Детальная информация
| Название | Implementing and Administering Cisco Solutions: 200-301 CCNA exam guide : begin a Successful Career in Networking with 200-301 CCNA Certification | 
|---|---|
| Авторы | Singh Glen D. | 
| Коллекция | Электронные книги зарубежных издательств ; Общая коллекция | 
| Тематика | Computer networks — Study guides. — Examinations ; Telecommunications engineers — Certification. ; Internetworking (Telecommunication) — Study guides. — Examinations ; TCP/IP (Computer network protocol) — Study guides. — Examinations ; EBSCO eBooks | 
| Тип документа | Другой | 
| Тип файла | |
| Язык | Английский | 
| Права доступа | Доступ по паролю из сети Интернет (чтение, печать, копирование) | 
| Ключ записи | on1202478914 | 
| Дата создания записи | 31.10.2020 | 
Разрешенные действия
| pdf/2655449.pdf | – | 
                          
                            Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
                          
                          
                            Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
                          
                     | 
|---|---|---|
| epub/2655449.epub | – | 
                          
                            Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
                          
                     | 
| Группа | Анонимные пользователи | 
|---|---|
| Сеть | Интернет | 
| Место доступа | Группа пользователей | Действие | 
|---|---|---|
| Локальная сеть ИБК СПбПУ | Все |  | 
| Интернет | Авторизованные пользователи СПбПУ |  | 
| Интернет | Анонимные пользователи |  | 
- Cover
- Title page
- Copyright and Credits
- About Packt
- Table of Contents- Contributors
 
- Preface
- Section 1: Network Fundamentals
- Chapter 1: Introduction to Networking- Understanding the evolution of networking and the internet
- Understanding network sizes – SOHO, LAN, and WAN
- Learning about network protocol suites- OSI reference model
- Understanding the TCP/IP protocol suite
 
- Understanding the functions of network devices- Hubs
- Layer 2 switches
- Layer 3 switches
- Routers
- Next-generation firewalls and IPS
- Access Points
- Cisco Wireless LAN Controller (WLC)
- Endpoints and servers
- Cisco DNA
 
- Network topology architectures- 2 Tier
- 3 Tier
 
- Summary
- Further reading
 
- Chapter 2: Getting Started with Cisco IOS Devices- Technical requirements
- Building a Cisco lab environment- Cisco Packet Tracer
- Virtual CCNA Lab
- Physical labs
 
- Getting started with Cisco IOS devices- Boot process
 
- Accessing a Cisco IOS device
- Configuring the Cisco IOS- Setting up a small Cisco network
 
- Performing troubleshooting procedures
- Summary
- Questions
- Further reading
 
- Chapter 3: IP Addressing and Subnetting- Technical requirements
- The need for IP addressing
- Characteristics of IPv4- Composition of an IPv4 packet
- Converting binary into decimal
- Converting decimal into binary
- Transmission types
 
- Classes of IPv4 addresses- Public IPv4 address space
- Private IPv4 address space
 
- Special IPv4 addresses- Loopback address
- Test-Net
- Link Local
 
- Subnet mask- Network prefix
- Identifying the Network ID
 
- Subnetting- Step 1 – Determining the appropriate IP address
- Step 2 – Creating new subnets (subnetworks)
- Step 3 – Assigning subnets to each network
- Step 4 – Performing Variable-Length Subnet Masking (VLSM)
 
- IPv6- Types of IPv6 addresses
 
- Lab – Configuring IPv6 on a Cisco IOS router
- Lab – Configuring IPv6 on a Windows computer
- Testing end-to-end connectivity
- Summary
- Further reading
 
- Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization- Technical requirements
- Understanding network switch functions- Detecting physical issues
- Wireless technologies
- 2.4 GHz versus 5 GHz
- Wireless bands
- SSID, BSSID, and ESS
 
- Cisco wireless architectures- Autonomous
- Cloud-based
- Split-MAC
 
- AP modes
- Wireless components and management- Lab – accessing a Cisco WLC GUI
- Lab – configuring a wireless network using a Cisco WLC
 
- Virtualization fundamentals- Type 1 hypervisor
- Type 2 hypervisor
 
- Cloud computing- Cloud services
- SaaS
- PaaS
- IaaS
- Cloud delivery models
 
- Summary
- Questions
- Further reading
 
- Section 2: Network Access
- Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels- Technical requirements
- Understanding VLANs- VLAN ranges
- Types of VLANs
- Trunk interfaces
- Inter-VLAN routing
- Lab – implementing VLANs
- Lab – creating trunk interfaces
- Lab – configuring inter-VLAN routing
 
- Layer 2 Discovery Protocols- Cisco Discovery Protocol (CDP)
- Link-Layer Discovery Protocol (LLDP)
 
- Understanding and configuring EtherChannels- Lab – implementing EtherChannels
 
- Summary
- Questions
- Further reading
 
- Chapter 6: Understanding and Configuring Spanning-Tree- Technical requirements
- What is Spanning-Tree Protocol?- Bridge Protocol Data Unit
- Root bridge and secondary root bridge
 
- Spanning-tree standards- Port roles and states
- Determining the root bridge and port roles
- PVST+
- Rapid-PVST+
- Lab – implementing Rapid-PVST+ on a Cisco network
- Lab – configuring PortFast and BPDUguard
 
- Summary
- Questions
- Further reading
 
- Section 3: IP Connectivity
- Chapter 7: Interpreting Routing Components- Technical requirements
- Understanding IP routing
- Components of the routing table- Routing protocol codes
- Prefix and network mask
- Next hop
- Administrative Distance
- Routing metrics
- Gateway of last resort
 
- Summary
- Questions
- Further reading
 
- Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing- Technical requirements
- Understanding static routing - Do we need static routing?
- Types of static routes
- Lab – configuring static routing using IPv4
- Lab – configuring an IPv4 default route
- Lab – configuring static routing using IPv6
 
- Understanding dynamic routing- Types of dynamic routing protocols
- Open Shortest Path First
- Lab – configuring OSPFv2
- Validating OSPF configurations
 
- Understanding first hop redundancy- Various FHRPs
 
- Summary
- Questions
- Further reading
 
- Section 4: IP Services
- Chapter 9: Configuring Network Address Translation (NAT)- Technical requirements
- The challenge of using IPv4 on the internet
- Understanding NAT- Understanding NAT operation and terminology
 
- Types of NAT- Static NAT
- Dynamic NAT
- Configuring PAT
 
- Lab – implementing NAT overload (PAT)
- Lab – implementing static NAT with port forwarding
- Lab – implementing dynamic NAT
- Summary
- Questions
- Further reading
 
- Chapter 10: Implementing Network Services and IP Operations- Technical requirements
- Understanding NTP- Lab – configuring NTP
 
- Understanding DHCP- DHCP operations
- Cisco's DHCP configurations
- DHCP relay
- Lab – configuring DHCP and DHCP relay
 
- Domain Name System- DNS root servers
- DNS record types
- Lab – configuring DNS
 
- Understanding the benefits of using Syslog- Syslog severity levels
- Lab – configuring Syslog
 
- Simple Network Management Protocol- SNMP versions
- Management information base
- Lab – configuring SNMP
 
- QoS traffic classification- QoS terminologies
- Traffic type characteristics
- QoS queuing algorithms
- QoS policy models
- QoS implementation methods
 
- Summary
- Questions
- Further reading
 
- Section 5: Security Fundamentals
- Chapter 11: Exploring 
Network Security- Technical requirements
- Security concepts- The CIA triad
- Threats
- Vulnerabilities
- Exploits
- Attacks
 
- Authentication, Authorization, and Accounting- Lab – Implementing AAA
 
- Elements of a security program
- Wireshark 101- Lab – Analyzing packets
 
- Summary
- Questions
- Further reading
 
- Chapter 12: Configuring Device Access Control 
and VPNs- Technical requirements
- Device access control- Securing console access
- Securing an AUX line
- VTY line access
- Securing Privilege Exec mode
- Encrypting all plaintext passwords
 
- Virtual Private Networks- Site-to-Site VPNs
- Remote access VPNs
- IPsec
- Lab – Configuring a site-to-site VPN
- Lab – Configuring a remote access VPN
 
- Summary
- Questions
- Further reading
 
- Chapter 13: Implementing Access Control Lists- Technical requirements
- What are ACLs?- Benefits of using ACLs
 
- ACL operation
- ACL wildcard masks- Calculating the wildcard mask
- ACL guidelines and best practices
 
- Working with standard ACLs- Creating a numbered standard ACL
- Implementing a named standard ACL
- Deleting an ACL
- Lab – implementing a standard numbered ACL
- Lab – configuring a standard named ACL
- Lab – securing VTY lines using ACLs
 
- Working with extended ACLs- Creating a numbered extended ACL
- Implementing a named extended ACL
- Lab – implementing extended ACLs
 
- Summary
- Questions
- Further reading
 
- Chapter 14: Implementing Layer 2 and Wireless Security- Technical requirements
- Types of Layer 2 attacks on a network- Network attacks
- Defense in depth
- Layer 2 threats
 
- Protecting against Layer 2 threats - Port security
- DHCP snooping
- Dynamic ARP inspection
 
- Wireless network security- Authentication methods
- Lab – implementing wireless security using a WLC
 
- Summary
- Questions
- Further reading
 
- Section 6: Automation and Programmability
- Chapter 15: Network Automation and Programmability Techniques- Understanding automation
- Understanding data formats- eXtensible Markup Language
- JavaScript Object Notation
- YAML Ain't Markup Language
 
- Understanding APIs- Types of APIs
- RESTful APIs
 
- Understanding network configuration management- Fabric, overlay, and underlay
- Cisco DNA Center
 
- Summary
- Questions
- Further reading
 
- Chapter 16: Mock Exam 1
- Chapter 17: Mock Exam 2
- Assessments
- Other Books You May Enjoy
- Index
