Authorizing Self-Study Guide Interconnecting Cisco Network Devices Part 2 (ICND2) / Edition 3
  • Authorizing Self-Study Guide Interconnecting Cisco Network Devices Part 2 (ICND2) / Edition 3
  • Authorizing Self-Study Guide Interconnecting Cisco Network Devices Part 2 (ICND2) / Edition 3

Authorizing Self-Study Guide Interconnecting Cisco Network Devices Part 2 (ICND2) / Edition 3

5.0 1
by Stephen McQuerry
     
 

ISBN-10: 1587054639

ISBN-13: 9781587054631

Pub. Date: 02/27/2008

Publisher: Cisco Press

Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Ciscor-authorized, self-paced learning tool for CCNAr foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers, connecting to a WAN, and

…  See more details below

Overview

Interconnecting Cisco Network Devices, Part 2 (ICND2), is a Ciscor-authorized, self-paced learning tool for CCNAr foundation learning. This book provides you with the knowledge needed to install, operate, and troubleshoot a small to medium-size branch office enterprise network, including configuring several switches and routers, connecting to a WAN, and implementing network security. In Interconnecting Cisco Network Devices, Part 2 (ICND2), you will study actual router and switch output to aid your understanding of how to configure these devices. Many notes, tips, and cautions are also spread throughout the book. Specific topics include constructing medium-size routed and switched networks, OSPF and EIGRP implementation, access control lists (ACL), address space management, and LAN extensions into a WAN. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCNA certification or simply want to gain a better understanding of how to build medium-size Cisco networks, you will benefit from the foundation information presented in this book. Interconnecting Cisco Network Devices, Part 2 (ICND2), is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.
• Review the Cisco IOSr Software command structure for routers and switches
• Build LANs and understand how to overcome problems associated with Layer 2 switching
• Evaluate the differences between link-state and distance vector routing protocols
• Configure and troubleshoot OSPF in a single area
• Configure and troubleshoot EIGRP
• Identify and filter traffic with ACLs
• Use Network Address Transl

Read More

Product Details

ISBN-13:
9781587054631
Publisher:
Cisco Press
Publication date:
02/27/2008
Series:
Self-Study Guide Series
Edition description:
New Edition
Pages:
384
Product dimensions:
7.62(w) x 9.50(h) x 1.17(d)

Table of Contents

Foreword

Introduction

Chapter 1 Review of Cisco IOS for Routers and Switches

Chapter Objectives 3

Cisco IOS CLI Functions 4

Configuration Modes of Cisco IOS Software 4

Help Facilities of the Cisco IOS CLI 6

Commands Review 7

Summary of Cisco IOS CLI Commands 8

Chapter Summary 8

Review Questions 8

Chapter 2 Medium-Sized Switched Network Construction

Chapter Objectives

Implementing VLANs and Trunks

Understanding VLANs

VLAN Overview

Grouping Business Functions into VLANs

Applying IP Address Space in the Enterprise Network

Example: Network Design

Considering Traffic Source to Destination Paths

Voice VLAN Essentials

VLAN Operation

Understanding Trunking with 802.1Q

802.1Q Frame

802.1Q Native VLAN

Understanding VLAN Trunking Protocol

VTP Modes

VTP Operation

VTP Pruning

Configuring VLANs and Trunks

VTP Configuration

Example: VTP Configuration

802.1Q Trunking Configuration

VLAN Creation

VLAN Port Assignment

Adds, Moves, and Changes for VLANs

Adding VLANs and Port Membership

Changing VLANs and Port Membership

Deleting VLANs and Port Membership

Summary of Implementing VLANs and Trunks

Improving Performance with Spanning Tree

Building a Redundant Switched Topology

Choosing Interconnection Technologies

Determining Equipment and Cabling Needs

EtherChannel Overview

Redundant Topology

Recognizing Issues of a Redundant Switched Topology

Switch Behavior with Broadcast Frames

Broadcast Storms

Example: Broadcast Storms

Multiple Frame Transmissions

Example: Multiple Transmissions

MAC Database Instability

Resolving Issues with STP

Spanning-Tree Operation

Example: Selecting the Root Bridge

Example: Spanning-Tree Operation

Example: Spanning-Tree Path Cost

Example: Spanning-Tree Recalculation

STP Convergence

Per VLAN Spanning Tree+

PVST+ Operation

Rapid Spanning Tree Protocol

Per VLAN RSTP

Multiple Spanning Tree Protocol

RSTP Port Roles

Configuring RSTP

Summary of Improving Performance with Spanning Tree

Routing Between VLANs

Understanding Inter-VLAN Routing

Example: Router on a Stick

Example: Subinterfaces

Configuring Inter-VLAN Routing

Summary of Routing Between VLANs

Securing the Expanded Network

Overview of Switch Security Concerns

Securing Switch Devices

Securing Switch Protocols

Mitigating Compromises Launched Through a Switch

Describing Port Security

802.X Port-Based Authentication

Summary of Securing the Expanded Network

Troubleshooting Switched Networks

Troubleshooting Switches

Troubleshooting Port Connectivity

Hardware Issues

Configuration Issues

Troubleshooting VLANs and Trunking

Native VLAN Mismatches

Trunk Mode Mismatches

VLANs and IP Subnets

Inter-VLAN Connectivity

Troubleshooting VTP

Unable to See VLAN Details in the show run Command Output

Cisco Catalyst Switches Do Not Exchange VTP Information

Recently Installed Switch Causes Network Problems

All Ports Inactive After Power Cycle

Troubleshooting Spanning Tree

Use the Diagram of the Network

Identify a Bridging Loop

Log STP Events

Temporarily Disable Unnecessary Features

Designate the Root Bridge

Verify the Configuration of RSTP

Summary of Troubleshooting Switched Networks

Chapter Summary

Review Questions

Chapter 3 Medium-Sized Routed Network Construction

Chapter Objectives

Reviewing Dynamic Routing

Understanding Distance Vector Routing Protocols

Route Discovery, Selection, and Maintenance

Routing Loops

Route Maintenance Using Hold-Down Timers

Route Maintenance Using Triggered Updates

Route Maintenance Using Hold-Down Timers with Triggered Updates

Link-State and Advanced Distance Vector Protocols

Link-State Routing Protocol Algorithms

Advanced Distance Vector Protocol Algorithm

Summary of Reviewing Routing Operations

Implementing Variable-Length Subnet Masks

Reviewing Subnets

Computing Usable Subnetworks and Hosts

Introducing VLSMs

Route Summarization with VLSM

Summary of Implementing Variable-Length Subnet Masks

Chapter Summary

Review Questions

Chapter 4 Single-Area OSPF Implementation

Chapter Objectives

Introducing OSPF

Establishing OSPF Neighbor Adjacencies

SPF Algorithm

Configuring and Verifying OSPF

Loopback Interfaces

Verifying the OSPF Configuration

Using OSPF debug Commands

Load Balancing with OSPF

OSPF Authentication

Types of Authentication

Configuring Plaintext Password Authentication

Example: Plaintext Password Authentication Configuration

Verifying Plaintext Password Authentication

Summary of OSPF Introduction

Troubleshooting OSPF

Components of Troubleshooting OSPF

Troubleshooting OSPF Neighbor Adjacencies

Troubleshooting OSPF Routing Tables

Troubleshooting Plaintext Password Authentication

Summary of Troubleshooting OSPF

Chapter Summary

Review Questions

Chapter 5 Implementing EIGRP

Chapter Objectives

Implementing EIGRP

Introducing EIGRP

Configuring and Verifying EIGRP

Load Balancing with EIGRP

EIGRP Metric

Load Balancing Across Equal Paths

Configuring Load Balancing Across Unequal-Cost Paths

Example: Variance

EIGRP Authentication

Creating a Key Chain

Configuring MD5 Authentication for EIGRP

Example: MD5 Authentication Configuration

Verifying MD5 Authentication

Summary of Implementing EIGRP

Troubleshooting EIGRP

Components of Troubleshooting EIGRP

Troubleshooting EIGRP Neighbor Relationships

Troubleshooting EIGRP Routing Tables

Troubleshooting EIGRP Authentication

Example: Successful MD5 Authentication

Example: Troubleshooting MD5 Authentication Problems

Summary of Troubleshooting EIGRP

Chapter Summary

Review Questions

Chapter 6 Managing Traffic with Access Control Lists

Chapter Objectives

Access Control List Operation

Understanding ACLs

ACL Operation

Types of ACLs

ACL Identification

Additional Types of ACLs

Dynamic ACLs

Reflexive ACLs

Time-Based ACLs

ACL Wildcard Masking

Summary of ACL Operations

Configuring ACLs

Configuring Numbered Standard IPv4 ACLs

Example: Numbered Standard IPv4 ACL—Permit My Network Only

Example: Numbered Standard IPv4 ACL—Deny a Specific Host

Example: Numbered Standard IPv4 ACL—Deny a Specific Subnet

Controlling Access to the Router Using ACLs

Configuring Numbered Extended IPv4 ACLs

Extended ACL with the established Parameter

Numbered Extended IP ACL: Deny FTP from Subnets

Numbered Extended ACL: Deny Only Telnet from Subnet

Configuring Named ACLs

Creating Named Standard IP ACLs

Creating Named Extended IP ACLs

Named Extended ACL: Deny a Single Host from a Given Subnet

Named Extended ACL—Deny a Telnet from a Subnet

Adding Comments to Named or Numbered ACLs

Summary of Configuring ACLs

Troubleshooting ACLs

Problem: Host Connectivity

Summary of Troubleshooting ACLs

Chapter Summary

Review Questions

Chapter 7 Managing Address Spaces with NAT and IPv6

Chapter Objectives

Scaling the Network with NAT and PAT

Introducing NAT and PAT

Translating Inside Source Addresses

Static NAT Address Mapping

Dynamic Address Translation

Overloading an Inside Global Address

Resolving Translation Table Issues

Resolving Issues with Using the Correct Translation Entry

Summary of Scaling the Network with NAT and PAT

Transitioning to IPv6

Reasons for Using IPv6

Understanding IPv6 Addresses

Global Addresses

Reserved Addresses

Private Addresses

Loopback Address

Unspecified Address

IPv6 over Data Link Layers

Assigning IPv6 Addresses

Manual Interface ID Assignment

EUI-64 Interface ID Assignment

Stateless Autoconfiguration

DHCPv6 (Stateful)

Use of EUI-64 Format in IPv6 Addresses

Routing Considerations with IPv6

Strategies for Implementing IPv6

Configuring IPv6

Configuring and Verifying RIPng for IPv6

Example: RIPng for IPv6 Configuration

Summary of Transitioning to IPv6

Chapter Summary

Review Questions

Chapter 8 Extending the Network into the WAN

Chapter Objectives

Introducing VPN Solutions

VPNs and Their Benefits

Types of VPNs

Benefits

Restrictions

IPsec SSL VPN (WebVPN)

Benefits

Restrictions

Components of VPNs

Introducing IPsec

IPsec Protocol Framework

Summary of Introducing VPN Solutions

Establishing a Point-to-Point WAN Connection with PPP

Understanding WAN Encapsulations

Overview of PPP

Configuring and Verifying PPP

Example: PPP and CHAP Configuration

Example: Verifying PPP Encapsulation Configuration

Example: Verifying PPP Authentication

Summary of Establishing a Point-to-Point WAN Connection with PPP

Establishing a WAN Connection with Frame Relay

Understanding Frame Relay

Example: Frame Relay Terminology—DLCI

Example: Frame Relay Address Mapping

Configuring Frame Relay

Example: Configuring Frame Relay Point-to-Point Subinterfaces

Example: Configuring Frame Relay Multipoint Subinterfaces

Verifying Frame Relay

Summary of Establishing a WAN Connection with Frame Relay

Troubleshooting Frame Relay WANs

Components of Troubleshooting Frame Relay

Troubleshooting Frame Relay Connectivity Issues

Summary of Troubleshooting Frame Relay WANs

Chapter Summary

Review Questions

Appendix Answers to Chapter Review Questions

Index

1587054639 TOC 1/16/2008

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Authorizing Self-Study Guide Interconnecting Cisco Network Devices Part 2 (ICND2) 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
Do you have one to three years of internetworking experience, are familiar with basic internetworking concepts, and have basic experience with the TCP/IP protocol? If you do, then this book is for you. Author Stephen McQuerry, has done an outstanding job of writing the third edition of a self-study book for those who are pursuing the CCNA certification. McQuerry, begins with a brief review of the command structure that is used throughout the other chapters of the book. Then, the author explores the operation and configuration of LANs. The author also describes routing operations. He continues by looking at how to configure OSPF to act as a routing protocol within a network. Then, the author discusses the EIGRP routing protocol. Next, he discusses how access control lists are used in Cisco IOS to identify and filter traffic. The author continues by discussing the limitations of IPv4 address space, specifically that these addresses are running out. Finally, he describes how different sites can be connected across a wide-area network or using the Internet. This most excellent book is intended as a self-study resource that covers the subjects on the 640-816 (ICND2 test) exam as well as the ICND2 material of the 640-802 (CCNA test) exam. Perhaps more importantly, this book should help you become literate in the use of switches, routers, and the associated protocols and technologies.