Home Page Icon
Home Page
Table of Contents for
Dedication
Close
Dedication
by Noel Rivera, Richard Bedwell, William Wilson, Chris Carthern
Cisco Networks: Engineers’ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cover
Title
Copyright
Dedication
Contents at a Glance
Contents
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Chapter 1: Introduction to Practical Networking
Tools of the Trade
Open Systems Interconnection (OSI) Model
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Connection-Oriented
Session Layer
Presentation Layer
Application Layer
The OSI Model: Bringing It All Together
TCP/IP Protocol
TCP/IP Application Layer
TCP/IP Transport Layer
TCP/IP Internet Layer
TCP/IP Network Interface Layer
Reliability
Three-Way Handshake and Connection Termination
User Datagram Protocol
Port Numbers
Types of Networks
Personal Area Network
Local Area Network
Campus Area Network
Metropolitan Area Network
Wide Area Network
Wireless Wide Area Network
Virtual Private Network
Hierarchical Internetwork Model
Summary
Chapter 2: The Physical Medium
The Physical Medium
Standards
Cables
Twisted Pair Cable
Coaxial Cable
Fiber Optical Cabling
Fiber Optic Transmission Rates
Wireless Communication
The Ethernet
Duplex
Time-Division Duplexing
Frequency-Division Duplexing
Autonegotiation
Unidirectional Link Detection
Common Issues
Duplex Mismatch
Bad Connector Terminations
Summary
Chapter 3: Data Link Layer
Protocols
The Address Resolution Protocol (ARP)
The Reverse Address Resolution Protocol (RARP)
Link Layer Functions
Framing
Addressing
Synchronizing
Flow Control
Link Layer Discovery Protocol (LLDP)
Class of Endpoints
LLDP Benefits
Cisco Discovery Protocol (CDP)
Summary
Chapter 4: The Network Layer with IP
IP Addressing (Public vs. Private)
Public
Private
IPv4
Class A
Class B
Class C
IPv4 Packet Header
IPv6
IPv6 Packet Header
Classless Inter-Domain Routing
Subnetting
Subnet Mask
Variable Length Subnet Masking
Classful Subnetting
Subnetting Exercises
Subnetting Exercise Answers
Exercise 1 Answers
Exercise 2 Answers
Exercise 3 Answers
Exercise 4 Answers
Summary
Chapter 5: Intermediate LAN Switching
Configuration Help
Displaying the Running Configuration
Configuring the Router
Switching
EtherChannel
Spanning Tree Protocol
Why Do You Need STP?
How STP Works
Bridge Protocol Data Units
Rapid Spanning Tree Protocol
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Summary
Chapter 6: Routing
Static Routing
The Process of Routing
Default Routing
Testing Connectivity
Dynamic Routing Protocols
Distance-Vector Routing Protocol
Link-State Routing Protocol
Hybrid Routing Protocol
RIP
Configuration
Authentication
EIGRP
OSPF
Configuring OSPF
Router ID
BGP
BGP Configuration
Administrative Distance
RIP
EIGRP
OSPF
BGP
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Exercise 5
Summary
Chapter 7: VLANs, Trunking, VTP, and MSTP
Virtual Logical Network (VLAN)
VLAN Configuration
Trunking
Trunk Configuration
Routing Between VLANs
Routing VLANs Configurations
VLAN Trunking Protocol
VTP Modes
Multiple Spanning Tree Protocol
MSTP Configuration
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Summary
Chapter 8: Basic Switch and Router Troubleshooting
Troubleshooting 101
Documenting Your Network
First Things First: Identify the Problem
Top-Down Approach
Bottom-Up Approach
Physical Medium and Ethernet
VLANs and Trunks
EtherChannel
VTP
Spanning Tree
Routing
Static Routing
Dynamic Routing
RIP
EIGRP
OSPF
BGP
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Exercise 5
Exercise 6
Exercise 7
Summary
Chapter 9: Network Address Translation and Dynamic Host Configuration Protocol
NAT
Static Nat
Dynamic NAT
Port Address Translation (PAT)
DHCP
DHCP Process
Setting up a Router As a DHCP Client
Setting up a Router to Send a Request to a DHCP Server
Setting up a Router As a DHCP Server
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Summary
Chapter 10: Management Plane
The Management Plane Defined
Authentication and Authorization Basics
User Accounts
Password Recovery
Banners
Management Sessions
Telnet
SSH
Console and Auxiliary Lines
Disabling Services
Disabled Services
Disabled Services on Interfaces
Authentication, Authorization, and Accounting (AAA)
RADIUS
TACACS+
Monitoring/Logging
Simple Network Management Protocol
syslog
Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Summary
Chapter 11: Data Plane
Traffic Protocols
Filters and Introduction to Data Plane Security
State Machines
Stateful Protocols
Stateless Protocols
NetFlow and sFlow
Exercises
Summary
Chapter 12: Control Plane
Layer 2
Routing Protocols
Interior Gateway Protocols
Exterior Gateway Protocols
Protocol Independent Multicasting
Domain Name System
Network Time Protocol
Exercises
Preliminary Work
OSPF
BGP
NTP
EIGRP Named Mode with Authentication
Multicast
Exercise Answers
Preliminary Configuration
OSPF
BGP
NTP
EIGRP Name Mode with Authentication
Multicast
Summary
Chapter 13: Introduction to Availability
High Availability
First Hop Redundancy Protocol (FHRP)
HSRP
VRRP
GLBP
Multilinks
Availability Exercises
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Summary
Chapter 14: Advanced Switching
Port Security
DHCP Snooping
HSRP
VRRP
Server Load Balancing (SLB)
TFTP
IOS Switch Upgrade
Password Recovery
Virtual Switching Systems (VSS)
Advanced Switching Exercises
Advanced Switching Exercise Answers
Exercise 1
Exercise 2
Summary
Chapter 15: Advanced Routing
Policy-Based Routing Using Route Maps
Redistribution
RIP Redistribution Overview
EIGRP Redistribution Overview
OSPF Redistribution Overview
BGP Redistribution Overview
Avoiding Loops and Suboptimal Routing
EIGRP
Unicast
Summarization
Load Balancing
EIGRP Stub
Traffic Engineering with EIGRP
Authentication
Multiarea and Advanced OSPF
Summarization
OSPF Stub
Cost Manipulation
OSPF Virtual Link
Authentication
BGP
Address Families
Peer Groups and Templates
Dynamic Neighbors
Next Hop Issues with iBGP
Anycast
Traffic Engineering with BGP
IPv6 Routing
EIGRPv6
OSPFv3
GRE Tunnels
BGP Issues
IPSec
IOU8 Configuration
IOU9 Configuration
Advanced Routing Exercises
Exercise 1: EIGRP and OSFP Redistribution
Exercise 2: GREand IPSEC
Exercise 3: BGP
Exercise 4: IPv6 OSPF and EIGRP Redistribution
Exercise Answers
Exercise 1
Exercise 2
Exercise 3
Exercise 4
Summary
Chapter 16: Advanced Security
Owning Your Spanning Tree
Securing Your Trunks and Ports
802.1x (dot1x)
Examples Using OpenSSL to Generate Signed Certificates
CDP and LLDP
ARP the Way to IP
Private VLANs
Use Case
Promiscuous vs. Community vs. Isolated
Configuration
Using Extended ACLs, PACL, and VACL
VACL
PACL
AAA
Use Case
Console
AUX Port
VTY Ports
Local Authentication and Authorization
Remote AAA (TACACS, RADIUS)
Configuration
Advanced Security Exercises
Exercise 1: Extended ACL Exercises
Exercise 2: AAA Exercises
Exercise Answers
Exercise 1
Exercise 2
Summary
Chapter 17: Advanced Troubleshooting
Access Control List
VACL
PACL
Network Address Translation
Static NAT
Dynamic NAT
Overload
HSRP, VRRP, and GLBP
HSRP
VRRP
EIGRP
OSPF
BGP
Neighbor Relationships
Missing Prefixes
Route Redistribution
EIGRP
OSPF
GRE Tunnels
Recursive Routing
IPSec
IPv6
Advanced Troubleshooting Exercises
Exercise Answers
Exercise 1
Exercise 2
Summary
Chapter 18: Effective Network Management
Logs
Simple Network Management Protocol
Service Level Agreements and Embedded Event Manager
sFlow and Netflow Tools
Intrusion Detection and Prevention Systems
Management and Design of Management Data
Exercises
syslog
SNMP
Service Policy
Exercise Answers
Initial Configuration
syslog
SNMP
Service Policy
Summary
Chapter 19: Data Center and NX-OS
NX-OS
SSH and Telnet
User Accounts
VLAN
Configuring a Non-Routed VLAN
Configuring a VLAN As a Routed Switched Virtual Interface (SVI)
VLAN Trunking Protocol
EIGRP
OSPF
BGP
Port Channels
Port Profiles
FEX
First Hop Redundancy Protocols
HSRP
VRRP
GLBP
Network Virtualization
Virtual Device Context (VDC)
Virtual Port Channel (vPC)
Virtual Routing and Forwarding (VRF) Lite
NX-OS Exercise
Exercise Answer
Summary
Chapter 20: Wireless LAN (WLAN)
Wireless LANs (WLANs)
Wireless Standards
Wireless Components
Wireless Access Points
Wireless Controllers/Switches
Wireless Bridges
Wireless Repeaters
Wireless Antennas
Installing a WLAN
Wireless Site Survey
Range, Signal Strength, and Performance
Access Point Installation
Access Point Configuration
WLAN Controller Installation
WLAN Controller Configuration
Security
Encryption and Authentication
Threats and Vulnerabilities
Wireless Exercise
Exercise Answers
Summary
Chapter 21: ASA and IDS
Testing Policies in Safe Environment
Initial Setup
Baseline the Network
Access Rules
Open Services
Anti-Spoofing
Fragmentation
Designing Service Policies
Passwords
Chapter 22: Introduction to Network Penetration Testing
Overview
Reconnaissance and Scanning
Vulnerability Assessment
Exploitation
Summary
Chapter 23: Multiprotocol Label Switching
Multiprotocol Label Switching Basics
Label Protocols
LDP Security and Best Practices
LDP Verification
MPLS VPN
Site-to-Site VPN
Shared Extranet
Leaking Prefixes
IPv6 over MPLS
Exercises
MPLS Backbone
Site-to-Site VPN
Leak to Customer B
Tunneling IPv6
Exercise Answers
MPLS Backbone
Site-to-Site VPN
Leak to Customer B
Tunneling IPv6
Summary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Copyright
Next
Next Chapter
Contents at a Glance
Dedicated to my parents, wife, and sister with love.
—Chris Carthern
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset