You are on page 1of 7

ICND1

Chapter 1 - Building a Simple Network Chapter 4 - LAN Connections


Building a Simple Network LAN Connections
Common Physical Components of a Network Routers
Interpreting a Network Diagram Router Functions
Resource-Sharing Functions and Benefits Path Determination
Network User Applications Routing Tables
Impact of User Applications on the Network Routing Table Entries
Characteristics of a Network Routing Metrics
Physical Topology Categories Distance Vector Routing Protocols
Logical Topologies Link-State Routing Protocols
Bus Topology Summary
Star Topology Understanding Binary Basics
Extended-Star Topology Decimal vs. Binary Numbers
Ring Topology Decimal and Binary Numbers Chart
Dual-Ring Topology Powers of 2
Full-Mesh Topology Decimal-to-Binary Conversion
Partial-Mesh Topology Binary-to-Decimal Conversion
Connection to the Internet Demo - Conversion
Demo - Network Topology Summary
Summary Constructing a Network Addressing Scheme
Securing the Network Flat Topology
Closed/Open Networks Subnetworks
Threat Capabilities— More Dangerous and Easier to Use What a Subnet Mask Does
E-Business Challenge Possible Subnets and Hosts for a Class C Network
Adversaries, Adversary Motivations, and Classes of Attack Possible Subnets and Hosts for a Class B Network
Common Threats Possible Subnets and Hosts for a Class A Network
Password Attack Threat Mitigation End System Subnet Mask Operation
Summary How Routers Use Subnet Masks
Understanding the Host-to-Host Communications Model Applying the Subnet Address Scheme
nderstanding Host-to-Host Communications Demo - Subnetting Part 1
Why a Layered Network Model? Octet Values of a Subnet Mask
The Seven Layers of the OSI Model Default Subnet Masks
Data Encapsulation/De-Encapsulation Procedure for Implementing Subnets
Peer-to-Peer Communication Eight Easy Steps for Determining Subnet Addresses
Demo - OSI Model Example: Applying a Subnet Mask for a Class C Address
TCP/IP Stack Example: Applying a Subnet Mask for a Class B Address
TCP/IP Stack vs. the OSI Model Example: Applying a Subnet Mask for a Class A Address
Summary Demo - Subnetting Part 2
Understanding the TCP/IP Internet Layer Demo - Subnetting Part 3
Internet Protocol Characteristics Summary
Why IP Addresses? Starting a Router
IP PDU Header Initial Startup of the Cisco Router
IP Address Format: Dotted Decimal Notation Bootup Output from the Router
IP Address Classes: The First Octet Setup: The Initial Configuration Dialog
IP Address Ranges Setup Interface Summary
Reserved Address Setup Initial Global Parameters
Public IP Addresses Setup Initial Protocol Configurations
Private IP Addresses Setup Interface Parameters
Demo - IP Address Basics Cisco AutoSecure
DHCP Setup Script Review and Use
DNS Logging in to the Cisco Router
Network Connection Router User-Mode Command List
ipconfig Router Privileged-Mode Command List
Summary show version Command
Understanding the TCP/IP Transport Layer Demo - Router Configuration
Transport Layer Summary
Reliable vs. Best-Effort Comparison Configuring a Cisco Router
UDP Characteristics Overview of Router Modes
UDP Header Saving Configurations
TCP Characteristics Configuring Router Identification
TCP Header Console-Line Commands
TCP/IP Application Layer Overview Configuring an Interface
Mapping Layer 3 to Layer 4 Configuring an Interface Description
Mapping Layer 4 to Applications Configuring IP Addresses
Establishing a Connection Router show interfaces Command
Three-Way Handshake Interpreting the Interface Status
Flow Control Verifying a Serial Interface Configuration
TCP Acknowledgment Summary
Fixed Windowing Exploring the Packet Delivery Process
TCP Sliding Windowing Layer 2 Addressing
TCP Sequence and Acknowledgment Numbers Layer 3 Addressing
Demo - TCP Host-to-Host Packet Delivery
Summary Using the show OP Command
Exploring the Packet Delivery Process ping
Layer 1 Devices traceroute
Layer 2 Devices Summary
Layer 2 Addressing Understanding Cisco Router Security
Layer 3 Devices and Their Function Common Threats to Physical Installations
Layer 3 Addressing Configuring a Router Password
ARP Configuring the Login Banner
ARP Table Telnet vs. SSH Access
Host-to-Host Packet Delivery Demo - Passwords
Default Gateway Summary
Demo - Protocols Using the Cisco SDM
Host-Based Tools: ping Cisco Router and Security Device Manager
Host-Based Tools: Table What Is Cisco SDM?
Host-Based Tools: tracert Supported Cisco Routers and Cisco IOS Software Releases
Summary Configuring Your Router to Support SDM
Understanding Ethernet SDM Startup
Local Area Network Cisco SDM Main Window Layout and Navigation
LAN Components Cisco SDM Wizards
Functions of a LAN Summary
LAN Sizes Using a Cisco Router as a DHCP Server
Ethernet Evolution Understanding DHCP
LAN Standards DHCP
CSMA/CD Using a Router as a DHCP Server
Ethernet Frame Structure DHCP Server Using a Router
Communicating Within the LAN Additional Tasks
MAC Address Components DHCP Pool
MAC Addresses Checking the DHCP Configuration
Summary DHCP Pool Status
Connecting to an Ethernet LAN show ip dhcp conflict
Network Interface Card Summary
Comparing Ethernet Media Requirements Accessing Remote Devices
Differentiating Between Connections Using Telnet to Connect to Remote Devices
1000BASE-T GBIC Viewing Telnet Connections
Cisco Fiber-Optic GBICs Viewing SSH Connections
Unshielded Twisted-Pair Cable Suspending and Resuming a Telnet Session
RJ-45 Connector Demo - Telnet
RJ-45 Jack Closing a Telnet Session
UTP Implementation (Straight-Through/Crossover) Using the ping and traceroute Commands
UTP Implementation: Straight-Through vs. Crossover Summary
Using Varieties of UTP Chapter 4 Review
Summary Chapter 1 Review Chapter 5 - WAN Connections
Chapter 2 - Ethernet LANs Understanding WAN Technologies
Ethernet LANs Wide-Area Network
LAN Segment Limitations Need for WANs
Extending LAN Segments WANs vs. LANs
Collisions WAN Access and the OSI Reference Model
Multiple Collision Domains WAN Devices
Summary Physical Layer: WANs
Solving Network Challenges with Switched LAN Technology Serial Point-to-Point Connections
Network Congestion WAN—Multiple LANs
Bridges WAN Data-Link Protocols
LAN Switch WAN Link Options
LAN Switch Features Summary
Switches Supersede Bridges Enabling the Internet Connection
Switching Frames Packet Switching
LANs Today DSL
VLAN Overview DSL Service Types Overview
Summary DSL Considerations
Exploring the Packet Delivery Process Cable-Based WANs
Layer 2 Addressing The Global Internet
Layer 3 Addressing Getting an Interface Address from a DHCP Server
Host-to-Host Packet Delivery Network Address Translation
Summary Port Address Translation
Operating Cisco IOS Software Translating Inside Source Addresses
Cisco IOS Software Overloading an Inside Global Address
Configuring Network Devices Gathering the Required Information
An Overview of Cisco Device Startup Configuring the Client: Interface and Connection
External Configuration Sources Configuring the Client: WAN Wizard
Cisco IOS User Interface Functions Configuring the Client: Encapsulation
Cisco IOS Software EXEC Mode (User) Configuring the Client: IP Addressing
Cisco IOS Software EXEC Mode (Privileged) Configuring PAT: Advanced Options
Switch Command-Line Help Facilities Configuring PAT: Summary
Context-Sensitive Help Verifying the DHCP Client Configuration
Enhanced Editing Commands Displaying Information with show Commands
Router Command History Summary
Demo - Basic CLI Enabling Static Routing
Viewing the Configuration Router Operations
Show running-config and show startup-config Commands Identifying Static and Dynamic Routes
Summary Static Routes
Starting a Switch Static Route Configuration
Initial Startup of the Catalyst Switch Static Route Example
Catalyst 2960 Switch LED Indicators Default Routes
Initial Bootup Output from the Catalyst 2960 Switch Verifying the Static Route Configuration
Initial Configuration of the Catalyst 2960 Switch Using Setup Demo - Static Routes
Logging In to the Switch and Entering the Privileged EXEC Mode Summary
Configuring the Switch Configuring Serial Encapsulation
Configuring Switch Identification Circuit Switching
Configuring the Switch IP Address Public Switched Telephone Network
Configuring the Switch Default Gateway PSTN Considerations
Saving Configurations Leased Line
Showing Switch Initial Startup Status WAN Connection Bandwidth
Switch show version Command Configuring a Serial Interface
Switch show interfaces Command Serial Interface show controller Command
Managing the MAC Address Table Point-to-Point Considerations
Demo - Switch Configuration HDLC and Cisco HDLC
Summary Configuring HDLC Encapsulation
Starting a Switch Leased Line 2
Initial Startup of the Catalyst Switch PPP
Catalyst 2960 Switch LED Indicators An Overview of PPP
Initial Bootup Output from the Catalyst 2960 Switch Enable PPP Encapsulation
Initial Configuration of the Catalyst 2960 Switch Using Setup PPP Configuration Example
Logging In to the Switch and Entering the Privileged EXEC Mode Verifying a Serial Interface Configuration
Configuring the Switch Verifying the HDLC and PPP Encapsulation Configuration
Configuring Switch Identification Demo - Configuring Serial
Configuring the Switch IP Address Frame Relay
Configuring the Switch Default Gateway Frame Relay Devices and Virtual Circuits
Saving Configurations ATM and Cell Switching
Showing Switch Initial Startup Status Summary
Switch show version Command Enabling RIP
Switch show interfaces Command What Is a Routing Protocol?
Managing the MAC Address Table Autonomous Systems: Interior or Exterior Routing Protocols
Demo - Switch Configuration Classes of Routing Protocols
Summary Administrative Distance: Ranking Routes
Understanding Switch Security Classful Routing Protocol
Common Threats to Physical Installations Classless Routing Protocol
Configuring a Switch Password Distance Vector Routing Protocols
Configuring the Login Banner Sources of Information and Discovering Routes
Telnet vs. SSH Access RIP Overview
Configuring Port Security RIPv1 and RIPv2 Comparison
Verifying Port Security on the Catalyst 2960 Series IP Routing Configuration Tasks
Securing Unused Ports RIP Configuration Example
Disabling an Interface (Port) Verifying the RIP Configuration
Summary Displaying the IP Routing Table
Maximizing the Benefits of Switching debug ip rip Command
Microsegmentation Demo - RIP
Duplex Overview Summary Chapter 5 Review
Setting Duplex and Speed Options Chapter 6 - Network Environment Management
Showing Duplex Options Discovering Neighbors on the Network
The Hierarchy of Connectivity Cisco Discovery Protocol
Loops Discovering Neighbors with Cisco Discovery Protocol
Spanning Tree Protocol Using Cisco Discovery Protocol
Summary Using the show cdp neighbors Command
Troubleshooting Switch Issues Using the show cdp entry Command
The Layered Approach Additional Cisco Discovery Protocol Commands
Switched Media Issues Creating a Network Map
show interface Demo - CDP
Excessive Noise Summary
Excessive Collisions Managing Router Startup and Configuration
Late Collisions Router Power-On Boot Sequence
Port Access Issues Router Internal Components
Duplex-Related Issues ROM Functions
Speed-Related Issues Finding the Cisco IOS Image
Configuration Issues Loading the Cisco IOS Image from Flash Memory
Summary Loading the Configuration
Chapter 2 Review show running-config and show startup-config Commands
Chapter 3 - Wireless LANs Determining the Current Configuration Register Value
Wireless LANs Configuration Register Values
Market Trends show version Command
Differences Between WLAN and LAN show flash Command
Radio Frequency Transmission Summary
Organizations That Define WLAN Managing Cisco Devices
ITU-R with FCC Wireless Cisco IOS File System and Devices
IEEE 802.11 Standards Comparison Managing Cisco IOS Images
Wi-Fi Certification Verifying Memory and Deciphering Image Filenames
Summary Creating a Software Image Backup
Understanding WLAN Security Upgrading the Image from the Network
Wireless LAN Security Threats Device Configuration Files
Mitigating the Threats Cisco IOS copy Command
Evolution of Wireless LAN Security Cisco IOS copy Command Example
Wireless Client Association copy run tftp and copy tftp run Commands
How 802.1X Works on the WLAN show and debug Commands
WPA and WPA2 Modes Considerations When Using debug Commands
Summary Commands Related to debug
Implementing a WLAN Summary
802.11 Topology Building Blocks Chapter 6 Review
BSA Wireless Topology— Basic Coverage Course Closure
ESA Wireless Topology— Extended Cover
Wireless Topology Data Rates—802.11b
Access Point Configuration
Steps to Implement a Wireless Network
Wireless Clients
Common Wireless Network Issues
Wireless Troubleshooting
Summary
Chapter 3 Review

ICND2
Chapter 1 - Building a Simple Network Chapter 4 - LAN Connections
Building a Simple Network LAN Connections
Common Physical Components of a Network Routers
Course Introduction Chapter 5 - EIGRP Implementation
Course Introduction Implementing EIGRP
Chapter 1 - Small Network Implementation EIGRP Features
Introducing the Review Lab EIGRP Tables
Cisco IOS User Interface Functions EIGRP Path Calculation (Router C)
Overview of Cisco IOS Configuration Modes EIGRP Configuration
Help Facilities of the Cisco IOS CLI EIGRP and Discontiguous Networks Default Scenario Configuration
Commands Review Discussion EIGRP and Discontiguous Networks with no auto-summary
Access to the Remote Labs Verifying the EIGRP Configuration
Summary debug ip eigrp Command
Chapter 1 Review EIGRP Metric
Chapter 2 - Medium-Sized Switched Network Construction EIGRP Load Balancing
Implementing VLANs and Trunks EIGRP Unequal - Cost Load Balancing
Issues in a Poorly Designed Network Variance Example
VLAN Overview Demo - EIGRP
Designing VLANs for an Organization EIGRP MD5 Authentication
Guidelines for Applying IP Address Space EIGRP MD5 Authentication Configuration Steps
Network Traffic Types Configuring EIGRP MD5 Authentication
Advantages of Voice VLANs Example EIGRP MD5 Authentication Configuration
VLAN Operation Verifying MD5 Authentication
VLAN Membership Modes Summary
802.1Q Trunking Troubleshooting EIGRP
802.1Q Frame Components of Troubleshooting EIGRP
Understanding Native VLANs Troubleshooting EIGRP Neighbor Issues
VTP Features Troubleshooting EIGRP Routing Tables
VTP Modes Troubleshooting EIGRP Authentication
VTP Operation Troubleshooting EIGRP Authentication Problem
VTP Pruning Summary
Configuring VLANs and Trunks Chapter 5 Review
VTP Configuration Guidelines Chapter 6 - Access Control Lists
Creating a VTP Domain Introducing ACL Operation
VTP Configuration and Verification Example Why Use ACLs?
802.1Q Trunking Issues ACL Applications: Filtering
Configuring 802.1Q Trunking ACL Applications: Classification
Verifying a Trunk Outbound ACL Operation
VLAN Creation Guidelines A List of Tests: Deny or Permit
Adding a VLAN Types of ACLs
Verifying a VLAN How to Identify ACLs
Assigning Switch Ports to a VLAN IP Access List Entry Sequence Numbering
Verifying VLAN Membership ACL Configuration Guidelines
Demo - VLAN Dynamic ACLs
Executing Adds, Moves, and Changes for VLANs Reflexive ACLs
Summary Time-Based ACLs
Improving Performance with Spanning Tree Wildcard Bits: How to Check the Corresponding Address Bits
Interconnection Technologies Wildcard Bits to Match IP Subnets
Determining Equipment and Cabling Needs Wildcard Bit Mask Abbreviations
Advantages of EtherChannel Summary
Demo - Bridging Configuring and Troubleshooting ACLs
Redundant Topology Testing Packets with Numbered Standard IPv4 ACLs
Broadcast Frames Numbered Standard IPv4 ACL Configuration
Broadcast Storms Numbered Standard IPv4 ACL Example 1
Multiple Frame Copies Numbered Standard IPv4 ACL Example 2
MAC Database Instability Numbered Standard IPv4 ACL Example 3
Demo - STP Demo - Standard ACL
Loop Resolution with STP Standard ACLs to Control vty Access
Spanning-Tree Operation Demo - Access Class
STP Root Bridge Selection Testing Packets with Numbered Extended IPv4 ACLs
Spanning-Tree Port States Numbered Extended IPv4 ACL Configuration
Demo - BPDU Numbered Extended IPv4 ACL Example 1
Describing PortFast Numbered Extended IPv4 ACL Example 2
Configuring and Verifying PortFast Demo - Extended ACL
Spanning-Tree Operation Example Named IP ACL Configuration
Spanning-Tree Path Cost Named Standard IPv4 ACL Example
Spanning-Tree Recalculation Named Extended IPv4 ACL Example
Per VLAN Spanning Tree Plus Commenting ACL Statements
PVST+ Extended Bridge ID Demo - Named ACL
Demo - SwitchConfig Monitoring ACL Statements
Rapid Spanning Tree Protocol Verifying ACLs
Default Spanning-Tree Configuration Troubleshooting Common ACL Errors
PVRST+ Configuration Guidelines Summary
PVRST+ Implementation Commands Chapter 6 Review
Verifying PVRST+ Chapter 7 - Address Space Management
Configuring the Root and Secondary Bridges Scaling the Network with NAT and PAT
Configuring the Root and Secondary Bridges: SwitchA Network Address Translation
Configuring the Root and Secondary Bridges: SwitchB Port Address Translation
Summary Translating Inside Source Addresses
Routing Between VLANs Configuring and Verifying Static Translation
VLAN-to-VLAN Overview Enabling Static NAT Address Mapping Example
Dividing a Physical Interface into Subinterfaces Configuring and Verifying Dynamic Translation
Routing Between VLANs with 802.1Q Trunks Dynamic Address Translation Example
Summary Overloading an Inside Global Address
Securing the Expanded Network Configuring Overloading
Overview of Switch Security Overloading an Inside Global Address Example
Recommended Practices: New Switch Equipment Clearing the NAT Translation Table
Recommended Practices: Switch Security Demo - NAT
Port Security Translation Not Occurring: Translation Not Installed in the Table
802.1X Port-Based Authentication Displaying Information with show and debug Commands
Summary Translation Occurring: Installed Translation Entry Not Being Used
Troubleshooting Switched Networks Sample Problem: Cannot Ping Remote Host
Switches Troubleshooting Solution: Corrected Configuration
Troubleshooting Port Connectivity Summary
Troubleshooting VLANs and Trunks Transitioning to IPv6
Troubleshooting VTP IPv4 and IPv6
Troubleshooting Spanning Tree Why Do We Need a Larger Address Space?
Summary IPv6 Advanced Features
Chapter 2 Review IPv6 Address Representation
Chapter 3 - Medium-Sized Routed Network Construction IPv6 Address Types
Reviewing Routing Operations IPv6 Unicast Addressing
Static vs. Dynamic Routes IPv6 Global Unicast (and Anycast) Addresses
Demo - Static Route Link-Local Addresses
What Is a Dynamic Routing Protocol? Larger Address Space Enables Address Aggregation
Autonomous Systems: Interior and Exterior Routing Protocols Assigning IPv6 Global Unicast Addresses
Classes of Routing Protocols IPv6 EUI-64 Interface Identifier
Selecting the Best Route Using Metrics Stateless Autoconfiguration
Administrative Distance: Ranking Routing Sources DHCPv6 (Stateful)
Distance Vector Routing Protocols DHCPv6 Operation
Sources of Information and Discovering Routes IPv6 Routing Protocols
Maintaining Routing Information RIPng (RFC 2080)
Demo - RIP Review IPv4-to-IPv6 Transition
Inconsistent Routing Entries: Counting to Infinity and Routing Loops Cisco IOS Dual Stack
Counting to Infinity IPv6 Tunneling
Solution to Counting to Infinity: Defining a Maximum Manually Configured IPv6 Tunnel
Routing Loops Enabling IPv6 on Cisco Routers
Solution to Routing Loops: Split Horizon IPv6 Address Configuration Example
Solution to Routing Loops: Route Poisoning and Poison Reverse Cisco IOS IPv6 Name Resolution
Solution to Routing Loops: Hold-Down Timers Configuring and Verifying RIPng for IPv6
Triggered Updates RIPng for IPv6 Configuration Example
Eliminating Routing Loops Summary
Link-State Routing Protocols Chapter 7 Review
OSPF Hierarchical Routing Chapter 8 - LAN Extension into a WAN
Link-State Routing Protocol Algorithms Introducing VPN Solutions
Benefits and Drawbacks of Link-State Routing What Is a VPN?
Summary Benefits of VPN
Implementing VLSM Site-to-Site VPNs
Subnetting Review Remote-Access VPNs
Possible Subnets and Hosts for a Class C Network Cisco Easy VPN
Possible Subnets and Hosts for a Class B Network Cisco IOS IPsec SSL VPN (WebVPN)
Possible Subnets and Hosts for a Class A Network VPN-Enabled Cisco IOS Routers
Subnetting Review Exercise Cisco ASA Adaptive Security Appliances
What Is a Variable-Length Subnet Mask? VPN Clients
A Working VLSM Example What Is IPsec?
Understanding Route Summarization IPsec Security Services
Classful Routing Overview Confidentiality (Encryption)
Classless Routing Overview Encryption Algorithms
Summarizing Within an Octet DH Key Exchange
Summarizing Addresses in a VLSM-Designed Network Data Integrity
Route Summarization Operation in Cisco Routers Authentication
Demo - VLSM IPsec Security Protocols
Summarizing Routes in a Discontiguous Network IPsec Framework
Summary Summary
Chapter 3 Review Establishing a Point-to-Point WAN Connection with PPP
Chapter 4 - Single-Area OSPF Implementation Typical WAN Encapsulation Protocols
Implementing OSPF An Overview of PPP
OSPF Overview PPP Session Establishment
OSPF Hierarchy Example PPP Authentication Protocols: PAP
Neighbor Adjacencies: The Hello Packet PPP Authentication Protocols: CHAP
SPF Algorithm Configuring PPP and Authentication Overview
Configuring Single - Area OSPF Configuring PPP and Authentication
Configuring Loopback Interfaces PPP and CHAP Configuration Example
Verifying the OSPF Configuration Demo - CHAP
OSPF debug Commands Verifying the PPP Encapsulation Configuration
Demo - OSPF Verifying PPP Authentication
Load Balancing with OSPF Verifying PPP Negotiation
OSPF Authentication Summary
Configuring OSPF Plaintext Password Authentication Establishing a WAN Connection with Frame Relay
Plaintext Password Authentication Configuration Example Frame Relay Overview
Verifying Plaintext Password Authentication Frame Relay Terminology
Summary Selecting a Frame Relay Topology
Troubleshooting OSPF Resolving NBMA Reachability Issues
Components of Troubleshooting OSPF Frame Relay Address Mapping
Troubleshooting OSPF Neighbor Adjacencies Frame Relay Signaling
Troubleshooting OSPF Routing Tables Stages of Inverse ARP and LMI Operation
Troubleshooting Plaintext Password Authentication Problems Configuring Basic Frame Relay
Summary Configuring a Static Frame Relay Map
Chapter 4 Review Configuring Frame Relay Subinterfaces
Configuring Frame Relay Point-to-Point Subinterfaces
Configuring Frame Relay Multipoint Subinterfaces
Verifying Frame Relay Operation
Demo - Frame Relay
Summary
Troubleshooting Frame Relay WANs
Components of Troubleshooting Frame Relay
Troubleshooting a Frame Relay Link That Is Down
Troubleshooting Frame Relay Remote Router Connectivity
Troubleshooting Frame Relay End-to-End Connectivity
Summary
Chapter 8 Review
Course Closure

You might also like