larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition


  • Sorry, this book is no longer in print.
Not for Sale
  • About
  • Description
  • Downloads
  • Sample Content
  • Updates


  • Book content is fully updated to align to the new CCENT/CCNA ICND1 exam objectives
  • Books and CDs are packed with features to help students master more difficult testing methods on the actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • Includes 60 minutes of video covering the complex topic of subnetting
  • In-depth expert explanations of all protocols, commands, and technologies on the ICND1 exam

  • Copyright 2016
  • Dimensions: 8" x 10"
  • Pages: 992
  • Edition: 1st
  • Book
  • ISBN-10: 1-58720-597-1
  • ISBN-13: 978-1-58720-597-2

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition is a comprehensive textbook and study package that provides you with an introduction to foundational networking concepts and hands-on application. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

This complete study package includes

  • A study routine proven to help you retain knowledge
  • Chapter-ending summaries that provide a quick review of key topics
  • Tons of review exercises, including memory tables, command summaries, key term definitions, mind mapping exercises, review questions, and more, which test your understanding and reinforce your knowledge
  • Troubleshooting sections, which help you master complex, real-world scenarios
  • A free copy of the eBook version of the text, available in PDF, EPUB, and Mobi (Kindle) formats
  • The powerful Pearson IT Certification Practice Test Premium Edition software, complete with hundreds of well-reviewed, exam-realistic questions, customization options, linking of all questions to the PDF eBook file, and detailed performance reports
  • A free copy of the CCENT/CCNA ICND1 100-105 Network Simulator Lite software, complete with meaningful lab exercises that help you hone your hands-on skills with the command-line interface for routers and switches
  • Links to a series of hands-on config labs developed by the author
  • Online interactive practice exercises that help you enhance your knowledge
  • More than 90 minutes of video mentoring from the author
  • A final preparation chapter that guides you through tools and resources to help you craft your review and test-taking strategies
  • Study plan suggestions and templates to help you organize and optimize your study time

Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your success.

This official study guide helps you master all the topics on the CCENT/CCNA ICND1 exam, including

·         Networking fundamentals

·         Implementing basic Ethernet LANs

·         Ethernet LANs: design, VLANs, and troubleshooting

·         IPv4 addressing and subnetting

·         Implementing IPv4

·         IPv4 design and troubleshooting

·         IPv4 services: ACLs and NAT

·         IPv6

·         Network device management

The DVD contains more than 500 unique practice exam questions,

Online Sample Chapter

Variable-Length Subnet Masks

Sample Pages

Download the sample pages (includes Chapter 22 and Index)

Table of Contents

Introduction xxxvi

Your Study Plan 2

Part I Networking Fundamentals 13

Chapter 1 Introduction to TCP/IP Networking 14

Foundation Topics 15

Perspectives on Networking 15

TCP/IP Networking Model 16

    History Leading to TCP/IP 17

    Overview of the TCP/IP Networking Model 18

    TCP/IP Application Layer 19

    TCP/IP Transport Layer 20

    TCP/IP Network Layer 22

    TCP/IP Link Layer (Data Link Plus Physical) 25

    TCP/IP Model and Terminology 26

OSI Networking Model 28

    Comparing OSI and TCP/IP 29

    Describing Protocols by Referencing the OSI Layers 29

    OSI Layers and Their Functions 30

    OSI Layering Concepts and Benefits 31

    OSI Encapsulation Terminology 31

Chapter Summary 33

Chapter 2 Fundamentals of Ethernet LANs 38

Foundation Topics 39

An Overview of LANs 39

    Typical SOHO LANs 39

    Typical Enterprise LANs 40

    The Variety of Ethernet Physical Layer Standards 41

    Consistent Behavior over All Links Using the Ethernet Data Link Layer 41

Building Physical Ethernet Networks with UTP 42

    Transmitting Data Using Twisted Pairs 42

    Breaking Down a UTP Ethernet Link 43

    UTP Cabling Pinouts for 10BASE-T and 100BASE-T 45

    UTP Cabling Pinouts for 1000BASE-T 48

Sending Data in Ethernet Networks 48

    Ethernet Data-Link Protocols 49

    Sending Ethernet Frames with Switches and Hubs 52

Chapter Summary 55

Chapter 3 Fundamentals of WANs 60

Foundation Topics 61

Leased-Line WANs 61

    Positioning Leased Lines with LANs and Routers 61

    Physical Details of Leased Lines 62

    Data-Link Details of Leased Lines 64

Ethernet as a WAN Technology 67

    Ethernet WANs that Create a Layer 2 Service 68

    How Routers Route IP Packets Using Ethernet Emulation 68

Accessing the Internet 69

    The Internet as a Large WAN 69

    Internet Access (WAN) Links 71

    Digital Subscriber Line 72

    Cable Internet 73

Chapter Summary 75

Chapter 4 Fundamentals of IPv4 Addressing and Routing 78

Foundation Topics 79

Overview of Network Layer Functions 79

    Network Layer Routing (Forwarding) Logic 79

    How Network Layer Routing Uses LANs and WANs 81

    IP Addressing and How Addressing Helps IP Routing 82

    Routing Protocols 83

IPv4 Addressing 84

    Rules for IP Addresses 84

    Rules for Grouping IP Addresses 84

    IP Subnetting 89

IPv4 Routing 90

    IPv4 Host Routing 90

    Router Forwarding Decisions and the IP Routing Table 91

IPv4 Routing Protocols 93

Other Network Layer Features 94

    Using Names and the Domain Name System 95

    The Address Resolution Protocol 96

    ICMP Echo and the ping Command 97

Chapter Summary 98

Chapter 5 Fundamentals of TCP/IP Transport and Applications 102

Foundation Topics 103

TCP/IP Layer 4 Protocols: TCP and UDP 103

    Transmission Control Protocol 103

    User Datagram Protocol 111

TCP/IP Applications 112

    Uniform Resource Identifiers 112

    Finding the Web Server Using DNS 113

    Transferring Files with HTTP 114

    How the Receiving Host Identifies the Correct Receiving Application 115

Chapter Summary 117

Part I Review 120

Part II Implementing Basic Ethernet LANs 123

Chapter 6 Using the Command-Line Interface 124

Foundation Topics 125

Accessing the Cisco Catalyst Switch CLI 125

    Cisco Catalyst Switches 125

    Accessing the Cisco IOS CLI 126

    CLI Help Features 132

    The debug and show Commands 134

Configuring Cisco IOS Software 134

    Configuration Submodes and Contexts 135

    Storing Switch Configuration Files 137

    Copying and Erasing Configuration Files 139

Chapter Summary 140

Chapter 7 Analyzing Ethernet LAN Switching 146

Foundation Topics 147

LAN Switching Concepts 147

    Overview of Switching Logic 147

    Forwarding Known Unicast Frames 148

    Learning MAC Addresses 151

    Flooding Unknown Unicast and Broadcast Frames 151

    Avoiding Loops Using Spanning Tree Protocol 152

    LAN Switching Summary 153

Verifying and Analyzing Ethernet Switching 154

    Demonstrating MAC Learning 154

    Switch Interfaces 155

    Finding Entries in the MAC Address Table 157

    Managing the MAC Address Table (Aging, Clearing) 158

    MAC Address Tables with Multiple Switches 159

Chapter Summary 161

Chapter 8 Configuring Basic Switch Management 166

Foundation Topics 167

Securing the Switch CLI 167

    Securing User Mode and Privileged Mode with Simple Passwords 167

    Securing User Mode Access with Local Usernames and Passwords 171

    Securing User Mode Access with External Authentication Servers 173

    Securing Remote Access with Secure Shell 174

Enabling IPv4 for Remote Access 177

    Host and Switch IP Settings 177

    Configuring IPv4 on a Switch 179

    Configuring a Switch to Learn Its IP Address with DHCP 180

    Verifying IPv4 on a Switch 180

Miscellaneous Settings Useful in Lab 181

    History Buffer Commands 181

    The logging synchronous, exec-timeout, and no ip domain-lookup Commands 182

Chapter Summary 183

Chapter 9 Configuring Switch Interfaces 188

Foundation Topics 189

Configuring Switch Interfaces 189

    Configuring Speed, Duplex, and Description 189

    Configuring Multiple Interfaces with the interface range Command 191

    Administratively Controlling Interface State with shutdown 191

    Removing Configuration with the no Command 193

    Autonegotiation 194

Port Security 197

    Configuring Port Security 198

    Verifying Port Security 200

    Port Security Violation Actions 201

    Port Security MAC Addresses as Static and Secure but Not Dynamic 202

Chapter Summary 203

Part II Review 210

Part III Ethernet LANs: Design, VLANs, and Troubleshooting 215

Chapter 10 Analyzing Ethernet LAN Designs 216

Foundation Topics 217

Analyzing Collision Domains and Broadcast Domains 217

    Ethernet Collision Domains 217

    Ethernet Broadcast Domains 220

Analyzing Campus LAN Topologies 223

    Two-Tier Campus Design (Collapsed Core) 223

    Three-Tier Campus Design (Core) 226

    Topology Design Terminology 227

Analyzing LAN Physical Standard Choices 228

    Ethernet Standards 229

    Choosing the Right Ethernet Standard for Each Link 229

    Wireless LANs Combined with Wired Ethernet 231

Chapter Summary 235

Chapter 11 Implementing Ethernet Virtual LANs 240

Foundation Topics 241

Virtual LAN Concepts 241

    Creating Multiswitch VLANs Using Trunking 242

    Forwarding Data Between VLANs 245

VLAN and VLAN Trunking Configuration and Verification 248

    Creating VLANs and Assigning Access VLANs to an Interface 248

    VLAN Trunking Protocol 252

    VLAN Trunking Configuration 253

    Implementing Interfaces Connected to Phones 257

Chapter Summary 262

Chapter 12 Troubleshooting Ethernet LANs 268

Foundation Topics 270

Perspectives on Applying Troubleshooting Methodologies 270

    Troubleshooting on the Exams 270

    A Deeper Look at Problem Isolation 271

    Troubleshooting as Covered in This Book 273

Analyzing Switch Interface Status and Statistics 273

    Interface Status Codes and Reasons for Nonworking States 274

    Interface Speed and Duplex Issues 275

    Common Layer 1 Problems on Working Interfaces 277

Predicting Where Switches Will Forward Frames 279

    Predicting the Contents of the MAC Address Table 279

    Analyzing the Forwarding Path 281

Analyzing Port Security Operations on an Interface 282

    Troubleshooting Shutdown Mode and Err-disabled Recovery 283

    Troubleshooting Restrict and Protect Modes 284

Analyzing VLANs and VLAN Trunks 286

    Ensuring That the Right Access Interfaces Are in the Right VLANs 287

    Access VLANs Not Being Defined 287

    Access VLANs Being Disabled 288

    Mismatched Trunking Operational States 288

Chapter Summary 290

Part III Review 296

Part IV IP Version 4 Addressing and Subnetting 299

Chapter 13 Perspectives on IPv4 Subnetting 300

Foundation Topics 301

Introduction to Subnetting 301

    Subnetting Defined Through a Simple Example 301

    Operational View Versus Design View of Subnetting 302

Analyze Subnetting and Addressing Needs 303

    Rules About Which Hosts Are in Which Subnet 303

    Determining the Number of Subnets 304

    Determining the Number of Hosts per Subnet 305

    One Size Subnet Fits All–Or Not 306

Make Design Choices 308

    Choose a Classful Network 309

    Choose the Mask 311

Build a List of All Subnets 315

Plan the Implementation 316

    Assigning Subnets to Different Locations 316

    Choose Static and Dynamic Ranges per Subnet 318

Chapter Summary 319

Chapter 14 Analyzing Classful IPv4 Networks 322

Foundation Topics 323

Classful Network Concepts 323

    IPv4 Network Classes and Related Facts 323

    Number of Hosts per Network 326

    Deriving the Network ID and Related Numbers 326

    Unusual Network IDs and Network Broadcast Addresses 328

Practice with Classful Networks 329

    Practice Deriving Key Facts Based on an IP Address 329

    Practice Remembering the Details of Address Classes 329

Chapter Summary 331

Chapter 15 Analyzing Subnet Masks 336

Foundation Topics 337

Subnet Mask Conversion 337

    Three Mask Formats 337

    Converting Between Binary and Prefix Masks 338

    Converting Between Binary and DDN Masks 338

    Converting Between Prefix and DDN Masks 340

    Practice Converting Subnet Masks 341

Identifying Subnet Design Choices Using Masks 341

    Masks Divide the Subnet’s Addresses into Two Parts 342

    Masks and Class Divide Addresses into Three Parts 343

    Classless and Classful Addressing 344

    Calculations Based on the IPv4 Address Format 344

    Practice Analyzing Subnet Masks 346

Chapter Summary 347

Chapter 16 Analyzing Existing Subnets 352

Foundation Topics 353

Defining a Subnet 353

    An Example with Network and Four Subnets 353

    Subnet ID Concepts 354

    Subnet Broadcast Address 355

    Range of Usable Addresses 356

Analyzing Existing Subnets: Binary 356

    Finding the Subnet ID: Binary 356

    Finding the Subnet Broadcast Address: Binary 358

    Binary Practice Problems 359

    Shortcut for the Binary Process 360

    Brief Note About Boolean Math 361

    Finding the Range of Addresses 361

Analyzing Existing Subnets: Decimal 362

    Analysis with Easy Masks 362

    Predictability in the Interesting Octet 363

    Finding the Subnet ID: Difficult Masks 364

    Finding the Subnet Broadcast Address: Difficult Masks 366

Practice Analyzing Existing Subnets 368

    A Choice: Memorize or Calculate 368

Chapter Summary 369

Part IV Review 374

Part V Implementing IPv4 377

Chapter 17 Operating Cisco Routers 378

Foundation Topics 379

Installing Cisco Routers 379

    Installing Enterprise Routers 379

    Installing Internet Access Routers 381

Enabling IPv4 Support on Cisco Router Interfaces 383

    Accessing the Router CLI 383

    Router Interfaces 384

    Router Auxiliary Port 390

Chapter Summary 391

Chapter 18 Configuring IPv4 Addresses and Static Routes 396

Foundation Topics 398

IP Routing 398

    IPv4 Routing Process Reference 398

    An Example of IP Routing 400

Configuring IP Addresses and Connected Routes 404

    Connected Routes and the ip address Command 404

    The ARP Table on a Cisco Router 406

    Routing Between Subnets on VLANs 407

Configuring Static Routes 412

    Static Route Configuration 413

    Static Host Routes 414

    Static Routes with No Competing Routes 415

    Static Routes with Competing Routes 415

    Static Default Routes 417

    Troubleshooting Static Routes 418

Chapter Summary 420

Chapter 19 Learning IPv4 Routes with RIPv2 426

Foundation Topics 427

RIP and Routing Protocol Concepts 427

    History of Interior Gateway Protocols 427

    Comparing IGPs 427

    Distance Vector Basics 429

    Summarizing RIPv2 Features 432

Core RIPv2 Configuration and Verification 433

    Configuring Core RIPv2 Features 433

    RIPv2 Verification 436

Optional RIPv2 Configuration and Verification 440

    Controlling RIP Updates with the passive-interface Command 441

    Supporting Multiple Equal-Cost Routes with Maximum Paths 441

    Understanding Autosummarization and Discontiguous Classful Networks 442

    Verifying Optional RIP Features 444

    RIPv2 Default Routes 446

Troubleshooting RIPv2 449

    Symptoms with Missing and Incorrect network Commands 450

    Issues Related to Passive Interfaces 452

    Issues Related to auto-summary 452

    RIP Issues Caused by Other Router Features 453

Summary of RIP Troubleshooting Issues 453

Chapter Summary 454

Chapter 20 DHCP and IP Networking on Hosts 460

Foundation Topics 461

Implementing and Troubleshooting DHCP 461

    DHCP Concepts 461

    DHCP Server Configuration on Routers 465

    IOS DHCP Server Verification 467

    Troubleshooting DHCP Services 468

Verifying Host IPv4 Settings 473

    IP Address and Mask Configuration 473

    Name Resolution with DNS 475

    Default Routers 475

IPv4 Address Types 477

    Review of Unicast (Class A, B, and C) IP Addresses 477

    IP Broadcast Addresses 478

    IPv4 Multicast Addresses (Class D Addresses) 479

    Comparing and Contrasting IP Address Types 481

Chapter Summary 482

Part V Review 488

Part VI IPv4 Design and Troubleshooting 493

Chapter 21 Subnet Design 494

Foundation Topics 495

Choosing the Mask(s) to Meet Requirements 495

    Review: Choosing the Minimum Number of Subnet and Host Bits 495

    No Masks Meet Requirements 496

    One Mask Meets Requirements 497

    Multiple Masks Meet Requirements 497

    The Formal Process 500

    Practice Choosing Subnet Masks 500

Finding All Subnet IDs 501

    First Subnet ID: The Zero Subnet 501

    Finding the Pattern Using the Magic Number 502

    A Formal Process with Less Than 8 Subnet Bits 503

    Finding All Subnets with Exactly 8 Subnet Bits 506

    Finding All Subnets with More Than 8 Subnet Bits 507

    Practice Finding All Subnet IDs 509

Chapter Summary 511

Chapter 22 Variable-Length Subnet Masks 518

Foundation Topics 519

VLSM Concepts and Configuration 519

    Classless and Classful Routing Protocols 519

    VLSM Configuration and Verification 520

Finding VLSM Overlaps 521

    Designing Subnetting Plans with VLSM 521

    An Example of Finding a VLSM Overlap 523

    Practice Finding VLSM Overlaps 524

Adding a New Subnet to an Existing VLSM Design 524

    An Example of Adding a New VLSM Subnet 525

Chapter Summary 527

Chapter 23 IPv4 Troubleshooting Tools 532

Foundation Topics 533

Problem Isolation Using the ping Command 533

    Ping Command Basics 533

    Strategies and Results When Testing with the ping Command 534

    Using Ping with Names and with IP Addresses 541

Problem Isolation Using the traceroute Command 542

    traceroute Basics 542

    Using traceroute to Isolate the Problem to Two Routers 545

Telnet and SSH 547

    Common Reasons to Use the IOS Telnet and SSH Client 547

    IOS Telnet and SSH Examples 548

Chapter Summary 550

Chapter 24 Troubleshooting IPv4 Routing 552

Foundation Topics 553

Problems Between the Host and the Default Router 553

    Root Causes Based on a Host’s IPv4 Settings 553

    Root Causes Based on the Default Router’s Configuration 558

Problems with Routing Packets Between Routers 561

    IP Forwarding by Matching the Most Specific Route 562

    Routing Problems Caused by Incorrect Addressing Plans 565

    Pointers to Related Troubleshooting Topics 569

Chapter Summary 571

Part VI Review 574

Part VII IPv4 Services: ACLs and NAT 579

Chapter 25 Basic IPv4 Access Control Lists 580

Foundation Topics 581

IPv4 Access Control List Basics 581

    ACL Location and Direction 581

    Matching Packets 582

    Taking Action When a Match Occurs 583

    Types of IP ACLs 583

Standard Numbered IPv4 ACLs 583

    List Logic with IP ACLs 584

    Matching Logic and Command Syntax 585

    Implementing Standard IP ACLs 588

    Troubleshooting and Verification Tips 592

Practice Applying Standard IP ACLs 593

    Practice Building access-list Commands 593

    Reverse Engineering from ACL to Address Range 594

Chapter Summary 596

Chapter 26 Advanced IPv4 Access Control Lists 602

Foundation Topics 603

Extended Numbered IP Access Control Lists 603

    Matching the Protocol, Source IP, and Destination IP 603

    Matching TCP and UDP Port Numbers 604

    Extended IP ACL Configuration 607

    Practice Building access-list Commands 610

Named ACLs and ACL Editing 610

    Named IP Access Lists 611

    Editing ACLs Using Sequence Numbers 612

    Numbered ACL Configuration Versus Named ACL Configuration 614

    ACL Implementation Considerations 615

Troubleshooting with IPv4 ACLs 616

    Analyzing ACL Behavior in a Network 616

    ACL Interactions with Router-Generated Packets 621

Chapter Summary 624

Chapter 27 Network Address Translation 630

Foundation Topics 631

Perspectives on IPv4 Address Scalability 631

    CIDR 631

    Private Addressing 632

Network Address Translation Concepts 633

    Static NAT 633

    Dynamic NAT 636

    Overloading NAT with Port Address Translation 637

    NAT Configuration and Troubleshooting 638

    Static NAT Configuration 638

    Dynamic NAT Configuration 640

    Dynamic NAT Verification 642

    NAT Overload (PAT) Configuration 644

    NAT Troubleshooting 646

Chapter Summary 648

Part VII Review 654

Part VIII IP Version 6 659

Chapter 28 Fundamentals of IP Version 6 660

Foundation Topics 661

    Introduction to IPv6 661

    IPv6 Addressing Formats and Conventions 666

Chapter Summary 672

Chapter 29 IPv6 Addressing and Subnetting 678

Foundation Topics 679

Global Unicast Addressing Concepts 679

    A Brief Review of Public and Private IPv4 Addresses 679

    The IPv6 Global Routing Prefix 682

    Address Ranges for Global Unicast Addresses 683

    IPv6 Subnetting Using Global Unicast Addresses 684

    Assigning Addresses to Hosts in a Subnet 688

Unique Local Unicast Addresses 689

    Subnetting with Unique Local IPv6 Addresses 689

    The Need for Globally Unique Local Addresses 690

Chapter Summary 691

Chapter 30 Implementing IPv6 Addressing on Routers 694

Foundation Topics 695

Implementing Unicast IPv6 Addresses on Routers 695

    Static Unicast Address Configuration 696

    Dynamic Unicast Address Configuration 702

Special Addresses Used by Routers 703

    Link-Local Addresses 703

    IPv6 Multicast Addresses 706

    Miscellaneous IPv6 Addresses 710

    IPv6 Addressing Configuration Summary 710

Chapter Summary 712

Chapter 31 Implementing IPv6 Addressing on Hosts 718

Foundation Topics 719

The Neighbor Discovery Protocol 719

    Discovering Routers with NDP RS and RA 719

    Discovering Addressing Info for SLAAC with NDP RS and RA 720

    Discovering Neighbor Link Addresses with NDP NS and NA 721

    Discovering Duplicate Addresses Using NDP NS and NA 722

    NDP Summary 723

Dynamic Configuration of Host IPv6 Settings 724

    Dynamic Configuration Using Stateful DHCP and NDP 724

    Using Stateless Address Auto Configuration 727

Troubleshooting IPv6 Addressing 729

    Verifying Host IPv6 Connectivity from Hosts 729

    Verifying Host Connectivity from Nearby Routers 731

Chapter Summary 734

Chapter 32 Implementing IPv6 Routing 740

Foundation Topics 741

Connected and Local IPv6 Routes 741

    Rules for Connected and Local Routes 741

    Example of Connected IPv6 Routes 742

    Examples of Local IPv6 Routes 743

Static IPv6 Routes 744

    Static Routes Using the Outgoing Interface 744

    Static Routes Using Next-Hop IPv6 Address 746

    Static Default Routes 748

    Static IPv6 Host Routes 749

    Floating Static IPv6 Routes 749

    Default Routes with SLAAC on Router Interfaces 751

    Troubleshooting Static IPv6 Routes 752

Chapter Summary 756

Part VIII Review 760

Part IX Network Device Management 763

Chapter 33 Device Management Protocols 764

Foundation Topics 765

System Message Logging (Syslog) 765

    Sending Messages in Real Time to Current Users 765

    Storing Log Messages for Later Review 766

    Log Message Format 766

    Log Message Severity Levels 767

    Configuring and Verifying System Logging 768

    The debug Command and Log Messages 770

Network Time Protocol (NTP) 771

    Setting the Time and Timezone 772

    Implementing NTP Clients, Servers, and Client/Server Mode 773

    NTP Using a Loopback Interface for Better Availability 775

Analyzing Topology Using CDP and LLDP 776

    Examining Information Learned by CDP 776

    Configuring and Verifying CDP Itself 779

    Implementing Link Layer Discovery Protocol 780

Chapter Summary 782

Chapter 34 Device Security Features 788

Foundation Topics 789

Securing IOS Passwords 789

    Encrypting Older IOS Passwords with service password-encryption 789

    Encoding the Enable Passwords with Hashes 790

    Hiding the Passwords for Local Usernames 794

Cisco Device Hardening 794

    Configuring Login Banners 794

    Securing Unused Switch Interfaces 796

    Controlling Telnet and SSH Access with ACLs 797

    Firewalls 797

Chapter Summary 801

Chapter 35 Managing IOS Files 806

Foundation Topics 807

Managing Cisco IOS Images and Upgrades 807

    The IOS File System 807

    Upgrading IOS Images 808

    The Cisco IOS Software Boot Sequence 813

Password Recovery 818

    The General Ideas Behind Cisco Password Recovery/Reset 819

    A Specific Password Reset Example 820

Managing Configuration Files 821

    Copying and Erasing Configuration Files 822

    Initial Configuration (Setup Mode) 825

Chapter Summary 827

Chapter 36 IOS License Management 832

Foundation Topics 833

IOS Packaging 833

    IOS Images per Model, Series, and per Software Version/Release 833

    Original Packaging: One IOS Image per Feature Set Combination 834

    New IOS Packaging: One Universal Image with All Feature Sets 834

IOS Software Activation with Universal Images 835

    The Future: Cisco ONE Licensing 836

Managing Software Activation with Cisco License Manager 837

    Manually Activating Software Using Licenses 838

    Example of Manually Activating a License 839

    Right-to-Use Licenses 843

Chapter Summary 845

Part IX Review 848

Part X Final Review 851

Chapter 37 Final Review 852

Advice About the Exam Event 852

    Learn the Question Types Using the Cisco Certification Exam Tutorial 852

    Think About Your Time Budget Versus Number of Questions 853

    A Suggested Time-Check Method 854

    Miscellaneous Pre-Exam Suggestions 854

    Exam-Day Advice 854

    Reserve the Hour After the Exam in Case You Fail 855

Exam Review 856

    Practice Subnetting and Other Math-Related Skills 856

    Take Practice Exams 858

    Find Knowledge Gaps Through Question Review 860

    Practice Hands-On CLI Skills 862

    Assess Whether You Are Ready to Pass (and the Fallacy of Exam Scores) 864

    Study Suggestions After Failing to Pass 865

    Other Study Tasks 866

    Final Thoughts 866

Part XI Appendixes 869

Appendix A Numeric Reference Tables 870

Appendix B CCENT/CCNA ICND1 100-105 Exam Updates 876

Glossary 878

DVD Appendixes

Appendix C Answers to the Review Questions

Appendix D Practice for Chapter 14: Analyzing Classful IPv4 Networks

Appendix E Practice for Chapter 15: Analyzing Subnet Masks

Appendix F Practice for Chapter 16: Analyzing Existing Subnets

Appendix G Practice for Chapter 21: Subnet Design

Appendix H Practice for Chapter 22: Variable-Length Subnet Masks

Appendix I Practice for Chapter 25: Basic IPv4 Access Control Lists

Appendix J Practice for Chapter 28: Fundamentals of IP Version 6

Appendix K Practice for Chapter 30: Implementing IPv6 Addressing on Routers

Appendix L Mind Map Solutions

Appendix M Study Planner

Appendix N Classless Inter-domain Routing

Appendix O Route Summarization

Appendix P Implementing Point-to-Point WANs

Appendix Q Topics from Previous Editions

Appendix R Exam Topics Cross Reference

9781587205972   TOC   5/17/2016


We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata

Submit Errata

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020