Professional Documents
Culture Documents
ICND2
Chapter 1 - Building a Simple Network Chapter 4 - LAN Connections
Building a Simple Network LAN Connections
Common Physical Components of a Network Routers
Course Introduction Chapter 5 - EIGRP Implementation
Course Introduction Implementing EIGRP
Chapter 1 - Small Network Implementation EIGRP Features
Introducing the Review Lab EIGRP Tables
Cisco IOS User Interface Functions EIGRP Path Calculation (Router C)
Overview of Cisco IOS Configuration Modes EIGRP Configuration
Help Facilities of the Cisco IOS CLI EIGRP and Discontiguous Networks Default Scenario Configuration
Commands Review Discussion EIGRP and Discontiguous Networks with no auto-summary
Access to the Remote Labs Verifying the EIGRP Configuration
Summary debug ip eigrp Command
Chapter 1 Review EIGRP Metric
Chapter 2 - Medium-Sized Switched Network Construction EIGRP Load Balancing
Implementing VLANs and Trunks EIGRP Unequal - Cost Load Balancing
Issues in a Poorly Designed Network Variance Example
VLAN Overview Demo - EIGRP
Designing VLANs for an Organization EIGRP MD5 Authentication
Guidelines for Applying IP Address Space EIGRP MD5 Authentication Configuration Steps
Network Traffic Types Configuring EIGRP MD5 Authentication
Advantages of Voice VLANs Example EIGRP MD5 Authentication Configuration
VLAN Operation Verifying MD5 Authentication
VLAN Membership Modes Summary
802.1Q Trunking Troubleshooting EIGRP
802.1Q Frame Components of Troubleshooting EIGRP
Understanding Native VLANs Troubleshooting EIGRP Neighbor Issues
VTP Features Troubleshooting EIGRP Routing Tables
VTP Modes Troubleshooting EIGRP Authentication
VTP Operation Troubleshooting EIGRP Authentication Problem
VTP Pruning Summary
Configuring VLANs and Trunks Chapter 5 Review
VTP Configuration Guidelines Chapter 6 - Access Control Lists
Creating a VTP Domain Introducing ACL Operation
VTP Configuration and Verification Example Why Use ACLs?
802.1Q Trunking Issues ACL Applications: Filtering
Configuring 802.1Q Trunking ACL Applications: Classification
Verifying a Trunk Outbound ACL Operation
VLAN Creation Guidelines A List of Tests: Deny or Permit
Adding a VLAN Types of ACLs
Verifying a VLAN How to Identify ACLs
Assigning Switch Ports to a VLAN IP Access List Entry Sequence Numbering
Verifying VLAN Membership ACL Configuration Guidelines
Demo - VLAN Dynamic ACLs
Executing Adds, Moves, and Changes for VLANs Reflexive ACLs
Summary Time-Based ACLs
Improving Performance with Spanning Tree Wildcard Bits: How to Check the Corresponding Address Bits
Interconnection Technologies Wildcard Bits to Match IP Subnets
Determining Equipment and Cabling Needs Wildcard Bit Mask Abbreviations
Advantages of EtherChannel Summary
Demo - Bridging Configuring and Troubleshooting ACLs
Redundant Topology Testing Packets with Numbered Standard IPv4 ACLs
Broadcast Frames Numbered Standard IPv4 ACL Configuration
Broadcast Storms Numbered Standard IPv4 ACL Example 1
Multiple Frame Copies Numbered Standard IPv4 ACL Example 2
MAC Database Instability Numbered Standard IPv4 ACL Example 3
Demo - STP Demo - Standard ACL
Loop Resolution with STP Standard ACLs to Control vty Access
Spanning-Tree Operation Demo - Access Class
STP Root Bridge Selection Testing Packets with Numbered Extended IPv4 ACLs
Spanning-Tree Port States Numbered Extended IPv4 ACL Configuration
Demo - BPDU Numbered Extended IPv4 ACL Example 1
Describing PortFast Numbered Extended IPv4 ACL Example 2
Configuring and Verifying PortFast Demo - Extended ACL
Spanning-Tree Operation Example Named IP ACL Configuration
Spanning-Tree Path Cost Named Standard IPv4 ACL Example
Spanning-Tree Recalculation Named Extended IPv4 ACL Example
Per VLAN Spanning Tree Plus Commenting ACL Statements
PVST+ Extended Bridge ID Demo - Named ACL
Demo - SwitchConfig Monitoring ACL Statements
Rapid Spanning Tree Protocol Verifying ACLs
Default Spanning-Tree Configuration Troubleshooting Common ACL Errors
PVRST+ Configuration Guidelines Summary
PVRST+ Implementation Commands Chapter 6 Review
Verifying PVRST+ Chapter 7 - Address Space Management
Configuring the Root and Secondary Bridges Scaling the Network with NAT and PAT
Configuring the Root and Secondary Bridges: SwitchA Network Address Translation
Configuring the Root and Secondary Bridges: SwitchB Port Address Translation
Summary Translating Inside Source Addresses
Routing Between VLANs Configuring and Verifying Static Translation
VLAN-to-VLAN Overview Enabling Static NAT Address Mapping Example
Dividing a Physical Interface into Subinterfaces Configuring and Verifying Dynamic Translation
Routing Between VLANs with 802.1Q Trunks Dynamic Address Translation Example
Summary Overloading an Inside Global Address
Securing the Expanded Network Configuring Overloading
Overview of Switch Security Overloading an Inside Global Address Example
Recommended Practices: New Switch Equipment Clearing the NAT Translation Table
Recommended Practices: Switch Security Demo - NAT
Port Security Translation Not Occurring: Translation Not Installed in the Table
802.1X Port-Based Authentication Displaying Information with show and debug Commands
Summary Translation Occurring: Installed Translation Entry Not Being Used
Troubleshooting Switched Networks Sample Problem: Cannot Ping Remote Host
Switches Troubleshooting Solution: Corrected Configuration
Troubleshooting Port Connectivity Summary
Troubleshooting VLANs and Trunks Transitioning to IPv6
Troubleshooting VTP IPv4 and IPv6
Troubleshooting Spanning Tree Why Do We Need a Larger Address Space?
Summary IPv6 Advanced Features
Chapter 2 Review IPv6 Address Representation
Chapter 3 - Medium-Sized Routed Network Construction IPv6 Address Types
Reviewing Routing Operations IPv6 Unicast Addressing
Static vs. Dynamic Routes IPv6 Global Unicast (and Anycast) Addresses
Demo - Static Route Link-Local Addresses
What Is a Dynamic Routing Protocol? Larger Address Space Enables Address Aggregation
Autonomous Systems: Interior and Exterior Routing Protocols Assigning IPv6 Global Unicast Addresses
Classes of Routing Protocols IPv6 EUI-64 Interface Identifier
Selecting the Best Route Using Metrics Stateless Autoconfiguration
Administrative Distance: Ranking Routing Sources DHCPv6 (Stateful)
Distance Vector Routing Protocols DHCPv6 Operation
Sources of Information and Discovering Routes IPv6 Routing Protocols
Maintaining Routing Information RIPng (RFC 2080)
Demo - RIP Review IPv4-to-IPv6 Transition
Inconsistent Routing Entries: Counting to Infinity and Routing Loops Cisco IOS Dual Stack
Counting to Infinity IPv6 Tunneling
Solution to Counting to Infinity: Defining a Maximum Manually Configured IPv6 Tunnel
Routing Loops Enabling IPv6 on Cisco Routers
Solution to Routing Loops: Split Horizon IPv6 Address Configuration Example
Solution to Routing Loops: Route Poisoning and Poison Reverse Cisco IOS IPv6 Name Resolution
Solution to Routing Loops: Hold-Down Timers Configuring and Verifying RIPng for IPv6
Triggered Updates RIPng for IPv6 Configuration Example
Eliminating Routing Loops Summary
Link-State Routing Protocols Chapter 7 Review
OSPF Hierarchical Routing Chapter 8 - LAN Extension into a WAN
Link-State Routing Protocol Algorithms Introducing VPN Solutions
Benefits and Drawbacks of Link-State Routing What Is a VPN?
Summary Benefits of VPN
Implementing VLSM Site-to-Site VPNs
Subnetting Review Remote-Access VPNs
Possible Subnets and Hosts for a Class C Network Cisco Easy VPN
Possible Subnets and Hosts for a Class B Network Cisco IOS IPsec SSL VPN (WebVPN)
Possible Subnets and Hosts for a Class A Network VPN-Enabled Cisco IOS Routers
Subnetting Review Exercise Cisco ASA Adaptive Security Appliances
What Is a Variable-Length Subnet Mask? VPN Clients
A Working VLSM Example What Is IPsec?
Understanding Route Summarization IPsec Security Services
Classful Routing Overview Confidentiality (Encryption)
Classless Routing Overview Encryption Algorithms
Summarizing Within an Octet DH Key Exchange
Summarizing Addresses in a VLSM-Designed Network Data Integrity
Route Summarization Operation in Cisco Routers Authentication
Demo - VLSM IPsec Security Protocols
Summarizing Routes in a Discontiguous Network IPsec Framework
Summary Summary
Chapter 3 Review Establishing a Point-to-Point WAN Connection with PPP
Chapter 4 - Single-Area OSPF Implementation Typical WAN Encapsulation Protocols
Implementing OSPF An Overview of PPP
OSPF Overview PPP Session Establishment
OSPF Hierarchy Example PPP Authentication Protocols: PAP
Neighbor Adjacencies: The Hello Packet PPP Authentication Protocols: CHAP
SPF Algorithm Configuring PPP and Authentication Overview
Configuring Single - Area OSPF Configuring PPP and Authentication
Configuring Loopback Interfaces PPP and CHAP Configuration Example
Verifying the OSPF Configuration Demo - CHAP
OSPF debug Commands Verifying the PPP Encapsulation Configuration
Demo - OSPF Verifying PPP Authentication
Load Balancing with OSPF Verifying PPP Negotiation
OSPF Authentication Summary
Configuring OSPF Plaintext Password Authentication Establishing a WAN Connection with Frame Relay
Plaintext Password Authentication Configuration Example Frame Relay Overview
Verifying Plaintext Password Authentication Frame Relay Terminology
Summary Selecting a Frame Relay Topology
Troubleshooting OSPF Resolving NBMA Reachability Issues
Components of Troubleshooting OSPF Frame Relay Address Mapping
Troubleshooting OSPF Neighbor Adjacencies Frame Relay Signaling
Troubleshooting OSPF Routing Tables Stages of Inverse ARP and LMI Operation
Troubleshooting Plaintext Password Authentication Problems Configuring Basic Frame Relay
Summary Configuring a Static Frame Relay Map
Chapter 4 Review Configuring Frame Relay Subinterfaces
Configuring Frame Relay Point-to-Point Subinterfaces
Configuring Frame Relay Multipoint Subinterfaces
Verifying Frame Relay Operation
Demo - Frame Relay
Summary
Troubleshooting Frame Relay WANs
Components of Troubleshooting Frame Relay
Troubleshooting a Frame Relay Link That Is Down
Troubleshooting Frame Relay Remote Router Connectivity
Troubleshooting Frame Relay End-to-End Connectivity
Summary
Chapter 8 Review
Course Closure