Visit www.dummies.com/cheatsheet/cisconetworkingaio to view this book's cheat sheet.
Table of Contents
About This Book Conventions Used in This Book Foolish Assumptions How This Book Is Organized Book I: Overview Book II: Internet Protocols Book III: Switching Book IV: Routing Book V: Wireless Book VI: Security Icons Used in This Book Where to Go from Here
Book I: Overview Book II: Internet Protocols Book III: Switching Book IV: Routing Book V: Wireless Book VI: Security
Book I: Chapter 1: Looking at the Cisco Network World Glazing Over the OSI Network Layer Model Connecting with Switches Moving On Up with Routers Taking the Network Wireless Securing Data with Firewalls Adding a Network Voice (Over IP, That Is) Focusing on Small Business Networks Taking Cisco Products Home Book I: Chapter 2: Exploring Cisco Network Design Embracing Methodologies Intelligent Information Network (IIN) Service-Oriented Network Architecture (SONA) Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Examining the Layered Network Model Core layer Distribution layer Access layer Enterprise modules Book I: Chapter 3: Knowing as Little as Possible about Math Why These Number Systems Are Important Working with Bits and Bytes Pondering the Significance of the Significant Bit Making Conversions Converting Base 2 (binary) to Base 10 (decimal) Converting binary to Base 8 (octal) Converting binary to Base 16 (hexadecimal) Book I: Chapter 4: Testing Your Core Networking Knowledge Layering the OSI Model Layer 1: The physical layer Layer 2: The data link layer Layer 3: The network layer Layer 4: The transport layer Layer 5: The session layer Layer 6: The presentation layer Layer 7: The application layer Troubleshooting by Layers Troubleshooting the physical layer Troubleshooting the data link layer Troubleshooting network and transport layers Troubleshooting the application layer Framing Data Figuring Out Packets Looking at packets Viewing packet structure Getting the Lowdown on Low-Level and High-Level Addressing Taking control of MAC addresses Structuring the IP address Reviewing Internetwork Packet Exchange Getting the basics with NetBIOS Extended User Interface Watching the Traffic Go By CSMA/CD CSMA/CA Choosing CSMA/CD or CSMA/CA Sharking the Network Data Capture options Filtering captured data Book I: Chapter 5: Getting into the Cisco Internetwork Operating System Working with the Internetwork Operating System Checking out the show command Understanding operating modes Getting going with the command line Tinkering with Device Connections Connecting directly via a Cisco rollover cable Connecting remotely via Telnet or SSH Graphical configuration interfaces Upgrading Firmware and Booting an IOS Image Upgrading the IOS image Managing the boot process
Glazing Over the OSI Network Layer Model Connecting with Switches Moving On Up with Routers Taking the Network Wireless Securing Data with Firewalls Adding a Network Voice (Over IP, That Is) Focusing on Small Business Networks Taking Cisco Products Home
Embracing Methodologies Intelligent Information Network (IIN) Service-Oriented Network Architecture (SONA) Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO) Examining the Layered Network Model Core layer Distribution layer Access layer Enterprise modules
Intelligent Information Network (IIN) Service-Oriented Network Architecture (SONA) Prepare, Plan, Design, Implement, Operate, and Optimize (PPDIOO)
Core layer Distribution layer Access layer Enterprise modules
Why These Number Systems Are Important Working with Bits and Bytes Pondering the Significance of the Significant Bit Making Conversions Converting Base 2 (binary) to Base 10 (decimal) Converting binary to Base 8 (octal) Converting binary to Base 16 (hexadecimal)
Converting Base 2 (binary) to Base 10 (decimal) Converting binary to Base 8 (octal) Converting binary to Base 16 (hexadecimal)
Layering the OSI Model Layer 1: The physical layer Layer 2: The data link layer Layer 3: The network layer Layer 4: The transport layer Layer 5: The session layer Layer 6: The presentation layer Layer 7: The application layer Troubleshooting by Layers Troubleshooting the physical layer Troubleshooting the data link layer Troubleshooting network and transport layers Troubleshooting the application layer Framing Data Figuring Out Packets Looking at packets Viewing packet structure Getting the Lowdown on Low-Level and High-Level Addressing Taking control of MAC addresses Structuring the IP address Reviewing Internetwork Packet Exchange Getting the basics with NetBIOS Extended User Interface Watching the Traffic Go By CSMA/CD CSMA/CA Choosing CSMA/CD or CSMA/CA Sharking the Network Data Capture options Filtering captured data
Layer 1: The physical layer Layer 2: The data link layer Layer 3: The network layer Layer 4: The transport layer Layer 5: The session layer Layer 6: The presentation layer Layer 7: The application layer
Troubleshooting the physical layer Troubleshooting the data link layer Troubleshooting network and transport layers Troubleshooting the application layer
Looking at packets Viewing packet structure
Taking control of MAC addresses Structuring the IP address Reviewing Internetwork Packet Exchange Getting the basics with NetBIOS Extended User Interface
CSMA/CD CSMA/CA Choosing CSMA/CD or CSMA/CA
Capture options Filtering captured data
Working with the Internetwork Operating System Checking out the show command Understanding operating modes Getting going with the command line Tinkering with Device Connections Connecting directly via a Cisco rollover cable Connecting remotely via Telnet or SSH Graphical configuration interfaces Upgrading Firmware and Booting an IOS Image Upgrading the IOS image Managing the boot process
Checking out the show command Understanding operating modes Getting going with the command line
Connecting directly via a Cisco rollover cable Connecting remotely via Telnet or SSH Graphical configuration interfaces
Upgrading the IOS image Managing the boot process
Book II: Chapter 1: Making the Most of IPv4 Meeting TCP/IP, Belle of the Networking Ball Comparing TCP/IP with the OSI Network Model Comprehending the Structure of an IP Address Knowing Your Network Classes Class A Class B Class C Class D Class E Public, private, and automatic IP addresses Examining special IP addresses Breaking Up Networks with Subnetting Subnetting 101 Mulling the number of hosts Modifying the subnet mask Explaining Classless InterDomain Routing (CIDR) CIDR notation Variable Length Subnet Masks (VLSM) Supernetting 11111111.11111111.1111110.00000000 (255.255.254.0) route summarization Book II: Chapter 2: Choosing between Protocols: TCP and UDP Understanding the UDP and TCP Structure Examining packet structure TCP and UDP header structures Sockets and ports Checking out which services use which ports Knowing When to Use TCP Services that use TCP Three-way handshaking Sliding windows Knowing When to Use UDP Book II: Chapter 3: Working with ARP, the IP Communication Model, and Data Link Layer Troubleshooting Watching Address Resolution Protocol in Action The logical AND Using ARP Troubleshooting with ARP Checking out arp command options Looking through your ARP cache with arp -a Adding a static ARP entry Seeing how ARP is useful Using Other Troubleshooting Tools ping traceroute/tracert PathPing Book II: Chapter 4: Preparing for the Advent of IPv6 Reviewing Address Structure Collapsing Addresses Identifying Special Addresses Assigning Addresses Integration with IPv4
Meeting TCP/IP, Belle of the Networking Ball Comparing TCP/IP with the OSI Network Model Comprehending the Structure of an IP Address Knowing Your Network Classes Class A Class B Class C Class D Class E Public, private, and automatic IP addresses Examining special IP addresses Breaking Up Networks with Subnetting Subnetting 101 Mulling the number of hosts Modifying the subnet mask Explaining Classless InterDomain Routing (CIDR) CIDR notation Variable Length Subnet Masks (VLSM) Supernetting 11111111.11111111.1111110.00000000 (255.255.254.0) route summarization
Class A Class B Class C Class D Class E Public, private, and automatic IP addresses Examining special IP addresses
Subnetting 101 Mulling the number of hosts Modifying the subnet mask
CIDR notation Variable Length Subnet Masks (VLSM) Supernetting 11111111.11111111.1111110.00000000 (255.255.254.0) route summarization
Understanding the UDP and TCP Structure Examining packet structure TCP and UDP header structures Sockets and ports Checking out which services use which ports Knowing When to Use TCP Services that use TCP Three-way handshaking Sliding windows Knowing When to Use UDP
Examining packet structure TCP and UDP header structures Sockets and ports Checking out which services use which ports
Services that use TCP Three-way handshaking Sliding windows
Watching Address Resolution Protocol in Action The logical AND Using ARP Troubleshooting with ARP Checking out arp command options Looking through your ARP cache with arp -a Adding a static ARP entry Seeing how ARP is useful Using Other Troubleshooting Tools ping traceroute/tracert PathPing
The logical AND Using ARP
Checking out arp command options Looking through your ARP cache with arp -a Adding a static ARP entry Seeing how ARP is useful
ping traceroute/tracert PathPing
Reviewing Address Structure Collapsing Addresses Identifying Special Addresses Assigning Addresses Integration with IPv4
Book III: Chapter 1: Reviewing the Enterprise LAN Identifying Features of an Enterprise LAN Working with Cisco Switching Technologies Small-to-medium business products Classical enterprise products Reviewing Switching Standards Purchasing Support Book III: Chapter 2: Switching Basics Switching and the OSI Model Communicating with Duplex/Simplex Colliding and Broadcasting Powering Up Your Switch Viewing status lights Connecting the client cables Book III: Chapter 3: Configuring Switches Switching with the Internetwork Operating System (IOS) Connecting to Your Switch Revealing Basic Switch Configuration Setting a hostname Examining ports and speeds Configuring interfaces Configuring the management interface Setting the default gateway Setting passwords Working with Users Creating a user in the account database Removing a user Enable user-level protection Running Setup Wizard Working with Web Console Dashboard Configure Monitor Maintenance Network Assistant Book III: Chapter 4: Easing Device Discovery with CDP Discovering How CDP Operates Working with CDP Seeing whether CDP is operating on a device Enabling CDP Disabling CDP Viewing information about devices Checking traffic data Ogling CDP’s debug options Overlooking CDP miscellany Building Your Network Layout Book III: Chapter 5: Virtualizing Networks with VLANs and VTP Implementing Virtual Local Area Networks (VLANs) Understanding how VLANs work Setting up VLANs Configuring a range of interfaces VLAN database Getting Started with VLAN Trunking Protocol (VTP) Learning how VTP works Implementing VTP Being leery of the VTP configuration revision number Pruning in the VTP tree Configuring VTP Viewing your VTP settings Book III: Chapter 6: Adding Fault Tolerance with STP Working with Spanning Tree Protocol (STP) Building the initial topology Dealing with network changes Setting Up STP STP and issues with VLANs STP and PortFast Troubleshooting STP Debugging STP Book III: Chapter 7: Adding Fault Tolerance with EtherChannel Examining How EtherChannel Works Checking Out EtherChannel Basic Guidelines Setting Up EtherChannel Stepping through EtherChannel configuration Configuring EtherChannel load balancing Getting at Diagnostic Information for EtherChannel Debugging EtherChannel Book III: Chapter 8: Speeding Configuration with Smartport Macros Viewing Existing Smartport Macros Viewing macros using the brief option Viewing macros without the brief option Viewing details for a single macro Working with Macros Rules for creating your own Smartport macro Smartport macros and parameters Creating a sample macro Applying a Smartport macro to an interface Viewing ports that are using your macro Removing a macro
Identifying Features of an Enterprise LAN Working with Cisco Switching Technologies Small-to-medium business products Classical enterprise products Reviewing Switching Standards Purchasing Support
Small-to-medium business products Classical enterprise products
Switching and the OSI Model Communicating with Duplex/Simplex Colliding and Broadcasting Powering Up Your Switch Viewing status lights Connecting the client cables
Viewing status lights Connecting the client cables
Switching with the Internetwork Operating System (IOS) Connecting to Your Switch Revealing Basic Switch Configuration Setting a hostname Examining ports and speeds Configuring interfaces Configuring the management interface Setting the default gateway Setting passwords Working with Users Creating a user in the account database Removing a user Enable user-level protection Running Setup Wizard Working with Web Console Dashboard Configure Monitor Maintenance Network Assistant
Setting a hostname Examining ports and speeds Configuring interfaces Configuring the management interface Setting the default gateway Setting passwords
Creating a user in the account database Removing a user Enable user-level protection
Dashboard Configure Monitor Maintenance Network Assistant
Discovering How CDP Operates Working with CDP Seeing whether CDP is operating on a device Enabling CDP Disabling CDP Viewing information about devices Checking traffic data Ogling CDP’s debug options Overlooking CDP miscellany Building Your Network Layout
Seeing whether CDP is operating on a device Enabling CDP Disabling CDP Viewing information about devices Checking traffic data Ogling CDP’s debug options Overlooking CDP miscellany
Implementing Virtual Local Area Networks (VLANs) Understanding how VLANs work Setting up VLANs Configuring a range of interfaces VLAN database Getting Started with VLAN Trunking Protocol (VTP) Learning how VTP works Implementing VTP Being leery of the VTP configuration revision number Pruning in the VTP tree Configuring VTP Viewing your VTP settings
Understanding how VLANs work Setting up VLANs Configuring a range of interfaces VLAN database
Learning how VTP works Implementing VTP Being leery of the VTP configuration revision number Pruning in the VTP tree Configuring VTP Viewing your VTP settings
Working with Spanning Tree Protocol (STP) Building the initial topology Dealing with network changes Setting Up STP STP and issues with VLANs STP and PortFast Troubleshooting STP Debugging STP
Building the initial topology Dealing with network changes
STP and issues with VLANs STP and PortFast
Examining How EtherChannel Works Checking Out EtherChannel Basic Guidelines Setting Up EtherChannel Stepping through EtherChannel configuration Configuring EtherChannel load balancing Getting at Diagnostic Information for EtherChannel Debugging EtherChannel
Stepping through EtherChannel configuration Configuring EtherChannel load balancing
Viewing Existing Smartport Macros Viewing macros using the brief option Viewing macros without the brief option Viewing details for a single macro Working with Macros Rules for creating your own Smartport macro Smartport macros and parameters Creating a sample macro Applying a Smartport macro to an interface Viewing ports that are using your macro Removing a macro
Viewing macros using the brief option Viewing macros without the brief option Viewing details for a single macro
Rules for creating your own Smartport macro Smartport macros and parameters Creating a sample macro Applying a Smartport macro to an interface Viewing ports that are using your macro Removing a macro
Book IV: Chapter 1: Making the Wide Area Network (WAN) Wide Identifying Features of a WAN Sending data long distances Implementing routing protocols Using carrier equipment Getting a handle on network size Choosing Technologies Getting the physical connection Choosing a routing protocol Book IV: Chapter 2: Cozying Up to Routing Basics Of Routers and Routing Knowing why routers are useful Knowing what routers do Examining the routing process Viewing your router’s routing table Enabling Routing Working with DHCP Setting up your DHCP server Watching the DHCP traffic go by Getting DHCP help from the IP Helper Automatic Private IP Addressing (APIPA) Book IV: Chapter 3: Router Configuration Getting to Know the Internetwork Operating System (IOS) for Routers Making Router Connections Performing a Basic Configuration Setting the hostname Configuring standard router ports Configuring interfaces Configuring your router’s IP settings Enabling routing Configuring passwords Setting banners Running Setup Wizard Working with Users Creating a user in the account database Removing a user Enable user-level protection Showing connected users Book IV: Chapter 4: Setting Up Static Routes Knowing the Pros and Cons of Static Routing Building a Small Network with Static Routing Getting network info from your router Configuring the second router Adding a third router Running around and around with routing loops Book IV: Chapter 5: Configuring Serial Connections and WAN Links Finding Out Where the Telephone Company Fits In Circuit switching Leased lines Packet switching Connecting Your Devices Serial ports Integrated CSU/DSU ISDN ports Setting Up Your Serial Connection Configuring your serial connection Configuring serial link protocols Setting the clock rate Troubleshooting Serial Connections Showing Debugging Book IV: Chapter 6: Meeting the Routing Protocols Checking Out Criteria for Routing Protocol Selection Classifying by where protocols are used Classifying by how protocols calculate routing Administrative distance Introducing the Protocols Distance-Vector Routing Examining basic function of distance-vector routing Count to infinity and routing loops Preventing count to infinity issues Link-State Routing Understanding link-state protocol Working with your strengths Book IV: Chapter 7: Checking Out RIP and EIGRP Characteristics and Design Working with Routing Information Protocol (RIP) Understanding the RIP commands Troubleshooting RIP Working with Enhanced Interior Gateway Routing Protocol (EIGRP) Using the EIGRP commands Troubleshooting EIGRP Book IV: Chapter 8: Getting Comfortable with the OSPF and IS-IS Protocols Open Shortest Path First (OSPF) Getting comfortable with OSPF basics Configuring OSPF Working with wildcard masks Keeping track of router IDs Troubleshooting OSPF Debugging OSPF Intermediate System to Intermediate System (IS-IS) Enabling IS-IS routing Checking that IS-IS is running Troubleshooting the IS-IS protocol Book IV: Chapter 9: Routing with BGP and IP Multicast Routing with Border Gateway Protocol (BGP) Routing via weights Understanding BGP commands Viewing routes in your routing table Viewing how the protocol is functioning Troubleshooting BGP Routing IP Multicast Traffic Knowing when to use multicast routing Getting to know the protocols Configuring multicast routing Troubleshooting multicast routing
Identifying Features of a WAN Sending data long distances Implementing routing protocols Using carrier equipment Getting a handle on network size Choosing Technologies Getting the physical connection Choosing a routing protocol
Sending data long distances Implementing routing protocols Using carrier equipment Getting a handle on network size
Getting the physical connection Choosing a routing protocol
Of Routers and Routing Knowing why routers are useful Knowing what routers do Examining the routing process Viewing your router’s routing table Enabling Routing Working with DHCP Setting up your DHCP server Watching the DHCP traffic go by Getting DHCP help from the IP Helper Automatic Private IP Addressing (APIPA)
Knowing why routers are useful Knowing what routers do Examining the routing process Viewing your router’s routing table
Setting up your DHCP server Watching the DHCP traffic go by Getting DHCP help from the IP Helper Automatic Private IP Addressing (APIPA)
Getting to Know the Internetwork Operating System (IOS) for Routers Making Router Connections Performing a Basic Configuration Setting the hostname Configuring standard router ports Configuring interfaces Configuring your router’s IP settings Enabling routing Configuring passwords Setting banners Running Setup Wizard Working with Users Creating a user in the account database Removing a user Enable user-level protection Showing connected users
Setting the hostname Configuring standard router ports Configuring interfaces Configuring your router’s IP settings Enabling routing Configuring passwords Setting banners
Creating a user in the account database Removing a user Enable user-level protection Showing connected users
Knowing the Pros and Cons of Static Routing Building a Small Network with Static Routing Getting network info from your router Configuring the second router Adding a third router Running around and around with routing loops
Getting network info from your router Configuring the second router Adding a third router Running around and around with routing loops
Finding Out Where the Telephone Company Fits In Circuit switching Leased lines Packet switching Connecting Your Devices Serial ports Integrated CSU/DSU ISDN ports Setting Up Your Serial Connection Configuring your serial connection Configuring serial link protocols Setting the clock rate Troubleshooting Serial Connections Showing Debugging
Circuit switching Leased lines Packet switching
Serial ports Integrated CSU/DSU ISDN ports
Configuring your serial connection Configuring serial link protocols Setting the clock rate
Showing Debugging
Checking Out Criteria for Routing Protocol Selection Classifying by where protocols are used Classifying by how protocols calculate routing Administrative distance Introducing the Protocols Distance-Vector Routing Examining basic function of distance-vector routing Count to infinity and routing loops Preventing count to infinity issues Link-State Routing Understanding link-state protocol Working with your strengths
Classifying by where protocols are used Classifying by how protocols calculate routing Administrative distance
Examining basic function of distance-vector routing Count to infinity and routing loops Preventing count to infinity issues
Understanding link-state protocol Working with your strengths
Working with Routing Information Protocol (RIP) Understanding the RIP commands Troubleshooting RIP Working with Enhanced Interior Gateway Routing Protocol (EIGRP) Using the EIGRP commands Troubleshooting EIGRP
Understanding the RIP commands Troubleshooting RIP
Using the EIGRP commands Troubleshooting EIGRP
Open Shortest Path First (OSPF) Getting comfortable with OSPF basics Configuring OSPF Working with wildcard masks Keeping track of router IDs Troubleshooting OSPF Debugging OSPF Intermediate System to Intermediate System (IS-IS) Enabling IS-IS routing Checking that IS-IS is running Troubleshooting the IS-IS protocol
Getting comfortable with OSPF basics Configuring OSPF Working with wildcard masks Keeping track of router IDs Troubleshooting OSPF Debugging OSPF
Enabling IS-IS routing Checking that IS-IS is running Troubleshooting the IS-IS protocol
Routing with Border Gateway Protocol (BGP) Routing via weights Understanding BGP commands Viewing routes in your routing table Viewing how the protocol is functioning Troubleshooting BGP Routing IP Multicast Traffic Knowing when to use multicast routing Getting to know the protocols Configuring multicast routing Troubleshooting multicast routing
Routing via weights Understanding BGP commands Viewing routes in your routing table Viewing how the protocol is functioning Troubleshooting BGP
Knowing when to use multicast routing Getting to know the protocols Configuring multicast routing Troubleshooting multicast routing
Book V: Chapter 1: Getting Wise to Wireless LANs Understanding the Benefit of Wireless LANs Learning the Wireless Technologies Following the Standards Licensed radio bands Unlicensed radio bands Sending Data Over the Airwaves Understanding signals Modulating signals Introducing RF modulation techniques Battle of the Bands Checkin’ Out the 2.4-GHz band Keep on Rockin’ with the 5-GHz band Technologies that support the 2.4-GHz and 5-GHz bands Book V: Chapter 2: Planning Your WLAN Setting Your Operation Mode Ad Hoc mode Infrastructure mode Grouping Your Clients with SSID SSID basics Using multiple SSIDs with a single AP Basic service set (BSS) Extended service set (ESS) Planning Around Interference RF signal factors Conducting a site survey Working with Multiple APs Selecting channels AP layout Automatic tuning Book V: Chapter 3: Securing Your WLAN Understanding the Benefits of a Secure WLAN Finding balance between functionality and security Recognizing security risks Checking Out Security Risk Mitigation Methods Authentication and data encryption Filtering the MAC address Hiding the service set identifier (SSID) Intrusion detection and prevention Isolating users with VLANs Securing the Management Interface Changing default passwords Getting even more secure with SSH, SSL, TLS, HTTPS Management access Isolating the entire WLAN Book V: Chapter 4: Building a Cisco Wireless Network Introducing the Cisco Unified Wireless Networks Architecture (CUWN) Keeping it simple with Wireless LAN Controllers Going mobile with Cisco WLAN access point (AP) devices Cisco Wireless Control System (WCS) Lightweight Access Point Protocol (LWAPP) Setting Up Your Wireless LAN Setting up and verifying the wired LAN to which the WLAN will connect Setting up the Cisco Wireless LAN Controller(s) Configuring WLAN security Configuring WEP keys Setting up Cisco access points Configuring backup controllers Web authentication process Using the Cisco graphical user interface (GUI)
Understanding the Benefit of Wireless LANs Learning the Wireless Technologies Following the Standards Licensed radio bands Unlicensed radio bands Sending Data Over the Airwaves Understanding signals Modulating signals Introducing RF modulation techniques Battle of the Bands Checkin’ Out the 2.4-GHz band Keep on Rockin’ with the 5-GHz band Technologies that support the 2.4-GHz and 5-GHz bands
Licensed radio bands Unlicensed radio bands
Understanding signals Modulating signals Introducing RF modulation techniques
Checkin’ Out the 2.4-GHz band Keep on Rockin’ with the 5-GHz band Technologies that support the 2.4-GHz and 5-GHz bands
Setting Your Operation Mode Ad Hoc mode Infrastructure mode Grouping Your Clients with SSID SSID basics Using multiple SSIDs with a single AP Basic service set (BSS) Extended service set (ESS) Planning Around Interference RF signal factors Conducting a site survey Working with Multiple APs Selecting channels AP layout Automatic tuning
Ad Hoc mode Infrastructure mode
SSID basics Using multiple SSIDs with a single AP Basic service set (BSS) Extended service set (ESS)
RF signal factors Conducting a site survey
Selecting channels AP layout Automatic tuning
Understanding the Benefits of a Secure WLAN Finding balance between functionality and security Recognizing security risks Checking Out Security Risk Mitigation Methods Authentication and data encryption Filtering the MAC address Hiding the service set identifier (SSID) Intrusion detection and prevention Isolating users with VLANs Securing the Management Interface Changing default passwords Getting even more secure with SSH, SSL, TLS, HTTPS Management access Isolating the entire WLAN
Finding balance between functionality and security Recognizing security risks
Authentication and data encryption Filtering the MAC address Hiding the service set identifier (SSID) Intrusion detection and prevention Isolating users with VLANs
Changing default passwords Getting even more secure with SSH, SSL, TLS, HTTPS Management access Isolating the entire WLAN
Introducing the Cisco Unified Wireless Networks Architecture (CUWN) Keeping it simple with Wireless LAN Controllers Going mobile with Cisco WLAN access point (AP) devices Cisco Wireless Control System (WCS) Lightweight Access Point Protocol (LWAPP) Setting Up Your Wireless LAN Setting up and verifying the wired LAN to which the WLAN will connect Setting up the Cisco Wireless LAN Controller(s) Configuring WLAN security Configuring WEP keys Setting up Cisco access points Configuring backup controllers Web authentication process Using the Cisco graphical user interface (GUI)
Keeping it simple with Wireless LAN Controllers Going mobile with Cisco WLAN access point (AP) devices Cisco Wireless Control System (WCS)
Setting up and verifying the wired LAN to which the WLAN will connect Setting up the Cisco Wireless LAN Controller(s) Configuring WLAN security Configuring WEP keys Setting up Cisco access points Configuring backup controllers Web authentication process Using the Cisco graphical user interface (GUI)
Book VI: Chapter 1: Defending against Common Attacks with Basic Security Tools Knowing Your Enemy Handling attacks from within Dealing with external attacks Implementing Firewalls Types of firewalls Ingress and egress filtering Defending data with the DMZ Defending Your Network against Attacks Perimeter defense Active tools Defense in depth Security Tools Personal firewalls Antivirus software Anti-malware Spam filters Intrusion detection Vulnerability scanners User common sense Book VI: Chapter 2: Securing Networks with Cisco’s Adaptive Security Appliance Locating Firewalls in the OSI Model Getting to Know the Internetwork Operating System Making Connections Running the ASA Setup Wizard Performing a Basic Configuration Device name Standard firewall ports Interfaces IP addresses Security zones Passwords Banners Setting Up User Accounts Configuring Dynamic Host Configuration Protocol Examining Your License Book VI: Chapter 3: Securing Networks with ACLs and NAT Securing Networks with ACLs Creating ACLs Standard ACLs Extended ACLs Applying an ACL Using ACLs as a Virus Detection Tool Where You Can Use ACLs Setting Up Network Address Translation Requirements for NAT Types of NAT Setting up NAT Viewing translations Book VI: Chapter 4: Cisco Security Best Practices Management Areas Finding Out About Known Issues with Cisco Devices Leveraging Authentication, Authorization, and Accounting Authentication fallback Avoiding Type 7 passwords Centralizing Log Collection and Monitoring Collecting logs in one location Choosing a logging level Dealing with logging in the console, monitor, and buffer Implementing Secure Protocols Managing Configurations Password management Managing services Setting up timeouts Keeping alive TCP Leaving room for management Securing SNMP Replacing and rolling back Taking the talking stick with terminal lock Using logs to tell you what is going on Managing network features Getting Physical with Security Cheat Sheet
Knowing Your Enemy Handling attacks from within Dealing with external attacks Implementing Firewalls Types of firewalls Ingress and egress filtering Defending data with the DMZ Defending Your Network against Attacks Perimeter defense Active tools Defense in depth Security Tools Personal firewalls Antivirus software Anti-malware Spam filters Intrusion detection Vulnerability scanners User common sense
Handling attacks from within Dealing with external attacks
Types of firewalls Ingress and egress filtering Defending data with the DMZ
Perimeter defense Active tools Defense in depth
Personal firewalls Antivirus software Anti-malware Spam filters Intrusion detection Vulnerability scanners User common sense
Locating Firewalls in the OSI Model Getting to Know the Internetwork Operating System Making Connections Running the ASA Setup Wizard Performing a Basic Configuration Device name Standard firewall ports Interfaces IP addresses Security zones Passwords Banners Setting Up User Accounts Configuring Dynamic Host Configuration Protocol Examining Your License
Device name Standard firewall ports Interfaces IP addresses Security zones Passwords Banners
Securing Networks with ACLs Creating ACLs Standard ACLs Extended ACLs Applying an ACL Using ACLs as a Virus Detection Tool Where You Can Use ACLs Setting Up Network Address Translation Requirements for NAT Types of NAT Setting up NAT Viewing translations
Standard ACLs Extended ACLs
Requirements for NAT Types of NAT Setting up NAT Viewing translations
Management Areas Finding Out About Known Issues with Cisco Devices Leveraging Authentication, Authorization, and Accounting Authentication fallback Avoiding Type 7 passwords Centralizing Log Collection and Monitoring Collecting logs in one location Choosing a logging level Dealing with logging in the console, monitor, and buffer Implementing Secure Protocols Managing Configurations Password management Managing services Setting up timeouts Keeping alive TCP Leaving room for management Securing SNMP Replacing and rolling back Taking the talking stick with terminal lock Using logs to tell you what is going on Managing network features Getting Physical with Security
Authentication fallback Avoiding Type 7 passwords
Collecting logs in one location Choosing a logging level Dealing with logging in the console, monitor, and buffer
Password management Managing services Setting up timeouts Keeping alive TCP Leaving room for management Securing SNMP Replacing and rolling back Taking the talking stick with terminal lock Using logs to tell you what is going on Managing network features
18.227.79.241