larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

CCNA 3 and 4 Companion Guide (Cisco Networking Academy Program), 3rd Edition

Book

  • Sorry, this book is no longer in print.
Not for Sale

Packet Tracer 3.2 is now available with Cisco Press books. Click "Features" in the "More Information" box to learn more.

  • About
  • Description
  • Sample Content
  • Updates

Features

  • Maps to Web-based Curriculum—All print products map to the current version of the Web-based curriculum.
    • Provides instructors with a print companion that matches the online learning.

  • Integrated Learning—Increased integration of all Networking Academy print products.
    • Provides more effective learning across print resources.

  • Expanded CD-ROM—Includes a CD-ROM that has been expanded to include interactive e-Lab activities not found within the Web-based curriculum, over 300 unique CCNA preparation questions, 15 PhotoZooms to show high-resolution photographs of Cisco equipment, and 20 instructional videos that cover more difficult topics.
    • Reinforces book topics.

  • Cisco-approved Study Materials for the Networking Academies Courses—Cisco Press is the only publisher endorsed and recommended by Cisco Systems.
    • Provides the instructor and the student with the confidence that the same individuals who developed the Web-based curriculum have reviewed and recommended the test from Cisco Press.

  • Written by an Instructor and Developer of the Online Curriculum—The CCNA 3 and 4 Companion Guide, Third Edition, is developed by the same professionals who create the online curriculum at Cisco Systems. In addition, Academic Business Consultants, Inc. is co-developing this title. ABC is a multimedia curriculum development company located in Scottsdale, AZ. They are strong in instructional writing and readability levels.
  • Strong Textbook Pedagogy and Learning Aids—Chapter objectives provide references to the concepts covered in the chapter. Hands-on projects prepare the student for real-world situations. The review questions at the end of each chapter help track the students progress and focus their study. Case studies and labs to prepare students and CCNA candidates for the CCNA Exam.
    • Prepares students for real-world situations, help them track their progress and focus their study, and prepare them for the practical portion of the CCNA Exam.

  • Copyright 2004
  • Edition: 3rd
  • Book
  • ISBN-10: 1-58713-113-7
  • ISBN-13: 978-1-58713-113-4

The only authorized textbook for the Cisco Networking Academy Program

The CCNA 3 and 4 Companion Guide contains the information from the online curriculum with additional in-depth content to enhance your understanding of some topics plus supplemental aids to assist in studying:

  • Begins with a review chapter on the OSI Reference Model and routing
  • Chapter Objectives and Summaries provide references to the concepts covered for focused study on key topics
  • Extensive Glossary lists all the key terms and definitions in one place
  • Throughout this book, you see references to the lab activities found in the course and the Cisco Networking Academy Program CCNA 3 and 4 Lab Companion, Third Edition. These labs allow you to make a connection between theory and practice.
  • Plus seven bonus chapters on advanced material and key certification exam reviews

Cisco Networking Academy Program CCNA 3 and 4 Companion Guide, Third Edition, is the Cisco approved textbook that supplements version 3.x of the CCNA 3 and 4 online curriculum of the Cisco Networking Academy Program. The topics covered in this course and Companion Guide provide you with the necessary knowledge to further prepare for CCNA certification and to enter the field of network administration. CCNA 3 and 4 introduce you to the design, configuration, and maintenance of:

  • Switches and intermediate routing
  • Local-area networks (LANs)
  • Virtual local-area networks (VLANs)
  • Wide-area networks (WANs)
  • Internetwork Package Exchange (IPX) routing
  • Enhanced Interior Gateway Protocol (EIGRP)
  • Network troubleshooting
  • Integrated Services Data Network (ISDN)
  • Point-to-Point Protocol (PPP)
  • Frame Relay

Use this Companion Guide as a portable desk reference to access this information for reference, study, and review at any time.

Cisco Press is a collaboration between Cisco Systems, Inc., and Pearson Education that is charged with developing high-quality, cutting-edge educational and reference products for the networking industry. The products in the Cisco Networking Academy Program series are designed to prepare students for careers in the exciting networking field. These products have proven to be strong supplements to the web-based curriculum and are the only print companions that have been reviewed and endorsed by Cisco Systems for Cisco Networking Academy Program use.

Companion CD-ROM
The CD-ROM contains 25 e-Lab Activities, 500 Practice Exam questions in an interactive Test Engine, 10 hi-res PhotoZooms Activities, and 25 Video Demonstrations to reinforce topics and enhance your overall learning experience.

This book is part of the Cisco Networking Academy Program series from Cisco Press. The products in this series support and complement the Cisco Networking Academy.

Table of Contents

I. REVIEW.

1. Review: The OSI Reference Model and Routing.

    Layered Network Model: OSI Reference Model.

    Peer-to-Peer Communication.

    Data Encapsulation.

    Physical Layer.

    Ethernet/802.3 Physical Connections.

    Data Link Layer.

    Ethernet/802.3 Interface.

    Network Layer.

    IP Addressing and Subnets.

    Path Determination.

    Path Communication.

    ICMP.

    ARP.

    Routing.

    Routed Versus Routing Protocols.

    IP Routing Configuration Tasks.

    Transport Layer.

    Segmenting Upper-Layer Applications.

    Establishing a Connection.

    Data Transfer.

    Reliability with Windowing.

    Acknowledgment Techniques.

    Summary.

    Key Terms.

    Check Your Understanding.

II. CCNA 3: SWITCHING BASICS AND INTERMEDIATE ROUTING.

2. Introduction to Classless Routing.

    CIDR Overview.

    Why CIDR?

    Route Aggregation and Supernetting.

    Supernetting and Address Allocation.

    Variable-Length Subnet Masking (VLSM).

    VLSM Features.

    Calculating VLSMs.

    Configuring VLSM.

    VLSM Using RIP and IGRP.

    Route Summarization.

    Summarization Within an Octet.

    Summarization with a Discontiguous Network.

    Route Flapping.

    RIP Version 2.

    Short History of RIP.

    RIP Version 2 Features.

    Comparing RIPv1 and RIPv2.

    Configuring RIP Version 2.

    Verifying RIP V2.

    Troubleshooting RIP.

    Default Routes.

    Summary.

    Key Terms.

    Check Your Understanding.

3. Single-Area OSPF.

    Single-Area OSPF Concepts.

    OSPF Overview.

    OSPF Terminology.

    OSPF States.

    Comparing OSPF with Distance Vector Routing Protocols.

    Shortest Path First Algorithm.

    OSPF Network Types

   

OSPF Hello Protocol.

    Steps in OSPF Operations.

    Establishing a Router Adjacency.

    Electing a DR and BDR.

     Discovering Routes.

    Selecting the Best Route.

    Maintaining Route Information.

    Single-Area OSPF Configuration.

    Configuring a Loopback Address.

    Modifying OSPF Router Priority.

    Modifying OSPF Cost Metric.

    Configuring OSPF Authentication.

    Configuring OSPF Timers.

    Configure OSPF over NBMA.

    Full-Mesh Frame Relay.

    Partial-Mesh Frame Relay.

    Point-to-Multipoint OSPF.

    Propagating a Default Route.

    Common OSPF Configuration Issues.

    Verifying the OSPF Configuration.

    Summary.

    Key Terms.

    Check Your Understanding.

4. Enhanced Interior Gateway Routing Protocol.

    EIGRP Overview.

    EIGRP Processes and Technology.

    EIGRP Benefits.

    Independence from Routed Protocols.

    EIGRP Terminology.

    Neighbor Table.

    Topology Table.

    Successor.

    Feasible Successor.

    Selection of Successors and Feasible Successors.

    Stuck in Active Routes.

    Routing Table.

    Route Tagging.

    EIGRP Features and Technologies.

    Neighbor Discovery and Recovery.

    Reliable Transport Protocol.

    DUAL Finite-State Machine.

    PDMs.

    EIGRP Packet Types.

    Hello Packets.

    Acknowledgment Packets.

    Update Packets.

    Query and Reply Packets.

    EIGRP Convergence.

    Configuring EIGRP.

    Configuring EIGRP for IP.

    Configuring Bandwidth with NBMA.

    Configuring Bandwidth over a Multipoint Network.

    Configuring Bandwidth over a Hybrid Multipoint Network.

    Using the ip bandwidth-percent Command.

    Configuring EIGRP Summarization.

    Summary.

    Key Terms.

    Check Your Understanding.

5. Switching Concepts and LAN Design.

    Ethernet/802.3 LANs.

    Ethernet/802.3 LAN Development.

    Factors That Impact Network Performance.

    Elements of Ethernet/802.3 Networks.

    Half-Duplex Ethernet Networks.

    Full-Duplex Ethernet Networks.

    Introduction to LAN Switching.

    LAN Segmentation.

    LAN Segmentation with Bridges.

    LAN Segmentation with Routers.

    LAN Segmentation with Switches.

    The Basic Operations of a Switch.

    Ethernet Switch Latency.

    Layer 2 and Layer 3 Switching.

    Implications of Layer 2 and Layer 3 Switching.

    Symmetric and Asymmetric Switching.

    Memory Buffering.

    LAN Design.

    LAN Design Goals.

    LAN Design Considerations.

    Function and Placement of Servers.

    Segmentation Issues.

    Broadcast Domain Issues.

    LAN Design Methodology.

    Factors That Affect Network Availability.

    Designing the Physical Network Topology.

    Layer 1 Design.

    Layer 2 Design.

    Layer 3 Design.

    Basic Layer 2 Bridging and Switching.

    How Switches and Bridges Filter Frames.

    Filtering Types.

    Summary.

    Key Terms.

    Check Your Understanding.

6. Switches.

    Overview of Switches.

    Starting the Switch.

    Physical Startup of the Catalyst Switch.

    Switch LED Indicators.

    Verifying Port LEDs During Switch POST.

    Viewing Initial Bootup Output from the Switch.

    Examining Help in the Switch Command-Line Interface.

    LAN Switches and Hierarchical Network Design.

    The Core Layer.

    The Distribution Layer.

    Access Layer.

    Switched LANs, Access Layer Overview.

    Access Layer Switches.

    Distribution Layer Overview.

    Distribution Layer Switches.

    Core Layer Overview.

    Core Layer Switches.

    Summary.

    Key Terms.

    Check Your Understanding.

7. Switch Configuration.

    Microsegmentation.

    Microsegmentation Implementation.

    How a Switch Learns Addresses.

    Switch Forwarding.

    Store-and-Forward.

    Cut-Through.

    Symmetric Switching.

    Asymmetric Switching.

    Memory Buffering.

    Switches and Collision Domains.

    Switches and Broadcast Domains.

    Communication Between Switches and PCs.

    PC to Switch Transmission.

    Communication Between Switches.

    Verifying the Initial Configuration of a Catalyst Switch.

    Verifying the Catalyst Switch Default Configuration.

    Switch Port Properties.

    VLAN Properties.

    The Flash Directory.

    Displaying IOS Version Information.

    Benefits of Using the Default Configuration.

    Configuring the Network Settings of the Catalyst Switch.

    Resetting the Switch Defaults.

    Assigning the Switch Host Name and Passwords.

    Assigning the Switch IP Address and Default Gateway.

    Setting Port Characteristics.

    Web-Based Interface.

    Managing the MAC Address Table.

    Configuring Static MAC Addresses.

    Configuring Port Security.

    Executing Adds, Moves, and Changes.

    Managing Switch Operating System Images and Device Configuration Files.

    1900/2950 Password Recovery.

    1900/2900 Firmware IOS Upgrade.

    Summary.

    Key Terms.

    Check Your Understanding.

8. Spanning Tree Protocol.

    Redundant Topology Overview.

    What Is Redundancy?

    Redundant Topologies.

    Redundant Switched Topologies.

    Broadcast Storms.

    Multiple Frame Transmissions.

    MAC Database Instability.

    Spanning Tree Overview.

    Spanning-Tree Operation.

    Using Spanning Tree to Create a Loop-Free Topology.

    Advanced Functions of STP.

    Selecting the Root Bridge.

    Stages of Spanning-Tree Port States.

    Electing Designated Ports.

    Path Cost.

    STP Timers.

    Spanning-Tree Recalculation.

    Convergence.

    RSTP.

    RSTP Port States.

    Transition to Forwarding.

    Summary.

    Key Terms.

    Check Your Understanding.

9. Virtual LANs.

    VLAN Introduction.

    Broadcast Domains with VLANs and Routers.

    VLAN Operation.

    End-to-End VLANs.

    Geographic VLANS.

    Benefits of VLANs.

    Change Management.

    VLANs and Security.

    Using Hubs with VLANs.

    VLAN Types.

    VLAN Frame Identification.

    IEEE 802.1Q: Frame Tagging.

    Inter-Switch Link Protocol.

    FDDI 802.10.

    LANE.

    VLAN Configuration.

    Configuring Static VLANs.

    Verifying VLAN Configuration.

    Saving a VLAN Configuration.

    Deleting a VLAN Configuration.

    Troubleshooting VLANs.

    Summary.

    Key Terms.

    Check Your Understanding.

10. VLAN Trunking Protocol.

    Trunking.

    Trunking Concepts.

    Trunking Operation.

    VLANs and Trunking.

    Switch Command-Line Interfaces.

    Trunking Implementation.

    VLAN Trunking Protocol (VTP).

    History of VTP.

    VTP Concepts.

    VTP Benefits.

    VTP Domain.

    VTP Modes.

    VTP Implementation.

    VTP Configuration.

    VTP Pruning.

    Inter-VLAN Routing.

    Inter-VLAN Issues and Solutions.

    Isolated Broadcast Domains.

    Finding the Route Between VLANs.

    Physical and Logical Interfaces.

    Dividing Physical Interfaces into Subinterfaces.

    Configuring Inter-VLAN Routing.

    Summary.

    Key Terms.

    Check Your Understanding.

III. CCNA 4: WAN TECHNOLOGIES.

11. Scaling IP Addresses.

    Internet Protocol Overview.

    NAT and PAT.

    NAT and PAT Features.

    Configuring NAT and PAT.

    Verifying NAT and PAT Configuration.

    Troubleshooting NAT and PAT Configuration.

    Advantages and Disadvantages of NAT.

    DHCP Overview.

    Introducing DHCP.

    BOOTP and DHCP Differences.

    DHCP Features.

    DHCP Operation.

    Configuring DHCP Operation.

    Verifying DHCP Operation.

    Troubleshooting DHCP Configuration.

    DHCP Relay.

    Summary.

    Key Terms.

    Check Your Understanding.

12. WAN Technologies.

    WAN Technologies Overview.

    WAN Devices.

    WAN Standards.

    WAN Encapsulation.

    WAN Link Options.

    Circuit-Switched Connections.

    Packet-Switched Connections.

    Packet and Circuit Switching.

    WAN Technologies.

    Analog Dialup.

    ISDN.

    Leased Line.

    X.25.

    Frame Relay.

    ATM.

    DSL.

    Cable Modem.

    WAN Communication.

    LAN/WAN Integration.

    Identifying and Selecting Network Capabilities.

    Identifying and Selecting a Networking Model.

    The Hierarchical Network Design Model.

    The Three-Layer Design Models.

    Three-Layer Model Components.

    Hierarchical WAN Design Advantages.

    Server Placement.

    WAN Design.

    Steps in Designing a WAN.

    Gathering Requirements.

    Analyzing Requirements.

    Sensitivity Testing.

    WAN Topology.

    How to Identify and Select Networking Capabilities.

    Other WAN Design Considerations.

    Summary.

    Key Terms.

    Check Your Understanding.

13. Point-to-Point Protocol.

    PPP Layered Architecture.

    Establishing a PPP Session.

    PPP Authentication Protocols.

    Password Authentication Protocol.

    CHAP.

    PPP Encapsulation and Authentication Process.

    Serial Point-to-Point Links.

    Time-Division Multiplexing.

    Demarcation Point.

    DTE and Data Communications Equipment Devices.

    HDLC Encapsulation.

    Configuring HDLC Encapsulation.

    Troubleshooting a Serial Interface.

    Configuring PPP.

    Configuring PPP Encapsulation.

    Configuring PPP Authentication.

    Verifying the Serial PPP Encapsulation Configuration.

    Troubleshooting the Serial PPP Encapsulation Configuration.

    Summary.

    Key Terms.

    Check Your Understanding.

14. ISDN and DDR.

    ISDN Standards.

    ISDN Overview.

    ISDN Standards and Access Methods.

    ISDN 3-Layer Model and Protocols.

    ISDN Call Setup.

    ISDN Functions and Reference Points.

    Determining the Router ISDN Interface.

    ISDN Switch Types.

    ISDN Configuration.

    Configuring ISDN BRI.

    Configuring ISDN PRI.

    Verifying the ISDN Configuration.

    Troubleshooting the ISDN Configuration.

    DDR Routing.

    DDR Operation.

    Legacy DDR.

    Defining Static Routes for DDR.

    Specifying Interesting Traffic for DDR.

    Configuring DDR Dialer Information.

    Dialer Profiles.

    Configuring Dialer Profiles.

    Verifying the DDR Configuration.

    Summary

Key Terms.

    Check Your Understanding.

15. Frame Relay.

    Frame Relay Overview.

    Frame Relay Terminology.

    Frame Relay Operation.

    Frame Relay LMI.

    LMI Operations.

    LMI Extensions.

    Global Addressing.

    Multicasting.

    Inverse ARP.

    Stages of Inverse ARP and LMI Operation.

    Frame Relay Mapping.

    Frame Relay Switching Tables.

    Frame Relay Operation Summary.

    Frame Relay Subinterfaces.

    Split Horizon Routing Environments.

    Resolving Reachabilty Issues with Subinterfaces.

    Basic Frame Relay Configuration.

    Configuring the Serial Interface.

    Verifying the Serial Interface Configuration.

    Verifying Operation and Confirming Connectivity.

    Confirming That the Line Is Up.

    Confirming the Frame Relay Maps.

    Confirming Connectivity to the Central Site Router.

    Configuring Subinterfaces.

    Configuring Optional Commands.

    Summary.

    Key Terms.

    Check Your Understanding.

16. Introduction to Network Administration.

    Overview of Desktop and Server Operating Systems.

    Workstations.

    Servers.

    Client/Server Relationship.

    NOSs.

    Windows NT, Windows 2000, and Windows .NET.

    UNIX and Linux.

    Macintosh OS X.

    Concept of Service on Servers.

    File Sharing.

    FTP and File Transfer.

    Web Services.

    DNS.

    DHCP.

    Network Management.

    OSI and Network Management Model.

    Standards: SNMP and CMIP.

    SNMP Operation.

    Structure of Management Information and MIBs.

    SNMP Protocol.

    Configuring SNMP.

    RMON.

    Syslog.

    Summary.

    Key Terms.

    Check Your Understanding.

IV. CCNA BONUS MATERIAL.

17. Optical Networking Fundamentals.

    Basics of Optical Networks.

    Optical Business Drivers.

    Fiber-Optic Systems.

    Fiber-Optic Transmission System.

    Light.

    Optical Fibers.

     Fiber Types.

    Fiber Geometry.

    Attenuation.

    Optical Filters.

    Optical Amplifiers.

    Optical Transmission and Multiplexing.

    SONET Technology.

    SONET Multiplexing Hierarchy.

    DWDM Systems.

    Summary.

    Key Terms.

    Check Your Understanding.

18. Network Management.

    Network Documentation.

    Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) Layouts.

    Server and Workstation Configuration Details.

    Software Listings.

    Maintenance Records.

    Security Measures.

    User Policies.

    Network Security.

    Data Recovery.

    Backup Operations.

    Redundancy Techniques.

    Environmental Factors.

    Power Conditioning.

    EMI and RFI.

    Software Viruses.

    Network Performance.

    Server Administration.

    Client/Server Network.

    Network Control.

    The Administrative Side of Network Management.

    Understanding and Establishing the Boundaries of the Network.

    Costs of a Network.

    Error Report Documentation.

    Monitoring the Network.

    Connection Monitoring.

    Traffic Monitoring.

    SNMP.

    Remote Monitoring.

    Network Troubleshooting.

    The Troubleshooting Process.

    Troubleshooting Techniques.

    Software Tools.

    Summary.

    Key Terms.

19. Network+ Certification Exam Review.

    Basic Networking Topologies.

    Star Topology.

    Bus Topology.

    Mesh Topology.

    Ring Topology.

    Wireless Topology.

    Segments and Backbones.

    Segments.

    Backbones.

    The Major Network Operating Systems.

    Microsoft Windows 2000 Server.

    Windows XP.

    Novell NetWare.

    UNIX.

    Linux.

    MAC OS X.

    Windows Directory Services.

    Windows 2000 Organizational Units.

    Active Directory and Domain Name System.

    Active Directory Servers.

    Active Directory Replication.

    Active Directory Security.

    Active Directory Compatibility.

    Novell NetWare Directory Services.

    UNIX Directory Services.

    IP, IPX, and NetBEUI: Associating Them with Their Functions.

    IP.

    IPX.

    NetBIOS Extended User Interface.

    Redundant Array of Inexpensive Disks Overview     

RAID 0.

    RAID 1.

    RAID 2.

    RAID 3.

    RAID 4.

    RAID 5.

    RAID 0/1.

    Mirroring.

    Duplexing.

    Striping.

    Volumes.

    OSI Model.

    Application Layer.

    Presentation Layer.

    Session Layer.

    Transport Layer.

    Network Layer.

    Data Link Layer.

    Physical Layer.

    Networking Media.

    Coaxial Cable.

    Cat 3 UTP and Shielded Twisted-Pair Cable.

    Category 5 UTP and Shielded Twisted-Pair Cable.

     Fiber-Optic Cable.

    Unshielded Twisted-Pair Cable.

    Shielded Twisted-Pair Cable.

    Baseband Signal.

    10BASE-2.

    10BASE-5.

    10BASE-T.

    100BASE-T.

    100BASE-TX and 100BASE-T4.

    100BaseVG-AnyLAN.

    100BASE-FX and Gigabit Ethernet.

    Full- and Half-Duplex Operation.

    WANs and LANs.

    Servers, Workstations, and Hosts.

    Server-Based Networking and Peer-to-Peer Networking.

    Cables, Network Interface Cards, and Routers.

    Broadband and Baseband.

    Gateways.

    Understanding the Physical Layer.

    Hubs.

    Multistation Access Units.

    Switching Hubs.

    Repeaters.

    Transceivers.

    The Data Link Layer.

    802.2 Logical Link Control.

    802.3 Ethernet.

    802.5 Token Ring.

    802.11b Wireless.

    The Function and Characteristics of MAC Addresses.

    The Network Layer.

    Router.

    Brouter.

    The Difference Between Routable and Nonroutable Protocols.

    The Concept of Default Gateways and Subnetworks.

    The Reason for Employing Unique Network IDs.

     The Difference Between Static and Dynamic Routing.

    The Transport Layer.

    The Purpose of Name Resolution.

    TCP/IP Fundamentals.

    Default Gateways.

    DHCP, DNS, WINS, and Host Files.

    DNS.

    Windows Internet Naming Service (WINS).

    HOSTS Files.

    TCP.

    IP.

    Internet Domain Name System.

    Class A, B, and C Addresses and Their Default Subnet Mask Numbers   

    Port Numbers.

    Proxies and Why They Are Used.

    Workstation Configuration.

    IP Addresses and Subnet Masks.

     Default Gateways and Subnet Masks.

    Host Name.

    Internet Domain Name.

    TCP/IP Suite: Utilities.

    Using Telnet to Test, Validate, and Troubleshoot IP Connectivity.

    Using nbstat to Test, Validate, and Troubleshoot IP Connectivity.

    Using tracert to Test, Validate, and Troubleshoot IP Connectivity.

    Using netstat to Test, Validate, and Troubleshoot IP Connectivity.

    Using ipconfig/winipconfig to Test, Validate, and Troubleshoot IP Connectivity.

    Using FTP to Test, Validate, and Troubleshoot IP Connectivity.

    Using Packet InterNet Groper to Test, Validate, and Troubleshoot IP Connectivity.

    PPP and SLIP.

    The Purpose and Function of PPTP.

    ISDN and PSTN (POTS).

    Modem Configuration for Dial-Up Networking to Function.

    The Requirements for a Remote Connection.

    Security.

    Standard Password Practices and Procedures.

    Data Encryption.

    The Use of a Firewall.

    Administrative Considerations.

    The Impact of Environmental Factors on Computer Networks.

     Common Peripheral Ports.

    External Small Computer Standard Interface Connections.

    Print Servers.

    Patch Panels.

    Uninterruptible Power Supply.

    Network Interface Cards.

    Maintaining and Supporting the Network.

    Standard Backup Procedures and Backup Media Storage Practices.

    The Need for Periodic Application of Software Patches and Other Fixes to the Network.

    The Need to Install Antivirus Software on the Server and Workstation.

    The Need to Frequently Update Virus Signatures.

    Troubleshooting the Network.

    Determine Whether a Problem Is Attributable to the Operator or the System.

    Check Physical and Logical Indicators of Trouble.

    Given a Network Problem Scenario, Determine the Problem.

    Summary.

    Key Terms.

20. CCNA Certification Exam Review.

    OSI Model.

    Application Layer.

    Presentation Layer.

    Session Layer.

    Transport Layer.

    Network Layer.

    Data Link Layer.

    Physical Layer.

    Bridging/Switching.

    Full-Duplex and Half-Duplex Ethernet Operations.

    Distinguishing Between Cut-Through and Store-and-Forward LAN Switching.

    The Operation and Benefits of VLANs.

    Routed Protocols.

    Different Classes of IP Addresses, Including Subnetting and Private Addresses.

    Subnetting.

    Converting Among Decimal, Hexadecimal, and Binary.

    Routing Protocols.

    Exterior and Interior Routing Protocols.

    Enabling RIP and IGRP on a Router.

    Identifying Routing Metrics Used by IGRP and RIP.

    Comparing and Contrasting the Key Operations That Distinguish Distance Vector, Link-State, and Hybrid Protocols.

    WAN Protocols.

    Key Frame Relay Terms and Features.

    Differentiating Among LAPB, Frame Relay, ISDN/LAPD, HDLC, PPP, and DDR.

    Configuring ISDN BRI and Legacy Dial-on-Demand Routing (DDR).

    Configuration File Management Using TFTP.

    How to Load a Software Image Backup.

    Configuration File Management.

    Managing IOS Images with TFTP.

    Internet Control Message Protocol.

    ICMP Message Delivery.

    Error Reporting and Error Correction.

    Unreachable Networks.

    Using ping to Test Destination Reachability.

    Access Lists.

    ACL Overview.

    Reasons to Create ACLs.

    Cisco, IOS, and Network Basics.

    Initial Router Boot-Up Output.

    Establishing a HyperTerminal Session.

    Logging In to the Router.

    Keyboard Help.

    IOS Editing Commands.

    Router Command History.

    Troubleshooting Command Errors.

    The Purpose of the Cisco IOS.

    Operation of the Cisco IOS.

    Cisco IOS Features.

    The show version Command.

    Router User Interface.

    Cisco IOS Troubleshooting.

    Summary.

    Key Terms.

21. Introduction to Converged Networking.

    Traditional Networks.

    Introduction to Voice and Data Networks.

    Voice over Frame Relay.

    Voice over ATM.

    Voice over IP.

    Comparing Voice-over-Data Technologies.

    Voice, Video, and Data Networks.

    Cisco AVVID.

    Converged Networking Applications.

    Common Issues with QoS.

    Delay.

    Jitter.

    Lost Packets.

    Echo.

    Cisco IOS Software QoS Technology.

    Summary.

    Key Terms.

22. Developing Network Security and Network Management Strategies.

    Network Security Design.

    Identifying Network Assets and Analyzing Risks.

    Analyzing Security Requirements and Trade-Offs.

    Developing a Security Plan.

    Defining a Security Policy.

    Components of a Security Policy.

    Developing Security Procedures.

    Security Mechanisms.

    Authentication.

    Authorization.

    Accounting (Auditing).

    Data Encryption.

    Packet Filters.

    Firewalls.

    Intrusion Detection.

    Physical Security.

    Selecting Security Solutions.

    Securing the Internet Connection.

    Securing Internet Domain Name System Services.

    Logical Network Design and the Internet Connection.

    IP Security Protocol.

    Securing Dial-Up Access.

    Securing Network Services.

    Securing User Services.

    Summary.

    Key Terms.

23. Virtual Private Networks.

    VPN Operation.

    VPN Advantages.

    Types of VPNs.

    Service-Level Agreements.

    An Example VPN.

    VPNs of Network A Sites.

    VPN Implementation.

    Security Audit.

    The Scope and Application Needs.

    Documentation.

    Security Policy.

    The Cisco Systems VPN Design.

    Tunneling Overview.

    Cisco Virtual Dial-Up Services.

    Cisco L2TP Implementation.

    End-to-End Virtual Dial-Up Process.

    Highlights of Virtual Dial-Up Service.

    Authentication and Security.

    Authorization.

    Address Allocation.

    Accounting.

    Summary.

    Key Terms.

V. APPENDIXES.

Appendix A: Glossary of Key Terms.

Appendix B: Check Your Understanding Answer Key.

Appendix C: Module—Chapter—Lab Guide.

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020