Home Page Icon
Home Page
Table of Contents for
Part I: Network Fundamentals
Close
Part I: Network Fundamentals
by Scott D. Empson
CCNA 200-301 Portable Command Guide, 5th Edition
Cover Page
About This E-Book
Title Page
Copyright Page
Contents at a Glance
Contents
About the Author
About the Technical Reviewer
Dedication
Acknowledgments
Reader Services
Command Syntax Conventions
Introduction
Private Addressing Used in This Book
Who Should Read This Book
Optional Sections
Organization of This Book
Did I Miss Anything?
Part I: Network Fundamentals
Chapter 1. IPv4 Addressing—How It Works
What Are IPv4 Addresses Used For?
What Does an IPv4 Address Look Like?
Network and Subnetwork Masks
Ways to Write a Network or Subnet Mask
Network, Node, and Broadcast Addresses
Classes of IPv4 Addresses
Classless Addressing
Lessons Learned
Chapter 2. How to Subnet IPv4 Addresses
Subnetting a Class C Network Using Binary
Subnetting a Class B Network Using Binary
Binary ANDing
Chapter 3. Variable Length Subnet Masking (VLSM)
IP Subnet Zero
VLSM Example
Chapter 4. Route Summarization
Example for Understanding Route Summarization
Route Summarization and Route Flapping
Requirements for Route Summarization
Chapter 5. IPv6 Addressing—How It Works
IPv6: A Very Brief Introduction
What Does an IPv6 Address Look Like?
Reducing the Notation of an IPv6 Address
Prefix Length Notation
IPv6 Address Types
Chapter 6. Cables and Connections
Connecting a Rollover Cable to Your Router or Switch
Using a USB Cable to Connect to Your Router or Switch
Terminal Settings
LAN Connections
Serial Cable Types
Which Cable to Use?
ANSI/TIA Cabling Standards
Chapter 7. The Command-Line Interface
Shortcuts for Entering Commands
Using the Key to Complete Commands
Console Error Messages
Using the Question Mark for Help
enable Command
exit Command
end Command
disable Command
logout Command
Setup Mode
Keyboard Help
History Commands
terminal Commands
show Commands
Using the Pipe Parameter ( | ) with the show or more Commands
Using the no and default Forms of Commands
Part II: LAN Switching Technologies
Chapter 8. Configuring a Switch
Help Commands
Command Modes
Verifying Commands
Resetting Switch Configuration
Setting Host Names
Setting Passwords
Setting IP Addresses and Default Gateways
Setting Interface Descriptions
The mdix auto Command
Setting Duplex Operation
Setting Operation Speed
Managing the MAC Address Table
Configuration Example
Chapter 9. VLANs
Creating Static VLANs
Assigning Ports to VLANs
Using the range Command
Configuring a Voice VLAN
Verifying VLAN Information
Saving VLAN Configurations
Erasing VLAN Configurations
Configuration Example: VLANs
Chapter 10. VLAN Trunking Protocol and Inter-VLAN Communication
Dynamic Trunking Protocol (DTP)
Setting the VLAN Encapsulation Type
VLAN Trunking Protocol (VTP)
Verifying VTP
Inter-VLAN Communication Using an External Router: Router-on-a-Stick
Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface
Inter-VLAN Communication Tips
Configuration Example: Inter-VLAN Communication
Chapter 11. Spanning Tree Protocol
Spanning Tree Protocol Definition
Enabling Spanning Tree Protocol
Changing the Spanning-Tree Mode
Configuring the Root Switch
Configuring a Secondary Root Switch
Configuring Port Priority
Configuring the Path Cost
Configuring the Switch Priority of a VLAN
Configuring STP Timers
Configuring Optional Spanning-Tree Features
Enabling the Extended System ID
Verifying STP
Troubleshooting Spanning Tree Protocol
Configuration Example: PVST+
Spanning-Tree Migration Example: PVST+ to Rapid-PVST+
Chapter 12. EtherChannel
EtherChannel
Configuration Example: EtherChannel
Chapter 13. Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP)
Cisco Discovery Protocol
Configuring CDP
Verifying and Troubleshooting CDP
CDP Design Tips
Link Layer Discovery Protocol (802.1AB)
Configuring LLDP (802.1AB)
Verifying and Troubleshooting LLDP
Part III: Routing Technologies
Chapter 14. Configuring a Cisco Router
Router Modes
Entering Global Configuration Mode
Configuring a Router Name
Configuring Passwords
Password Encryption
Interface Names
Moving Between Interfaces
Configuring a Serial Interface
Assigning an IPv4 Address to a Fast Ethernet Interface
Assigning an IPv4 Address to a Gigabit Ethernet Interface
Assigning IPv6 Addresses to Interfaces
Creating a Message-of-the-Day Banner
Creating a Login Banner
Mapping a Local Host Name to a Remote IP Address
The no ip domain-lookup Command
The logging synchronous Command
The exec-timeout Command
Saving Configurations
Erasing Configurations
The write Command
Verifying Your Configurations Using show Commands
EXEC Commands in Configuration Mode: The do Command
Configuration Example: Basic Router Configuration
Chapter 15. Static Routing
Configuring an IPv4 Static Route
Static Routes and Recursive Lookups
The permanent Keyword
Floating Static Routes in IPv4 and Administrative Distance
Configuring an IPv4 Default Route
Verifying IPv4 Static Routes
Configuration Example: IPv4 Static Routes
Configuring an IPv6 Static Route
Floating Static Routes in IPv6
Configuring an IPv6 Default Route
Verifying IPv6 Static Routes
Chapter 16. Open Shortest Path First (OSPF)
OSPFv2 Versus OSPFv3
Configuring OSPF
Using Wildcard Masks with OSPF Areas
Loopback Interfaces
Router ID
DR/BDR Elections
Timers
Verifying OSPFv2 Configurations
Troubleshooting OSPFv2
Configuration Example: Single-Area OSPF
Part IV: IP Services
Chapter 17. DHCP
Configuring a DHCP Server on an IOS Router
Using Cisco IP Phones with a DHCP Server
Verifying and Troubleshooting DHCP Configuration
Configuring a DHCP Helper Address
Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface
Configuration Example: DHCP
Chapter 18. Network Address Translation (NAT)
Private IP Addresses: RFC 1918
Configuring Dynamic NAT: One Private to One Public Address Translation
Configuring PAT: Many Private to One Public Address Translation
Configuring Static NAT: One Private to One Permanent Public Address Translation
Verifying NAT and PAT Configurations
Troubleshooting NAT and PAT Configurations
Configuration Example: PAT
Chapter 19. Configuring Network Time Protocol (NTP)
NTP Configuration
NTP Design
Securing NTP
Verifying and Troubleshooting NTP
Setting the Clock on a Router
Using Time Stamps
Configuration Example: NTP
Part V: Security Fundamentals
Chapter 20. Layer Two Security Features
Setting Passwords on a Switch
Configuring Static MAC Addresses
Configuring Switch Port Security
Configuring Sticky MAC Addresses
Verifying Switch Port Security
Recovering Automatically from Error-Disabled Ports
Verifying Autorecovery of Error-Disabled Ports
Configuring DHCP Snooping
Configuring Dynamic ARP Inspection (DAI)
Configuration Example: Switch Security
Chapter 21. Managing Traffic Using Access Control Lists (ACLs)
Access List Numbers
Using Wildcard Masks
ACL Keywords
Creating Standard ACLs
Applying Standard ACLs to an Interface
Verifying ACLs
Removing ACLs
Creating Extended ACLs
Applying Extended ACLs to an Interface
The established Keyword
The log Keyword
Creating Named ACLs
Using Sequence Numbers in Named ACLs
Removing Specific Lines in Named ACLs Using Sequence Numbers
Sequence Number Tips
Including Comments About Entries in ACLs
Restricting Virtual Terminal Access
Tips for Configuring ACLs
IPv6 ACLs
Verifying IPv6 ACLs
Configuration Examples: IPv4 ACLs
Configuration Examples: IPv6 ACLs
Chapter 22. Device Monitoring and Hardening
Device Monitoring
Configuration Backups
Implementing Logging
Device Hardening
Part VI: Wireless Technologies
Chapter 23. Configuring and Securing a WLAN AP
Initial Setup of a Wireless LAN Controller (WLC)
Monitoring the WLC
Configuring a VLAN (Dynamic) Interface
Configuring a DHCP Scope
Configuring a WLAN
Defining a RADIUS Server
Exploring Management Options
Configuring a WLAN Using WPA2 PSK
Part VII: Appendices
Appendix A. How to Count in Decimal, Binary, and Hexadecimal
How to Count in Decimal
How to Count in Binary
How to Count in Hexadecimal
Representing Decimal, Binary, and Hexadecimal Numbers
Appendix B. How to Convert Between Number Systems
How to Convert from Decimal to Binary
How to Convert from Binary to Decimal
How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal
How to Convert from Hexadecimal to Binary
How to Convert from Binary to Hexadecimal
How to Convert from Decimal to Hexadecimal
How to Convert from Hexadecimal to Decimal
Appendix C. Binary/Hex/Decimal Conversion Chart
Appendix D. Create Your Own Journal Here
Index
Code Snippets
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Figure Credits
Next
Next Chapter
Chapter 1. IPv4 Addressing—How It Works
Part I: Network Fundamentals
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset