Home > Store

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)

Register your product to gain access to bonus material or receive a coupon.

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7)

Book

  • Your Price: $34.00
  • List Price: $40.00
  • Usually ships in 24 hours.

About

Features

  • Easy to read, highlight, and review on the go, wherever the Internet is not available
  • Extracted directly from the online course, making this the perfect complement for students taking the online course 
  • An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic Flash-based activities

Description

  • Copyright 2020
  • Dimensions: 8-1/2" x 10-7/8"
  • Pages: 416
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-663473-7
  • ISBN-13: 978-0-13-663473-7

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

  • The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the Your Chapter Notes section.
  • Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.
  • An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes.
The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy Enterprise Networking, Security, and Automation v7.0 (ENSA) online course.

This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.

Related titles: 

CCNA 200-301 Portable Command Guide
Book: 9780135937822
eBook: 9780135937709

Enterprise Networking, Security, and Automation Companion Guide CCNAv7
Book: 9780136634324
eBook: 9780136634249

Enterprise Networking, Security, and Automation Labs & Study Guide CCNAv7
Book: 9780136634690

Sample Content

Table of Contents

Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
    Why should I take this module? - 1.0.1 1
    What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
    Introduction to OSPF - 1.1.1 1
    Components of OSPF - 1.1.2 2
    Link-State Operation - 1.1.3 3
    Single-Area and Multiarea OSPF - 1.1.4 4
    Multiarea OSPF - 1.1.5 4
    OSPFv3 - 1.1.6 5
    Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
    Video - OSPF Packets - 1.2.1 6
    Types of OSPF Packets - 1.2.2 6
    Link-State Updates - 1.2.3 7
    Hello Packet - 1.2.4 7
    Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
    Video - OSPF Operation - 1.3.1 7
    OSPF Operational States - 1.3.2 7
    Establish Neighbor Adjacencies - 1.3.3 8
    Synchronizing OSPF Databases - 1.3.4 9
    The Need for a DR - 1.3.5 10
    LSA Flooding With a DR - 1.3.6 11
    Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
    What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
    Why should I take this module? - 2.0.1 15
    What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
    OSPF Reference Topology - 2.1.1 15
    Router Configuration Mode for OSPF - 2.1.2 16
    Router IDs - 2.1.3 16
    Router ID Order of Precedence - 2.1.4 17
    Configure a Loopback Interface as the Router ID - 2.1.5 17
    Explicitly Configure a Router ID - 2.1.6 18
    Modify a Router ID - 2.1.7 18
    Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
    Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
    The network Command Syntax - 2.2.1 20
    The Wildcard Mask - 2.2.2 20
    Check Your Understanding - The Wildcard Masks - 2.2.3 20
    Configure OSPF Using the network Command - 2.2.4 20
    Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
    Configure OSPF Using the ip ospf Command - 2.2.6 21
    Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
    Passive Interface - 2.2.8 22
    Configure Passive Interfaces - 2.2.9 23
    Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
    OSPF Point-to-Point Networks - 2.2.11 24
    Loopbacks and Point-to-Point Networks - 2.2.12 26
    Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
    OSPF Network Types - 2.3.1 27
    OSPF Designated Router - 2.3.2 27
    OSPF Multiaccess Reference Topology - 2.3.3 27
    Verify OSPF Router Roles - 2.3.4 28
    Verify DR/BDR Adjacencies - 2.3.5 30
    Default DR/BDR Election Process - 2.3.6 32
    DR Failure and Recovery - 2.3.7 33
    The ip ospf priority Command - 2.3.8 33
    Configure OSPF Priority - 2.3.9 34
    Syntax Checker - Configure OSPF Priority - 2.3.10 35
    Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
    Cisco OSPF Cost Metric - 2.4.1 36
    Adjust the Reference Bandwidth - 2.4.2 36
    OSPF Accumulates Costs - 2.4.3 38
    Manually Set OSPF Cost Value - 2.4.4 38
    Test Failover to Backup Route - 2.4.5 39
    Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
    Hello Packet Intervals - 2.4.7 40
    Verify Hello and Dead Intervals - 2.4.8 40
    Modify OSPFv2 Intervals - 2.4.9 42
    Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
    Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
    Propagate a Default Static Route in OSPFv2 - 2.5.1 43
    Verify the Propagated Default Route - 2.5.2 44
    Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
    Verify OSPF Neighbors - 2.6.1 46
    Verify OSPF Protocol Settings - 2.6.2 48
    Verify OSPF Process Information - 2.6.3 48
    Verify OSPF Interface Settings - 2.6.4 50
    Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
    Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
    Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
    Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
    What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
    Why should I take this module? - 3.0.1 57
    What will I learn in this module? - 3.0.2 57
    Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
    Current State of Affairs - 3.1.1 58
    Vectors of Network Attacks - 3.1.2 58
    Data Loss - 3.1.3 59
    Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
    The Hacker - 3.2.1 60
    Evolution of Hackers - 3.2.2 61
    Cyber Criminals - 3.2.3 61
    Hacktivists - 3.2.4 61
    State-Sponsored Hackers - 3.2.5 61
    Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
    Video - Threat Actor Tools - 3.3.1 62
    Introduction to Attack Tools - 3.3.2 62
    Evolution of Security Tools - 3.3.3 62
    Attack Types - 3.3.4 63
    Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
    Overview of Malware - 3.4.1 64
    Viruses and Trojan Horses - 3.4.2 64
    Other Types of Malware - 3.4.3 65
    Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
    Overview of Network Attacks - 3.5.1 66
    Video - Reconnaissance Attacks - 3.5.2 67
    Reconnaissance Attacks - 3.5.3 67
    Video - Access and Social Engineering Attacks - 3.5.4 68
    Access Attacks - 3.5.5 68
    Social Engineering Attacks - 3.5.6 69
    Lab - Social Engineering - 3.5.7 70
    Video - Denial of Service Attacks - 3.5.8 70
    DoS and DDoS Attacks - 3.5.9 70
    Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
    Video - Common IP and ICMP Attacks - 3.6.1 71
    IPv4 and IPv6 - 3.6.2 71
    ICMP Attacks - 3.6.3 71
    Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
    Amplification and Reflection Attacks - 3.6.5 72
    Address Spoofing Attacks - 3.6.6 72
    Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
    TCP Segment Header - 3.7.1 73
    TCP Services - 3.7.2 73
    TCP Attacks - 3.7.3 74
    UDP Segment Header and Operation - 3.7.4 74
    UDP Attacks - 3.7.5 75
    Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
    ARP Vulnerabilities - 3.8.1 75
    ARP Cache Poisoning - 3.8.2 76
    Video - ARP Spoofing - 3.8.3 76
    DNS Attacks - 3.8.4 76
    DNS Tunneling - 3.8.5 78
    DHCP - 3.8.6 78
    DHCP Attacks - 3.8.7 78
    Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
    Confidentiality, Integrity, and Availability - 3.9.1 80
    The Defense-in-Depth Approach - 3.9.2 80
    Firewalls - 3.9.3 80
    IPS - 3.9.4 81
    Content Security Appliances - 3.9.5 81
    Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
    Video - Cryptography - 3.10.1 82
    Securing Communications - 3.10.2 82
    Data Integrity - 3.10.3 83
    Hash Functions - 3.10.4 83
    Origin Authentication - 3.10.5 84
    Data Confidentiality - 3.10.6 85
    Symmetric Encryption - 3.10.7 85
    Asymmetric Encryption - 3.10.8 86
    Diffie-Hellman - 3.10.9 87
    Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
    What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
    Why should I take this module? - 4.0.1 93
    What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
    What is an ACL? - 4.1.1 93
    Packet Filtering - 4.1.2 95
    ACL Operation - 4.1.3 95
    Packet Tracer - ACL Demonstration - 4.1.4 96
    Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
    Wildcard Mask Overview - 4.2.1 96
    Wildcard Mask Types - 4.2.2 97
    Wildcard Mask Calculation - 4.2.3 97
    Wildcard Mask Keywords - 4.2.4 98
    Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
    Limited Number of ACLs per Interface - 4.3.1 99
    ACL Best Practices - 4.3.2 99
    Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
    Standard and Extended ACLs - 4.4.1 100
    Numbered and Named ACLs - 4.4.2 101
    Where to Place ACLs - 4.4.3 102
    Standard ACL Placement Example - 4.4.4 102
    Extended ACL Placement Example - 4.4.5 103
    Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
    What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
    Why should I take this module? - 5.0.1 107
    What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
    Create an ACL - 5.1.1 107
    Numbered Standard IPv4 ACL Syntax - 5.1.2 108
    Named Standard IPv4 ACL Syntax - 5.1.3 109
    Apply a Standard IPv4 ACL - 5.1.4 109
    Numbered Standard IPv4 ACL Example - 5.1.5 110
    Named Standard IPv4 ACL Example - 5.1.6 111
    Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
    Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
    Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
    Two Methods to Modify an ACL - 5.2.1 113
    Text Editor Method - 5.2.2 113
    Sequence Numbers Method - 5.2.3 114
    Modify a Named ACL Example - 5.2.4 115
    ACL Statistics - 5.2.5 116
    Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
    Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
    The access-class Command - 5.3.1 116
    Secure VTY Access Example - 5.3.2 117
    Verify the VTY Port is Secured - 5.3.3 118
    Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
    Extended ACLs - 5.4.1 119
    Numbered Extended IPv4 ACL Syntax - 5.4.2 119
    Protocols and Ports - 5.4.3 120
    Protocols and Port Numbers Configuration Examples - 5.4.4 123
    Apply a Numbered Extended IPv4 ACL - 5.4.5 123
    TCP Established Extended ACL - 5.4.6 123
    Named Extended IPv4 ACL Syntax - 5.4.7 124
    Named Extended IPv4 ACL Example - 5.4.8 125
    Edit Extended ACLs - 5.4.9 126
    Another Named Extended IPv4 ACL Example - 5.4.10 127
    Verify Extended ACLs - 5.4.11 128
    Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
    Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
    Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
    Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
    What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
    Why should I take this module? - 6.0.1 135
    What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
    IPv4 Private Address Space - 6.1.1 135
    What is NAT - 6.1.2 136
    How NAT Works - 6.1.3 137
    NAT Terminology - 6.1.4 137
    Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
    Static NAT - 6.2.1 139
    Dynamic NAT - 6.2.2 139
    Port Address Translation - 6.2.3 139
    Next Available Port - 6.2.4 140
    NAT and PAT Comparison - 6.2.5 140
    Packets without a Layer 4 Segment - 6.2.6 141
    Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
    Advantages of NAT - 6.3.1 142
    Disadvantages of NAT - 6.3.2 142
    Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
    Static NAT Scenario - 6.4.1 143
    Configure Static NAT - 6.4.2 143
    Analyze Static NAT - 6.4.3 144
    Verify Static NAT - 6.4.4 144
    Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
    Dynamic NAT Scenario - 6.5.1 146
    Configure Dynamic NAT - 6.5.2 146
    Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
    Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
    Verify Dynamic NAT - 6.5.5 148
    Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
    PAT Scenario - 6.6.1 150
    Configure PAT to Use a Single IPv4 Address - 6.6.2 150
    Configure PAT to Use an Address Pool - 6.6.3 151
    Analyze PAT - PC to Server - 6.6.4 151
    Analyze PAT - Server to PC - 6.6.5 151
    Verify PAT - 6.6.6 151
    Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
    NAT for IPv6? - 6.7.1 153
    NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
    Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
    Lab - Configure NAT for IPv4 - 6.8.2 154
    What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
    Why should I take this module? - 7.0.1 159
    What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
    LANs and WANs - 7.1.1 159
    Private and Public WANs - 7.1.2 160
    WAN Topologies - 7.1.3 160
    Carrier Connections - 7.1.4 162
    Evolving Networks - 7.1.5 162
    Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
    WAN Standards - 7.2.1 164
    WANs in the OSI Model - 7.2.2 164
    Common WAN Terminology - 7.2.3 165
    WAN Devices - 7.2.4 166
    Serial Communication - 7.2.5 167
    Circuit-Switched Communication - 7.2.6 168
    Packet-Switched Communications - 7.2.7 168
    SDH, SONET, and DWDM - 7.2.8 169
    Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
    Traditional WAN Connectivity Options - 7.3.1 169
    Common WAN Terminology - 7.3.2 169
    Circuit-Switched Options - 7.3.3 170
    Packet-Switched Options - 7.3.4 171
    Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
    Modern WANs - 7.4.1 172
    Modern WAN Connectivity Options - 7.4.2 172
    Ethernet WAN - 7.4.3 173
    MPLS - 7.4.4 174
    Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
    Internet-Based Connectivity Options - 7.5.1 174
    DSL Technology - 7.5.2 175
    DSL Connections - 7.5.3 175
    DSL and PPP - 7.5.4 176
    Cable Technology - 7.5.5 176
    Optical Fiber - 7.5.6 177
    Wireless Internet-Based Broadband - 7.5.7 177
    VPN Technology - 7.5.8 179
    ISP Connectivity Options - 7.5.9 179
    Broadband Solution Comparison - 7.5.10 180
    Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
    Packet Tracer - WAN Concepts - 7.6.1 181
    What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
    Why should I take this module? - 8.0.1 185
    What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
    Virtual Private Networks - 8.1.1 185
    VPN Benefits - 8.1.2 186
    Site-to-Site and Remote-Access VPNs - 8.1.3 186
    Enterprise and Service Provider VPNs - 8.1.4 186
    Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
    Remote-Access VPNs - 8.2.1 187
    SSL VPNs - 8.2.2 187
    Site-to-Site IPsec VPNs - 8.2.3 188
    GRE over IPsec - 8.2.4 188
    Dynamic Multipoint VPNs - 8.2.5 189
    IPsec Virtual Tunnel Interface - 8.2.6 189
    Service Provider MPLS VPNs - 8.2.7 190
    Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
    Video - IPsec Concepts - 8.3.1 190
    IPsec Technologies - 8.3.2 190
    IPsec Protocol Encapsulation - 8.3.3 191
    Confidentiality - 8.3.4 192
    Integrity - 8.3.5 192
    Authentication - 8.3.6 192
    Secure Key Exchange with Diffie-Hellman - 8.3.7 193
    Video - IPsec Transport and Tunnel Mode - 8.3.8 193
    Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
    What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
    Why should I take this module? - 9.0.1 197
    What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
    Video Tutorial - The Purpose of QoS - 9.1.1 197
    Prioritizing Traffic - 9.1.2 197
    Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
    Packet Loss - 9.1.4 199
    Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
    Video Tutorial - Traffic Characteristics - 9.2.1 199
    Network Traffic Trends - 9.2.2 199
    Voice - 9.2.3 200
    Video - 9.2.4 200
    Data - 9.2.5 201
    Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
    Video Tutorial - QoS Algorithms - 9.3.1 202
    Queuing Overview - 9.3.2 202
    First In First Out - 9.3.3 202
    Weighted Fair Queuing (WFQ) - 9.3.4 203
    Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
    Low Latency Queuing (LLQ) - 9.3.6 204
    Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
    Video Tutorial - QoS Models - 9.4.1 204
    Selecting an Appropriate QoS Policy Model - 9.4.2 204
    Best Effort - 9.4.3 205
    Integrated Services - 9.4.4 206
    Differentiated Services - 9.4.5 206
    Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
    Video Tutorial - QoS Implementation Techniques - 9.5.1 208
    Avoiding Packet Loss - 9.5.2 208
    QoS Tools - 9.5.3 208
    Classification and Marking - 9.5.4 209
    Marking at Layer 2 - 9.5.5 210
    Marking at Layer 3 - 9.5.6 210
    Type of Service and Traffic Class Field - 9.5.7 211
    DSCP Values - 9.5.8 211
    Class Selector Bits - 9.5.9 211
    Trust Boundaries - 9.5.10 211
    Congestion Avoidance - 9.5.11 212
    Shaping and Policing - 9.5.12 212
    QoS Policy Guidelines - 9.5.13 213
    Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
    What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
    Why should I take this module? - 10.0.1 217
    What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
    CDP Overview - 10.1.1 217
    Configure and Verify CDP - 10.1.2 218
    Discover Devices by Using CDP - 10.1.3 220
    Syntax Checker - Configure and Verify CDP - 10.1.4 222
    Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
    LLDP Overview - 10.2.1 222
    Configure and Verify LLDP - 10.2.2 222
    Discover Devices by Using LLDP - 10.2.3 223
    Syntax Checker - Configure and Verify LLDP - 10.2.4 225
    Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
    Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
    Time and Calendar Services - 10.3.1 225
    NTP Operation - 10.3.2 226
    Configure and Verify NTP - 10.3.3 227
    Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
    Introduction to SNMP - 10.4.1 229
    SNMP Operation - 10.4.2 230
    SNMP Agent Traps - 10.4.3 230
    SNMP Versions - 10.4.4 231
    Check Your Understanding - SNMP Versions - 10.4.5 232
    Community Strings - 10.4.6 232
    MIB Object ID - 10.4.7 233
    SNMP Polling Scenario - 10.4.8 233
    SNMP Object Navigator - 10.4.9 233
    Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
    Introduction to Syslog - 10.5.1 234
    Syslog Operation - 10.5.2 234
    Syslog Message Format - 10.5.3 235
    Syslog Facilities - 10.5.4 236
    Configure Syslog Timestamp - 10.5.5 236
    Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
    Router File Systems - 10.6.1 237
    Switch File Systems - 10.6.2 240
    Use a Text File to Back Up a Configuration - 10.6.3 241
    Use a Text File to Restore a Configuration - 10.6.4 241
    Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
    USB Ports on a Cisco Router - 10.6.6 242
    Use USB to Back Up and Restore a Configuration - 10.6.7 243
    Password Recovery Procedures - 10.6.8 245
    Password Recovery Example - 10.6.9 245
    Packet Tracer - Back Up Configuration Files - 10.6.10 247
    Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
    Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
    Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
    Video - Managing Cisco IOS Images - 10.7.1 248
    TFTP Servers as a Backup Location - 10.7.2 248
    Backup IOS Image to TFTP Server Example - 10.7.3 249
    Copy an IOS Image to a Device Example - 10.7.4 250
    The boot system Command - 10.7.5 251
    Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
    Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
    Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
    What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
    Why should I take this module? - 11.0.1 259
    What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
    Video - Three-Layer Network Design - 11.1.1 259
    The Need to Scale the Network - 11.1.2 259
    Borderless Switched Networks - 11.1.3 260
    Hierarchy in the Borderless Switched Network - 11.1.4 261
    Access, Distribution, and Core Layer Functions - 11.1.5 262
    Three-Tier and Two-Tier Examples - 11.1.6 262
    Role of Switched Networks - 11.1.7 263
    Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
    Design for Scalability - 11.2.1 263
    Plan for Redundancy - 11.2.2 264
    Reduce Failure Domain Size - 11.2.3 265
    Increase Bandwidth - 11.2.4 265
    Expand the Access Layer - 11.2.5 266
    Tune Routing Protocols - 11.2.6 266
    Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
    Switch Platforms - 11.3.1 266
    Switch Form Factors - 11.3.2 267
    Port Density - 11.3.3 268
    Forwarding Rates - 11.3.4 268
    Power over Ethernet - 11.3.5 269
    Multilayer Switching - 11.3.6 269
    Business Considerations for Switch Selection - 11.3.7 270
    Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
    Router Requirements - 11.4.1 270
    Cisco Routers - 11.4.2 271
    Router Form Factors - 11.4.3 271
    Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
    Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
    What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
    Why should I take this module? - 12.0.1 277
    What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
    Documentation Overview - 12.1.1 277
    Network Topology Diagrams - 12.1.2 278
    Network Device Documentation - 12.1.3 279
    Establish a Network Baseline - 12.1.4 279
    Step 1 - Determine What Types of Data to Collect - 12.1.5 280
    Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
    Step 3 - Determine the Baseline Duration - 12.1.7 280
    Data Measurement - 12.1.8 281
    Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
    General Troubleshooting Procedures - 12.2.1 282
    Seven-Step Troubleshooting Process - 12.2.2 282
    Question End Users - 12.2.3 284
    Gather Information - 12.2.4 285
    Troubleshooting with Layered Models - 12.2.5 286
    Structured Troubleshooting Methods - 12.2.6 286
    Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
    Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
    Software Troubleshooting Tools - 12.3.1 288
    Protocol Analyzers - 12.3.2 289
    Hardware Troubleshooting Tools - 12.3.3 289
    Syslog Server as a Troubleshooting Tool - 12.3.4 290
    Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
    Physical Layer Troubleshooting - 12.4.1 292
    Data Link Layer Troubleshooting - 12.4.2 294
    Network Layer Troubleshooting - 12.4.3 295
    Transport Layer Troubleshooting - ACLs - 12.4.4 297
    Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
    Application Layer Troubleshooting - 12.4.6 299
    Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
    Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
    End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
    Step 1 - Verify the Physical Layer - 12.5.3 303
    Step 2 - Check for Duplex Mismatches - 12.5.4 304
    Step 3 - Verify Addressing on the Local Network - 12.5.5 306
    Step 4 - Verify Default Gateway - 12.5.7 310
    Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
    Step 5 - Verify Correct Path - 12.5.9 314
    Step 6 - Verify the Transport Layer - 12.5.10 315
    Step 7 - Verify ACLs - 12.5.11 317
    Step 8 - Verify DNS - 12.5.12 318
    Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
    Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
    Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
    What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
    Why should I take this module? - 13.0.1 325
    What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
    Video - Cloud and Virtualization - 13.1.1 325
    Cloud Overview - 13.1.2 325
    Cloud Services - 13.1.3 326
    Cloud Models - 13.1.4 326
    Cloud Computing versus Data Center - 13.1.5 327
    Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
    Cloud Computing and Virtualization - 13.2.1 327
    Dedicated Servers - 13.2.2 328
    Server Virtualization - 13.2.3 328
    Advantages of Virtualization - 13.2.4 328
    Abstraction Layers - 13.2.5 329
    Type 2 Hypervisors - 13.2.6 330
    Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
    Type 1 Hypervisors - 13.3.1 330
    Installing a VM on a Hypervisor - 13.3.2 330
    The Complexity of Network Virtualization - 13.3.3 331
    Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
    Video - Software-Defined Networking - 13.4.1 332
    Control Plane and Data Plane - 13.4.2 332
    Network Virtualization Technologies - 13.4.3 333
    Traditional and SDN Architectures - 13.4.4 334
    Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
    SDN Controller and Operations - 13.5.1 334
    Video - Cisco ACI - 13.5.2 335
    Core Components of ACI - 13.5.3 335
    Spine-Leaf Topology - 13.5.4 335
    SDN Types - 13.5.5 336
    APIC-EM Features - 13.5.6 336
    APIC-EM Path Trace - 13.5.7 336
    Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
    Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
    What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
    Why should I take this module? - 14.0.1 343
    What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
    Video - Automation Everywhere - 14.1.1 343
    The Increase in Automation - 14.1.2 344
    Thinking Devices - 14.1.3 344
    Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
    Video - Data Formats - 14.2.1 344
    The Data Formats Concept - 14.2.2 345
    Data Format Rules - 14.2.3 345
    Compare Data Formats - 14.2.4 346
    JSON Data Format - 14.2.5 347
    JSON Syntax Rules - 14.2.6 348
    YAML Data Format - 14.2.7 349
    XML Data Format - 14.2.8 350
    Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
    Video - APIs - 14.3.1 351
    The API Concept - 14.3.2 352
    An API Example - 14.3.3 352
    Open, Internal, and Partner APIs - 14.3.4 352
    Types of Web Service APIs - 14.3.5 353
    Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
    Video - REST - 14.4.1 354
    REST and RESTful API - 14.4.2 354
    RESTful Implementation - 14.4.3 354
    URI, URN, and URL - 14.4.4 355
    Anatomy of a RESTful Request - 14.4.5 355
    RESTful API Applications - 14.4.6 356
    Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
    Video - Configuration Management Tools - 14.5.1 357
    Traditional Network Configuration - 14.5.2 358
    Network Automation - 14.5.3 358
    Configuration Management Tools - 14.5.4 358
    Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
    Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
    Video - Intent-Based Networking - 14.6.1 360
    Intent-Based Networking Overview - 14.6.2 360
    Network Infrastructure as Fabric - 14.6.3 360
    Cisco Digital Network Architecture (DNA) - 14.6.4 361
    Cisco DNA Center - 14.6.5 362
    Video - DNA Center Overview and Platform APIs - 14.6.6 362
    Video - DNA Center Design and Provision - 14.6.7 363
    Video - DNA Center Policy and Assurance - 14.6.8 363
    Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
    Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
    What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365


9780136634737   TOC   6/18/2020


Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020