Connecting Networks v6 Course Booklet -  Cisco Networking Academy

Connecting Networks v6 Course Booklet

Buch | Softcover
208 Seiten
2017
Cisco Press (Verlag)
978-1-58713-431-9 (ISBN)
33,65 inkl. MwSt
Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:




·         The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section.

·         Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.

·         An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams.




The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

 

Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.

Course Introduction 1

0.0 Connecting Networks 1

    0.0.1 Message to the Student 1

        0.0.1.1 Welcome 1

        0.0.1.2 A Global Community 1

        0.0.1.3 More Than Just Information 1

        0.0.1.4 How We Teach 2

        0.0.1.5 Practice Leads to Mastery 2

        0.0.1.6 Mind Wide Open 2

        0.0.1.7 Engineering Journals 2

        0.0.1.8 Explore the World of Networking 2

        0.0.1.9 Create Your Own Worlds 3

        0.0.1.10 How Packet Tracer Helps Master Concepts 3

        0.0.1.11 Course Overview 3

Chapter 1 WAN Concepts 5

1.0 Introduction 5

        1.0.1.1 Chapter 1: WAN Concepts 5

        1.0.1.2 Class Activity — Branching Out 5

1.1 WAN Technologies Overview 5

    1.1.1 Purpose of WANs 5

        1.1.1.1 Why a WAN? 5

        1.1.1.2 Are WANs Necessary? 6

        1.1.1.3 WAN Topologies 6

        1.1.1.4 Evolving Networks 7

        1.1.1.5 Small Office 8

        1.1.1.6 Campus Network 8

        1.1.1.7 Branch Networks 9

        1.1.1.8 Distributed Network 9

        1.1.1.9 Activity - Identify WAN Topologies 9

    1.1.2 WAN Operations 10

        1.1.2.1 WANs in the OSI Model 10

        1.1.2.2 Common WAN Terminology 10

        1.1.2.3 WAN Devices 11

        1.1.2.4 Circuit Switching 12

        1.1.2.5 Packet Switching 12

        1.1.2.6 Activity - Identify WAN Terminology 13

1.2 Selecting a WAN Technology 13

    1.2.1 WAN Services 13

        1.2.1.1 WAN Link Connection Options 13

        1.2.1.2 Service Provider Network Infrastructure 14

        1.2.1.3 Activity - Classify WAN Access Options 14

    1.2.2 Private WAN Infrastructures 14

        1.2.2.1 Leased Lines 14

        1.2.2.2 Dialup 15

        1.2.2.3 ISDN 16

        1.2.2.4 Frame Relay 17

        1.2.2.5 ATM 17

        1.2.2.6 Ethernet WAN 18

        1.2.2.7 MPLS 18

        1.2.2.8 VSAT 19

        1.2.2.9 Activity - Identify Private WAN Infrastructure Terminology 19

    1.2.3 Public WAN Infrastructure 19

        1.2.3.1 DSL 19

        1.2.3.2 Cable 19

        1.2.3.3 Wireless 20

        1.2.3.4 3G/4G Cellular 21

        1.2.3.5 VPN Technology 21

        1.2.3.6 Activity - Identify Public WAN Infrastructure Terminology 22

    1.2.4 Selecting WAN Services 22

        1.2.4.1 Choosing a WAN Link Connection 22

        1.2.4.2 Choosing a WAN Link Connection (Cont.) 23

        1.2.4.3 Lab - Researching WAN Technologies 24

1.3 Summary 24

        1.3.1.1 Class Activity - WAN Device Modules 24

        1.3.1.2 Chapter 1: WAN Concepts 24

Chapter 1 Quiz 26

Chapter 1 Exam 26

Your Chapter Notes 26

Chapter 2 Point-to-Point Connections 27

2.0 Introduction 27

        2.0.1.1 Chapter 2: Point-to-Point Connections 27

        2.0.1.2 Class Activity - PPP Persuasion 27

2.1 Serial Point-to-Point Overview 28

    2.1.1 Serial Communications 28

        2.1.1.1 Serial and Parallel Ports 28

        2.1.1.2 Point-to-Point Communication Links 29

        2.1.1.3 Serial Bandwidth 29

    2.1.2 HDLC Encapsulation 30

        2.1.2.1 WAN Encapsulation Protocols 30

        2.1.2.2 HDLC Encapsulation 30

        2.1.2.3 Configuring HDLC Encapsulation 31

        2.1.2.4 Troubleshooting a Serial Interface 31

        2.1.2.5 Packet Tracer - Troubleshooting Serial Interfaces 32

2.2 PPP Operation 32

    2.2.1 Benefits of PPP 32

        2.2.1.1 Introducing PPP 32

        2.2.1.2 Advantages of PPP 33

    2.2.2 LCP and NCP 33

        2.2.2.1 PPP Layered Architecture 33

        2.2.2.2 PPP — Link Control Protocol (LCP) 33

        2.2.2.3 PPP — Network Control Protocol (NCP) 34

        2.2.2.4 PPP Frame Structure 34

        2.2.2.5 Activity - Identify PPP Features and Operations 34

    2.2.3 PPP Sessions 34

        2.2.3.1 Establishing a PPP Session 34

        2.2.3.2 LCP Operation 35

        2.2.3.3 PPP Configuration Options 36

        2.2.3.4 NCP Explained 36

        2.2.3.5 Activity - Identify the Steps in the LCP Link Negotiation Process 37

2.3 PPP Implementation 37

    2.3.1 Configure PPP 37

        2.3.1.1 PPP Configuration Options 37

        2.3.1.2 PPP Basic Configuration Command 38

        2.3.1.3 PPP Compression Commands 38

        2.3.1.4 PPP Link Quality Monitoring Command 38

        2.3.1.5 PPP Multilink Commands 38

        2.3.1.6 Verifying PPP Configuration 39

    2.3.2 Configure PPP Authentication 40

        2.3.2.1 PPP Authentication Protocols 40

        2.3.2.2 Password Authentication Protocol (PAP) 40

        2.3.2.3 Challenge Handshake Authentication Protocol (CHAP) 41

        2.3.2.4 PPP Authentication Command 41

        2.3.2.5 Configuring PPP with Authentication 41

        2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication 42

        2.3.2.7 Lab - Configuring Basic PPP with Authentication 42

2.4 Troubleshoot WAN Connectivity 42

    2.4.1 Troubleshoot PPP 42

        2.4.1.1 Troubleshooting PPP Serial Encapsulation 42

        2.4.1.2 Debug PPP 43

        2.4.1.3 Troubleshooting a PPP Configuration with Authentication 43

        2.4.1.4 Packet Tracer - Troubleshooting PPP with Authentication 44

        2.4.1.5 Lab - Troubleshooting Basic PPP with Authentication 44

2.5 Summary 44

        2.5.1.1 Class Activity - PPP Validation 44

        2.5.1.2 Packet Tracer - Skills Integration Challenge 45

        2.5.1.3 Chapter 2: Point-to-Point Connections 45

Chapter 2 Quiz 46

Chapter 2 Exam 46

Your Chapter Notes 46

Chapter 3 Branch Connections 47

3.0 Introduction 47

        3.0.1.1 Chapter 3: Branch Connections 47

        3.0.1.2 Class Activity - Broadband Varieties 47

3.1 Remote Access Connections 48

    3.1.1 Broadband Connections 48

        3.1.1.1 What is a Cable System? 48

        3.1.1.2 Cable Components 48

        3.1.1.3 What is DSL? 49

        3.1.1.4 DSL Connections 49

        3.1.1.5 Wireless Connection 50

        3.1.1.6 Activity - Identify Broadband Connection Terminology 51

    3.1.2 Select a Broadband Connection 51

        3.1.2.1 Comparing Broadband Solutions 51

        3.1.2.2 Lab - Researching Broadband Internet Access Technologies 51

3.2 PPPoE 52

    3.2.1 PPPoE Overview 52

        3.2.1.1 PPPoE Motivation 52

        3.2.1.2 PPPoE Concepts 52

    3.2.2 Implement PPPoE 52

        3.2.2.1 PPPoE Configuration 52

        3.2.2.2 PPPoE Verification 53

        3.2.2.3 PPPoE Troubleshooting 53

        3.2.2.4 PPPoE Negotiation 54

        3.2.2.5 PPPoE Authentication 54

        3.2.2.6 PPPoE MTU Size 54

        3.2.2.7 Lab - Configuring a Router as a PPPoE Client for DSL Connectivity 55

        3.2.2.8 Lab - Troubleshoot PPPoE 55

3.3 VPNs 55

    3.3.1 Fundamentals of VPNs 55

        3.3.1.1 Introducing VPNs 55

        3.3.1.2 Benefits of VPNs 56

        3.3.1.3 Activity - Identify the Benefits of VPNs 56

    3.3.2 Types of VPNs 56

        3.3.2.1 Site-to-Site VPNs 56

        3.3.2.2 Remote Access VPNs 57

        3.3.2.3 DMVPN 57

        3.3.2.4 Activity - Compare Types of VPNs 58

3.4 GRE 58

    3.4.1 GRE Overview 58

        3.4.1.1 GRE Introduction 58

        3.4.1.2 GRE Characteristics 58

        3.4.1.3 Activity - Identify GRE Characteristics 59

    3.4.2 Implement GRE 59

        3.4.2.1 Configure GRE 59

        3.4.2.2 Verify GRE 59

        3.4.2.3 Troubleshoot GRE 60

        3.4.2.4 Packet Tracer - Configuring GRE 60

        3.4.2.5 Packet Tracer - Troubleshooting GRE 61

        3.4.2.6 Lab - Configuring a Point-to-Point GRE VPN Tunnel 61

3.5 eBGP 61

    3.5.1 BGP Overview 61

        3.5.1.1 IGP and EGP Routing Protocols 61

        3.5.1.2 eBGP and iBGP 62

    3.5.2 BGP Design Considerations 62

        3.5.2.1 When to use BGP 62

        3.5.2.2 When not to use BGP 62

        3.5.2.3 BGP Options 63

        3.5.2.4 Activity - Identify BPG Terminology and Designs 63

    3.5.3 eBGP Branch Configuration 63

        3.5.3.1 Steps to Configure eBGP 63

        3.5.3.2 BGP Sample Configuration 64

        3.5.3.3 Verify eBGP 64

        3.5.3.4 Packet Tracer - Configure and Verify eBGP 65

        3.5.3.5 Lab - Configure and Verify eBGP 65

3.6 Summary 65

        3.6.1.1 Class Activity - VPN Planning Design 65

        3.6.1.2 Packet Tracer - Skills Integration Challenge 65

        3.6.1.3 Lab - Configure a Branch Connection 66

        3.6.1.4 Chapter 3: Summary 66

Chapter 3 Quiz 67

Chapter 3 Exam 67

Your Chapter Notes 67

Chapter 4 Access Control Lists 69

4.0 Introduction 69

        4.0.1.1 Chapter 4: Access Control Lists 69

4.1 Standard ACL Operation and Configuration Review 69

    4.1.1 ACL Operation Overview 69

        4.1.1.1 ACLs and the Wildcard Mask 69

        4.1.1.2 Applying ACLs to an Interface 70

        4.1.1.3 A TCP Conversation 70

        4.1.1.4 ACL Packet Filtering 71

        4.1.1.5 Activity - Determine the Correct Wildcard Mask 71

        4.1.1.6 Activity - ACL Operation 71

    4.1.2 Types of IPv4 ACLs 71

        4.1.2.1 Standard and Extended IPv4 ACLs 71

        4.1.2.2 Numbered and Named ACLs 72

        4.1.2.3 Where to Place ACLs 72

        4.1.2.4 Standard ACL Placement Example 73

        4.1.2.5 Extended ACL Placement Example 73

        4.1.2.6 Activity - Placing Standard and Extended ACLs 74

    4.1.3 Standard IPv4 ACL Implementation 74

        4.1.3.1 Configure a Standard IPv4 ACL 74

        4.1.3.2 Apply a Standard IPv4 ACL 74

        4.1.3.3 Named Standard IPv4 ACLs 74

        4.1.3.4 Verify ACLs 75

        4.1.3.5 Packet Tracer - Configure Standard IPv4 ACLs 75

        4.1.3.6 Video Demonstration - Standard ACL Configuration Part 1 75

        4.1.3.7 Video Demonstration - Standard ACL Configuration Part 2 75

4.2 Extended IPv4 ACLs 76

    4.2.1 Structure of an Extended IPv4 ACLs 76

        4.2.1.1 Extended ACLs 76

        4.2.1.2 Filtering Ports and Services 76

    4.2.2 Configure Extended IPv4 ACLs 76

        4.2.2.1 Configuring Extended ACLs 76

        4.2.2.2 Applying Extended ACLs to Interfaces 77

        4.2.2.3 Filtering Traffic with Extended ACLs 77

        4.2.2.4 Creating Named Extended ACLs 78

        4.2.2.5 Verifying Extended ACLs 78

        4.2.2.6 Editing Extended ACLs 79

        4.2.2.7 Activity - Creating an Extended ACL Statement 79

        4.2.2.8 Activity - Evaluating Extended ACEs 79

        4.2.2.9 Activity - ACL Testlet 79

        4.2.2.10 Packet Tracer - Configuring Extended ACLs - Scenario 1 79

        4.2.2.11 Packet Tracer - Configuring Extended ACLs - Scenario 2 80

        4.2.2.12 Packet Tracer - Configuring Extended ACLs - Scenario 3 80

        4.2.2.13 Lab - Configuring and Verifying Extended ACLs 80

4.3 IPv6 ACLs 80

    4.3.1 IPv6 ACL Creation 80

        4.3.1.1 Types of IPv6 ACLs 80

        4.3.1.2 Comparing IPv4 and IPv6 ACLs 80

    4.3.2 Configuring IPv6 ACLs 81

        4.3.2.1 Configuring IPv6 Topology 81

        4.3.2.2 Configuring IPv6 ACLs 81

        4.3.2.3 Applying an IPv6 ACL to an Interface 82

        4.3.2.4 IPv6 ACL Examples 82

        4.3.2.5 Verifying IPv6 ACLs 83

        4.3.2.6 Packet Tracer - Configuring IPv6 ACLs 83

        4.3.2.7 Lab - Configuring and Verifying IPv6 ACLs 83

4.4 Troubleshoot ACLs 84

    4.4.1 Processing Packets with ACLs 84

        4.4.1.1 Inbound and Outbound ACL Logic 84

        4.4.1.2 ACL Logic Operations 84

        4.4.1.3 Standard ACL Decision Process 85

        4.4.1.4 Extended ACL Decision Process 85

        4.4.1.5 Activity - Place in Order the Steps of the ACL Decision Making Process 85

    4.4.2 Common ACLs Errors 85

        4.4.2.1 Troubleshooting IPv4 ACLs - Example 1 85

        4.4.2.2 Troubleshooting IPv4 ACLs - Example 2 86

        4.4.2.3 Troubleshooting IPv4 ACLs - Example 3 86

        4.4.2.4 Troubleshooting IPv4 ACLs - Example 4 86

        4.4.2.5 Troubleshooting IPv4 ACLs - Example 5 87

        4.4.2.6 Troubleshooting IPv6 ACLs - Example 1 87

        4.4.2.7 Troubleshooting IPv6 ACLs - Example 2 87

        4.4.2.8 Troubleshooting IPv6 ACLs - Example 3 88

        4.4.2.9 Packet Tracer - Troubleshooting IPv4 ACLs 88

        4.4.2.10 Packet Tracer - Troubleshooting IPv6 ACLs 89

        4.4.2.11 Lab - Troubleshooting ACL Configuration and Placement 89

4.5 Summary 89

        4.5.1.1 Packet Tracer - Skills Integration Challenge 89

        4.5.1.2 Chapter 4: Access Control Lists 89

Chapter 4 Quiz 91

Chapter 4 Exam 91

Your Chapter Notes 91

Chapter 5 Network Security and Monitoring 93

5.0 Introduction 93

        5.0.1.1 Chapter 5: Network Security and Monitoring 93

        5.0.1.2 Class Activity — Network Maintenance Development 93

5.1 LAN Security 94

    5.1.1 LAN Security Attacks 94

        5.1.1.1 Common LAN Attacks 94

        5.1.1.2 CDP Reconnaissance Attack 94

        5.1.1.3 Telnet Attacks 95

        5.1.1.4 MAC Address Table Flooding Attack 96

        5.1.1.5 VLAN Attacks 97

        5.1.1.6 DHCP Attacks 97

        5.1.1.7 Activity — Identify Common Security Attacks 98

    5.1.2 LAN Security Best Practices 98

        5.1.2.1 Secure the LAN 98

        5.1.2.2 Mitigate MAC Address Flooding Table Attacks 98

        5.1.2.3 Mitigate VLAN Attacks 99

        5.1.2.4 Mitigate DHCP Attacks 99

        5.1.2.5 Secure Administrative Access using AAA 100

        5.1.2.6 Secure Device Access using 802.1X 101

        5.1.2.7 Activity: Identify the Security Best Practice 102

5.2 SNMP 102

    5.2.1 SNMP Operation 102

        5.2.1.1 Introduction to SNMP 102

        5.2.1.2 SNMP Operation 102

        5.2.1.3 SNMP Agent Traps 103

        5.2.1.4 SNMP Versions 103

        5.2.1.5 Community Strings 104

        5.2.1.6 Management Information Base Object ID 105

        5.2.1.7 SNMPv3 106

        5.2.1.8 Activity — Identify Characteristics of SNMP Versions 106

        5.2.1.9 Lab — Researching Network Monitoring Software 106

    5.2.2 Configuring SNMP 107

        5.2.2.1 Steps for Configuring SNMP 107

        5.2.2.2 Verifying SNMP Configuration 107

        5.2.2.3 SNMP Best Practices 108

        5.2.2.4 Steps for Configuring SNMPv3 109

        5.2.2.5 Verifying SNMPv3 Configuration 109

        5.2.2.6 Lab — Configuring SNMP 110

5.3 Cisco Switch Port Analyzer 110

    5.3.1 SPAN Overview 110

        5.3.1.1 Port Mirroring 110

        5.3.1.2 Analyzing Suspicious Traffic 111

        5.3.1.3 Local SPAN 111

        5.3.1.4 Remote SPAN 111

        5.3.1.5 Activity — Identify SPAN Terminology 112

    5.3.2 SPAN Configuration 112

        5.3.2.1 Configuring Local SPAN 112

        5.3.2.2 Verifying Local SPAN 112

        5.3.2.3 Lab — Implement a Local SPAN 112

    5.3.3 SPAN as a Troubleshooting Tool 113

        5.3.3.1 Troubleshooting with SPAN Overview 113

        5.3.3.2 Lab — Troubleshoot LAN Traffic Using SPAN 113

5.4 Summary 113

        5.4.1.1 Chapter 5: Network Security and Monitoring 113

Chapter 5 Quiz 114

Chapter 5 Exam 114

Your Chapter Notes 114

Chapter 6 Quality of Service 115

6.0 Introduction 115

        6.0.1.1 Chapter 6: Quality of Service 115

6.1 QoS Overview 115

    6.1.1 Network Transmission Quality 115

        6.1.1.1 Video Tutorial - The Purpose of QoS 115

        6.1.1.2 Prioritizing Traffic 115

        6.1.1.3 Bandwidth, Congestion, Delay, and Jitter 116

        6.1.1.4 Packet Loss 116

        6.1.1.5 Activity - Identify Network Transmission Quality Terminology 117

    6.1.2 Traffic Characteristics 117

        6.1.2.1 Video Tutorial - Traffic Characteristics 117

        6.1.2.2 Network Traffic Trends 117

        6.1.2.3 Voice 117

        6.1.2.4 Video 117

        6.1.2.5 Data 118

        6.1.2.6 Activity - Compare Traffic Characteristics 118

    6.1.3 Queueing Algorithms 118

        6.1.3.1 Video Tutorial - QoS Algorithms 118

        6.1.3.2 Queuing Overview 118

        6.1.3.3 First In First Out (FIFO) 119

        6.1.3.4 Weighted Fair Queuing (WFQ) 119

        6.1.3.5 Class-Based Weighted Fair Queuing (CBWFQ) 119

        6.1.3.6 Low Latency Queuing (LLQ) 120

        6.1.3.7 Activity - Compare Queuing Algorithms 120

6.2 QoS Mechanisms 120

    6.2.1 QoS Models 120

        6.2.1.1 Video Tutorial - QoS Models 120

        6.2.1.2 Selecting an Appropriate QoS Policy Model 121

        6.2.1.3 Best-Effort 121

        6.2.1.4 Integrated Services 121

        6.2.1.5 Differentiated Services 122

        6.2.1.6 Activity - Compare QoS Models 123

    6.2.2 QoS Implementation Techniques 123

        6.2.2.1 Video Tutorial - QoS Implementation Techniques 123

        6.2.2.2 Avoiding Packet Loss 123

        6.2.2.3 QoS Tools 123

        6.2.2.4 Classification and Marking 124

        6.2.2.5 Marking at Layer 2 124

        6.2.2.6 Marking at Layer 3 125

        6.2.2.7 Trust Boundaries 125

        6.2.2.8 Congestion Avoidance 126

        6.2.2.9 Shaping and Policing 126

        6.2.2.10 Activity - Identify QoS Mechanism Terminology 127

6.3 Summary 127

        6.3.1.1 Chapter 6: Quality of Service 127

Chapter 6 Quiz 129

Chapter 6 Exam 129

Your Chapter Notes 129

Chapter 7 Network Evolution 131

7.0 Introduction 131

        7.0.1.1 Chapter 7: Network Evolution 131

7.1 Internet of Things 131

    7.1.1 IoT Elements 131

        7.1.1.1 What is the IoT? 131

        7.1.1.2 The Converged Network and Things 131

        7.1.1.3 Challenges to Connecting Things 132

        7.1.1.4 The Six Pillars of the Cisco IoT System 132

    7.1.2 IoT Pillars 132

        7.1.2.1 The Network Connectivity Pillar 132

        7.1.2.2 The Fog Computing Pillar 133

        7.1.2.3 The Security Pillar 133

        7.1.2.4 Data Analytics Pillar 134

        7.1.2.5 Management and Automation Pillar 134

        7.1.2.6 Application Enablement Platform Pillar 134

        7.1.2.7 Activity - Identify the IoT Pillars 135

7.2 Cloud and Virtualization 135

    7.2.1 Cloud Computing 135

        7.2.1.1 Video Tutorial — Cloud and Virtualization 135

        7.2.1.2 Cloud Overview 135

        7.2.1.3 Cloud Services 135

        7.2.1.4 Cloud Models 136

        7.2.1.5 Cloud Computing versus Data Center 136

        7.2.1.6 Activity - Identify Cloud Computing Terminology 137

    7.2.2 Virtualization 137

        7.2.2.1 Cloud Computing and Virtualization 137

        7.2.2.2 Dedicated Servers 137

        7.2.2.3 Server Virtualization 137

        7.2.2.4 Advantages of Virtualization 138

        7.2.2.5 Abstraction Layers 139

        7.2.2.6 Type 2 Hypervisors 139

        7.2.2.7 Activity - Identify Virtualization Terminology 140

    7.2.3 Virtual Network Infrastructure 140

        7.2.3.1 Type 1 Hypervisors 140

        7.2.3.2 Installing a VM on a Hypervisor 140

        7.2.3.3 Network Virtualization 140

        7.2.3.4 Activity - Identify Hypervisor Terminology 141

7.3 Network Programming 141

    7.3.1 Software-Defined Networking 141

        7.3.1.1 Video Tutorial - Network Programming, SDN, and Controllers 141

        7.3.1.2 Control Plane and Data Plane 141

        7.3.1.3 Virtualizing the Network 142

        7.3.1.4 SDN Architecture 142

        7.3.1.5 Activity - Identify Control Plane and Data Plane Characteristics 143

    7.3.2 Controllers 143

        7.3.2.1 SDN Controller and Operations 143

        7.3.2.2 Cisco Application Centric Infrastructure 143

        7.3.2.3 Core Components of ACI 144

        7.3.2.4 Spine—Leaf Topology 144

        7.3.2.5 SDN Types 145

        7.3.2.6 APIC—EM Features 145

        7.3.2.7 APIC-EM ACL Analysis 146

        7.3.2.8 Activity - Identify SDN Types 146

7.4 Summary 146

        7.4.1.1 Chapter 7: Network Evolution 146

Chapter 7 Quiz 148

Chapter 7 Exam 148

Your Chapter Notes 148

Chapter 8 Network Troubleshooting 149

8.0 Introduction 149

        8.0.1.1 Introduction 149

        8.0.1.2 Class Activity - Network Breakdown 149

8.1 Troubleshooting Methodology 149

    8.1.1 Network Documentation 149

        8.1.1.1 Documenting the Network 149

        8.1.1.2 Network Topology Diagrams 151

        8.1.1.3 Establishing a Network Baseline 152

        8.1.1.4 Steps to Establish a Network Baseline 152

        8.1.1.5 Measuring Data 153

        8.1.1.6 Activity - Identify Benefits for Establishing a Network Baseline 154

        8.1.1.7 Activity - Identify Commands Used for Measuring Data 154

        8.1.1.8 Packet Tracer - Troubleshooting Challenge - Documenting the Network 154

    8.1.2 Troubleshooting Process 154

        8.1.2.1 General Troubleshooting Procedures 154

        8.1.2.2 Gathering Symptoms 155

        8.1.2.3 Questioning End Users 156

        8.1.2.4 Activity - Identify Commands for Gathering Symptoms 157

    8.1.3 Isolating the Issue Using Layered Models 157

        8.1.3.1 Using Layered Models for Troubleshooting 157

        8.1.3.2 Troubleshooting Methods 158

        8.1.3.3 Other Troubleshooting Methods 159

        8.1.3.4 Guidelines for Selecting a Troubleshooting Method 159

        8.1.3.5 Activity - Troubleshooting Methods 160

8.2 Troubleshooting Scenarios 160

    8.2.1 Using IP SLA 160

        8.2.1.1 IP SLA Concepts 160

        8.2.1.2 IP SLA Configuration 161

        8.2.1.3 Sample IP SLA Configuration 161

        8.2.1.4 Verifying an IP SLA Configuration 162

        8.2.1.5 Lab — Configure IP SLA ICMP Echo 162

    8.2.2 Troubleshooting Tools 162

        8.2.2.1 Software Troubleshooting Tools 162

        8.2.2.2 Protocol Analyzers 163

        8.2.2.3 Hardware Troubleshooting Tools 163

        8.2.2.4 Using a Syslog Server for Troubleshooting 164

        8.2.2.5 Activity - Identify Common Troubleshooting Tools 165

    8.2.3 Symptoms and Causes of Network Troubleshooting 165

        8.2.3.1 Physical Layer Troubleshooting 165

        8.2.3.2 Data Link Layer Troubleshooting 166

        8.2.3.3 Network Layer Troubleshooting 168

        8.2.3.4 Transport Layer Troubleshooting - ACLs 169

        8.2.3.5 Transport Layer Troubleshooting — NAT for IPv4 170

        8.2.3.6 Application Layer Troubleshooting 171

        8.2.3.7 Activity - Identify the OSI Layer Associated with a Network Issue 171

    8.2.4 Troubleshooting IP Connectivity 171

        8.2.4.1 Components of Troubleshooting End-to-End Connectivity 171

        8.2.4.2 End-to-End Connectivity Problem Initiates Troubleshooting 172

        8.2.4.3 Step 1 - Verify the Physical Layer 173

        8.2.4.4 Step 2 - Check for Duplex Mismatches 174

        8.2.4.5 Step 3 - Verify Layer 2 and Layer 3 Addressing on the Local Network 175

        8.2.4.6 Step 4 - Verify Default Gateway 176

        8.2.4.7 Step 5 - Verify Correct Path 178

        8.2.4.8 Step 6 - Verify the Transport Layer 179

        8.2.4.9 Step 7 - Verify ACLs 179

        8.2.4.10 Step 8 - Verify DNS 180

        8.2.4.11 Activity - Identify Commands to Troubleshoot a Network Issue 180

        8.2.4.12 Packet Tracer - Troubleshooting Enterprise Networks 1 180

        8.2.4.13 Packet Tracer - Troubleshooting Enterprise Networks 2 181

        8.2.4.14 Packet Tracer - Troubleshooting Enterprise Networks 3 181

        8.2.4.15 Packet Tracer - Troubleshooting Challenge - Using Documentation to Solve Issues 181

8.3 Summary 181

        8.3.1.1 Class Activity - Documentation Development 181

        8.3.1.2 Packet Tracer - CCNA Skills Integration Challenge 181

        8.3.1.3 Summary 182

Chapter 8 Quiz 183

Chapter 8 Exam 183

Your Chapter Notes 183

 

 

9781587134319   TOC   6/29/2017

 

Erscheinungsdatum
Reihe/Serie Course Booklets
Verlagsort Indianapolis
Sprache englisch
Maße 220 x 275 mm
Gewicht 451 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
ISBN-10 1-58713-431-4 / 1587134314
ISBN-13 978-1-58713-431-9 / 9781587134319
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
das umfassende Handbuch für den Einstieg in die Netzwerktechnik

von Martin Linten; Axel Schemberg; Kai Surendorf

Buch | Hardcover (2023)
Rheinwerk (Verlag)
29,90
das Praxisbuch für Admins und DevOps-Teams

von Michael Kofler

Buch | Hardcover (2023)
Rheinwerk (Verlag)
39,90