<p>Introduction xlii<br> <strong>Chapter 1</strong> Communications in a Connected World 1<br> Objectives 1<br> Key Terms 1<br> Introduction (1.0) 2<br> Network Types (1.1) 2<br> Everything Is Online (1.1.2) 2<br> Who Owns “The Internet”? (1.1.3) 2<br> Local Networks (1.1.4) 3<br> Small Home Networks 4<br> Small Office and Home Office Networks 4<br> Medium to Large Networks 4<br> Worldwide Networks 6<br> Mobile Devices (1.1.5) 6<br> Smartphone 6<br> Tablet 7<br> Smartwatch 8<br> Smart Glasses 8<br> Connected Home Devices (1.1.6) 8<br> Security System 8<br> Appliances 9<br> Smart TV 10<br> Gaming Console 11<br> Other Connected Devices (1.1.7) 11<br> Smart Cars 11<br> RFID Tags 12<br> Sensors and Actuators 13<br> Medical Devices 13<br> Data Transmission (1.2) 14<br> The Bit (1.2.2) 14<br> Common Methods of Data Transmission (1.2.3) 15<br> Bandwidth and Throughput (1.3) 17<br> Bandwidth (1.3.1) 17<br> Throughput (1.3.2) 18<br> Communications in a Connected World Summary (1.4) 18<br> What Did I Learn in This Chapter? (1.4.1) 19<br> Reflection Questions (1.4.2) 20<br> Practice 21<br> Check Your Understanding Questions 21<br> <strong>Chapter 2</strong> Network Components, Types, and Connections 25<br> Objectives 25<br> Key Terms 25<br> Introduction (2.0) 26<br> Clients and Servers (2.1) 26<br> Client and Server Roles (2.1.2) 26<br> Peer-to-Peer Networks (2.1.3) 27<br> Peer-to-Peer Applications (2.1.4) 28<br> Multiple Roles in the Network (2.1.5) 29<br> Network Components (2.2) 30<br> Network Infrastructure (2.2.2) 30<br> End Devices (2.2.3) 32<br> ISP Connectivity Options (2.3) 33<br> ISP Services (2.3.1) 33<br> ISP Connections (2.3.2) 34<br> Cable and DSL Connections (2.3.3) 35<br> Additional Connectivity Options (2.3.4) 36<br> Network Components, Types, and Connections Summary (2.4) 37<br> What Did I Learn in This Chapter? (2.4.1) 37<br> Reflection Questions (2.4.2) 38<br> Practice 39<br> Check Your Understanding Questions 39<br> <strong>Chapter 3</strong> Wireless and Mobile Networks 41<br> Objectives 41<br> Key Terms 41<br> Introduction (3.0) 42<br> Wireless Networks (3.1) 42<br> Other Wireless Networks (3.1.3) 43<br> Global Positioning System 43<br> Wi-Fi 43<br> Bluetooth 43<br> NFC 43<br> Mobile Device Connectivity (3.2) 44<br> Mobile Devices and Wi-Fi (3.2.1) 44<br> Wi-Fi Settings (3.2.2) 44<br> Configure Mobile Wi-Fi Connectivity (3.2.3) 46<br> Configure Cellular Data Settings (3.2.4) 47<br> Android Cellular Data 47<br> iOS Cellular Data 48<br> Simple Connectivity with Bluetooth (3.2.6) 49<br> Bluetooth Pairing (3.2.7) 50<br> Explore Your Network Settings on Your Mobile Device (3.2.8) 51<br> Wireless and Mobile Networks Summary (3.3) 52<br> What Did I Learn in This Chapter? (3.3.1) 52<br> Reflection Questions (3.3.2) 53<br> Practice 54<br> Check Your Understanding Questions 54<br> <strong>Chapter 4</strong> Build a Home Network 57<br> Objectives 57<br> Key Terms 57<br> Introduction (4.0) 58<br> Home Network Basics (4.1) 58<br> Components of a Home Network (4.1.2) 58<br> Typical Home Network Routers (4.1.3) 59<br> Network Technologies in the Home (4.2) 60<br> LAN Wireless Frequencies (4.2.1) 61<br> Wired Network Technologies (4.2.2) 62<br> Category 5e Cable 62<br> Coaxial Cable 62<br> Fiber-Optic Cable 63<br> Wireless Standards (4.3) 63<br> Wi-Fi Networks (4.3.1) 64<br> Wireless Settings (4.3.2) 64<br> Network Mode 65<br> Set Up a Home Router (4.4) 66<br> First Time Setup (4.4.1) 66<br> Design Considerations (4.4.2) 67<br> Build a Home Network Summary (4.5) 69<br> What Did I Learn in This Chapter? (4.5.1) 69<br> Reflection Questions (4.5.2) 71<br> Practice 72<br> Packet Tracer Activities 72<br> Check Your Understanding Questions 72<br> <strong>Chapter 5</strong> Communication Principles 75<br> Objectives 75<br> Key Terms 75<br> Introduction (5.0) 76<br> Networking Protocols (5.1) 76<br> Communication Protocols (5.1.1) 76<br> Why Protocols Matter (5.1.2) 78<br> Communication Standards (5.2) 80<br> The Internet and Standards (5.2.2) 80<br> Network Standards Organizations (5.2.3) 80<br> Network Communication Models (5.3) 81<br> The TCP/IP Model (5.3.3) 81<br> The OSI Reference Model (5.3.4) 82<br> OSI Model and TCP/IP Model Comparison (5.3.5) 83<br> Communication Principles Summary (5.4) 85<br> What Did I Learn in This Chapter? (5.4.1) 85<br> Reflection Questions (5.4.2) 87<br> Practice 88<br> Check Your Understanding Questions 88<br> <strong>Chapter 6</strong> Network Media 91<br> Objectives 91<br> Key Terms 91<br> Introduction (6.0) 92<br> Network Media Types (6.1) 92<br> Three Media Types (6.1.2) 92<br> Common Network Cables (6.1.3) 93<br> Twisted-Pair Cable 93<br> Coaxial Cable 94<br> Fiber-Optic Cable 95<br> Network Media Summary (6.2) 95<br> What Did I Learn in This Chapter? (6.2.1) 95<br> Reflection Questions (6.2.2) 96<br> Practice 97<br> Check Your Understanding Questions 97<br> <strong>Chapter 7</strong> The Access Layer 101<br> Objectives 101<br> Key Terms 101<br> Introduction (7.0) 102<br> Encapsulation and the Ethernet Frame (7.1) 102<br> Encapsulation (7.1.2) 102<br> The Access Layer (7.2) 104<br> Ethernet Frame (7.2.1) 104<br> Access Layer Devices (7.2.2) 105<br> Ethernet Hubs (7.2.3) 106<br> Ethernet Switches (7.2.4) 107<br> The MAC Address Table (7.2.5) 109<br> The Access Layer Summary (7.3) 111<br> What Did I Learn in This Chapter? (7.3.1) 111<br> Reflection Questions (7.3.2) 113<br> Practice 114<br> Check Your Understanding Questions 114<br> <strong>Chapter 8</strong> The Internet Protocol 117<br> Objectives 117<br> Introduction (8.0) 118<br> Purpose of an IPv4 Address (8.1) 118<br> The IPv4 Address (8.1.1) 118<br> Octets and Dotted-Decimal Notation (8.1.2) 119<br> The IPv4 Address Structure (8.2) 119<br> Networks and Hosts (8.2.2) 119<br> Summary (8.3) 121<br> What Did I Learn in This Chapter? (8.3.1) 121<br> Reflection Questions (8.3.2) 121<br> Practice 122<br> Packet Tracer Activities 122<br> Check Your Understanding Questions 122<br> <strong>Chapter 9</strong> IPv4 and Network Segmentation 125<br> Objectives 125<br> Key Terms 125<br> Introduction (9.0) 126<br> IPv4 Unicast, Broadcast, and Multicast (9.1) 126<br> Unicast (9.1.2) 126<br> Broadcast (9.1.4) 127<br> Multicast (9.1.6) 129<br> Types of IPv4 Addresses (9.2) 130<br> Public and Private IPv4 Addresses (9.2.1) 130<br> Routing to the Internet (9.2.2) 131<br> Special-Use IPv4 Addresses (9.2.4) 132<br> Loopback Addresses 132<br> Link-Local addresses 133<br> Legacy Classful Addressing (9.2.5) 133<br> Assignment of IP Addresses (9.2.6) 134<br> Network Segmentation (9.3) 135<br> Broadcast Domains and Segmentation (9.3.2) 136<br> Problems with Large Broadcast Domains (9.3.3) 137<br> Reasons for Segmenting Networks (9.3.4) 138<br> IPv4 and Network Segmentation Summary (9.4) 140<br> What Did I Learn in This Chapter? (9.4.1) 140<br> Reflection Questions (9.4.2) 143<br> Practice 144<br> Check Your Understanding Questions 144<br> <strong>Chapter 10</strong> IPv6 Addressing Formats and Rules 147<br> Objectives 147<br> Key Terms 147<br> Introduction (10.0) 148<br> IPv4 Issues (10.1) 148<br> The Need for IPv6 (10.1.1) 148<br> Internet of Things 149<br> IPv4 and IPv6 Coexistence (10.1.2) 150<br> Dual Stack 150<br> Tunneling 150<br> Translation 151<br> IPv6 Addressing (10.2) 152<br> Hexadecimal Number System (10.2.1) 152<br> IPv6 Addressing Formats (10.2.2) 152<br> Preferred Format 153<br> Rule 1—Omit Leading Zeros (10.2.4) 153<br> Rule 2—Double Colon (10.2.5) 155<br> IPv6 Addressing Formats and Rules Summary (10.3) 156<br> What Did I Learn in This Chapter? (10.3.1) 157<br> Reflection Questions (10.3.2) 158<br> Practice 159<br> Check Your Understanding Questions 159<br> <strong>Chapter 11</strong> Dynamic Addressing with DHCP 163<br> Objectives 163<br> Key Term 163<br> Introduction (11.0) 164<br> Static and Dynamic Addressing (11.1) 164<br> Static IPv4 Address Assignment (11.1.1) 164<br> Dynamic IPv4 Address Assignment (11.1.2) 165<br> DHCP Servers (11.1.3) 166<br> DHCPv4 Configuration (11.2) 167<br> DHCPv4 Operation (11.2.1) 168<br> DHCP Service Configuration (11.2.3) 169<br> Dynamic Addressing with DHCP Summary (11.3) 170<br> What Did I Learn in This Chapter? (11.3.1) 170<br> Reflection Questions (11.3.2) 171<br> Practice 172<br> Packet Tracer Activities 172<br> Check Your Understanding Questions 172<br> <strong>Chapter 12</strong> Gateways to Other Networks 175<br> Objectives 175<br> Key Term 175<br> Introduction (12.0) 176<br> Network Boundaries (12.1) 176<br> Routers as Gateways (12.1.2) 176<br> Routers as Boundaries Between Networks (12.1.3) 177<br> Network Address Translation (12.2) 178<br> NAT Operation (12.2.1) 179<br> Gateways to Other Networks Summary (12.3) 180<br> What Did I Learn in This Chapter? (12.3.1) 180<br> Reflection Questions (12.3.2) 181<br> Practice 182<br> Packet Tracer Activities 182<br> Check Your Understanding Questions 182<br> <strong>Chapter 13</strong> The ARP Process 185<br> Objectives 185<br> Key Term 185<br> Introduction (13.0) 186<br> MAC and IP (13.1) 186<br> Destination on Same Network (13.1.1) 186<br> Destination on Remote Network (13.1.2) 187<br> Broadcast Containment (13.2) 189<br> Broadcast Domains (13.2.2) 190<br> Access Layer Communication (13.2.3) 191<br> ARP (13.2.5) 192<br> The ARP Process Summary (13.3) 193<br> What Did I Learn in This Chapter? (13.3.1) 193<br> Reflection Questions (13.3.2) 194<br> Practice 195<br> Packet Tracer Activities 195<br> Check Your Understanding Questions 195<br> <strong>Chapter 14</strong> Routing Between Networks 199<br> Objectives 199<br> Key Terms 199<br> Introduction (14.0) 200<br> The Need for Routing (14.1) 200<br> Now We Need Routing (14.1.2) 200<br> The Routing Table (14.2) 201<br> Routing Table Entries (14.2.4) 202<br> The Default Gateway (14.2.5) 203<br> Create a LAN (14.3) 204<br> Local Area Networks (14.3.1) 205<br> Local and Remote Network Segments (14.3.2) 205<br> All Hosts in One Local Segment 206<br> Hosts on a Remote Segment 206<br> Routing Between Networks Summary (14.4) 208<br> What Did I Learn in This Chapter? (14.4.1) 208<br> Reflection Questions (14.4.2) 210<br> Practice 211<br> Packet Tracer Activities 211<br> Check Your Understanding Questions 211<br> <strong>Chapter 15</strong> TCP and UDP 215<br> Objectives 215<br> Key Terms 215<br> Introduction (15.0) 216<br> TCP and UDP (15.1) 216<br> Protocol Operations (15.1.1) 216<br> TCP and UDP (15.1.2) 217<br> TCP Reliability (15.1.3) 218<br> UDP Best Effort Delivery (15.1.4) 218<br> Port Numbers (15.2) 219<br> TCP and UDP Port Numbers (15.2.1) 219<br> Socket Pairs (15.2.2) 222<br> The <strong>netstat</strong> Command (15.2.3) 223<br> TCP and UDP Summary (15.3) 224<br> What Did I Learn in This Chapter? (15.3.1) 224<br> Reflection Questions (15.3.2) 225<br> Practice 226<br> Check Your Understanding Questions 226<br> <strong>Chapter 16</strong> Application Layer Services 229<br> Objectives 229<br> Key Terms 229<br> Introduction (16.0) 230<br> The Client-Server Relationship (16.1) 230<br> Client and Server Interaction (16.1.1) 230<br> Client Requests a Web Page (16.1.2) 231<br> URI, URN, and URL (16.1.3) 232<br> Network Application Services (16.2) 233<br> Common Network Application Services (16.2.1) 233<br> Domain Name System (16.3) 234<br> Domain Name Translation (16.3.1) 234<br> DNS Servers (16.3.2) 235<br> A Note About Syntax Checker Activities (16.3.3) 236<br> Web Clients and Servers (16.4) 236<br> HTTP and HTML (16.4.2) 237<br> FTP Clients and Servers (16.5) 238<br> File Transfer Protocol (16.5.1) 238<br> Virtual Terminals (16.6) 239<br> Telnet (16.6.2) 240<br> Security Issues with Telnet (16.6.3) 241<br> Email and Messaging (16.7) 242<br> Email Clients and Servers (16.7.1) 242<br> Email Protocols (16.7.2) 242<br> Simple Mail Transfer Protocol (SMTP) 243<br> Post Office Protocol (POP3) 243<br> Internet Message Access Protocol (IMAP4) 243<br> Text Messaging (16.7.3) 244<br> Internet Phone Calls (16.7.4) 245<br> Application Layer Services Summary (16.8) 245<br> What Did I Learn in This Chapter? (16.8.1) 245<br> Reflection Questions (16.8.2) 248<br> Practice 249<br> Packet Tracer Activities 249<br> Check Your Understanding Questions 249<br> <strong>Chapter 17</strong> Network Testing Utilities 253<br> Objectives 253<br> Key Terms 253<br> Introduction (17.0) 254<br> Troubleshooting Commands (17.1) 254<br> Overview of Troubleshooting Commands (17.1.1) 254<br> The <strong>ipconfig</strong> Command (17.1.2) 254<br> The <strong>ping</strong> Command (17.1.4) 258<br> Ping Results (17.1.5) 259<br> Network Testing Utilities Summary (17.2) 260<br> What Did I Learn in This Chapter? (17.2.1) 260<br> Reflection Questions (17.2.2) 261<br> Practice 262<br> Packet Tracer Activities 262<br> Check Your Understanding Questions 262<br> <strong>Chapter 18</strong> Network Design 265<br> Objectives 265<br> Key Terms 265<br> Introduction (18.0) 266<br> Reliable Networks (18.1) 266<br> Network Architecture (18.1.1) 266<br> Fault Tolerance (18.1.3) 267<br> Scalability (18.1.4) 267<br> Quality of Service (18.1.5) 269<br> Network Security (18.1.6) 270<br> Hierarchical Network Design (18.2) 271<br> Physical and Logical Addresses (18.2.1) 271<br> Hierarchical Analogy (18.2.4) 272<br> Access, Distribution, and Core (18.2.6) 273<br> Access Layer 273<br> Distribution Layer 274<br> Core Layer 274<br> Network Design Summary (18.3) 275<br> What Did I Learn in This Chapter? (18.3.1) 275<br> Reflection Questions (18.3.2) 276<br> Practice 277<br> Labs 277<br> Check Your Understanding Questions 277<br> <strong>Chapter 19</strong> Cloud and Virtualization 281<br> Objectives 281<br> Key Terms 281<br> Introduction (19.0) 282<br> Cloud and Cloud Services (19.1) 282<br> Types of Clouds (19.1.2) 282<br> Cloud Services (19.1.3) 283<br> Cloud Computing and Virtualization (19.1.4) 284<br> Virtualization (19.2) 285<br> Advantages of Virtualization (19.2.1) 285<br> Hypervisors (19.2.2) 286<br> Type 1 Hypervisor—“Bare Metal” Approach 286<br> Type 2 Hypervisor—“Hosted” Approach 286<br> Cloud and Virtualization Summary (19.3) 287<br> What Did I Learn in This Chapter? (19.3.1) 287<br> Reflection Questions (19.3.2) 289<br> Practice 290<br> Labs 290<br> Check Your Understanding Questions 290<br> <strong>Chapter 20</strong> Number Systems 293<br> Objectives 293<br> Key Terms 293<br> Introduction (20.0) 294<br> Binary Number System (20.1) 294<br> Binary and IPv4 Addresses (20.1.1) 294<br> Decimal to Binary Conversion (20.1.5) 296<br> Decimal to Binary Conversion Example (20.1.6) 300<br> IPv4 Addresses (20.1.9) 307<br> Hexadecimal Number System (20.2) 308<br> Hexadecimal and IPv6 Addresses (20.2.1) 308<br> Number Systems Summary (20.3) 311<br> What Did I Learn in This Chapter? (20.3.1) 311<br> Reflection Questions (20.3.2) 311<br> Practice 312<br> Check Your Understanding Questions 312<br> <strong>Chapter 21</strong> Ethernet Switching 315<br> Objectives 315<br> Key Terms 315<br> Introduction (21.0) 316<br> Ethernet (21.1) 316<br> The Rise of Ethernet (21.1.1) 316<br> Ethernet Evolution (21.1.2) 317<br> Ethernet Frames (21.2) 318<br> Ethernet Encapsulation (21.2.1) 318<br> Data Link Sublayers (21.2.2) 319<br> MAC Sublayer (21.2.3) 320<br> Data Encapsulation 321<br> Accessing the Media 321<br> Ethernet Frame Fields (21.2.4) 322<br> Ethernet MAC Address (21.3) 324<br> MAC Address and Hexadecimal (21.3.1) 324<br> Unicast MAC Address (21.3.2) 326<br> Broadcast MAC Address (21.3.3) 327<br> Multicast MAC Address (21.3.4) 328<br> The MAC Address Table (21.4) 330<br> Switch Fundamentals (21.4.1) 330<br> Switch Learning and Forwarding (21.4.2) 331<br> Examine the Source MAC Address 331<br> Find the Destination MAC Address 332<br> Filtering Frames (21.4.3) 333<br> Ethernet Switching Summary (21.5) 336<br> What Did I Learn in This Chapter? (21.5.1) 336<br> Reflection Questions (21.5.2) 338<br> Practice 339<br> Labs 339<br> Check Your Understanding Questions 339<br> <strong>Chapter 22</strong> Network Layer 343<br> Objectives 343<br> Key Terms 343<br> Introduction (22.0) 344<br> Network Layer Characteristics (22.1) 344<br> The Network Layer (22.1.2) 344<br> IP Encapsulation (22.1.3) 346<br> Characteristics of IP (22.1.4) 347<br> Connectionless (22.1.5) 347<br> Best Effort (22.1.6) 348<br> Media Independent (22.1.7) 349<br> IPv4 Packet (22.2) 350<br> IPv4 Packet Header (22.2.1) 350<br> IPv4 Packet Header Fields (22.2.2) 350<br> IPv6 Packet (22.3) 352<br> Limitations of IPv4 (22.3.1) 352<br> IPv6 Overview (22.3.2) 353<br> IPv4 Packet Header Fields in the IPv6 Packet Header (22.3.3) 354<br> IPv6 Packet Header (22.3.4) 356<br> Network Layer Summary (22.4) 357<br> What Did I Learn in This Chapter? (22.4.1) 357<br> Reflection Questions (22.4.2) 358<br> Practice 359<br> Check Your Understanding Questions 359<br> <strong>Chapter 23</strong> IPv4 Address Structure 363<br> Objectives 363<br> Key Terms 363<br> Introduction (23.0) 364<br> IPv4 Address Structure (23.1) 364<br> Network and Host Portions (23.1.1) 364<br> The Subnet Mask (23.1.2) 365<br> The Prefix Length (23.1.3) 366<br> Determining the Network: Logical AND (23.1.4) 367<br> IPv4 Address Structure Summary (23.2) 369<br> What Did I Learn in This Chapter? (23.2.1) 369<br> Reflection Questions (23.2.2) 370<br> Practice 371<br> Check Your Understanding Questions 371<br> <strong>Chapter 24</strong> Address Resolution 375<br> Objectives 375<br> Key Terms 375<br> Introduction (24.0) 376<br> ARP (24.1) 376<br> ARP Overview (24.1.1) 376<br> ARP Functions (24.1.2) 377<br> Removing Entries from an ARP Table (24.1.6) 380<br> ARP Tables on Devices (24.1.7) 381<br> ARP Issues—ARP Broadcasts and ARP Spoofing (24.1.8) 382<br> Address Resolution Summary (24.2) 384<br> What Did I Learn in This Chapter? (24.2.1) 384<br> Reflection Questions (24.2.2) 385<br> Practice 386<br> Labs 386<br> Packet Tracer Activities 386<br> Check Your Understanding Questions 386<br> <strong>Chapter 25</strong> IP Addressing Services 391<br> Objectives 391<br> Key Terms 391<br> Introduction (25.0) 392<br> DNS Services (25.1) 392<br> Domain Name System (25.1.2) 392<br> DNS Message Format (25.1.3) 395<br> DNS Hierarchy (25.1.4) 395<br> The <strong>nslookup</strong> Command (25.1.5) 397<br> DHCP Services (25.2) 398<br> Dynamic Host Configuration Protocol (25.2.1) 398<br> DHCP Messages (25.2.3) 399<br> IP Addressing Services Summary (25.3) 401<br> What Did I Learn in This Chapter? (25.3.1) 401<br> Reflection Questions (25.3.2) 402<br> Practice 403<br> Labs 403<br> Check Your Understanding Questions 403<br> <strong>Chapter 26</strong> Transport Layer 407<br> Objectives 407<br> Key Terms 407<br> Introduction (26.0) 408<br> Transportation of Data (26.1) 408<br> Role of the Transport Layer (26.1.1) 408<br> Transport Layer Responsibilities (26.1.2) 409<br> Transport Layer Protocols (26.1.3) 413<br> Transmission Control Protocol (TCP) (26.1.4) 413<br> User Datagram Protocol (UDP) (26.1.5) 414<br> The Right Transport Layer Protocol for the Right Application (26.1.6) 415<br> TCP Overview (26.2) 417<br> TCP Features (26.2.1) 417<br> TCP Header (26.2.2) 418<br> TCP Header Fields (26.2.3) 418<br> Applications That Use TCP (26.2.4) 419<br> UDP Overview (26.3) 420<br> UDP Features (26.3.1) 420<br> UDP Header (26.3.2) 420<br> UDP Header Fields (26.3.3) 421<br> Applications That Use UDP (26.3.4) 421<br> Port Numbers (26.4) 422<br> Multiple Separate Communications (26.4.1) 422<br> Socket Pairs (26.4.2) 423<br> Port Number Groups (26.4.3) 424<br> The netstat Command (26.4.4) 426<br> TCP Communication Process (26.5) 427<br> TCP Server Processes (26.5.1) 427<br> TCP Connection Establishment (26.5.2) 430<br> Session Termination (26.5.3) 431<br> TCP Three-Way Handshake Analysis (26.5.4) 432<br> Reliability and Flow Control (26.6) 433<br> TCP Reliability—Guaranteed and Ordered Delivery (26.6.1) 433<br> TCP Reliability—Data Loss and Retransmission (26.6.3) 435<br> TCP Flow Control—Window Size and Acknowledgments (26.6.5) 437<br> TCP Flow Control—Maximum Segment Size (MSS) (26.6.6) 439<br> TCP Flow Control—Congestion Avoidance (26.6.7) 440<br> UDP Communication (26.7) 441<br> UDP Low Overhead Versus Reliability (26.7.1) 441<br> UDP Datagram Reassembly (26.7.2) 441<br> UDP Server Processes and Requests (26.7.3) 443<br> UDP Client Processes (26.7.4) 443<br> Transport Layer Summary (26.8) 447<br> What Did I Learn in This Chapter? (26.8.2) 447<br> Reflection Questions (26.8.3) 449<br> Practice 450<br> Packet Tracer Activities 450<br> Check Your Understanding Questions 450<br> <strong>Chapter 27</strong> The Cisco IOS Command Line 455<br> Objectives 455<br> Key Terms 455<br> Introduction (27.0) 456<br> Navigate the IOS (27.1) 456<br> The Cisco IOS Command-Line Interface (27.1.1) 456<br> Primary Command Modes (27.1.2) 457<br> A Note About Syntax Checker Activities (27.1.5) 458<br> The Command Structure (27.2) 458<br> Basic IOS Command Structure (27.2.1) 458<br> IOS Command Syntax (27.2.2) 459<br> Hotkeys and Shortcuts (27.2.4) 460<br> View Device Information (27.3) 462<br> <strong>show</strong> Commands (27.3.2) 463<br> The Cisco IOS Command Line Summary (27.4) 469<br> What Did I Learn in This Chapter? (27.4.1) 469<br> Reflection Questions (27.4.2) 471<br> Practice 472<br> Packet Tracer Activities 472<br> Check Your Understanding Questions 472<br> <strong>Chapter 28</strong> Build a Small Cisco Network 475<br> Objectives 475<br> Key Term 475<br> Introduction (28.0) 476<br> Basic Switch Configuration (28.1) 476<br> Basic Switch Configuration Steps (28.1.1) 476<br> Switch Virtual Interface Configuration (28.1.2) 478<br> Configure Initial Router Settings (28.2) 479<br> Basic Router Configuration Steps (28.2.1) 479<br> Basic Router Configuration Example (28.2.2) 480<br> Secure the Devices (28.3) 482<br> Password Recommendations (28.3.1) 482<br> Secure Remote Access (28.3.2) 483<br> Enable SSH (28.3.3) 485<br> Verify SSH (28.3.5) 487<br> Connecting the Switch to the Router (28.4) 488<br> Default Gateway for a Host (28.4.1) 488<br> Default Gateway on a Switch (28.4.2) 490<br> Build a Small Cisco Network Summary (28.5) 492<br> What Did I Learn in This Chapter? (28.5.1) 492<br> Reflection Questions (28.5.2) 495<br> Practice 496<br> Packet Tracer Activities 496<br> Check Your Understanding Questions 496<br> <strong>Chapter 29</strong> ICMP 499<br> Objectives 499<br> Introduction (29.0) 500<br> ICMP Messages (29.1) 500<br> ICMPv4 and ICMPv6 Messages (29.1.1) 500<br> Host Reachability (29.1.2) 500<br> Destination or Service Unreachable (29.1.3) 501<br> Time Exceeded (29.1.4) 502<br> ICMPv6 Messages (29.1.5) 502<br> Ping and Traceroute Tests (29.2) 505<br> Ping—Test Connectivity (29.2.1) 505<br> Ping the Local Loopback (29.2.2) 506<br> Ping the Default Gateway (29.2.3) 507<br> Ping a Remote Host (29.2.4) 508<br> Traceroute—Test the Path (29.2.5) 509<br> Round-Trip Time (RTT) 509<br> IPv4 TTL and IPv6 Hop Limit 509<br> ICMP Summary (29.3) 511<br> What Did I Learn in This Chapter? (29.3.2) 511<br> Reflection Questions (29.3.3) 513<br> Practice 514<br> Packet Tracer Activities 514<br> Check Your Understanding Questions 514<br> <strong>Chapter 30</strong> Physical Layer 519<br> Objectives 519<br> Key Terms 519<br> Introduction (30.0) 520<br> Purpose of the Physical Layer (30.1) 520<br> The Physical Connection (30.1.1) 520<br> The Physical Layer Process (30.1.2) 522<br> Physical Layer Characteristics (30.2) 523<br> Physical Layer Standards (30.2.1) 523<br> Physical Components (30.2.2) 525<br> Encoding (30.2.3) 525<br> Signaling (30.2.4) 525<br> Bandwidth (30.2.6) 527<br> Bandwidth Terminology (30.2.7) 528<br> Latency 528<br> Throughput 529<br> Goodput 529<br> Copper Cabling (30.3) 529<br> Characteristics of Copper Cabling (30.3.1) 529<br> Types of Copper Cabling (30.3.2) 531<br> Unshielded Twisted-Pair (UTP) (30.3.3) 531<br> Shielded Twisted-Pair (STP) (30.3.4) 533<br> Coaxial Cable (30.3.5) 533<br> UTP Cabling (30.4) 535<br> Properties of UTP Cabling (30.4.1) 535<br> UTP Cabling Standards and Connectors (30.4.2) 536<br> Straight-Through and Crossover UTP Cables (30.4.3) 539<br> Fiber-Optic Cabling (30.5) 541<br> Properties of Fiber-Optic Cabling (30.5.1) 541<br> Types of Fiber Media (30.5.2) 541<br> Single-Mode Fiber 541<br> Multimode Fiber 542<br> Fiber-Optic Cabling Usage (30.5.3) 543<br> Fiber-Optic Connectors (30.5.4) 543<br> Fiber Patch Cords (30.5.5) 545<br> Fiber Versus Copper (30.5.6) 547<br> Summary (30.6) 548<br> What Did I Learn in This Chapter? (30.6.1) 548<br> Reflection Questions (30.6.2) 550<br> Practice 551<br> Check Your Understanding Questions 551<br> <strong>Chapter 31</strong> Data Link Layer 555<br> Objectives 555<br> Key Terms 555<br> Introduction (31.0) 556<br> Topologies (31.1) 556<br> Physical and Logical Topologies (31.1.1) 556<br> WAN Topologies (31.1.2) 558<br> Point-to-Point 558<br> Hub and Spoke 558<br> Mesh 559<br> Point-to-Point WAN Topology (31.1.4) 559<br> LAN Topologies (31.1.5) 560<br> Legacy LAN Topologies 560<br> Media Access Control Methods (31.2) 561<br> Half- and Full-Duplex Communication (31.2.1) 562<br> Half-Duplex Communication 562<br> Full-Duplex Communication 562<br> Access Control Methods (31.2.2) 563<br> Contention-Based Access 563<br> Controlled Access 564<br> Contention-Based Access—CSMA/CD (31.2.3) 564<br> Contention-Based Access—CSMA/CA (31.2.4) 566<br> Summary (31.3) 568<br> What Did I Learn in This Chapter? (31.3.1) 568<br> Reflection Questions (31.3.2) 568<br> Practice 569<br> Check Your Understanding Questions 569<br> <strong>Chapter 32</strong> Routing at the Network Layer 571<br> Objectives 571<br> Key Terms 571<br> Introduction (32.0) 572<br> How a Host Routes (32.1) 572<br> Host Forwarding Decision (32.1.1) 572<br> Default Gateway (32.1.2) 574<br> A Host Routes to the Default Gateway (32.1.3) 574<br> Host Routing Tables (32.1.4) 575<br> Routing Tables (32.2) 576<br> Router Packet Forwarding Decision (32.2.1) 576<br> IP Router Routing Table (32.2.2) 577<br> Static Routing (32.2.3) 579<br> Dynamic Routing (32.2.4) 580<br> Introduction to an IPv4 Routing Table (32.2.6) 582<br> Summary (32.3) 582<br> What Did I Learn in This Chapter? (32.3.1) 582<br> Reflection Questions (32.3.2) 583<br> Practice 584<br> Check Your Understanding Questions 584<br> <strong>Chapter 33</strong> IPv6 Addressing 587<br> Objectives 587<br> Key Terms 587<br> Introduction (33.0) 588<br> IPv6 Address Types (33.1) 588<br> Unicast, Multicast, Anycast (33.1.1) 588<br> IPv6 Prefix Length (33.1.2) 588<br> Types of IPv6 Unicast Addresses (33.1.3) 589<br> A Note About the Unique Local Address (33.1.4) 590<br> IPv6 GUA (33.1.5) 591<br> IPv6 GUA Structure (33.1.6) 592<br> Global Routing Prefix 592<br> Subnet ID 592<br> Interface ID 593<br> IPv6 LLA (33.1.7) 593<br> GUA and LLA Static Configuration (33.2) 595<br> Static GUA Configuration on a Router (33.2.1) 595<br> Static GUA Configuration on a Windows Host (33.2.2) 596<br> Static Configuration of a Link-Local Unicast Address (33.2.3) 598<br> Dynamic Addressing for IPv6 GUAs (33.3) 599<br> RS and RA Messages (33.3.1) 599<br> Method 1: SLAAC (33.3.2) 601<br> Method 2: SLAAC and Stateless DHCPv6 (33.3.3) 602<br> Method 3: Stateful DHCPv6 (33.3.4) 603<br> EUI-64 Process vs. Randomly Generated (33.3.5) 604<br> EUI-64 Process (33.3.6) 605<br> Randomly Generated Interface IDs (33.3.7) 606<br> Dynamic Addressing for IPv6 LLAs (33.4) 607<br> Dynamic LLAs (33.4.1) 607<br> Dynamic LLAs on Windows (33.4.2) 608<br> Dynamic LLAs on Cisco Routers (33.4.3) 609<br> Verify IPv6 Address Configuration (33.4.4) 609<br> IPv6 Multicast Addresses (33.5) 612<br> Assigned IPv6 Multicast Addresses (33.5.1) 612<br> Well-Known IPv6 Multicast Addresses (33.5.2) 613<br> Solicited-Node IPv6 Multicast Addresses (33.5.3) 614<br> Summary (33.6) 615<br> What Did I Learn in This Chapter? (33.6.1) 615<br> Reflection Questions (33.6.2) 616<br> Practice 617<br> Packet Tracer Activities 617<br> Check Your Understanding Questions 617<br> <strong>Chapter 34</strong> IPv6 Neighbor Discovery 621<br> Objectives 621<br> Key Terms 621<br> Introduction (34.0) 622<br> Neighbor Discovery Operation (34.1) 622<br> IPv6 Neighbor Discovery Messages (34.1.2) 622<br> IPv6 Neighbor Discovery—Address Resolution (34.1.3) 623<br> Summary (34.2) 625<br> What Did I Learn in This Chapter? (34.2.1) 625<br> Practice 626<br> Packet Tracer Activities 626<br> Check Your Understanding Questions 626<br> <strong>Chapter 35</strong> Cisco Switches and Routers 629<br> Objectives 629<br> Key Terms 629<br> Introduction (35.0) 630<br> Cisco Switches (35.1) 630<br> Connect More Devices (35.1.1) 630<br> Cisco LAN Switches (35.1.2) 631<br> Type of Ports 632<br> Speed Required 632<br> Expandability 633<br> Manageability 633<br> LAN Switch Components (35.1.5) 634<br> Switch Speeds and Forwarding Methods (35.2) 635<br> Frame Forwarding Methods on Cisco Switches (35.2.1) 635<br> Cut-Through Switching (35.2.2) 636<br> Memory Buffering on Switches (35.2.3) 638<br> Duplex and Speed Settings (35.2.4) 638<br> Auto-MDIX (35.2.5) 640<br> Switch Boot Process (35.3) 641<br> Power Up the Switch (35.3.1) 642<br> In-Band and Out-of-Band Management (35.3.3) 644<br> Out-of-Band Management 644<br> In-Band Management 644<br> IOS Startup Files (35.3.4) 645<br> Cisco Routers (35.4) 646<br> Router Components (35.4.2) 646<br> Router Interface Ports (35.4.3) 647<br> Router Boot Process (35.5) 648<br> Power Up the Router (35.5.1) 648<br> Management Ports (35.5.2) 651<br> Summary (35.6) 653<br> What Did I Learn in This Chapter? (35.6.1) 653<br> Reflection Questions (35.6.2) 654<br> Practice 655<br> Check Your Understanding Questions 655<br> <strong>Chapter 36</strong> Troubleshoot Common Network Problems 659<br> Objectives 659<br> Introduction (36.0) 660<br> The Troubleshooting Process (36.1) 660<br> Network Troubleshooting Overview (36.1.2) 660<br> Gather Information (36.1.3) 660<br> Structured Troubleshooting Methods (36.1.4) 662<br> Bottom-Up 662<br> Top-Down 663<br> Divide-and-Conquer 664<br> Follow-the-Path 664<br> Substitution 665<br> Comparison 665<br> Educated Guess 665<br> Guidelines for Selecting a Troubleshooting Method (36.1.5) 665<br> Physical Layer Problems (36.2) 667<br> Common Layer 1 Problems (36.2.1) 667<br> The Sense of Sight 667<br> The Senses of Smell and Taste 668<br> The Sense of Touch 668<br> The Sense of Hearing 668<br> Wireless Router LEDs (36.2.2) 668<br> Cabling Problems (36.2.3) 670<br> Troubleshoot Wireless Issues (36.3) 671<br> Causes of Wireless Issues (36.3.1) 671<br> Authentication and Association Errors (36.3.2) 672<br> Common Internet Connectivity Issues (36.4) 674<br> DHCP Server Configuration Errors (36.4.1) 674<br> Check Internet Configuration (36.4.2) 674<br> Check Firewall Settings (36.4.3) 677<br> Divide and Conquer with ping (36.4.5) 678<br> The tracert Command (36.4.6) 678<br> The netstat Command (36.4.7) 680<br> The nslookup Command (36.4.8) 682<br> Customer Support (36.5) 683<br> Sources of Help (36.5.1) 683<br> When to Call for Help (36.5.2) 684<br> Support Desk Interaction (36.5.3) 685<br> Issue Resolution (36.5.4) 686<br> Support Desk Tickets and Work Orders (36.5.5) 686<br> Troubleshoot Common Network Problems Summary (36.6) 688<br> What Did I Learn in This Chapter? (36.6.1) 688<br> Practice 692<br> Packet Tracer Activities 692<br> Check Your Understanding Questions 692<br> <strong>Chapter 37</strong> Network Support 697<br> Objectives 697<br> Key Terms 697<br> Introduction (37.0) 698<br> Diagnostics and Troubleshooting Methodologies (37.1) 698<br> Troubleshooting Process Review (37.1.1) 698<br> Seven-Step Troubleshooting Process (37.1.2) 699<br> Define the Problem 699<br> Gather Information 700<br> Analyze Information 700<br> Eliminate Possible Causes 700<br> Propose Hypothesis 700<br> Test Hypothesis 700<br> Solve the Problem 700<br> Troubleshooting with Layered Models (37.1.3) 701<br> Structured Troubleshooting Methods (37.1.4) 701<br> Guidelines for Selecting a Troubleshooting Method (37.1.5) 702<br> Document Findings, Actions, and Outcomes (37.1.6) 703<br> Network Documentation (37.2) 704<br> Documentation Overview (37.2.1) 704<br> Network Topologies and Descriptions (37.2.2) 704<br> PAN 704<br> LAN 705<br> VLAN 706<br> WLAN 706<br> WMN 707<br> CAN 708<br> MAN 708<br> WAN 709<br> VPN 710<br> Enterprise Network Topologies (37.2.4) 710<br> Network Cloud Services and Applications (37.2.5) 713<br> SaaS (Software as a Service) 713<br> PaaS (Platform as a Service) 713<br> IaaS (Infrastructure as a Service) 714<br> XaaS (Anything/Everything as a Service) 714<br> Wireless Standards (37.2.6) 714<br> Licensed and Unlicensed Bands 716<br> Network Device Documentation (37.2.8) 717<br> Router Device Documentation 717<br> LAN Switch Device Documentation 717<br> End-System Documentation 718<br> Establish a Network Baseline (37.2.9) 718<br> Cisco Discovery Protocol (CDP) Overview (37.2.10) 719<br> Discover Devices Using CDP (37.2.11) 720<br> Help Desks (37.3) 723<br> The Security Policy (37.3.1) 723<br> Help Desks (37.3.2) 725<br> Ticketing Systems (37.3.3) 727<br> Question End Users (37.3.4) 729<br> Active Listening (37.3.6) 731<br> Gather Information for Host-Related Tickets (37.3.8) 733<br> Beep Codes 733<br> BIOS Information 733<br> Event Viewer 733<br> Device Manager 734<br> Task Manager 735<br> Diagnostic Tools 736<br> Gather Information for Cisco Device-Related Tickets (37.3.9) 736<br> Analyze the Information (37.3.10) 737<br> Troubleshoot Endpoint Connectivity (37.4) 738<br> Windows Network Setup (37.4.1) 738<br> Verify Connectivity in Windows (37.4.2) 740<br> Linux Network Setup (37.4.3) 741<br> Verify Connectivity in Linux (37.4.4) 742<br> macOS Network Setup (37.4.5) 743<br> Verify Connectivity in macOS (37.4.6) 744<br> Set Up and Verify Networking in iOS (37.4.7) 746<br> Set Up and Verify Networking in Android (37.4.8) 747<br> Troubleshoot a Network (37.5) 750<br> Network Devices as Sources of Network Information (37.5.1) 750<br> Packet Capture and Protocol Analysis (37.5.2) 752<br> Measuring Network Throughput (37.5.5) 754<br> Troubleshoot Connectivity Remotely (37.6) 755<br> Supporting Remote Users (37.6.1) 756<br> Remote Access with Telnet, SSH, and RDP (37.6.2) 757<br> Understanding VPNs (37.6.4) 760<br> Site-to-Site VPN 760<br> Remote-Access VPN 761<br> Network Management Systems (37.6.5) 763<br> Network Support Summary (37.7) 765<br> What Did I Learn in This Chapter? (37.7.1) 765<br> Reflection Questions (37.7.2) 769<br> Practice 770<br> Labs 770<br> Packet Tracer Activities 770<br> Check Your Understanding Questions 770<br> <strong>Chapter 38</strong> Cybersecurity Threats, Vulnerabilities, and Attacks 775<br> Objectives 775<br> Key Terms 775<br> Introduction (38.0) 776<br> Common Threats (38.1) 776<br> Threat Domains (38.1.1) 776<br> Types of Cyber Threats (38.1.2) 777<br> Internal vs. External Threats (38.1.3) 777<br> User Threats and Vulnerabilities (38.1.5) 778<br> Threats to Devices (38.1.6) 780<br> Threats to the Local Area Network (38.1.7) 780<br> Threats to the Private Cloud (38.1.8) 781<br> Threats to the Public Cloud (38.1.9) 781<br> Threats to Applications (38.1.10) 781<br> Threat Complexity (38.1.12) 782<br> Backdoors and Rootkits (38.1.13) 782<br> Backdoors 782<br> Rootkits 783<br> Threat Intelligence and Research Sources (38.1.14) 783<br> The Dark Web 783<br> Indicator of Compromise (IOC) 783<br> Automated Indicator Sharing (AIS) 783<br> Deception (38.2) 784<br> Social Engineering (38.2.1) 784<br> Pretexting 784<br> Something for Something (Quid Pro Quo) 784<br> Identity Fraud 784<br> Social Engineering Tactics (38.2.2) 785<br> Shoulder Surfing and Dumpster Diving (38.2.4) 786<br> Impersonation and Hoaxes (38.2.5) 786<br> Impersonation 786<br> Hoaxes 786<br> Piggybacking and Tailgating (38.2.6) 787<br> Other Methods of Deception (38.2.7) 787<br> Defending Against Deception (38.2.9) 788<br> Cyber Attacks (38.3) 788<br> Malware (38.3.1) 788<br> Viruses 789<br> Worms 789<br> Trojan Horse 789<br> Logic Bombs (38.3.2) 789<br> Ransomware (38.3.3) 790<br> Denial of Service Attacks (38.3.4) 790<br> Overwhelming Quantity of Traffic 790<br> Maliciously Formatted Packets 791<br> Domain Name System (38.3.5) 791<br> Domain Reputation 791<br> DNS Spoofing 791<br> Domain Hijacking 791<br> Uniform Resource Locator (URL) Redirection 792<br> Layer 2 Attacks (38.3.6) 792<br> Spoofing 792<br> MAC Flooding 792<br> Man-in-the-Middle and Man-in-the-Mobile Attacks (38.3.8) 793<br> Man-in-the-Middle (MitM) 793<br> Man-in-the-Mobile (MitMo) 793<br> Zero-Day Attacks (38.3.9) 793<br> Keyboard Logging (38.3.10) 793<br> Defending Against Attacks (38.3.12) 794<br> Wireless and Mobile Device Attacks (38.4) 794<br> Grayware and SMiShing (38.4.1) 794<br> Rogue Access Points (38.4.2) 795<br> Radio Frequency Jamming (38.4.3) 795<br> Bluejacking and Bluesnarfing (38.4.4) 796<br> Bluejacking 796<br> Bluesnarfing 796<br> Attacks Against Wi-Fi Protocols (38.4.5) 796<br> Wi-Fi and Mobile Defense (38.4.6) 797<br> Application Attacks (38.5) 797<br> Cross-Site Scripting (38.5.1) 797<br> Code Injection (38.5.2) 798<br> XML Injection Attack 798<br> SQL Injection Attack 798<br> DLL Injection Attack 798<br> LDAP Injection Attack 798<br> Buffer Overflow (38.5.3) 799<br> Remote Code Executions (38.5.4) 799<br> Other Application Attacks (38.5.5) 799<br> Defending Against Application Attacks (38.5.7) 801<br> Spam (38.5.8) 801<br> Phishing (38.5.9) 802<br> Phishing 802<br> Spear Phishing 802<br> Vishing, Pharming, and Whaling (38.5.10) 802<br> Vishing 802<br> Pharming 803<br> Whaling 803<br> Defending Against Email and Browser Attacks (38.5.12) 803<br> Physical Attacks 804<br> Adversarial Artificial Intelligence Attacks 804<br> Supply Chain Attacks 804<br> Cloud-Based Attacks 804<br> Cybersecurity Threats, Vulnerabilities, and Attacks<br> Summary (38.6) 805<br> What Did I Learn in This Chapter? (38.6.1) 805<br> Reflection Questions (38.6.2) 810<br> Practice 811<br> Labs 811<br> Check Your Understanding Questions 811<br> <strong>Chapter 39</strong> Network Security 813<br> Objectives 813<br> Key Terms 813<br> Introduction (39.0) 814<br> Security Foundations (39.1) 814<br> The Cybersecurity Cube (39.1.1) 814<br> Confidentiality, Integrity, and Availability (39.1.2) 816<br> CIA Triad—The Principle of Confidentiality (39.1.3) 816<br> Data Integrity (39.1.5) 817<br> Ensuring Availability (39.1.7) 819<br> Access Control (39.2) 820<br> Physical Access Controls (39.2.1) 820<br> Logical Access Controls (39.2.2) 821<br> Administrative Access Controls (39.2.3) 821<br> Authentication, Authorization, and Accounting (AAA) (39.2.4) 822<br> Authentication 822<br> Authorization 822<br> Accounting 823<br> What Is Identification? (39.2.5) 823<br> Federated Identity Management (39.2.6) 823<br> Authentication Methods (39.2.7) 824<br> What You Know 824<br> What You Have 824<br> Who You Are 825<br> Passwords (39.2.8) 825<br> Password Managers 826<br> Multi-Factor Authentication 827<br> Multi-Factor Authentication (39.2.9) 827<br> Authorization (39.2.10) 827<br> When to Implement Authorization 827<br> How to Implement Authorization 828<br> Accounting (39.2.11) 828<br> Defending Systems and Devices (39.3) 829<br> Operating System Security (39.3.1) 829<br> A Good Administrator 829<br> A Systematic Approach 829<br> A Baseline 830<br> Types of Antimalware (39.3.3) 830<br> Watch Out for Rogue Antivirus Products 830<br> Fileless Attacks Are Difficult to Detect and Remove 830<br> Scripts Can also Be Malware 830<br> Always Remove Unapproved Software 830<br> Patch Management (39.3.4) 831<br> What Are Patches? 831<br> What Do You Need to Do? 831<br> A Proactive Approach 831<br> Endpoint Security (39.3.5) 832<br> Host-Based Firewalls 832<br> Host Intrusion Detection Systems (HIDSs) 832<br> Host Intrusion Prevention Systems (HIPSs) 832<br> Endpoint Detection and Response (EDR) 832<br> Data Loss Prevention (DLP) 833<br> Next-Generation Firewall (NGFW) 833<br> Host Encryption (39.3.6) 833<br> Boot Integrity (39.3.7) 834<br> What Is Boot Integrity? 834<br> How Does Secure Boot Work? 834<br> What Is Measured Boot? 834<br> Apple System Security Features (39.3.8) 835<br> Physical Protection of Devices (39.3.9) 836<br> Computer Equipment 836<br> Door Locks 836<br> Radio Frequency Identification (RFID) Systems 836<br> Antimalware Protection (39.4) 836<br> Endpoint Threats (39.4.1) 837<br> Endpoint Security (39.4.2) 837<br> Host-Based Malware Protection (39.4.3) 839<br> Antivirus/Antimalware Software 839<br> Host-Based Firewall 840<br> Host-Based Security Suites 840<br> Network-Based Malware Protection (39.4.4) 841<br> Firewalls and Host-Based Intrusion Prevention (39.5) 842<br> Firewalls (39.5.1) 842<br> Common Firewall Properties 843<br> Firewall Benefits 843<br> Firewall Limitations 843<br> Types of Firewalls (39.5.2) 843<br> Packet Filtering (Stateless) Firewall 843<br> Stateful Firewall 844<br> Application Gateway Firewall 844<br> Next-Generation Firewall 846<br> Packet Filtering Firewall Benefits and Limitations (39.5.4) 847<br> Stateful Firewall Benefits and Limitations (39.5.5) 848<br> Host-Based Firewalls (39.5.6) 849<br> Windows Defender Firewall 850<br> iptables 850<br> nftables 850<br> TCP Wrappers 850<br> Antimalware Programs (39.5.7) 850<br> Windows Defender Firewall (39.5.8) 851<br> Secure Wireless Access (39.6) 854<br> Wireless Security Overview (39.6.2) 854<br> DoS Attacks (39.6.3) 854<br> Rogue Access Points (39.6.4) 855<br> Man-in-the-Middle Attack (39.6.5) 856<br> SSID Cloaking and MAC Address Filtering (39.6.8) 858<br> SSID Cloaking 859<br> MAC Addresses Filtering 859<br> 802.11 Original Authentication Methods (39.6.9) 860<br> Shared Key Authentication Methods (39.6.10) 860<br> Authenticating a Home User (39.6.11) 861<br> Encryption Methods (39.6.12) 862<br> Authentication in the Enterprise (39.6.13) 863<br> WPA3 (39.6.14) 864<br> WPA3-Personal 864<br> WPA3-Enterprise 864<br> Open Networks 865<br> IoT Onboarding 865<br> Network Security Summary (39.7) 865<br> What Did I Learn in This Chapter? (39.7.1) 865<br> Reflection Questions (39.7.2) 870<br> Practice 871<br> Packet Tracer Activities 871<br> Check Your Understanding Questions 871<br> <strong>Appendix A</strong> Answers to the “Check Your Understanding” Questions 875<br> <strong>Online Element<br> </strong>Glossary<br> <br> <br> <br> 9780138321338 TOC 1/8/2024</p>