Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Del i serien Companion Guide
1 091 kr
Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt över 249 kr.
Beskrivning
Enterprise Networking, Security, and Automation Companion Guide is the official supplemental textbook for the Enterprise Networking, Security, and Automation v7 course in the Cisco Networking Academy CCNA curriculum.
This course describes the architectures and considerations related to designing, securing, operating, and troubleshooting enterprise networks. You will implement the OSPF dynamic routing protocol, identify and protect against cybersecurity threats, configure access control lists (ACLs), implement Network Address Translation (NAT), and learn about WANs and IPsec VPNs. You will also learn about QoS mechanisms, network management tools, network virtualization, and network automation.
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book’s features help you focus on important concepts to succeed in this course:
* Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.* Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary: Consult the comprehensive Glossary with more than 500 terms.
* Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
How To: Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities: Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
Videos: Watch the videos embedded within the online course.
Packet Tracer Activities: Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
Hands-on Labs: Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide.
This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.Related titles: CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 31 Days Before Your CCNA Exam Book: 9780135964088 eBook: 9780135964231 CCNA 200-301 Official Cert Guide, Volume 1 Book: 9780135792735 Premium Edition: 9780135792728 CCNA 200-301 Official Cert Guide, Volume 2 Book: 9781587147135 Premium Edition: 9780135262719
Produktinformation
- Utgivningsdatum:2020-10-15
- Höjd:203 x 234 x 30 mm
- Vikt:1 248 g
- Språk:Engelska
- Serie:Companion Guide
- Antal sidor:800
- Upplaga:1
- Förlag:Pearson Education
- EAN:9780136634324
Utforska kategorier
Mer om författaren
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industry—developing foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."
Innehållsförteckning
- Introduction xxxiChapter 1 Single-Area OSPFv2 Concepts 1Objectives 1Key Terms 1Introduction (1.0) 3OSPF Features and Characteristics (1.1) 3Introduction to OSPF (1.1.1) 3Components of OSPF (1.1.2) 4Routing Protocol Messages 4Data Structures 4Algorithm 5Link-State Operation (1.1.3) 61. Establish Neighbor Adjacencies 62. Exchange Link-State Advertisements 63. Build the Link-State Database 74. Execute the SPF Algorithm 85. Choose the Best Route 8Single-Area and Multiarea OSPF (1.1.4) 9Multiarea OSPF (1.1.5) 10OSPFv3 (1.1.6) 12OSPF Packets (1.2) 13Types of OSPF Packets (1.2.2) 13Link-State Updates (1.2.3) 14Hello Packet (1.2.4) 15OSPF Operation (1.3) 17OSPF Operational States (1.3.2) 17Establish Neighbor Adjacencies (1.3.3) 181. Down State to Init State 182. The Init State 193. Two-Way State 194. Elect the DR and BDR 20Synchronizing OSPF Databases (1.3.4) 201. Decide First Router 212. Exchange DBDs 213. Send an LSR 22The Need for a DR (1.3.5) 23LSA Flooding with a DR (1.3.6) 24Flooding LSAs 24LSAs and DR 25Summary (1.4) 27OSPF Features and Characteristics 27OSPF Packets 28OSPF Operation 28Practice 29Check Your Understanding 29Chapter 2 Single-Area OSPFv2 Configuration 33Objectives 33Key Terms 33Introduction (2.0) 34OSPF Router ID (2.1) 34OSPF Reference Topology (2.1.1) 34Router Configuration Mode for OSPF (2.1.2) 35Router IDs (2.1.3) 36Router ID Order of Precedence (2.1.4) 36Configure a Loopback Interface as the Router ID (2.1.5) 37Explicitly Configure a Router ID (2.1.6) 38Modify a Router ID (2.1.7) 39Point-to-Point OSPF Networks (2.2) 40The network Command Syntax (2.2.1) 40The Wildcard Mask (2.2.2) 41Configure OSPF Using the network Command (2.2.4) 41Configure OSPF Using the ip ospf Command (2.2.6) 43Passive Interface (2.2.8) 44Configure Passive Interfaces (2.2.9) 45OSPF Point-to-Point Networks (2.2.11) 46Loopbacks and Point-to-Point Networks (2.2.12) 48Multiaccess OSPF Networks (2.3) 49OSPF Network Types (2.3.1) 49OSPF Designated Router (2.3.2) 49OSPF Multiaccess Reference Topology (2.3.3) 51Verify OSPF Router Roles (2.3.4) 52R1 DROTHER 52R2 BDR 53R3 DR 53Verify DR/BDR Adjacencies (2.3.5) 54R1 Adjacencies 55R2 Adjacencies 55R3 Adjacencies 56Default DR/BDR Election Process (2.3.6) 56DR Failure and Recovery (2.3.7) 58R3 Fails 58R3 Rejoins Network 59R4 Joins Network 59R2 Fails 59The ip ospf priority Command (2.3.8) 61Configure OSPF Priority (2.3.9) 61Modify Single-Area OSPFv2 (2.4) 63Cisco OSPF Cost Metric (2.4.1) 63Adjust the Reference Bandwidth (2.4.2) 64OSPF Accumulates Costs (2.4.3) 66Manually Set OSPF Cost Value (2.4.4) 67Test Failover to Backup Route (2.4.5) 69Hello Packet Intervals (2.4.7) 69Verify Hello and Dead Intervals (2.4.8) 70Modify OSPFv2 Intervals (2.4.9) 71Default Route Propagation (2.5) 73Propagate a Default Static Route in OSPFv2 (2.5.1) 74Verify the Propagated Default Route (2.5.2) 75Verify Single-Area OSPFv2 (2.6) 77Verify OSPF Neighbors (2.6.1) 77Verify OSPF Protocol Settings (2.6.2) 79Verify OSPF Process Information (2.6.3) 80Verify OSPF Interface Settings (2.6.4) 81Summary (2.7) 83OSPF Router ID 83Point-to-Point OSPF Networks 83OSPF Network Types 84Modify Single-Area OSPFv2 85Default Route Propagation 86Verify Single-Area OSPFv2 86Practice 87Check Your Understanding 88Chapter 3 Network Security Concepts 93Objectives 93Key Terms 93Introduction 95Ethical Hacking Statement (3.0.3) 95Current State of Cybersecurity (3.1) 95Current State of Affairs (3.1.1) 95Vectors of Network Attacks (3.1.2) 96Data Loss (3.1.3) 97Threat Actors (3.2) 98The Hacker (3.2.1) 98Evolution of Hackers (3.2.2) 99Cyber Criminals (3.2.3) 100Hacktivists (3.2.4) 100State-Sponsored Hackers (3.2.5) 100Threat Actor Tools (3.3) 101Introduction to Attack Tools (3.3.2) 101Evolution of Security Tools (3.3.3) 102Attack Types (3.3.4) 104Malware (3.4) 106Overview of Malware (3.4.1) 106Viruses and Trojan Horses (3.4.2) 106Other Types of Malware (3.4.3) 108Common Network Attacks (3.5) 109Overview of Network Attacks (3.5.1) 109Reconnaissance Attacks (3.5.3) 109Access Attacks (3.5.5) 110Trust Exploitation Example 111Port Redirection Example 112Man-in-the-Middle Attack Example 112Buffer Overflow Attack 112Social Engineering Attacks (3.5.6) 114DoS and DDoS Attacks (3.5.9) 115DoS Attack 116DDoS Attack 116IP Vulnerabilities and Threats (3.6) 117IPv4 and IPv6 (3.6.2) 118ICMP Attacks (3.6.3) 118Amplification and Reflection Attacks (3.6.5) 119Address Spoofing Attacks (3.6.6) 120TCP and UDP Vulnerabilities (3.7) 122TCP Segment Header (3.7.1) 122TCP Services (3.7.2) 123TCP Attacks (3.7.3) 124TCP SYN Flood Attack 124TCP Reset Attack 125TCP Session Hijacking 126UDP Segment Header and Operation (3.7.4) 126UDP Attacks (3.7.5) 127UDP Flood Attacks 127IP Services 127ARP Vulnerabilities (3.8.1) 127ARP Cache Poisoning (3.8.2) 128ARP Request 128ARP Reply 129Spoofed Gratuitous ARP Replies 130DNS Attacks (3.8.4) 131DNS Open Resolver Attacks 131DNS Stealth Attacks 132DNS Domain Shadowing Attacks 132DNS Tunneling (3.8.5) 132DHCP (3.8.6) 133DHCP Attacks (3.8.7) 1341. Client Broadcasts DHCP Discovery Messages 1342. DHCP Servers Respond with Offers 1343. Client Accepts Rogue DHCP Request 1364. Rogue DHCP Acknowledges the Request 136Network Security Best Practices (3.9) 137Confidentiality, Integrity, and Availability (3.9.1) 137The Defense-in-Depth Approach (3.9.2) 138Firewalls (3.9.3) 139IPS (3.9.4) 140Content Security Appliances (3.9.5) 141Cisco Email Security Appliance (ESA) 142Cisco Web Security Appliance (WSA) 142Cryptography (3.10) 143Securing Communications (3.10.2) 143Data Integrity (3.10.3) 144Hash Functions (3.10.4) 145MD5 with 128-Bit Digest 145SHA Hashing Algorithm 146SHA-2 146SHA-3 146Origin Authentication (3.10.5) 147HMAC Hashing Algorithm 147Creating the HMAC Value 148Verifying the HMAC Value 149Cisco Router HMAC Example 149Data Confidentiality (3.10.6) 150Symmetric Encryption (3.10.7) 151Asymmetric Encryption (3.10.8) 152Diffie-Hellman (3.10.9) 155Summary (3.11) 157Current State of Cybersecurity 157Threat Actors 157Threat Actor Tools 157Malware 157Common Network Attacks 158IP Vulnerabilities and Threats 158TCP and UDP Vulnerabilities 158IP Services 158Network Security Best Practices 159Cryptography 159Practice 159Check Your Understanding 160Chapter 4 ACL Concepts 163Objectives 163Key Terms 163Introduction (4.0) 164Purpose of ACLs (4.1) 164What Is an ACL? (4.1.1) 164Packet Filtering (4.1.2) 165ACL Operation (4.1.3) 166Wildcard Masks in ACLs (4.2) 168Wildcard Mask Overview (4.2.1) 168Wildcard Mask Types (4.2.2) 169Wildcard to Match a Host 169Wildcard Mask to Match an IPv4 Subnet 169Wildcard Mask to Match an IPv4 Address Range 170Wildcard Mask Calculation (4.2.3) 170Example 1 171Example 2 171Example 3 171Example 4 172Wildcard Mask Keywords (4.2.4) 172Guidelines for ACL Creation (4.3) 173Limited Number of ACLs per Interface (4.3.1) 173ACL Best Practices (4.3.2) 174Types of IPv4 ACLs (4.4) 175Standard and Extended ACLs (4.4.1) 175Numbered and Named ACLs (4.4.2) 176Numbered ACLs 176Named ACLs 177Where to Place ACLs (4.4.3) 177Standard ACL Placement Example (4.4.4) 179Extended ACL Placement Example (4.4.5) 180Summary (4.5) 182Purpose of ACLs 182Wildcard Masks 182Guidelines for ACL Creation 183Types of IPv4 ACLs 183Practice 184Check Your Understanding Questions 184Chapter 5 ACLs for IPv4 Configuration 187Objectives 187Key Term 187Introduction (5.0) 188Configure Standard IPv4 ACLs (5.1) 188Create an ACL (5.1.1) 188Numbered Standard IPv4 ACL Syntax (5.1.2) 188Named Standard IPv4 ACL Syntax (5.1.3) 189Apply a Standard IPv4 ACL (5.1.4) 190Numbered Standard IPv4 ACL Example (5.1.5) 191Named Standard IPv4 ACL Example (5.1.6) 193Modify IPv4 ACLs (5.2) 195Two Methods to Modify an ACL (5.2.1) 196Text Editor Method (5.2.2) 196Sequence Numbers Method (5.2.3) 197Modify a Named ACL Example (5.2.4) 198ACL Statistics (5.2.5) 199Secure VTY Ports with a Standard IPv4 ACL (5.3) 200The access-class Command (5.3.1) 200Secure VTY Access Example (5.3.2) 200Verify the VTY Port Is Secured (5.3.3) 202Configure Extended IPv4 ACLs (5.4) 203Extended ACLs (5.4.1) 203Numbered Extended IPv4 ACL Syntax (5.4.2) 204Protocols and Ports (5.4.3) 206Protocol Options 206Port Keyword Options 207Protocols and Port Numbers Configuration Examples (5.4.4) 208Apply a Numbered Extended IPv4 ACL (5.4.5) 209TCP Established Extended ACL (5.4.6) 210Named Extended IPv4 ACL Syntax (5.4.7) 212Named Extended IPv4 ACL Example (5.4.8) 212Edit Extended ACLs (5.4.9) 213Another Named Extended IPv4 ACL Example (5.4.10) 214Verify Extended ACLs (5.4.11) 216show ip interface 216show access-lists 217show running-config 218Summary (5.5) 219Configure Standard IPv4 ACLs 219Modify IPv4 ACLs 219Secure VTY Ports with a Standard IPv4 ACL 220Configure Extended IPv4 ACLs 220Practice 221Check Your Understanding Questions 222Chapter 6 NAT for IPv4 225Objectives 225Key Terms 225Introduction (6.0) 226NAT Characteristics (6.1) 226IPv4 Private Address Space (6.1.1) 226What Is NAT? (6.1.2) 227How NAT Works (6.1.3) 228NAT Terminology (6.1.4) 229Inside Local 230Inside Global 230Outside Global 231Outside Local 231Types of NAT (6.2) 231Static NAT (6.2.1) 231Dynamic NAT (6.2.2) 232Port Address Translation (6.2.3) 233Next Available Port (6.2.4) 235NAT and PAT Comparison (6.2.5) 236NAT 236PAT 237Packets Without a Layer 4 Segment (6.2.6) 237NAT Advantages and Disadvantages (6.3) 238Advantages of NAT (6.3.1) 238Disadvantages of NAT (6.3.2) 238Static NAT (6.4) 239Static NAT Scenario (6.4.1) 240Configure Static NAT (6.4.2) 240Analyze Static NAT (6.4.3) 241Verify Static NAT (6.4.4) 242Dynamic NAT (6.5) 244Dynamic NAT Scenario (6.5.1) 244Configure Dynamic NAT (6.5.2) 245Analyze Dynamic NAT—Inside to Outside (6.5.3) 247Analyze Dynamic NAT—Outside to Inside (6.5.4) 248Verify Dynamic NAT (6.5.5) 249PAT (6.6) 251PAT Scenario (6.6.1) 251Configure PAT to Use a Single IPv4 Address (6.6.2) 252Configure PAT to Use an Address Pool (6.6.3) 253Analyze PAT—PC to Server (6.6.4) 254Analyze PAT—Server to PC (6.6.5) 255Verify PAT (6.6.6) 256NAT64 (6.7) 258NAT for IPv6? (6.7.1) 258NAT64 (6.7.2) 258Summary (6.8) 260NAT Characteristics 260Types of NAT 260NAT Advantages and Disadvantages 261Static NAT 261Dynamic NAT 262PAT 262NAT64 263Practice 264Check Your Understanding Questions 264Chapter 7 WAN Concepts 269Objectives 269Key Terms 269Introduction (7.0) 272Purpose of WANs (7.1) 272LANs and WANs (7.1.1) 272Private and Public WANs (7.1.2) 273WAN Topologies (7.1.3) 274Point-to-Point Topology 274Hub-and-Spoke Topology 275Dual-homed Topology 276Fully Meshed Topology 276Partially Meshed Topology 277Carrier Connections (7.1.4) 278Single-Carrier WAN Connection 278Dual-Carrier WAN Connection 278Evolving Networks (7.1.5) 279Small Network 279Campus Network 280Branch Network 281Distributed Network 282WAN Operations (7.2) 283WAN Standards (7.2.1) 283WANs in the OSI Model (7.2.2) 284Layer 1 Protocols 284Layer 2 Protocols 284Common WAN Terminology (7.2.3) 285WAN Devices (7.2.4) 287Serial Communication (7.2.5) 289Circuit-Switched Communication (7.2.6) 290Packet-Switched Communications (7.2.7) 290SDH, SONET, and DWDM (7.2.8) 291Traditional WAN Connectivity (7.3) 292Traditional WAN Connectivity Options (7.3.1) 293Common WAN Terminology (7.3.2) 293Circuit-Switched Options (7.3.3) 295Public Service Telephone Network (PSTN) 295Integrated Services Digital Network (ISDN) 295Packet-Switched Options (7.3.4) 295Frame Relay 295Asynchronous Transfer Mode (ATM) 296Modern WAN Connectivity (7.4) 296Modern WANs (7.4.1) 296Modern WAN Connectivity Options (7.4.2) 297Dedicated Broadband 297Packet-Switched 298Internet-Based Broadband 298Ethernet WAN (7.4.3) 298MPLS (7.4.4) 300Internet-Based Connectivity (7.5) 301Internet-Based Connectivity Options (7.5.1) 301Wired Options 302Wireless Options 302DSL Technology (7.5.2) 302DSL Connections (7.5.3) 303DSL and PPP (7.5.4) 303Host with PPPoE Client 304Router PPPoE Client 304Cable Technology (7.5.5) 305Optical Fiber (7.5.6) 305Wireless Internet-Based Broadband (7.5.7) 306Municipal Wi-Fi 306Cellular 306Satellite Internet 307WiMAX 307VPN Technology (7.5.8) 308ISP Connectivity Options (7.5.9) 309Single-Homed 309Dual-Homed 309Multihomed 309Dual-Multihomed 310Broadband Solution Comparison (7.5.10) 311Summary (7.6) 312Purpose of WANs 312WAN Operations 312Traditional WAN Connectivity 313Modern WAN Connectivity 314Internet-Based Connectivity 314Practice 315Check Your Understanding Questions 316Chapter 8 VPN and IPsec Concepts 319Objectives 319Key Terms 319Introduction (8.0) 321VPN Technology (8.1) 321Virtual Private Networks (8.1.1) 321VPN Benefits (8.1.2) 322Site-to-Site and Remote-Access VPNs (8.1.3) 323Site-to-Site VPN 323Remote-Access VPN 324Enterprise and Service Provider VPNs (8.1.4) 324Types of VPNs (8.2) 325Remote-Access VPNs (8.2.1) 325SSL VPNs (8.2.2) 326Site-to-Site IPsec VPNs (8.2.3) 327GRE over IPsec (8.2.4) 328Dynamic Multipoint VPNs (8.2.5) 330IPsec Virtual Tunnel Interface (8.2.6) 331Service Provider MPLS VPNs (8.2.7) 332IPsec (8.3) 333IPsec Technologies (8.3.2) 333IPsec Protocol Encapsulation (8.3.3) 336Confidentiality (8.3.4) 336Integrity (8.3.5) 338Authentication (8.3.6) 339Secure Key Exchange with Diffie-Hellman (8.3.7) 342Summary (8.4) 344VPN Technology 344Types of VPNs 344IPsec 344Practice 345Check Your Understanding Questions 345Chapter 9 QoS Concepts 351Objectives 351Key Terms 351Introduction (9.0) 353Network Transmission Quality (9.1) 353Prioritizing Traffic (9.1.2) 353Bandwidth, Congestion, Delay, and Jitter (9.1.3) 354Packet Loss (9.1.4) 355Traffic Characteristics (9.2) 357Network Traffic Trends (9.2.2) 357Voice (9.2.3) 358Video (9.2.4) 358Data (9.2.5) 360Queuing Algorithms (9.3) 361Queuing Overview (9.3.2) 361First-In, First Out (9.3.3) 362Weighted Fair Queuing (WFQ) (9.3.4) 362Limitations of WFQ 363Class-Based Weighted Fair Queuing (CBWFQ) (9.3.5) 364Low Latency Queuing (LLQ) (9.3.6) 365QoS Models (9.4) 366Selecting an Appropriate QoS Policy Model (9.4.2) 366Best Effort (9.4.3) 366Integrated Services (9.4.4) 367Differentiated Services (9.4.5) 369QoS Implementation Techniques (9.5) 370Avoiding Packet Loss (9.5.2) 371QoS Tools (9.5.3) 371Classification and Marking (9.5.4) 372Marking at Layer 2 (9.5.5) 373Marking at Layer 3 (9.5.6) 374Type of Service and Traffic Class Field (9.5.7) 375DSCP Values (9.5.8) 376Class Selector Bits (9.5.9) 377Trust Boundaries (9.5.10) 378Congestion Avoidance (9.5.11) 379Shaping and Policing (9.5.12) 380QoS Policy Guidelines (9.5.13) 381Summary (9.6) 382Network Transmission Quality 382Traffic Characteristics 382Queuing Algorithms 383QoS Models 383QoS Implementation Techniques 384Practice 385Check Your Understanding Questions 385Chapter 10 Network Management 389Objectives 389Key Terms 389Introduction (10.0) 390Device Discovery with CDP (10.1) 390CDP Overview (10.1.1) 390Configure and Verify CDP (10.1.2) 391Discover Devices by Using CDP (10.1.3) 393Device Discovery with LLDP (10.2) 396LLDP Overview (10.2.1) 396Configure and Verify LLDP (10.2.2) 397Discover Devices by Using LLDP (10.2.3) 397NTP (10.3) 400Time and Calendar Services (10.3.1) 400NTP Operation (10.3.2) 401Stratum 0 402Stratum 1 402Stratum 2 and Lower 402Configure and Verify NTP (10.3.3) 402SNMP 405Introduction to SNMP (10.4.1) 405SNMP Operation (10.4.2) 406SNMP Agent Traps (10.4.3) 408SNMP Versions (10.4.4) 409Community Strings (10.4.6) 412MIB Object ID (10.4.7) 415SNMP Polling Scenario (10.4.8) 415SNMP Object Navigator (10.4.9) 417Syslog (10.5) 418Introduction to Syslog (10.5.1) 418Syslog Operation (10.5.2) 420Syslog Message Format (10.5.3) 421Syslog Facilities (10.5.4) 422Configure Syslog Timestamp (10.5.5) 422Router and Switch File Maintenance (10.6) 423Router File Systems (10.6.1) 424The Flash File System 425The NVRAM File System 425Switch File Systems (10.6.2) 426Use a Text File to Back Up a Configuration (10.6.3) 427Use a Text File to Restore a Configuration (10.6.4) 428Use TFTP to Back Up and Restore a Configuration (10.6.5) 428USB Ports on a Cisco Router (10.6.6) 430Use USB to Back Up and Restore a Configuration (10.6.7) 430Restore Configurations with a USB Flash Drive 432Password Recovery Procedures (10.6.8) 433Password Recovery Example (10.6.9) 433Step 1. Enter the ROMMON mode 433Step 2. Change the configuration register 434Step 3. Copy the startup-config to the running-config 434Step 4. Change the password 435Step 5. Save the running-config as the new startup-config 435Step 6. Reload the device 435IOS Image Management 437TFTP Servers as a Backup Location (10.7.2) 437Backup IOS Image to TFTP Server Example (10.7.3) 438Step 1. Ping the TFTP server 438Step 2. Verify image size in flash 439Step 3. Copy the image to the TFTP server 439Copy an IOS Image to a Device Example (10.7.4) 439Step 1. Ping the TFTP server 440Step 2. Verify the amount of free flash 440Step 3. Copy the new IOS image to flash 441The boot system Command (10.7.5) 441Summary (10.8) 443Device Discovery with CDP 443Device Discovery with LLDP 443NTP 443SNMP 444Syslog 444Router and Switch File Maintenance 445IOS Image Management 446Practice 446Check Your Understanding Questions 447Chapter 11 Network Design 453Objectives 453Key Terms 453Introduction (11.0) 455Hierarchical Networks (11.1) 455The Need to Scale the Network (11.1.2) 455Borderless Switched Networks (11.1.3) 458Hierarchy in the Borderless Switched Network (11.1.4) 459Three-Tier Model 460Two-Tier Model 461Access, Distribution, and Core Layer Functions (11.1.5) 462Access Layer 462Distribution Layer 462Core Layer 462Three-Tier and Two-Tier Examples (11.1.6) 462Three-Tier Example 463Two-Tier Example 464Role of Switched Networks (11.1.7) 464Scalable Networks (11.2) 465Design for Scalability (11.2.1) 465Redundant Links 466Multiple Links 466Scalable Routing Protocol 467Wireless Connectivity 468Plan for Re
Mer från samma författare
Switching, Routing, and Wireless Essentials Labs and Study Guide (CCNAv7)
Allan Johnson, Cisco Networking Academy
696 kr
Introduction to Networks Labs and Study Guide (CCNAv7)
Allan Johnson, Cisco Networking Academy
744 kr
Enterprise Networking, Security, and Automation Labs and Study Guide (CCNAv7)
Allan Johnson, Cisco Networking Academy
696 kr
Switching, Routing, and Wireless Essentials Course Booklet (CCNAv7)
Cisco Networking Academy, Allan Johnson
466 kr
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)
Allan Johnson, Cisco Networking Academy
466 kr
Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7)
Cisco Networking Academy
925 kr
Mer från samma serie
Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7)
Cisco Networking Academy
925 kr
Du kanske också är intresserad av
Switching, Routing, and Wireless Essentials Companion Guide (CCNAv7)
Cisco Networking Academy
925 kr
Introduction to Networks (CCNAv7) Companion Guide & Labs and Study Guide Value Pack
Cisco Networking Academy, Allan Johnson
1 843 kr