Index

Numbers

3DES (Data Encryption Standard), 152, 338

3G/4G/5G, 302, 307, 314

800 series routers, 492

802.11 (Wi-Fi), QoS traffic marking, 373

900 series routers, 490

5500 series routers, 491

A

abstraction layers, virtualization, 589590

access

access attacks, 110113

remote access Trojan horses, 107

access control

data loss, 98

troubleshooting, 541

access layer

hierarchical network design, 462

scalable networks, 475

access points. See AP

accumulating costs, single-area OSPF, 6667

ACI (Application Centric Infrastructure), 598, 602

ANP, 602

APIC, 602603

APIC-EM, 606608

Nexus 9000 series switches, 602

spine-leaf topologies, 603

ACL (Access Control Lists), 164, 175, 188

ACE, 164165

best practices, 174175

creating, 173175, 183, 188

defined, 164

extended ACL, 166, 175176, 180181, 203204, 220

editing, 213214

named extended IPv4 ACL, 212216

numbered extended IPv4 ACL, 204206, 209210

ports, 207209

protocols, 206209

TCP-established extended ACL, 210211

verifying, 216218

implicit denies, 167, 182

inbound ACL filters, 166167

limits per interface, 173174

log keyword, 542

modifying, 195196, 219

sequence numbers method, 197198

text method, 196197

named ACL, 177

modifying, 198199

named extended IPv4 ACL, 212216

named standard IPv4 ACL, 189190, 193195

NAT pools, 246

network traffic, 165

numbered ACL, 176

numbered extended IPv4 ACL, 204206, 209210

numbered standard IPv4 ACL, 188189, 191193, 195

outbound ACL filters, 167

packet filtering, 164166

placement of, 177181

purpose of, 164168, 182

standard ACL, 166, 175176, 179, 190, 200203, 219220

stateful firewall services, 210, 220

statistics, 199

tasks using ACL, 165

traffic flows, 165

transport layer, troubleshooting, 539542

types of, 175181, 183184

verifying, 568570

wildcard masks, 168, 182183

calculating, 170172

examples of, 168169

IPv4 address ranges, 170

IPv4 subnets, 169170

keywords, 172173

matching hosts, 169170

addresses

mapping errors, troubleshooting, 536

spoofing attacks, 118, 120121

adjacencies

BDR, 51, 5456

DR, 51, 5456

routers, 2324

troubleshooting, 539

adjacency databases, OSPF, 5

adware, 108

AES (Advanced Encryption Standard), 152, 338

AF (Assured Forwarding) values, DSCP, 376377

AH (Authentication Headers), 336

algorithms

OSPF, 5

QoS queueing algorithms, 361, 383

CBWFQ, 364

FIFO, 362

LLQ, 365

WFQ, 362364

SHA, 146147, 339

SPF, 5, 89

amplification attacks, 118120

analyzing

cable analyzers, 527

dynamic NAT, 247249

information (troubleshooting process), 514

PAT, 254255

static NAT, 241242

ANP (Application Network Profiles), 602

Ansible, 643

AnyConnect Secure Mobility Client, 321

AP (Access Points), 288, 485

API (Application Programming Interface), 628629, 631, 633, 651

calls, 630

example of, 629630

internal (private) API, 632

JSON-RPC, 632633

open (public) API, 631632

partner API, 632

REST, 632639, 651652

SOAP, 632

web service API, 632633

XML-RPC, 632633

APIC (Application Policy Infrastructure Controller), 602603

APIC-EM (Application Policy Infrastructure Controller-Enterprise Module), 606608

application layer

DNS, 544

FTP, 544

HTTP, 544

NFS, 544

POP, 544

SMTP, 544

SNMP, 544

SSH, 544

telnet command, 544

TFTP, 544

troubleshooting, 543545

area ID

hello packets, 16

point-to-point OSPF networks, 40

ARP (Address Resolution Protocol)

cache poisoning, 128130

commands, 553554

process of, 128

spoofing attacks, 130

tables, 553554, 557

vulnerabilities, 127130

arrays, 625

ASA (Adaptive Security Appliances), 140, 321

ASBR (Autonomous System Boundary Routers), 74

ASIC (Application-Specific Integrated Circuits), 485486

ASR 1000 series routers, 490491

ASR 9000 series routers, 488491

assets (security), defined, 96

assigning

router ID, 40

VLAN, troubleshooting, 556558

asymmetric encryption, 152156

ATM (Asynchronous Transfer Mode), 296, 324

attacks (security), 109, 158

access attacks, 110113

address spoofing attacks, 118, 120121

amplification attacks, 118120

baiting attacks, 114

buffer overflow attacks, 112113

DDoS attacks, 116117

DoS attacks, 115116

dumpster diving attacks, 114

ICMP attacks, 117119

impersonation attacks, 114

IP attacks, 117122

MITM attacks, 112113, 118

password attacks, 111

phishing attacks, 114. See also spear phishing attacks

port redirection attacks, 112

pretexting attacks, 114

reconnaissance attacks, 109110

reflection attacks, 118120

session hijacking attacks, 118

shoulder surfing attacks, 114

social engineering attacks, 114115

something for something (quid pro quo) attacks, 114

spam attacks, 114

spear phishing attacks, 114. See also phishing attacks

spoofing attacks, 111

tailgaiting attacks, 114

tools, 101102

trust exploitation attacks, 111

types of attacks, 104105

attenuation, troubleshooting, 533

authentication, 339340

AH, 336

HMAC, 147149, 338339

MD5, 339

origin authentication, 144

HMAC, 147149

IPsec, 333, 335

PSK, 339340

RSA, 340342

SHA, 339

authoritative time sources, 401402, 443444

automation, 619, 641, 651

API, 628629, 631, 633, 651

calls, 630

example of, 629630

internal (private) API, 632

JSON-RPC, 632633

open (public) API, 631632

partner API, 632

REST, 632639, 651652

SOAP, 632

web service API, 632633

XML-RPC, 632633

benefits of, 619620

Cisco DNA, 647648

Cisco DNA Center, 648650, 652

concept of, 620621

configuration management tools, 639, 642643, 652

Ansible, 643

Chef, 643

CLI, 639

network automation, 641

Puppet, 643

SaltStack, 643

SNMP, 640641

data formats, 620, 628

JSON, 622626

key/value pairs, 622628

rules of, 622

syntax, 622

XML, 623, 627628

YAML, 623, 626627

IBN, 644646, 652

JSON, 622627

arrays, 625

format of, 623

IPv4 addresses, 625626

JSON-RPC, 632633

syntax, 624626

smart devices, 620

XML, 623, 627628

YAML, 623, 626627

availability, network security, 138

AWA Management Console, 586

B

backbone networks, 287

backhaul networks, 287

backups

configurations from TFTP servers, 428430, 436

IOS images, 437442

baiting attacks, 114

bandwidth, 354

DSL Internet connectivity, 302

reference bandwidth, single-area OSPF, 6466

scalable networks, 474475

baselines, 507509

baselining tools, 524

performance, troubleshooting, 532, 535

BDR (Backup Designated Routers), 17

adjacencies, 51, 5456

election

in OSPF, 20, 2324

process of, 5659

LSA, 2426

multiaccess OSPF networks, 4951, 53, 5659

router priorities, 6163

BE (Best Effort) values, DSCP, 376

best practices

ACL, 174175

network security, 137, 159

availability, 138

confidentiality, 138

defense-in-depth approach, 138139

firewalls, 139140

IDS, 140141

integrity, 138

IPS, 140141

layered approach, 138139

best-effort QoS policy model, 366367

black hat hackers, 99

blacklisting URL (Uniform Resource Locators), 142

boot sector viruses, 107

boot system, configuring IOS images, 441442

BOOTP, troubleshooting, 543

borderless switched networks, 458461

bottlenecks/congestion (networks), troubleshooting, 532

bottom-up troubleshooting method, 518519

branch networks, 281

branch routers, 488

breaches (security), 95

broadband connectivity

dedicated broadband WAN connectivity, 297298

Internet-based broadband WAN connectivity, 298, 314315

3G/4G/5G, 302, 307, 314

cable Internet connectivity, 305306

DSL Internet connectivity, 302304

ISP Internet connectivity, 309310

LTE, 307

solution comparisons, 311

teleworking, 283, 302, 308, 312, 314

wired Internet connectivity, 301302

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306307

broadcast multiaccess networks, 49, 84

broadcasts, troubleshooting, 536

buffer overflow attacks, 112113

buffered logging, 529

building switch blocks, 474

business considerations for switch selection, 486487

C

cable analyzers, 527

cable modems, 288

cable testers, 526527

cabling

DOCSIS, 305

faults, troubleshooting, 533

fiber optic Internet connectivity, 305306

HFC networks, cable modems, 305

Internet connectivity, 305

optical nodes, 305

SDH cabling standard, 291292

SONET cabling standard, 291292

calendar services, network management, 400

CAM tables, spoofing attacks, 121

campus LAN switches, 477478

campus networks, 280

carrier protocols, 329

carrier WAN connections, 278

dual-carrier WAN connections, 278279

single-carrier WAN connections, 278

Catalyst 2960-C series switches, 485486

Catalyst 3560-C series switches, 485

causes of network problems, troubleshooting, 573574

data link layer, 534537

physical layer, 531534

CBWFQ (Class-Based Weight Fair Queuing), 364

CDP (Cisco Discovery Protocol), 390396, 441442

CEF (Cisco Express Forwarding), Layer 3 switches, 596

cellular Internet connectivity, 306307

central controller and SDN, 597

changing passwords, 435

Chef, 643

circuit-switched network communications, 290

circuit-switched WAN connectivity, 295

Cisco DNA Assurance, 648

Cisco DNA Center, 648650, 652

Cisco DNA (Digital Network Architecture), 647648

Cisco DNA Security, 648

classification/marking tools (QoS), 371372

classifying traffic, 362363, 368

CLI (Command Line Interface), 639

client-based VPN, 321, 326

clientless VPN, 326

clock (software)

setting manually, 400

source, displaying, 403

cloud computing, 583, 585586, 609

cloud services, 584

cloud-managed switches, 478

community clouds, 585

data centers versus, 585

hybrid clouds, 584585

IaaS, 584

PaaS, 584

private clouds, 584

public clouds, 584

SaaS, 584

storage devices, data loss, 98

CnC (Command and Control), 116117, 132133

CO (Central Office), WAN, 286

code delays, 355

collapsed core network design, 464

collecting data, IOS commands, 511512

communications (network)

circuit-switched network communications, 290

demodulation, 288, 295

DWDM multiplexing, 292

jitter, 291, 294, 355

latency, 291, 294, 302, 314

modulation, 288, 295

packet-switched network communications, 290291

ATM, 296, 324

Frame Relay networks, 295296

parallel network communications, 289

SDH cabling standard, 291292

serial network communications, 289

SONET cabling standard, 291292

community clouds, 585

community strings (SNMP), 412415

comparison troubleshooting method, 522

compromised-key attacks, 105

confidentiality

data confidentiality, 144, 150

IPsec, 333334, 336338

network security, 138

configuration register, password recovery, 433435, 437

configuring

CDP, 391393

configuration management tools, 639, 642643, 652

Ansible, 643

Chef, 643

CLI, 639

network automation, 641

Puppet, 643

SaltStack, 643

SNMP, 640641

dynamic NAT, 245247, 251

LLDP, 397

NAT, 260

networks

CLI, 639

SNMP, 640641

NTP, 402405

OSPF

ipospf command, 4344

network command, 4143

router priorities, 6163

PAT

address pools, 253

single IP addresses, 252

point-to-point OSPF networks, 49

restoring configurations from, text files, 428430

routers

copying configurations, 431

ID, 3839

restoring configurations, 432

saving configurations, 435

verifying configurations, 432

static NAT, 240241

switches

fixed configuration switches, 480

modular configuration switches, 480

stackable configuration switches, 481

Syslog, 422423

Syslog traps, 530531

congestion, 353354

avoidance tools, 371, 379380

management tools, 371, 379380

troublehooting, 532

connectivity

IP connectivity, troubleshooting, end-to-end connectivity, 545549

loss of, 532

troubleshooting, 535, 539

WAN connectivity

3G/4G/5G, 302, 307, 314

cable Internet connectivity, 305306

circuit-switched WAN connectivity, 295

dedicated broadband WAN connectivity, 297298

DSL Internet connectivity, 302304

Internet-based broadband WAN connectivity, 298, 301311, 314315

ISDN, 295

ISP Internet connectivity, 309310

leased-line WAN connectivity, 293294

LTE, 307

Metro Ethernet WAN connectivity, 298300, 332

modern WAN connectivity, 296301, 314

MPLS, 298, 300301, 324, 332

packet-switched WAN connectivity, 298

PSTN, 295

solution comparisons, 311

teleworking, 283, 302, 308, 312, 314

traditional WAN connectivity, 292296, 312313

wired Internet connectivity, 301302

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306307

wireless connectivity, scalable networks, 466467

console error messages, troubleshooting, 533

console logging, 529

console messages, troubleshooting, 536

content security appliances

ESA, 142

WSA, 142143

control plane, SDN, 595

controller-based SDN, 605, 611612

converged networks, 458, 493

convergence

link-state operation, 6

OSPF routers, 1726

converters (optical), 288

copying

IOS images to TFTP servers, 439440

router configurations to USB drives, 431432

core devices (WAN), 288

core layer (hierarchical network design), 462

CoS traffic marking, 373374, 377378

cost metrics

single-area OSPF, 6364

accumulating costs, 6667

manually setting cost value, 6667

reference bandwidths, 65

switches, 486

VPN, 322

CPE (Customer Premises Equipment), 286

CPU (Central Processing Units)

high utilization rates, troubleshooting, 533

overloads, troubleshooting, 534

cryptography, 143, 156, 159

data confidentiality, 144, 150

data integrity, 144145

data nonrepudiation, 144

encryption

3DES, 152

AES, 152

asymmetric encryption, 152156

DES, 152

DH, 154156

DSA, 154

DSS, 154

ElGamal, 154

elliptic curve cryptography, 154

public key algorithms, 152156

RC series algorithms, 152

RSA, 154

SEAL, 152

symmetric encryption, 151152

hash functions, 144

MD5, 145

SHA, 146147

origin authentication, 144, 147149

CS (Class Selector) bits, DSCP, 377378

CSU (Channel Service Units), 288

cybercriminals, 100

cybersecurity (current state of), 95, 157. See also security

assets, 96

breaches, 95

current state of affairs, 9596

cybercriminals, 95

exploits, 96

mitigation, 96

risk, 96

threats, 96

vectors of

data loss, 9798

network attacks, 9697

vulnerabilities, 96

D

dark fiber, 297298

data centers

cloud computing versus, 585

switches, 478

data collection, IOS commands, 511512

data confidentiality, 144, 150

data delays, 360361

data exfiltration, 9798

data formats, 620, 628

concept of, 620621

JSON, 622624, 626627

arrays, 625

IPv4 addresses, 625626

JSON-RPC, 632633

syntax, 624626

key/value pairs, 622628

rules of, 622

syntax, 622, 624626

XML, 623, 627628

YAML, 623

data integrity, 144145, 333, 335, 338339

data link layer (networks), troubleshooting, 534537

data loss vectors (security), 9798

data measurement, network documentation, 510512

data modification attacks, 105

data nonrepudiation, 144

data plane, SDN, 596

data sending Trojan horses, 107

data structures, OSPF, 45

data traffic, 357, 360361

databases

adjacency databases, 5

forwarding databases, 5

LSDB 5, 7

OSPF, 5, 2022

topology databases, troubleshooting, 539

DBD (Database Description) packets, 1314, 2122

DCE (Data Communications Equipment), 286288

DDoS (Distributed Denial of Service) attacks, 116117

dead intervals, 16, 7073

debug command, 517

debuggers, 104

dedicated broadband WAN connectivity, 297298

dedicated servers, virtualization, 586587

default gateways, verifying, 558560

IPv4, 559

IPv6, 560562

defense-in-depth approach (network security), 138139

defining problems (troubleshooting process), 514

de-jitter delays, 355

delays, 353

code delays, 355

data delays, 360361

de-jitter delays, 355

fixed delays, 355

jitter, 291, 294, 355

packetization delays, 355

playout delay buffers, 355356

propagation delays, 355

queuing delays, 355

serialization delays, 355

variable delays, 355

demarcation points, 286

demodulation, 288, 295

Denial of Service. See DoS attacks

density (port), switches, 482, 486

departmental switch blocks, 474

DES (Data Encryption Standard), 152, 338

design limits, troubleshooting, 534

designing networks, 455

borderless switched networks, 458461

collapsed core network design, 464

hierarchical networks, 493

access layer, 462, 475

borderless switched networks, 458461

core layer, 462

distribution layer, 462

OSPF, 476477

scalability, 455458

switched networks, 464465

three-tier network design, 455, 460, 463

two-tier network design, 461, 464

line cards, 480, 482

routers, 494495

800 series routers, 492

900 series routers, 490

5500 series routers, 491

ASR 1000 series routers, 490491

ASR 9000 series routers, 490491

branch routers, 488

fixed configuration routers, 492

form factors, 490492

industrial routers, 490, 492

modular routers, 492

network edge routers, 488489

requirements, 487488

service provider routers, 489

scalable networks, 465466, 477, 493494

access layer, 475

bandwidth, 474475

failure domains, 469474

hierarchical networks, 455458

multiple links, 466467

redundancy plans, 469

redundant links, 466467

scalable routing protocol, 467468

tuning routing protocols, 476477

wireless connectivity, 465466

SFP devices, 482

switches, 477, 487, 494495

ASIC, 485486

business considerations for switch selection, 486487

campus LAN switches, 477478

Catalyst 2960-C series switches, 485486

Catalyst 3560-C series switches, 485

cloud-managed switches, 478

data center switches, 478

fixed configuration switches, 480

form factors, 479481

forwarding rates, 483

modular configuration switches, 480

multilayer switching, 485486

platforms, 477479

PoE, 484486

port density, 482

RU, 481, 494

service provider switches, 479

stackable configuration switches, 481

thickness of switches, 481

virtual networks, 479

wire speeds, 483

three-tier network design, 455, 460, 463

two-tier network design, 461, 464

virtual networks, switches, 479

destination ports, troubleshooting, 541

destructive Trojan horses, 107

device discovery

CDP, 390396, 443

LLDP, 396400, 443

device documentation (networks), 505, 512

end-system documentation files, 506507

routers, 505506

switches, 506

device-based SDN, 604605

DH (Diffie-Hellman), 154156

DHCP (Dynamic Host Configuration Protocol), 133

rogue DHCP servers, 121, 134136

spoofing attacks, 134136

troubleshooting, 543

dialup modems. See voiceband modems

Diffie-Hellman key exchanges, 333, 335, 342343

DiffServ (Differentiated Services), 366, 369370

digital certificates, 327, 333, 335, 339, 341342, 344345

digital multimeters (DMM), 525526

Dijkstra’s algorithm, 5

disaster recovery, virtualization, 589

discovering devices

CDP, 390396, 443

LLDP, 396400, 443

distributed networks, 282

distribution layer (hierarchical network design), 461462, 493

divide-and-conquer troubleshooting method, 520521

DLCI (Data-Link Connection Identifiers), 296

DMM (Digital Multimeters), 525526

DMVPN (Dynamic Multipoint VPN), 330331

DNS (Domain Name System), 131, 544

domain shadowing attacks, 132

open resolver attacks, 131

stealth attacks, 132

traffic analysis, 136

troubleshooting, 543

tunneling, 132133

verifying, 570571

DOCSIS (Data Over Cable Service Interface Specification), 305

documentation, networks, 502, 572

baselines, 507509

device documentation, 505, 512

data measurement, 510512

end-system documentation files, 506507

routers, 505506

switches, 506

logical network topologies, 504505

overview of, 502

physical network topologies, 503

domain shadowing attacks, 132

DoS (Denial of Service) attacks, 105, 107, 115116

Down state, 1719

DR (Designated Routers), 16

adjacencies, 51, 5456

election

in OSPF, 20, 2324

process of, 5659

failures/recovery, 5859

LSA, 2426

multiaccess OSPF networks, 4951, 5354, 5659

router priorities, 6163

single-area OSPF, router ID, 36

drives (USB)

copying router configurations to, 431432

displaying contents of, 430

verifying connections, 430431

DROTHER, 25, 5051, 5253

DSA (Digital Signature Algorithm), 154

DSCP (Differentiated Services Code Points), 375378

DSL (Digital Subscriber Line) Internet connectivity, 302303

bandwidth space allocation, 302

DSLAM, 303

example of, 303

modems, 288

PPP, 303304

DSP (Digital Signal Processors), 357

DSS (Digital Signature Standard), 154

DSU (Data Service Units), 288

DTE (Data Terminal Equipment), 286288

dual stacks, 259, 263

dual-carrier WAN connections, 278279

dual-homed ISP connectivity, 309

dual-homed WAN topology, 276

dual-multihomed ISP connectivity, 310

dumpster diving attacks, 114

duplex mismatches, troubleshooting, 551553

DWDM multiplexing, 292

dynamic NAT (Network Address Translation), 232233, 244245, 260261

analyzing, 247249

configuring, 245247, 251

topologies, 244245

verifying, 249251

E

eavesdropping attacks, 105

E-carriers, 294

edge routers, 74

failure domains, 470471

network edge routers, 488489

educated guess troubleshooting method, 522

EF (Expedited Forwarding) values, DSCP, 376

egress packets, 372

ElGamal, 154

eliminating probable cause (troubleshooting process), 514

elliptic curve cryptography, 154

email

data loss, 98

POP, 544

SMTP, 544

EMI (Electromagnetic Interference), troubleshooting, 534

encapsulating

errors, troubleshooting, 536

protocols (IPsec), 336

encryption

3DES, 338

AES, 152, 338

asymmetric encryption, 152156

DES, 152, 338

DH, 154156

DSA, 154

DSS, 154

ElGamal, 154

elliptic curve cryptography, 154

encryption protocols, troubleshooting, 542

protocols, troubleshooting, 543

public key algorithms, 152156

RC series algorithms, 152

RSA, 154

SEAL, 152, 338

symmetric encryption, 151152

tools, 104

end users (troubleshooting process), questioning, 515516

endpoint groups (EPG), 602

end-system documentation files, 506507

end-to-end IP connectivity, troubleshooting

components of, 545547

IPv4

pinging, 547548

traceroute command, 548

IPv6

pinging, 548549

traceroute command, 548549

reference topologies, 545547

enterprise networks, 458, 477, 487, 491, 493494

enterprise VPN (Virtual-Private Networks), 324325

EoMPLS. See Metro Ethernet WAN connectivity

EPG (Endpoint Groups), 602

error messages (console), troubleshooting, 533

ESA (Email Security Appliance), 142

ESP (Encapsulation Security Protocol), 336

established keyword, troubleshooting, 542

Ethernet

CoS traffic marking, 373374, 377378

Metro Ethernet WAN connectivity, 298300, 332

network adjacencies, 2324

PoE, switches, 484486

PPPoE, DSL Internet connectivity, 303304

QoS traffic marking, 373

WAN, 297298

ethical hacking, 95

excessive broadcasts, troubleshooting, 536

Exchange state, 18

exfiltration of data, 9798

exploits (security), defined, 96

ExStart state, 18

extended ACL (Access Control Lists), 166, 175176, 180181, 203204, 220

editing, 213214

named extended IPv4 ACL, 212216

numbered extended IPv4 ACL, 204206, 209210

ports, 207209

protocols, 206209

TCP-established extended ACL, 210211

verifying, 216218

F

failover tests to backup routes, single-area OSPF, 69

failure domains

edge routers, 470471

scalable networks, 469474

failures/recovery

routers, multiaccess OSPF networks, 5859

single point of failure, 275, 278

FIB (Forwarding Information Base), 596

fiber optic Internet connectivity, 305306

FIFO (First-In, First-Out), 362

file systems

Flash file systems, 425

IOS File System, 424, 437442

NVRAM file systems, 425426

restoring configurations from, text files, 428430

router file systems, 423425, 445446

switch file systems, 426427, 445446

filtering

network traffic with ACL

inbound ACL filters, 166167

outbound ACL filters, 167

URL, 142

firewalls, 139140, 210, 220

firmware viruses, 107

fixed configuration routers, 492

fixed configuration switches, 480

fixed delays, 355

Flash

backing up configurations from, 436

file systems, 425

IOS images, verifying size of, 439441

flexibility, borderless switched networks, 459

flood attacks

TCP SYN flood attacks, 124

UDP flood attacks, 127

flooding LSA, 2324

flow control, TCP, 123

flow tables (switches), 601

flowcharts (troubleshooting), 512513

follow-the-path troubleshooting method, 521522

forensic tools, 103

form factors

routers, 490492

SFP devices, 482

switches, 479481

forwarding databases, OSPF, 5

Forwarding Information Base (FIB), 596

forwarding rates (switches), 483

frame buffers, switches, 487

Frame Relay networks, 295296

framing errors, troubleshooting, 537

FTP (File Transfer Protocol), 107, 544

FTTB (Fiber-to-the-Building) Internet connectivity, 306

FTTH (Fiber-to-the-Home) Internet connectivity, 306

FTTN (Fiber-to-the-Node/Neighborhood) Internet connectivity, 306

FTTx Internet connectivity, 305306

Full state, 18

full-duplex, 551553

fully meshed WAN topology, 276

functionality, troubleshooting, 535

fuzzers, 103

G

gateways (default), verifying, 558560

IPv4, 559

IPv6, 560562

gathering information (troubleshooting process), 514, 516517

general network issues, troubleshooting, 539

general troubleshooting procedures, 512513

get operations (SNMP), 406407

global NAT addresses, 229231

gray hat hackers, 99

GRE (Generic Routing Encapsulation)

GRE over IPsec, 328329

mGRE, 330331

group tables (switches), 602

H

hackers, 98100

hacking

OS, 104

tools, 103

hacktivists, 100

half-duplex, 551553, 575

hard copies, data loss, 98

hardware, troubleshooting

faults, 533

tools

cable analyzers, 527

cable testers, 526527

DMM, 525526

portable network analyzers, 528

Prime NAM, 528

Syslog server, 529531

hash functions

MD5, 145

SHA, 146147

headend, 305

headers

TCP headers, 122

UDP headers, 126

hello intervals, 16

hello packets, 1317

intervals, single-area OSPF, 6973

neighbor adjacencies, OSPF link-state operation, 6

HFC networks, cable modems, 305

hierarchical networks, 493

access layer, 462, 475

borderless switched networks, 458461

core layer, 462

designing, OSPF, 476477

distribution layer, 461462, 493

OSPF, 476477

scalability, 455458

switched networks, 464465

three-tier network design, 455, 460, 463

two-tier network design, 461, 464

hierarchical topologies, multi-area OSPF, 11

high CPU utilization rates, troubleshooting, 533

HMAC (Hash Message Authentication Code), 147149, 338339

HTTP (Hypertext Transfer Protocol), 544, 634639

hub routers, 275276

hub-and-spoke WAN topology, 275, 330331

hybrid clouds, 584585

hypervisors, 588, 591593

hypotheses (troubleshooting process)

proposals, 514

testing, 515

I

IaaS (Infrastructure as a Service), 584

IBN (Intent-Based Networking), 644646, 652

ICMP attacks, 117119

ID

area ID, point-to-point OSPF networks, 40

router ID, 16, 40, 83

assigning, 40

choosing, 3637

configuration mode, 35

configuring, 3839

DR election, 36

loopback interfaces, 3738

modifying, 3940

order of precedence, 3637

reference topologies, 3435, 38

rid values, 37

synchronization of OSPF databases, 36

verifying, 3839

IDS (Intrusion Detection Systems), network security, 140141

IEEE 802.1p. See CoS traffic marking

IFS (IOS File System), 424, 437442

IKE (Internet Key Exchange), 335

images (IOS), managing, 446

backups, 438441

boot system configurations, 441442

TFTP backups, 437442

impersonation attacks, 114

implicit denies, 167, 182, 541

inbound ACL filters, 166167

industrial routers, 490, 492

information (troubleshooting process)

analyzing, 514

gathering, 514, 516517

ingress packets, 372

Init state, 1719

input errors, troubleshooting, 551

input queue drops, 550

inside NAT addresses, 229231

integrity

of data, 144145, 333, 335, 338339

network security, 138

interfaces, show interfaces command, 549550

interference, troubleshooting, 534

internal (private) API, 632

Internet-based broadband WAN connectivity, 298, 314315

3G/4G/5G, 302, 307, 314

cable Internet connectivity, 305306

DSL Internet connectivity, 302, 303

bandwidth space allocation, 302

DSLAM, 303

example of, 303

PPP, 303304

ISP Internet connectivity

dual-homed ISP connectivity, 309

dual-multihomed ISP connectivity, 310

multihomed ISP connectivity, 309310

single-homed ISP connectivity, 309

LTE, 307

microwave Internet connectivity. See WiMAX

solution comparisons, 311

teleworking, 283, 302, 308, 312, 314

wired Internet connectivity, 301302

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306, 308

cellular Internet connectivity, 306307

municipal Wi-Fi Internet connectivity, 306

satellite Internet connectivity, 307

WiMAX, 307

interoperability areas (transport layer), troubleshooting, 542543

IntServ (Integrated Services), 366368

IOS commands

data collection, 511512

gathering information (troubleshooting process), 516517

IOS File System, 424, 437442, 446

IOS log messages, severity levels (Syslog), 530

IP (Internet Protocol)

show ip interface brief command, 517

show ip route command, 517

IP addresses, attacks, 105, 117122, 158. See also security

IP connectivity, troubleshooting, 574576

ACL, verifying, 568570

DNS, verifying, 570571

end-to-end connectivity

components of, 545547

duplex mismatches, 551553

IPv4 pinging, 547548

IPv4 traceroute command, 548

IPv6 pinging, 548549

IPv6 traceroute command, 548549

reference topologies, 545547

verifying physical layer, 549551

local network addressing, end-to-end connectivity, 553556

network paths, verifying, 562566

transport layer, verifying, 566567

verifying physical layer, 549551

VLAN assignments, 556562

IP phone, PoE, 484

IP services, 127130, 158

ipospf command, point-to-point OSPF networks, configuring OSPF, 4344

ipospf priority command, 61

IPP (IP Precedence), 373, 375, 377378

IPS (Intrusion Prevention Systems), 140141

IPsec (IP Security), 332345. See also VPN

AH, 336

authentication, 339340

PSK, 339, 340

RSA, 340342

confidentiality, 333334, 336338

data integrity, 333, 335, 338339

Diffie-Hellman key exchanges, 333, 335, 342343

ESP, 336

framework of, 334335

GRE over IPsec, 328329

origin authentication, 333, 335

protocol encapsulation, 336

SA, 334335

SSL comparisons, 326327

transport and tunnel mode, 343

VTI, 331332

IPv4 (Internet Protocol version 4)

ACL, 175, 188. See also extended ACL; named ACL; numbered ACL; standard ACL

creating, 188

modifying, 195198, 219

placement of, 177181

stateful firewall services, 210, 220

statistics, 199

wildcard masks, 168173

addressing

ranges, wildcard masks, 170

troubleshooting, 541

ARP tables, 553554

attacks, 117118

default gateways, 559

extended ACL, 175176, 180181, 203204, 220

editing, 213214

named extended IPv4 ACL, 212216

numbered extended IPv4 ACL, 204206, 209210

ports, 207209

protocols, 206209

TCP-established extended ACL, 210211

verifying, 216218

JSON, 625626

logical network topologies, 504

named ACL, 177

modifying, 198199

named extended IPv4 ACL, 212216

named standard IPv4 ACL, 189190, 193195

NAT, 226, 237

advantages of, 238, 261

configuring, 260

defined, 227228

disadvantages of, 238239, 261

dynamic NAT, 232233, 244251, 260261

global NAT addresses, 229231

inside global NAT addresses, 230

inside local NAT addresses, 230231

inside NAT addresses, 227231

local NAT addresses, 229231

NAT overload. See PAT

NAT64, 258259

NAT-PT, 259

operation of, 228229

outside global NAT addresses, 231

outside local NAT addresses, 231

outside NAT addresses, 229, 231

PAT, 233234, 237, 251257, 260261

pools, 245247

private IPv4 addresses, 226227

static NAT, 231232, 239244, 260261

stub networks, 228

terminology, 229231

troubleshooting, 542543

numbered ACL, 176

numbered extended IPv4 ACL, 204206, 209210

numbered standard IPv4 ACL, 188189, 191193, 195

packet headers, 374375

pinging, 547548

private addresses, 226227

QoS traffic marking, 373

standard ACL, 175176, 179, 190, 200203, 219220

subnets, wildcard masks, 169170

traceroute command, 548

Type of Service field, 375

wildcard masks

address ranges, 170

subnets, 169170

troubleshooting, 541

IPv6 (Internet Protocol version 6)

attacks, 117118

default gateways, 560562

logical network topologies, 505

NAT64, 258259

neighbor tables, 554555

packet headers, 374375

pinging, 548549

QoS traffic marking, 373

show ipv6 interface brief command, 517

show ipv6 route command, 517

traceroute command, 548549

Traffic Class field, 375

ISDN (Integrated Services Digital Networks), 295

ISP (Internet Service Providers)

Internet connectivity

dual-homed ISP connectivity, 309

dual-multihomed ISP connectivity, 310

MPLS VPN, 332

multihomed ISP connectivity, 309310

single-homed ISP connectivity, 309

VPN, 324325

routers, 489

switches, 479

VPN, 324325

ISR 4000 series routers, 488

J

jabber, 533

jitter, 291, 294, 355

JSON (JavaScript Object Notation), 622624, 626627

arrays, 625

format of, 623

IPv4 addresses, 625626

JSON-RPC, 632633

syntax, 624626

JSON-RPC (JavaScript Object Notation-Remote Procedure Call), 632633

K

keylogger attacks, 107

keys (security), compromised-key attacks, 105

key/value pairs, 622628

knowledge bases, 524

L

LAN (Local-Area Networks)

campus LAN switches, 477478

switches, device documentation, 506

WAN comparisons, 272273

last mile (local loops), 286

latency, 291, 294, 302, 314

Layer 2 MPLS VPN, 324, 332, 344

Layer 2 QoS traffic marking, 373374

Layer 2 traffic marking, 373374

Layer 3 MPLS VPN, 324, 332, 334, 344

Layer 3 switches, SDN, 596

Layer 3 traffic marking, 374375

layered approach (network security), 138139

layered models, troubleshooting with, 517518

leased-line WAN connectivity, 293294

legacy support, virtualization, 589

line cards, 480, 482

links, scalable networks

multiple links, 466467

redundant links, 466467

link-state operation

convergence, 6

OSPF, 6

establishing neighbor adjacencies, 6

LSA, 67

LSDB, 7

SPF algorithms, 89

SPF trees, 89

route selection, 89

link-state routing protocols. See OSPF

list of neighbors, 17

LLDP (Link Layer Discovery Protocol), 396400, 443

LLQ (Low Latency Queuing), 365

Loading state, 18

local loops (last mile), 286

local NAT addresses, 229231

local network addressing, verifying, 553556

log keyword, ACL, 542

logging

buffered logging, 529

console logging, 529

logging trap command, 530

logical network topologies, 504505

loopback interfaces

point-to-point OSPF networks, 48

router ID, 3738

loops

local loops (last mile), 286

STP loops, troubleshooting, 537

LSA (Link-State Advertisements)

BDR, 2426

DR, 2426

exchanging, OSPF, 67

flooding, 2324

LSU packets, 14

LSAck (Link-State Acknowledgement) packets, 1314

LSDB (Link-State Databases)

OSPF, 5, 7

topology tables, 7

LSR (Label-Switched Routers), 300301

LSR (Link-State Request) packets, 1314, 22

LSU (Link-State Update) packets, 1314

LTE (Long-Term Evolution), 307

M

MAC addresses

spoofing attacks, 120121

switch MAC address tables, 555557

macros, viruses, 107

malware, 106, 108109, 157

adware, 108

overview of, 106

ransomware, 108

rootkits, 108

spyware, 108

Trojan horses, 106107

viruses, 106107

worms, 106, 108

management plane, SDN, 598

managing networks, 390

calendar services, 400

CDP, 390396, 443

configurations

backups, 428430, 436

restoring from text files, 428430

IOS images, 424, 437442

LLDP, 396400, 443

NTP, 400405, 443444

passwords

changing, 435

recovery, 433437

routers

copying configurations, 431

file systems, 423424, 445446

restoring configurations, 432

saving configurations, 435

USB ports, 430

verifying configurations, 432

SNMP, 405418, 444

switch file systems, 426427, 445446

Syslog, 418423, 444445

time services, 400

USB drives

copying router configurations to, 431432

displaying contents of, 430

verifying connections, 430431

man-in-the-middle attacks. See MITM

marking/classification tools (QoS), 371372

MD5 (Message-Digest 5), 339

MD5 hash function, 145

measuring data, network documentation, 510512

meter tables (switches), 602

Metro Ethernet WAN connectivity, 298300, 332

mGRE (Multipoint GRE), 330331

MIB (Management Information Base)

OID, 415

variables, SNMP agents, 407

microwave Internet connectivity. See WiMAX

mission-critical services, 455456, 490

mitigation (security), defined, 96

MITM (Man-in-the-Middle) attacks, 105, 112113, 118

modems

cable Internet connectivity, 305

cable modems, 288

CSU, 288

dialup modems. See voiceband modems

DSL modems, 288

DSU, 288

voiceband modems, 288

modern WAN connectivity, 296301, 314

modifying

ACL, 195196, 219

named ACL, 198199

sequence numbers method, 197198

text method, 196197

router ID, 3940

single-area OSPF, 8586

modular configuration switches, 480

modular routers, 492

modularity, borderless switched networks, 459

modulation, 288, 295

MPLS (Multi-Protocol Label Switching), 298, 300301, 324

Layer 2 MPLS VPN, 324, 332, 344

Layer 3 MPLS VPN, 324, 332, 334, 344

QoS traffic marking, 373

VPN, 332

multiaccess OSPF networks, 49

adjacencies, 5456

designated routers, 4951

election process, 5659

reference topologies, 5152, 57

router election process, 5659

router failures/recovery, 5859

router priorities, 6163

verifying router roles, 5254

multi-area OSPF, 911

multihomed ISP connectivity, 309310

multilayer switching, 485486

multimeters (digital), 525526

multiple adjacencies, routers, 2324

multiple links, scalable networks, 466467

municipal Wi-Fi Internet connectivity, 306

N

NAM (Network Analysis Module), 528

named ACL (Access Control Lists), 177

modifying, 198199

named extended IPv4 ACL, 212216

named standard IPv4 ACL, 189190, 193195

NAT (Network Address Translation), 226, 237

advantages of, 238, 261

characteristics of, 227231

configuring, 260

defined, 227228

disadvantages of, 238239, 261

dynamic NAT, 232233, 244, 245247, 249251, 260261

analyzing, 247249

configuring, 251

topologies, 244245

global NAT addresses, 229231

inside global NAT addresses, 230

inside local NAT addresses, 230231

inside NAT addresses, 229231

local NAT addresses, 229231

NAT overload. See PAT

NAT64, 258259

NAT-PT, 259

operation of, 228229

outside global NAT addresses, 231

outside local NAT addresses, 231

outside NAT addresses, 229, 231

PAT, 233234, 251, 260261

analyzing, 254255

configuring, 252253

NAT comparisons, 236237

next available port, 233234

source port assignments, 235

verifying, 256257

pools, 245247

private IPv4 addresses, 226227

routers, private/public IPv4 address translations, 227

static NAT, 231232, 239240, 242244, 260261

analyzing, 241242

configuring, 240241

topology, 240

stub networks, 228

terminology, 229231

troubleshooting, 542543

NBAR (Network Based Application Recognition), 372

NBMA (Non-Broadcast Multiaccess) networks, 70

NCS 6000 series routers, 489

neighbor adjacencies

establishing, 1820

OSPF link-state operation, 6

troubleshooting, 539

neighbor tables (IPv6), 554555

neighbors, list of, 17

NETCONF, 638639

network addresses, prefixes, 12

Network Analysis Module (NAM), 528

network analyzers (portable), 528

network command, point-to-point OSPF networks

command syntax, 40

configuring OSPF, 4143

network edge routers, 488489

network layer, troubleshooting, 537539

network masks, hello packets, 16

networks

ACL, 164, 165, 175, 188

ACE, 164165

best practices, 174175

creating, 173175, 183, 188

defined, 164

extended ACL, 175176, 180181, 203206, 207218, 220

implicit denies, 167, 182

limits per interface, 173174

modifying, 195196, 219

modifying, sequence numbers method, 197198

modifying with text method, 196197

named ACL, 177, 189190, 193195, 198199, 212216

numbered ACL, 176, 188189, 191193, 195, 204206, 209210

packet filtering, 164168

placement of, 177181

purpose of, 164168, 182

standard ACL, 175176, 179, 190, 200203, 219220

stateful firewall services, 210, 220

statistics, 199

types of, 175181, 183184

wildcard masks, 168173, 182183

ATM, 296, 324

attacks, 109, 117, 158. See also security

access attacks, 110113

address spoofing attacks, 118, 120121

amplification attacks, 118120

ARP vulnerabilities/attacks, 127130

baiting attacks, 114

best practices, 137143, 159

buffer overflow attacks, 112113

DDoS attacks, 116117

DHCP attacks, 134136

DNS attacks, 131133

DoS attacks, 115116

dumpster diving attacks, 114

ICMP attacks, 117119

impersonation attacks, 114

IP attacks, 117122

IP service attacks, 127136

MITM attacks, 112113, 118

password attacks, 111

phishing attacks 114. See also spear phishing attacks

port redirection attacks, 112

pretexting attacks, 114

reconnaissance attacks, 109110

reflection attacks, 118120

session hijacking attacks, 118

shoulder surfing attacks, 114

social engineering attacks, 114115

something for something (quid pro quo) attacks, 114

spam attacks, 114

spear phishing attacks, 114. See also phishing attacks

spoofing attacks, 111

tailgaiting attacks, 114

TCP vulnerabilities/attacks, 122126, 158

trust exploitation attacks, 111

UDP vulnerabilities/attacks, 122, 126127, 158

vectors of, 9697

zombies, 116

automation, 619, 641, 651

API, 628639, 651652

benefits of, 619, 620

Cisco DNA, 647648

Cisco DNA Center, 648650, 652

concept of, 620621

configuration management tools, 639643, 652

data formats, 620628

IBN, 644646, 652

JSON, 622626, 632633

smart devices, 620

XML, 623, 627628

YAML, 623, 626627

backbone networks, 287

backhaul networks, 287

bandwidth, 354

baselines, 408, 507509, 524

borderless switched networks, 458461

bottlenecks/congestion, troubleshooting, 532

branch networks, 281

broadcast multiaccess networks, 49, 84

campus networks, 280

Cisco DNA, 647648

Cisco DNA Assurance, 648

Cisco DNA Center, 648650, 652

Cisco DNA Security, 648

CLI, 639

communications

ATM, 296, 324

circuit-switched network communications, 290

demodulation, 288, 295

DWDM multiplexing, 292

Frame Relay networks, 295296

jitter, 291, 294, 355

latency, 291, 294, 302, 314

modulation, 288, 295

packet-switched network communications, 290291, 295296

parallel network communications, 289

SDH cabling standard, 291292

serial network communications, 289

SONET cabling standard, 291292

configuring

CLI, 639

SNMP, 640641

congestion, 353354

converged networks, 458, 493

data link layer, troubleshooting, 534537

delays, 353

code delays, 355

data delays, 360361

de-jitter delays, 355

fixed delays, 355

jitter, 291, 294, 355

packetization delays, 355

propagation delays, 355

queuing delays, 355

serialization delays, 355

variable delays, 355

designing, 455

borderless switched networks, 458461

collapsed core network design, 464

hierarchical networks, 455465, 475

line cards, 480, 482

routers, 487492

scalable networks, 455458, 465477

SFP devices, 482

switch hardware, 477487

three-tier network design, 455, 460, 463

two-tier network design, 461, 464

distributed networks, 282

documentation, 502, 572

baselines, 507509

data measurement, 510512

device documentation, 505507, 512

logical network topologies, 504505

overview of, 502

physical network topologies, 503

enterprise networks, 458, 477, 487, 491, 493, 494

Ethernet networks, adjacencies, 2324

evolution of, 279282

firewalls, 139140

Frame Relay networks, 295296

hacking tools, 103

HFC networks, cable modems, 305

hierarchical networks, 493

access layer, 462, 475

borderless switched networks, 458461

core layer, 462

distribution layer, 462

distribution layer switches, 461, 462, 493

OSPF, 476477

scalability, 455458

switched networks, 464465

three-tier network design, 455, 460, 463

two-tier network design, 461, 464

IBN, 644646, 652

ISDN, 295

knowledge bases, 524

LAN

campus LAN switches, 477478

WAN comparisons, 272273

line cards, 480, 482

local network addressing, verifying, 553556

managing, 390

backing up configurations, 428430, 436

calendar services, 400

CDP, 390396, 443

changing passwords, 435

IOS images, 424, 437442

LLDP, 396400, 443

NTP, 400405, 443444

password recovery, 433436, 437

restoring configurations from text files, 428430

router configurations, 431432

router file systems, 423424, 445446

routers, USB ports, 430432

SNMP, 405418, 444

switch file systems, 426427, 445446

Syslog, 418423, 444445

time services, 400

USB drives, 430432

multiaccess OSPF networks, 4951

NBMA, 70

network layer, troubleshooting, 537539

NMS

SNMP, 405, 444

tools, 524

NOC, 457

OSPF, network types, 8485

paths, verifying, 562566

physical layer

troubleshooting, 531534

verifying, 549551

point-to-point OSPF networks, 40, 8384

area ID, 40

configuring, 49

configuring with ipospf command, 4344

configuring with network command, 4143

ipospf command, 4344

loopback interfaces, 48

network command, 40, 4143

passive interfaces, 4446

verifying network type, 4648

wildcard masks, 40, 41, 4243

prioritizing traffic, 353354

PSTN, 295

router hardware, 487492

routers, 494495

scalable networks, 493494

designing, 465477

hierarchical networks, 455458

scanning tools, 103

SD-Access, 647

SDN, 595, 598, 600, 610611

ACI, 598, 602603

CEF, 596

central controller, 597

control plane, 595

controller-based SDN, 605, 611612

controllers, 600602

data plane, 596

device-based SDN, 604605

framework, 599

Layer 3 switches, 596

management plane, 598

OpenFlow, 598

OpenStack, 598

policy-based SDN, 605

traditional architectures and, 599

SD-WAN, 648

security, 95, 157. See also attacks; VPN

adware, 108

ASA, 140

assets, 96

attack tools, 101102

attack types, 104105

availability, 138

best practices, 137143

blacklisting URL, 142

breaches, 95

confidentiality, 138

content security appliances, 141143

cryptography, 143146, 159

cybercriminals, 95, 100

cybersecurity, current state of, 9598

data confidentiality, 144, 150

data integrity, 144, 145

data nonrepudiation, 144

debuggers, 104

defense-in-depth approach, 138139

encryption, 104, 151156

ESA, 142

ethical hacking, 95

evolution of tools, 102104

exploits, 96

firewalls, 139140

forensic tools, 103

fuzzers, 103

hackers, 98100

hacking OS, 104

hacking tools, 103

hacktivists, 100

hash functions, 144147

IDS, 140141

integrity, 138

IPS, 140141

layered approach, 138139

malware, 106109

mitigation, 96

origin authentication, 144, 147149

packet crafting tools, 103

packet sniffers, 103

password crackers, 103

penetration testing tools, 102104

ransomware, 108

risk, 96

rootkit detectors, 103

rootkits, 108

scanning tools, 103

script kiddies, 100

spyware, 108

threat actors, 98101, 157

threats, 96

Trojan horses, 106, 107

URL filtering, 142

vectors of data loss, 9798

vectors of network attacks, 9697

viruses, 106107

vulnerabilities, 96

vulnerability brokers, 100

vulnerability exploitation tools, 104

vulnerability scanners, 104

wireless hacking tools, 103

worms, 106, 108

WSA, 142143

SFP devices, 482

small networks, 279280

SNMP, 640641

stub networks, NAT and, 228

switch hardware, 477487

switched networks, borderless switched networks, 458461, 464465

switches, 481, 494495

toll networks, 286

topologies

logical network topologies, 504505

physical network topologies, 503

traffic

data traffic, 357, 360361

video traffic, 357360

voice traffic, 357358

transmission quality, 353, 382

congestion, 353354

delays, 353, 355

packet loss, 355357

prioritizing traffic, 353354

troubleshooting

analyzing information, 514

application layer, 543545

bottom-up troubleshooting method, 518519

buffered logging, 529

comparison troubleshooting method, 522

console logging, 529

data link layer, 534537

defining problems, 514

divide-and-conquer troubleshooting method, 520521

documentation, 502512, 572

educated guess troubleshooting method, 522

eliminating probable cause, 514

flowcharts, 512513

follow-the-path troubleshooting method, 521522

gathering information, 514, 516517

general troubleshooting procedures, 512513

hardware troubleshooting tools, 525528

IP connectivity, 574576

layered models, 517518

network layer, 537539

physical layer, 531534

process of, 512523

proposing hypotheses, 514

protocol analyzers, 525

questioning end users, 515516

selecting troubleshooting method, 523

seven-step troubleshooting process, 513515

SNMP traps, 530

software troubleshooting tools, 524

solving problems, 515

structured troubleshooting methods, 518522

substitution troubleshooting method, 522

symptoms/causes of network problems, 531545, 573574

terminal lines, 529

testing hypotheses, 515

top-down troubleshooting method, 519520

virtual networks, 592593

complexity of, 594595, 610

switches, 479

UCS Manager, 593594

virtualization, 583, 609

abstraction layers, 589590

advantages of, 589

AWA Management Console, 586

cloud computing, 583586

dedicated servers, 586587

disaster recovery, 589

hypervisors, 588, 591593

legacy support, 589

prototyping, 589

SDN, 595598, 610611

servers, 587589

virtual network infrastructure, 592595, 610

VLAN, 556558, 594

VNI, 357

VPN, 283, 308, 321, 344. See also IPsec

AnyConnect Secure Mobility Client, 321

ASA, 321

authentication, 339342

benefits of, 322323

client-based VPN, 321, 326

clientless VPN, 326

cost metrics, 322

data integrity, 338339

digital certificates, 327, 333, 335, 339, 341342, 344345

DMVPN, 330331

enterprise VPN, 324325

GRE over IPsec, 328329

MPLS VPN, 332

PKI, 327, 344

remote access VPN, 283, 308, 312, 314315, 324, 325326

scalability, 323

service provider VPN, 324325

site-to-site VPN, 283, 308, 312, 314315, 323, 327328

SOHO, 321

SSL VPN, 326327

VTI, 331332

VRF, 595

WAN

3G/4G/5G, 302, 307, 314

AP, 288

ATM, 296, 324

backbone networks, 287

backhaul networks, 287

branch networks, 281

cable Internet connectivity, 305306

cable modems, 288

campus networks, 280

circuit-switched network communications, 290

circuit-switched WAN connectivity, 295

CO, 286

connectivity, 292301

core devices, 288

CPE, 286

CSU, 288

DCE, 286288

dedicated broadband WAN connectivity, 297298

demarcation points, 286

devices, 287289

distributed networks, 282

DSL Internet connectivity, 302304

DSL modems, 288

DSU, 288

DTE, 286288

DWDM multiplexing, 292

E-carriers, 294

Frame Relay networks, 295296

Internet-based broadband WAN connectivity, 298, 301311, 314315

ISDN, 295

ISP Internet connectivity, 309310

LAN comparisons, 272273

leased-line WAN connectivity, 293294

local loops (last mile), 286

LTE, 307

Metro Ethernet WAN connectivity, 298300, 332

modern WAN connectivity, 296301, 314

MPLS, 298, 300301, 324, 332

operation of, 283292, 312313

optical converters, 288

OSI model, 284285

packet-switched network communications, 290291, 295296

packet-switched WAN connectivity, 298

parallel network communications, 289

POP, 286

private WAN, 273

PSTN, 295

public WAN, 273

purpose of, 272282, 312

SDH cabling standard, 291292

serial network communications, 289

small networks, 279280

SONET cabling standard, 291292

standards, 283

T-carriers, 294

teleworking, 283, 302, 308, 312, 314

terminology, 285287

toll networks, 286

topologies, 274277

traditional WAN connectivity, 292296, 312313

voiceband modems, 288

wired Internet connectivity, 301302

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306307

wireless routers, 288

next available port (PAT), 235236

Nexus 9000 series switches, 602

NFS (Network File System), 544

NMS (Network Management System)

SNMP, 405, 444

agent traps, 408409

community strings, 412415

MIB OID, 415

Object Navigator, 417418

operation of, 406407

snmpget utility, 417

tools, 524

NOC (Network Operations Center), 457

noise, troubleshooting, 534

nonrepudiation of data, 144

NTP (Network Time Protocol), 400, 443444

authoritative time sources, 401402, 443444

calendar services, 400

client topologies, 402403

configuring, 402405

operation of, 401402

server topologies, 402403

strata, 401402

stratum, 401405, 443444

time services, 400

verifying, 403405

numbered ACL (Access Control Lists), 176

numbered extended IPv4 ACL, 204206, 209210

numbered standard IPv4 ACL, 188189, 191193, 195

NVRAM, file systems, 425426

O

Object Navigator (SNMP), 417418

OC (Optical Carriers), 294

OID (Object ID), MIB OID, 415

open (public) API, 631632

open resolver attacks (DNS), 131

OpenFlow, 598

OpenStack, 598

optical converters, 288

optical fiber Internet connectivity, 305306

optical nodes, 305

Optical Time-Domain Reflectometers (OTDR), 527

order of precedence, router ID, 3637

origin authentication, 144

HMAC, 147149

IPsec, 333, 335

OS (Operating Systems), hacking, 104

OSI model

common devices, 517518

WAN, 284285

OSPF (Open Shortest Path First), 17

adjacencies, 2324

algorithms, 5

BDR

adjacencies, 51, 5456

election process, 20, 2324, 5659

multiaccess OSPF networks, 4951, 53, 5659

router priorities, 6163

components of, 45

data structures, 45

databases, 5, 2022

Down state, 17, 1819

DR

adjacencies, 51, 5456

election process, 5659

failures/recovery, 5859

multiaccess OSPF networks, 4951, 5354, 5659

router priorities, 6163

DR election, 20, 2324

Exchange state, 18

ExStart state, 18

Full state, 18

hierarchical networks, 476477

Init state, 1719

introduction to, 3

link-state operation, 6

establishing neighbor adjacencies, 6

LSA, 67

LSDB, 7

route selection, 89

SPF algorithms, 89

SPF trees, 89

Loading state, 18

LSA

BDR, 2426

DR, 2426

flooding, 2324

multiaccess OSPF networks, 49

adjacencies, 5456

designated routers, 4951

reference topologies, 5152, 57

router election process, 5659

router priorities, 6163

verifying router roles, 5254

multi-area OSPF, 911

neighbor adjacencies, 6, 1820

network types, 8485

operational states, 1718

OSPFv2, 12

OSPFv3, 1213

OSPFv4, 12

overview of, 3

packets, 4, 1314, 17

hello packets, 1517

LSU packets, 14

point-to-point OSPF networks, 40, 8384

area ID, 40

configuring, 49

configuring with ipospf command, 4344

configuring with network command, 4143

ipospf command, 4344

loopback interfaces, 48

network command, 40, 4143

passive interfaces, 4446

verifying network type, 4648

wildcard masks, 4043

routers

configuration mode, 35

convergence, 6, 1726

designated routers, 4951

ID, 3440, 83

routing protocol messages, 4

single-area OSPF, 9, 10, 34, 38

cost metrics, 6367

dead intervals, 7073

default route propagation, 7377, 86

hello packet intervals, 6973

modifying, 8586

point-to-point OSPF networks, 4049

reference bandwidth adjustments, 6466

reference topologies, 3435

router ID, 3440

static routes, 7377

test failover to backup routes, 69

verifying, 7782, 8687

Two-Way state, 18, 1920

OTDR (Optical Time-Domain Reflectometers), 527

outbound ACL filters, 167

output errors, troubleshooting, 551

output queue drops, 550

outside global NAT addresses, 231

outside local NAT addresses, 231

outside NAT addresses, 229, 231

P

packetization delays, 355

packets

crafting tools, 103

DBD packets, 1314, 2122

filtering, 164166

hello packets, 1314, 1517

ingress packets, 372

IPv4 packet headers, 374375

IPv6 packet headers, 374375

loss, 355357, 371

LSAck packets, 1314

LSR packets, 1314, 22

LSU packets, 1314

OSPF packets, 4, 1317

queuing. See delay

sniffers, 103

packet-switched network communications, 290291

ATM, 296, 324

Frame Relay networks, 295296

packet-switched WAN connectivity, 298

parallel network communications, 289

partially meshed WAN topology, 277

partner API, 632

passive interfaces, point-to-point OSPF networks, 4446

passwords

attacks, 105, 111

changing, 435

configuration register, 433435, 437

password crackers, 103

plaintext passwords, 415

recovery, 433436, 437

ROMMON mode, 433434

PAT (Port Address Translation), 233234, 251, 260261

analyzing, 254255

configuring

address pools, 253

single IP addresses, 252

NAT comparisons, 236237

next available port, 233234

source port assignments, 235

verifying, 256257

paths (network), verifying, 562566

penetration testing tools, 102104

performance, troubleshooting, 532, 535

phishing attacks, 114. See also spear phishing attacks

physical layer (networks)

troubleshooting, 531534

verifying, 549551

physical network topologies, 503

pinging, 532, 534

gathering information (troubleshooting process), 517

IPv4, 547548

IPv6, 548549

TFTP servers, 438, 440

PKI (Public Key Infrastructure), 327, 344

plaintext passwords, 415

playout delay buffers, 355356

PoE (Power over Ethernet), switches, 484486

point-to-point OSPF networks, 40, 8384

area ID, 40

configuring, 49

ipospf command, 4344

network command, 4143

ipospf command, configuring OSPF, 4344

loopback interfaces, 48

network command

configuring OSPF, 4143

syntax, 40

passive interfaces, 4446

verifying network type, 4648

wildcard masks, 4043

point-to-point WAN topology, 274275

policing traffic, QoS, 380381

policy-based SDN, 605

polling scenarios, SNMP, 415417

POP (Point of Presence), 286, 312, 544

portable network analyzers, 528

ports

density, switches, 482, 486

destination ports, troubleshooting, 541

next available port (PAT), 235236

redirection attacks, 112

source ports

assigning, 235

troubleshooting, 541

speeds, switches, 487

USB ports on routers, 430

VTY port security, standard IPv4 ACL, 200203, 220

wire speeds, 483

Postman, 638

power supplies, troubleshooting, 533

PPP (Point-to-Point Protocol), DSL Internet connectivity, 303304

precedence (router ID), order of, 3637

prefixes, 12

pretexting attacks, 114

PRI (Priority) fields, 373

Prime NAM (Network Analysis Module), 528

prioritizing network traffic, 353354

private (internal) API, 632

private clouds, 584

private IPv4 addresses, 226227

private WAN (Wide-Area Networks), 273

probable cause (troubleshooting process), eliminating, 514

problems (troubleshooting process)

defining, 514

solving, 515

program viruses, 107

propagating

delays, 355

static routes

default route propagation, 7377, 86

single-area OSPF, 7377

proposing hypotheses (troubleshooting process), 514

protocols

analyzers, 525

encapsulation (IPsec), 336

prototyping, virtualization, 589

proxy Trojan horses, 107

PSK (Pre-Shared Keys), 339340

PSTN (Public Service Telephone Networks), 295

public clouds, 584

public key algorithms, 152156

public (open) API, 631632

public WAN (Wide-Area Networks), 273

Puppet, 643

PVC (Permanent Virtual Circuits), 295296

Python, 638

Q

QoS (Quality of Service)

classification/marking tools, 371372

congestion

avoidance tools, 371, 379380

management tools, 371, 379380

DSP, 357

egress packets, 372

implementation techniques, 384385

ingress packets, 372

IPP, 373, 375, 377378

models, 383384

network traffic

data traffic, 357, 360361

video traffic, 357360

voice traffic, 357, 358

network transmissions, 353, 382

congestion, 353354

delays, 353, 355

packet loss, 355357

prioritizing traffic, 353354

packet loss, avoiding, 371

playout delay buffers, 355356

policy guidelines, 381

policy models

best-effort QoS policy model, 366367

DiffServ, 366, 369370

IntServ, 366368

selecting, 366

queueing algorithms, 361, 383

CBWFQ, 364

FIFO, 362

LLQ, 365

WFQ, 362364

RSVP, 368, 370

tool usage, sequence of, 372

ToS values, 363, 374375, 377, 383

traffic

characteristics, 382383

classification, 362363, 368

marking, 372379, 382383

policing, 380381

shaping, 380381

WRED, 371

questioning end users (troubleshooting process), 515516

queue drops

input queue drops, 550

output queue drops, 550

queueing algorithms (QoS), 383

CBWFQ, 364

FIFO, 362

LLQ, 365

overview of, 361

WFQ, 362364

queuing delays, 355

queuing packets. See delay

quid pro quo (something for something) attacks, 114

R

rack units (RU), 481, 494

ransomware, 108

RC (Rivest Cipher) series algorithms, 152

reconnaissance attacks, 109110

recovery, passwords, 433437

redundancy

network design, 469

scalable networks, 469

redundant links, scalable networks, 466467

reference bandwidths, single-area OSPF, 6466

reference topologies

end-to-end IP connectivity, troubleshooting, 545547

multiaccess OSPF networks, 5152, 57

single-area OSPF, 3435, 38, 74

reflection attacks, 118120

rejoins, routers, multiaccess OSPF networks, 5859

reliability, switches, 486

remote access Trojan horses, 107

remote access VPN (Virtual Private Networks), 283, 308, 312, 314315, 324326

removable media, data loss, 98

reset attacks (TCP), 125126

resiliency, borderless switched networks, 459

REST (Representational State Transfer), 632639, 651652

RESTful API, 633639

restoring configurations

router configurations, 432

from text files, 428430

rid values, 37

risk (security), defined, 96

rogue DHCP servers, 121, 134136

ROMMON mode, 433434

rootkit detectors, 103

rootkits, 108

routers, 494495

800 series routers, 492

900 series routers, 490

5500 series routers, 491

ASBR, 74

ASR 1000 series routers, 490491

ASR 9000 series routers, 488491

BDR, 17

election in OSPF, 20, 2324

LSA, 2426

multiaccess OSPF networks, 4951, 53, 5659

branch routers, 488

configurations

copying, 431

restoring, 432

saving, 435

verifying, 432

convergence, 6, 1726

DBD packets, 2122

device documentation, 505506

Dijkstra’s algorithm, 5

DR, 16

election in OSPF, 20, 2324

failures/recovery, 5859

LSA, 2426

multiaccess OSPF networks, 4951, 5354, 5659

router ID, 36

DROTHER, 5053

edge routers, 74, 470471, 488489

failover tests to backup routes, single-area OSPF, 69

file systems, 423424, 445446

Flash file systems, 425

NVRAM file systems, 425426

fixed configuration routers, 492

form factors, 490492

hub routers, 275276

ID, 16, 34, 40, 83

assigning, 40

choosing, 3637

configuration mode, 35

configuring, 3839

DR election, 36

loopback interfaces, 3738

modifying, 3940

order of precedence, 3637

reference topologies, 3435

rid values, 37

synchronization of OSPF databases, 36

verifying, 3839

industrial routers, 490, 492

ISR 4000 series routers, 488

list of neighbors, 17

LSR, 300301

LSR packets, 22

modular routers, 492

MPLS routers, 300301

NAT routers, private/public IPv4 address translations, 227

NCS 6000 series routers, 489

network edge routers, 488489

OSPF

database synchronization, 2021

designated routers, 4951

priorities, 16, 6163

requirements, 487488

service provider routers, 489

software clock, setting manually, 400

SPF algorithms, 1011

spoke routers, 275276

USB ports, 430

wireless routers, 288

routing

GRE

GRE over IPsec, 328329

mGRE, 330331

OSPF

default route propagation, 7377, 86

link-state operation, route selection, 89

protocols

failover tests to backup routes, single-area OSPF, 69

link-state routing protocols. See OSPF

messages, 4

scalable routing protocol, 467468

show ip route command, 517

show ipv6 route command, 517

tables, troubleshooting, 539

tuning protocols, scalable networks, 476477

VRF, 595

RPC (Remote Procedure Calls)

JSON-RPC, 632

XML-RPC, 632

RSA (Rivest, Shamir, Adleman)

authentication, 340342

encryption algorithms, 154

RSVP (Resource Reservation Protocol), 368, 370

RU (Rack Units), 481, 494

Ruby, 643

S

SA (Security Associations), 334335

SaaS (Software as a Service), 584

SaltStack, 643

satellite Internet connectivity, 307

saving router configurations, 435

scalability

switches, 487

VPN, 323

scalable networks, 493494

designing, 465466, 477

access layer, 475

bandwidth, 474475

failure domains, 469474

multiple links, 466467

redundancy plans, 469

redundant links, 466467

scalable routing protocol, 467468

tuning routing protocols, 476477

wireless connectivity, 468

hierarchical networks, 455458

scalable routing protocol, 467468

scanning tools, 103104

script kiddies, 100

script viruses, 107

SD-Access, 647

SDH cabling standard, 291292

SDN (Software-Defined Networking), 595, 598, 600, 610611

ACI, 598, 602

ANP, 602

APIC, 602603

APIC-EM, 606608

Nexus 9000 series switches, 602

spine-leaf topologies, 603

CEF, 596

central controller, 597

control plane, 595

controller-based SDN, 605, 611612

controllers, 600602

data plane, 596

device-based SDN, 604605

framework, 599

Layer 3 switches, 596

management plane, 598

OpenFlow, 598

OpenStack, 598

policy-based SDN, 605

traditional architectures and, 599

SD-WAN, 648

SEAL (Software-Optimized Encryption Algorithm), 152, 338

security. See also VPN

AnyConnect Secure Mobility Client, 321

ASA, 140, 321

attack tools, 101102

attack types, 104105

authentication, 339340

HMAC, 338339

MD5, 339

PSK, 339, 340

RSA, 340342

SHA, 339

cryptography, 143, 156, 159

data confidentiality, 144, 150

data integrity, 144145

data nonrepudiation, 144

encryption, 151156

hash functions, 144147

origin authentication, 144, 147149

data confidentiality, 144, 150

data integrity, 144145

data nonrepudiation, 144

encryption

3DES, 152, 338

AES, 152, 338

asymmetric encryption, 152156

DES, 152, 338

DH, 154156

DSA, 154

DSS, 154

ElGamal, 154

elliptic curve cryptography, 154

public key algorithms, 152156

RC series algorithms, 152

RSA, 154

SEAL, 152, 338

symmetric encryption, 151152

ESA, 142

firewalls, 139140, 210, 220

GRE over IPsec, 328329

hash functions, 144

MD5, 145

SHA, 146147

HMAC, 338339

IDS, 140141

IKE, 335

IPS, 140141

IPsec, 333, 344345. See also VPN

AH, 336

authentication, 339342

confidentiality, 333334, 336338

data integrity, 333335, 338339

Diffie-Hellman key exchanges, 333335, 342343

ESP, 336

framework of, 334335

GRE over IPsec, 328329

protocol encapsulation, 336

SA, 334335

SSL comparisons, 326327

transport and tunnel mode, 343

VTI, 331332

keys, compromised-key attacks, 105

malware, 106, 108109, 157

adware, 108

overview of, 106

ransomware, 108

rootkits, 108

spyware, 108

Trojan horses, 106107

viruses, 106107

worms, 106, 108

MD5, 339

networks, 95, 109, 117, 158

access attacks, 110113

address spoofing attacks, 118, 120121

amplification attacks, 118120

ARP vulnerabilities/attacks, 127130

ASA, 140

assets, 96

availability, 138

baiting attacks, 114

best practices, 137143, 159

blacklisting URL, 142

breaches, 95

buffer overflow attacks, 112113

confidentiality, 138

content security appliances, 141143

cybercriminals, 95

cybersecurity, current state of, 9598

DDoS attacks, 116117

defense-in-depth approach, 138139

DHCP attacks, 134136

DNS attacks, 131133

DoS attacks, 115116

dumpster diving attacks, 114

ethical hacking, 95

exploits, 96

firewalls, 139140

ICMP attacks, 117119

IDS, 140141

impersonation attacks, 114

integrity, 138

IP attacks, 117122

IP service attacks, 127136

IPS, 140141

layered approach, 138139

mitigation, 96

MITM attacks, 112113, 118

password attacks, 111

phishing attacks, 114. See also spear phishing attacks

port redirection attacks, 112

pretexting attacks, 114

reconnaissance attacks, 109110

reflection attacks, 118120

risk, 96

session hijacking attacks, 118

shoulder surfing attacks, 114

social engineering attacks, 114115

something for something (quid pro quo) attacks, 114

spam attacks, 114

spear phishing attacks, 114. See also phishing attacks

spoofing attacks, 111

tailgaiting attacks, 114

TCP vulnerabilities/attacks, 122126, 158

threats, 96

trust exploitation attacks, 111

UDP vulnerabilities/attacks, 122, 126127, 158

URL filtering, 142

vectors of data loss, 9798

vectors of network attacks, 9697

vulnerabilities, 96

zombies, 116

origin authentication, 144, 147149

passwords

changing, 435

configuration register, 433437

recovery, 433437

ROMMON mode, 433434

SA, 334335

SHA, 339

software disablers, 107

SSL

IPsec comparisons, 326327

SSL VPN, 326

stateful firewall services, 210, 220

Syslog security levels, 421

threat actors, 98, 157

attack tools, 102104

cybercriminals, 100

hackers, 98, 100

hacktivists, 100

script kiddies, 100

vulnerability brokers, 100

TLS, VPN, 326

tools

debuggers, 104

encryption tools, 104

evolution of, 102104

forensic tools, 103

fuzzers, 103

hacking OS, 104

hacking tools, 103

packet crafting tools, 103

packet sniffers, 103

password crackers, 103

penetration testing tools, 102104

rootkit detectors, 103

scanning tools, 103

SET, 115

vulnerability exploitation tools, 104

vulnerability scanners, 104

wireless hacking tools, 103

VTY ports, standard IPv4 ACL, 200203, 220

vulnerabilities

defined, 96

exploitation tools, 104

fuzzers, 103

scanners, 104

vulnerability brokers, 100

WSA, 142143

sequence numbers method, modifying ACL, 197198

serial network communications, 289

serialization delays, 355

servers

DHCP servers, rogue DHCP servers, 121, 134136, 158

sprawl, 587, 609

Syslog server

messages, 419

as troubleshooting tool, 529531

TFTP servers

backing up configurations from, 428430, 436

IOS image backups, 437442

pinging, 438, 440

virtualization, 589

dedicated servers, 586587

examples of, 587588

service providers. See ISP

services

cloud services, 584

IaaS, 584

PaaS, 584

SaaS, 584

stateful firewall services, 210, 220

session hijacking attacks, 118, 126

SET (Social Engineering Toolkits), 115

set operations (SNMP), 406407

seven-step troubleshooting process, 513515

severity levels (Syslog), 444445, 530

SFP (Small Form-Factor Pluggable) devices, 482

SHA (Secure Hash Algorithm), 146147, 339

shaping traffic, QoS, 380381

shoulder surfing attacks, 114

show interfaces command, 549550

show ip interface brief command, 517

show ip route command, 517

show ipv6 interface brief command, 517

show ipv6 route command, 517

single point of failure, 275, 278

single-area OSPF, 9, 10, 34

cost metrics, 6364

accumulating costs, 6667

manually setting cost value, 6769

reference bandwidths, 65

dead intervals, 7073

default route propagation, 7377, 86

hello packet intervals, 6973

modifying, 8586

point-to-point OSPF networks, 40

area ID, 40

configuring, 49

configuring with ipospf command, 4344

configuring with network command, 4143

ipospf command, 4344

loopback interfaces, 48

network command, 4043

passive interfaces, 4446

verifying network type, 4648

wildcard masks, 4043

reference bandwidth adjustments, 6466

reference topologies, 3435, 38

router ID, 34, 40

assigning, 40

choosing, 3637

configuration mode, 35

configuring, 3839

DR election, 36

loopback interfaces, 3738

modifying, 3940

order of precedence, 3637

reference topologies, 3435, 38

synchronization of OSPF databases, 36

verifying, 3839

routers, test failover to backup routes, 69

verifying, 8687

interface settings, 8182

neighbors, 7779

process information, 8081

protocol settings, 7980

single-carrier WAN connections, 278

single-homed ISP connectivity, 309

site-to-site VPN (Virtual-Private Networks), 283, 308, 312, 314315, 323324, 327328

SLA (Service Level Agreements), 278

small networks, 279280

smart devices, 620

SMTP (Simple Mail Transfer Protocol), 544

sniffer attacks, 105

SNMP (Simple Network Management Protocol), 405, 444, 544, 640641

agent traps, 408409

agents, 406409

community strings, 412415

get operations, 406407

messages, exchanging, 409

MIB OID, 415

NMS, 405

nodes, 405406

Object Navigator, 417418

operation of, 406407

polling scenario, 415417

set operations, 406407

SNMP manager, 405406, 407

snmpget utility, 417

traps, 530

troubleshooting, 543

versions of, 409412

SOAP (Simple Object Access Protocol), 632

social engineering attacks, 114115

social networking, data loss, 98

software

clock

displaying clock source, 403

setting manually, 400

security software disablers, 107

troubleshooting tools, 524

baselining tools, 524

knowledge bases, 524

NMS tools, 524

protocol analyzers, 525

SOHO (Small Office, Home Office), VPN, 321

solving problems (troubleshooting process), 515

something for something (quid pro quo) attacks, 114

SONET cabling standard, 291292

source ports

assigning, 235

troubleshooting, 541

spam attacks, 114

spear phishing attacks, 114. See also phishing attacks

SPF (Shortest-Path First) algorithm, 5, 89, 1011

spine-leaf topologies, 603

spoke routers, 275276

spoke-to-spoke tunnels, 331

spoofing attacks, 105, 111

address spoofing attacks, 118, 120121

ARP, 130

CAM tables, 121

DHCP, 134136

MAC addresses, 120121

sprawl (servers), 587, 609

spyware, 108

SSH (Secure Shell), 544

ssh -1 command, 517

SSL (Secure Socket Layer)

IPsec comparisons, 326327

VPN, 326327

stackable configuration switches, 481

standard ACL (Access Control Lists), 166, 175, 175176, 179, 190, 200203, 219220

stateful firewall services, 210, 220

state-sponsored hackers, 100

static NAT (Network Address Translation), 231232, 239240, 260261

analyzing, 241242

configuring, 240241

topology, 240

verifying, 242244

stealth attacks (DNS), 132

storage devices (cloud), data loss, 98

STP failures/loops, troubleshooting, 537

stratum (NTP), 401405, 443444

structured troubleshooting methods, 518

bottom-up troubleshooting method, 518519

comparison troubleshooting method, 522

divide-and-conquer troubleshooting method, 520521

educated guess troubleshooting method, 522

follow-the-path troubleshooting method, 521522

selecting, 523

substitution troubleshooting method, 522

top-down troubleshooting method, 519520

stub networks, NAT, 228

subnet masks, prefix lengths, 12

substitution troubleshooting method, 522

switch blocks, failure domains, 474

switched networks, 464465

switches, 494495

ASIC, 485486

business considerations for switch selection, 486487

campus LAN switches, 477478

Catalyst 2960-C series switches, 485486

Catalyst 3560-C series switches, 485

cloud-managed switches, 478

configuring

fixed configuration switches, 480

modular configuration switches, 480

stackable configuration switches, 481

cost metrics, 486

data center switches, 478

device documentation, 506

distribution layer switches, 461, 462, 493

file systems, 426427, 445446

fixed configuration switches, 480

flow tables, 601

form factors, 479481

forwarding rates, 483

frame buffers, 487

group tables, 602

LAN switches, device documentation, 506

Layer 3 switches, SDN, 596

MAC address tables, 555557

meter tables, 602

modular configuration switches, 480

multilayer switching, 485486

network design, 477487

business considerations for switch selection, 486487

campus LAN switches, 477478

Catalyst 2960-C series switches, 485486

Catalyst 3560-C series switches, 485

cloud-managed switches, 478

data center switches, 478

fixed configuration switches, 480

forwarding rates, 483

modular configuration switches, 480

multilayer switching, 485486

platforms, 477479

PoE, 484485, 486

port density, 482

service provider switches, 479

stackable configuration switches, 481

switch form factors, 479481

thickness of switches, 481

virtual networks, 479

Nexus 9000 series switches, 602

PoE, 484486

port density, 482, 486

port speeds, 487

reliability, 486

RU, 481, 494

scalability, 487

service provider switches, 479

stackable configuration switches, 481

thickness of, 481

virtual networks, 479

wire speeds, 483

symmetric encryption, 151152

symptoms/causes of network problems, troubleshooting, 573574

data link layer, 534537

physical layer, 531534

synchronizing OSPF databases, 2022

syntax

data formats, 622

JSON, 624626

Syslog

configuring, 422423

introduction to, 418419

messages

destination of, 420

facilities, 422

format of, 421

server messages, 419

timestamps, 422423

operation of, 420

security levels, 421

severity levels, 444445, 530

Syslog server as troubleshooting tool, 529531

traps, configuring, 530531

T

tailgaiting attacks, 114

Talos, ESA, 142

T-carriers, 294

TCI (Tag Control Information) fields, 373

TCP (Transmission Control Protocol)

flow control, 123

headers, 122

reset attacks, 125126

services, 123

session hijacking attacks, 126

TCP-established extended ACL, 210211

TCP SYN flood attacks, 124

vulnerabilities, 122123, 158

TDR (Time-Domain Reflectometers), 527

teleworking, 283, 302, 308, 312, 314

telnet command, 517, 544

Tera Term, configuration backups from TFTP servers, 427428, 436

terminal lines, 529

testing

cable testers, 526527

failover to backup routes, single-area OSPF, 69

hypotheses (troubleshooting process), 515

portable network analyzers, 528

Prime NAM, 528

text files, restoring configurations from, 428430

text method, modifying ACL, 196197

TFTP (Trivial File Transfer Protocol), 544

backing up configurations from, 428430, 436

servers

IOS image backups, 437442

pinging, 438, 440

thickness of switches, 481

threat actors (security), 98, 157

attack tools, 101102

cybercriminals, 100

hackers, 98, 100

hacktivists, 100

script kiddies, 100

vulnerability brokers, 100

threats (security), defined, 96

three-tier network design, 455, 460, 463

time, authoritative time sources, 401402, 443444

time services, network management, 400

Time-Domain Reflectometers. See TDR

timestamps, Syslog messages, 422423

TLS (Transport Layer Security), SSL VPN, 326

toll networks, 286

tools (security)

attack tools, 101102

debuggers, 104

encryption tools, 104

evolution of, 102104

forensic tools, 103

fuzzers, 103

hacking OS, 104

hacking tools, 103

packet crafting tools, 103

packet sniffers, 103

password crackers, 103

penetration testing tools, 102104

rootkit detectors, 103

scanning tools, 103

SET, 115

vulnerability exploitation tools, 104

vulnerability scanners, 104

wireless hacking tools, 103

top-down troubleshooting method, 519520

topologies

databases, troubleshooting, 539

dynamic NAT, 244245

hierarchical topologies, multi-area OSPF, 11

logical network topologies, 504505

MPLS, 300

NAT terminology, 230

physical network topologies, 503

reference topologies

multiaccess OSPF networks, 5152, 57

single-area OSPF, 3435, 38, 74

troubleshooting end-to-end IP connectivity, 545547

spine-leaf topologies, 603

tables, LSDB, 7

VPN, 323

remote access VPN, 324

site-to-site VPN, 327328

WAN, 274

dual-homed WAN topology, 276

fully meshed WAN topology, 276

hub-and-spoke WAN topology, 275, 330331

partially meshed WAN topology, 277

point-to-point WAN topology, 274275

ToS (Type of Service) values, 363, 374375, 377, 383

traceroute command, 517

IPv4, 548

IPv6, 548549

traditional WAN connectivity, 292296, 312313

traffic (networks)

classification, 362, 363, 368. See also classification/marking tools

data traffic, 357, 360361

flows

ACL, 165

troubleshooting, 541

marking, QoS, 373, 382383

DSCP, 375377

Ethernet, 373

IPv4, 373, 375

IPv6, 373, 375

Layer 2, 373374

Layer 3, 374375

MPLS, 373

NBAR classifications, 372

Traffic Class field (IPv6), 375

trust boundaries, 378379

Type of Service field (IPv4), 375

Wi-Fi (802.11), 373

policing, QoS, 380381

shaping, QoS, 380381

video traffic, 357, 358360

voice traffic, 357, 358

Traffic Class field (IPv6), 375

transmission quality, networks, 353, 382

congestion, 353, 354

delays, 353

code delays, 355

data delays, 360361

de-jitter delays, 355

fixed delays, 355

jitter, 291, 294, 355

packetization delays, 355

propagation delays, 355

queuing delays, 355

serialization delays, 355

variable delays, 355

packet loss, 355357

prioritizing traffic, 353354

transport and tunnel mode (IPsec), 343

transport layer

troubleshooting

ACL, 539542

interoperability areas (common), 542543

NAT for IPv4, 542543

verifying, 566567

transport protocols, 329

Trojan horses, 106, 107

troubleshooting

access control, 541

address mapping errors, 536

application layer, 543545

attenuation, 533

BOOTP, 543

bottlenecks/congestion, 532

broadcasts, 536

cable analyzers, 527

cable testers, 526527

cabling faults, 533

connectivity, 535, 539

connectivity, loss of, 532

console error messages, 533

console messages, 536

CPU overloads, 534

design limits, 534

destination ports, 541

DHCP, 543

DNS, 543

EMI, 534

encapsulation errors, 536

encryption protocols, 542, 543

end-to-end IP connectivity

components of, 545547

duplex mismatches, 551553

IPv4 pinging, 547548

IPv4 traceroute command, 548

IPv6 pinging, 548549

IPv6 traceroute command, 548549

reference topologies, 545547

verifying physical layer, 549551

established keyword, 542

framing errors, 537

functionality, 535

general network issues, 539

hardware faults, 533

hardware troubleshooting tools

cable analyzers, 527

cable testers, 526527

DMM, 525526

portable network analyzers, 528

Prime NAM, 528

Syslog server, 529531

high CPU utilization rates, 533

implicit denies, 541

input errors, 551

input queue drops, 550

interference, 534

interference configuration errors, 534

IP connectivity, 574576

end-to-end connectivity, 545549

local network addressing, 553556

verifying ACL, 568570

verifying default gateways, 558562

verifying DNS, 570571

verifying network paths, 562566

verifying physical layer, 549551

verifying transport layer, 566567

VLAN assignments, 556558

IPv4 addressing, 541

NAT for IPv4, 542543

neighbor adjacencies, 539

networks

analyzing information, 514

application layer, 543545

bottom-up troubleshooting, 518519

buffered logging, 529

comparison troubleshooting method, 522

console logging, 529

data link layer, 534537

defining problems, 514

divide-and-conquer troubleshooting method, 520521

documentation, 502512, 572

educated guess troubleshooting method, 522

eliminating probable cause, 514

flowcharts, 512513

follow-the-path troubleshooting method, 521522

gathering information, 514, 516517

general troubleshooting procedures, 512513

hardware troubleshooting tools, 525528

IP connectivity, 574576

layered models, 517518

network layer, 537539

physical layer, 531534

process of, 512523

proposing hypotheses, 514

protocol analyzers, 525

questioning end users, 515516

selecting troubleshooting method, 523

seven-step troubleshooting process, 513515

SNMP traps, 530

software troubleshooting tools, 524

solving problems, 515

structured troubleshooting methods, 518522

substitution troubleshooting method, 522

symptoms/causes of network problems, 531545, 573574

terminal lines, 529

testing hypotheses, 515

top-down troubleshooting method, 519520

noise, 534

output errors, 551

output queue drops, 550

performance, 532, 535

physical layer, verifying, 549551

portable network analyzers, 528

power supplies, 533

Prime NAM, 528

process of, 572573

protocol analyzers, 525

routing tables, 539

SNMP, 543

software troubleshooting tools, 524

baselining tools, 524

knowledge bases, 524

NMS tools, 524

protocol analyzers, 525

source ports, 541

STP failures/loops, 537

Syslog server, 529531

tools, 573

topology databases, 539

traffic flows, 541

transport layer

ACL, 539542

NAT for IPv4, 542543

tunneling protocols, 543

VPN protocols, 542

wildcard masks, 541

trust boundaries, QoS traffic marking, 378379

trust exploitation attacks, 111

tunneling

DNS tunneling, 132133

protocols, troubleshooting, 543

two-tier network design, 461, 464

Two-Way state, 1820

Type of Service field (IPv4), 375

U

UCS Manager, 593594

UDP (User Datagram Protocol), 122, 127, 158

flood attacks, 127

headers, 126

unencrypted devices, data loss, 98

URI (Universal Resource Identifiers), 635, 636

URL (Uniform Resource Locators), 635

blacklisting, 142

filtering, 142

URN (Uniform Resource Names), 635

USB (Universal Serial Buses)

backing up configurations from, 436

drives

copying router configurations to, 431432

displaying contents of, 430

verifying connections, 430431

routers and USB ports, 430

V

variable delays, 355

vectors of

data loss, 9798

network attacks, 9697

verifying

ACL, 568570

CDP, 391393

dead intervals, single-area OSPF, 7071

default gateways, 558560

IPv4, 559

IPv6, 560562

default route propagation, single-area OSPF, 7577

DNS, 570571

dynamic NAT, 249251

extended ACL, 216218

extended ACL edits, 213214

hello intervals, single-area OSPF, 7071

IOS image size in Flash, 439, 440441

LLDP, 397

local network addressing, 553556

network paths, 562566

NTP, 403404, 405

OSPF network type, 4648

PAT, 256257

physical layer, 549551

router configurations to USB drives, 432

router ID, 3839

single-area OSPF, 8687

interface settings, 8182

neighbors, 7779

process information, 8081

protocol settings, 7980

transport layer, 566567

video traffic, 357360

virtual circuits, 275276, 295296

virtual machines (VM), VLAN, 594

virtual networks, 610

complexity of, 594595

hypervisors, 592593

switches, 479

UCS Manager, 593594

VRF, 595

virtualization, 583, 609

abstraction layers, 589590

advantages of, 589

AWA Management Console, 586

cloud computing, 583, 585586, 609

cloud services, 584

community clouds, 585

data centers versus, 585

hybrid clouds, 584585

IaaS, 584

PaaS, 584

private clouds, 584

public clouds, 584

SaaS, 584

disaster recovery, 589

hypervisors, 588, 591593

legacy support, 589

prototyping, 589

SDN, 592593, 598, 600, 610611

ACI, 598, 602603

CEF, 596

central controller, 597

control plane, 595

controller-based SDN, 605, 611612

controllers, 600602

data plane, 596

device-based SDN, 604605

framework, 599

Layer 3 switches, 596

management plane, 598

OpenFlow, 598

OpenStack, 598

policy-based SDN, 605

traditional architectures and, 599

servers, 589

dedicated servers, 586587

examples of, 587588

virtual network infrastructure, 592593

complexity of, 594595, 610

UCS Manager, 593594

VRF, 595

viruses, 106107

VLAN (Virtual Local Area Networks), 556558, 594

VM (Virtual Machines), VLAN, 594

VNI (Visual Networking Index), 357

voice traffic, 357358

voiceband modems, 288

VoIP (Voice over Internet Protocol), 294

VPLS. See Metro Ethernet WAN connectivity

VPN (Virtual Private Networks), 283, 308, 321, 344. See also IPsec

AnyConnect Secure Mobility Client, 321

ASA, 321

authentication, 339340

PSK, 339340

RSA, 340342

benefits of, 322323

client-based VPN, 321, 326

clientless VPN, 326

cost metrics, 322

data integrity, 338339

digital certificates, 327, 333, 335, 339, 341342, 344345

DMVPN, 330331

enterprise VPN, 324325

GRE over IPsec, 328329

MPLS VPN, 331332

Layer 2 MPLS VPN, 324, 332344

Layer 3 MPLS VPN, 324, 332334

PKI, 327, 344

protocols, troubleshooting, 542

remote access VPN, 283, 308, 312, 314315, 324, 325326

scalability, 323

service provider VPN, 324325

site-to-site VPN, 283, 308, 312, 314315, 323324, 327328

SOHO, 321

SSL VPN, 326327

VTI, 331332

VRF (Virtual Routing and Forwarding), 595

VTI (Virtual Tunnel Interfaces), 331332

VTY port security, standard IPv4 ACL, 200203, 220

vulnerabilities (security)

defined, 96

exploitation tools, 104

fuzzers, 103

scanners, 104

vulnerability brokers, 100

W

WAN (Wide-Area Networks)

AP, 288

backbone networks, 287

backhaul networks, 287

branch networks, 281

cable modems, 288

campus networks, 280

carrier WAN connections, 278

dual-carrier WAN connections, 278279

single-carrier WAN connections, 278

CO, 286

communications

ATM, 296, 324

circuit-switched network communications, 290

demodulation, 288, 295

DWDM multiplexing, 292

Frame Relay networks, 295296

jitter, 291, 294, 355

latency, 291, 294, 302, 314

modulation, 288, 295

packet-switched network communications, 290291, 295296

parallel network communications, 289

SDH cabling standard, 291292

serial network communications, 289

SONET cabling standard, 291292

connectivity

3G/4G/5G, 302, 307, 314

cable Internet connectivity, 305, 306

circuit-switched WAN connectivity, 295

dedicated broadband WAN connectivity, 297298

DSL Internet connectivity, 302304

Internet-based broadband WAN connectivity, 298, 301311, 314315

ISDN, 295

ISP Internet connectivity, 309310

leased-line WAN connectivity, 293294

LTE, 307

Metro Ethernet WAN connectivity, 298300, 332

modern WAN connectivity, 296301, 314

MPLS, 298, 300301, 324, 332

packet-switched WAN connectivity, 298

PSTN, 295

solution comparisons, 311

teleworking, 283, 302, 308, 312, 314

traditional WAN connectivity, 292296, 312313

wired Internet connectivity, 301302

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306307

core devices, 288

CPE, 286

CSU, 288

DCE, 286288

demarcation points, 286

devices, 287289

distributed networks, 282

DSL modems, 288

DSU, 288

DTE, 286288

E-carriers, 294

evolution of, 279282

LAN comparisons, 272273

local loops (last mile), 286

operation of, 283292, 312313

optical converters, 288

OSI model, 284285

POP, 286

private WAN, 273

public WAN, 273

purpose of, 272282, 312

small networks, 279280

standards, 283

T-carriers, 294

terminology, 285287

toll networks, 286

topologies, 274

dual-homed WAN topology, 276

fully meshed WAN topology, 276

hub-and-spoke WAN topology, 275, 330331

partially meshed WAN topology, 277

point-to-point WAN topology, 274275

voiceband modems, 288

wireless routers, 288

WAP (Wireless Access Points), PoE, 485

web service API, 632633

JSON-RPC, 632633

REST, 632633, 651652

RESTful API, 633639

SOAP, 632

XML-RPC, 632633

WFQ (Weight Fair Queuing), 362364

white hat hackers, 99

Wi-Fi (802.11), QoS traffic marking, 373

wildcard masks, 168, 182183

calculating, 170172

examples of, 168169

IPv4

address ranges, 170

subnets, 169170

keywords, 172173

matching hosts, 169170

point-to-point OSPF networks, 4043

troubleshooting, 541

WiMAX (Worldwide Interoperability Microwave Access), 307

wire speeds, 483

wired Internet connectivity, 301302

wireless connectivity, scalable networks, 466467

wireless hacking tools, 103

wireless Internet connectivity, 302

wireless Internet-based broadband connectivity, 306

cellular Internet connectivity, 306307

municipal Wi-Fi Internet connectivity, 306

satellite Internet connectivity, 307

VPN, 283, 308, 321, 344

AnyConnect Secure Mobility Client, 321

ASA, 321

authentication, 339342

benefits of, 322323

client-based VPN, 321, 326

clientless VPN, 326

cost metrics, 322

data integrity, 338339

digital certificates, 327, 333, 335, 339, 341342, 344345

DMVPN, 330331

enterprise VPN, 324325

GRE over IPsec, 328329

MPLS VPN, 332

PKI, 327, 344

remote access VPN, 283, 308, 312, 314315, 324326

scalability, 323

service provider VPN, 324325

site-to-site VPN, 283, 308, 312, 314315, 323, 327328

SOHO, 321

SSL VPN, 326327

VTI, 331332

VPN. See also IPsec

WiMAX, 307

wireless routers, 288

worms, 106, 108

WRED (Weighted Random Early Detection), 371

WSA (Web Security Appliance), 142143

X

XML (Extensible Markup Language), 623, 627628

XML-RPC (Extensible Markup Language-Remote Procedure Call), 632633

Y

YAML (YAML Ain’t Markup Language), 623, 626627

Z

zombies, 116

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.116.102