DNS Stealth Attacks 132 <br> DNS Domain Shadowing Attacks 132 <br> DNS Tunneling (3.8.5) 132 <br> DHCP (3.8.6) 133 <br> DHCP Attacks (3.8.7) 134 <br> 1. Client Broadcasts DHCP Discovery Messages 134 <br> 2. DHCP Servers Respond with Offers 134 <br> 3. Client Accepts Rogue DHCP Request 136 <br> 4. Rogue DHCP Acknowledges the Request 136 <br>Network Security Best Practices (3.9) 137 <br> Confidentiality, Integrity, and Availability (3.9.1) 137 <br> The Defense-in-Depth Approach (3.9.2) 138 <br> Firewalls (3.9.3) 139 <br> IPS (3.9.4) 140 <br> Content Security Appliances (3.9.5) 141 <br> Cisco Email Security Appliance (ESA) 142 <br> Cisco Web Security Appliance (WSA) 142 <br>Cryptography (3.10) 143 <br> Securing Communications (3.10.2) 143 <br> Data Integrity (3.10.3) 144 <br> Hash Functions (3.10.4) 145 <br> MD5 with 128-Bit Digest 145 <br> SHA Hashing Algorithm 146 <br> SHA-2 146 <br> SHA-3 146 <br> Origin Authentication (3.10.5) 147 <br> HMAC Hashing Algorithm 147 <br> Creating the HMAC Value 148 <br> Verifying the HMAC Value 149 <br> Cisco Router HMAC Example 149 <br> Data Confidentiality (3.10.6) 150 <br> Symmetric Encryption (3.10.7) 151 <br> Asymmetric Encryption (3.10.8) 152 <br> Diffie-Hellman (3.10.9) 155 <br>Summary (3.11) 157 <br> Current State of Cybersecurity 157 <br> Threat Actors 157 <br> Threat Actor Tools 157 <br> Malware 157 <br> Common Network Attacks 158 <br> IP Vulnerabilities and Threats 158 <br> TCP and UDP Vulnerabilities 158 <br> IP Services 158 <br> Network Security Best Practices 159 <br> Cryptography 159 <br>Practice 159 <br>Check Your Understanding 160 <br> Chapter 4 ACL Concepts 163 <br>Objectives 163 <br>Key Terms 163 <br>Introduction (4.0) 164 <br>Purpose of ACLs (4.1) 164 <br> What Is an ACL? (4.1.1) 164 <br> Packet Filtering (4.1.2) 165 <br> ACL Operation (4.1.3) 166 <br>Wildcard Masks in ACLs (4.2) 168 <br> Wildcard Mask Overview (4.2.1) 168 <br> Wildcard Mask Types (4.2.2) 169 <br> Wildcard to Match a Host 169 <br> Wildcard Mask to Match an IPv4 Subnet 169 <br> Wildcard Mask to Match an IPv4 Address Range 170 <br> Wildcard Mask Calculation (4.2.3) 170 <br> Example 1 171 <br> Example 2 171 <br> Example 3 171 <br> Example 4 172 <br> Wildcard Mask Keywords (4.2.4) 172 <br>Guidelines for ACL Creation (4.3) 173 <br> Limited Number of ACLs per Interface (4.3.1) 173 <br> ACL Best Practices (4.3.2) 174 <br>Types of IPv4 ACLs (4.4) 175 <br> Standard and Extended ACLs (4.4.1) 175 <br> Numbered and Named ACLs (4.4.2) 176 <br> Numbered ACLs 176 <br> Named ACLs 177 <br> Where to Place ACLs (4.4.3) 177 <br> Standard ACL Placement Example (4.4.4) 179 <br> Extended ACL Placement Example (4.4.5) 180 <br>Summary (4.5) 182 <br> Purpose of ACLs 182 <br> Wildcard Masks 182 <br> Guidelines for ACL Creation 183 <br> Types of IPv4 ACLs 183 <br>Practice 184 <br>Check Your Understanding Questions 184 <br> Chapter 5 ACLs for IPv4 Configuration 187 <br>Objectives 187 <br>Key Term 187 <br>Introduction (5.0) 188 <br>Configure Standard IPv4 ACLs (5.1) 188 <br> Create an ACL (5.1.1) 188 <br> Numbered Standard IPv4 ACL Syntax (5.1.2) 188 <br> Named Standard IPv4 ACL Syntax (5.1.3) 189 <br> Apply a Standard IPv4 ACL (5.1.4) 190 <br> Numbered Standard IPv4 ACL Example (5.1.5) 191 <br> Named Standard IPv4 ACL Example (5.1.6) 193 <br>Modify IPv4 ACLs (5.2) 195 <br> Two Methods to Modify an ACL (5.2.1) 196 <br> Text Editor Method (5.2.2) 196 <br> Sequence Numbers Method (5.2.3) 197 <br> Modify a Named ACL Example (5.2.4) 198 <br> ACL Statistics (5.2.5) 199 <br>Secure VTY Ports with a Standard IPv4 ACL (5.3) 200 <br> The access-class Command (5.3.1) 200 <br> Secure VTY Access Example (5.3.2) 200 <br> Verify the VTY Port Is Secured (5.3.3) 202 <br>Configure Extended IPv4 ACLs (5.4) 203 <br> Extended ACLs (5.4.1) 203 <br> Numbered Extended IPv4 ACL Syntax (5.4.2) 204 <br> Protocols and Ports (5.4.3) 206 <br> Protocol Options 206 <br> Port Keyword Options 207 <br> Protocols and Port Numbers Configuration Examples (5.4.4) 208 <br> Apply a Numbered Extended IPv4 ACL (5.4.5) 209 <br> TCP Established Extended ACL (5.4.6) 210 <br> Named Extended IPv4 ACL Syntax (5.4.7) 212 <br> Named Extended IPv4 ACL Example (5.4.8) 212 <br> Edit Extended ACLs (5.4.9) 213 <br> Another Named Extended IPv4 ACL Example (5.4.10) 214 <br> Verify Extended ACLs (5.4.11) 216 <br> show ip interface 216 <br> show access-lists 217 <br> show running-config 218 <br>Summary (5.5) 219 <br> Configure Standard IPv4 ACLs 219 <br> Modify IPv4 ACLs 219 <br> Secure VTY Ports with a Standard IPv4 ACL 220 <br> Configure Extended IPv4 ACLs 220 <br>Practice 221 <br>Check Your Understanding Questions 222 <br> Chapter 6 NAT for IPv4 225 <br>Objectives 225 <br>Key Terms 225 <br>Introduction (6.0) 226 <br>NAT Characteristics (6.1) 226 <br> IPv4 Private Address Space (6.1.1) 226 <br> What Is NAT? (6.1.2) 227 <br> How NAT Works (6.1.3) 228 <br> NAT Terminology (6.1.4) 229 <br> Inside Local 230 <br> Inside Global 230 <br> Outside Global 231 <br> Outside Local 231 <br>Types of NAT (6.2) 231 <br> Static NAT (6.2.1) 231 <br> Dynamic NAT (6.2.2) 232 <br> Port Address Translation (6.2.3) 233 <br> Next Available Port (6.2.4) 235 <br> NAT and PAT Comparison (6.2.5) 236 <br> NAT 236 <br> PAT 237 <br> Packets Without a Layer 4 Segment (6.2.6) 237 <br>NAT Advantages and Disadvantages (6.3) 238 <br> Advantages of NAT (6.3.1) 238 <br> Disadvantages of NAT (6.3.2) 238 <br>Static NAT (6.4) 239 <br> Static NAT Scenario (6.4.1) 240 <br> Configure Static NAT (6.4.2) 240 <br> Analyze Static NAT (6.4.3) 241 <br> Verify Static NAT (6.4.4) 242 <br>Dynamic NAT (6.5) 244 <br> Dynamic NAT Scenario (6.5.1) 244 <br> Configure Dynamic NAT (6.5.2) 245 <br> Analyze Dynamic NAT—Inside to Outside (6.5.3) 247 <br> Analyze Dynamic NAT—Outside to Inside (6.5.4) 248 <br> Verify Dynamic NAT (6.5.5) 249 <br>PAT (6.6) 251 <br> PAT Scenario (6.6.1) 251 <br> Configure PAT to Use a Single IPv4 Address (6.6.2) 252 <br> Configure PAT to Use an Address Pool (6.6.3) 253 <br> Analyze PAT—PC to Server (6.6.4) 254 <br> Analyze PAT—Server to PC (6.6.5) 255 <br> Verify PAT (6.6.6) 256 <br>NAT64 (6.7) 258 <br> NAT for IPv6? (6.7.1) 258 <br> NAT64 (6.7.2) 258 <br>Summary (6.8) 260 <br> NAT Characteristics 260 <br> Types of NAT 260 <br> NAT Advantages and Disadvantages 261 <br> Static NAT 261 <br> Dynamic NAT 262 <br> PAT 262 <br> NAT64 263 <br>Practice 264 <br>Check Your Understanding Questions 264 <br> Chapter 7 WAN Concepts 269 <br>Objectives 269 <br>Key Terms 269 <br>Introduction (7.0) 272 <br>Purpose of WANs (7.1) 272 <br> LANs and WANs (7.1.1) 272 <br> Private and Public WANs (7.1.2) 273 <br> WAN Topologies (7.1.3) 274 <br> Point-to-Point Topology 274 <br> Hub-and-Spoke Topology 275 <br> Dual-homed Topology 276 <br> Fully Meshed Topology 276 <br> Partially Meshed Topology 277 <br> Carrier Connections (7.1.4) 278 <br> Single-Carrier WAN Connection 278 <br> Dual-Carrier WAN Connection 278 <br> Evolving Networks (7.1.5) 279 <br> Small Network 279 <br> Campus Network 280 <br> Branch Network 281 <br> Distributed Network 282 <br>WAN Operations (7.2) 283 <br> WAN Standards (7.2.1) 283 <br> WANs in the OSI Model (7.2.2) 284 <br> Layer 1 Protocols 284 <br> Layer 2 Protocols 284 <br> Common WAN Terminology (7.2.3) 285 <br> WAN Devices (7.2.4) 287 <br> Serial Communication (7.2.5) 289 <br> Circuit-Switched Communication (7.2.6) 290 <br> Packet-Switched Communications (7.2.7) 290 <br> SDH, SONET, and DWDM (7.2.8) 291 <br>Traditional WAN Connectivity (7.3) 292 <br> Traditional WAN Connectivity Options (7.3.1) 293 <br> Common WAN Terminology (7.3.2) 293 <br> Circuit-Switched Options (7.3.3) 295 <br> Public Service Telephone Network (PSTN) 295 <br> Integrated Services Digital Network (ISDN) 295 <br> Packet-Switched Options (7.3.4) 295 <br> Frame Relay 295 <br> Asynchronous Transfer Mode (ATM) 296 <br>Modern WAN Connectivity (7.4) 296 <br> Modern WANs (7.4.1) 296 <br> Modern WAN Connectivity Options (7.4.2) 297 <br> Dedicated Broadband 297 <br> Packet-Switched 298 <br> Internet-Based Broadband 298 <br> Ethernet WAN (7.4.3) 298 <br> MPLS (7.4.4) 300 <br>Internet-Based Connectivity (7.5) 301 <br> Internet-Based Connectivity Options (7.5.1) 301 <br> Wired Options 302 <br> Wireless Options 302 <br> DSL Technology (7.5.2) 302 <br> DSL Connections (7.5.3) 303 <br> DSL and PPP (7.5.4) 303 <br> Host with PPPoE Client 304 <br> Router PPPoE Client 304 <br> Cable Technology (7.5.5) 305 <br> Optical Fiber (7.5.6) 305 <br> Wireless Internet-Based Broadband (7.5.7) 306 <br> Municipal Wi-Fi 306 <br> Cellular 306 <br> Satellite Internet 307 <br> WiMAX 307 <br> VPN Technology (7.5.8) 308 <br> ISP Connectivity Options (7.5.9) 309 <br> Single-Homed 309 <br> Dual-Homed 309 <br> Multihomed 309 <br> Dual-Multihomed 310 <br> Broadband Solution Comparison (7.5.10) 311 <br>Summary (7.6) 312 <br> Purpose of WANs 312 <br> WAN Operations 312 <br> Traditional WAN Connectivity 313 <br> Modern WAN Connectivity 314 <br> Internet-Based Connectivity 314 <br>Practice 315 <br>Check Your Understanding Questions 316 <br> Chapter 8 VPN and IPsec Concepts 319 <br>Objectives 319 <br>Key Terms 319 <br>Introduction (8.0) 321 <br>VPN Technology (8.1) 321 <br> Virtual Private Networks (8.1.1) 321 <br> VPN Benefits (8.1.2) 322 <br> Site-to-Site and Remote-Access VPNs (8.1.3) 323 <br> Site-to-Site VPN 323 <br> Remote-Access VPN 324 <br> Enterprise and Service Provider VPNs (8.1.4) 324 <br>Types of VPNs (8.2) 325 <br> Remote-Access VPNs (8.2.1) 325 <br> SSL VPNs (8.2.2) 326 <br> Site-to-Site IPsec VPNs (8.2.3) 327 <br> GRE over IPsec (8.2.4) 328 <br> Dynamic Multipoint VPNs (8.2.5) 330 <br> IPsec Virtual Tunnel Interface (8.2.6) 331 <br> Service Provider MPLS VPNs (8.2.7) 332 <br>IPsec (8.3) 333 <br> IPsec Technologies (8.3.2) 333 <br> IPsec Protocol Encapsulation (8.3.3) 336 <br> Confidentiality (8.3.4) 336 <br> Integrity (8.3.5) 338 <br> Authentication (8.3.6) 339 <br> Secure Key Exchange with Diffie-Hellman (8.3.7) 342 <br>Summary (8.4) 344 <br> VPN Technology 344 <br> Types of VPNs 344 <br> IPsec 344 <br>Practice 345 <br>Check Your Understanding Questions 345 <br> Chapter 9 QoS Concepts 351 <br>Objectives 351 <br>Key Terms 351 <br>Introduction (9.0) 353 <br>Network Transmission Quality (9.1) 353 <br> Prioritizing Traffic (9.1.2) 353 <br> Bandwidth, Congestion, Delay, and Jitter (9.1.3) 354 <br> Packet Loss (9.1.4) 355 <br>Traffic Characteristics (9.2) 357 <br> Network Traffic Trends (9.2.2) 357 <br> Voice (9.2.3) 358 <br> Video (9.2.4) 358 <br> Data (9.2.5) 360 <br>Queuing Algorithms (9.3) 361 <br> Queuing Overview (9.3.2) 361 <br> First-In, First Out (9.3.3) 362 <br> Weighted Fair Queuing (WFQ) (9.3.4) 362 <br> Limitations of WFQ 363 <br> Class-Based Weighted Fair Queuing (CBWFQ) (9.3.5) 364 <br> Low Latency Queuing (LLQ) (9.3.6) 365 <br>QoS Models (9.4) 366 <br> Selecting an Appropriate QoS Policy Model (9.4.2) 366 <br> Best Effort (9.4.3) 366 <br> Integrated Services (9.4.4) 367 <br> Differentiated Services (9.4.5) 369 <br>QoS Implementation Techniques (9.5) 370 <br> Avoiding Packet Loss (9.5.2) 371 <br> QoS Tools (9.5.3) 371 <br> Classification and Marking (9.5.4) 372 <br> Marking at Layer 2 (9.5.5) 373 <br> Marking at Layer 3 (9.5.6) 374 <br> Type of Service and Traffic Class Field (9.5.7) 375 <br> DSCP Values (9.5.8) 376 <br> Class Selector Bits (9.5.9) 377 <br> Trust Boundaries (9.5.10) 378 <br> Congestion Avoidance (9.5.11) 379 <br> Shaping and Policing (9.5.12) 380 <br> QoS Policy Guidelines (9.5.13) 381 <br>Summary (9.6) 382 <br> Network Transmission Quality 382 <br> Traffic Characteristics 382 <br> Queuing Algorithms 383 <br> QoS Models 383 <br> QoS Implementation Techniques 384 <br>Practice 385 <br>Check Your Understanding Questions 385 <br> Chapter 10 Network Management 389 <br>Objectives 389 <br>Key Terms 389 <br>Introduction (10.0) 390 <br>Device Discovery with CDP (10.1) 390 <br> CDP Overview (10.1.1) 390 <br> Configure and Verify CDP (10.1.2) 391 <br> Discover Devices by Using CDP (10.1.3) 393 <br>Device Discovery with LLDP (10.2) 396 <br> LLDP Overview (10.2.1) 396 <br> Configure and Verify LLDP (10.2.2) 397 <br> Discover Devices by Using LLDP (10.2.3) 397 <br>NTP (10.3) 400 <br> Time and Calendar Services (10.3.1) 400 <br> NTP Operation (10.3.2) 401 <br> Stratum 0 402 <br> Stratum 1 402 <br> Stratum 2 and Lower 402 <br> Configure and Verify NTP (10.3.3) 402 <br>SNMP 405 <br> Introduction to SNMP (10.4.1) 405 <br> SNMP Operation (10.4.2) 406 <br> SNMP Agent Traps (10.4.3) 408 <br> SNMP Versions (10.4.4) 409 <br> Community Strings (10.4.6) 412 <br> MIB Object ID (10.4.7) 415 <br> SNMP Polling Scenario (10.4.8) 415 <br> SNMP Object Navigator (10.4.9) 417 <br>Syslog (10.5) 418 <br> Introduction to Syslog (10.5.1) 418 <br> Syslog Operation (10.5.2) 420 <br> Syslog Message Format (10.5.3) 421 <br> Syslog Facilities (10.5.4) 422 <br> Configure Syslog Timestamp (10.5.5) 422 <br>Router and Switch File Maintenance (10.6) 423 <br> Router File Systems (10.6.1) 424 <br> The Flash File System 425 <br> The NVRAM File System 425 <br> Switch File Systems (10.6.2) 426 <br> Use a Text File to Back Up a Configuration (10.6.3) 427 <br> Use a Text File to Restore a Configuration (10.6.4) 428 <br> Use TFTP to Back Up and Restore a Configuration (10.6.5) 428 <br> USB Ports on a Cisco Router (10.6.6) 430 <br> Use USB to Back Up and Restore a Configuration (10.6.7) 430 <br> Restore Configurations with a USB Flash Drive 432 <br> Password Recovery Procedures (10.6.8) 433 <br> Password Recovery Example (10.6.9) 433 <br> Step 1. Enter the ROMMON mode 433 <br> Step 2. Change the configuration register 434 <br> Step 3. Copy the startup-config to the running-config 434 <br> Step 4. Change the password 435 <br> Step 5. Save the running-config as the new startup-config 435 <br> Step 6. Reload the device 435 <br>IOS Image Management 437 <br> TFTP Servers as a Backup Location (10.7.2) 437 <br> Backup IOS Image to TFTP Server Example (10.7.3) 438 <br> Step 1. Ping the TFTP server 438 <br> Step 2. Verify image size in flash 439 <br> Step 3. Copy the image to the TFTP server 439 <br> Copy an IOS Image to a Device Example (10.7.4) 439 <br> Step 1. Ping the TFTP server 440 <br> Step 2. Verify the amount of free flash 440 <br> Step 3. Copy the new IOS image to flash 441 <br> The boot system Command (10.7.5) 441 <br>Summary (10.8) 443 <br> Device Discovery with CDP 443 <br> Device Discovery with LLDP 443 <br> NTP 443 <br> SNMP 444 <br> Syslog 444 <br> Router and Switch File Maintenance 445 <br> IOS Image Management 446 <br>Practice 446 <br>Check Your Understanding Questions 447 <br> Chapter 11 Network Design 453 <br>Objectives 453 <br>Key Terms 453 <br>Introduction (11.0) 455 <br>Hierarchical Networks (11.1) 455 <br> The Need to Scale the Network (11.1.2) 455 <br> Borderless Switched Networks (11.1.3) 458 <br> Hierarchy in the Borderless Switched Network (11.1.4) 459 <br> Three-Tier Model 460 <br> Two-Tier Model 461 <br> Access, Distribution, and Core Layer Functions (11.1.5) 462 <br> Access Layer 462 <br> Distribution Layer 462 <br> Core Layer 462 <br> Three-Tier and Two-Tier Examples (11.1.6) 462 <br> Three-Tier Example 463 <br> Two-Tier Example 464 <br> Role of Switched Networks (11.1.7) 464 <br>Scalable Networks (11.2) 465 <br> Design for Scalability (11.2.1) 465 <br> Redundant Links 466 <br> Multiple Links 466 <br> Scalable Routing Protocol 467 <br> Wireless Connectivity 468 <br> Plan for Redundancy (11.2.2) 469 <br> Reduce Failure Domain Size (11.2.3) 470 <br> Edge Router 470 <br> AP1 471 <br> S1 472 <br> S2 472 <br> S3 473 <br> Limiting the Size of Failure Domains 474 <br> Switch Block Deployment 474 <br> Increase Bandwidth (11.2.4) 474 <br> Expand the Access Layer (11.2.5) 475 <br> Tune Routing Protocols (11.2.6) 476 <br>Switch Hardware (11.3) 477 <br> Switch Platforms (11.3.1) 477 <br> Campus LAN Switches 477 <br> Cloud-Managed Switches 478 <br> Data Center Switches 478 <br> Service Provider Switches 479 <br> Virtual Networking 479 <br> Switch Form Factors (11.3.2) 479 <br> Fixed Configuration Switches 480 <br> Modular Configuration Switches 480 <br> Stackable Configuration Switches 481 <br> Thickness 481 <br> Port Density (11.3.3) 482 <br> Forwarding Rates (11.3.4) 483 <br> Power over Ethernet (11.3.5) 484 <br> Switch 484 <br> IP Phone 484 <br> WAP 485 <br> Cisco Catalyst 2960-C 485 <br> Multilayer Switching (11.3.6) 485 <br> Business Considerations for Switch Selection (11.3.7) 486 <br>Router Hardware (11.4) 487 <br> Router Requirements (11.4.1) 487 <br> Cisco Routers (11.4.2) 488 <br> Branch Routers 488 <br> Network Edge Routers 488 <br> Service Provider Routers 489 <br> Industrial 490 <br> Router Form Factors (11.4.3) 490 <br> Cisco 900 Series 490 <br> ASR 9000 and 1000 Series 490 <br> 5500 Series 491 <br> Cisco 800 492 <br> Fixed Configuration or Modular 492 <br>Summary (11.5) 493 <br> Hierarchical Networks 493 <br> Scalable Networks 493 <br> Switch Hardware 494 <br> Router Hardware 494 <br>Practice 495 <br>Check Your Understanding Questions 496 <br> Chapter 12 Network Troubleshooting 501 <br>Objectives 501 <br>Key Terms 501 <br>Introduction (12.0) 502 <br>Network Documentation (12.1) 502 <br> Documentation Overview (12.1.1) 502 <br> Network Topology Diagrams (12.1.2) 503 <br> Physical Topology 503 <br> Logical IPv4 Topology 504 <br> Logical IPv6 Topology 505 <br> Network Device Documentation (12.1.3) 505 <br> Router Device Documentation 505 <br> LAN Switch Device Documentation 506 <br> End-System Documentation Files 506 <br> Establish a Network Baseline (12.1.4) 507 <br> Step 1—Determine What Types of Data to Collect (12.1.5) 508 <br> Step 2—Identify Devices and Ports of Interest (12.1.6) 508 <br> Step 3—Determine the Baseline Duration (12.1.7) 509 <br> Data Measurement (12.1.8) 510 <br>Troubleshooting Process (12.2) 512 <br> General Troubleshooting Procedures (12.2.1) 512 <br> Seven-Step Troubleshooting Process (12.2.2) 513 <br> Define the Problem 514 <br> Gather Information 514 <br> Analyze Information 514 <br> Eliminate Possible Causes 514 <br> Propose Hypothesis 514 <br> Test Hypothesis 515 <br> Solve the Problem 515 <br> Question End Users (12.2.3) 515 <br> Gather Information (12.2.4) 516 <br> Troubleshooting with Layered Models (12.2.5) 517 <br> Structured Troubleshooting Methods (12.2.6) 518 <br> Bottom-Up 518 <br> Top-Down 519 <br> Divide-and-Conquer 520 <br> Follow-the-Path 521 <br> Substitution 522 <br> Comparison 522 <br> Educated Guess 522 <br> Guidelines for Selecting a Troubleshooting Method (12.2.7) 523 <br>Troubleshooting Tools (12.3) 524 <br> Software Troubleshooting Tools (12.3.1) 524 <br> Network Management System Tools 524 <br> Knowledge Bases 524 <br> Baselining Tools 524 <br> Protocol Analyzers (12.3.2) 525 <br> Hardware Troubleshooting Tools (12.3.3) 525 <br> Digital Multimeters 525 <br> Cable Testers 526 <br> Cable Analyzers 527 <br> Portable Network Analyzers 528 <br> Cisco Prime NAM 528 <br> Syslog Server as a Troubleshooting Tool (12.3.4) 529 <br>Symptoms and Causes of Network Problems (12.4) 531 <br> Physical Layer Troubleshooting (12.4.1) 531 <br> Data Link Layer Troubleshooting (12.4.2) 534 <br> Network Layer Troubleshooting (12.4.3) 537 <br> Transport Layer Troubleshooting—ACLs (12.4.4) 539 <br> Transport Layer Troubleshooting—NAT for IPv4 (12.4.5) 542 <br> Application Layer Troubleshooting (12.4.6) 543 <br>Troubleshooting IP Connectivity (12.5) 545 <br> Components of Troubleshooting End-to-End Connectivity (12.5.1) 545 <br> End-to-End Connectivity Problem Initiates Troubleshooting (12.5.2) 547 <br> IPv4 ping 547 <br> IPv4 traceroute 548 <br> IPv6 ping and traceroute 548 <br> Step 1—Verify the Physical Layer (12.5.3) 549 <br> Input Queue Drops 550 <br> Output Queue Drops 550 <br> Input Errors 551 <br> Output Errors 551 <br> Step 2—Check for Duplex Mismatches (12.5.4) 551 <br> Troubleshooting Example 552 <br> Step 3—Verify Addressing on the Local Network (12.5.5) 553 <br> Windows IPv4 ARP Table 553 <br> Windows IPv6 Neighbor Table 554 <br> IOS IPv6 Neighbor Table 555 <br> Switch MAC Address Table 555 <br> Troubleshoot VLAN Assignment Example (12.5.6) 556 <br> Check the ARP Table 557 <br> Check the Switch MAC Table 557 <br> Correct the VLAN Assignment 557 <br> Step 4—Verify Default Gateway (12.5.7) 558 <br> Troubleshooting IPv4 Default Gateway Example 559 <br> R1 Routing Table 559 <br> PC1 Routing Table 559 <br> Troubleshoot IPv6 Default Gateway Example (12.5.8) 560 <br> R1 Routing Table 560 <br> PC1 Addressing 560 <br> Check R1 Interface Settings 561 <br> Correct R1 IPv6 Routing 561 <br> Verify PC1 Has an IPv6 Default Gateway 562 <br> Step 5—Verify Correct Path (12.5.9) 562 <br> Troubleshooting Example 566 <br> Step 6—Verify the Transport Layer (12.5.10) 566 <br> Troubleshooting Example 566 <br> Step 7—Verify ACLs (12.5.11) 568 <br> Troubleshooting Example 568 <br> show ip access-lists 569 <br> show ip interfaces 569 <br> Correct the Issue 570 <br> Step 8—Verify DNS (12.5.12) 570 <br>Summary (12.6) 572 <br> Network Documentation 572 <br> Troubleshooting Process 572 <br> Troubleshooting Tools 573 <br> Symptoms and Causes of Network Problems 573 <br> Troubleshooting IP Connectivity 574 <br>Practice 577 <br>Check Your Understanding Questions 577 <br> Chapter 13 Network Virtualization 581 <br>Objectives 581 <br>Key Terms 581 <br>Introduction (13.0) 583 <br>Cloud Computing (13.1) 583 <br> Cloud Overview (13.1.2) 583 <br> Cloud Services (13.1.3) 584 <br> Cloud Models (13.1.4) 584 <br> Cloud Computing Versus Data Center (13.1.5) 585 <br>Virtualization (13.2) 585 <br> Cloud Computing and Virtualization (13.2.1) 585 <br> Dedicated Servers (13.2.2) 586 <br> Server Virtualization (13.2.3) 587 <br> Advantages of Virtualization (13.2.4) 589 <br> Abstraction Layers (13.2.5) 589 <br> Type 2 Hypervisors (13.2.6) 591 <br>Virtual Network Infrastructure (13.3) 592 <br> Type 1 Hypervisors (13.3.1) 592 <br> Installing a VM on a Hypervisor (13.3.2) 592 <br> The Complexity of Network Virtualization (13.3.3) 594 <br>Software-Defined Networking (13.4) 595 <br> Control Plane and Data Plane (13.4.2) 595 <br> Layer 3 Switch and CEF 596 <br> SDN and Central Controller 597 <br> Management Plane 598 <br> Network Virtualization Technologies (13.4.3) 598 <br> Traditional and SDN Architectures (13.4.4) 599 <br>Controllers (13.5) 600 <br> SDN Controller and Operations (13.5.1) 600 <br> Core Components of ACI (13.5.3) 602 <br> Spine-Leaf Topology (13.5.4) 603 <br> SDN Types (13.5.5) 604 <br> Device-Based SDN 604 <br> Controller-Based SDN 605 <br> Policy-Based SDN 605 <br> APIC-EM Features (13.5.6) 606 <br> APIC-EM Path Trace (13.5.7) 606 <br>Summary (13.6) 609 <br> Cloud Computing 609 <br> Virtualization 609 <br> Virtual Network Infrastructure 610 <br> Software-Defined Networking 610 <br> Controllers 611 <br>Practice 612 <br>Check Your Understanding Questions 613 <br> Chapter 14 Network Automation 617 <br>Objectives 617 <br>Key Terms 617 <br>Introduction (14.0) 619 <br>Automation Overview (14.1) 619 <br> The Increase in Automation (14.1.2) 619 <br> Thinking Devices (14.1.3) 620 <br>Data Formats (14.2) 620 <br> The Data Formats Concept (14.2.2) 620 <br> Data Format Rules (14.2.3) 622 <br> Compare Data Formats (14.2.4) 623 <br> JSON Data Format (14.2.5) 624 <br> JSON Syntax Rules (14.2.6) 624 <br> YAML Data Format (14.2.7) 626 <br> XML Data Format (14.2.8) 627 <br>APIs (14.3) 628 <br> The API Concept (14.3.2) 628 <br> An API Example (14.3.3) 629 <br> Open, Internal, and Partner APIs (14.3.4) 631 <br> Types of Web Service APIs (14.3.5) 632 <br>REST (14.4) 633 <br> REST and RESTful API (14.4.2) 633 <br> RESTful Implementation (14.4.3) 634 <br> URI, URN, and URL (14.4.4) 635 <br> Anatomy of a RESTful Request (14.4.5) 636 <br> RESTful API Applications (14.4.6) 638 <br> Developer Website 638 <br> Postman 638 <br> Python 638 <br> Network Operating Systems 638 <br>Configuration Management Tools (14.5) 639 <br> Traditional Network Configuration (14.5.2) 639 <br> Network Automation (14.5.3) 641 <br> Configuration Management Tools (14.5.4) 642 <br> Compare Ansible, Chef, Puppet, and SaltStack (14.5.5) 642 <br>IBN and Cisco DNA Center (14.6) 644 <br> Intent-Based Networking Overview (14.6.2) 644 <br> Network Infrastructure as Fabric (14.6.3) 644 <br> Cisco Digital Network Architecture (DNA) (14.6.4) 647 <br> Cisco DNA Center (14.6.5) 648 <br>Summary (14.7) 651 <br> Automation Overview 651 <br> Data Formats 651 <br> APIs 651 <br> REST 651 <br> Configuration and Management 652 <br> IBN and Cisco DNA Center 652 <br>Practice 652 <br>Check Your Understanding Questions 653 <br>Appendix A Answers to the “Check Your Understanding” Questions 657 <br>Glossary 677 <br> <br> <br>9780136634324 TOC 6/5/2020 <br> <br>