Enterprise networking, security, and automation. CCNAv7, Course booklet (Book, 2020) [WorldCat.org]
skip to content
Enterprise networking, security, and automation. CCNAv7, Course booklet Preview this item
ClosePreview this item
Checking...

Enterprise networking, security, and automation. CCNAv7, Course booklet

Author: Cisco Networking Academy Program.
Publisher: Hoboken, New Jersey : Cisco Press, [2020]
Series: Cisco Networking Academy Program series.
Edition/Format:   Print book : English
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Study guides
Document Type: Book
All Authors / Contributors: Cisco Networking Academy Program.
ISBN: 9780136634737 0136634737
OCLC Number: 1198598008
Notes: Includes index.
Description: xxx, 385 pages ; 28 cm.
Contents: Introduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1 Why should I take this module? - 1.0.1 1 What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1 Introduction to OSPF - 1.1.1 1 Components of OSPF - 1.1.2 2 Link-State Operation - 1.1.3 3 Single-Area and Multiarea OSPF - 1.1.4 4 Multiarea OSPF - 1.1.5 4 OSPFv3 - 1.1.6 5 Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6 Video - OSPF Packets - 1.2.1 6 Types of OSPF Packets - 1.2.2 6 Link-State Updates - 1.2.3 7 Hello Packet - 1.2.4 7 Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.3 7 Video - OSPF Operation - 1.3.1 7 OSPF Operational States - 1.3.2 7 Establish Neighbor Adjacencies - 1.3.3 8 Synchronizing OSPF Databases - 1.3.4 9 The Need for a DR - 1.3.5 10 LSA Flooding With a DR - 1.3.6 11 Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11 What did I learn in this module? - 1.4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15 Why should I take this module? - 2.0.1 15 What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15 OSPF Reference Topology - 2.1.1 15 Router Configuration Mode for OSPF - 2.1.2 16 Router IDs - 2.1.3 16 Router ID Order of Precedence - 2.1.4 17 Configure a Loopback Interface as the Router ID - 2.1.5 17 Explicitly Configure a Router ID - 2.1.6 18 Modify a Router ID - 2.1.7 18 Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19 Check Your Understanding - OSPF Router ID - 2.1.9 19 Point-to-Point OSPF Networks - 2.2 20 The network Command Syntax - 2.2.1 20 The Wildcard Mask - 2.2.2 20 Check Your Understanding - The Wildcard Masks - 2.2.3 20 Configure OSPF Using the network Command - 2.2.4 20 Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21 Configure OSPF Using the ip ospf Command - 2.2.6 21 Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22 Passive Interface - 2.2.8 22 Configure Passive Interfaces - 2.2.9 23 Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24 OSPF Point-to-Point Networks - 2.2.11 24 Loopbacks and Point-to-Point Networks - 2.2.12 26 Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27 OSPF Network Types - 2.3.1 27 OSPF Designated Router - 2.3.2 27 OSPF Multiaccess Reference Topology - 2.3.3 27 Verify OSPF Router Roles - 2.3.4 28 Verify DR/BDR Adjacencies - 2.3.5 30 Default DR/BDR Election Process - 2.3.6 32 DR Failure and Recovery - 2.3.7 33 The ip ospf priority Command - 2.3.8 33 Configure OSPF Priority - 2.3.9 34 Syntax Checker - Configure OSPF Priority - 2.3.10 35 Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36 Cisco OSPF Cost Metric - 2.4.1 36 Adjust the Reference Bandwidth - 2.4.2 36 OSPF Accumulates Costs - 2.4.3 38 Manually Set OSPF Cost Value - 2.4.4 38 Test Failover to Backup Route - 2.4.5 39 Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40 Hello Packet Intervals - 2.4.7 40 Verify Hello and Dead Intervals - 2.4.8 40 Modify OSPFv2 Intervals - 2.4.9 42 Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43 Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43 Propagate a Default Static Route in OSPFv2 - 2.5.1 43 Verify the Propagated Default Route - 2.5.2 44 Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 Verify Single-Area OSPFv2 - 2.6 46 Verify OSPF Neighbors - 2.6.1 46 Verify OSPF Protocol Settings - 2.6.2 48 Verify OSPF Process Information - 2.6.3 48 Verify OSPF Interface Settings - 2.6.4 50 Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51 Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51 Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51 Lab - Single-Area OSPFv2 Configuration - 2.7.2 51 What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57 Why should I take this module? - 3.0.1 57 What will I learn in this module? - 3.0.2 57 Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58 Current State of Affairs - 3.1.1 58 Vectors of Network Attacks - 3.1.2 58 Data Loss - 3.1.3 59 Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60 The Hacker - 3.2.1 60 Evolution of Hackers - 3.2.2 61 Cyber Criminals - 3.2.3 61 Hacktivists - 3.2.4 61 State-Sponsored Hackers - 3.2.5 61 Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62 Video - Threat Actor Tools - 3.3.1 62 Introduction to Attack Tools - 3.3.2 62 Evolution of Security Tools - 3.3.3 62 Attack Types - 3.3.4 63 Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64 Overview of Malware - 3.4.1 64 Viruses and Trojan Horses - 3.4.2 64 Other Types of Malware - 3.4.3 65 Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66 Overview of Network Attacks - 3.5.1 66 Video - Reconnaissance Attacks - 3.5.2 67 Reconnaissance Attacks - 3.5.3 67 Video - Access and Social Engineering Attacks - 3.5.4 68 Access Attacks - 3.5.5 68 Social Engineering Attacks - 3.5.6 69 Lab - Social Engineering - 3.5.7 70 Video - Denial of Service Attacks - 3.5.8 70 DoS and DDoS Attacks - 3.5.9 70 Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71 Video - Common IP and ICMP Attacks - 3.6.1 71 IPv4 and IPv6 - 3.6.2 71 ICMP Attacks - 3.6.3 71 Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72 Amplification and Reflection Attacks - 3.6.5 72 Address Spoofing Attacks - 3.6.6 72 Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73 TCP Segment Header - 3.7.1 73 TCP Services - 3.7.2 73 TCP Attacks - 3.7.3 74 UDP Segment Header and Operation - 3.7.4 74 UDP Attacks - 3.7.5 75 Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.8 75 ARP Vulnerabilities - 3.8.1 75 ARP Cache Poisoning - 3.8.2 76 Video - ARP Spoofing - 3.8.3 76 DNS Attacks - 3.8.4 76 DNS Tunneling - 3.8.5 78 DHCP - 3.8.6 78 DHCP Attacks - 3.8.7 78 Lab - Explore DNS Traffic - 3.8.8 79 Network Security Best Practices - 3.9 80 Confidentiality, Integrity, and Availability - 3.9.1 80 The Defense-in-Depth Approach - 3.9.2 80 Firewalls - 3.9.3 80 IPS - 3.9.4 81 Content Security Appliances - 3.9.5 81 Check Your Understanding - Network Security Best Practices - 3.9.6 82 Cryptography - 3.10 82 Video - Cryptography - 3.10.1 82 Securing Communications - 3.10.2 82 Data Integrity - 3.10.3 83 Hash Functions - 3.10.4 83 Origin Authentication - 3.10.5 84 Data Confidentiality - 3.10.6 85 Symmetric Encryption - 3.10.7 85 Asymmetric Encryption - 3.10.8 86 Diffie-Hellman - 3.10.9 87 Check Your Understanding - Cryptography - 3.10.10 88 Module Practice and Quiz - 3.11 88 What did I learn in this module? - 3.11.1 88 Chapter Quiz - Network Security Concepts 91 Your Chapter Notes 91 Chapter 4 ACL Concepts 93 Introduction - 4.0 93 Why should I take this module? - 4.0.1 93 What will I learn to do in this module? - 4.0.2 93 Purpose of ACLs - 4.1 93 What is an ACL? - 4.1.1 93 Packet Filtering - 4.1.2 95 ACL Operation - 4.1.3 95 Packet Tracer - ACL Demonstration - 4.1.4 96 Check Your Understanding - Purpose of ACLs - 4.1.5 96 Wildcard Masks in ACLs - 4.2 96 Wildcard Mask Overview - 4.2.1 96 Wildcard Mask Types - 4.2.2 97 Wildcard Mask Calculation - 4.2.3 97 Wildcard Mask Keywords - 4.2.4 98 Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 Guidelines for ACL Creation - 4.3 99 Limited Number of ACLs per Interface - 4.3.1 99 ACL Best Practices - 4.3.2 99 Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 Types of IPv4 ACLs - 4.4 100 Standard and Extended ACLs - 4.4.1 100 Numbered and Named ACLs - 4.4.2 101 Where to Place ACLs - 4.4.3 102 Standard ACL Placement Example - 4.4.4 102 Extended ACL Placement Example - 4.4.5 103 Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 Module Practice and Quiz - 4.5 103 What did I learn in this module? - 4.5.1 103 Chapter Quiz - ACL Concepts 106 Your Chapter Notes 106 Chapter 5 ACLs for IPv4 Configuration 107 Introduction - 5.0 107 Why should I take this module? - 5.0.1 107 What will I learn to do in this module? - 5.0.2 107 Configure Standard IPv4 ACLs - 5.1 107 Create an ACL - 5.1.1 107 Numbered Standard IPv4 ACL Syntax - 5.1.2 108 Named Standard IPv4 ACL Syntax - 5.1.3 109 Apply a Standard IPv4 ACL - 5.1.4 109 Numbered Standard IPv4 ACL Example - 5.1.5 110 Named Standard IPv4 ACL Example - 5.1.6 111 Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112 Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113 Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 Modify IPv4 ACLs - 5.2 113 Two Methods to Modify an ACL - 5.2.1 113 Text Editor Method - 5.2.2 113 Sequence Numbers Method - 5.2.3 114 Modify a Named ACL Example - 5.2.4 115 ACL Statistics - 5.2.5 116 Syntax Checker - Modify IPv4 ACLs - 5.2.6 116 Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 Secure VTY Ports with a Standard IPv4 ACL - 5.3 116 The access-class Command - 5.3.1 116 Secure VTY Access Example - 5.3.2 117 Verify the VTY Port is Secured - 5.3.3 118 Syntax Checker - Secure the VTY Ports - 5.3.4 118 Configure Extended IPv4 ACLs - 5.4 119 Extended ACLs - 5.4.1 119 Numbered Extended IPv4 ACL Syntax - 5.4.2 119 Protocols and Ports - 5.4.3 120 Protocols and Port Numbers Configuration Examples - 5.4.4 123 Apply a Numbered Extended IPv4 ACL - 5.4.5 123 TCP Established Extended ACL - 5.4.6 123 Named Extended IPv4 ACL Syntax - 5.4.7 124 Named Extended IPv4 ACL Example - 5.4.8 125 Edit Extended ACLs - 5.4.9 126 Another Named Extended IPv4 ACL Example - 5.4.10 127 Verify Extended ACLs - 5.4.11 128 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 Module Practice and Quiz - 5.5 130 Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130 Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131 What did I learn in this module? - 5.5.3 131 Chapter Quiz - ACLs for IPv4 Implementation 133 Your Chapter Notes 133 Chapter 6 NAT for IPv4 135 Introduction - 6.0 135 Why should I take this module? - 6.0.1 135 What will I learn to do in this module? - 6.0.2 135 NAT Characteristics - 6.1 135 IPv4 Private Address Space - 6.1.1 135 What is NAT - 6.1.2 136 How NAT Works - 6.1.3 137 NAT Terminology - 6.1.4 137 Check Your Understanding - NAT Characteristics - 6.1.5 138 Types of NAT - 6.2 139 Static NAT - 6.2.1 139 Dynamic NAT - 6.2.2 139 Port Address Translation - 6.2.3 139 Next Available Port - 6.2.4 140 NAT and PAT Comparison - 6.2.5 140 Packets without a Layer 4 Segment - 6.2.6 141 Packet Tracer - Investigate NAT Operations - 6.2.7 141 NAT Advantages and Disadvantages - 6.3 142 Advantages of NAT - 6.3.1 142 Disadvantages of NAT - 6.3.2 142 Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 Static NAT - 6.4 143 Static NAT Scenario - 6.4.1 143 Configure Static NAT - 6.4.2 143 Analyze Static NAT - 6.4.3 144 Verify Static NAT - 6.4.4 144 Packet Tracer - Configure Static NAT - 6.4.5 145 Dynamic NAT - 6.5 146 Dynamic NAT Scenario - 6.5.1 146 Configure Dynamic NAT - 6.5.2 146 Analyze Dynamic NAT - Inside to Outside - 6.5.3 147 Analyze Dynamic NAT - Outside to Inside - 6.5.4 147 Verify Dynamic NAT - 6.5.5 148 Packet Tracer - Configure Dynamic NAT - 6.5.6 150 PAT - 6.6 150 PAT Scenario - 6.6.1 150 Configure PAT to Use a Single IPv4 Address - 6.6.2 150 Configure PAT to Use an Address Pool - 6.6.3 151 Analyze PAT - PC to Server - 6.6.4 151 Analyze PAT - Server to PC - 6.6.5 151 Verify PAT - 6.6.6 151 Packet Tracer - Configure PAT - 6.6.7 152 NAT64 - 6.7 153 NAT for IPv6? - 6.7.1 153 NAT64 - 6.7.2 153 Module Practice and Quiz - 6.8 153 Packet Tracer - Configure NAT for IPv4 - 6.8.1 153 Lab - Configure NAT for IPv4 - 6.8.2 154 What did I learn in this module? - 6.8.3 154 Chapter Quiz - NAT for IPv4 158 Your Chapter Notes 158 Chapter 7 WAN Concepts 159 Introduction - 7.0 159 Why should I take this module? - 7.0.1 159 What will I learn to do in this module? - 7.0.2 159 Purpose of WANs - 7.1 159 LANs and WANs - 7.1.1 159 Private and Public WANs - 7.1.2 160 WAN Topologies - 7.1.3 160 Carrier Connections - 7.1.4 162 Evolving Networks - 7.1.5 162 Check Your Understanding - Purpose of WANs - 7.1.6 164 WAN Operations - 7.2 164 WAN Standards - 7.2.1 164 WANs in the OSI Model - 7.2.2 164 Common WAN Terminology - 7.2.3 165 WAN Devices - 7.2.4 166 Serial Communication - 7.2.5 167 Circuit-Switched Communication - 7.2.6 168 Packet-Switched Communications - 7.2.7 168 SDH, SONET, and DWDM - 7.2.8 169 Check Your Understanding - WAN Operations - 7.2.9 169 Traditional WAN Connectivity - 7.3 169 Traditional WAN Connectivity Options - 7.3.1 169 Common WAN Terminology - 7.3.2 169 Circuit-Switched Options - 7.3.3 170 Packet-Switched Options - 7.3.4 171 Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 Modern WAN Connectivity - 7.4 172 Modern WANs - 7.4.1 172 Modern WAN Connectivity Options - 7.4.2 172 Ethernet WAN - 7.4.3 173 MPLS - 7.4.4 174 Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 Internet-Based Connectivity - 7.5 174 Internet-Based Connectivity Options - 7.5.1 174 DSL Technology - 7.5.2 175 DSL Connections - 7.5.3 175 DSL and PPP - 7.5.4 176 Cable Technology - 7.5.5 176 Optical Fiber - 7.5.6 177 Wireless Internet-Based Broadband - 7.5.7 177 VPN Technology - 7.5.8 179 ISP Connectivity Options - 7.5.9 179 Broadband Solution Comparison - 7.5.10 180 Lab - Research Broadband Internet Access Options - 7.5.11 181 Module Practice and Quiz - 7.6 181 Packet Tracer - WAN Concepts - 7.6.1 181 What did I learn in this module? - 7.6.2 181 Chapter Quiz - WAN Concepts 184 Your Chapter Notes 184 Chapter 8 VPN and IPsec Concepts 185 Introduction - 8.0 185 Why should I take this module? - 8.0.1 185 What will I learn in this module? - 8.0.2 185 VPN Technology - 8.1 185 Virtual Private Networks - 8.1.1 185 VPN Benefits - 8.1.2 186 Site-to-Site and Remote-Access VPNs - 8.1.3 186 Enterprise and Service Provider VPNs - 8.1.4 186 Check Your Understanding - VPN Technology - 8.1.5 187 Types of VPNs - 8.2 187 Remote-Access VPNs - 8.2.1 187 SSL VPNs - 8.2.2 187 Site-to-Site IPsec VPNs - 8.2.3 188 GRE over IPsec - 8.2.4 188 Dynamic Multipoint VPNs - 8.2.5 189 IPsec Virtual Tunnel Interface - 8.2.6 189 Service Provider MPLS VPNs - 8.2.7 190 Check Your Understanding - Types of VPNs - 8.2.8 190 IPsec - 8.3 190 Video - IPsec Concepts - 8.3.1 190 IPsec Technologies - 8.3.2 190 IPsec Protocol Encapsulation - 8.3.3 191 Confidentiality - 8.3.4 192 Integrity - 8.3.5 192 Authentication - 8.3.6 192 Secure Key Exchange with Diffie-Hellman - 8.3.7 193 Video - IPsec Transport and Tunnel Mode - 8.3.8 193 Check Your Understanding - IPsec - 8.3.9 193 Module Practice and Quiz - 8.4 193 What did I learn in this module? - 8.4.1 193 Chapter Quiz - VPN and IPsec Concepts 195 Your Chapter Notes 195 Chapter 9 QoS Concepts 197 Introduction - 9.0 197 Why should I take this module? - 9.0.1 197 What will I learn to do in this module? - 9.0.2 197 Network Transmission Quality - 9.1 197 Video Tutorial - The Purpose of QoS - 9.1.1 197 Prioritizing Traffic - 9.1.2 197 Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198 Packet Loss - 9.1.4 199 Check Your Understanding - Network Transmission Quality - 9.1.5 199 Traffic Characteristics - 9.2 199 Video Tutorial - Traffic Characteristics - 9.2.1 199 Network Traffic Trends - 9.2.2 199 Voice - 9.2.3 200 Video - 9.2.4 200 Data - 9.2.5 201 Check Your Understanding - Traffic Characteristics - 9.2.6 202 Queuing Algorithms - 9.3 202 Video Tutorial - QoS Algorithms - 9.3.1 202 Queuing Overview - 9.3.2 202 First In First Out - 9.3.3 202 Weighted Fair Queuing (WFQ) - 9.3.4 203 Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203 Low Latency Queuing (LLQ) - 9.3.6 204 Check Your Understanding - Queuing Algorithms - 9.3.7 204 QoS Models - 9.4 204 Video Tutorial - QoS Models - 9.4.1 204 Selecting an Appropriate QoS Policy Model - 9.4.2 204 Best Effort - 9.4.3 205 Integrated Services - 9.4.4 206 Differentiated Services - 9.4.5 206 Check Your Understanding - QoS Models - 9.4.6 208 QoS Implementation Techniques - 9.5 208 Video Tutorial - QoS Implementation Techniques - 9.5.1 208 Avoiding Packet Loss - 9.5.2 208 QoS Tools - 9.5.3 208 Classification and Marking - 9.5.4 209 Marking at Layer 2 - 9.5.5 210 Marking at Layer 3 - 9.5.6 210 Type of Service and Traffic Class Field - 9.5.7 211 DSCP Values - 9.5.8 211 Class Selector Bits - 9.5.9 211 Trust Boundaries - 9.5.10 211 Congestion Avoidance - 9.5.11 212 Shaping and Policing - 9.5.12 212 QoS Policy Guidelines - 9.5.13 213 Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 Module Practice and Quiz - 9.6 213 What did I learn in this module? - 9.6.1 213 Chapter Quiz - QoS Concepts 216 Your Chapter Notes 216 Chapter 10 Network Management 217 Introduction - 10.0 217 Why should I take this module? - 10.0.1 217 What will I learn to do in this module? - 10.0.2 217 Device Discovery with CDP - 10.1 217 CDP Overview - 10.1.1 217 Configure and Verify CDP - 10.1.2 218 Discover Devices by Using CDP - 10.1.3 220 Syntax Checker - Configure and Verify CDP - 10.1.4 222 Packet Tracer - Use CDP to Map a Network - 10.1.5 222 Device Discovery with LLDP - 10.2 222 LLDP Overview - 10.2.1 222 Configure and Verify LLDP - 10.2.2 222 Discover Devices by Using LLDP - 10.2.3 223 Syntax Checker - Configure and Verify LLDP - 10.2.4 225 Check Your Understanding - Compare CDP and LLDP - 10.2.5 225 Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 NTP - 10.3 225 Time and Calendar Services - 10.3.1 225 NTP Operation - 10.3.2 226 Configure and Verify NTP - 10.3.3 227 Packet Tracer - Configure and Verify NTP - 10.3.4 229 SNMP - 10.4 229 Introduction to SNMP - 10.4.1 229 SNMP Operation - 10.4.2 230 SNMP Agent Traps - 10.4.3 230 SNMP Versions - 10.4.4 231 Check Your Understanding - SNMP Versions - 10.4.5 232 Community Strings - 10.4.6 232 MIB Object ID - 10.4.7 233 SNMP Polling Scenario - 10.4.8 233 SNMP Object Navigator - 10.4.9 233 Lab - Research Network Monitoring Software - 10.4.10 234 Syslog - 10.5 234 Introduction to Syslog - 10.5.1 234 Syslog Operation - 10.5.2 234 Syslog Message Format - 10.5.3 235 Syslog Facilities - 10.5.4 236 Configure Syslog Timestamp - 10.5.5 236 Check Your Understanding - Syslog Operation - 10.5.6 237 Router and Switch File Maintenance - 10.6 237 Router File Systems - 10.6.1 237 Switch File Systems - 10.6.2 240 Use a Text File to Back Up a Configuration - 10.6.3 241 Use a Text File to Restore a Configuration - 10.6.4 241 Use TFTP to Back Up and Restore a Configuration - 10.6.5 242 USB Ports on a Cisco Router - 10.6.6 242 Use USB to Back Up and Restore a Configuration - 10.6.7 243 Password Recovery Procedures - 10.6.8 245 Password Recovery Example - 10.6.9 245 Packet Tracer - Back Up Configuration Files - 10.6.10 247 Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248 Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248 Lab - Research Password Recovery Procedures - 10.6.13 248 IOS Image Management - 10.7 248 Video - Managing Cisco IOS Images - 10.7.1 248 TFTP Servers as a Backup Location - 10.7.2 248 Backup IOS Image to TFTP Server Example - 10.7.3 249 Copy an IOS Image to a Device Example - 10.7.4 250 The boot system Command - 10.7.5 251 Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 Module Practice and Quiz - 10.8 253 Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253 Lab - Configure CDP, LLDP, and NTP - 10.8.2 253 What did I learn in this module? - 10.8.3 253 Chapter Quiz - Network Management 257 Your Chapter Notes 257 Chapter 11 Network Design 259 Introduction - 11.0 259 Why should I take this module? - 11.0.1 259 What will I learn to do in this module? - 11.0.2 259 Hierarchical Networks - 11.1 259 Video - Three-Layer Network Design - 11.1.1 259 The Need to Scale the Network - 11.1.2 259 Borderless Switched Networks - 11.1.3 260 Hierarchy in the Borderless Switched Network - 11.1.4 261 Access, Distribution, and Core Layer Functions - 11.1.5 262 Three-Tier and Two-Tier Examples - 11.1.6 262 Role of Switched Networks - 11.1.7 263 Check Your Understanding - Hierarchical Networks - 11.1.8 263 Scalable Networks - 11.2 263 Design for Scalability - 11.2.1 263 Plan for Redundancy - 11.2.2 264 Reduce Failure Domain Size - 11.2.3 265 Increase Bandwidth - 11.2.4 265 Expand the Access Layer - 11.2.5 266 Tune Routing Protocols - 11.2.6 266 Check Your Understanding - Scalable Networks - 11.2.7 266 Switch Hardware - 11.3 266 Switch Platforms - 11.3.1 266 Switch Form Factors - 11.3.2 267 Port Density - 11.3.3 268 Forwarding Rates - 11.3.4 268 Power over Ethernet - 11.3.5 269 Multilayer Switching - 11.3.6 269 Business Considerations for Switch Selection - 11.3.7 270 Check Your Understanding - Switch Hardware - 11.3.8 270 Router Hardware - 11.4 270 Router Requirements - 11.4.1 270 Cisco Routers - 11.4.2 271 Router Form Factors - 11.4.3 271 Check Your Understanding - Router Hardware - 11.4.4 272 Module Practice and Quiz - 11.5 272 Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272 What did I learn in this module? - 11.5.2 273 Chapter Quiz - Network Design 275 Your Chapter Notes 275 Chapter 12 Network Troubleshooting 277 Introduction - 12.0 277 Why should I take this module? - 12.0.1 277 What will I learn to do in this module? - 12.0.2 277 Network Documentation - 12.1 277 Documentation Overview - 12.1.1 277 Network Topology Diagrams - 12.1.2 278 Network Device Documentation - 12.1.3 279 Establish a Network Baseline - 12.1.4 279 Step 1 - Determine What Types of Data to Collect - 12.1.5 280 Step 2 - Identify Devices and Ports of Interest - 12.1.6 280 Step 3 - Determine the Baseline Duration - 12.1.7 280 Data Measurement - 12.1.8 281 Check Your Understanding - Network Documentation - 12.1.9 282 Troubleshooting Process - 12.2 282 General Troubleshooting Procedures - 12.2.1 282 Seven-Step Troubleshooting Process - 12.2.2 282 Question End Users - 12.2.3 284 Gather Information - 12.2.4 285 Troubleshooting with Layered Models - 12.2.5 286 Structured Troubleshooting Methods - 12.2.6 286 Guidelines for Selecting a Troubleshooting Method - 12.2.7 288 Check Your Understanding - Troubleshooting Process - 12.2.8 288 Troubleshooting Tools - 12.3 288 Software Troubleshooting Tools - 12.3.1 288 Protocol Analyzers - 12.3.2 289 Hardware Troubleshooting Tools - 12.3.3 289 Syslog Server as a Troubleshooting Tool - 12.3.4 290 Check Your Understanding - Troubleshooting Tools - 12.3.5 292 Symptoms and Causes of Network Problems - 12.4 292 Physical Layer Troubleshooting - 12.4.1 292 Data Link Layer Troubleshooting - 12.4.2 294 Network Layer Troubleshooting - 12.4.3 295 Transport Layer Troubleshooting - ACLs - 12.4.4 297 Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298 Application Layer Troubleshooting - 12.4.6 299 Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 Troubleshooting IP Connectivity - 12.5 300 Components of Troubleshooting End-to-End Connectivity - 12.5.1 300 End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301 Step 1 - Verify the Physical Layer - 12.5.3 303 Step 2 - Check for Duplex Mismatches - 12.5.4 304 Step 3 - Verify Addressing on the Local Network - 12.5.5 306 Step 4 - Verify Default Gateway - 12.5.7 310 Troubleshoot IPv6 Default Gateway Example - 12.5.8 311 Step 5 - Verify Correct Path - 12.5.9 314 Step 6 - Verify the Transport Layer - 12.5.10 315 Step 7 - Verify ACLs - 12.5.11 317 Step 8 - Verify DNS - 12.5.12 318 Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 Module Practice and Quiz - 12.6 319 Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319 Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319 What did I learn in this module? - 12.6.3 320 Chapter Quiz - Network Troubleshooting 324 Your Chapter Notes 324 Chapter 13 Network Virtualization 325 Introduction - 13.0 325 Why should I take this module? - 13.0.1 325 What will I learn to do in this module? - 13.0.2 325 Cloud Computing - 13.1 325 Video - Cloud and Virtualization - 13.1.1 325 Cloud Overview - 13.1.2 325 Cloud Services - 13.1.3 326 Cloud Models - 13.1.4 326 Cloud Computing versus Data Center - 13.1.5 327 Check Your Understanding - Cloud Computing - 13.1.6 327 Virtualization - 13.2 327 Cloud Computing and Virtualization - 13.2.1 327 Dedicated Servers - 13.2.2 328 Server Virtualization - 13.2.3 328 Advantages of Virtualization - 13.2.4 328 Abstraction Layers - 13.2.5 329 Type 2 Hypervisors - 13.2.6 330 Check Your Understanding - Virtualization - 13.2.7 330 Virtual Network Infrastructure - 13.3 330 Type 1 Hypervisors - 13.3.1 330 Installing a VM on a Hypervisor - 13.3.2 330 The Complexity of Network Virtualization - 13.3.3 331 Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 Software-Defined Networking - 13.4 332 Video - Software-Defined Networking - 13.4.1 332 Control Plane and Data Plane - 13.4.2 332 Network Virtualization Technologies - 13.4.3 333 Traditional and SDN Architectures - 13.4.4 334 Check Your Understanding - Software-Defined Networking - 13.4.5 334 Controllers - 13.5 334 SDN Controller and Operations - 13.5.1 334 Video - Cisco ACI - 13.5.2 335 Core Components of ACI - 13.5.3 335 Spine-Leaf Topology - 13.5.4 335 SDN Types - 13.5.5 336 APIC-EM Features - 13.5.6 336 APIC-EM Path Trace - 13.5.7 336 Check Your Understanding - Controllers - 13.5.8 337 Module Practice and Quiz - 13.6 337 Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337 What did I learn in this module? - 13.6.2 337 Chapter Quiz - Network Virtualization 341 Your Chapter Notes 341 Chapter 14 Network Automation 343 Introduction - 14.0 343 Why should I take this module? - 14.0.1 343 What will I learn in this module? - 14.0.2 343 Automation Overview - 14.1 343 Video - Automation Everywhere - 14.1.1 343 The Increase in Automation - 14.1.2 344 Thinking Devices - 14.1.3 344 Check Your Understanding - Benefits of Automation - 14.1.4 344 Data Formats - 14.2 344 Video - Data Formats - 14.2.1 344 The Data Formats Concept - 14.2.2 345 Data Format Rules - 14.2.3 345 Compare Data Formats - 14.2.4 346 JSON Data Format - 14.2.5 347 JSON Syntax Rules - 14.2.6 348 YAML Data Format - 14.2.7 349 XML Data Format - 14.2.8 350 Check Your Understanding - Data Formats - 14.2.9 351 APIs - 14.3 351 Video - APIs - 14.3.1 351 The API Concept - 14.3.2 352 An API Example - 14.3.3 352 Open, Internal, and Partner APIs - 14.3.4 352 Types of Web Service APIs - 14.3.5 353 Check Your Understanding - APIs - 14.3.6 354 REST - 14.4 354 Video - REST - 14.4.1 354 REST and RESTful API - 14.4.2 354 RESTful Implementation - 14.4.3 354 URI, URN, and URL - 14.4.4 355 Anatomy of a RESTful Request - 14.4.5 355 RESTful API Applications - 14.4.6 356 Check Your Understanding - REST - 14.4.7 357 Configuration Management Tools - 14.5 357 Video - Configuration Management Tools - 14.5.1 357 Traditional Network Configuration - 14.5.2 358 Network Automation - 14.5.3 358 Configuration Management Tools - 14.5.4 358 Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359 Check Your Understanding - Configuration Management - 14.5.6 360 IBN and Cisco DNA Center - 14.6 360 Video - Intent-Based Networking - 14.6.1 360 Intent-Based Networking Overview - 14.6.2 360 Network Infrastructure as Fabric - 14.6.3 360 Cisco Digital Network Architecture (DNA) - 14.6.4 361 Cisco DNA Center - 14.6.5 362 Video - DNA Center Overview and Platform APIs - 14.6.6 362 Video - DNA Center Design and Provision - 14.6.7 363 Video - DNA Center Policy and Assurance - 14.6.8 363 Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363 Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 Module Practice and Quiz - 14.7 363 What did I learn in this module? - 14.7.1 363 Chapter Quiz - Network Automation 365 Your Chapter Notes 365 9780136634737 TOC 6/18/2020
Series Title: Cisco Networking Academy Program series.
Other Titles: Enterprise networking, security, and automation course booklet (CCVAv7)
Responsibility: Cisco Networking Academy.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.