1.0 |
Implementing Layer 2 Technologies
Configuring and Troubleshooting Layer 2 Technologies |
1.01 |
Frame Relay |
1.01.1 |
Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP |
1.01.2 |
Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP |
1.01.3. |
Frame Relay Multipoint Link on a Subinterface Using Inverse ARP |
1.01.4. |
Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP |
1.01.5. |
Frame Relay Point-to-Point Subinterfaces |
1.01.6. |
PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side |
1.01.7. |
Authentication on a Frame Relay Link Using PPP |
1.2 |
Catalyst Configuration |
1.2.01. |
Trunks Using an Industry-Standard Encapsulation |
1.2.02. |
Trunks Using a Cisco Proprietary Encapsulation |
1.2.03. |
Creating, Deleting, and Editing VLANs |
1.2.04. |
VTP in Client/Server Mode |
1.2.05. |
VTP in Transparent Mode |
1.2.06. |
VTP Authentication |
1.2.07. |
VTP Pruning |
1.2.08. |
Controlling VLANs That Cross a Trunk |
1.2.09. |
Optimizing STP by STP Timers |
1.2.10. |
PortFast |
1.2.11. |
Loop Guard |
1.2.12. |
BPDU Guard |
1.2.13. |
BPDU Filters |
1.2.14. |
UplinkFast |
1.2.15. |
BackboneFast |
1.2.16. |
MSTP |
1.2.17. |
Selecting the Root Bridge for VLANs in a PVST Environment |
1.2.18. |
Selecting the Root Bridge for an MST Instance in an MST Environment |
1.2.19. |
Setting the Port Priority to Designate the Forwarding Ports |
1.2.20. |
EtherChannel Using an Industry-Standard Protocol |
1.2.21. |
EtherChannel Using a Cisco Proprietary Protocol |
1.2.22. |
Disabling Protocols on the EtherChannel |
1.2.23. |
Load-Balancing Type on the EtherChannel |
1.2.24. |
SNMP Management on the Switch |
1.2.25. |
Telnet and SSH Management on the Switch |
1.2.26. |
Controlling Inbound and Outbound Telnet on the Switch |
1.2.27. |
Regular and Smart Macros |
1.2.28. |
Switch Banners |
1.2.29. |
UDLD |
1.2.30. |
Switch Virtual Interfaces (SVIs) for IP Routing |
1.2.31. |
Router on a Stick |
1.2.32. |
SPAN |
1.2.33. |
RSPAN |
1.2.34. |
IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP |
1.2.35. |
IP Phones to Connect to the Catalyst Switch |
1.2.36. |
Dot1q Tunneling |
1.3 |
Other Layer 2 Technologies |
1.3.1. |
HDLC |
1.3.2. |
PPP |
1.3.3. |
PPP over Ethernet |
2.0 |
Implementing IPv4
Configuring and Troubleshooting IPv4 |
2.1. |
IPv4 Addressing |
2.1.1. |
IPv4 Addressing |
2.1.2. |
IPv4 Subnetting |
2.1.3. |
IPv4 VLSM |
2.2. |
OSPFv2 |
2.2.01. |
OSPF on a Broadcast Multicast Access Network (Ethernet) |
2.2.02. |
OSPF over a Frame Relay Multipoint Network by Changing Network Types |
2.2.03. |
OSPF over a Frame Relay Multipoint Network by Using the neighbor Command |
2.2.04. |
OSPF over a Frame Relay Point-to-Point Network |
2.2.05. |
Virtual Links |
2.2.06. |
Stub Areas |
2.2.07. |
Totally Stubby Areas |
2.2.08. |
NSSA Areas |
2.2.09. |
NSSA and Stub Areas |
2.2.10. |
NSSA and Totally Stubby Areas |
2.3. |
EIGRP |
2.3.1. |
Basic EIGRP |
2.3.2. |
Passive Interfaces |
2.3.3. |
EIGRP Stub on Routers and Switches |
2.3.4. |
EIGRP Update—Bandwidth Control |
2.3.5. |
Changing the Administrative Distance of EIGRP |
2.3.6. |
Unequal-Cost Load Balancing for EIGRP |
2.4. |
Filtering, Redistribution, and Summarization |
2.4.01. |
Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix Lists |
2.4.02. |
Route Filtering for OSPF Between Areas |
2.4.03. |
Summarization of OSPF Routes Between Areas |
2.4.04. |
Summarization of External Routers Within OSPF |
2.4.05. |
Filtering with a Distribute List Using an ACL and Prefix Lists |
2.4.06. |
Using Advanced ACLs and a Prefix List for Filtering Routes |
2.4.07. |
Summarizing Routes with EIGRP |
2.4.08. |
Route Summarization for RIP |
2.4.09. |
Redistribution Between OSPF and EIGRP |
2.4.10. |
Redistribution Between RIP and EIGRP |
2.4.11. |
Redistribution of Directly Connected Routes |
2.4.12. |
Redistribution of Static Routes |
2.4.13. |
Redistribution with Filtering Using ACLs and Prefix Lists |
2.4.14. |
Redistribution with Filtering Using Route Tagging |
2.5. |
IBGP |
2.5.1. |
IBGP Peering |
2.5.2. |
Advertising Routes in BGP |
2.5.3. |
Next-Hop Attribute |
2.5.4. |
Route Reflectors |
2.5.5. |
Redundancy by Neighbor Relationships Based on Loopbacks |
2.6. |
EBGP |
2.6.1. |
EBGP Peering |
2.6.2. |
EBGP Peering Based on Loopbacks |
2.7. |
BGP Advanced Features |
2.7.01. |
Filtering Using ACLs |
2.7.02. |
Filtering Using Prefix Lists |
2.7.03. |
Filtering Using AS Path Filters |
2.7.04. |
Redistributing Connected Routes into BGP |
2.7.05. |
Redistributing Dynamic Routing Protocols into BGP |
2.7.06. |
BGP Aggregation |
2.7.07. |
BGP Aggregation with the Summary Only Parameter |
2.7.08. |
BGP Aggregation with Suppress Maps |
2.7.09. |
BGP Aggregation with Unsuppress Maps |
2.7.10. |
BGP Best-Path Selection – Weight |
2.7.11. |
BGP Best-Path Selection – Local Preference |
2.7.12. |
BGP Best-Path Selection – MED |
2.7.13. |
BGP Communities – No-Export |
2.7.14. |
BGP Communities – No-Advertise |
2.7.15. |
BGP Confederation |
2.7.16. |
BGP Local AS |
2.7.17. |
Working with Private AS Numbers |
2.7.18. |
Route Dampening |
2.7.19. |
Conditional Advertising |
2.7.20. |
Peer Groups |
3.0 |
Implementing IPv6
Configuring and Troubleshooting IPv6 |
3.1. |
IPv6 |
3.1.1. |
IPv6 Addresses |
3.1.2. |
OSPFv3 |
3.1.3. |
EIGRPv6 |
3.1.4. |
IPv6 Tunneling |
3.1.5. |
IPv6 on a Frame Relay Network – Multipoint |
3.1.6. |
IPv6 on a Frame Relay Network – Point-to-Point |
3.1.7. |
Route Filtering with a Distribute List Using an ACL and Prefix Lists |
3.1.8. |
Route Redistribution Between OSPFv3 and EIGRPv6 |
4.0 |
Implementing MPLS
Configuring and Troubleshooting MPLS |
4.1. |
MPLS Unicast Routing |
4.1.1. |
MPLS Unicast Routing Using LDP |
4.1.2. |
Controlling Label Distribution |
4.2. |
MPLS VPN |
4.2.1. |
MPLS VPN Using Static Routing Between PE-CE |
4.2.2. |
MPLS VPN Using EIGRP as the PE-CE Routing Protocol |
4.2.3. |
MPLS VPN Using OSPF as the PE-CE Routing Protocol |
4.2.4. |
MPLS VPN Using EBGP as the PE-CE Routing Protocol |
4.2.5. |
Controlling Route Propagation Using the Route Target with Import and Export Maps |
4.3. |
VRF-Lite |
4.3.1. |
VRFs at the Customer Sites Using VRF-Lite |
5.0 |
Implementing IP Multicast
Configuring and Troubleshooting IP Multicast |
5.1. |
PIM and Bidirectional PIM |
5.1.1. |
PIM Dense Mode |
5.1.2. |
PIM on an NMBA Network |
5.1.3. |
PIM Sparse Mode – Static Rendezvous Point |
5.1.4. |
PIM Sparse Mode – Multiple Static Rendezvous Points |
5.1.5. |
PIM Sparse Mode – Auto Rendezvous Point |
5.1.6. |
PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point |
5.1.7. |
Bidirectional PIM |
5.2. |
MSDP |
5.2.1. |
MSDP |
5.2.2. |
MSDP to an Anycast Rendezvous Point |
5.3. |
Multicast Tools |
5.3.1. |
Multicast Rate Limiting |
5.3.2. |
IGMP Filtering on the Switch |
5.3.3. |
Use of the Switch to Block Multicast Traffic |
5.3.4. |
Multicasting Through a GRE Tunnel |
5.3.5. |
Multicast Helper Address |
5.4. |
IPv6 Multicast |
5.4.1. |
IPv6 Multicast Routing Using PIM |
5.4.2. |
IPv6 Multicast Listener Discovery (MLD) Protocol |
6.0 |
Implementing Network Security
Configuring and Troubleshooting Network Security |
6.1. |
AAA and Security Server Protocols |
6.1.1. |
Use of a Router to Authenticate Against a AAA Server Using TACACS+ |
6.1.2. |
Use of a Router to Authenticate Against a AAA Server Using RADIUS |
6.1.3. |
Local Privilege Authorization |
6.1.4. |
Accounting to a AAA Server Using TACACS+ |
6.1.5. |
Accounting to a AAA Server Using RADIUS |
6.2. |
Access Lists |
6.2.1. |
Standard Access Lists |
6.2.2. |
Extended Access Lists |
6.2.3. |
Time-Based Access Lists |
6.2.4. |
Reflexive Access Lists |
6.3. |
Routing Protocol Security |
6.3.1. |
Routing Protocol Authentication for EIGRP |
6.3.2. |
Routing Protocol Authentication for OSPF – Area-Wide |
6.3.3. |
Routing Protocol Authentication for OSPF – Interface-Specific |
6.3.4. |
Routing Protocol Authentication for OSPF Virtual Links |
6.3.5. |
Routing Protocol Authentication for BGP |
6.4. |
Catalyst Security |
6.4.1. |
Storm Control |
6.4.2. |
Switch Port Security |
6.4.3. |
Dot1x Authentication |
6.4.4. |
Dot1x Authentication for VLAN Assignment |
6.4.5. |
VLAN Access Maps |
6.4.6. |
DHCP Snooping |
6.4.7. |
DAI |
6.4.8. |
IP Source Guard |
6.4.9. |
Private VLANs |
6.5. |
Cisco IOS and Zone-Based Firewalls |
6.5.1. |
Basic Cisco IOS Firewall |
6.5.2. |
DoS Protection on a Cisco IOS Firewall |
6.5.3. |
Basic Zone-Based Firewall |
6.5.4. |
Zone-Based Firewall with Deep Packet Inspection |
6.6. |
NAT |
6.6.1. |
Dynamic NAT |
6.6.2. |
PAT |
6.6.3. |
Static NAT |
6.6.4. |
Static PAT |
6.6.5. |
Policy-Based NAT |
6.7. |
Other Security Features |
6.7.1. |
Configuring the TCP Intercept Feature |
6.7.2. |
Configuring Blocking of Fragment Attacks |
6.7.3. |
Configuring Switch Security Features |
6.7.4. |
Configuring Antispoofing Using an ACL |
6.7.5. |
Configuring Antispoofing Using uRPF |
6.7.6. |
SSH on Routers and Switches |
6.7.7. |
Cisco IOS IPS |
6.7.8. |
Controlling Telnet and SSH Access to the Router and Switch |
7.0 |
Implementing Network Services
Configuring and Troubleshooting Network Services |
7.1. |
DHCP |
7.1.1. |
Configuring DHCP on a Cisco IOS Router |
7.1.2. |
Configuring DHCP on a Switch |
7.1.3. |
Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address) |
7.2. |
HSRP |
7.2.1. |
HSRP Between Two Routers |
7.2.2. |
Pre-empt for HSRP |
7.2.3. |
Authentication for HSRP |
7.2.4. |
VRRP |
7.2.5. |
GLBP |
7.3. |
IP Services |
7.3.1. |
Use of the Router for WCCP |
7.3.2. |
Use of the Router to Generate an Exception Dump Using TFTP |
7.3.3. |
Use of the Router to Generate an Exception Dump Using FTP |
7.3.4. |
Use of the Router to Generate an Exception Dump Using RCP |
7.3.5. |
Broadcast Forwarding for Protocols |
7.4. |
System Management |
7.4.1. |
Telnet Management on the Router and Switch |
7.4.2. |
SSH Management on the Router and Switch |
7.4.3. |
Disabling Telnet and the SSH Client on the Switch |
7.4.4. |
HTTP Management on the Router and Switch |
7.4.5. |
Controlling HTTP Management on the Router and Switch |
7.5. |
NTP |
7.5.1. |
NTP Using the NTP Master and NTP Server Commands |
7.5.2. |
NTP Without Using the NTP Server |
7.5.3. |
NTP Using NTP Broadcast Commands |
8.0 |
Implementing QoS
Configuring and Troubleshooting QoS |
8.1. |
Classification |
8.1.1. |
Marking Using DSCP |
8.1.2. |
Marking Using IP Precedence |
8.1.3. |
Marking Using CoS |
8.2. |
Congestion Management and Congestion Avoidance |
8.2.1. |
Priority Queuing |
8.2.2. |
Custom Queuing |
8.2.3. |
Weighted Fair Queuing |
8.2.4. |
WRED |
8.2.5. |
RSVP |
8.3. |
Policing and Shaping |
8.3.1. |
CAR Using Rate Limiting Under the Interface |
8.3.2. |
Frame Relay Traffic Shaping Using Map Classes |
8.3.3. |
Discard Eligible List |
8.4. |
Link Efficiency Mechanisms |
8.4.1. |
Compression |
8.4.2. |
Link Fragmentation and Interleaving (LFI) for Frame Relay |
8.5. |
Modular QoS CLI |
8.5.1. |
Policing |
8.5.2. |
Class-Based Weighted Fair Queuing (CB-WFQ) |
8.5.3. |
Low Latency Queuing (LLQ) |
8.5.4. |
Shaping Using MQC |
8.5.5. |
Random Early Detection Using MQC |
8.5.6. |
WRED Using MQC |
8.5.7. |
Using NBAR for QoS |
8.5.8. |
Discard Eligible Marking Using MQC |
8.6. |
Catalyst QoS |
8.6.1. |
WRR on the Catalyst Switch |
9.0 |
Troubleshooting a Network
Troubleshooting Network-Wide Connectivity Issues |
9.1. |
Troubleshooting Layer 2 Problems |
9.1.1. |
Troubleshooting Catalyst Switch Network Issues |
9.1.2. |
Troubleshooting Frame Relay Network Issues |
9.2. |
Troubleshooting Layer 3 Problems |
9.2.1. |
Troubleshooting IP Addressing Network Issues |
9.2.2. |
Troubleshooting Routing Protocol Network Issues |
9.2.3. |
Troubleshooting Routing Protocol Loop Issues |
9.3. |
Troubleshooting Application Problems |
9.3.1. |
Determining Which Aspects of the Network to Troubleshoot to Determine Network Functionality (Given a Set of Symptoms) |
9.4. |
Troubleshooting Network Services |
9.4.1. |
Troubleshooting Misconfigured NTP Setup |
9.4.2. |
Troubleshooting Misconfigured DHCP Setup |
9.4.3. |
Troubleshooting Misconfigured Telnet and SSH Setup |
9.4.4. |
Troubleshooting Misconfigured SNMP Setup |
9.5. |
Troubleshooting Security Services |
9.5.1. |
Troubleshooting Misconfigured ACLs |
9.5.2. |
Troubleshooting Misconfigured NAT |
9.5.3. |
Troubleshooting Misconfigured AAA Services |
10.0 |
Optimizing a Network
Configuring and Troubleshooting Optimization of a Network |
10.1. |
Logging In |
10.1.1. |
Logging into a Remote Syslog Server |
10.1.2. |
Logging into the Internal Buffer |
10.2. |
SNMP |
10.2.1. |
Use of a Router to Communicate to an SNMP Management Station |
10.2.2. |
Use of a Router to Generate SNMP Traps |
10.3. |
RMON |
10.3.1. |
Use of a Router to Generate SNMP Traps Using RMON |
10.4. |
Accounting |
10.4.1. |
IP Accounting |
10.5. |
SLA |
10.5.1. |
IP SLA |
10.6. |
Implementing Network Services on the Routers |
10.6.1. |
Use of a Router as an FTP Server |
10.6.2. |
Use of a Router as a TFTP Server |
10.6.3. |
Cisco IOS Embedded Event Manager |
10.6.4. |
NetFlow |
10.6.5. |
HTTP and HTTPS on a Router |
10.6.6. |
Telnet on a Router |
10.6.7. |
Implementing Secure Copy Protocol (SCP) on a Router |