Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
 Search:   
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
 
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
I.T
 .NET
 Windows 8
 Adobe CS6
 Cisco
 CCNA 2012
 CCNP 2012
 Java
 VB
 ASP
 Web Design
 E-Commerce
 Project Management
 ITIL
 Macintosh
 Mobile Devices
 Linux
 Windows Server 2012
 SQL Server 2012
 SAP
Certification
 MCITP
 MCTS
Economics and Business
 Accounting
 Business Information Systems
 Economics
 Finance
 Management
 Marketing
 TAX
 Human Resources
Academic
 Law
 Nursing
 Medical
 Psychology
 Engineering

Introducing Routing and Switching in the Enterprise, CCNA Discovery Learning Guide

by: Allan Reid ; Jim Lorenz ; Cheryl A. Schmidt , Florida Community College, Jacksonville;

Notify me when in stock

On-line Price: $60.03 (includes GST)

Paperback w/ CD package 888

13%Off Retail Price

You save: $9.23

Usually ships within 4 - 5 business days.

Retail Price: $69.26

Publisher: CISCO PRESS,12/05/2008

Category: Cisco Level: B/I/A

ISBN: 1587132117
ISBN13: 9781587132117

Add to Shopping Cart

Description


    top


Audience: Networking Basics, undergraduate and high school

Format: Paperback

Approach: Aligned to the online curriculum from Cisco, and the ONLY official companion product for the CCNA 3 Discovery Introduction to Routing and Switching in the Enterprise Course.

Competitors: Lammle (Sybex), Hudson (Thomson)



Features and Benefits

top


The all-new authorized textbook for the final course of the new Cisco Networking Academy CCNA Discovery curriculum


  *


        A portable reference that aligns 1:1 with the online course modules


  *


      Numerous features to enhance learning and assist in concept retention


  *


      Written by Academy instructors and the course developers


  *


      Textbook and labs all in one book



Table of Contents

top


Introduction xxix

Part I: Concepts

Chapter 1 Networking in the Enterprise 3

Objectives 3

Key Terms 3

Describing the Enterprise Network 4

Supporting the Business Enterprise 5

Traffic Flow in the Enterprise Network 5

Enterprise Campus 8

Enterprise Edge 8

Service Provider Edge 10

Enterprise LANs and WANs 10

Intranets and Extranets 12

Identifying Enterprise Applications 12

Traffic Flow Patterns 12

Applications and Traffic on an Enterprise Network 13

Network Traffic Prioritization 14

Data Traffic 14

Voice and Video Traffic 14

Supporting Remote Workers 15

Teleworking 15

Virtual Private Networks 16

Summary 18

Activities and Labs 18

Check Your Understanding 19

Challenge Questions and Activities 20

Chapter 2 Exploring the Enterprise Network Infrastructure 21

Objectives 21

Key Terms 21

Describing the Current Network 22

Enterprise Network Documentation 22

Business Continuity Plan 24

Business Security Plan 25

Network Maintenance Plan 25

Service-Level Agreement 25

Network Operations Center (NOC) 26

Telecommunication Room Design and Considerations 29

Supporting the Enterprise Edge 31

Service Delivery at the Point of Presence 31

Security Considerations at the Enterprise Edge 32

Connecting the Enterprise Network to External Services 33

Reviewing Routing and Switching 34

Router Hardware 35

Out-of-Band Management 37

In-Band Management 38

Basic Router CLI show Commands 38

Basic Router Configuration Using CLI 46

Switch Hardware 48

Basic Switch CLI Commands 50

Summary 59

Activities and Labs 59

Check Your Understanding 60

Challenge Questions and Activities 63

Chapter 3 Switching in an Enterprise Network 65

Objectives 65

Key Terms 65

Describing Enterprise-Level Switching 67

Switching and Network Segmentation 67

Multilayer Switching 68

Layer 2 69

Layer 3 69

Types of Switching 69

Store-and-Forward 70

Cut-Through Switching 70

Switch Security 70

Preventing Switching Loops 71

Redundancy in a Switched Network 72

Multiple Frame Transmissions 74

MAC Database Instability 75

Spanning Tree Protocol (STP) 75

Blocking 77

Listening 77

Learning 77

Forwarding 77

Disabled 77

Root Bridges 78

Spanning Tree in a Hierarchical Network 79

PortFast 80

UplinkFast 80

BackboneFast 81

STP Diagnostic show Commands 81

Rapid Spanning Tree Protocol (RSTP) 85

Configuring VLANs 85

Virtual LAN 85

Static VLANs 86

Dynamic VLANs 87

Configuring a Virtual LAN 87

Identifying VLANs 91

Trunking and Inter-VLAN Routing 92

Trunk Ports 92

Access Port 93

Trunk Port 93

Extending VLANs Across Switches 94

Inter-VLAN Switching 95

Maintaining VLANs on an Enterprise LAN 97

VLAN Trunking Protocol (VTP) 97

VTP Modes 98

VTP Revision Numbers 98

VTP Message Types 99

Configuring VTP 99

VLAN Support for IP Telephony and Wireless 102

VLAN Best Practices 103

Summary 105

Activities and Labs 105

Check Your Understanding 106

Challenge Questions and Activities 108

Chapter 4 Addressing in an Enterprise Network 109

Objectives 109

Key Terms 109

Using a Hierarchical IP Network Address Scheme 110

Flat and Hierarchical Networks 110

Hierarchical Network Addressing 112

Using Subnetting to Structure the Network 115

Using VLSM 116

Subnet Mask 117

Calculating Subnets Using Binary Representation 118

Basic Subnetting Process 120

Variable-Length Subnet Masks (VLSM) 122

Implementing VLSM Addressing 124

Using Classless Routing and CIDR 129

Classful and Classless Routing 129

CIDR and Route Summarization 132

Calculating Route Summarization 135

Discontiguous Subnets 136

Subnetting and Addressing Best Practices 138

Using NAT and PAT 140

Private IP Address Space 140

NAT at the Enterprise Edge 142

Static and Dynamic NAT 142

Configuring Static NAT 144

Configuring Dynamic NAT 145

Using PAT 146

Summary 149

Activities and Labs 149

Check Your Understanding 150

Challenge Questions and Activities 154

Chapter 5 Routing with a Distance Vector Protocol 157

Objectives 157

Key Terms 157

Managing Enterprise Networks 159

Enterprise Networks 159

Enterprise Topologies 159

Star Topology 160

Partial Mesh 162

Full Mesh 162

Static and Dynamic Routing 163

Directly Connected Routes 164

Static Routes 164

Dynamic Routes 164

Comparing Static and Dynamic Routing 164

Configuring Static Routes 166

Default Route 168

Routing Using the RIP Protocol 170

Distance Vector Routing Protocols 170

Routing Information Protocol (RIP) 170

Configuring RIPv2 173

Problems with RIP 175

Verifying RIP 177

Routing Using the EIGRP Protocol 178

Limitations of RIP 178

Enhanced Interior Gateway Routing Protocol (EIGRP) 179

EIGRP Terminology and Tables 181

Neighbor Table 181

Topology Table 181

Routing Table 182

EIGRP Neighbors and Adjacencies 184

EIGRP Metrics and Convergence 186

Implementing EIGRP 189

Configuring EIGRP 189

Key Creation 191

Enabling Authentication 192

EIGRP Route Summarization 193

Verifying EIGRP Operation 195

Issues and Limitations of EIGRP 201

Summary 202

Activities and Labs 202

Check Your Understanding 203

Challenge Questions and Activities 205

Chapter 6 Routing with a Link-State Protocol 207

Objectives 207

Key Terms 207

Routing Using the OSPF Protocol 208

Link-State Protocol Operation 208

OSPF Metrics and Convergence 209

OSPF Neighbors and Adjacencies 212

OSPF Areas 216

Implementing Single-Area OSPF 218

Configuring Basic OSPF in a Single Area 218

Configuring OSPF Authentication 220

Tuning OSPF Parameters 222

Specifying the DR and BDR 222

Modifying Bandwidth Values 222

Verifying OSPF Operation 224

Using Multiple Routing Protocols 228

Configuring and Propagating a Default Route 228

Configuring OSPF Summarization 231

OSPF Issues and Limitations 232

Using Multiple Protocols in the Enterprise 233

Summary 237

Activities and Labs 237

Check Your Understanding 238

Challenge Questions and Activities 243

Chapter 7 Implementing Enterprise WAN Links 245

Objectives 245

Key Terms 245

Connecting the Enterprise WAN 247

WAN Devices and Technology 247

WAN Standards 250

Accessing the WAN 251

TDM 252

STDM 253

Packet and Circuit Switching 254

Dedicated Leased Line 254

Circuit Switching 254

Packet Switching 255

Cell Switching 255

Switched Virtual Circuit 256

Permanent Virtual Circuit 256

Last-Mile and Long-Range WAN Technologies 257

Comparing Common WAN Encapsulations 258

Ethernet and WAN Encapsulations 258

HDLC and PPP 260

HDLC 260

PPP 260

Configuring PPP 263

PPP Authentication 266

Password Authentication Protocol 266

Challenge Handshake Authentication Protocol 267

Configuring PAP and CHAP 268

Using Frame Relay 271

Overview of Frame Relay 271

Frame Relay Functionality 272

Inverse ARP 272

Local Management Interface 273

Summary 275

Activities and Labs 275

Check Your Understanding 276

Challenge Questions and Activities 277

Chapter 8 Filtering Traffic Using Access Control Lists 279

Objectives 279

Key Terms 279

Using Access Control Lists 280

Traffic Filtering 280

Access Control Lists 281

Types and Usage of ACLs 283

Standard ACLs 284

Extended ACLs 284

Named ACLs 284

ACL Processing 284

Using a Wildcard Mask 287

ACL Wildcard Mask Purpose and Structure 287

Analyzing the Effects of the Wildcard Mask 289

Configuring Access Control Lists 292

Placing Standard and Extended ACLs 292

Step 1: Determine Traffic-Filtering Requirements 292

Step 2: Decide Type of ACL to Suit Requirements 292

Step 3: Determine Router and Interface for ACL 294

Step 4: Determine Direction to Filter Traffic 294

Basic ACL Configuration Process 295

Configuring Numbered Standard ACLs 297

Configuring Numbered Extended ACLs 299

Configuring Named ACLs 302

Configure Router vty Access 304

Permitting and Denying Specific Types of Traffic 306

Configuring ACLs for Application and Port Filtering 306

Configuring ACLs to Support Established Traffic 308

Effects of NAT and PAT on ACL Placement 309

Analyzing Network ACLs and Placement 311

Configuring ACLs with Inter-VLAN Routing 313

ACL Logging and Best Practices 314

Using Logging to Verify ACL Functionality 314

Analyzing Router Logs 317

ACL Best Practices 318

Summary 319

Activities and Labs 320

Check Your Understanding 321

Challenge Questions and Activities 325

Chapter 9 Troubleshooting an Enterprise Network 327

Objectives 327

Key Terms 327

Understanding the Impact of Network Failure 328

Enterprise Network Requirements 328

Monitoring and Proactive Maintenance 330

Network Monitoring 330

Proactive Maintenance 332

Troubleshooting and the Failure Domain 332

Troubleshooting Process 334

Troubleshooting Switching and Connectivity Issues 336

Troubleshooting Basic Switching 336

Troubleshooting VLAN Configuration Issues 340

Access or Trunk Port 343

Native and Management VLANs 343

Troubleshooting VTP 343

Troubleshooting Routing Issues 345

RIP Issues 345

EIGRP Issues 351

OSPF Issues 358

Route Redistribution Issues 361

Troubleshooting WAN Configurations 366

Troubleshooting WAN Connectivity 367

Troubleshooting WAN Authentication 372

Troubleshooting ACL Issues 374

Determining If an ACL Is the Issue 374

ACL Configuration and Placement Issues 375

Summary 377

Activities and Labs 377

Check Your Understanding 378

Challenge Questions and Activities 381

Chapter 10 Putting It All Together 383

Summary Activity 384

Activities and Labs 384

Appendix A Check Your Understanding and Challenge Questions Answer Key 385

Chapter 1 385

Check Your Understanding 385

Challenge Questions and Activities 386

Chapter 2 386

Check Your Understanding 386

Challenge Questions and Activities 389

Chapter 3 389

Check Your Understanding 389

Challenge Questions and Activities 392

Chapter 4 392

Check Your Understanding 392

Challenge Questions and Activities 395

Chapter 5 395

Check Your Understanding 395

Challenge Questions and Activities 397

Chapter 6 397

Check Your Understanding 397

Challenge Questions and Activities 398

Chapter 7 399

Check Your Understanding 399

Challenge Questions and Activities 400

Chapter 8 400

Check Your Understanding 400

Challenge Questions and Activities 402

Chapter 9 403

Check Your Understanding 403

Challenge Questions and Activities 405

Glossary 407

Index 427

Part II: Labs

Chapter 1 Labs: Networking in the Enterprise 503

Lab 1-1: Capturing and Analyzing Network Traffic (1.2.2) 504

Task 1: Connect the Routers and Configure 505

Task 2: Connect the Host to the Switch and Configure 505

Task 3: Verify Connectivity Using Ping 505

Task 4: Launch Wireshark 506

Setting Wireshark to Capture Packets in Promiscuous Mode 508

Setting Wireshark for Network Name Resolution 508

Task 5: Ping PDU Capture 510

Task 6: Examine the Packet List Pane 511

Task 7: Examine the Packet Details Pane 511

Task 8: Perform an FTP PDU Capture 513

Task 9: Examine the Packet List Pane 514

Task 10: Examine Packet Details and Packet Byte Panes 514

Task 11: Perform an HTTP PDU Capture 515

Task 12: Examine the Packet List Pane 515

Task 13: Examine the Packet Details and Bytes Panes 515

Task 14: Analyze the Capture 515

Task 15: Reflection 517

Chapter 2 Labs: Exploring the Enterprise Network Infrastructure 519

Lab 2-1: Configuring Basic Routing and Switching (2.3.5) 520

Task 1: Connect PC1 to the Switch 521

Task 2: Perform an Initial Configuration on the Switch 521

Task 3: Configure the Switch Management Interface on VLAN 1 522

Task 4: Verify Configuration of the Switch 522

Task 5: Perform Basic Configuration of Router R1 522

Task 6: Configure Interfaces and Static Routing on Router R1 524

Task 7: Connect PC2 to Router R2 524

Task 8: Perform Basic Configuration of Router R2 524

Task 9: Connect the Internetwork 525

Task 10: Verify and Test the Configurations 525

Task 11: Remove Static Route and Configure a Routing Protocol on Router R1 526

Task 12: Remove Static Route and Configure a Routing Protocol on Router R2 526

Task 13: Verify and Test the Configurations 527

Task 14: Use the Switch Management Interface 528

Task 15: Reflection 530

Chapter 3 Labs: Switching in an Enterprise Network 531

Lab 3-1: Applying Basic Switch Security (3.1.4) 532

Task 1: Connect PC1 to the Switch 533

Task 2: Connect PC2 to the Switch 533

Task 3: Configure PC3 But Do Not Connect 533

Task 4: Perform an Initial Configuration on the Switch 533

Task 5: Configure the Switch Management Interface on VLAN 1 534

Task 6: Verify the Management LANs Settings 534

Task 7: Disable the Switch from Being an HTTP Server 535

Task 8: Verify Connectivity 535

Task 9: Record the Host MAC Addresses 535

Task 10: Determine What MAC Addresses the Switch Has Learned 536

Task 11: View the show mac-address-table Options 536

Task 12: Configure a Static MAC Address 536

Task 13: Verify the Results 536

Task 14: List Port Security Options 537

Task 15: Limit the Number of Hosts per Port 538

Task 16: Configure the Port to Shut Down if a Security Violation Occurs 538

Task 17: Show Port 0/4 Configuration Information 539

Task 18: Reactivate the Port 540

Task 19: Disable Unused Ports 540

Task 20: Reflection 540

Lab 3-2: Building a Switched Network with Redundant Links (3.2.3) 541

Task 1: Cable the Network 542

Task 2: Configure the Switches 542

Task 3: Configure the Hosts 542

Task 4: Verify Connectivity 543

Task 5: Examine Switch Hardware Information 543

Task 6: Examine the Spanning-Tree Tables on Each Switch 544

Task 7: Reassign the Root Bridge 545

Task 8: Look at the Spanning-Tree Table 546

Task 9: Verify the Running Configuration File on the Root Bridge 547

Task 10: Reflection 547

Lab 3-3: Verifying STP with show Commands (3.2.4) 548

Task 1: Cable the Network 549

Task 2: Configure the Switches 549

Task 3: Configure the Hosts 549

Task 4: Verify Connectivity 549

Task 5: Examine Switch Hardware Information 550

Task 6: Determine the Roles of Ports Participating in the Spanning Tree on

Each Switch 550

Task 7: Create a Change in the Network Topology 551

Task 8: Examine the Spanning Tree on Each Switch 552

Task 9: Reflection 554

Lab 3-4: Configuring, Verifying, and Troubleshooting VLANs (3.3.2) 555

Task 1: Connect the Equipment 556

Task 2: Perform Basic Configuration on the Router 556

Task 3: Configure the Switch 556

Task 4: Verify Connectivity and Default VLAN Configuration 556

Task 5: Configure VLANs on S1 557

Task 6: Verify VLAN Segmentation 559

Task 7: Change and Delete VLAN Configurations 560

Task 8: Reflection 562

Lab 3-5: Creating VLANs and Assigning Ports (3.4.1) 563

Task 1: Connect the Equipment 564

Task 2: Perform Basic PC Configuration 564

Task 3: Configure Switch 1 564

Task 4: Verify Connectivity 566

Task 5: Reflection 566

Lab 3-6: Configuring a Trunk Port to Connect Switches (3.4.2) 567

Task 1: Connect the Equipment 568

Task 2: Perform Basic Configuration of Switch 1 and Switch 2 568

Task 3: Configure the Host PCs 568

Task 4: Verify Default VLAN Configuration and Connectivity 568

Task 5: Create and Verify VLAN Configuration 570

Task 6: Configure and Verify Trunking 571

Task 7: Observing the Default Trunking Behavior of Switches 573

Task 8: Reflection 573

Lab 3-7: Part A: Configuring Inter-VLAN Routing (3.4.3) 574

Task 1: Connect the Equipment 575

Task 2: Perform Basic Configurations on the Router 575

Task 3: Configure Router Fast Ethernet Connections for Each Network 576

Task 4: Configure Switch1 576

Task 5: Configure Switch2 576

Task 6: Configure Switch3 576

Task 7: Configure Host 1 576

Task 8: Configure Host 2 576

Task 9: Configure Host 3 577

Task 10: Configure the Server 577

Task 11: Verify Connectivity 577

Task 12: Reflection 579

Lab 3-7: Part B: Configuring Inter-VLAN Routing (3.4.3) 580

Task 1: Connect the Equipment 581

Task 2: Perform Basic Configurations on the Router 581

Task 3: Perform Basic Configurations on the Router 581

Task 4: Configure Switch1 582

Task 5: Configure VLAN Trunking on Switch 1 583

Task 6: Configure VTP on Switch1 584

Task 7: Configure Switch2 585

Task 8: Configure VLAN Trunking on Switch2 585

Task 9: Configure VTP on Switch 2 585

Task 10: Verify Connectivity 586

Task 11: Reflection 587

Challenge Lab 3-8: VTP Modes 588

Task 1: Connect the Equipment 589

Task 2: Perform Basic Configurations on the Router 589

Task 3: Configure VLAN Trunking on the Router 589

Task 4: Configure the S1 Switch 590

Task 5: Configure the S2 Switch 593

Task 6: Configure VLAN 19 on the VTP Server, S1 596

Task 7: Verify Switch 2 VLANs 596

Task 8: Configure Switches for VTP Transparent Mode 596

Task 9: Configure New VLANs 598

Task 10: Connect Hosts and Verify Connectivity 598

Task 11: Reflection 599

Chapter 4 Labs: Addressing in an Enterprise Network 601

Lab 4-1: Designing and Applying an IP Addressing Scheme (4.2.3) 602

Task 1: Cable the Network 603

Task 2: Configure the Router 603

Task 3: Configure the Switches 603

Task 4: Configure the Hosts 603

Task 5: Verify Connectivity 603

Task 6: Reflection 604

Challenge Lab 4-2: Calculating a Network IP Addressing Scheme 605

Task 1: Determine Management VLAN Requirements 605

Task 2: Determine VLAN 24 Requirements 606

Task 3: Determine VLAN 18 Requirements 607

Task 4: Determine VLAN 49 Requirements 607

Task 5: Reflection 608

Lab 4-3: Calculating a VLSM Addressing Scheme (4.2.5) 609

Task 1: Examine the Network Requirements 609

Task 2: Design an IP Addressing Scheme to Fit the Network Requirements 610

Task 3: Assign Subnets to the WAN Links Between Routers 611

Task 4: Assign IP Configurations to Router Interfaces 611

Task 5: Assign IP Configurations to Workstations 612

Task 6: Reflection 612

Challenge Lab 4-4: Calculating VLSM Network IP Addressing Schemes 614

Task 1: Determine Scenario 1 IP Addressing Using VLSM 614

Task 2: Determine Scenario 2 IP Addressing Using VLSM 617

Task 3: Determine Scenario 3 IP Addressing Using VLSM 619

Task 4: Reflection 621

Lab 4-5: Calculating Summarized Routes (4.3.3) 623

Task 1: Summarization for RouterC 624

Task 2: Summarization for RouterB 624

Task 3: Summarization for RouterA 624

Challenge Lab 4-6: Route Summarization Practice 625

Task 1: Scenario 1 Summarization 625

Task 2: Scenario 2 Summarization 626

Task 3: Scenario 3 Summarization 627

Task 4: Scenario 4 Summarization 629

Task 5: Reflection 630

Lab 4-7: Configuring a LAN with Discontiguous Subnets (4.3.4) 631

Task 1: Connect the Equipment 632

Task 2: Perform Basic Configurations on the Main Router 633

Task 3: Configure the Other Routers 633

Task 4: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 633

Task 5: Verify That the Network Is Functioning 633

Task 6: Examine the Routing Tables 634

Task 7: Identify and Attempt to Correct the Problem 634

Task 8: Verify That the Problem Has Been Corrected 635

Task 9: Reflection 636

Lab 4-8: Configuring and Verifying Static and Dynamic NAT (4.4.3) 637

Task 1: Connect the Equipment 638

Task 2: Perform Basic Configurations on the ISP Router 638

Task 3: Configure the Gateway Router 639

Task 4: Configure Switch1 639

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 639

Task 6: Verify That the Network Is Functioning 639

Task 7: Create a Static Route 639

Task 8: Create a Default Route 640

Task 9: Define the Pool of Usable Public IP Addresses 640

Task 10: Define an Access List That Will Match the Inside Private IP Addresses 640

Task 11: Define the NAT Translation from the Inside List to the Outside Pool 640

Task 12: Specify the NAT Interfaces 641

Task 13: Configure Static Mapping 641

Task 14: Test the Configuration 641

Task 15: Verify NAT Statistics 642

Task 16: Reflection 642

Lab 4-9: Configuring and Verifying Dynamic NAT (4.4.3) 643

Task 1: Connect the Equipment 644

Task 2: Perform Basic Configurations on the ISP Router 644

Task 3: Configure the Gateway Router 644

Task 4: Configure Switch1 645

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 645

Task 6: Verify That the Network Is Functioning 645

Task 7: Create a Static Route 645

Task 8: Create a Default Route 646

Task 9: Define the Pool of Usable Public IP Addresses 646

Task 10: Define an Access List That Will Match the Inside Private IP Addresses 646

Task 11: Define the NAT Translation from the Inside List to the Outside Pool 646

Task 12: Specify the NAT Interfaces 647

Task 13: Test the Configuration 647

Task 14: Verify NAT Statistics 648

Task 15: Reflection 648

Lab 4-10: Configuring and Verifying PAT (4.4.4) 649

Task 1: Connect the Equipment 650

Task 2: Perform Basic Configurations on the ISP Router 650

Task 3: Configure the Gateway Router 650

Task 4: Configure Switch1 650

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 650

Task 6: Verify That the Network Is Functioning 651

Task 7: Create a Default Route 651

Task 8: Define the Pool of Usable Public IP Addresses 651

Task 9: Define an Access List That Will Match the Inside Private IP Addresses 651

Task 10: Define the NAT Translation from the Inside List to the Outside Pool 652

Task 11: Specify the Interfaces 652

Task 12: Generate Traffic from the Gateway to the ISP 652

Task 13: Verify That NAT/PAT Is Working 652

Task 14: Adjust the Gateway Configuration to Use an Alternate PAT Approach 653

Task 15: Reflection 653

Chapter 5 Labs: Routing with a Distance Vector Protocol 655

Lab 5-1: Designing and Creating a Redundant Network (5.1.2) 656

Task 1: Determine the Minimum Number of Links to Meet the Requirements 656

Task 2: Implement the Design 657

Task 3: Verify the Design 657

Task 4: Reflection 657

Lab 5-2: Configuring RIPv2 with VLSM and Default Route

Propagation (5.2.3) 659

Task 1: Connect PC1 to the Equipment 660

Task 2: Perform Basic Configurations on the Routers 661

Task 3: Perform Basic Configurations on the Switches 661

Task 4: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 661

Task 5: Configure RIPv2 Routing 661

Task 6: Configure and Redistribute a Default Route for Internet Access 662

Task 7: Verify the Routing Configuration 662

Task 8: Verify Connectivity 663

Task 9: Reflection 663

Lab 5-3: Implementing EIGRP (5.4.1) 664

Task 1: Connect the Equipment 665

Task 2: Perform Basic Configurations on the Routers 665

Task 3: Configure EIGRP Routing with Default Commands 666

Task 4: Configure MD5 Authentication 666

Task 5: Reflection 667

Lab 5-4: EIGRP Configuring Automatic and Manual Route Summarization and

Discontiguous Subnets (5.4.2) 668

Task 1: Connect the Equipment 669

Task 2: Perform Basic Configurations on the Routers 670

Task 3: Configure EIGRP Routing with Default Commands 670

Task 4: Verify the Routing Configuration 670

Task 5: Remove Automatic Summarization 671

Task 6: Verify the Routing Configuration 671

Task 7: Configure Manual Summarization 672

Task 8: Reflection 672

Chapter 6 Labs: Routing with a Link-State Protocol 673

Lab 6-1: Configuring and Verifying Single-Area OSPF (6.2.1) 674

Task 1: Connect the Equipment 675

Task 2: Perform Basic Configuration on R1 675

Task 3: Perform Basic Configuration on R2 675

Task 4: Perform Basic Configuration on S1 676

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 676

Task 6: Verify That the Network Is Functioning 676

Task 7: Configure OSPF Routing on R1 677

Task 8: Configure OSPF Routing on R2 678

Task 9: Test Network Connectivity 679

Task 10: Reflection 679

Lab 6-2: Configuring OSPF Authentication (6.2.2) 680

Task 1: Connect the Equipment 681

Task 2: Perform Basic Configuration on Routers 681

Task 3: Configure and Verify OSPF on the Routers 681

Task 4: Configure and Verify OSPF Authentication 682

Task 5: Reflection 684

Lab 6-3: Controlling a DR/BDR Election (6.2.3.2) 685

Task 1: Connect the Equipment 686

Task 2: Perform Basic Configuration on the Routers 686

Task 3: Configure Single-Area OSPF Routing on the Routers 686

Task 4: Verify Current OSPF Operation 686

Task 5: Configure Router Loopback Interfaces 688

Task 6: Use Router Interface Priority to Determine DR Election 689

Task 7: Reflection 692

Lab 6-4: Configuring OSPF Parameters (6.2.3.5) 693

Task 1: Connect the Equipment 694

Task 2: Perform Basic Configuration on the Routers 694

Task 3: Configure Single-Area OSPF Routing on the Routers 694

Task 4: Verify Current OSPF Operation 694

Task 5: Configure Serial Interface Bandwidth Settings 697

Task 6: Use OSPF Cost to Determine Route Selection 698

Task 7: Reflection 699

Lab 6-5 Part A: Configuring and Verifying Point-to-Point OSPF (6.2.4) 700

Task 1: Connect the Equipment 702

Task 2: Perform Basic Configurations on the Routers 702

Task 3: Configure the Router Interfaces 702

Task 4: Verify IP Addressing and Interfaces 702

Task 5: Configure Ethernet Interfaces of PC1, PC2, and PC3 702

Task 6: Configure OSPF on R1 702

Task 7: Configure OSPF on R2 703

Task 8: Configure OSPF on R3 703

Task 9: Configure OSPF Router IDs 704

Task 10: Verify OSPF Operation 708

Task 11: Examine OSPF Routes in the Routing Tables 709

Task 12: Configure OSPF Cost 710

Task 13: Reflection 713

Lab 6-5 Part B: Configuring and Verifying Multiaccess OSPF (6.2.4) 714

Task 1: Connect the Equipment 715

Task 2: Perform Basic Configurations on the Routers 715

Task 3: Configure and Activate Ethernet and Loopback Addresses 715

Task 4: Verify IP Addressing and Interfaces 715

Task 5: Configure OSPF on the DR Router 716

Task 6: Configure OSPF on the BDR Router 717

Task 7: Configure OSPF on the DRother Router 718

Task 8: Use the ip ospf priority interface Command to Determine the DR and BDR 719

Task 9: Reflection 721

Lab 6-6: Configuring and Propagating an OSPF Default Route (6.3.1) 722

Task 1: Connect the Equipment 723

Task 2: Perform Basic Configurations on the Routers 723

Task 3: Configure the ISP Router 724

Task 4: Configure the Area 0 OSPF Routers 724

Task 5: Configure Hosts with Proper IP Address, Subnet Mask, and Default

Gateway 725

Task 6: Verify Connectivity 725

Task 7: Configure OSPF Routing on Both Area 0 Routers 725

Task 8: Test Network Connectivity 725

Task 9: Observe OSPF Traffic 726

Task 10: Create a Default Route to the ISP 726

Task 11: Verify the Default Static Route 726

Task 12: Verify Connectivity from the R2 Router 726

Task 13: Verify Connectivity from the R1 Router 727

Task 14: Redistribute the Static Default Route 727

Task 15: Reflection 727

Lab 6-7 Configuring OSPF Summarization (6.3.2) 728

Task 1: Connect the Equipment 729

Task 2: Perform Basic Configurations on the Routers 730

Task 3: Perform Basic Configurations on the Switches 730

Task 4: Configure Hosts with Proper IP Address, Subnet Mask, and Default

Gateway 730

Task 5: Configure OSPF Routing with Default Summarization 730

Task 6: Configure and Redistribute a Default Route for Internet Access 731

Task 7: Verify the Routing Configuration 731

Task 8: Verify Connectivity 732

Task 9: Compute OSPF Summarization 732

Task 10: Speculating on Summarization Effects on Routing Tables 732

Task 11: Reflection 733

Chapter 7 Labs: Implementing Enterprise WAN Links 735

Lab 7-1: Configuring and Verifying a PPP Link (7.2.3) 736

Task 1: Connect the Equipment 737

Task 2: Perform Basic Configuration on R1 737

Task 3: Perform Basic Configuration on R2 737

Task 4: Show the Details of Serial 0/0/0 Interface on R1 737

Task 5: Show the Details of Serial 0/0/0 Interface on R2 738

Task 6: Turn On PPP Debugging 738

Task 7: Change the Encapsulation Type 738

Task 8: Show the Details of Serial 0/0/0 Interface on R1 740

Task 9: Show the Details of Serial 0/0/0 Interface on R2 740

Task 10: Verify That the Serial Connection Is Functioning 740

Task 11: Reflection 740

Lab 7-2: Configuring and Verifying PAP and CHAP Authentication (7.2.5) 742

Task 1: Connect the Equipment 743

Task 2: Perform Basic Configuration on R1 743

Task 3: Perform Basic Configuration on R2 743

Task 4: Configure PPP Encapsulation on Both R1 and R2 743

Task 5: Verify PPP Encapsulation on R1 and R2 743

Task 6: Verify That the Serial Connection Is Functioning 743

Task 7: Configure PPP PAP Authentication on R1 with PAP 744

Task 8: Verify That the Serial Connection Is Functioning 744

Task 9: Configure PPP PAP Authentication on R2 with PAP 744

Task 10: Turn On PPP Debugging 745

Task 11: Verify That the Serial Connection Is Functioning 745

Task 12: Remove PAP from R1 and R2 745

Task 13: Configure PPP CHAP Authentication on R1 746

Task 14: Configure PPP CHAP Authentication on R2 746

Task 15: Verify That the Serial Connection Is Functioning 747

Task 16: Verify the Serial Line Encapsulation on R1 747

Task 17: Verify the Serial Line Encapsulation on R2 748

Task 18: Reflection 749

Chapter 8 Labs: Filtering Traffic Using Access Control Lists 751

Lab 8-1: Configuring and Verifying Standard ACLs (8.3.3) 752

Task 1: Connect the Equipment 753

Task 2: Perform Basic Configuration on R1 753

Task 3: Perform Basic Configuration on R2 753

Task 4: Perform Basic Configuration on S1 753

Task 5: Configure the Host with an IP Address, Subnet Mask, and Default Gateway 753

Task 6: Configure RIP and Verify End-to-End Connectivity in the Network 754

Task 7: Configure and Test a Standard ACL 754

Task 8: Test the ACL 755

Task 9: Reflection 757

Lab 8-2: Planning, Configuring, and Verifying Extended ACLs (8.3.4) 758

Task 1: Connect the Equipment 759

Task 2: Perform Basic Configuration on R1 759

Task 3: Perform Basic Configuration on R2 759

Task 4: Perform Basic Configuration on S1 760

Task 5: Configure the Hosts with an IP Address, Subnet Mask, and Default Gateway 760

Task 6: Configure RIP and Verify End-to-End Connectivity in the Network 760

Task 7: Configure Extended ACLs to Control Traffic 760

Task 8: Test the ACL 762

Task 9: Configure and Test the ACL for the Next Requirement 762

Task 10: Reflection 763

Lab 8-3: Configuring and Verifying Extended Named ACLs (8.3.5) 764

Task 1: Connect the Equipment 765

Task 2: Perform Basic Configuration on R1 765

Task 3: Perform Basic Configuration on R2 765

Task 4: Perform Basic Configuration on S1 765

Task 5: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 766

Task 6: Verify That the Network Is Functioning 766

Task 7: Configure Static and Default Routing on the Routers 767

Task 8: Configure and Test a Simple Named Standard ACL 767

Task 9: Create and Test a Named Extended ACL 768

Task 10: Edit a Named Standard ACL 768

Task 11: Reflection 769

Lab 8-4: Configuring and Verifying VTY Restrictions (8.3.6) 770

Task 1: Connect the Equipment 771

Task 2: Perform Basic Configuration on R1 771

Task 3: Perform Basic Configuration on R2 771

Task 4: Perform Basic Configuration on S1 and S2 772

Task 5: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 772

Task 6: Configure Dynamic Routing on the Routers 772

Task 7: Verify Connectivity 772

Task 8: Configure and Test an ACL That Will Limit Telnet Access 773

Task 9: Create VTY Restrictions for R2 773

Task 10: Reflection 773

Lab 8-5: Configuring an ACL with NAT (8.4.3) 774

Task 1: Connect the Equipment 775

Task 2: Perform Basic Configuration on R1 775

Task 3: Perform Basic Configuration on R2 775

Task 4: Perform Basic Configuration on S1 776

Task 5: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 776

Task 6: Configure Static and Default Routes on the Routers 776

Task 7: Verify That the Network Is Functioning 776

Task 8: Configure NAT and PAT on R1 776

Task 9: Test and Verify the Configuration 777

Task 10: Configure and Apply an ACL Designed to Filter Traffic from One Host 777

Task 11: Test the Effects of the ACL on Network Traffic 777

Task 12: Move the ACL and Retest 778

Task 13: Reflection 778

Lab 8-6: Configuring and Verifying ACLs to Filter Inter-VLAN Traffic (8.4.5) 779

Task 1: Connect the Equipment 781

Task 2: Perform Basic Configuration on R1 781

Task 3: Configure R1 to Support Inter-VLAN Traffic 781

Task 4: Perform Basic Configuration on S1 782

Task 5: Create, Name, and Assign Ports to Three VLANs on S1 782

Task 6: Create the Trunk on S1 783

Task 7: Configure the Hosts 783

Task 8: Verify That the Network Is Functioning 783

Task 9: Configure, Apply, and Test an Extended ACL to Filter Inter-VLAN Traffic 784

Task 10: Reflection 784

Lab 8-7: Configuring ACLs and Verifying with Console Logging (8.5.1) 785

Task 1: Connect the Equipment 786

Task 2: Perform Basic Configuration on R1 787

Task 3: Perform Basic Configuration on R2 787

Task 4: Perform Basic Configuration on S1 787

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 787

Task 6: Configure and Apply ACLs 787

Task 7: Reflection 790

Lab 8-8: Configuring ACLs and Recording Activity to a Syslog Server (8.5.2) 791

Task 1: Connect the Equipment 792

Task 2: Perform Basic Configuration on R1 793

Task 3: Perform Basic Configuration on R2 793

Task 4: Perform Basic Configuration on S1 793

Task 5: Configure the Hosts with the Proper IP Address, Subnet Mask, and Default

Gateway 793

Task 6: Configure and Apply ACLs 793

Task 7: Configure the Syslog Service on H2 794

Task 8: Configure the Router to Properly Use the Syslog Service 795

Task 9: Reflection 796

Chapter 9 Labs: Troubleshooting an Enterprise Network 797

Lab 9-1: Troubleshooting RIPv2 Routing Issues (9.3.1) 798

Task 1: Connect the Equipment 799

Task 2: Load the Preconfigurations for R1 and R2 799

Task 3: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 800

Task 4: Check Connectivity Between Hosts H1 and H2 800

Task 5: Show the Routing Table for Each Router 801

Task 6: Verify That Routing Updates Are Being Sent 801

Task 7: Show the Routing Tables for Each Router 802

Task 8: Show the RIP Routing Table Entries for Each Router 802

Task 9: Test Network Connectivity 803

Task 10: Reflection 803

Lab 9-2: Troubleshooting OSPF Routing Issues (9.3.3) 804

Task 1: Connect the Equipment and Configure the Hosts 806

Task 2: Load the Preconfiguration on R1 806

Task 3: Load the Preconfiguration on R2 806

Task 4: Load the Preconfiguration on R3 806

Task 5: Troubleshoot Router R1 Issues 806

R1 Troubleshooting Review 809

Task 6: Troubleshoot Router R3 Issues 809

Task 7: Troubleshoot Router R2 Issues: Part A 811

Task 8: Troubleshoot Router R2 Issues: Part B 814

Task 9: Reflection 816

Lab 9-3: Troubleshooting Default Route Redistribution with EIGRP (9.3.4) 818

Task 1: Connect the Equipment 819

Task 2: Load the Preconfigurations for R1, R2, and ISP 819

Task 3: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 820

Task 4: Check Connectivity Between Hosts H1 and H2 821

Task 5: Show the Routing Tables for Each Router 821

Task 6: Verify That Routing Updates Are Being Sent 822

Task 7: Show Routing Tables for Each Router 822

Task 8: Show EIGRP Topology Table Entries for Each Router 823

Task 9: Show EIGRP Traffic Entries for R1 823

Task 10: Test Network Connectivity 824

Task 11: Reflection 824

Lab 9-4: Troubleshooting OSPF Default Route Redistribution (9.3.4) 825

Task 1: Connect the Equipment 826

Task 2: Perform Basic Configuration on R1 826

Task 3: Perform Basic Configuration on the GW Router 826

Task 4: Perform Basic Configuration on the ISP 827

Task 5: Configure the Hosts with an IP Address, Subnet Mask, and Default

Gateway 827

Task 6: Configure Default Routing 827

Task 7: Troubleshooting Default Routing 829

Task 8: Reflection 833

Lab 9-5: Troubleshooting WAN and PPP Connectivity (9.4.2) 834

Task 1: Connect the Equipment 835

Task 2: Load the Preconfiguration on R1 835

Task 3: Load the Preconfiguration on R2 835

Task 4: Troubleshoot R1 835

Task 5: Show the Details of Serial Interface 0/0/0 on R2 836

Task 6: Turn on PPP Debugging 837

Task 7: Show the Details of the Configuration on R2 837

Task 8: Verify That the Serial Connection Is Functioning 837

Task 9: Reflection 838

Lab 9-6: Troubleshooting ACL Configuration and Placement (9.5.2) 839

Task 1: Connect the Equipment 841

Task 2: Load the Preconfiguration on ISP 841

Task 3: Load the Preconfiguration on HQ 842

Task 4: Configure Hosts H1 and H2 842

Task 5: Configure the Web Server Host H3 842

Task 6: Troubleshoot the HQ Router and Access List 101 842

Task 7: Troubleshoot the HQ Router and Access List 102 844

Task 8: Troubleshoot the HQ Router and Access List 111 846

Task 9: Troubleshoot the HQ Router and Access List 112 847

Task 10: Troubleshoot the HQ Router and Access List 121 849

Task 11: Reflection 850

Chapter 10 Capstone Project: Putting It All Together 851

Part A: Review the Work Order and Develop the VLSM Subnet Scheme 853

Task 1: Review the Customer Work Order and Proposed Network 853

ABC-XYZ-ISP Inc. 854

Official Work Order 854

Task 2: Develop the Network Addressing Scheme 855

Task 3: Determine the IP Addresses to Use for Device Interfaces 859

Part B: Physically Construct the Network and Perform Basic Device

Configuration 860

Task 1: Build the Network and Connect the Cables 860

Task 2: Configure the HQ Router 860

Task 3: Configure the Remote Office 2 Router R2 861

Task 4: Configure the Remote Office 2 Switch S1 861

Task 5: Configure the Remote Office 2 Switch S2 862

Task 6: Configure the Remote Office 2 Switch S3 863

Task 7: Configure the Host IP Addresses 864

Task 8: Verify the Device Configurations and Basic Connectivity 864

Part C: Routing, ACLs, and Switch Security Configuration 865

Task 1: Configure Routing for HQ and R2 865

Task 2: Configure NAT Overload (PAT) on HQ 866

Task 3: Configure Switch Port Security 867

Task 4: Verify the Overall Network Connectivity Before Applying ACLs 869

Task 5: Configure ACL Security on HQ and R2 869

Appendix B Lab Equipment Interfaces and Initial Configuration Restoration 873

Router Interface Summary 873

Erasing and Reloading the Router 874

Erasing and Reloading the Switch 874

SDM Router Basic IOS Configuration 876



Preface

top


Introduction

Cisco Networking Academy is a comprehensive e-learning program that delivers information technology skills to students around the world. The Cisco CCNA Discovery curriculum consists of four courses that provide a comprehensive overview of networking, from fundamentals to advanced applications and services. The curriculum emphasizes real-world practical application, while providing opportunities for you to gain the skills and hands-on experience needed to design, install, operate, and maintain networks in small to medium-sized businesses and in enterprise and Internet service provider environments. The Introducing Routing and Switching in the Enterprise course is the third course in the curriculum.

Introducing Routing and Switching in the Enterprise, CCNA Discovery Learning Guide is the official supplemental textbook for the third course in v4.x of the CCNA Discovery online curriculum of the Networking Academy. As a textbook, this book provides a ready reference to explain the same networking concepts, technologies, protocols, and devices as the online curriculum. In addition, it contains all the interactive activities, Packet Tracer activities, and hands-on labs from the online curriculum and bonus labs.

This book emphasizes key topics, terms, and activities and provides many alternative explanations and examples as compared with the course. You can use the online curriculum as directed by your instructor and then also use this Learning Guide's study tools to help solidify your understanding of all the topics. In addition, the book includes the following:


  *


      Expanded coverage of CCNA exam material


  *


      Additional key Glossary terms


  *


      Bonus labs


  *


      Additional Check Your Understanding and Challenge questions and activities


  *


      Interactive activities and Packet Tracer activities on the CD-ROM

Goal of This Book

First and foremost, by providing a fresh, complementary perspective of the online content, this book helps you learn all the required materials of the third course in the Networking Academy CCNA Discovery curriculum. As a secondary goal, individuals who do not always have Internet access can use this text as a mobile replacement for the online curriculum. In those cases, you can read the appropriate sections of this book, as directed by your instructor, and learn the topics that appear in the online curriculum. Another secondary goal of this book is to serve as your offline study material to help prepare you for the CCNA exams.
Audience for This Book

This book's main audience is anyone taking the third CCNA Discovery course of the Networking Academy curriculum. Many Networking Academies use this textbook as a required tool in the course, whereas other Networking Academies recommend the learning guides as an additional source of study and practice materials.
Book Features

The educational features of this book focus on supporting topic coverage, readability, and practice of the course material to facilitate your full understanding of the course material.
Topic Coverage

The following features give you a thorough overview of the topics covered in each chapter so that you can make constructive use of your study time:


  *


      Objectives: Listed at the beginning of each chapter, the objectives reference the core concepts covered in the chapter. The objectives match the objectives stated in the corresponding chapters of the online curriculum; however, the question format in the Learning Guide encourages you to think about finding the answers as you read the chapter.


  *


      'How-to' feature: When this book covers a set of steps that you need to perform for certain tasks, the text lists the steps as a how-to list. When you are studying, the icon helps you easily refer to this feature as you skim through the book.


  *


      Notes, tips, cautions, and warnings: These short sidebars point out interesting facts, timesaving methods, and important safety issues.


  *


      Chapter summaries: At the end of each chapter is a summary of the chapter's key concepts. It provides a synopsis of the chapter and serves as a study aid.

Readability

The authors have compiled, edited, and in some cases rewritten the material so that it has a more conversational tone that follows a consistent and accessible reading level. In addition, the following features have been updated to assist your understanding of the networking vocabulary:


  *


      Key terms: Each chapter begins with a list of key terms, along with a page-number reference from inside the chapter. The terms are listed in the order in which they are explained in the chapter. This handy reference allows you to find a term, flip to the page where the term appears, and see the term used in context. The Glossary defines all the key terms.


  *


      Glossary: This book contains an all-new Glossary with more than 300 computer and networking terms.

Practice

Practice makes perfect. This new Learning Guide offers you ample opportunities to put what you learn to practice. You will find the following features valuable and effective in reinforcing the instruction that you receive:


  *


      Check Your Understanding questions and answer key: Updated review questions are presented at the end of each chapter as a self-assessment tool. These questions match the style of questions that you see in the online course. Appendix A, 'Check Your Understanding and Challenge Questions Answer Key,' provides an answer key to all the questions and includes an explanation of each answer.


  *


      (New) Challenge questions and activities: Additional, and more challenging, review questions and activities are presented at the end of chapters. These questions are purposefully designed to be similar to the more complex styles of questions you might see on the CCNA exam. This section might also include activities to help prepare you for the exams. Appendix A provides the answers.


  *


      Packet Tracer activities: Interspersed throughout the chapters, you'll find many activities to work with the Cisco Packet Tracer tool. Packet Tracer enables you to create networks, visualize how packets flow in the network, and use basic testing tools to determine whether the network would work. When you see this icon, you can use Packet Tracer with the listed file to perform a task suggested in this book. The activity files are available on this book's CD-ROM; Packet Tracer software, however, is available through the Academy Connection website. Ask your instructor for access to Packet Tracer.


  *


      Interactive activities: These activities provide an interactive learning experience to reinforce the material presented in the chapter.


  *


      Labs: Part II of this book contains all the hands-on labs from the curriculum plus additional labs for further practice. Part I includes references to the hands-on labs, as denoted by the lab icon, and Part II of the book contains each lab in full. You may perform each lab when it is referenced in the chapter or wait until you have completed the entire chapter.

A Word About Packet Tracer Software and Activities

Packet Tracer is a self-paced, visual, interactive teaching and learning tool developed by Cisco. Lab activities are an important part of networking education. However, lab equipment can be a scarce resource. Packet Tracer provides a visual simulation of equipment and network processes to offset the challenge of limited equipment. Students can spend as much time as they like completing standard lab exercises through Packet Tracer, and have the option to work from home. Although Packet Tracer is not a substitute for real equipment, it allows students to practice using a command-line interface. This 'e-doing' capability is a fundamental component of learning how to configure routers and switches from the command line.

Packet Tracer v4.x is available only to Cisco Networking Academies through the Academy Connection website. Ask your instructor for access to Packet Tracer.
A Word About the Discovery Server CD

The CCNA Discovery series of courses is designed to provide a hands-on learning approach to networking. Many of the CCNA Discovery labs are based on Internet services. Because it is not always possible to allow students access to these services on a live network, the Discovery Server has been developed to provide them.

The Discovery Server CD is a bootable CD that transforms a regular PC into a Linux server running several preconfigured services for use with Discovery labs. Your instructor can download the CD files, burn a CD, and show you how to use the server. Hands-on labs that use the Discovery Server are identified within the labs themselves.

Once booted, the server provides many services to clients, including the following:


  *


      Domain Name Services


  *


      Web services


  *


      FTP


  *


      TFTP


  *


      Telnet


  *


      SSH


  *


      DHCP


  *


      Streaming video

How This Book Is Organized

This book covers the major topics in the same sequence as the online curriculum for the CCNA Discovery Introducing Routing and Switching in the Enterprise course. The online curriculum has ten chapters for this course, so this book has ten chapters, with the same names and numbers as the online course chapters.

To make it easier to use this book as a companion to the course, the major topic headings in each chapter match, with just a few exceptions, the major sections of the online course chapters. However, the Learning Guide presents many topics in slightly different order inside each major heading. In addition, the book occasionally uses different examples than the course. As a result, students get more detailed explanations, a second set of examples, and different sequences of individual topics, all to aid the learning process. This new design, based on research into the needs of the Networking Academies, helps typical students lock in their understanding of all the course topics.
Chapters and Topics

Part I of this book has ten chapters, as follows:


  *


      Chapter 1, 'Networking in the Enterprise,' describes the goals of the enterprise network and compares enterprise LANs, WANs, intranets, and extranets. Types of enterprise applications are identified, including traffic flow patterns and prioritization. This chapter also focuses on the needs of teleworkers and the use of virtual private networks to support them.


  *


      Chapter 2, 'Exploring the Enterprise Network Infrastructure,' describes the network operations center (NOC), telecommunications rooms, and network documentation used in the enterprise. Requirements for supporting the enterprise edge are introduced, including external service delivery and security considerations. This chapter also provides a good review of switch and router hardware. It reinforces the basic commands necessary to configure switches and routers and verify their operation.


  *


      Chapter 3, 'Switching in an Enterprise Network,' focuses on the characteristics of switches and issues associated with supporting them in an enterprise environment. These include redundancy and Spanning Tree Protocol (STP). You learn to configure VLANs, trunking, and multiswitch inter-VLAN routing. The chapter also covers the VLAN Trunking Protocol (VTP), support for IP telephony, and wireless and VLAN implementation best practices.


  *


      Chapter 4, 'Addressing in an Enterprise Network,' compares flat and hierarchical network design with a focus on the structure and advantages of hierarchical IP addressing. This chapter provides a review of subnet masks and basic subnetting and introduces variable-length subnet masks (VLSM) and their benefits. It provides instruction on how to implement VLSM addressing in hierarchical network design. The use and importance of classless routing, classless interdomain routing (CIDR), and route summarization are explained, along with subnetting best practices. This chapter also provides a review of private IP addressing, Network Address Translation (NAT), and Port Address Translation (PAT), with examples of implementation.


  *


      Chapter 5, 'Routing with a Distance Vector Protocol,' describes common network topologies and provides a review of static and dynamic routing and default routes. The chapter also provides a review of distance vector routing protocols. The advantages and disadvantages of using Routing Information Protocol (RIP) and Enhanced Interior Gateway Routing Protocol (EIGRP) are discussed. Instructions are provided for the configuration and implementation of the RIPv2 and EIGRP dynamic routing protocols.


  *


      Chapter 6, 'Routing with a Link-State Protocol,' focuses on link-state routing protocols, specifically the Open Shortest Path First (OSPF) Protocol. OSPF characteristics are described, as are advantages and issues involved with implementing OSPF. Instructions are provided for configuring single-area OSPF. In addition, issues associated with using multiple routing protocols in a network are addressed.


  *


      Chapter 7, 'Implementing Enterprise WAN Links,' focuses on devices and technology options for connecting the enterprise WAN. Packet- and circuit-switching technologies are compared, as are last-mile and long-range technologies. WAN encapsulations, such as High-Level Data Link Control (HDLC) and PPP, are described. You learn how to configure PPP on a WAN link, including authentication. The chapter also provides an overview of the popular Frame Relay WAN technology.


  *


      Chapter 8, 'Filtering Traffic Using Access Control Lists,' emphasizes the importance of using access control lists (ACL) in network security and traffic flow control. This chapter describes the various types of Cisco IOS ACLs and how they are configured, including the use of the wildcard mask. Standard, extended, and named ACLs are compared, with suggestions for when to use them and placement in specific scenarios. Details are provided on how to create, edit, and apply various ACLs. Filtering traffic based on specific fields in the IP packet is covered. The use of ACLs with NAT and PAT and inter-VLAN routing is discussed. In addition, ACL logging (and the use of syslog servers) is introduced.


  *


      Chapter 9, 'Troubleshooting an Enterprise Network,' emphasizes the impact of network failure on an organization and the concept of a failure domain. This chapter describes network monitoring tools and techniques and reviews the troubleshooting process. This chapter identifies common problems associated with switching and connectivity, routing, WAN configurations and ACLs, and ways to troubleshoot these problems.


  *


      Chapter 10, 'Putting It All Together,' In this summary activity, you use what you have learned about the enterprise network infrastructure, switching technologies, hierarchical IP addressing, routing protocols, WAN technologies, and ACLs to build and configure a multiswitch, multirouter simulated enterprise network.

Part I: Concepts also includes the following:


  *


      Appendix A, 'Check Your Understanding and Challenge Questions Answer Key,' provides the answers to the Check Your Understanding questions that you find at the end of each chapter. It also includes answers for the Challenge questions and activities that conclude most chapters.


  *


      The Glossary provides a compiled list of all the key terms that appear throughout this book, plus additional computer and networking terms.

Part II of this book includes the labs that correspond to each chapter. Part II also includes the following:


  *


      Appendix B, 'Lab Equipment Interfaces and Initial Configuration Restoration,' provides a table listing the proper interface designations for various routers. Procedures are included for erasing and restoring routers and switches to clear previous configurations. In addition, the steps necessary to restore an SDM router are provided.

About the CD-ROM

The CD-ROM included with this book provides many useful tools and information to support your education:


  *


      Packet Tracer Activity files: These are files to work through the Packet Tracer activities referenced throughout the book, as indicated by the Packet Tracer activity icon.


  *


      Interactive activities: The CD-ROM contains the interactive activities referenced throughout the book.


  *


      Taking Notes: This section includes a TXT file of the chapter objectives to serve as a general outline of the key topics of which you need to take note. The practice of taking clear, consistent notes is an important skill for not only learning and studying the material, but for on-the-job success, too. Also included in this section is 'A Guide to Using a Networker's Journal' PDF booklet providing important insight into the value of the practice of using a journal, how to organize a professional journal, and some best practices on what, and what not, to take note of in your journal.


  *


      IT Career Information: This section includes a student guide to applying the toolkit approach to your career development. Learn more about entering the world of information technology as a career by reading two informational chapters excerpted from The IT Career Builder's Toolkit: 'Communication Skills' and 'Technical Skills.'


  *


      Lifelong Learning in Networking: As you embark on a technology career, you will notice that it is ever changing and evolving. This career path provides new and exciting opportunities to learn new technologies and their applications. Cisco Press is one of the key resources to plug into on your quest for knowledge. This section of the CD-ROM provides an orientation to the information available to you and tips on how to tap into these resources for lifelong learning.

© Copyright Pearson Education. All rights reserved.



About the Authors

top


Allan Reid is the curriculum lead for CCNA and a CCNA and CCNP® instructor at the Centennial College CATC in Toronto, Canada.

Jim Lorenz is an instructor and curriculum developer for the Cisco Networking Academy.

Cheryl Schmidt is a professor of Network Engineering Technology at Florida Community College at Jacksonville.