0%

Book Description

Enterprise Networking, Security, and Automation (CCNA v7) Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the Enterprise Networking, Security, and Automation course and organize your time.

 

The book's features help you focus on important concepts to succeed in this course:

  • Chapter Objectives – Review core concepts by answering the focus questions listed at the beginning of each chapter.

  • Key Terms – Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.

  • Glossary – Consult the comprehensive Glossary with more than 250 terms.

  • Summary of Activities and Labs – Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.

  • Check Your Understanding – Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

  • How To – Look for this icon to study the steps you need to learn to perform certain tasks.

  • Interactive Activities – Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.

  • Packet Tracer Activities – Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.

  • Videos – Watch the videos embedded within the online course.

  • Hands-on Labs – Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide.

Part of the Cisco Networking Academy Series from Cisco Press, books in this series support and complement the Cisco Networking Academy curriculum.

Table of Contents

  1. Cover Page
  2. About This eBook
  3. Title Page
  4. Copyright Page
  5. About the Contributing Authors
  6. Contents at a Glance
  7. Reader Services
  8. Contents
  9. Command Syntax Conventions
  10. Introduction
    1. Who Should Read This Book
    2. Book Features
  11. Figure Credits
  12. Chapter 1. Single-Area OSPFv2 Concepts
    1. Objectives
    2. Key Terms
    3. Introduction (1.0)
    4. OSPF Features and Characteristics (1.1)
    5. OSPF Packets (1.2)
    6. OSPF Operation (1.3)
    7. Summary (1.4)
    8. Practice
    9. Check Your Understanding
  13. Chapter 2. Single-Area OSPFv2 Configuration
    1. Objectives
    2. Key Terms
    3. Introduction (2.0)
    4. OSPF Router ID (2.1)
    5. Point-to-Point OSPF Networks (2.2)
    6. Multiaccess OSPF Networks (2.3)
    7. Modify Single-Area OSPFv2 (2.4)
    8. Default Route Propagation (2.5)
    9. Verify Single-Area OSPFv2 (2.6)
    10. Summary (2.7)
    11. Practice
    12. Check Your Understanding
  14. Chapter 3. Network Security Concepts
    1. Objectives
    2. Key Terms
    3. Introduction
    4. Current State of Cybersecurity (3.1)
    5. Threat Actors (3.2)
    6. Threat Actor Tools (3.3)
    7. Malware (3.4)
    8. Common Network Attacks (3.5)
    9. IP Vulnerabilities and Threats (3.6)
    10. TCP and UDP Vulnerabilities (3.7)
    11. IP Services
    12. Network Security Best Practices (3.9)
    13. Cryptography (3.10)
    14. Summary (3.11)
    15. Practice
    16. Check Your Understanding
  15. Chapter 4. ACL Concepts
    1. Objectives
    2. Key Terms
    3. Introduction (4.0)
    4. Purpose of ACLs (4.1)
    5. Wildcard Masks in ACLs (4.2)
    6. Guidelines for ACL Creation (4.3)
    7. Types of IPv4 ACLs (4.4)
    8. Summary (4.5)
    9. Practice
    10. Check Your Understanding Questions
  16. Chapter 5. ACLs for IPv4 Configuration
    1. Objectives
    2. Key Term
    3. Introduction (5.0)
    4. Configure Standard IPv4 ACLs (5.1)
    5. Modify IPv4 ACLs (5.2)
    6. Secure VTY Ports with a Standard IPv4 ACL (5.3)
    7. Configure Extended IPv4 ACLs (5.4)
    8. Summary (5.5)
    9. Practice
    10. Check Your Understanding Questions
  17. Chapter 6. NAT for IPv4
    1. Objectives
    2. Key Terms
    3. Introduction (6.0)
    4. NAT Characteristics (6.1)
    5. Types of NAT (6.2)
    6. NAT Advantages and Disadvantages (6.3)
    7. Static NAT (6.4)
    8. Dynamic NAT (6.5)
    9. PAT (6.6)
    10. NAT64 (6.7)
    11. Summary (6.8)
    12. Practice
    13. Check Your Understanding Questions
  18. Chapter 7. WAN Concepts
    1. Objectives
    2. Key Terms
    3. Introduction (7.0)
    4. Purpose of WANs (7.1)
    5. WAN Operations (7.2)
    6. Traditional WAN Connectivity (7.3)
    7. Modern WAN Connectivity (7.4)
    8. Internet-Based Connectivity (7.5)
    9. Summary (7.6)
    10. Practice
    11. Check Your Understanding Questions
  19. Chapter 8. VPN and IPsec Concepts
    1. Objectives
    2. Key Terms
    3. Introduction (8.0)
    4. VPN Technology (8.1)
    5. Types of VPNs (8.2)
    6. IPsec (8.3)
    7. Summary (8.4)
    8. Practice
    9. Check Your Understanding Questions
  20. Chapter 9. QoS Concepts
    1. Objectives
    2. Key Terms
    3. Introduction (9.0)
    4. Network Transmission Quality (9.1)
    5. Traffic Characteristics (9.2)
    6. Queuing Algorithms (9.3)
    7. QoS Models (9.4)
    8. QoS Implementation Techniques (9.5)
    9. Summary (9.6)
    10. Practice
    11. Check Your Understanding Questions
  21. Chapter 10. Network Management
    1. Objectives
    2. Key Terms
    3. Introduction (10.0)
    4. Device Discovery with CDP (10.1)
    5. Device Discovery with LLDP (10.2)
    6. NTP (10.3)
    7. SNMP
    8. Syslog (10.5)
    9. Router and Switch File Maintenance (10.6)
    10. IOS Image Management
    11. Summary (10.8)
    12. Practice
    13. Check Your Understanding Questions
  22. Chapter 11. Network Design
    1. Objectives
    2. Key Terms
    3. Introduction (11.0)
    4. Hierarchical Networks (11.1)
    5. Scalable Networks (11.2)
    6. Switch Hardware (11.3)
    7. Router Hardware (11.4)
    8. Summary (11.5)
    9. Practice
    10. Check Your Understanding Questions
  23. Chapter 12. Network Troubleshooting
    1. Objectives
    2. Key Terms
    3. Introduction (12.0)
    4. Network Documentation (12.1)
    5. Troubleshooting Process (12.2)
    6. Troubleshooting Tools (12.3)
    7. Symptoms and Causes of Network Problems (12.4)
    8. Troubleshooting IP Connectivity (12.5)
    9. Summary (12.6)
    10. Practice
    11. Check Your Understanding Questions
  24. Chapter 13. Network Virtualization
    1. Objectives
    2. Key Terms
    3. Introduction (13.0)
    4. Cloud Computing (13.1)
    5. Virtualization (13.2)
    6. Virtual Network Infrastructure (13.3)
    7. Software-Defined Networking (13.4)
    8. Controllers (13.5)
    9. Summary (13.6)
    10. Practice
    11. Check Your Understanding Questions
  25. Chapter 14. Network Automation
    1. Objectives
    2. Key Terms
    3. Introduction (14.0)
    4. Automation Overview (14.1)
    5. Data Formats (14.2)
    6. APIs (14.3)
    7. REST (14.4)
    8. Configuration Management Tools (14.5)
    9. IBN and Cisco DNA Center (14.6)
    10. Summary (14.7)
    11. Practice
    12. Check Your Understanding Questions
  26. Appendix A. Answers to the “Check Your Understanding” Questions
  27. Glossary
  28. Index
  29. Code Snippets
44.220.59.236