Contents

Introduction

Part I Network Fundamentals

CHAPTER 1 How to Subnet

Class A–E Addresses

Converting Between Decimal Numbers and Binary

Subnetting a Class C Network Using Binary

Subnetting a Class B Network Using Binary

Binary ANDing

So Why AND?

Shortcuts in Binary ANDing

The Enhanced Bob Maneuver for Subnetting (or How to Subnet Anything in Under a Minute)

CHAPTER 2 VLSM

IP Subnet Zero

VLSM Example

Step 1: Determine How Many H Bits Will Be Needed to Satisfy the Largest Network

Step 2: Pick a Subnet for the Largest Network to Use

Step 3: Pick the Next Largest Network to Work With

Step 4: Pick the Third Largest Network to Work With

Step 5: Determine Network Numbers for Serial Links

CHAPTER 3 Route Summarization

Example for Understanding Route Summarization

Step 1: Summarize Winnipeg’s Routes

Step 2: Summarize Calgary’s Routes

Step 3: Summarize Edmonton’s Routes

Step 4: Summarize Vancouver’s Routes

Route Summarization and Route Flapping

Requirements for Route Summarization

CHAPTER 4 Cables and Connections

Connecting a Rollover Cable to Your Router or Switch

Using a USB Cable to Connect to Your Router or Switch

Terminal Settings

LAN Connections

Serial Cable Types

Which Cable to Use?

568A Versus 568B Cables

CHAPTER 5 The Command-Line Interface

Shortcuts for Entering Commands

Using the Image Key to Complete Commands

Console Error Messages

Using the Question Mark for Help

enable Command

exit Command

disable Command

logout Command

Setup Mode

Keyboard Help

History Commands

terminal Commands

show Commands

Using the Pipe Parameter (|) with the show Command

Part II LAN Switching Technologies

CHAPTER 6 Configuring a Switch

Help Commands

Command Modes

Verifying Commands

Resetting Switch Configuration

Setting Host Names

Setting Passwords

Setting IP Addresses and Default Gateways

Setting Interface Descriptions

The mdix auto Command

Setting Duplex Operation

Setting Operation Speed

Managing the MAC Address Table

Configuration Example

CHAPTER 7 VLANs

Creating Static VLANs

Using VLAN Configuration Mode

Using VLAN Database Mode

Assigning Ports to VLANs

Using the range Command

Configuring a Voice VLAN

Configuring Voice and Data with Trust

Configuring Voice and Data Without Trust

Verifying VLAN Information

Saving VLAN Configurations

Erasing VLAN Configurations

Configuration Example: VLANs

2960 Switch

CHAPTER 8 VLAN Trunking Protocol and Inter-VLAN Communication

Dynamic Trunking Protocol (DTP)

Setting the VLAN Encapsulation Type

VLAN Trunking Protocol (VTP)

Verifying VTP

Inter-VLAN Communication Using an External Router: Router-on-a-Stick

Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface

Remove L2 Switchport Capability of an Interface on an L3 Switch

Configuring Inter-VLAN Communication on an L3 Switch

Inter-VLAN Communication Tips

Configuration Example: Inter-VLAN Communication

ISP Router

CORP Router

L2Switch2 (Catalyst 2960)

L3Switch1 (Catalyst 3560)

L2Switch1 (Catalyst 2960)

CHAPTER 9 Spanning Tree Protocol

Spanning Tree Protocol Definition

Enabling Spanning Tree Protocol

Configuring the Root Switch

Configuring a Secondary Root Switch

Configuring Port Priority

Configuring the Path Cost

Configuring the Switch Priority of a VLAN

Configuring STP Timers

Verifying STP

Cisco STP Toolkit

PortFast

BPDU Guard

Changing the Spanning-Tree Mode

Extended System ID

Enabling Rapid Spanning Tree

Troubleshooting Spanning Tree

Configuration Example: PVST+

Core Switch (3560)

Distribution 1 Switch (3560)

Distribution 2 Switch (3560)

Access 1 Switch (2960)

Access 2 Switch (2960)

Spanning-Tree Migration Example: PVST+ to Rapid-PVST+

Access 1 Switch (2960)

Access 2 Switch (2960)

Distribution 1 Switch (3560)

Distribution 2 Switch (3560)

Core Switch (3560)

CHAPTER 10 EtherChannel

EtherChannel

Interface Modes in EtherChannel

Guidelines for Configuring EtherChannel

Configuring Layer 2 EtherChannel

Configuring L3 EtherChannel

Verifying EtherChannel

Configuration Example: EtherChannel

DLSwitch (3560)

ALSwitch1 (2960)

ALSwitch2 (2960)

Part III Routing Technologies: IPv4 and IPv6

CHAPTER 11 Configuring a Cisco Router

Router Modes

Entering Global Configuration Mode

Configuring a Router Name

Configuring Passwords

Password Encryption

Interface Names

Moving Between Interfaces

Configuring a Serial Interface

Configuring a Fast Ethernet Interface

Configuring a Gigabit Ethernet Interface

Assigning IPv6 Addresses to Interfaces

Creating a Message-of-the-Day Banner

Creating a Login Banner

Setting the Clock Time Zone

Mapping a Local Hostname to a Remote IP Address

The no ip domain-lookup Command

The logging synchronous Command

The exec-timeout Command

Saving Configurations

Erasing Configurations

show Commands

EXEC Commands in Configuration Mode: The do Command

Configuration Example: Basic Router Configuration

Boston Router

CHAPTER 12 Static Routing

Configuring an IPv4 Static Route on a Router

Static Routes and Recursive Lookups

The permanent Keyword (Optional)

Floating Static Routes and Administrative Distance (Optional)

Configuring an IPv4 Default Route on a Router

Verifying IPv4 Static Routes

Configuration Example: IPv4 Static Routes

Boston Router

Buffalo Router

Bangor Router

Static Routes in IPv6

Floating Static Routes in IPv6

Default Routes in IPv6

Verifying and Troubleshooting IPv6

CHAPTER 13 RIP Next Generation (RIPng)

Implementing RIP Next Generation

Verifying and Troubleshooting RIPng

Configuration Example: RIPng

Austin Router

Houston Router

CHAPTER 14 EIGRP and EIGRPv6

Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) for IPv4

Adjusting the EIGRP for IPv4 Metric Weights

Adjusting the EIGRPv6 Metric Weights

Configuring EIGRPv6 on an Interface

EIGRP Router ID

EIGRP Timers

EIGRP Auto-Summarization for IPv4

EIGRP Manual Summarization for IPv4

EIGRPv6 Summary Addresses

Passive EIGRP Interfaces

Equal-Cost Load Balancing: Maximum Paths

Unequal-Cost Load Balancing: Variance

Bandwidth Use

Verifying EIGRP and EIGRPv6

Troubleshooting EIGRP and EIGRPv6

Configuration Example: EIGRP

Austin Router

Houston Router

Configuration Example: EIGRPv6

R3 Router

R2 Router

R1 Router

CHAPTER 15 OSPFv2 and OSPFv3

OSPFv2 Versus OSPFv3

Configuring OSPF

Using Wildcard Masks with OSPF Areas

Configuring Multiarea OSPF

Multiarea OSPF Router Types

Loopback Interfaces

Router ID

DR/BDR Elections

Passive Interfaces

Modifying Cost Metrics

OSPF auto-cost reference-bandwidth

Timers

Propagating a Default Route

Route Summarization

Interarea Route Summarization

External Route Summarization

IPv6 and OSPFv3

Enabling OSPF for IPv6 on an Interface

Interarea OSPFv3 Route Summarization

Enabling an IPv4 Router ID for OSPFv3

Verifying OSPFv2 and OSPFv3 Configurations

Troubleshooting OSPFv2 and OSPFv3

Configuration Example: Single-Area OSPF

Austin Router

Houston Router

Galveston Router

Configuration Example: Multiarea OSPF

ASBR Router

ABR-1 Router

ABR-2 Router

Internal Router

Configuration Example: IPv6 and OSPFv3

R3 Router

R2 Router

R1 Router

R4 Router

Part IV WAN Technologies

CHAPTER 16 Understanding Point-to-Point Protocols

Configuring High-Level Data Link Control Encapsulation on a Serial Line

Configuring Point-to-Point Protocol (PPP) on a Serial Line (Mandatory Commands)

Configuring PPP on a Serial Line (Optional Commands): Compression

Configuring PPP on a Serial Line (Optional Commands): Link Quality Monitoring

Configuring PPP on a Serial Line (Optional Commands): Authentication

Verifying and Troubleshooting a Serial Link/PPP Encapsulation

Configuration Example: PPP with CHAP Authentication

Boston Router

Buffalo Router

Configuring Multilink Point-to-Point Protocol

Branch Router

HQ Router

Verifying and Troubleshooting MLPPP

Configuring a DSL Connection Using Point-to-Point Protocol over Ethernet

Step 1: Configure PPPoE (External Modem)

Step 2: Configure the Dialer Interface

Step 3: Define Interesting Traffic and Specify Default Routing

Step 4: Configure NAT (Choose 1 Method Only)

Step 4a: Configure NAT Using an ACL

Step 4b: Configure NAT Using a Route Map

Step 5: Configure DHCP Service

Step 6: Apply NAT Programming

Step 7: Verify a PPPoE Connection

CHAPTER 17 External Border Gateway Protocol (eBGP)

Configuring Border Gateway Protocol

BGP and Loopback Addresses

Configuration Example: eBGP

eBGP Multihop

Verifying BGP Connections

Troubleshooting BGP Connections

CHAPTER 18 Configuring Generic Routing Encapsulation (GRE) Tunnels

Configuring a GRE Tunnel

Branch Router

HQ Router

Verifying a GRE Tunnel

CHAPTER 19 Quality of Service (QoS)

High Availability for Voice and Video

Configuring Basic QoS

Verifying Basic QoS

Auto-QoS

Restrictions for Auto-QoS

Configuring Auto-QoS: 2960-X/3650/3750

Verifying Auto QoS: 2960-X/3650/3750

Configuring Auto-QoS: 6500

Verifying Auto-QoS Information: 6500

Part V Infrastructure Services

CHAPTER 20 DHCP

Configuring a DHCP Server on an IOS Router

Using Cisco IP Phones with a DHCP Server

Verifying and Troubleshooting DHCP Configuration

Configuring a DHCP Helper Address

DHCP Client on a Cisco IOS Software Ethernet Interface

Configuration Example: DHCP

Edmonton Router

Gibbons Router

CHAPTER 21 First Hop Redundancy Protocols (FHRP): Hot Standby Router Protocol (HSRP)

First Hop Redundancy

HSRP

Configuring HSRP on a Router

Default HSRP Configuration Settings

Verifying HSRP

HSRP Optimization Options

Preempt

HSRP Message Timers

Interface Tracking

Debugging HSRP

Configuration Example: HSRP

Router 1

Router 2

CHAPTER 22 Network Address Translation (NAT)

Private IP Addresses: RFC 1918

Configuring Dynamic Network Address Translation: One Private to One Public Address Translation

Configuring PAT: Many Private to One Public Address Translation

Configuring Static NAT: One Private to One Permanent Public Address Translation

Verifying NAT and PAT Configurations

Troubleshooting NAT and PAT Configurations

Configuration Example: PAT

ISP Router

Company Router

Part VI Infrastructure Security

CHAPTER 23 Switch Port Security

Setting Passwords on a Switch

Configuring Static MAC Addresses

Switch Port Security

Verifying Switch Port Security

Sticky MAC Addresses

Recovering Automatically from Error-Disabled Ports

Verifying Autorecovery of Error-Disabled Ports

Configuration Example

CHAPTER 24 Managing Traffic Using Access Control Lists (ACL)

Access List Numbers

Using Wildcard Masks

ACL Keywords

Creating Standard ACLs

Applying Standard ACLs to an Interface

Verifying ACLs

Removing ACLs

Creating Extended ACLs

Applying Extended ACLs to an Interface

The established Keyword

The log Keyword

Creating Named ACLs

Using Sequence Numbers in Named ACLs

Removing Specific Lines in Named ACLs Using Sequence Numbers

Sequence Number Tips

Including Comments About Entries in ACLs

Restricting Virtual Terminal Access

Tips for Configuring ACLs

IPv6 ACLs

Verifying IPv6 ACLs

Configuration Examples: IPv4 ACLs

Configuration Examples: IPv6 ACLs

CHAPTER 25 Device Hardening

Securing Cisco Device According to Recommended Practices

Securing Cisco IOS Routers Checklist

Components of a Router Security Policy

Configuring Passwords

Password Encryption

Configuring SSH

Verifying SSH

Restricting Virtual Terminal Access

Disabling Unneeded Services

Part VII Infrastructure Management

CHAPTER 26 Backing Up and Restoring Cisco IOS Software and Configurations

Boot System Commands

The Cisco IOS File System

Viewing the Cisco IOS File System

Commonly Used URL Prefixes for Cisco Network Devices

Deciphering IOS Image Filenames

Backing Up Configurations to a TFTP Server

Restoring Configurations from a TFTP Server

Backing Up the Cisco IOS Software to a TFTP Server

Restoring/Upgrading the Cisco IOS Software from a TFTP Server

Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem

Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command

Secure Copy

Configuring a Secure Copy Server

Verifying and Troubleshooting Secure Copy

Configuration Example: Using Secure Copy

CHAPTER 27 Password Recovery Procedures and the Configuration Register

The Configuration Register

A Visual Representation of the Configuration Register

What the Bits Mean

The Boot Field

Console Terminal Baud Rate Settings

Changing the Console Line Speed: CLI

Changing the Console Line Speed: ROM Monitor Mode

Password-Recovery Procedures for Cisco Routers

Password Recovery for 2960 Series Switches

CHAPTER 28 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP)

Cisco Discovery Protocol

Configuring CDP

Verifying and Troubleshooting CDP

CDP Design Tips

Link Layer Discovery Protocol (802.1AB)

Configuring LLDP (802.1AB)

Verifying and Troubleshooting LLDP

CHAPTER 29 IOS Tools

Configuring a Device to Accept a Remote Telnet Connection

Using Telnet to Remotely Connect to Other Devices

Verifying Telnet

Internet Control Message Protocol Redirect Messages

The ping Command

Examples of Using the ping and the Extended ping Commands

The traceroute Command

CHAPTER 30 Device Monitoring

Device Monitoring

Simple Network Management Protocol

Configuring SNMP

Securing SNMPv1 or SNMPv2

Securing SNMPv3

Verifying SNMP

Configuration Backups

Implementing Logging

Configuring Syslog

Syslog Message Format

Syslog Severity Levels

Syslog Message Example

Configuring NetFlow

Verifying NetFlow

Network Time Protocol

Network Time Protocol Configuration

Verifying NTP

Setting the Clock on a Router

Using Time Stamps

CHAPTER 31 Cisco IOS Licensing

Cisco Licensing Earlier Than IOS 15.0

Cisco Licensing for the ISR G2 Platforms: IOS 15.0 and Later

Verifying Licenses

Cisco License Manager

Cisco Smart Software Manager

Installing a Permanent License

Installing an Evaluation License

Backing Up a License

Uninstalling a License

CHAPTER 32 Basic Troubleshooting

Viewing the Routing Table

Clearing the Routing Table

Determining the Gateway of Last Resort

Determining the Last Routing Update

OSI Layer 3 Testing

OSI Layer 7 Testing

Interpreting the show interface Command

Clearing Interface Counters

Using CDP to Troubleshoot

The traceroute Command

The show controllers Command

debug Commands

Using Time Stamps

Operating System IP Verification Commands

The ip http server Command

The netstat Command

The arp Command

Part VIII Appendixes

APPENDIX A Binary/Hex/Decimal Conversion Chart

APPENDIX B Create Your Own Journal Here

INDEX

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.150.80