Детальная информация
Название | Implementing and Administering Cisco Solutions: 200-301 CCNA exam guide : begin a Successful Career in Networking with 200-301 CCNA Certification |
---|---|
Авторы | Singh Glen D. |
Коллекция | Электронные книги зарубежных издательств ; Общая коллекция |
Тематика | Computer networks — Study guides. — Examinations ; Telecommunications engineers — Certification. ; Internetworking (Telecommunication) — Study guides. — Examinations ; TCP/IP (Computer network protocol) — Study guides. — Examinations ; EBSCO eBooks |
Тип документа | Другой |
Тип файла | |
Язык | Английский |
Права доступа | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Ключ записи | on1202478914 |
Дата создания записи | 31.10.2020 |
Разрешенные действия
pdf/2655449.pdf | – |
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
|
---|---|---|
epub/2655449.epub | – |
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
|
Группа | Анонимные пользователи |
---|---|
Сеть | Интернет |
Место доступа | Группа пользователей | Действие |
---|---|---|
Локальная сеть ИБК СПбПУ | Все |
|
Интернет | Авторизованные пользователи СПбПУ |
|
Интернет | Анонимные пользователи |
|
- Cover
- Title page
- Copyright and Credits
- About Packt
- Table of Contents
- Contributors
- Preface
- Section 1: Network Fundamentals
- Chapter 1: Introduction to Networking
- Understanding the evolution of networking and the internet
- Understanding network sizes – SOHO, LAN, and WAN
- Learning about network protocol suites
- OSI reference model
- Understanding the TCP/IP protocol suite
- Understanding the functions of network devices
- Hubs
- Layer 2 switches
- Layer 3 switches
- Routers
- Next-generation firewalls and IPS
- Access Points
- Cisco Wireless LAN Controller (WLC)
- Endpoints and servers
- Cisco DNA
- Network topology architectures
- 2 Tier
- 3 Tier
- Summary
- Further reading
- Chapter 2: Getting Started with Cisco IOS Devices
- Technical requirements
- Building a Cisco lab environment
- Cisco Packet Tracer
- Virtual CCNA Lab
- Physical labs
- Getting started with Cisco IOS devices
- Boot process
- Accessing a Cisco IOS device
- Configuring the Cisco IOS
- Setting up a small Cisco network
- Performing troubleshooting procedures
- Summary
- Questions
- Further reading
- Chapter 3: IP Addressing and Subnetting
- Technical requirements
- The need for IP addressing
- Characteristics of IPv4
- Composition of an IPv4 packet
- Converting binary into decimal
- Converting decimal into binary
- Transmission types
- Classes of IPv4 addresses
- Public IPv4 address space
- Private IPv4 address space
- Special IPv4 addresses
- Loopback address
- Test-Net
- Link Local
- Subnet mask
- Network prefix
- Identifying the Network ID
- Subnetting
- Step 1 – Determining the appropriate IP address
- Step 2 – Creating new subnets (subnetworks)
- Step 3 – Assigning subnets to each network
- Step 4 – Performing Variable-Length Subnet Masking (VLSM)
- IPv6
- Types of IPv6 addresses
- Lab – Configuring IPv6 on a Cisco IOS router
- Lab – Configuring IPv6 on a Windows computer
- Testing end-to-end connectivity
- Summary
- Further reading
- Chapter 4: Detecting Physical Issues, Wireless Architectures, and Virtualization
- Technical requirements
- Understanding network switch functions
- Detecting physical issues
- Wireless technologies
- 2.4 GHz versus 5 GHz
- Wireless bands
- SSID, BSSID, and ESS
- Cisco wireless architectures
- Autonomous
- Cloud-based
- Split-MAC
- AP modes
- Wireless components and management
- Lab – accessing a Cisco WLC GUI
- Lab – configuring a wireless network using a Cisco WLC
- Virtualization fundamentals
- Type 1 hypervisor
- Type 2 hypervisor
- Cloud computing
- Cloud services
- SaaS
- PaaS
- IaaS
- Cloud delivery models
- Summary
- Questions
- Further reading
- Section 2: Network Access
- Chapter 5: Implementing VLANs, Layer 2 Discovery Protocols, and EtherChannels
- Technical requirements
- Understanding VLANs
- VLAN ranges
- Types of VLANs
- Trunk interfaces
- Inter-VLAN routing
- Lab – implementing VLANs
- Lab – creating trunk interfaces
- Lab – configuring inter-VLAN routing
- Layer 2 Discovery Protocols
- Cisco Discovery Protocol (CDP)
- Link-Layer Discovery Protocol (LLDP)
- Understanding and configuring EtherChannels
- Lab – implementing EtherChannels
- Summary
- Questions
- Further reading
- Chapter 6: Understanding and Configuring Spanning-Tree
- Technical requirements
- What is Spanning-Tree Protocol?
- Bridge Protocol Data Unit
- Root bridge and secondary root bridge
- Spanning-tree standards
- Port roles and states
- Determining the root bridge and port roles
- PVST+
- Rapid-PVST+
- Lab – implementing Rapid-PVST+ on a Cisco network
- Lab – configuring PortFast and BPDUguard
- Summary
- Questions
- Further reading
- Section 3: IP Connectivity
- Chapter 7: Interpreting Routing Components
- Technical requirements
- Understanding IP routing
- Components of the routing table
- Routing protocol codes
- Prefix and network mask
- Next hop
- Administrative Distance
- Routing metrics
- Gateway of last resort
- Summary
- Questions
- Further reading
- Chapter 8: Understanding First Hop Redundancy, Static and Dynamic Routing
- Technical requirements
- Understanding static routing
- Do we need static routing?
- Types of static routes
- Lab – configuring static routing using IPv4
- Lab – configuring an IPv4 default route
- Lab – configuring static routing using IPv6
- Understanding dynamic routing
- Types of dynamic routing protocols
- Open Shortest Path First
- Lab – configuring OSPFv2
- Validating OSPF configurations
- Understanding first hop redundancy
- Various FHRPs
- Summary
- Questions
- Further reading
- Section 4: IP Services
- Chapter 9: Configuring Network Address Translation (NAT)
- Technical requirements
- The challenge of using IPv4 on the internet
- Understanding NAT
- Understanding NAT operation and terminology
- Types of NAT
- Static NAT
- Dynamic NAT
- Configuring PAT
- Lab – implementing NAT overload (PAT)
- Lab – implementing static NAT with port forwarding
- Lab – implementing dynamic NAT
- Summary
- Questions
- Further reading
- Chapter 10: Implementing Network Services and IP Operations
- Technical requirements
- Understanding NTP
- Lab – configuring NTP
- Understanding DHCP
- DHCP operations
- Cisco's DHCP configurations
- DHCP relay
- Lab – configuring DHCP and DHCP relay
- Domain Name System
- DNS root servers
- DNS record types
- Lab – configuring DNS
- Understanding the benefits of using Syslog
- Syslog severity levels
- Lab – configuring Syslog
- Simple Network Management Protocol
- SNMP versions
- Management information base
- Lab – configuring SNMP
- QoS traffic classification
- QoS terminologies
- Traffic type characteristics
- QoS queuing algorithms
- QoS policy models
- QoS implementation methods
- Summary
- Questions
- Further reading
- Section 5: Security Fundamentals
- Chapter 11: Exploring
Network Security
- Technical requirements
- Security concepts
- The CIA triad
- Threats
- Vulnerabilities
- Exploits
- Attacks
- Authentication, Authorization, and Accounting
- Lab – Implementing AAA
- Elements of a security program
- Wireshark 101
- Lab – Analyzing packets
- Summary
- Questions
- Further reading
- Chapter 12: Configuring Device Access Control
and VPNs
- Technical requirements
- Device access control
- Securing console access
- Securing an AUX line
- VTY line access
- Securing Privilege Exec mode
- Encrypting all plaintext passwords
- Virtual Private Networks
- Site-to-Site VPNs
- Remote access VPNs
- IPsec
- Lab – Configuring a site-to-site VPN
- Lab – Configuring a remote access VPN
- Summary
- Questions
- Further reading
- Chapter 13: Implementing Access Control Lists
- Technical requirements
- What are ACLs?
- Benefits of using ACLs
- ACL operation
- ACL wildcard masks
- Calculating the wildcard mask
- ACL guidelines and best practices
- Working with standard ACLs
- Creating a numbered standard ACL
- Implementing a named standard ACL
- Deleting an ACL
- Lab – implementing a standard numbered ACL
- Lab – configuring a standard named ACL
- Lab – securing VTY lines using ACLs
- Working with extended ACLs
- Creating a numbered extended ACL
- Implementing a named extended ACL
- Lab – implementing extended ACLs
- Summary
- Questions
- Further reading
- Chapter 14: Implementing Layer 2 and Wireless Security
- Technical requirements
- Types of Layer 2 attacks on a network
- Network attacks
- Defense in depth
- Layer 2 threats
- Protecting against Layer 2 threats
- Port security
- DHCP snooping
- Dynamic ARP inspection
- Wireless network security
- Authentication methods
- Lab – implementing wireless security using a WLC
- Summary
- Questions
- Further reading
- Section 6: Automation and Programmability
- Chapter 15: Network Automation and Programmability Techniques
- Understanding automation
- Understanding data formats
- eXtensible Markup Language
- JavaScript Object Notation
- YAML Ain't Markup Language
- Understanding APIs
- Types of APIs
- RESTful APIs
- Understanding network configuration management
- Fabric, overlay, and underlay
- Cisco DNA Center
- Summary
- Questions
- Further reading
- Chapter 16: Mock Exam 1
- Chapter 17: Mock Exam 2
- Assessments
- Other Books You May Enjoy
- Index