Home>Store

CCNP企业:核心及rking (ENCOR) v8 Lab Manual, 2nd Edition

Register your productto gain access to bonus material or receive a coupon.

CCNP企业:核心及rking (ENCOR) v8 Lab Manual, 2nd Edition

Book

  • Your Price: $59.50
  • List Price: $70.00
  • Usually ships in 24 hours.

About

Features

  • A portable, bound copy of all CCNP v8 ENCOR Labs: convenient, lightweight, and friendly
  • Allows students to review or walk through hands-on labs without a huge textbook or live Web connection
  • Contains additional pages between labs for in-class note-taking
  • Separate answer key available at Cisco Academy Connection and the Pearson.com Instructor Resource site

Description

  • Copyright 2021
  • Dimensions: 8-1/2" x 10-7/8"
  • Edition: 2nd
  • Book
  • ISBN-10: 0-13-690643-5
  • ISBN-13: 978-0-13-690643-8

The only authorized Labs & Study Guide for the Cisco Networking Academy CCNP Enterprise: Core Networking (ENCOR), Version 8 course in the CCNP curriculum.The two courses in this CCNP Enterprise Version 8.0 curriculum provide students with knowledge and skills needed to configure, operate, and troubleshoot large-scale enterprise networks. The courses cover a broad range of routing, switching, and wireless topics along with security best practices used in software-driven digital networks. CCNP Enterprise certification requires candidates to pass two 120-minute exams—CCNP and CCIE Enterprise Core ENCOR 350-401 and CCNP Enterprise Advanced Routing ENARSI 300-410. By the end of the CCNP course series, students gain practical, hands-on lab experience preparing them for the CCNP Enterprise certification exams and career-ready skills for professional-level roles in the Information & Communication Technologies (ICT) industry.CCNP企业:核心及rkingThis first course in the two-course CCNP Enterprise series covers switching, routing, wireless, and related security topics along with the technologies that support software-defined, programmable networks. Comprehensive labs emphasize hands-on learning and practice to reinforce configuration and troubleshooting skills. This course directly prepares for the Cisco Enterprise Network Core Technologies exam (350-401 ENCOR) to earn an Enterprise Core Specialist certification. Completion of both courses in the CCNP Enterprise course series prepares for the CCNP Enterprise certification exam. The 37 comprehensive labs in this manual emphasize hands-on learning and practice to reinforce configuration skills.This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.Related titles:CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command GuideBook: 9780135768167 eBook: 978013576818131 Days Before Your CCNP and CCIE Enterprise Core ExamBook: 9780136965220 eBook: 9780136965169CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert GuideBook: 9781587145230 Premium Edition: 9780135262030

Sample Content

Table of Contents

Chapter 1 Packet Forwarding 1

1.1.2 Lab - Implement Inter-VLAN Routing 1

Topology 1

Addressing Table 1

Objectives 2

Background/Scenario 2

Required Resources 2

Instructions 2

Router Interface Summary Table 10

设备配置最终——笔记11

Chapter 2 Spanning Tree Protocol 13

2.1.2 Lab - Observe STP Topology Changes and Implement RSTP 13

Topology 13

Addressing Table 13

Objectives 13

Background/Scenario 13

所需的资源14

Instructions 14

设备配置最终——笔记23

Chapter 3 Advanced Spanning Tree Tuning 25

3.1.2实验室,实现先进的STP的修改nd Mechanisms 25

Topology 25

Addressing Table 25

Objectives 25

Background/Scenario 26

Required Resources 26

Instructions 26

Mechanisms 37

设备配置最终——笔记45

Chapter 4 Multiple Spanning Tree Protocol 47

4.1.2 Lab - Implement MST 47

Topology 47

Objectives 47

Background/Scenario 47

Required Resources 48

Instructions 48

设备配置最终——笔记60

Chapter 5 VLAN Trunks and EtherChannel Bundles 63

5.1.2 Lab - Implement VTP 63

Topology 63

Objectives 63

Background/Scenario 63

Required Resources 65

Instructions 65

设备配置最终——笔记78

5.1.3 Lab - Implement EtherChannel 80

Topology 80

Objectives 80

Background/Scenario 80

Required Resources 81

Instructions 81

设备配置最终——笔记91

5.1.4 Lab - Tune and Optimize EtherChannel Operations 93

Topology 93

Objectives 93

Background/Scenario 93

Required Resources 93

设备配置最终——笔记98

Chapter 6 IP Routing Essentials 101

6.1.2 Lab - Investigate Static Routes 101

Topology 101

Addressing Table 101

Objectives 102

Background/Scenario 102

Required Resources 102

Instructions 102

Router Interface Summary Table 116

设备配置最终——笔记116

6.1.3 Lab - Implement VRF-Lite 119

Topology 119

Addressing Table 119

Objectives 120

Background/Scenario 120

Required Resources 120

Router Interface Summary Table 130

设备配置最终——笔记130

Chapter 7 EIGRP 133

Chapter 8 OSPF 135

8.1.2 Lab - Implement Single-Area OSPFv2 135

Topology 135

Addressing Table 135

Objectives 136

Background/Scenario 136

Required Resources 136

Instructions 136

Router Interface Summary Table 154

设备配置最终——笔记154

Chapter 9 Advanced OSPF 157

9.1.2 Lab - Implement Multiarea OSPFv2 157

Topology 157

Addressing Table 157

Objectives 158

Background/Scenario 158

Required Resources 158

Instructions 159

Router Interface Summary Table 183

设备配置最终——笔记183

9.1.3 Lab - OSPFv2 Route Summarization and Filtering 186

Topology 186

Addressing Table 186

Objectives 187

Background/Scenario 187

Required Resources 188

Instructions 188

Router Interface Summary Table 203

设备配置最终——笔记203

Chapter 10 OSPFv3 207

10.1.2 Lab - Implement Multiarea OSPFv3 207

Topology 207

Addressing Table 207

Objectives 208

Background/Scenario 208

Required Resources 208

Instructions 209

Router Interface Summary Table 225

设备配置最终——笔记225

Chapter 11 BGP 229

11.1.2 Lab - Implement eBGP for IPv4 229

Topology 229

Addressing Table 229

Objectives 230

Background/Scenario 230

Required Resources 230

Instructions 230

Router Interface Summary Table 244

设备配置最终——笔记245

11.1.3 Lab - Implement MP-BGP 247

Topology 247

Addressing Table 247

Objectives 247

Background/Scenario 248

Required Resources 248

Instructions 248

Router Interface Summary Table 261

设备配置最终——笔记261

Chapter 12 Advanced BGP 265

12.1.2 Lab - Implement BGP Path Manipulation 265

Topology 265

Addressing Table 265

Objectives 266

Background/Scenario 266

Required Resources 266

Instructions 266

Router Interface Summary Table 278

设备配置最终——笔记278

12.1.3 Lab - Implement BGP Communities 281

Topology 281

Addressing Table 281

Objectives 281

Background/Scenario 282

Required Resources 282

Instructions 282

Reflection Questions 294

Router Interface Summary Table 295

设备配置最终——笔记295

Chapter 13 Multicast 299

Chapter 14 QoS 301

Chapter 15 IP Services 303

15.1.2 Lab - Implement NTP 303

Topology 303

Addressing Table 303

Objectives 303

Background/Scenario 304

Required Resources 305

Instructions 305

Router Interface Summary Table 316

设备配置最终——笔记316

15.1.3 Lab - Implement HSRP 319

Topology 319

Addressing Table 319

Objectives 320

Background/Scenario 320

Required Resources 320

Instructions 321

设备配置最终——笔记331

——实现VRRP 15.1.4实验室334

Topology 334

Addressing Table 334

Objectives 335

Background/Scenario 335

Required Resources 336

Instructions 336

设备配置最终——笔记345

15.1.5 Lab - Implement GLBP 348

Topology 348

Addressing Table 348

Objectives 349

Background/Scenario 349

Required Resources 349

Instructions 350

设备配置最终——笔记362

15.1.6 Lab - Implement NAT 365

Topology 365

Addressing Table 365

Objectives 365

Background/Scenario 366

Required Resources 366

Instructions 366

Router Interface Summary Table 374

设备配置最终——笔记374

Chapter 16 Overlay Tunnels 377

16.1.2实验室-实施GRE隧道377

Topology 377

Addressing Table 377

Objectives 377

Background/Scenario 378

Required Resources 378

Instructions 378

Router Interface Summary Table 389

设备配置最终——笔记390

16.1.3 Lab - Implement IPsec Site-to-Site VPNs 393

Topology 393

Addressing Table 393

Objectives 394

Background/Scenario 394

Required Resources 395

Instructions 395

Router Interface Summary Table 411

设备配置最终——笔记412

16.1.4 Lab - Implement GRE over IPsec Site-to-Site VPNs 415

Topology 415

Addressing Table 415

Objectives 416

Background/Scenario 416

Required Resources 417

Instructions 417

Router Interface Summary Table 430

设备配置最终——笔记431

16.1.5 Lab - Implement IPsec VTI Site-to-Site VPNs 433

Topology 433

Addressing Table 433

Objectives 434

Background/Scenario 434

Required Resources 435

Instructions 435

Router Interface Summary Table 448

设备配置最终——笔记448

Chapter 17 Wireless Signals and Modulation 451

Chapter 18 Wireless Infrastructure 453

Chapter 19 Understanding Wireless Roaming and Location Services 455

Chapter 20 Authenticating Wireless Clients 457

Chapter 21 Troubleshooting Wireless Connectivity 459

Chapter 22 Enterprise Network Architecture 461

Chapter 23 Fabric Technologies 463

Chapter 24 Network Assurance 465

24.1.2 Lab - Use Connectivity Tests and Debug for Network Assurance 465

Topology 465

Addressing Table 465

Objectives 466

Background/Scenario 466

Required Resources 466

Instructions 466

Router Interface Summary Table 482

设备配置最终——笔记483

24.1.3 Lab - Implement SNMP and Syslog 485

Topology 485

Addressing Table 485

Objectives 485

Background/Scenario 486

Required Resources 486

Router Interface Summary Table 495

设备配置最终——笔记495

24.1.4 Lab - Implement Flexible Netflow 498

Topology 498

Addressing Table 498

Objectives 498

Background/Scenario 498

Required Resources 499

Instructions 499

Router Interface Summary Table 509

设备配置最终——笔记509

24.1.5 Lab - Implement SPAN Technologies 512

Topology 512

Addressing Table 512

Objectives 512

Background/Scenario 513

Required Resources 513

设备配置最终——笔记519

24.1.6 Lab - Implement IP SLA 521

Topology 521

Addressing Table 521

Objectives 522

Background/Scenario 522

Required Resources 523

Instructions 523

Router Interface Summary Table 536

设备配置最终——笔记536

Chapter 25 Secure Network Access Control 539

25.1.2 Lab - Install the CCNP Virtual Machine 539

Objectives 539

Background/Scenario 539

Required Resources 539

Instructions 539

Chapter 26 Network Device Access Control and Infrastructure Security 543

26.1.2 Lab - Implement IPv4 ACLs 543

Topology 543

Addressing Table 543

Objectives 544

Background/Scenario 544

544年所需的资源

Instructions 545

Router Interface Summary Table 556

设备配置最终——笔记556

26.1.3 Lab - Configure Protections for Passwords and Terminal Lines 559

Topology 559

Addressing Table 559

Objectives 559

Background/Scenario 559

Required Resources 560

Reflection Questions 568

Router Interface Summary Table 568

设备配置最终——笔记568

26.1.4 Lab - Configure Local and Server-Based AAA Authentication 571

Topology 571

Addressing Table 571

Objectives 571

Background/Scenario 571

Required Resources 572

Router Interface Summary Table 582

设备配置最终——笔记582

26.1.5 Lab - Implement CoPP 585

Topology 585

Addressing Table 585

Objectives 585

Background/Scenario 585

Required Resources 586

Reflection Questions 597

Router Interface Summary Table 597

设备配置最终——笔记597

Chapter 27 Virtualization 601

Chapter 28 Foundational Network Programmability Concepts 603

28.1.2 Lab - Construct a Basic Python Script 603

Objectives 603

Background/Scenario 603

Required Resources 603

Instructions 603

28.1.3 Lab - Use the Netmiko Python Module to Configure a Router 619

Topology 619

Addressing Table 619

Objectives 619

Background/Scenario 619

Required Resources 619

Instructions 620

Router Interface Summary Table 627

设备配置最终——笔记627

28.1.4 Lab - Use NETCONF to Access an IOS XE Router 630

Topology 630

Addressing Table 630

Objectives 630

Background/Scenario 630

Required Resources 630

Instructions 631

Router Interface Summary Table 647

设备配置最终——笔记647

28.1.5 Lab - Use RESTCONF to Access an IOS XE Router 650

Topology 650

Addressing Table 650

Objectives 650

Background/Scenario 650

Required Resources 650

Instructions 651

Programs Used in this Lab 664

Router Interface Summary Table 665

设备配置最终——笔记666

Chapter 29 Introduction to Automation Tools 669

29.1.2 Lab - Construct an EEM Applet 669

Topology 669

Addressing Table 669

Objectives 669

Background/Scenario 669

Required Resources 670

Instructions 670

Router Interface Summary Table 677

TOC, 9780136906438, 6/24/2020

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


皮尔森Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

皮尔森may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form

Other Collection and Use of Information


Application and System Logs

皮尔森automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

皮尔森may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


皮尔森uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


皮尔森may send or direct marketing communications to users, provided that

  • 皮尔森will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • 皮尔森will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

皮尔森may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page.If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx

Sale of Personal Information


皮尔森does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


皮尔森may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020