Internetworking
Internetworking Basics
Internetworking Models
The OSI Reference Model
Ethernet Networking
Ethernet Cabling
Data Encapsulation
The Cisco Three-Layer Hierarchical Model
Introduction to TCP/IP
TCP/IP and the DoD Model
The Host-to-Host Layer Protocols
The Internet Layer Protocols
IP Addressing
IP Terminology
The Hierarchical IP Addressing Scheme
Real & Private IP Addresses
Network & Broadcast Addresses
Subnetting, Variable Length Subnet Masks
Subnetting Basics
IP Subnet-Zero
How to Create Subnets
Subnet Masks
Classless Inter-Domain Routing (CIDR)
Subnetting Class C Addresses
Subnetting Class B Addresses
Subnetting Class A Addresses
Variable Length Subnet Masks (VLSMs)
VLSM Design
Implementing VLSM Networks
Summarization
Cisco's Internetworking Operating System (IOS) and
Security Device Manager (SDM)
The IOS User Interface
Cisco Router IOS
Connecting to a Cisco Router
Command-Line Interface (CLI)
Router and Switch Administrative Configurations
Router Interfaces
Viewing, Saving, and Erasing Configurations
Cisco’s Security Device Manager (SDM)
Managing a Cisco Internetwork
The Internal Components of a Cisco Router
The Router Boot Sequence
Managing Configuration Register
Backing Up and Restoring the Cisco IOS
Backing Up and Restoring the Cisco Configuration
Using Cisco Discovery Protocol (CDP)
Using Telnet
Resolving Hostnames
IP Routing
Routing Basics
The IP Routing Process
Configuring IP Routing in Our Network
Dynamic Routing
Distance-Vector Routing Protocols
Routing Information Protocol (RIP)
Interior Gateway Routing Protocol (IGRP)
Enhanced IGRP (EIGRP) and Open Shortest Path First
(OSPF)
EIGRP Features and Operation
Using EIGRP to Support Large Networks
Configuring EIGRP
Load Balancing with EIGRP
Verifying EIGRP
Open Shortest Path First (OSPF) Basics
Configuring OSPF
Verifying OSPF Configuration
OSPF DR and BDR Elections
OSPF and Loopback Interfaces
Troubleshooting OSPF
Configuring EIGRP and OSPF Summary Routes
|
Layer 2 Switching and Spanning Tree Protocol (STP)
Layer 2 Switching
Switching Services
Limitations of Layer 2 Switching
Bridging vs. LAN Switching
Spanning Tree Protocol (STP)
Configuring Catalyst Switches
Cisco Network Assistant
Virtual LANs (VLANs)
VLAN Basics
VLAN Memberships
Static VLANs
Dynamic VLANs
Identifying VLANs
VLAN Trunking Protocol (VTP)
Routing between VLANs
Configuring VLANs
Configuring VTP
Telephony: Configuring Voice VLANs
Using the CNA to Configure VLANs and Inter-VLAN Routing
Security
Perimeter, Firewall, and Internal Routers
Recognizing Security Threats
Mitigating Security Threats
Introduction to Access Lists
Standard Access Lists
Extended Access Lists
Advanced Access Lists
Monitoring Access Lists
Configuring Access Lists Using SDM
Cisco's Wireless Technologies
Introduction to Wireless Technology
Cisco’s Unified Wireless Solution
Split-MAC Architecture
MESH and LWAPP
Wireless Security
Network Address Translation (NAT)
When Do We Use NAT?
Types of Network Address Translation
NAT Names
How NAT Works
Static NAT Configuration
Dynamic NAT Configuration
PAT (Overloading) Configuration
Simple Verification of NAT
Testing and Troubleshooting NAT
Configuring NAT on Our Internetwork
Configuring NAT Using SDM
Internet Protocol Version 6 (IPv6)
Why Do We Need IPv6?
The Benefits and Uses of IPv6
IPv6 Addressing and Expressions
How IPv6 Works in an Internetwork
IPv6 Routing Protocols
Migrating to IPv6
Configuring IPv6 on Our Internetwork
Wide Area Networks
Introduction to Wide Area Networks
Cable and DSL
Cabling the Serial Wide Area Network
High-Level- Data-Link Control (HDLC) Protocol
Point-to-Point Protocol (PPP)
Frame Relay
Using SDM for WAN Connections
Virtual Private Networks |