Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
CCNA 200-301 Official Cert ­Guide, Volume 2
Official Cert Guide

Rating
Format
Mixed media product, 624 pages
Other Formats Available

Mixed media product : £26.85

Paperback : £31.80

Published
United States, 1 December 2019


CCNA 200-301 Official Cert Guide enables students to succeed on the exam the first time and is the only self-study resource approved by Cisco.


Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping students identify areas of weakness and improve both conceptual knowledge and hands-on skills.


Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps students master the concepts and techniques that ensure exam success.


  • Revised edition of the #1 selling CCNA preparation self-study guide
  • Book content is fully updated to align to the new CCNA 200-301 exam objectives
  • Books and online materials are packed with features to help candidates master difficult testing methods on actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • In-depth expert explanations of all protocols, commands, and technologies on the CCNA exam
  • Online ancillary materials such as lecture slides, instructor's notes, and test bank reinforce concepts discussed in this text

Assessment, review, and practice for the CCNA 200-301 exam

  • Revised edition of the #1 selling CCNA preparation self-study guide
  • Book content is fully updated to align to the new CCNA 200-301 exam objectives
  • Books and online materials are packed with features to help candidates master difficult testing methods on actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • In-depth expert explanations of all protocols, commands, and technologies on the CCNA exam



Introduction xxvii


Part I IP Access Control Lists 3


Chapter 1 Introduction to TCP/IP Transport and Applications 4


Do I Know This Already? Quiz 4


Foundation Topics 6


TCP/IP Layer 4 Protocols: TCP and UDP 6


Transmission Control Protocol 7


Multiplexing Using TCP Port Numbers 7


Popular TCP/IP Applications 10


Connection Establishment and Termination 12


Error Recovery and Reliability 13


Flow Control Using Windowing 15


User Datagram Protocol 16


TCP/IP Applications 16


Uniform Resource Identifiers 17


Finding the Web Server Using DNS 18


Transferring Files with HTTP 20


How the Receiving Host Identifies the Correct Receiving Application 21


Chapter Review 22


Chapter 2 Basic IPv4 Access Control Lists 24


Do I Know This Already? Quiz 24


Foundation Topics 26


IPv4 Access Control List Basics 26


ACL Location and Direction 26


Matching Packets 27


Taking Action When a Match Occurs 28


Types of IP ACLs 28


Standard Numbered IPv4 ACLs 29


List Logic with IP ACLs 29


Matching Logic and Command Syntax 31


Matching the Exact IP Address 31


Matching a Subset of the Address with Wildcards 31


Binary Wildcard Masks 33


Finding the Right Wildcard Mask to Match a Subnet 33


Matching Any/All Addresses 34


Implementing Standard IP ACLs 34


Standard Numbered ACL Example 1 35


Standard Numbered ACL Example 2 36


Troubleshooting and Verification Tips 38


Practice Applying Standard IP ACLs 39


Practice Building access-list Commands 39


Reverse Engineering from ACL to Address Range 40


Chapter Review 41


Chapter 3 Advanced IPv4 Access Control Lists 44


Do I Know This Already? Quiz 44


Foundation Topics 46


Extended Numbered IP Access Control Lists 46


Matching the Protocol, Source IP, and Destination IP 46


Matching TCP and UDP Port Numbers 48


Extended IP ACL Configuration 51


Extended IP Access Lists: Example 1 51


Extended IP Access Lists: Example 2 53


Practice Building access-list Commands 54


Named ACLs and ACL Editing 54


Named IP Access Lists 54


Editing ACLs Using Sequence Numbers 56


Numbered ACL Configuration Versus Named ACL Configuration 58


ACL Implementation Considerations 59


Additional Reading on ACLs 60


Chapter Review 61


Part I Review 64


Part II Security Services 67


Chapter 4 Security Architectures 68


Do I Know This Already? Quiz 68


Foundation Topics 70


Security Terminology 70


Common Security Threats 72


Attacks That Spoof Addresses 72


Denial-of-Service Attacks 73


Reflection and Amplification Attacks 75


Man-in-the-Middle Attacks 76


Address Spoofing Attack Summary 77


Reconnaissance Attacks 77


Buffer Overflow Attacks 78


Malware 78


Human Vulnerabilities 79


Password Vulnerabilities 80


Password Alternatives 80


Controlling and Monitoring User Access 82


Developing a Security Program to Educate Users 83


Chapter Review 84


Chapter 5 Securing Network Devices 86


Do I Know This Already? Quiz 86


Foundation Topics 88


Securing IOS Passwords 88


Encrypting Older IOS Passwords with service password-encryption 89


Encoding the Enable Passwords with Hashes 90


Interactions Between Enable Password and Enable Secret 90


Making the Enable Secret Truly Secret with a Hash 91


Improved Hashes for Ciscos Enable Secret 92


Encoding the Passwords for Local Usernames 94


Controlling Password Attacks with ACLs 95


Firewalls and Intrusion Prevention Systems 95


Traditional Firewalls 96


Security Zones 97


Intrusion Prevention Systems (IPS) 99


Cisco Next-Generation Firewalls 100


Cisco Next-Generation IPS 102


Chapter Review 103


Chapter 6 Implementing Switch Port Security 106


Do I Know This Already? Quiz 106


Foundation Topics 108


Port Security Concepts and Configuration 108


Configuring Port Security 109


Verifying Port Security 112


Port Security MAC Addresses 113


Port Security Violation Modes 114


Port Security Shutdown Mode 115


Port Security Protect and Restrict Modes 117


Chapter Review 119


Chapter 7 Implementing DHCP 122


Do I Know This Already? Quiz 122


Foundation Topics 124


Dynamic Host Configuration Protocol 124


DHCP Concepts 125


Supporting DHCP for Remote Subnets with DHCP Relay 126


Information Stored at the DHCP Server 128


Configuring DHCP Features on Routers and Switches 129


Configuring DHCP Relay 130


Configuring a Switch as DHCP Client 130


Configuring a Router as DHCP Client 132


Identifying Host IPv4 Settings 133


Host Settings for IPv4 133


Host IP Settings on Windows 134


Host IP Settings on macOS 136


Host IP Settings on Linux 138


Chapter Review 140


Chapter 8 DHCP Snooping and ARP Inspection 144


Do I Know This Already? Quiz 144


Foundation Topics 146


DHCP Snooping 146


DHCP Snooping Concepts 146


A Sample Attack: A Spurious DHCP Server 147


DHCP Snooping Logic 148


Filtering DISCOVER Messages Based on MAC Address 150


Filtering Messages that Release IP Addresses 150


DHCP Snooping Configuration 152


Configuring DHCP Snooping on a Layer 2 Switch 152


Limiting DHCP Message Rates 154


DHCP Snooping Configuration Summary 155


Dynamic ARP Inspection 156


DAI Concepts 156


Review of Normal IP ARP 156


Gratuitous ARP as an Attack Vector 157


Dynamic ARP Inspection Logic 158


Dynamic ARP Inspection Configuration 160


Configuring ARP Inspection on a Layer 2 Switch 160


Limiting DAI Message Rates 163


Configuring Optional DAI Message Checks 164


IP ARP Inspection Configuration Summary 165


Chapter Review 166


Part II Review 168


Part III IP Services 171


Chapter 9 Device Management Protocols 172


Do I Know This Already? Quiz 172


Foundation Topics 174


System Message Logging (Syslog) 174


Sending Messages in Real Time to Current Users 174


Storing Log Messages for Later Review 175


Log Message Format 176


Log Message Severity Levels 177


Configuring and Verifying System Logging 178


The debug Command and Log Messages 180


Network Time Protocol (NTP) 181


Setting the Time and Timezone 182


Basic NTP Configuration 183


NTP Reference Clock and Stratum 185


Redundant NTP Configuration 186


NTP Using a Loopback Interface for Better Availability 188


Analyzing Topology Using CDP and LLDP 190


Examining Information Learned by CDP 190


Configuring and Verifying CDP 193


Examining Information Learned by LLDP 194


Configuring and Verifying LLDP 197


Chapter Review 199


Chapter 10 Network Address Translation 202


Do I Know This Already? Quiz 202


Foundation Topics 204


Perspectives on IPv4 Address Scalability 204


CIDR 205


Private Addressing 206


Network Address Translation Concepts 207


Static NAT 208


Dynamic NAT 210


Overloading NAT with Port Address Translation 211


NAT Configuration and Troubleshooting 213


Static NAT Configuration 213


Dynamic NAT Configuration 215


Dynamic NAT Verification 217


NAT Overload (PAT) Configuration 219


NAT Troubleshooting 222


Chapter Review 223


Chapter 11 Quality of Service (QoS) 226


Do I Know This Already? Quiz 226


Foundation Topics 228


Introduction to QoS 228


QoS: Managing Bandwidth, Delay, Jitter, and Loss 228


Types of Traffic 229


Data Applications 229


Voice and Video Applications 230


QoS as Mentioned in This Book 232


QoS on Switches and Routers 233


Classification and Marking 233


Classification Basics 233


Matching (Classification) Basics 234


Classification on Routers with ACLs and NBAR 235


Marking IP DSCP and Ethernet CoS 236


Marking the IP Header 237


Marking the Ethernet 802.1Q Header 237


Other Marking Fields 238


Defining Trust Boundaries 238


DiffServ Suggested Marking Values 239


Expedited Forwarding (EF) 240


Assured Forwarding (AF) 240


Class Selector (CS) 241


Guidelines for DSCP Marking Values 241


Queuing 242


Round-Robin Scheduling (Prioritization) 243


Low Latency Queuing 243


A Prioritization Strategy for Data, Voice, and Video 245


Shaping and Policing 245


Policing 246


Where to Use Policing 246


Shaping 248


Setting a Good Shaping Time Interval for Voice and Video 249


Congestion Avoidance 250


TCP Windowing Basics 250


Congestion Avoidance Tools 251


Chapter Review 252


Chapter 12 Miscellaneous IP Services 254


Do I Know This Already? Quiz 254


Foundation Topics 256


First Hop Redundancy Protocol 256


The Need for Redundancy in Networks 257


The Need for a First Hop Redundancy Protocol 259


The Three Solutions for First-Hop Redundancy 260


HSRP Concepts 261


HSRP Failover 261


HSRP Load Balancing 262


Simple Network Management Protocol 263


SNMP Variable Reading and Writing: SNMP Get and Set 264


SNMP Notifications: Traps and Informs 265


The Management Information Base 266


Securing SNMP 267


FTP and TFTP 268


Managing Cisco IOS Images with FTP/TFTP 268


The IOS File System 268


Upgrading IOS Images 270


Copying a New IOS Image to a Local IOS File System Using TFTP 271


Verifying IOS Code Integrity with MD5 273


Copying Images with FTP 273


The FTP and TFTP Protocols 275


FTP Protocol Basics 275


FTP Active and Passive Modes 276


FTP over TLS (FTP Secure) 278


TFTP Protocol Basics 279


Chapter Review 280


Part III Review 284


Part IV Network Architecture 287


Chapter 13 LAN Architecture 288


Do I Know This Already? Quiz 288


Foundation Topics 290


Analyzing Campus LAN Topologies 290


Two-Tier Campus Design (Collapsed Core) 290


The Two-Tier Campus Design 290


Topology Terminology Seen Within a Two-Tier Design 291


Three-Tier Campus Design (Core) 293


Topology Design Terminology 295


Small Office/Home Office 295


Power over Ethernet (PoE) 297


PoE Basics 297


PoE Operation 298


PoE and LAN Design 299


Chapter Review 300


Chapter 14 WAN Architecture 302


Do I Know This Already? Quiz 302


Foundation Topics 304


Metro Ethernet 304


Metro Ethernet Physical Design and Topology 305


Ethernet WAN Services and Topologies 306


Ethernet Line Service (Point-to-Point) 307


Ethernet LAN Service (Full Mesh) 308


Ethernet Tree Service (Hub and Spoke) 309


Layer 3 Design Using Metro Ethernet 309


Layer 3 Design with E-Line Service 309


Layer 3 Design with E-LAN Service 311


Multiprotocol Label Switching (MPLS) 311


MPLS VPN Physical Design and Topology 313


MPLS and Quality of Service 314


Layer 3 with MPLS VPN 315


Internet VPNs 317


Internet Access 317


Digital Subscriber Line 318


Cable Internet 319


Wireless WAN (3G, 4G, LTE, 5G) 320


Fiber (Ethernet) Internet Access 321


Internet VPN Fundamentals 321


Site-to-Site VPNs with IPsec 322


Remote Access VPNs with TLS 324


VPN Comparisons 326


Chapter Review 326


Chapter 15 Cloud Architecture 328


Do I Know This Already? Quiz 328


Foundation Topics 330


Server Virtualization 330


Cisco Server Hardware 330


Server Virtualization Basics 331


Networking with Virtual Switches on a Virtualized Host 333


The Physical Data Center Network 334


Workflow with a Virtualized Data Center 335


Cloud Computing Services 336


Private Cloud (On-Premise) 337


Public Cloud 338


Cloud and the As a Service Model 339


Infrastructure as a Service 339


Software as a Service 341


(Development) Platform as a Service 341


WAN Traffic Paths to Reach Cloud Services 342


Enterprise WAN Connections to Public Cloud 342


Accessing Public Cloud Services Using the Internet 342


Pros and Cons with Connecting to Public Cloud with Internet 343


Private WAN and Internet VPN Access to Public Cloud 344


Pros and Cons of Connecting to Cloud with Private WANs 345


Intercloud Exchanges 346


Summarizing the Pros and Cons of Public Cloud WAN Options 346


A Scenario: Branch Offices and the Public Cloud 347


Migrating Traffic Flows When Migrating to Email SaaS 347


Branch Offices with Internet and Private WAN 349


Chapter Review 350


Part IV Review 352


Part V Network Automation 355


Chapter 16 Introduction to Controller-Based Networking 356


Do I Know This Already? Quiz 357


Foundation Topics 358


SDN and Controller-Based Networks 358


The Data, Control, and Management Planes 358


The Data Plane 359


The Control Plane 360


The Management Plane 361


Cisco Switch Data Plane Internals 361


Controllers and Software-Defined Architecture 362


Controllers and Centralized Control 363


The Southbound Interface 364


The Northbound Interface 365


Software Defined Architecture Summary 367


Examples of Network Programmability and SDN 367


OpenDaylight and OpenFlow 367


The OpenDaylight Controller 368


The Cisco Open SDN Controller (OSC) 369


Cisco Application Centric Infrastructure (ACI) 369


ACI Physical Design: Spine and Leaf 370


ACI Operating Model with Intent-Based Networking 371


Cisco APIC Enterprise Module 373


APIC-EM Basics 373


APIC-EM Replacement 374


Summary of the SDN Examples 375


Comparing Traditional Versus Controller-Based Networks 375


How Automation Impacts Network Management 376


Comparing Traditional Networks with Controller-Based Networks 378


Chapter Review 379


Chapter 17 Cisco Software-Defined Access (SDA) 382


Do I Know This Already? Quiz 383


Foundation Topics 384


SDA Fabric, Underlay, and Overlay 384


The SDA Underlay 386


Using Existing Gear for the SDA Underlay 386


Using New Gear for the SDA Underlay 387


The SDA Overlay 390


VXLAN Tunnels in the Overlay (Data Plane) 390


LISP for Overlay Discovery and Location (Control Plane) 392


DNA Center and SDA Operation 395


Cisco DNA Center 395


Cisco DNA Center and Scalable Groups 396


Issues with Traditional IP-Based Security 397


SDA Security Based on User Groups 398


DNA Center as a Network Management Platform 400


DNA Center Similarities to Traditional Management 401


DNA Center Differences with Traditional Management 402


Chapter Review 403


Chapter 18 Understanding REST and JSON 406


Do I Know This Already? Quiz 406


Foundation Topics 408


REST-Based APIs 408


REST-Based (RESTful) APIs 408


Client/Server Architecture 409


Stateless Operation 410


Cacheable (or Not) 410


Background: Data and Variables 410


Simple Variables 410


List and Dictionary Variables 411


REST APIs and HTTP 413


Software CRUD Actions and HTTP Verbs 413


Using URIs with HTTP to Specify the Resource 414


Example of REST API Call to DNA Center 417


Data Serialization and JSON 418


The Need for a Data Model with APIs 419


Data Serialization Languages 421


JSON 421


XML 421


YAML 422


S

Show more

Our Price
£45.09
Ships from UK Estimated delivery date: 8th Apr - 10th Apr from UK

Buy Together
+
Buy together with CCNA 200-301 Official Cert Guide Library at a great price!
Buy Together
£95.51
Elsewhere Price
£101.08
You Save £5.57 (6%)

Product Description


CCNA 200-301 Official Cert Guide enables students to succeed on the exam the first time and is the only self-study resource approved by Cisco.


Best-selling author and expert instructor Wendell Odom shares preparation hints and test-taking tips, helping students identify areas of weakness and improve both conceptual knowledge and hands-on skills.


Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps students master the concepts and techniques that ensure exam success.


  • Revised edition of the #1 selling CCNA preparation self-study guide
  • Book content is fully updated to align to the new CCNA 200-301 exam objectives
  • Books and online materials are packed with features to help candidates master difficult testing methods on actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • In-depth expert explanations of all protocols, commands, and technologies on the CCNA exam
  • Online ancillary materials such as lecture slides, instructor's notes, and test bank reinforce concepts discussed in this text

Assessment, review, and practice for the CCNA 200-301 exam

  • Revised edition of the #1 selling CCNA preparation self-study guide
  • Book content is fully updated to align to the new CCNA 200-301 exam objectives
  • Books and online materials are packed with features to help candidates master difficult testing methods on actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • In-depth expert explanations of all protocols, commands, and technologies on the CCNA exam



Introduction xxvii


Part I IP Access Control Lists 3


Chapter 1 Introduction to TCP/IP Transport and Applications 4


Do I Know This Already? Quiz 4


Foundation Topics 6


TCP/IP Layer 4 Protocols: TCP and UDP 6


Transmission Control Protocol 7


Multiplexing Using TCP Port Numbers 7


Popular TCP/IP Applications 10


Connection Establishment and Termination 12


Error Recovery and Reliability 13


Flow Control Using Windowing 15


User Datagram Protocol 16


TCP/IP Applications 16


Uniform Resource Identifiers 17


Finding the Web Server Using DNS 18


Transferring Files with HTTP 20


How the Receiving Host Identifies the Correct Receiving Application 21


Chapter Review 22


Chapter 2 Basic IPv4 Access Control Lists 24


Do I Know This Already? Quiz 24


Foundation Topics 26


IPv4 Access Control List Basics 26


ACL Location and Direction 26


Matching Packets 27


Taking Action When a Match Occurs 28


Types of IP ACLs 28


Standard Numbered IPv4 ACLs 29


List Logic with IP ACLs 29


Matching Logic and Command Syntax 31


Matching the Exact IP Address 31


Matching a Subset of the Address with Wildcards 31


Binary Wildcard Masks 33


Finding the Right Wildcard Mask to Match a Subnet 33


Matching Any/All Addresses 34


Implementing Standard IP ACLs 34


Standard Numbered ACL Example 1 35


Standard Numbered ACL Example 2 36


Troubleshooting and Verification Tips 38


Practice Applying Standard IP ACLs 39


Practice Building access-list Commands 39


Reverse Engineering from ACL to Address Range 40


Chapter Review 41


Chapter 3 Advanced IPv4 Access Control Lists 44


Do I Know This Already? Quiz 44


Foundation Topics 46


Extended Numbered IP Access Control Lists 46


Matching the Protocol, Source IP, and Destination IP 46


Matching TCP and UDP Port Numbers 48


Extended IP ACL Configuration 51


Extended IP Access Lists: Example 1 51


Extended IP Access Lists: Example 2 53


Practice Building access-list Commands 54


Named ACLs and ACL Editing 54


Named IP Access Lists 54


Editing ACLs Using Sequence Numbers 56


Numbered ACL Configuration Versus Named ACL Configuration 58


ACL Implementation Considerations 59


Additional Reading on ACLs 60


Chapter Review 61


Part I Review 64


Part II Security Services 67


Chapter 4 Security Architectures 68


Do I Know This Already? Quiz 68


Foundation Topics 70


Security Terminology 70


Common Security Threats 72


Attacks That Spoof Addresses 72


Denial-of-Service Attacks 73


Reflection and Amplification Attacks 75


Man-in-the-Middle Attacks 76


Address Spoofing Attack Summary 77


Reconnaissance Attacks 77


Buffer Overflow Attacks 78


Malware 78


Human Vulnerabilities 79


Password Vulnerabilities 80


Password Alternatives 80


Controlling and Monitoring User Access 82


Developing a Security Program to Educate Users 83


Chapter Review 84


Chapter 5 Securing Network Devices 86


Do I Know This Already? Quiz 86


Foundation Topics 88


Securing IOS Passwords 88


Encrypting Older IOS Passwords with service password-encryption 89


Encoding the Enable Passwords with Hashes 90


Interactions Between Enable Password and Enable Secret 90


Making the Enable Secret Truly Secret with a Hash 91


Improved Hashes for Ciscos Enable Secret 92


Encoding the Passwords for Local Usernames 94


Controlling Password Attacks with ACLs 95


Firewalls and Intrusion Prevention Systems 95


Traditional Firewalls 96


Security Zones 97


Intrusion Prevention Systems (IPS) 99


Cisco Next-Generation Firewalls 100


Cisco Next-Generation IPS 102


Chapter Review 103


Chapter 6 Implementing Switch Port Security 106


Do I Know This Already? Quiz 106


Foundation Topics 108


Port Security Concepts and Configuration 108


Configuring Port Security 109


Verifying Port Security 112


Port Security MAC Addresses 113


Port Security Violation Modes 114


Port Security Shutdown Mode 115


Port Security Protect and Restrict Modes 117


Chapter Review 119


Chapter 7 Implementing DHCP 122


Do I Know This Already? Quiz 122


Foundation Topics 124


Dynamic Host Configuration Protocol 124


DHCP Concepts 125


Supporting DHCP for Remote Subnets with DHCP Relay 126


Information Stored at the DHCP Server 128


Configuring DHCP Features on Routers and Switches 129


Configuring DHCP Relay 130


Configuring a Switch as DHCP Client 130


Configuring a Router as DHCP Client 132


Identifying Host IPv4 Settings 133


Host Settings for IPv4 133


Host IP Settings on Windows 134


Host IP Settings on macOS 136


Host IP Settings on Linux 138


Chapter Review 140


Chapter 8 DHCP Snooping and ARP Inspection 144


Do I Know This Already? Quiz 144


Foundation Topics 146


DHCP Snooping 146


DHCP Snooping Concepts 146


A Sample Attack: A Spurious DHCP Server 147


DHCP Snooping Logic 148


Filtering DISCOVER Messages Based on MAC Address 150


Filtering Messages that Release IP Addresses 150


DHCP Snooping Configuration 152


Configuring DHCP Snooping on a Layer 2 Switch 152


Limiting DHCP Message Rates 154


DHCP Snooping Configuration Summary 155


Dynamic ARP Inspection 156


DAI Concepts 156


Review of Normal IP ARP 156


Gratuitous ARP as an Attack Vector 157


Dynamic ARP Inspection Logic 158


Dynamic ARP Inspection Configuration 160


Configuring ARP Inspection on a Layer 2 Switch 160


Limiting DAI Message Rates 163


Configuring Optional DAI Message Checks 164


IP ARP Inspection Configuration Summary 165


Chapter Review 166


Part II Review 168


Part III IP Services 171


Chapter 9 Device Management Protocols 172


Do I Know This Already? Quiz 172


Foundation Topics 174


System Message Logging (Syslog) 174


Sending Messages in Real Time to Current Users 174


Storing Log Messages for Later Review 175


Log Message Format 176


Log Message Severity Levels 177


Configuring and Verifying System Logging 178


The debug Command and Log Messages 180


Network Time Protocol (NTP) 181


Setting the Time and Timezone 182


Basic NTP Configuration 183


NTP Reference Clock and Stratum 185


Redundant NTP Configuration 186


NTP Using a Loopback Interface for Better Availability 188


Analyzing Topology Using CDP and LLDP 190


Examining Information Learned by CDP 190


Configuring and Verifying CDP 193


Examining Information Learned by LLDP 194


Configuring and Verifying LLDP 197


Chapter Review 199


Chapter 10 Network Address Translation 202


Do I Know This Already? Quiz 202


Foundation Topics 204


Perspectives on IPv4 Address Scalability 204


CIDR 205


Private Addressing 206


Network Address Translation Concepts 207


Static NAT 208


Dynamic NAT 210


Overloading NAT with Port Address Translation 211


NAT Configuration and Troubleshooting 213


Static NAT Configuration 213


Dynamic NAT Configuration 215


Dynamic NAT Verification 217


NAT Overload (PAT) Configuration 219


NAT Troubleshooting 222


Chapter Review 223


Chapter 11 Quality of Service (QoS) 226


Do I Know This Already? Quiz 226


Foundation Topics 228


Introduction to QoS 228


QoS: Managing Bandwidth, Delay, Jitter, and Loss 228


Types of Traffic 229


Data Applications 229


Voice and Video Applications 230


QoS as Mentioned in This Book 232


QoS on Switches and Routers 233


Classification and Marking 233


Classification Basics 233


Matching (Classification) Basics 234


Classification on Routers with ACLs and NBAR 235


Marking IP DSCP and Ethernet CoS 236


Marking the IP Header 237


Marking the Ethernet 802.1Q Header 237


Other Marking Fields 238


Defining Trust Boundaries 238


DiffServ Suggested Marking Values 239


Expedited Forwarding (EF) 240


Assured Forwarding (AF) 240


Class Selector (CS) 241


Guidelines for DSCP Marking Values 241


Queuing 242


Round-Robin Scheduling (Prioritization) 243


Low Latency Queuing 243


A Prioritization Strategy for Data, Voice, and Video 245


Shaping and Policing 245


Policing 246


Where to Use Policing 246


Shaping 248


Setting a Good Shaping Time Interval for Voice and Video 249


Congestion Avoidance 250


TCP Windowing Basics 250


Congestion Avoidance Tools 251


Chapter Review 252


Chapter 12 Miscellaneous IP Services 254


Do I Know This Already? Quiz 254


Foundation Topics 256


First Hop Redundancy Protocol 256


The Need for Redundancy in Networks 257


The Need for a First Hop Redundancy Protocol 259


The Three Solutions for First-Hop Redundancy 260


HSRP Concepts 261


HSRP Failover 261


HSRP Load Balancing 262


Simple Network Management Protocol 263


SNMP Variable Reading and Writing: SNMP Get and Set 264


SNMP Notifications: Traps and Informs 265


The Management Information Base 266


Securing SNMP 267


FTP and TFTP 268


Managing Cisco IOS Images with FTP/TFTP 268


The IOS File System 268


Upgrading IOS Images 270


Copying a New IOS Image to a Local IOS File System Using TFTP 271


Verifying IOS Code Integrity with MD5 273


Copying Images with FTP 273


The FTP and TFTP Protocols 275


FTP Protocol Basics 275


FTP Active and Passive Modes 276


FTP over TLS (FTP Secure) 278


TFTP Protocol Basics 279


Chapter Review 280


Part III Review 284


Part IV Network Architecture 287


Chapter 13 LAN Architecture 288


Do I Know This Already? Quiz 288


Foundation Topics 290


Analyzing Campus LAN Topologies 290


Two-Tier Campus Design (Collapsed Core) 290


The Two-Tier Campus Design 290


Topology Terminology Seen Within a Two-Tier Design 291


Three-Tier Campus Design (Core) 293


Topology Design Terminology 295


Small Office/Home Office 295


Power over Ethernet (PoE) 297


PoE Basics 297


PoE Operation 298


PoE and LAN Design 299


Chapter Review 300


Chapter 14 WAN Architecture 302


Do I Know This Already? Quiz 302


Foundation Topics 304


Metro Ethernet 304


Metro Ethernet Physical Design and Topology 305


Ethernet WAN Services and Topologies 306


Ethernet Line Service (Point-to-Point) 307


Ethernet LAN Service (Full Mesh) 308


Ethernet Tree Service (Hub and Spoke) 309


Layer 3 Design Using Metro Ethernet 309


Layer 3 Design with E-Line Service 309


Layer 3 Design with E-LAN Service 311


Multiprotocol Label Switching (MPLS) 311


MPLS VPN Physical Design and Topology 313


MPLS and Quality of Service 314


Layer 3 with MPLS VPN 315


Internet VPNs 317


Internet Access 317


Digital Subscriber Line 318


Cable Internet 319


Wireless WAN (3G, 4G, LTE, 5G) 320


Fiber (Ethernet) Internet Access 321


Internet VPN Fundamentals 321


Site-to-Site VPNs with IPsec 322


Remote Access VPNs with TLS 324


VPN Comparisons 326


Chapter Review 326


Chapter 15 Cloud Architecture 328


Do I Know This Already? Quiz 328


Foundation Topics 330


Server Virtualization 330


Cisco Server Hardware 330


Server Virtualization Basics 331


Networking with Virtual Switches on a Virtualized Host 333


The Physical Data Center Network 334


Workflow with a Virtualized Data Center 335


Cloud Computing Services 336


Private Cloud (On-Premise) 337


Public Cloud 338


Cloud and the As a Service Model 339


Infrastructure as a Service 339


Software as a Service 341


(Development) Platform as a Service 341


WAN Traffic Paths to Reach Cloud Services 342


Enterprise WAN Connections to Public Cloud 342


Accessing Public Cloud Services Using the Internet 342


Pros and Cons with Connecting to Public Cloud with Internet 343


Private WAN and Internet VPN Access to Public Cloud 344


Pros and Cons of Connecting to Cloud with Private WANs 345


Intercloud Exchanges 346


Summarizing the Pros and Cons of Public Cloud WAN Options 346


A Scenario: Branch Offices and the Public Cloud 347


Migrating Traffic Flows When Migrating to Email SaaS 347


Branch Offices with Internet and Private WAN 349


Chapter Review 350


Part IV Review 352


Part V Network Automation 355


Chapter 16 Introduction to Controller-Based Networking 356


Do I Know This Already? Quiz 357


Foundation Topics 358


SDN and Controller-Based Networks 358


The Data, Control, and Management Planes 358


The Data Plane 359


The Control Plane 360


The Management Plane 361


Cisco Switch Data Plane Internals 361


Controllers and Software-Defined Architecture 362


Controllers and Centralized Control 363


The Southbound Interface 364


The Northbound Interface 365


Software Defined Architecture Summary 367


Examples of Network Programmability and SDN 367


OpenDaylight and OpenFlow 367


The OpenDaylight Controller 368


The Cisco Open SDN Controller (OSC) 369


Cisco Application Centric Infrastructure (ACI) 369


ACI Physical Design: Spine and Leaf 370


ACI Operating Model with Intent-Based Networking 371


Cisco APIC Enterprise Module 373


APIC-EM Basics 373


APIC-EM Replacement 374


Summary of the SDN Examples 375


Comparing Traditional Versus Controller-Based Networks 375


How Automation Impacts Network Management 376


Comparing Traditional Networks with Controller-Based Networks 378


Chapter Review 379


Chapter 17 Cisco Software-Defined Access (SDA) 382


Do I Know This Already? Quiz 383


Foundation Topics 384


SDA Fabric, Underlay, and Overlay 384


The SDA Underlay 386


Using Existing Gear for the SDA Underlay 386


Using New Gear for the SDA Underlay 387


The SDA Overlay 390


VXLAN Tunnels in the Overlay (Data Plane) 390


LISP for Overlay Discovery and Location (Control Plane) 392


DNA Center and SDA Operation 395


Cisco DNA Center 395


Cisco DNA Center and Scalable Groups 396


Issues with Traditional IP-Based Security 397


SDA Security Based on User Groups 398


DNA Center as a Network Management Platform 400


DNA Center Similarities to Traditional Management 401


DNA Center Differences with Traditional Management 402


Chapter Review 403


Chapter 18 Understanding REST and JSON 406


Do I Know This Already? Quiz 406


Foundation Topics 408


REST-Based APIs 408


REST-Based (RESTful) APIs 408


Client/Server Architecture 409


Stateless Operation 410


Cacheable (or Not) 410


Background: Data and Variables 410


Simple Variables 410


List and Dictionary Variables 411


REST APIs and HTTP 413


Software CRUD Actions and HTTP Verbs 413


Using URIs with HTTP to Specify the Resource 414


Example of REST API Call to DNA Center 417


Data Serialization and JSON 418


The Need for a Data Model with APIs 419


Data Serialization Languages 421


JSON 421


XML 421


YAML 422


S

Show more
Product Details
EAN
9781587147135
ISBN
1587147130
Publisher
Dimensions
23.4 x 19.3 x 3.6 centimeters (0.80 kg)

Table of Contents

  • Part I IP Access Control Lists
  • 1 Introduction to TCP/IP Transport and Applications
  • 2 Basic IPv4 Access Control Lists
  • 3 Advanced IPv4 Access Control Lists
  • Part II Security Services
  • 4 Security Architectures
  • 5 Securing Network Devices
  • 6 Implementing Switch Port Security
  • 7 Implementing DHCP
  • 8 DHCP Snooping and ARP Inspection
  • Part III IP Services
  • 9 Device Management Protocols
  • 10 Network Address Translation
  • 11 Quality of Service (QoS)
  • 12 Miscellaneous IP Services
  • Part IV Network Architecture
  • 13 LAN Architecture
  • 14 WAN Architecture
  • 15 Cloud Architecture
  • Part V Network Automation
  • 16 Introduction to Controller-Based Networking
  • 17 Cisco Software-Defined Access (SDA)
  • 18 Understanding REST and JSON
  • 19 Understanding Ansible, Puppet, and Chef
  • Part VI Final Review
  • 20 Final Review
  • Part VII Appendixes
  • Appendix A Numeric Reference Tables
  • Appendix B CCNA 200-301 Volume 2 Exam Updates
  • Appendix C Answers to the 'Do I Know This Already?' Quizzes
  • Glossary

About the Author

Wendell Odom, CCIE No. 1624 (Emeritus), has been in the networking industry since 1981. He has worked as a network engineer, consultant, systems engineer, instructor, and course developer; he currently works writing and creating certification study tools. He is the author of all editions of the CCNA R&S and CCENT Cert Guides from Cisco Press. He has written books about topics from networking basics, certification guides throughout the years for CCENT, CCNA R&S, CCNA DC, CCNP ROUTE, CCNP QoS, and CCIE R&S.

Show more
Review this Product
Ask a Question About this Product More...
 
Look for similar items by category
Item ships from and is sold by Fishpond World Ltd.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.