Scaling Networks Companion Guide [NOOK Book]

Overview

Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco® CCNA® Academy®

This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and...

See more details below
Scaling Networks Companion Guide

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study

Want a NOOK? Explore Now

NOOK Book (eBook)
$30.49
BN.com price
(Save 42%)$53.33 List Price

Overview

Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco® CCNA® Academy®

This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms—Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary—Consult the comprehensive Glossary with over 180 terms.
  • Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding—Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title: Scaling Networks Lab Manual

ISBN-13: 978-1-58713-325-1

ISBN-10: 1-58713-325-3

  • Interactive Activities—Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon.
  • Videos—Watch the videos embedded within the online course.
  • Packet Tracer Activities—Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs—Work through allthe course labs and Class Activities that are included in the course and published in the separate Lab Manual.
Read More Show Less

Product Details

  • ISBN-13: 9780133476385
  • Publisher: Pearson Education
  • Publication date: 3/20/2014
  • Series: Companion Guide
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 648
  • Sales rank: 1,147,393
  • File size: 31 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Allan Johnson entered the academic world in 1999 after ten years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed. in Occupational Training and Development. He is an information technology instructor at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full-time for Cisco Networking Academy as a learning systems developer.

Read More Show Less

Table of Contents

Introduction xx

Chapter 1 Introduction to Scaling Networks 1

Objectives 1

Key Terms 1

Introduction (1.0.1.1) 3

Implementing a Network Design (1.1) 3

Hierarchical Network Design (1.1.1) 3

The Need to Scale the Network (1.1.1.1) 3

Enterprise Business Devices (1.1.1.2) 5

Hierarchical Network Design (1.1.1.3) 6

Cisco Enterprise Architecture (1.1.1.4) 7

Failure Domains (1.1.1.5) 9

Expanding the Network (1.1.2) 11

Design for Scalability (1.1.2.1) 11

Planning for Redundancy (1.1.2.2) 12

Increasing Bandwidth (1.1.2.3) 13

Expanding the Access Layer (1.1.2.4) 14

Fine-tuning Routing Protocols (1.1.2.5) 15

Selecting Network Devices (1.2) 18

Switch Hardware (1.2.1) 18

Switch Platforms (1.2.1.1) 18

Port Density (1.2.1.2) 21

Forwarding Rates (1.2.1.3) 22

Power over Ethernet (1.2.1.4) 23

Multilayer Switching (1.2.1.5) 25

Router Hardware (1.2.2) 26

Router Requirements (1.2.2.1) 26

Cisco Routers (1.2.2.2) 28

Router Hardware (1.2.2.3) 29

Managing Devices (1.2.3) 30

Managing IOS Files and Licensing (1.2.3.1) 30

In-Band Versus Out-of-Band Management (1.2.3.2) 30

Basic Router CLI Commands (1.2.3.3) 31

Basic Router show Commands (1.2.3.4) 34

Basic Switch CLI Commands (1.2.3.5) 39

Basic Switch show Commands (1.2.3.6) 40

Summary (1.3) 44

Practice 45

Class Activities 45

Labs 45

Packet Tracer Activities 45

Check Your Understanding Questions 46

Chapter 2 LAN Redundancy 49

Objectives 49

Key Terms 49

Introduction (2.0.1.1) 51

Spanning Tree Concepts (2.1) 52

Purpose of Spanning Tree (2.1.1) 52

Redundancy at OSI Layers 1 and 2 (2.1.1.1) 52

Issues with Layer 1 Redundancy: MAC Database Instability (2.1.1.2) 54

Issues with Layer 1 Redundancy: Broadcast Storms (2.1.1.3) 56

Issues with Layer 1 Redundancy: Duplicate Unicast Frames (2.1.1.4) 57

STP Operation (2.1.2) 59

Spanning Tree Algorithm: Introduction (2.1.2.1) 59

Spanning Tree Algorithm: Port Roles (2.1.2.2) 61

Spanning Tree Algorithm: Root Bridge (2.1.2.3) 63

Spanning Tree Algorithm: Path Cost (2.1.2.4) 64

802.1D BPDU Frame Format (2.1.2.5) 67

BPDU Propagation and Process (2.1.2.6) 68

Extended System ID (2.1.2.7) 74

Varieties of Spanning Tree Protocols (2.2) 77

Overview (2.2.1) 77

List of Spanning Tree Protocols (2.2.1.1) 78

Characteristics of the Spanning Tree Protocols (2.2.1.2) 79

PVST+ (2.2.2) 80

Overview of PVST+ (2.2.2.1) 80

Port States and PVST+ Operation (2.2.2.2) 82

Extended System ID and PVST+ Operation (2.2.2.3) 83

Rapid PVST+ (2.2.3) 84

Overview of Rapid PVST+ (2.2.3.1) 84

RSTP BPDU (2.2.3.2) 86

Edge Ports (2.2.3.3) 87

Link Types (2.2.3.4) 88

Spanning Tree Configuration (2.3) 90

PVST+ Configuration (2.3.1) 90

Catalyst 2960 Default Configuration (2.3.1.1) 90

Configuring and Verifying the Bridge ID (2.3.1.2) 91

PortFast and BPDU Guard (2.3.1.3) 93

PVST+ Load Balancing (2.3.1.4) 95

Rapid PVST+ Configuration (2.3.2) 98

Spanning Tree Mode (2.3.2.1) 98

STP Configuration Issues (2.3.3) 101

Analyzing the STP Topology (2.3.3.1) 101

Expected Topology Versus Actual Topology (2.3.3.2) 102

Overview of Spanning Tree Status (2.3.3.3) 102

Spanning Tree Failure Consequences (2.3.3.4) 103

Repairing a Spanning Tree Problem (2.3.3.5) 105

First Hop Redundancy Protocols (2.4) 105

Concept of First Hop Redundancy Protocols (2.4.1) 106

Default Gateway Limitations (2.4.1.1) 106

Router Redundancy (2.4.1.2) 107

Steps for Router Failover (2.4.1.3) 108

Varieties of First Hop Redundancy Protocols (2.4.2) 109

First Hop Redundancy Protocols (2.4.2.1) 109

FHRP Verification (2.4.3) 110

HSRP Verification (2.4.3.1) 110

GLBP Verification (2.4.3.2) 112

Syntax Checker – HSRP and GLBP (2.4.3.3) 114

Summary (2.5) 115

Practice 116

Class Activities 116

Labs 116

Packet Tracer Activities 116

Check Your Understanding Questions 117

Chapter 3 LAN Aggregation 121

Objectives 121

Key Terms 121

Introduction (3.0.1.1) 122

Link Aggregation Concepts (3.1) 122

Link Aggregation (3.1.1) 123

Introduction to Link Aggregation (3.1.1.1) 123

Advantages of EtherChannel (3.1.1.2) 124

EtherChannel Operation (3.1.2) 125

Implementation Restrictions (3.1.2.1) 125

Port Aggregation Protocol (3.1.2.2) 126

Link Aggregation Control Protocol (3.1.2.3) 128

Link Aggregation Configuration (3.2) 130

Configuring EtherChannel (3.2.1) 130

Configuration Guidelines (3.2.1.1) 130

Configuring Interfaces (3.2.1.2) 131

Verifying and Troubleshooting EtherChannel (3.2.2) 133

Verifying EtherChannel (3.2.2.1) 133

Troubleshooting EtherChannel (3.2.2.2) 135

Summary (3.3) 139

Practice 140

Class Activities 140

Labs 140

Packet Tracer Activities 140

Check Your Understanding Questions 141

Chapter 4 Wireless LANs 145

Objectives 145

Key Terms 145

Introduction (4.0.1.1) 147

Wireless Concepts (4.1) 147

Introduction to Wireless (4.1.1) 147

Supporting Mobility (4.1.1.1) 148

Benefits of Wireless (4.1.1.2) 148

Wireless Technologies (4.1.1.3) 149

Radio Frequencies (4.1.1.4) 150

802.11 Standards (4.1.1.5) 151

Wi-Fi Certification (4.1.1.6) 153

Comparing WLANs to a LAN (4.1.1.7) 154

Components of WLANs (4.1.2) 156

Wireless NICs (4.1.2.1) 156

Wireless Home Router (4.1.2.2) 157

Business Wireless Solutions (4.1.2.3) 159

Wireless Access Points (4.1.2.4) 160

Small Wireless Deployment Solutions (4.1.2.5) 162

Large Wireless Deployment Solutions (4.1.2.6, 4.1.2.7) 165

Wireless Antennas (4.1.2.8) 168

802.11 WLAN Topologies (4.1.3) 170

802.11 Wireless Topology Modes (4.1.3.1) 170

Ad Hoc Mode (4.1.3.2) 170

Infrastructure Mode (4.1.3.3) 171

Wireless LAN Operations (4.2) 173

802.11 Frame Structure (4.2.1) 173

Wireless 802.11 Frame (4.2.1.1) 173

Frame Control Field (4.2.1.2) 175

Wireless Frame Type (4.2.1.3) 177

Management Frames (4.2.1.4) 177

Control Frames (4.2.1.5) 180

Wireless Operation (4.2.2) 181

Carrier Sense Multiple Access with Collision Avoidance (4.2.2.1) 181

Wireless Clients and Access Point Association (4.2.2.2) 183

Association Parameters (4.2.2.3) 183

Discovering APs (4.2.2.4) 187

Authentication (4.2.2.5) 189

Channel Management (4.2.3) 191

Frequency Channel Saturation (4.2.3.1) 191

Selecting Channels (4.2.3.2) 193

Planning a WLAN Deployment (4.2.3.3) 196

Wireless LAN Security (4.3) 198

WLAN Threats (4.3.1) 198

Securing Wireless (4.3.1.1) 198

DoS Attack (4.3.1.2) 199

Management Frame DoS Attacks (4.3.1.3) 200

Rogue Access Points (4.3.1.4) 202

Man-in-the-Middle Attack (4.3.1.5) 203

Securing WLANs (4.3.2) 205

Wireless Security Overview (4.3.2.1) 205

Shared Key Authentication Methods (4.3.2.2) 206

Encryption Methods (4.3.2.3) 208

Authenticating a Home User (4.3.2.4) 208

Authentication in the Enterprise (4.3.2.5) 210

Wireless LAN Configuration (4.4) 211

Configure a Wireless Router (4.4.1) 211

Configuring a Wireless Router (4.4.1.1) 211

Setting Up and Installing Initial Linksys EA6500 (4.4.1.2) 213

Configuring the Linksys Smart Wi-Fi Home Page (4.4.1.3) 217

Smart Wi-Fi Settings (4.4.1.4) 218

Smart Wi-Fi Tools (4.4.1.5) 220

Backing Up a Configuration (4.4.1.6) 224

Configuring Wireless Clients (4.4.2) 225

Connecting Wireless Clients (4.4.2.1) 225

Troubleshoot WLAN Issues (4.4.3) 226

Troubleshooting Approaches (4.4.3.1) 226

Wireless Client Not Connecting (4.4.3.2) 227

Troubleshooting When the Network Is Slow (4.4.3.3) 229

Updating Firmware (4.4.3.4) 230

Summary (4.5) 232

Practice 233

Class Activities 233

Labs 233

Packet Tracer Activities 234

Check Your Understanding Questions 234

Chapter 5 Adjust and Troubleshoot Single-Area OSPF 237

Objectives 237

Key Terms 237

Introduction (5.0.1.1) 238

Advanced Single-Area OSPF Configurations (5.1) 238

Routing in the Distribution and Core Layers (5.1.1) 238

Routing Versus Switching (5.1.1.1) 238

Static Routing (5.1.1.2) 239

Dynamic Routing Protocols (5.1.1.3) 240

Open Shortest Path First (5.1.1.4) 241

Configuring Single-Area OSPF (5.1.1.5) 242

Verifying Single-Area OSPF (5.1.1.6) 244

Configuring Single-Area OSPFv3 (5.1.1.7) 247

Verifying Single-Area OSPFv3 (5.1.1.8) 249

OSPF in Multiaccess Networks (5.1.2) 251

OSPF Network Types (5.1.2.1) 251

Challenges in Multiaccess Networks (5.1.2.2) 253

OSPF Designated Router (5.1.2.3) 255

Verifying DR/BDR Roles (5.1.2.4) 256

Verifying DR/BDR Adjacencies (5.1.2.5) 259

Default DR/BDR Election Process (5.1.2.6) 261

DR/BDR Election Process (5.1.2.7) 262

The OSPF Priority (5.1.2.8) 265

Changing the OSPF Priority (5.1.2.9) 265

Default Route Propagation (5.1.3) 268

Propagating a Default Static Route in OSPFv2 (5.1.3.1) 268

Verifying the Propagated Default Route (5.1.3.2) 269

Propagating a Default Static Route in OSPFv3 (5.1.3.3) 271

Verifying the Propagated IPv6 Default Route (5.1.3.4) 272

Fine-Tuning OSPF Interfaces (5.1.4) 273

OSPF Hello and Dead Intervals (5.1.4.1) 273

Modifying OSPFv2 Intervals (5.1.4.2) 275

Modifying OSPFv3 Intervals (5.1.4.3) 277

Secure OSPF (5.1.5) 279

Routers Are Targets (5.1.5.1) 279

Secure Routing Updates (5.1.5.2) 280

MD5 Authentication (5.1.5.3) 281

Configuring OSPF MD5 Authentication (5.1.5.4) 282

OSPF MD5 Authentication Example (5.1.5.5) 283

Verifying OSPF MD5 Authentication (5.1.5.6) 284

Troubleshooting Single-Area OSPF Implementations (5.2) 286

Components of Troubleshooting Single-Area OSPF (5.2.1) 286

Overview (5.2.1.1) 286

OSPF States (5.2.1.2) 287

OSPF Troubleshooting Commands (5.2.1.3) 288

Components of Troubleshooting OSPF (5.2.1.4) 292

Troubleshoot Single-Area OSPFv2 Routing Issues (5.2.2) 293

Troubleshooting Neighbor Issues (5.2.2.1) 293

Troubleshooting OSPF Routing Table Issues (5.2.2.2) 297

Troubleshoot Single-Area OSPFv3 Routing Issues (5.2.3) 299

OSPFv3 Troubleshooting Commands (5.2.3.1) 299

Troubleshooting OSPFv3 (5.2.3.2) 302

Summary (5.3) 306

Practice 308

Class Activities 308

Labs 308

Packet Tracer Activities 308

Check Your Understanding Questions 309

Chapter 6 Multiarea OSPF 315

Objectives 315

Key Terms 315

Introduction (6.0.1.1) 316

Multiarea OSPF Operation (6.1) 316

Why Multiarea OSPF? (6.1.1) 316

Single-Area OSPF (6.1.1.1) 316

Multiarea OSPF (6.1.1.2) 317

OSPF Two-Layer Area Hierarchy (6.1.1.3) 319

Types of OSPF Routers (6.1.1.4) 320

Multiarea OSPF LSA Operation (6.1.2) 321

OSPF LSA Types (6.1.2.1) 321

OSPF LSA Type 1 (6.1.2.2) 322

OSPF LSA Type 2 (6.1.2.3) 323

OSPF LSA Type 3 (6.1.2.4) 324

OSPF LSA Type 4 (6.1.2.5) 325

OSPF LSA Type 5 (6.1.2.6) 326

OSPF Routing Table and Types of Routes (6.1.3) 326

OSPF Routing Table Entries (6.1.3.1) 327

OSPF Route Calculation (6.1.3.2) 328

Configuring Multiarea OSPF (6.2) 329

Configuring Multiarea OSPFv2 and OSPFv3 (6.2.1) 329

Implementing Multiarea OSPF (6.2.1.1) 329

Configuring Multiarea OSPF (6.2.1.2) 330

Configuring Multiarea OSPFv3 (6.2.1.3) 332

OSPF Route Summarization (6.2.2) 334

OSPF Route Summarization (6.2.2.1) 334

Interarea and External Route Summarization (6.2.2.2) 336

Interarea Route Summarization (6.2.2.3) 338

Calculating the Summary Route (6.2.2.4) 339

Configuring Interarea Route Summarization (6.2.2.5) 340

Verifying Multiarea OSPF (6.2.3) 342

Verifying Multiarea OSPF (6.2.3.1) 342

Verify General Multiarea OSPF Settings (6.2.3.2) 343

Verify the OSPF Routes (6.2.3.3) 345

Verify the Multiarea OSPF LSDB (6.2.3.4) 346

Verify Multiarea OSPFv3 (6.2.3.5) 349

Summary (6.3) 354

Practice 356

Class Activities 356

Labs 356

Packet Tracer Activities 356

Check Your Understanding Questions 356

Chapter 7 EIGRP 361

Objectives 361

Key Terms 361

Introduction (7.0.1.1) 363

Characteristics of EIGRP (7.1) 363

Basic Features of EIGRP (7.1.1) 363

Features of EIGRP (7.1.1.1) 364

Protocol-Dependent Modules (7.1.1.2) 365

Reliable Transport Protocol (7.1.1.3) 367

Authentication (7.1.1.4) 368

Types of EIGRP Packets (7.1.2) 368

EIGRP Packet Types (7.1.2.1) 368

EIGRP Hello Packets (7.1.2.2) 370

EIGRP Update and Acknowledgment Packets (7.1.2.3) 370

EIGRP Query and Reply Packets (7.1.2.4) 372

EIGRP Messages (7.1.3) 373

Encapsulating EIGRP Messages (7.1.3.1) 373

EIGRP Packet Header and TLV (7.1.3.2) 374

Configuring EIGRP for IPv4 (7.2) 377

Configuring EIGRP with IPv4 (7.2.1) 377

EIGRP Network Topology (7.2.1.1) 377

Autonomous System Numbers (7.2.1.2) 379

The Router EIGRP Command (7.2.1.3) 381

EIGRP Router ID (7.2.1.4) 382

Configuring the EIGRP Router ID (7.2.1.5) 384

The network Command (7.2.1.6) 385

The network Command and Wildcard Mask (7.2.1.7) 387

Passive Interface (7.2.1.8) 389

Verifying EIGRP with IPv4 (7.2.2) 392

Verifying EIGRP: Examining Neighbors (7.2.2.1) 392

Verifying EIGRP: show ip protocols Command (7.2.2.2) 393

Verifying EIGRP: Examine the IPv4 Routing Table (7.2.2.3) 396

Operation of EIGRP (7.3) 399

EIGRP Initial Route Discovery (7.3.1) 399

EIGRP Neighbor Adjacency (7.3.1.1) 399

EIGRP Topology Table (7.3.1.2) 400

EIGRP Convergence (7.3.1.3) 401

Metrics (7.3.2) 402

EIGRP Composite Metric (7.3.2.1) 402

Examining Interface Values (7.3.2.2) 405

Bandwidth Metric (7.3.2.3) 406

Delay Metric (7.3.2.4) 408

How to Calculate the EIGRP Metric (7.3.2.5) 409

Calculating the EIGRP Metric (7.3.2.6) 410

DUAL and the Topology Table (7.3.3) 413

DUAL Concepts (7.3.3.1) 413

Introduction to DUAL (7.3.3.2) 413

Successor and Feasible Distance (7.3.3.3) 414

Feasible Successors, Feasibility Condition, and Reported

Distance (7.3.3.4) 415

Topology Table: show ip eigrp topology Command (7.3.3.5) 417

Topology Table: show ip eigrp topology Command (Cont.) (7.3.3.6) 418

Topology Table: No Feasible Successor (7.3.3.7) 420

DUAL and Convergence (7.3.4) 422

DUAL Finite State Machine (FSM) (7.3.4.1) 423

DUAL: Feasible Successor (7.3.4.2) 424

DUAL: No Feasible Successor (7.3.4.3) 426

Configuring EIGRP for IPv6 (7.4) 429

EIGRP for IPv4 Versus IPv6 (7.4.1) 429

EIGRP for IPv6 (7.4.1.1) 429

Comparing EIGRP for IPv4 and IPv6 (7.4.1.2) 430

IPv6 Link-Local Addresses (7.4.1.3) 432

Configuring EIGRP for IPv6 (7.4.2) 432

EIGRP for IPv6 Network Topology (7.4.2.1) 432

Configuring IPv6 Link-Local Addresses (7.4.2.2) 434

Configuring the EIGRP for IPv6 Routing Process (7.4.2.3) 436

The ipv6 eigrp Interface Command (7.4.2.4) 437

Verifying EIGRP for IPv6 (7.4.3) 440

Verifying EIGRP for IPv6: Examining Neighbors (7.4.3.1) 440

Verifying EIGRP for IPv6: show ipv6 protocols Command (7.4.3.2) 441

Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (7.4.3.3) 442

Summary (7.5) 445

Practice 446

Class Activities 446

Labs 447

Packet Tracer Activities 447

Check Your Understanding Questions 447

Chapter 8 EIGRP Advanced Configurations and Troubleshooting 453

Objectives 453

Key Terms 453

Introduction (8.0.1.1) 454

Advanced EIGRP Configurations (8.1) 454

Automatic Summarization (8.1.1) 455

Network Topology (8.1.1.1) 455

EIGRP Automatic Summarization (8.1.1.2) 457

Configuring EIGRP Automatic Summarization (8.1.1.3) 459

Verifying Auto-Summary: show ip protocols (8.1.1.4) 460

Verifying Auto-Summary: Topology Table (8.1.1.5) 462

Verifying Auto-Summary: Routing Table (8.1.1.6) 464

Summary Route (8.1.1.7) 465

Summary Route (Cont.) (8.1.1.8) 466

Manual Summarization (8.1.2) 468

Manual Summary Routes (8.1.2.1) 468

Configuring EIGRP Manual Summary Routes (8.1.2.2) 470

Verifying Manual Summary Routes (8.1.2.3) 471

EIGRP for IPv6: Manual Summary Routes (8.1.2.4) 472

Default Route Propagation (8.1.3) 474

Propagating a Default Static Route (8.1.3.1) 474

Verifying the Propagated Default Route (8.1.3.2) 476

EIGRP for IPv6: Default Route (8.1.3.3) 477

Fine-Tuning EIGRP Interfaces (8.1.4) 478

EIGRP Bandwidth Utilization (8.1.4.1) 479

Hello and Hold Timers (8.1.4.2) 480

Load-Balancing IPv4 (8.1.4.3) 482

Load-Balancing IPv6 (8.1.4.4) 484

Secure EIGRP (8.1.5) 486

Routing Protocol Authentication Overview (8.1.5.1) 486

Configuring EIGRP with MD5 Authentication (8.1.5.2) 488

EIGRP Authentication Example (8.1.5.3) 489

Verify Authentication (8.1.5.4) 491

Troubleshoot EIGRP (8.2) 493

Components of Troubleshooting EIGRP (8.2.1) 493

Basic EIGRP Troubleshooting Commands (8.2.1.1) 493

Components (8.2.1.2) 495

Troubleshoot EIGRP Neighbor Issues (8.2.2) 496

Layer 3 Connectivity (8.2.2.1) 496

EIGRP Parameters (8.2.2.2) 497

EIGRP Interfaces (8.2.2.3) 498

Troubleshoot EIGRP Routing Table Issues (8.2.3) 500

Passive Interface (8.2.3.1) 500

Missing Network Statement (8.2.3.2) 502

Automatic Summarization (8.2.3.3) 504

Summary (8.3) 509

Practice 511

Class Activities 511

Labs 511

Packet Tracer Activities 511

Check Your Understanding Questions 512

Chapter 9 IOS Images and Licensing 517

Objectives 517

Key Terms 517

Introduction (9.0.1.1) 518

Managing IOS System Files (9.1) 518

Naming Conventions (9.1.1) 519

Cisco IOS Software Release Families and Trains (9.1.1.1) 519

Cisco IOS Release 12.4 Mainline and T Trains (9.1.1.2) 519

Cisco IOS Release 12.4 Mainline and T Numbering (9.1.1.3) 521

Cisco IOS Release 12.4 System Image Packaging (9.1.1.4) 522

Cisco IOS Release 15.0 M and T Trains (9.1.1.5) 523

Cisco IOS Release 15 Train Numbering (9.1.1.6) 525

IOS Release 15 System Image Packaging (9.1.1.7) 526

IOS Image Filenames (9.1.1.8) 528

Managing Cisco IOS Images (9.1.2) 531

TFTP Servers as a Backup Location (9.1.2.1) 531

Creating a Cisco IOS Image Backup (9.1.2.2) 531

Copying a Cisco IOS Image (9.1.2.3) 533

Boot System (9.1.2.4) 534

IOS Licensing (9.2) 536

Software Licensing (9.2.1) 536

Licensing Overview (9.2.1.1) 536

Licensing Process (9.2.1.2) 538

Step 1. Purchase the Software Package or Feature to Install (9.2.1.3) 539

Step 2. Obtain a License (9.2.1.4) 539

Step 3. Install the License (9.2.1.5) 541

License Verification and Management (9.2.2) 542

License Verification (9.2.2.1) 542

Activate an Evaluation Right-To-Use License (9.2.2.2) 544

Back Up the License (9.2.2.3) 545

Uninstall the License (9.2.2.4) 546

Summary (9.3) 548

Practice 551

Class Activities 551

Packet Tracer Activities 551

Check Your Understanding Questions 551

Appendix A Answers to the “Check Your Understanding” Questions 555

Glossary 569

TOC, 9781587133282, 2/28/2014

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)