Description

Book Synopsis
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.

Table of Contents
Introduction xxx
Chapter 1 Single-Area OSPFv2 Concepts 1
Introduction - 1.0 1
Why should I take this module? - 1.0.1 1
What will I learn to do in this module? - 1.0.2 1
OSPF Features and Characteristics - 1.1 1
Introduction to OSPF - 1.1.1 1
Components of OSPF - 1.1.2 2
Link-State Operation - 1.1.3 3
Single-Area and Multiarea OSPF - 1.1.4 4
Multiarea OSPF - 1.1.5 4
OSPFv3 - 1.1.6 5
Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
OSPF Packets - 1.2 6
Video - OSPF Packets - 1.2.1 6
Types of OSPF Packets - 1.2.2 6
Link-State Updates - 1.2.3 7
Hello Packet - 1.2.4 7
Check Your Understanding - OSPF Packets - 1.2.5 7
OSPF Operation - 1.3 7
Video - OSPF Operation - 1.3.1 7
OSPF Operational States - 1.3.2 7
Establish Neighbor Adjacencies - 1.3.3 8
Synchronizing OSPF Databases - 1.3.4 9
The Need for a DR - 1.3.5 10
LSA Flooding With a DR - 1.3.6 11
Check Your Understanding - OPSF Operation - 1.3.7 11
Module Practice and Quiz - 1.4 11
What did I learn in this module? - 1.4.1 11
Chapter Quiz - Single-Area OSPFv2 Concepts 14
Your Chapter Notes 14
Chapter 2 Single-Area OSPFv2 Configuration 15
Introduction - 2.0 15
Why should I take this module? - 2.0.1 15
What will I learn to do in this module? - 2.0.2 15
OSPF Router ID - 2.1 15
OSPF Reference Topology - 2.1.1 15
Router Configuration Mode for OSPF - 2.1.2 16
Router IDs - 2.1.3 16
Router ID Order of Precedence - 2.1.4 17
Configure a Loopback Interface as the Router ID - 2.1.5 17
Explicitly Configure a Router ID - 2.1.6 18
Modify a Router ID - 2.1.7 18
Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
Check Your Understanding - OSPF Router ID - 2.1.9 19
Point-to-Point OSPF Networks - 2.2 20
The network Command Syntax - 2.2.1 20
The Wildcard Mask - 2.2.2 20
Check Your Understanding - The Wildcard Masks - 2.2.3 20
Configure OSPF Using the network Command - 2.2.4 20
Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
Configure OSPF Using the ip ospf Command - 2.2.6 21
Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
Passive Interface - 2.2.8 22
Configure Passive Interfaces - 2.2.9 23
Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
OSPF Point-to-Point Networks - 2.2.11 24
Loopbacks and Point-to-Point Networks - 2.2.12 26
Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
Multiaccess OSPF Networks - 2.3 27
OSPF Network Types - 2.3.1 27
OSPF Designated Router - 2.3.2 27
OSPF Multiaccess Reference Topology - 2.3.3 27
Verify OSPF Router Roles - 2.3.4 28
Verify DR/BDR Adjacencies - 2.3.5 30
Default DR/BDR Election Process - 2.3.6 32
DR Failure and Recovery - 2.3.7 33
The ip ospf priority Command - 2.3.8 33
Configure OSPF Priority - 2.3.9 34
Syntax Checker - Configure OSPF Priority - 2.3.10 35
Packet Tracer - Determine the DR and BDR - 2.3.11 35
Modify Single-Area OSPFv2 - 2.4 36
Cisco OSPF Cost Metric - 2.4.1 36
Adjust the Reference Bandwidth - 2.4.2 36
OSPF Accumulates Costs - 2.4.3 38
Manually Set OSPF Cost Value - 2.4.4 38
Test Failover to Backup Route - 2.4.5 39
Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
Hello Packet Intervals - 2.4.7 40
Verify Hello and Dead Intervals - 2.4.8 40
Modify OSPFv2 Intervals - 2.4.9 42
Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
Default Route Propagation - 2.5 43
Propagate a Default Static Route in OSPFv2 - 2.5.1 43
Verify the Propagated Default Route - 2.5.2 44
Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
Verify Single-Area OSPFv2 - 2.6 46
Verify OSPF Neighbors - 2.6.1 46
Verify OSPF Protocol Settings - 2.6.2 48
Verify OSPF Process Information - 2.6.3 48
Verify OSPF Interface Settings - 2.6.4 50
Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
Module Practice and Quiz - 2.7 51
Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
What did I learn in this module? - 2.7.3 52
Chapter Quiz - Single-Area OSPFv2 Configuration 56
Your Chapter Notes 56
Chapter 3 Network Security Concepts 57
Introduction - 3.0 57
Why should I take this module? - 3.0.1 57
What will I learn in this module? - 3.0.2 57
Ethical Hacking Statement - 3.0.3 57
Current State of Cybersecurity - 3.1 58
Current State of Affairs - 3.1.1 58
Vectors of Network Attacks - 3.1.2 58
Data Loss - 3.1.3 59
Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
Threat Actors - 3.2 60
The Hacker - 3.2.1 60
Evolution of Hackers - 3.2.2 61
Cyber Criminals - 3.2.3 61
Hacktivists - 3.2.4 61
State-Sponsored Hackers - 3.2.5 61
Check Your Understanding - Threat Actors - 3.2.6 62
Threat Actor Tools - 3.3 62
Video - Threat Actor Tools - 3.3.1 62
Introduction to Attack Tools - 3.3.2 62
Evolution of Security Tools - 3.3.3 62
Attack Types - 3.3.4 63
Check Your Understanding - Threat Actor Tools - 3.3.5 64
Malware - 3.4 64
Overview of Malware - 3.4.1 64
Viruses and Trojan Horses - 3.4.2 64
Other Types of Malware - 3.4.3 65
Check Your Understanding - Malware - 3.4.4 66
Common Network Attacks - 3.5 66
Overview of Network Attacks - 3.5.1 66
Video - Reconnaissance Attacks - 3.5.2 67
Reconnaissance Attacks - 3.5.3 67
Video - Access and Social Engineering Attacks - 3.5.4 68
Access Attacks - 3.5.5 68
Social Engineering Attacks - 3.5.6 69
Lab - Social Engineering - 3.5.7 70
Video - Denial of Service Attacks - 3.5.8 70
DoS and DDoS Attacks - 3.5.9 70
Check Your Understanding - Common Network Attacks - 3.5.10 71
IP Vulnerabilities and Threats - 3.6 71
Video - Common IP and ICMP Attacks - 3.6.1 71
IPv4 and IPv6 - 3.6.2 71
ICMP Attacks - 3.6.3 71
Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
Amplification and Reflection Attacks - 3.6.5 72
Address Spoofing Attacks - 3.6.6 72
Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
TCP and UDP Vulnerabilities - 3.7 73
TCP Segment Header - 3.7.1 73
TCP Services - 3.7.2 73
TCP Attacks - 3.7.3 74
UDP Segment Header and Operation - 3.7.4 74
UDP Attacks - 3.7.5 75
Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
IP Services - 3.8 75
ARP Vulnerabilities - 3.8.1 75
ARP Cache Poisoning - 3.8.2 76
Video - ARP Spoofing - 3.8.3 76
DNS Attacks - 3.8.4 76
DNS Tunneling - 3.8.5 78
DHCP - 3.8.6 78
DHCP Attacks - 3.8.7 78
Lab - Explore DNS Traffic - 3.8.8 79
Network Security Best Practices - 3.9 80
Confidentiality, Integrity, and Availability - 3.9.1 80
The Defense-in-Depth Approach - 3.9.2 80
Firewalls - 3.9.3 80
IPS - 3.9.4 81
Content Security Appliances - 3.9.5 81
Check Your Understanding - Network Security Best Practices - 3.9.6 82
Cryptography - 3.10 82
Video - Cryptography - 3.10.1 82
Securing Communications - 3.10.2 82
Data Integrity - 3.10.3 83
Hash Functions - 3.10.4 83
Origin Authentication - 3.10.5 84
Data Confidentiality - 3.10.6 85
Symmetric Encryption - 3.10.7 85
Asymmetric Encryption - 3.10.8 86
Diffie-Hellman - 3.10.9 87
Check Your Understanding - Cryptography - 3.10.10 88
Module Practice and Quiz - 3.11 88
What did I learn in this module? - 3.11.1 88
Chapter Quiz - Network Security Concepts 91
Your Chapter Notes 91
Chapter 4 ACL Concepts 93
Introduction - 4.0 93
Why should I take this module? - 4.0.1 93
What will I learn to do in this module? - 4.0.2 93
Purpose of ACLs - 4.1 93
What is an ACL? - 4.1.1 93
Packet Filtering - 4.1.2 95
ACL Operation - 4.1.3 95
Packet Tracer - ACL Demonstration - 4.1.4 96
Check Your Understanding - Purpose of ACLs - 4.1.5 96
Wildcard Masks in ACLs - 4.2 96
Wildcard Mask Overview - 4.2.1 96
Wildcard Mask Types - 4.2.2 97
Wildcard Mask Calculation - 4.2.3 97
Wildcard Mask Keywords - 4.2.4 98
Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
Guidelines for ACL Creation - 4.3 99
Limited Number of ACLs per Interface - 4.3.1 99
ACL Best Practices - 4.3.2 99
Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
Types of IPv4 ACLs - 4.4 100
Standard and Extended ACLs - 4.4.1 100
Numbered and Named ACLs - 4.4.2 101
Where to Place ACLs - 4.4.3 102
Standard ACL Placement Example - 4.4.4 102
Extended ACL Placement Example - 4.4.5 103
Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
Module Practice and Quiz - 4.5 103
What did I learn in this module? - 4.5.1 103
Chapter Quiz - ACL Concepts 106
Your Chapter Notes 106
Chapter 5 ACLs for IPv4 Configuration 107
Introduction - 5.0 107
Why should I take this module? - 5.0.1 107
What will I learn to do in this module? - 5.0.2 107
Configure Standard IPv4 ACLs - 5.1 107
Create an ACL - 5.1.1 107
Numbered Standard IPv4 ACL Syntax - 5.1.2 108
Named Standard IPv4 ACL Syntax - 5.1.3 109
Apply a Standard IPv4 ACL - 5.1.4 109
Numbered Standard IPv4 ACL Example - 5.1.5 110
Named Standard IPv4 ACL Example - 5.1.6 111
Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
Modify IPv4 ACLs - 5.2 113
Two Methods to Modify an ACL - 5.2.1 113
Text Editor Method - 5.2.2 113
Sequence Numbers Method - 5.2.3 114
Modify a Named ACL Example - 5.2.4 115
ACL Statistics - 5.2.5 116
Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
The access-class Command - 5.3.1 116
Secure VTY Access Example - 5.3.2 117
Verify the VTY Port is Secured - 5.3.3 118
Syntax Checker - Secure the VTY Ports - 5.3.4 118
Configure Extended IPv4 ACLs - 5.4 119
Extended ACLs - 5.4.1 119
Numbered Extended IPv4 ACL Syntax - 5.4.2 119
Protocols and Ports - 5.4.3 120
Protocols and Port Numbers Configuration Examples - 5.4.4 123
Apply a Numbered Extended IPv4 ACL - 5.4.5 123
TCP Established Extended ACL - 5.4.6 123
Named Extended IPv4 ACL Syntax - 5.4.7 124
Named Extended IPv4 ACL Example - 5.4.8 125
Edit Extended ACLs - 5.4.9 126
Another Named Extended IPv4 ACL Example - 5.4.10 127
Verify Extended ACLs - 5.4.11 128
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
Module Practice and Quiz - 5.5 130
Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
What did I learn in this module? - 5.5.3 131
Chapter Quiz - ACLs for IPv4 Implementation 133
Your Chapter Notes 133
Chapter 6 NAT for IPv4 135
Introduction - 6.0 135
Why should I take this module? - 6.0.1 135
What will I learn to do in this module? - 6.0.2 135
NAT Characteristics - 6.1 135
IPv4 Private Address Space - 6.1.1 135
What is NAT - 6.1.2 136
How NAT Works - 6.1.3 137
NAT Terminology - 6.1.4 137
Check Your Understanding - NAT Characteristics - 6.1.5 138
Types of NAT - 6.2 139
Static NAT - 6.2.1 139
Dynamic NAT - 6.2.2 139
Port Address Translation - 6.2.3 139
Next Available Port - 6.2.4 140
NAT and PAT Comparison - 6.2.5 140
Packets without a Layer 4 Segment - 6.2.6 141
Packet Tracer - Investigate NAT Operations - 6.2.7 141
NAT Advantages and Disadvantages - 6.3 142
Advantages of NAT - 6.3.1 142
Disadvantages of NAT - 6.3.2 142
Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
Static NAT - 6.4 143
Static NAT Scenario - 6.4.1 143
Configure Static NAT - 6.4.2 143
Analyze Static NAT - 6.4.3 144
Verify Static NAT - 6.4.4 144
Packet Tracer - Configure Static NAT - 6.4.5 145
Dynamic NAT - 6.5 146
Dynamic NAT Scenario - 6.5.1 146
Configure Dynamic NAT - 6.5.2 146
Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
Verify Dynamic NAT - 6.5.5 148
Packet Tracer - Configure Dynamic NAT - 6.5.6 150
PAT - 6.6 150
PAT Scenario - 6.6.1 150
Configure PAT to Use a Single IPv4 Address - 6.6.2 150
Configure PAT to Use an Address Pool - 6.6.3 151
Analyze PAT - PC to Server - 6.6.4 151
Analyze PAT - Server to PC - 6.6.5 151
Verify PAT - 6.6.6 151
Packet Tracer - Configure PAT - 6.6.7 152
NAT64 - 6.7 153
NAT for IPv6? - 6.7.1 153
NAT64 - 6.7.2 153
Module Practice and Quiz - 6.8 153
Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
Lab - Configure NAT for IPv4 - 6.8.2 154
What did I learn in this module? - 6.8.3 154
Chapter Quiz - NAT for IPv4 158
Your Chapter Notes 158
Chapter 7 WAN Concepts 159
Introduction - 7.0 159
Why should I take this module? - 7.0.1 159
What will I learn to do in this module? - 7.0.2 159
Purpose of WANs - 7.1 159
LANs and WANs - 7.1.1 159
Private and Public WANs - 7.1.2 160
WAN Topologies - 7.1.3 160
Carrier Connections - 7.1.4 162
Evolving Networks - 7.1.5 162
Check Your Understanding - Purpose of WANs - 7.1.6 164
WAN Operations - 7.2 164
WAN Standards - 7.2.1 164
WANs in the OSI Model - 7.2.2 164
Common WAN Terminology - 7.2.3 165
WAN Devices - 7.2.4 166
Serial Communication - 7.2.5 167
Circuit-Switched Communication - 7.2.6 168
Packet-Switched Communications - 7.2.7 168
SDH, SONET, and DWDM - 7.2.8 169
Check Your Understanding - WAN Operations - 7.2.9 169
Traditional WAN Connectivity - 7.3 169
Traditional WAN Connectivity Options - 7.3.1 169
Common WAN Terminology - 7.3.2 169
Circuit-Switched Options - 7.3.3 170
Packet-Switched Options - 7.3.4 171
Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
Modern WAN Connectivity - 7.4 172
Modern WANs - 7.4.1 172
Modern WAN Connectivity Options - 7.4.2 172
Ethernet WAN - 7.4.3 173
MPLS - 7.4.4 174
Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
Internet-Based Connectivity - 7.5 174
Internet-Based Connectivity Options - 7.5.1 174
DSL Technology - 7.5.2 175
DSL Connections - 7.5.3 175
DSL and PPP - 7.5.4 176
Cable Technology - 7.5.5 176
Optical Fiber - 7.5.6 177
Wireless Internet-Based Broadband - 7.5.7 177
VPN Technology - 7.5.8 179
ISP Connectivity Options - 7.5.9 179
Broadband Solution Comparison - 7.5.10 180
Lab - Research Broadband Internet Access Options - 7.5.11 181
Module Practice and Quiz - 7.6 181
Packet Tracer - WAN Concepts - 7.6.1 181
What did I learn in this module? - 7.6.2 181
Chapter Quiz - WAN Concepts 184
Your Chapter Notes 184
Chapter 8 VPN and IPsec Concepts 185
Introduction - 8.0 185
Why should I take this module? - 8.0.1 185
What will I learn in this module? - 8.0.2 185
VPN Technology - 8.1 185
Virtual Private Networks - 8.1.1 185
VPN Benefits - 8.1.2 186
Site-to-Site and Remote-Access VPNs - 8.1.3 186
Enterprise and Service Provider VPNs - 8.1.4 186
Check Your Understanding - VPN Technology - 8.1.5 187
Types of VPNs - 8.2 187
Remote-Access VPNs - 8.2.1 187
SSL VPNs - 8.2.2 187
Site-to-Site IPsec VPNs - 8.2.3 188
GRE over IPsec - 8.2.4 188
Dynamic Multipoint VPNs - 8.2.5 189
IPsec Virtual Tunnel Interface - 8.2.6 189
Service Provider MPLS VPNs - 8.2.7 190
Check Your Understanding - Types of VPNs - 8.2.8 190
IPsec - 8.3 190
Video - IPsec Concepts - 8.3.1 190
IPsec Technologies - 8.3.2 190
IPsec Protocol Encapsulation - 8.3.3 191
Confidentiality - 8.3.4 192
Integrity - 8.3.5 192
Authentication - 8.3.6 192
Secure Key Exchange with Diffie-Hellman - 8.3.7 193
Video - IPsec Transport and Tunnel Mode - 8.3.8 193
Check Your Understanding - IPsec - 8.3.9 193
Module Practice and Quiz - 8.4 193
What did I learn in this module? - 8.4.1 193
Chapter Quiz - VPN and IPsec Concepts 195
Your Chapter Notes 195
Chapter 9 QoS Concepts 197
Introduction - 9.0 197
Why should I take this module? - 9.0.1 197
What will I learn to do in this module? - 9.0.2 197
Network Transmission Quality - 9.1 197
Video Tutorial - The Purpose of QoS - 9.1.1 197
Prioritizing Traffic - 9.1.2 197
Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
Packet Loss - 9.1.4 199
Check Your Understanding - Network Transmission Quality - 9.1.5 199
Traffic Characteristics - 9.2 199
Video Tutorial - Traffic Characteristics - 9.2.1 199
Network Traffic Trends - 9.2.2 199
Voice - 9.2.3 200
Video - 9.2.4 200
Data - 9.2.5 201
Check Your Understanding - Traffic Characteristics - 9.2.6 202
Queuing Algorithms - 9.3 202
Video Tutorial - QoS Algorithms - 9.3.1 202
Queuing Overview - 9.3.2 202
First In First Out - 9.3.3 202
Weighted Fair Queuing (WFQ) - 9.3.4 203
Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
Low Latency Queuing (LLQ) - 9.3.6 204
Check Your Understanding - Queuing Algorithms - 9.3.7 204
QoS Models - 9.4 204
Video Tutorial - QoS Models - 9.4.1 204
Selecting an Appropriate QoS Policy Model - 9.4.2 204
Best Effort - 9.4.3 205
Integrated Services - 9.4.4 206
Differentiated Services - 9.4.5 206
Check Your Understanding - QoS Models - 9.4.6 208
QoS Implementation Techniques - 9.5 208
Video Tutorial - QoS Implementation Techniques - 9.5.1 208
Avoiding Packet Loss - 9.5.2 208
QoS Tools - 9.5.3 208
Classification and Marking - 9.5.4 209
Marking at Layer 2 - 9.5.5 210
Marking at Layer 3 - 9.5.6 210
Type of Service and Traffic Class Field - 9.5.7 211
DSCP Values - 9.5.8 211
Class Selector Bits - 9.5.9 211
Trust Boundaries - 9.5.10 211
Congestion Avoidance - 9.5.11 212
Shaping and Policing - 9.5.12 212
QoS Policy Guidelines - 9.5.13 213
Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
Module Practice and Quiz - 9.6 213
What did I learn in this module? - 9.6.1 213
Chapter Quiz - QoS Concepts 216
Your Chapter Notes 216
Chapter 10 Network Management 217
Introduction - 10.0 217
Why should I take this module? - 10.0.1 217
What will I learn to do in this module? - 10.0.2 217
Device Discovery with CDP - 10.1 217
CDP Overview - 10.1.1 217
Configure and Verify CDP - 10.1.2 218
Discover Devices by Using CDP - 10.1.3 220
Syntax Checker - Configure and Verify CDP - 10.1.4 222
Packet Tracer - Use CDP to Map a Network - 10.1.5 222
Device Discovery with LLDP - 10.2 222
LLDP Overview - 10.2.1 222
Configure and Verify LLDP - 10.2.2 222
Discover Devices by Using LLDP - 10.2.3 223
Syntax Checker - Configure and Verify LLDP - 10.2.4 225
Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
NTP - 10.3 225
Time and Calendar Services - 10.3.1 225
NTP Operation - 10.3.2 226
Configure and Verify NTP - 10.3.3 227
Packet Tracer - Configure and Verify NTP - 10.3.4 229
SNMP - 10.4 229
Introduction to SNMP - 10.4.1 229
SNMP Operation - 10.4.2 230
SNMP Agent Traps - 10.4.3 230
SNMP Versions - 10.4.4 231
Check Your Understanding - SNMP Versions - 10.4.5 232
Community Strings - 10.4.6 232
MIB Object ID - 10.4.7 233
SNMP Polling Scenario - 10.4.8 233
SNMP Object Navigator - 10.4.9 233
Lab - Research Network Monitoring Software - 10.4.10 234
Syslog - 10.5 234
Introduction to Syslog - 10.5.1 234
Syslog Operation - 10.5.2 234
Syslog Message Format - 10.5.3 235
Syslog Facilities - 10.5.4 236
Configure Syslog Timestamp - 10.5.5 236
Check Your Understanding - Syslog Operation - 10.5.6 237
Router and Switch File Maintenance - 10.6 237
Router File Systems - 10.6.1 237
Switch File Systems - 10.6.2 240
Use a Text File to Back Up a Configuration - 10.6.3 241
Use a Text File to Restore a Configuration - 10.6.4 241
Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
USB Ports on a Cisco Router - 10.6.6 242
Use USB to Back Up and Restore a Configuration - 10.6.7 243
Password Recovery Procedures - 10.6.8 245
Password Recovery Example - 10.6.9 245
Packet Tracer - Back Up Configuration Files - 10.6.10 247
Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
Lab - Research Password Recovery Procedures - 10.6.13 248
IOS Image Management - 10.7 248
Video - Managing Cisco IOS Images - 10.7.1 248
TFTP Servers as a Backup Location - 10.7.2 248
Backup IOS Image to TFTP Server Example - 10.7.3 249
Copy an IOS Image to a Device Example - 10.7.4 250
The boot system Command - 10.7.5 251
Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
Module Practice and Quiz - 10.8 253
Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
What did I learn in this module? - 10.8.3 253
Chapter Quiz - Network Management 257
Your Chapter Notes 257
Chapter 11 Network Design 259
Introduction - 11.0 259
Why should I take this module? - 11.0.1 259
What will I learn to do in this module? - 11.0.2 259
Hierarchical Networks - 11.1 259
Video - Three-Layer Network Design - 11.1.1 259
The Need to Scale the Network - 11.1.2 259
Borderless Switched Networks - 11.1.3 260
Hierarchy in the Borderless Switched Network - 11.1.4 261
Access, Distribution, and Core Layer Functions - 11.1.5 262
Three-Tier and Two-Tier Examples - 11.1.6 262
Role of Switched Networks - 11.1.7 263
Check Your Understanding - Hierarchical Networks - 11.1.8 263
Scalable Networks - 11.2 263
Design for Scalability - 11.2.1 263
Plan for Redundancy - 11.2.2 264
Reduce Failure Domain Size - 11.2.3 265
Increase Bandwidth - 11.2.4 265
Expand the Access Layer - 11.2.5 266
Tune Routing Protocols - 11.2.6 266
Check Your Understanding - Scalable Networks - 11.2.7 266
Switch Hardware - 11.3 266
Switch Platforms - 11.3.1 266
Switch Form Factors - 11.3.2 267
Port Density - 11.3.3 268
Forwarding Rates - 11.3.4 268
Power over Ethernet - 11.3.5 269
Multilayer Switching - 11.3.6 269
Business Considerations for Switch Selection - 11.3.7 270
Check Your Understanding - Switch Hardware - 11.3.8 270
Router Hardware - 11.4 270
Router Requirements - 11.4.1 270
Cisco Routers - 11.4.2 271
Router Form Factors - 11.4.3 271
Check Your Understanding - Router Hardware - 11.4.4 272
Module Practice and Quiz - 11.5 272
Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
What did I learn in this module? - 11.5.2 273
Chapter Quiz - Network Design 275
Your Chapter Notes 275
Chapter 12 Network Troubleshooting 277
Introduction - 12.0 277
Why should I take this module? - 12.0.1 277
What will I learn to do in this module? - 12.0.2 277
Network Documentation - 12.1 277
Documentation Overview - 12.1.1 277
Network Topology Diagrams - 12.1.2 278
Network Device Documentation - 12.1.3 279
Establish a Network Baseline - 12.1.4 279
Step 1 - Determine What Types of Data to Collect - 12.1.5 280
Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
Step 3 - Determine the Baseline Duration - 12.1.7 280
Data Measurement - 12.1.8 281
Check Your Understanding - Network Documentation - 12.1.9 282
Troubleshooting Process - 12.2 282
General Troubleshooting Procedures - 12.2.1 282
Seven-Step Troubleshooting Process - 12.2.2 282
Question End Users - 12.2.3 284
Gather Information - 12.2.4 285
Troubleshooting with Layered Models - 12.2.5 286
Structured Troubleshooting Methods - 12.2.6 286
Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
Check Your Understanding - Troubleshooting Process - 12.2.8 288
Troubleshooting Tools - 12.3 288
Software Troubleshooting Tools - 12.3.1 288
Protocol Analyzers - 12.3.2 289
Hardware Troubleshooting Tools - 12.3.3 289
Syslog Server as a Troubleshooting Tool - 12.3.4 290
Check Your Understanding - Troubleshooting Tools - 12.3.5 292
Symptoms and Causes of Network Problems - 12.4 292
Physical Layer Troubleshooting - 12.4.1 292
Data Link Layer Troubleshooting - 12.4.2 294
Network Layer Troubleshooting - 12.4.3 295
Transport Layer Troubleshooting - ACLs - 12.4.4 297
Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
Application Layer Troubleshooting - 12.4.6 299
Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
Troubleshooting IP Connectivity - 12.5 300
Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
Step 1 - Verify the Physical Layer - 12.5.3 303
Step 2 - Check for Duplex Mismatches - 12.5.4 304
Step 3 - Verify Addressing on the Local Network - 12.5.5 306
Step 4 - Verify Default Gateway - 12.5.7 310
Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
Step 5 - Verify Correct Path - 12.5.9 314
Step 6 - Verify the Transport Layer - 12.5.10 315
Step 7 - Verify ACLs - 12.5.11 317
Step 8 - Verify DNS - 12.5.12 318
Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
Module Practice and Quiz - 12.6 319
Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
What did I learn in this module? - 12.6.3 320
Chapter Quiz - Network Troubleshooting 324
Your Chapter Notes 324
Chapter 13 Network Virtualization 325
Introduction - 13.0 325
Why should I take this module? - 13.0.1 325
What will I learn to do in this module? - 13.0.2 325
Cloud Computing - 13.1 325
Video - Cloud and Virtualization - 13.1.1 325
Cloud Overview - 13.1.2 325
Cloud Services - 13.1.3 326
Cloud Models - 13.1.4 326
Cloud Computing versus Data Center - 13.1.5 327
Check Your Understanding - Cloud Computing - 13.1.6 327
Virtualization - 13.2 327
Cloud Computing and Virtualization - 13.2.1 327
Dedicated Servers - 13.2.2 328
Server Virtualization - 13.2.3 328
Advantages of Virtualization - 13.2.4 328
Abstraction Layers - 13.2.5 329
Type 2 Hypervisors - 13.2.6 330
Check Your Understanding - Virtualization - 13.2.7 330
Virtual Network Infrastructure - 13.3 330
Type 1 Hypervisors - 13.3.1 330
Installing a VM on a Hypervisor - 13.3.2 330
The Complexity of Network Virtualization - 13.3.3 331
Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
Software-Defined Networking - 13.4 332
Video - Software-Defined Networking - 13.4.1 332
Control Plane and Data Plane - 13.4.2 332
Network Virtualization Technologies - 13.4.3 333
Traditional and SDN Architectures - 13.4.4 334
Check Your Understanding - Software-Defined Networking - 13.4.5 334
Controllers - 13.5 334
SDN Controller and Operations - 13.5.1 334
Video - Cisco ACI - 13.5.2 335
Core Components of ACI - 13.5.3 335
Spine-Leaf Topology - 13.5.4 335
SDN Types - 13.5.5 336
APIC-EM Features - 13.5.6 336
APIC-EM Path Trace - 13.5.7 336
Check Your Understanding - Controllers - 13.5.8 337
Module Practice and Quiz - 13.6 337
Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
What did I learn in this module? - 13.6.2 337
Chapter Quiz - Network Virtualization 341
Your Chapter Notes 341
Chapter 14 Network Automation 343
Introduction - 14.0 343
Why should I take this module? - 14.0.1 343
What will I learn in this module? - 14.0.2 343
Automation Overview - 14.1 343
Video - Automation Everywhere - 14.1.1 343
The Increase in Automation - 14.1.2 344
Thinking Devices - 14.1.3 344
Check Your Understanding - Benefits of Automation - 14.1.4 344
Data Formats - 14.2 344
Video - Data Formats - 14.2.1 344
The Data Formats Concept - 14.2.2 345
Data Format Rules - 14.2.3 345
Compare Data Formats - 14.2.4 346
JSON Data Format - 14.2.5 347
JSON Syntax Rules - 14.2.6 348
YAML Data Format - 14.2.7 349
XML Data Format - 14.2.8 350
Check Your Understanding - Data Formats - 14.2.9 351
APIs - 14.3 351
Video - APIs - 14.3.1 351
The API Concept - 14.3.2 352
An API Example - 14.3.3 352
Open, Internal, and Partner APIs - 14.3.4 352
Types of Web Service APIs - 14.3.5 353
Check Your Understanding - APIs - 14.3.6 354
REST - 14.4 354
Video - REST - 14.4.1 354
REST and RESTful API - 14.4.2 354
RESTful Implementation - 14.4.3 354
URI, URN, and URL - 14.4.4 355
Anatomy of a RESTful Request - 14.4.5 355
RESTful API Applications - 14.4.6 356
Check Your Understanding - REST - 14.4.7 357
Configuration Management Tools - 14.5 357
Video - Configuration Management Tools - 14.5.1 357
Traditional Network Configuration - 14.5.2 358
Network Automation - 14.5.3 358
Configuration Management Tools - 14.5.4 358
Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
Check Your Understanding - Configuration Management - 14.5.6 360
IBN and Cisco DNA Center - 14.6 360
Video - Intent-Based Networking - 14.6.1 360
Intent-Based Networking Overview - 14.6.2 360
Network Infrastructure as Fabric - 14.6.3 360
Cisco Digital Network Architecture (DNA) - 14.6.4 361
Cisco DNA Center - 14.6.5 362
Video - DNA Center Overview and Platform APIs - 14.6.6 362
Video - DNA Center Design and Provision - 14.6.7 363
Video - DNA Center Policy and Assurance - 14.6.8 363
Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
Module Practice and Quiz - 14.7 363
What did I learn in this module? - 14.7.1 363
Chapter Quiz - Network Automation 365
Your Chapter Notes 365


9780136634737 TOC 6/18/2020


Enterprise Networking Security and Automation

Product form

£30.16

Includes FREE delivery

RRP £31.75 – you save £1.59 (5%)

Order before 4pm tomorrow for delivery by Sat 17 Jan 2026.

A Paperback / softback by Cisco Networking Academy, Allan Johnson

Out of stock


    View other formats and editions of Enterprise Networking Security and Automation by Cisco Networking Academy

    Publisher: Pearson Education (US)
    Publication Date: 25/09/2020
    ISBN13: 9780136634737, 978-0136634737
    ISBN10: 0136634737

    Description

    Book Synopsis
    Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the world's largest classroom.

    Table of Contents
    Introduction xxx
    Chapter 1 Single-Area OSPFv2 Concepts 1
    Introduction - 1.0 1
    Why should I take this module? - 1.0.1 1
    What will I learn to do in this module? - 1.0.2 1
    OSPF Features and Characteristics - 1.1 1
    Introduction to OSPF - 1.1.1 1
    Components of OSPF - 1.1.2 2
    Link-State Operation - 1.1.3 3
    Single-Area and Multiarea OSPF - 1.1.4 4
    Multiarea OSPF - 1.1.5 4
    OSPFv3 - 1.1.6 5
    Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6
    OSPF Packets - 1.2 6
    Video - OSPF Packets - 1.2.1 6
    Types of OSPF Packets - 1.2.2 6
    Link-State Updates - 1.2.3 7
    Hello Packet - 1.2.4 7
    Check Your Understanding - OSPF Packets - 1.2.5 7
    OSPF Operation - 1.3 7
    Video - OSPF Operation - 1.3.1 7
    OSPF Operational States - 1.3.2 7
    Establish Neighbor Adjacencies - 1.3.3 8
    Synchronizing OSPF Databases - 1.3.4 9
    The Need for a DR - 1.3.5 10
    LSA Flooding With a DR - 1.3.6 11
    Check Your Understanding - OPSF Operation - 1.3.7 11
    Module Practice and Quiz - 1.4 11
    What did I learn in this module? - 1.4.1 11
    Chapter Quiz - Single-Area OSPFv2 Concepts 14
    Your Chapter Notes 14
    Chapter 2 Single-Area OSPFv2 Configuration 15
    Introduction - 2.0 15
    Why should I take this module? - 2.0.1 15
    What will I learn to do in this module? - 2.0.2 15
    OSPF Router ID - 2.1 15
    OSPF Reference Topology - 2.1.1 15
    Router Configuration Mode for OSPF - 2.1.2 16
    Router IDs - 2.1.3 16
    Router ID Order of Precedence - 2.1.4 17
    Configure a Loopback Interface as the Router ID - 2.1.5 17
    Explicitly Configure a Router ID - 2.1.6 18
    Modify a Router ID - 2.1.7 18
    Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19
    Check Your Understanding - OSPF Router ID - 2.1.9 19
    Point-to-Point OSPF Networks - 2.2 20
    The network Command Syntax - 2.2.1 20
    The Wildcard Mask - 2.2.2 20
    Check Your Understanding - The Wildcard Masks - 2.2.3 20
    Configure OSPF Using the network Command - 2.2.4 20
    Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21
    Configure OSPF Using the ip ospf Command - 2.2.6 21
    Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22
    Passive Interface - 2.2.8 22
    Configure Passive Interfaces - 2.2.9 23
    Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24
    OSPF Point-to-Point Networks - 2.2.11 24
    Loopbacks and Point-to-Point Networks - 2.2.12 26
    Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26
    Multiaccess OSPF Networks - 2.3 27
    OSPF Network Types - 2.3.1 27
    OSPF Designated Router - 2.3.2 27
    OSPF Multiaccess Reference Topology - 2.3.3 27
    Verify OSPF Router Roles - 2.3.4 28
    Verify DR/BDR Adjacencies - 2.3.5 30
    Default DR/BDR Election Process - 2.3.6 32
    DR Failure and Recovery - 2.3.7 33
    The ip ospf priority Command - 2.3.8 33
    Configure OSPF Priority - 2.3.9 34
    Syntax Checker - Configure OSPF Priority - 2.3.10 35
    Packet Tracer - Determine the DR and BDR - 2.3.11 35
    Modify Single-Area OSPFv2 - 2.4 36
    Cisco OSPF Cost Metric - 2.4.1 36
    Adjust the Reference Bandwidth - 2.4.2 36
    OSPF Accumulates Costs - 2.4.3 38
    Manually Set OSPF Cost Value - 2.4.4 38
    Test Failover to Backup Route - 2.4.5 39
    Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40
    Hello Packet Intervals - 2.4.7 40
    Verify Hello and Dead Intervals - 2.4.8 40
    Modify OSPFv2 Intervals - 2.4.9 42
    Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43
    Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43
    Default Route Propagation - 2.5 43
    Propagate a Default Static Route in OSPFv2 - 2.5.1 43
    Verify the Propagated Default Route - 2.5.2 44
    Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46
    Verify Single-Area OSPFv2 - 2.6 46
    Verify OSPF Neighbors - 2.6.1 46
    Verify OSPF Protocol Settings - 2.6.2 48
    Verify OSPF Process Information - 2.6.3 48
    Verify OSPF Interface Settings - 2.6.4 50
    Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51
    Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51
    Module Practice and Quiz - 2.7 51
    Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51
    Lab - Single-Area OSPFv2 Configuration - 2.7.2 51
    What did I learn in this module? - 2.7.3 52
    Chapter Quiz - Single-Area OSPFv2 Configuration 56
    Your Chapter Notes 56
    Chapter 3 Network Security Concepts 57
    Introduction - 3.0 57
    Why should I take this module? - 3.0.1 57
    What will I learn in this module? - 3.0.2 57
    Ethical Hacking Statement - 3.0.3 57
    Current State of Cybersecurity - 3.1 58
    Current State of Affairs - 3.1.1 58
    Vectors of Network Attacks - 3.1.2 58
    Data Loss - 3.1.3 59
    Check Your Understanding - Current State of Cybersecurity - 3.1.4 60
    Threat Actors - 3.2 60
    The Hacker - 3.2.1 60
    Evolution of Hackers - 3.2.2 61
    Cyber Criminals - 3.2.3 61
    Hacktivists - 3.2.4 61
    State-Sponsored Hackers - 3.2.5 61
    Check Your Understanding - Threat Actors - 3.2.6 62
    Threat Actor Tools - 3.3 62
    Video - Threat Actor Tools - 3.3.1 62
    Introduction to Attack Tools - 3.3.2 62
    Evolution of Security Tools - 3.3.3 62
    Attack Types - 3.3.4 63
    Check Your Understanding - Threat Actor Tools - 3.3.5 64
    Malware - 3.4 64
    Overview of Malware - 3.4.1 64
    Viruses and Trojan Horses - 3.4.2 64
    Other Types of Malware - 3.4.3 65
    Check Your Understanding - Malware - 3.4.4 66
    Common Network Attacks - 3.5 66
    Overview of Network Attacks - 3.5.1 66
    Video - Reconnaissance Attacks - 3.5.2 67
    Reconnaissance Attacks - 3.5.3 67
    Video - Access and Social Engineering Attacks - 3.5.4 68
    Access Attacks - 3.5.5 68
    Social Engineering Attacks - 3.5.6 69
    Lab - Social Engineering - 3.5.7 70
    Video - Denial of Service Attacks - 3.5.8 70
    DoS and DDoS Attacks - 3.5.9 70
    Check Your Understanding - Common Network Attacks - 3.5.10 71
    IP Vulnerabilities and Threats - 3.6 71
    Video - Common IP and ICMP Attacks - 3.6.1 71
    IPv4 and IPv6 - 3.6.2 71
    ICMP Attacks - 3.6.3 71
    Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72
    Amplification and Reflection Attacks - 3.6.5 72
    Address Spoofing Attacks - 3.6.6 72
    Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73
    TCP and UDP Vulnerabilities - 3.7 73
    TCP Segment Header - 3.7.1 73
    TCP Services - 3.7.2 73
    TCP Attacks - 3.7.3 74
    UDP Segment Header and Operation - 3.7.4 74
    UDP Attacks - 3.7.5 75
    Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75
    IP Services - 3.8 75
    ARP Vulnerabilities - 3.8.1 75
    ARP Cache Poisoning - 3.8.2 76
    Video - ARP Spoofing - 3.8.3 76
    DNS Attacks - 3.8.4 76
    DNS Tunneling - 3.8.5 78
    DHCP - 3.8.6 78
    DHCP Attacks - 3.8.7 78
    Lab - Explore DNS Traffic - 3.8.8 79
    Network Security Best Practices - 3.9 80
    Confidentiality, Integrity, and Availability - 3.9.1 80
    The Defense-in-Depth Approach - 3.9.2 80
    Firewalls - 3.9.3 80
    IPS - 3.9.4 81
    Content Security Appliances - 3.9.5 81
    Check Your Understanding - Network Security Best Practices - 3.9.6 82
    Cryptography - 3.10 82
    Video - Cryptography - 3.10.1 82
    Securing Communications - 3.10.2 82
    Data Integrity - 3.10.3 83
    Hash Functions - 3.10.4 83
    Origin Authentication - 3.10.5 84
    Data Confidentiality - 3.10.6 85
    Symmetric Encryption - 3.10.7 85
    Asymmetric Encryption - 3.10.8 86
    Diffie-Hellman - 3.10.9 87
    Check Your Understanding - Cryptography - 3.10.10 88
    Module Practice and Quiz - 3.11 88
    What did I learn in this module? - 3.11.1 88
    Chapter Quiz - Network Security Concepts 91
    Your Chapter Notes 91
    Chapter 4 ACL Concepts 93
    Introduction - 4.0 93
    Why should I take this module? - 4.0.1 93
    What will I learn to do in this module? - 4.0.2 93
    Purpose of ACLs - 4.1 93
    What is an ACL? - 4.1.1 93
    Packet Filtering - 4.1.2 95
    ACL Operation - 4.1.3 95
    Packet Tracer - ACL Demonstration - 4.1.4 96
    Check Your Understanding - Purpose of ACLs - 4.1.5 96
    Wildcard Masks in ACLs - 4.2 96
    Wildcard Mask Overview - 4.2.1 96
    Wildcard Mask Types - 4.2.2 97
    Wildcard Mask Calculation - 4.2.3 97
    Wildcard Mask Keywords - 4.2.4 98
    Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99
    Guidelines for ACL Creation - 4.3 99
    Limited Number of ACLs per Interface - 4.3.1 99
    ACL Best Practices - 4.3.2 99
    Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100
    Types of IPv4 ACLs - 4.4 100
    Standard and Extended ACLs - 4.4.1 100
    Numbered and Named ACLs - 4.4.2 101
    Where to Place ACLs - 4.4.3 102
    Standard ACL Placement Example - 4.4.4 102
    Extended ACL Placement Example - 4.4.5 103
    Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103
    Module Practice and Quiz - 4.5 103
    What did I learn in this module? - 4.5.1 103
    Chapter Quiz - ACL Concepts 106
    Your Chapter Notes 106
    Chapter 5 ACLs for IPv4 Configuration 107
    Introduction - 5.0 107
    Why should I take this module? - 5.0.1 107
    What will I learn to do in this module? - 5.0.2 107
    Configure Standard IPv4 ACLs - 5.1 107
    Create an ACL - 5.1.1 107
    Numbered Standard IPv4 ACL Syntax - 5.1.2 108
    Named Standard IPv4 ACL Syntax - 5.1.3 109
    Apply a Standard IPv4 ACL - 5.1.4 109
    Numbered Standard IPv4 ACL Example - 5.1.5 110
    Named Standard IPv4 ACL Example - 5.1.6 111
    Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112
    Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113
    Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113
    Modify IPv4 ACLs - 5.2 113
    Two Methods to Modify an ACL - 5.2.1 113
    Text Editor Method - 5.2.2 113
    Sequence Numbers Method - 5.2.3 114
    Modify a Named ACL Example - 5.2.4 115
    ACL Statistics - 5.2.5 116
    Syntax Checker - Modify IPv4 ACLs - 5.2.6 116
    Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116
    Secure VTY Ports with a Standard IPv4 ACL - 5.3 116
    The access-class Command - 5.3.1 116
    Secure VTY Access Example - 5.3.2 117
    Verify the VTY Port is Secured - 5.3.3 118
    Syntax Checker - Secure the VTY Ports - 5.3.4 118
    Configure Extended IPv4 ACLs - 5.4 119
    Extended ACLs - 5.4.1 119
    Numbered Extended IPv4 ACL Syntax - 5.4.2 119
    Protocols and Ports - 5.4.3 120
    Protocols and Port Numbers Configuration Examples - 5.4.4 123
    Apply a Numbered Extended IPv4 ACL - 5.4.5 123
    TCP Established Extended ACL - 5.4.6 123
    Named Extended IPv4 ACL Syntax - 5.4.7 124
    Named Extended IPv4 ACL Example - 5.4.8 125
    Edit Extended ACLs - 5.4.9 126
    Another Named Extended IPv4 ACL Example - 5.4.10 127
    Verify Extended ACLs - 5.4.11 128
    Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130
    Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130
    Module Practice and Quiz - 5.5 130
    Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130
    Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131
    What did I learn in this module? - 5.5.3 131
    Chapter Quiz - ACLs for IPv4 Implementation 133
    Your Chapter Notes 133
    Chapter 6 NAT for IPv4 135
    Introduction - 6.0 135
    Why should I take this module? - 6.0.1 135
    What will I learn to do in this module? - 6.0.2 135
    NAT Characteristics - 6.1 135
    IPv4 Private Address Space - 6.1.1 135
    What is NAT - 6.1.2 136
    How NAT Works - 6.1.3 137
    NAT Terminology - 6.1.4 137
    Check Your Understanding - NAT Characteristics - 6.1.5 138
    Types of NAT - 6.2 139
    Static NAT - 6.2.1 139
    Dynamic NAT - 6.2.2 139
    Port Address Translation - 6.2.3 139
    Next Available Port - 6.2.4 140
    NAT and PAT Comparison - 6.2.5 140
    Packets without a Layer 4 Segment - 6.2.6 141
    Packet Tracer - Investigate NAT Operations - 6.2.7 141
    NAT Advantages and Disadvantages - 6.3 142
    Advantages of NAT - 6.3.1 142
    Disadvantages of NAT - 6.3.2 142
    Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143
    Static NAT - 6.4 143
    Static NAT Scenario - 6.4.1 143
    Configure Static NAT - 6.4.2 143
    Analyze Static NAT - 6.4.3 144
    Verify Static NAT - 6.4.4 144
    Packet Tracer - Configure Static NAT - 6.4.5 145
    Dynamic NAT - 6.5 146
    Dynamic NAT Scenario - 6.5.1 146
    Configure Dynamic NAT - 6.5.2 146
    Analyze Dynamic NAT - Inside to Outside - 6.5.3 147
    Analyze Dynamic NAT - Outside to Inside - 6.5.4 147
    Verify Dynamic NAT - 6.5.5 148
    Packet Tracer - Configure Dynamic NAT - 6.5.6 150
    PAT - 6.6 150
    PAT Scenario - 6.6.1 150
    Configure PAT to Use a Single IPv4 Address - 6.6.2 150
    Configure PAT to Use an Address Pool - 6.6.3 151
    Analyze PAT - PC to Server - 6.6.4 151
    Analyze PAT - Server to PC - 6.6.5 151
    Verify PAT - 6.6.6 151
    Packet Tracer - Configure PAT - 6.6.7 152
    NAT64 - 6.7 153
    NAT for IPv6? - 6.7.1 153
    NAT64 - 6.7.2 153
    Module Practice and Quiz - 6.8 153
    Packet Tracer - Configure NAT for IPv4 - 6.8.1 153
    Lab - Configure NAT for IPv4 - 6.8.2 154
    What did I learn in this module? - 6.8.3 154
    Chapter Quiz - NAT for IPv4 158
    Your Chapter Notes 158
    Chapter 7 WAN Concepts 159
    Introduction - 7.0 159
    Why should I take this module? - 7.0.1 159
    What will I learn to do in this module? - 7.0.2 159
    Purpose of WANs - 7.1 159
    LANs and WANs - 7.1.1 159
    Private and Public WANs - 7.1.2 160
    WAN Topologies - 7.1.3 160
    Carrier Connections - 7.1.4 162
    Evolving Networks - 7.1.5 162
    Check Your Understanding - Purpose of WANs - 7.1.6 164
    WAN Operations - 7.2 164
    WAN Standards - 7.2.1 164
    WANs in the OSI Model - 7.2.2 164
    Common WAN Terminology - 7.2.3 165
    WAN Devices - 7.2.4 166
    Serial Communication - 7.2.5 167
    Circuit-Switched Communication - 7.2.6 168
    Packet-Switched Communications - 7.2.7 168
    SDH, SONET, and DWDM - 7.2.8 169
    Check Your Understanding - WAN Operations - 7.2.9 169
    Traditional WAN Connectivity - 7.3 169
    Traditional WAN Connectivity Options - 7.3.1 169
    Common WAN Terminology - 7.3.2 169
    Circuit-Switched Options - 7.3.3 170
    Packet-Switched Options - 7.3.4 171
    Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172
    Modern WAN Connectivity - 7.4 172
    Modern WANs - 7.4.1 172
    Modern WAN Connectivity Options - 7.4.2 172
    Ethernet WAN - 7.4.3 173
    MPLS - 7.4.4 174
    Check Your Understanding - Modern WAN Connectivity - 7.4.5 174
    Internet-Based Connectivity - 7.5 174
    Internet-Based Connectivity Options - 7.5.1 174
    DSL Technology - 7.5.2 175
    DSL Connections - 7.5.3 175
    DSL and PPP - 7.5.4 176
    Cable Technology - 7.5.5 176
    Optical Fiber - 7.5.6 177
    Wireless Internet-Based Broadband - 7.5.7 177
    VPN Technology - 7.5.8 179
    ISP Connectivity Options - 7.5.9 179
    Broadband Solution Comparison - 7.5.10 180
    Lab - Research Broadband Internet Access Options - 7.5.11 181
    Module Practice and Quiz - 7.6 181
    Packet Tracer - WAN Concepts - 7.6.1 181
    What did I learn in this module? - 7.6.2 181
    Chapter Quiz - WAN Concepts 184
    Your Chapter Notes 184
    Chapter 8 VPN and IPsec Concepts 185
    Introduction - 8.0 185
    Why should I take this module? - 8.0.1 185
    What will I learn in this module? - 8.0.2 185
    VPN Technology - 8.1 185
    Virtual Private Networks - 8.1.1 185
    VPN Benefits - 8.1.2 186
    Site-to-Site and Remote-Access VPNs - 8.1.3 186
    Enterprise and Service Provider VPNs - 8.1.4 186
    Check Your Understanding - VPN Technology - 8.1.5 187
    Types of VPNs - 8.2 187
    Remote-Access VPNs - 8.2.1 187
    SSL VPNs - 8.2.2 187
    Site-to-Site IPsec VPNs - 8.2.3 188
    GRE over IPsec - 8.2.4 188
    Dynamic Multipoint VPNs - 8.2.5 189
    IPsec Virtual Tunnel Interface - 8.2.6 189
    Service Provider MPLS VPNs - 8.2.7 190
    Check Your Understanding - Types of VPNs - 8.2.8 190
    IPsec - 8.3 190
    Video - IPsec Concepts - 8.3.1 190
    IPsec Technologies - 8.3.2 190
    IPsec Protocol Encapsulation - 8.3.3 191
    Confidentiality - 8.3.4 192
    Integrity - 8.3.5 192
    Authentication - 8.3.6 192
    Secure Key Exchange with Diffie-Hellman - 8.3.7 193
    Video - IPsec Transport and Tunnel Mode - 8.3.8 193
    Check Your Understanding - IPsec - 8.3.9 193
    Module Practice and Quiz - 8.4 193
    What did I learn in this module? - 8.4.1 193
    Chapter Quiz - VPN and IPsec Concepts 195
    Your Chapter Notes 195
    Chapter 9 QoS Concepts 197
    Introduction - 9.0 197
    Why should I take this module? - 9.0.1 197
    What will I learn to do in this module? - 9.0.2 197
    Network Transmission Quality - 9.1 197
    Video Tutorial - The Purpose of QoS - 9.1.1 197
    Prioritizing Traffic - 9.1.2 197
    Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198
    Packet Loss - 9.1.4 199
    Check Your Understanding - Network Transmission Quality - 9.1.5 199
    Traffic Characteristics - 9.2 199
    Video Tutorial - Traffic Characteristics - 9.2.1 199
    Network Traffic Trends - 9.2.2 199
    Voice - 9.2.3 200
    Video - 9.2.4 200
    Data - 9.2.5 201
    Check Your Understanding - Traffic Characteristics - 9.2.6 202
    Queuing Algorithms - 9.3 202
    Video Tutorial - QoS Algorithms - 9.3.1 202
    Queuing Overview - 9.3.2 202
    First In First Out - 9.3.3 202
    Weighted Fair Queuing (WFQ) - 9.3.4 203
    Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203
    Low Latency Queuing (LLQ) - 9.3.6 204
    Check Your Understanding - Queuing Algorithms - 9.3.7 204
    QoS Models - 9.4 204
    Video Tutorial - QoS Models - 9.4.1 204
    Selecting an Appropriate QoS Policy Model - 9.4.2 204
    Best Effort - 9.4.3 205
    Integrated Services - 9.4.4 206
    Differentiated Services - 9.4.5 206
    Check Your Understanding - QoS Models - 9.4.6 208
    QoS Implementation Techniques - 9.5 208
    Video Tutorial - QoS Implementation Techniques - 9.5.1 208
    Avoiding Packet Loss - 9.5.2 208
    QoS Tools - 9.5.3 208
    Classification and Marking - 9.5.4 209
    Marking at Layer 2 - 9.5.5 210
    Marking at Layer 3 - 9.5.6 210
    Type of Service and Traffic Class Field - 9.5.7 211
    DSCP Values - 9.5.8 211
    Class Selector Bits - 9.5.9 211
    Trust Boundaries - 9.5.10 211
    Congestion Avoidance - 9.5.11 212
    Shaping and Policing - 9.5.12 212
    QoS Policy Guidelines - 9.5.13 213
    Check Your Understanding - QoS Implementation Techniques - 9.5.14 213
    Module Practice and Quiz - 9.6 213
    What did I learn in this module? - 9.6.1 213
    Chapter Quiz - QoS Concepts 216
    Your Chapter Notes 216
    Chapter 10 Network Management 217
    Introduction - 10.0 217
    Why should I take this module? - 10.0.1 217
    What will I learn to do in this module? - 10.0.2 217
    Device Discovery with CDP - 10.1 217
    CDP Overview - 10.1.1 217
    Configure and Verify CDP - 10.1.2 218
    Discover Devices by Using CDP - 10.1.3 220
    Syntax Checker - Configure and Verify CDP - 10.1.4 222
    Packet Tracer - Use CDP to Map a Network - 10.1.5 222
    Device Discovery with LLDP - 10.2 222
    LLDP Overview - 10.2.1 222
    Configure and Verify LLDP - 10.2.2 222
    Discover Devices by Using LLDP - 10.2.3 223
    Syntax Checker - Configure and Verify LLDP - 10.2.4 225
    Check Your Understanding - Compare CDP and LLDP - 10.2.5 225
    Packet Tracer - Use LLDP to Map a Network - 10.2.6 225
    NTP - 10.3 225
    Time and Calendar Services - 10.3.1 225
    NTP Operation - 10.3.2 226
    Configure and Verify NTP - 10.3.3 227
    Packet Tracer - Configure and Verify NTP - 10.3.4 229
    SNMP - 10.4 229
    Introduction to SNMP - 10.4.1 229
    SNMP Operation - 10.4.2 230
    SNMP Agent Traps - 10.4.3 230
    SNMP Versions - 10.4.4 231
    Check Your Understanding - SNMP Versions - 10.4.5 232
    Community Strings - 10.4.6 232
    MIB Object ID - 10.4.7 233
    SNMP Polling Scenario - 10.4.8 233
    SNMP Object Navigator - 10.4.9 233
    Lab - Research Network Monitoring Software - 10.4.10 234
    Syslog - 10.5 234
    Introduction to Syslog - 10.5.1 234
    Syslog Operation - 10.5.2 234
    Syslog Message Format - 10.5.3 235
    Syslog Facilities - 10.5.4 236
    Configure Syslog Timestamp - 10.5.5 236
    Check Your Understanding - Syslog Operation - 10.5.6 237
    Router and Switch File Maintenance - 10.6 237
    Router File Systems - 10.6.1 237
    Switch File Systems - 10.6.2 240
    Use a Text File to Back Up a Configuration - 10.6.3 241
    Use a Text File to Restore a Configuration - 10.6.4 241
    Use TFTP to Back Up and Restore a Configuration - 10.6.5 242
    USB Ports on a Cisco Router - 10.6.6 242
    Use USB to Back Up and Restore a Configuration - 10.6.7 243
    Password Recovery Procedures - 10.6.8 245
    Password Recovery Example - 10.6.9 245
    Packet Tracer - Back Up Configuration Files - 10.6.10 247
    Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248
    Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248
    Lab - Research Password Recovery Procedures - 10.6.13 248
    IOS Image Management - 10.7 248
    Video - Managing Cisco IOS Images - 10.7.1 248
    TFTP Servers as a Backup Location - 10.7.2 248
    Backup IOS Image to TFTP Server Example - 10.7.3 249
    Copy an IOS Image to a Device Example - 10.7.4 250
    The boot system Command - 10.7.5 251
    Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252
    Module Practice and Quiz - 10.8 253
    Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253
    Lab - Configure CDP, LLDP, and NTP - 10.8.2 253
    What did I learn in this module? - 10.8.3 253
    Chapter Quiz - Network Management 257
    Your Chapter Notes 257
    Chapter 11 Network Design 259
    Introduction - 11.0 259
    Why should I take this module? - 11.0.1 259
    What will I learn to do in this module? - 11.0.2 259
    Hierarchical Networks - 11.1 259
    Video - Three-Layer Network Design - 11.1.1 259
    The Need to Scale the Network - 11.1.2 259
    Borderless Switched Networks - 11.1.3 260
    Hierarchy in the Borderless Switched Network - 11.1.4 261
    Access, Distribution, and Core Layer Functions - 11.1.5 262
    Three-Tier and Two-Tier Examples - 11.1.6 262
    Role of Switched Networks - 11.1.7 263
    Check Your Understanding - Hierarchical Networks - 11.1.8 263
    Scalable Networks - 11.2 263
    Design for Scalability - 11.2.1 263
    Plan for Redundancy - 11.2.2 264
    Reduce Failure Domain Size - 11.2.3 265
    Increase Bandwidth - 11.2.4 265
    Expand the Access Layer - 11.2.5 266
    Tune Routing Protocols - 11.2.6 266
    Check Your Understanding - Scalable Networks - 11.2.7 266
    Switch Hardware - 11.3 266
    Switch Platforms - 11.3.1 266
    Switch Form Factors - 11.3.2 267
    Port Density - 11.3.3 268
    Forwarding Rates - 11.3.4 268
    Power over Ethernet - 11.3.5 269
    Multilayer Switching - 11.3.6 269
    Business Considerations for Switch Selection - 11.3.7 270
    Check Your Understanding - Switch Hardware - 11.3.8 270
    Router Hardware - 11.4 270
    Router Requirements - 11.4.1 270
    Cisco Routers - 11.4.2 271
    Router Form Factors - 11.4.3 271
    Check Your Understanding - Router Hardware - 11.4.4 272
    Module Practice and Quiz - 11.5 272
    Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272
    What did I learn in this module? - 11.5.2 273
    Chapter Quiz - Network Design 275
    Your Chapter Notes 275
    Chapter 12 Network Troubleshooting 277
    Introduction - 12.0 277
    Why should I take this module? - 12.0.1 277
    What will I learn to do in this module? - 12.0.2 277
    Network Documentation - 12.1 277
    Documentation Overview - 12.1.1 277
    Network Topology Diagrams - 12.1.2 278
    Network Device Documentation - 12.1.3 279
    Establish a Network Baseline - 12.1.4 279
    Step 1 - Determine What Types of Data to Collect - 12.1.5 280
    Step 2 - Identify Devices and Ports of Interest - 12.1.6 280
    Step 3 - Determine the Baseline Duration - 12.1.7 280
    Data Measurement - 12.1.8 281
    Check Your Understanding - Network Documentation - 12.1.9 282
    Troubleshooting Process - 12.2 282
    General Troubleshooting Procedures - 12.2.1 282
    Seven-Step Troubleshooting Process - 12.2.2 282
    Question End Users - 12.2.3 284
    Gather Information - 12.2.4 285
    Troubleshooting with Layered Models - 12.2.5 286
    Structured Troubleshooting Methods - 12.2.6 286
    Guidelines for Selecting a Troubleshooting Method - 12.2.7 288
    Check Your Understanding - Troubleshooting Process - 12.2.8 288
    Troubleshooting Tools - 12.3 288
    Software Troubleshooting Tools - 12.3.1 288
    Protocol Analyzers - 12.3.2 289
    Hardware Troubleshooting Tools - 12.3.3 289
    Syslog Server as a Troubleshooting Tool - 12.3.4 290
    Check Your Understanding - Troubleshooting Tools - 12.3.5 292
    Symptoms and Causes of Network Problems - 12.4 292
    Physical Layer Troubleshooting - 12.4.1 292
    Data Link Layer Troubleshooting - 12.4.2 294
    Network Layer Troubleshooting - 12.4.3 295
    Transport Layer Troubleshooting - ACLs - 12.4.4 297
    Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298
    Application Layer Troubleshooting - 12.4.6 299
    Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300
    Troubleshooting IP Connectivity - 12.5 300
    Components of Troubleshooting End-to-End Connectivity - 12.5.1 300
    End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301
    Step 1 - Verify the Physical Layer - 12.5.3 303
    Step 2 - Check for Duplex Mismatches - 12.5.4 304
    Step 3 - Verify Addressing on the Local Network - 12.5.5 306
    Step 4 - Verify Default Gateway - 12.5.7 310
    Troubleshoot IPv6 Default Gateway Example - 12.5.8 311
    Step 5 - Verify Correct Path - 12.5.9 314
    Step 6 - Verify the Transport Layer - 12.5.10 315
    Step 7 - Verify ACLs - 12.5.11 317
    Step 8 - Verify DNS - 12.5.12 318
    Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319
    Module Practice and Quiz - 12.6 319
    Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319
    Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319
    What did I learn in this module? - 12.6.3 320
    Chapter Quiz - Network Troubleshooting 324
    Your Chapter Notes 324
    Chapter 13 Network Virtualization 325
    Introduction - 13.0 325
    Why should I take this module? - 13.0.1 325
    What will I learn to do in this module? - 13.0.2 325
    Cloud Computing - 13.1 325
    Video - Cloud and Virtualization - 13.1.1 325
    Cloud Overview - 13.1.2 325
    Cloud Services - 13.1.3 326
    Cloud Models - 13.1.4 326
    Cloud Computing versus Data Center - 13.1.5 327
    Check Your Understanding - Cloud Computing - 13.1.6 327
    Virtualization - 13.2 327
    Cloud Computing and Virtualization - 13.2.1 327
    Dedicated Servers - 13.2.2 328
    Server Virtualization - 13.2.3 328
    Advantages of Virtualization - 13.2.4 328
    Abstraction Layers - 13.2.5 329
    Type 2 Hypervisors - 13.2.6 330
    Check Your Understanding - Virtualization - 13.2.7 330
    Virtual Network Infrastructure - 13.3 330
    Type 1 Hypervisors - 13.3.1 330
    Installing a VM on a Hypervisor - 13.3.2 330
    The Complexity of Network Virtualization - 13.3.3 331
    Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332
    Software-Defined Networking - 13.4 332
    Video - Software-Defined Networking - 13.4.1 332
    Control Plane and Data Plane - 13.4.2 332
    Network Virtualization Technologies - 13.4.3 333
    Traditional and SDN Architectures - 13.4.4 334
    Check Your Understanding - Software-Defined Networking - 13.4.5 334
    Controllers - 13.5 334
    SDN Controller and Operations - 13.5.1 334
    Video - Cisco ACI - 13.5.2 335
    Core Components of ACI - 13.5.3 335
    Spine-Leaf Topology - 13.5.4 335
    SDN Types - 13.5.5 336
    APIC-EM Features - 13.5.6 336
    APIC-EM Path Trace - 13.5.7 336
    Check Your Understanding - Controllers - 13.5.8 337
    Module Practice and Quiz - 13.6 337
    Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337
    What did I learn in this module? - 13.6.2 337
    Chapter Quiz - Network Virtualization 341
    Your Chapter Notes 341
    Chapter 14 Network Automation 343
    Introduction - 14.0 343
    Why should I take this module? - 14.0.1 343
    What will I learn in this module? - 14.0.2 343
    Automation Overview - 14.1 343
    Video - Automation Everywhere - 14.1.1 343
    The Increase in Automation - 14.1.2 344
    Thinking Devices - 14.1.3 344
    Check Your Understanding - Benefits of Automation - 14.1.4 344
    Data Formats - 14.2 344
    Video - Data Formats - 14.2.1 344
    The Data Formats Concept - 14.2.2 345
    Data Format Rules - 14.2.3 345
    Compare Data Formats - 14.2.4 346
    JSON Data Format - 14.2.5 347
    JSON Syntax Rules - 14.2.6 348
    YAML Data Format - 14.2.7 349
    XML Data Format - 14.2.8 350
    Check Your Understanding - Data Formats - 14.2.9 351
    APIs - 14.3 351
    Video - APIs - 14.3.1 351
    The API Concept - 14.3.2 352
    An API Example - 14.3.3 352
    Open, Internal, and Partner APIs - 14.3.4 352
    Types of Web Service APIs - 14.3.5 353
    Check Your Understanding - APIs - 14.3.6 354
    REST - 14.4 354
    Video - REST - 14.4.1 354
    REST and RESTful API - 14.4.2 354
    RESTful Implementation - 14.4.3 354
    URI, URN, and URL - 14.4.4 355
    Anatomy of a RESTful Request - 14.4.5 355
    RESTful API Applications - 14.4.6 356
    Check Your Understanding - REST - 14.4.7 357
    Configuration Management Tools - 14.5 357
    Video - Configuration Management Tools - 14.5.1 357
    Traditional Network Configuration - 14.5.2 358
    Network Automation - 14.5.3 358
    Configuration Management Tools - 14.5.4 358
    Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359
    Check Your Understanding - Configuration Management - 14.5.6 360
    IBN and Cisco DNA Center - 14.6 360
    Video - Intent-Based Networking - 14.6.1 360
    Intent-Based Networking Overview - 14.6.2 360
    Network Infrastructure as Fabric - 14.6.3 360
    Cisco Digital Network Architecture (DNA) - 14.6.4 361
    Cisco DNA Center - 14.6.5 362
    Video - DNA Center Overview and Platform APIs - 14.6.6 362
    Video - DNA Center Design and Provision - 14.6.7 363
    Video - DNA Center Policy and Assurance - 14.6.8 363
    Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363
    Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363
    Module Practice and Quiz - 14.7 363
    What did I learn in this module? - 14.7.1 363
    Chapter Quiz - Network Automation 365
    Your Chapter Notes 365


    9780136634737 TOC 6/18/2020


    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account