FinUniversity Electronic Library

     

Details

Singh, Glen D. Implementing and Administering Cisco Solutions: 200-301 CCNA exam guide : begin a Successful Career in Networking with 200-301 CCNA Certification / Glen D. Singh. — 1 online resource (764 p.) — <URL:http://elib.fa.ru/ebsco/2655449.pdf>.

Record create date: 10/31/2020

Subject: Computer networks — Study guides. — Examinations; Telecommunications engineers — Certification.; Internetworking (Telecommunication) — Study guides. — Examinations; TCP/IP (Computer network protocol) — Study guides. — Examinations

Collections: EBSCO

Allowed Actions:

Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Document access rights

Network User group Action
Finuniversity Local Network All Read Print Download
Internet Readers Read Print
-> Internet Anonymous

Table of Contents

  • Cover
  • Title page
  • Copyright and Credits
  • About Packt
  • Table of Contents
    • Contributors
  • Preface
  • Section 1: Network Fundamentals
  • Chapter 1: Introduction to Networking
    • Understanding the evolution of networking and the internet
    • Understanding network sizes – SOHO, LAN, and WAN
    • Learning about network protocol suites
      • OSI reference model
      • Understanding the TCP/IP protocol suite
    • Understanding the functions of network devices
      • Hubs
      • Layer 2 switches
      • Layer 3 switches
      • Routers
      • Next-generation firewalls and IPS
      • Access Points
      • Cisco Wireless LAN Controller (WLC)
      • Endpoints and servers
      • Cisco DNA
    • Network topology architectures
      • 2 Tier
      • 3 Tier
    • Summary
    • Further reading
  • Chapter 2: Getting Started with Cisco IOS Devices
    • Technical requirements
    • Building a Cisco lab environment
      • Cisco Packet Tracer
      • Virtual CCNA Lab
      • Physical labs
    • Getting started with Cisco IOS devices
      • Boot process
    • Accessing a Cisco IOS device
    • Configuring the Cisco IOS
      • Setting up a small Cisco network
    • Performing troubleshooting procedures
    • Summary
    • Questions
    • Further reading
  • Chapter 3: IP Addressing and Subnetting
    • Technical requirements
    • The need for IP addressing
    • Characteristics of IPv4
      • Composition of an IPv4 packet
      • Converting binary into decimal
      • Converting decimal into binary
      • Transmission types
    • Classes of IPv4 addresses
      • Public IPv4 address space
      • Private IPv4 address space
    • Special IPv4 addresses
      • Loopback address
      • Test-Net
      • Link Local
    • Subnet mask
      • Network prefix
      • Identifying the Network ID
    • Subnetting
      • Step 1 – Determining the appropriate IP address
      • Step 2 – Creating new subnets (subnetworks)
      • Step 3 – Assigning subnets to each network
      • Step 4 – Performing Variable-Length Subnet Masking (VLSM)
    • IPv6
      • Types of IPv6 addresses
    • Lab – Configuring IPv6 on a Cisco IOS router
    • Lab – Configuring IPv6 on a Windows computer
    • Testing end-to-end connectivity
    • Summary
    • Further reading
  • Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization
    • Technical requirements
    • Understanding network switch functions
      • Detecting physical issues
      • Wireless technologies
      • 2.4 GHz versus 5 GHz
      • Wireless bands
      • SSID, BSSID, and ESS
    • Cisco wireless architectures
      • Autonomous
      • Cloud-based
      • Split-MAC
    • AP modes
    • Wireless components and management
      • Lab – accessing a Cisco WLC GUI
      • Lab – configuring a wireless network using a Cisco WLC
    • Virtualization fundamentals
      • Type 1 hypervisor
      • Type 2 hypervisor
    • Cloud computing
      • Cloud services
      • SaaS
      • PaaS
      • IaaS
      • Cloud delivery models
    • Summary
    • Questions
    • Further reading
  • Section 2: Network Access
  • Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels
    • Technical requirements
    • Understanding VLANs
      • VLAN ranges
      • Types of VLANs
      • Trunk interfaces
      • Inter-VLAN routing
      • Lab – implementing VLANs
      • Lab – creating trunk interfaces
      • Lab – configuring inter-VLAN routing
    • Layer 2 Discovery Protocols
      • Cisco Discovery Protocol (CDP)
      • Link-Layer Discovery Protocol (LLDP)
    • Understanding and configuring EtherChannels
      • Lab – implementing EtherChannels
    • Summary
    • Questions
    • Further reading
  • Chapter 6: Understanding and Configuring Spanning-Tree
    • Technical requirements
    • What is Spanning-Tree Protocol?
      • Bridge Protocol Data Unit
      • Root bridge and secondary root bridge
    • Spanning-tree standards
      • Port roles and states
      • Determining the root bridge and port roles
      • PVST+
      • Rapid-PVST+
      • Lab – implementing Rapid-PVST+ on a Cisco network
      • Lab – configuring PortFast and BPDUguard
    • Summary
    • Questions
    • Further reading
  • Section 3: IP Connectivity
  • Chapter 7: Interpreting Routing Components
    • Technical requirements
    • Understanding IP routing
    • Components of the routing table
      • Routing protocol codes
      • Prefix and network mask
      • Next hop
      • Administrative Distance
      • Routing metrics
      • Gateway of last resort
    • Summary
    • Questions
    • Further reading
  • Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing
    • Technical requirements
    • Understanding static routing
      • Do we need static routing?
      • Types of static routes
      • Lab – configuring static routing using IPv4
      • Lab – configuring an IPv4 default route
      • Lab – configuring static routing using IPv6
    • Understanding dynamic routing
      • Types of dynamic routing protocols
      • Open Shortest Path First
      • Lab – configuring OSPFv2
      • Validating OSPF configurations
    • Understanding first hop redundancy
      • Various FHRPs
    • Summary
    • Questions
    • Further reading
  • Section 4: IP Services
  • Chapter 9: Configuring Network Address Translation (NAT)
    • Technical requirements
    • The challenge of using IPv4 on the internet
    • Understanding NAT
      • Understanding NAT operation and terminology
    • Types of NAT
      • Static NAT
      • Dynamic NAT
      • Configuring PAT
    • Lab – implementing NAT overload (PAT)
    • Lab – implementing static NAT with port forwarding
    • Lab – implementing dynamic NAT
    • Summary
    • Questions
    • Further reading
  • Chapter 10: Implementing Network Services and IP Operations
    • Technical requirements
    • Understanding NTP
      • Lab – configuring NTP
    • Understanding DHCP
      • DHCP operations
      • Cisco's DHCP configurations
      • DHCP relay
      • Lab – configuring DHCP and DHCP relay
    • Domain Name System
      • DNS root servers
      • DNS record types
      • Lab – configuring DNS
    • Understanding the benefits of using Syslog
      • Syslog severity levels
      • Lab – configuring Syslog
    • Simple Network Management Protocol
      • SNMP versions
      • Management information base
      • Lab – configuring SNMP
    • QoS traffic classification
      • QoS terminologies
      • Traffic type characteristics
      • QoS queuing algorithms
      • QoS policy models
      • QoS implementation methods
    • Summary
    • Questions
    • Further reading
  • Section 5: Security Fundamentals
  • Chapter 11: Exploring Network Security
    • Technical requirements
    • Security concepts
      • The CIA triad
      • Threats
      • Vulnerabilities
      • Exploits
      • Attacks
    • Authentication, Authorization, and Accounting
      • Lab – Implementing AAA
    • Elements of a security program
    • Wireshark 101
      • Lab – Analyzing packets
    • Summary
    • Questions
    • Further reading
  • Chapter 12: Configuring Device Access Control and VPNs
    • Technical requirements
    • Device access control
      • Securing console access
      • Securing an AUX line
      • VTY line access
      • Securing Privilege Exec mode
      • Encrypting all plaintext passwords
    • Virtual Private Networks
      • Site-to-Site VPNs
      • Remote access VPNs
      • IPsec
      • Lab – Configuring a site-to-site VPN
      • Lab – Configuring a remote access VPN
    • Summary
    • Questions
    • Further reading
  • Chapter 13: Implementing Access Control Lists
    • Technical requirements
    • What are ACLs?
      • Benefits of using ACLs
    • ACL operation
    • ACL wildcard masks
      • Calculating the wildcard mask
      • ACL guidelines and best practices
    • Working with standard ACLs
      • Creating a numbered standard ACL
      • Implementing a named standard ACL
      • Deleting an ACL
      • Lab – implementing a standard numbered ACL
      • Lab – configuring a standard named ACL
      • Lab – securing VTY lines using ACLs
    • Working with extended ACLs
      • Creating a numbered extended ACL
      • Implementing a named extended ACL
      • Lab – implementing extended ACLs
    • Summary
    • Questions
    • Further reading
  • Chapter 14: Implementing Layer 2 and Wireless Security
    • Technical requirements
    • Types of Layer 2 attacks on a network
      • Network attacks
      • Defense in depth
      • Layer 2 threats
    • Protecting against Layer 2 threats
      • Port security
      • DHCP snooping
      • Dynamic ARP inspection
    • Wireless network security
      • Authentication methods
      • Lab – implementing wireless security using a WLC
    • Summary
    • Questions
    • Further reading
  • Section 6: Automation and Programmability
  • Chapter 15: Network Automation and Programmability Techniques
    • Understanding automation
    • Understanding data formats
      • eXtensible Markup Language
      • JavaScript Object Notation
      • YAML Ain't Markup Language
    • Understanding APIs
      • Types of APIs
      • RESTful APIs
    • Understanding network configuration management
      • Fabric, overlay, and underlay
      • Cisco DNA Center
    • Summary
    • Questions
    • Further reading
  • Chapter 16: Mock Exam 1
  • Chapter 17: Mock Exam 2
  • Assessments
  • Other Books You May Enjoy
  • Index

Usage statistics

stat Access count: 0
Last 30 days: 0
Detailed usage statistics