Home>年代tore

Routing and Switching Essentials Companion Guide

Register your productto gain access to bonus material or receive a coupon.

Routing and Switching Essentials Companion Guide

eBook (Watermarked)

  • Your Price: $45.33
  • List Price: $53.33
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2014
  • Dimensions: 8" x 9-1/8"
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-347622-7
  • ISBN-13: 978-0-13-347622-4

Routing and Switching Essentials Companion Guide is the official supplemental textbook for the Routing and Switching Essentials course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN routing in both IPv4 and IPv6 networks.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with more than 200 terms.
  • 总结ry of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title:

Routing and Switching Essentials Lab Manual

How To–Look for this icon to study the steps you need to learn to perform certain tasks.

Interactive Activities通过加强你的理解主题ll the exercises from the online course identified throughout the book with this icon.

Videos–Watch the videos embedded within the online course.

Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.

Hands-on Labs–Work through all the course labs and additional Class Activities that are included in the course and published in the separate Lab Manual.

年代ample Content

Table of Contents

Introduction xxviii

Chapter 1 Introduction to Switched Networks 1

Objectives 1

Key Terms 1

Introduction (1.0.1.1) 2

LAN Design (1.1) 2

Converged Networks (1.1.1) 3

Growing Complexity of Networks (1.1.1.1) 3

Elements of a Converged Network (1.1.1.2) 4

Borderless Switched Networks (1.1.1.3) 5

Hierarchy in the Borderless Switched Network (1.1.1.4) 6

Core Distribution Access (1.1.1.5) 7

年代witched Networks (1.1.2) 10

Role of Switched Networks (1.1.2.1) 10

Form Factors (1.1.2.2) 11

The Switched Environment (1.2) 14

Frame Forwarding (1.2.1) 14

年代witching as a General Concept in Networking and Telecommunications (1.2.1.1) 14

Dynamically Populating a Switch MAC Address Table (1.2.1.2) 15

年代witch Forwarding Methods (1.2.1.3) 19

年代tore-and-Forward Switching (1.2.1.4) 20

Cut-Through Switching (1.2.1.5) 21

年代witching Domains (1.2.2) 22

Collision Domains (1.2.2.1) 22

Broadcast Domains (1.2.2.2) 23

Alleviating Network Congestion (1.2.2.3) 25

总结ry (1.3) 26

Practice 27

Class Activities 28

Packet Tracer Activities 28

Check Your Understanding Questions 28

Chapter 2 Basic Switching Concepts and Configuration 33

Objectives 33

Key Terms 33

Introduction (2.0.1.1) 35

Basic Switch Configuration (2.1) 36

年代witch Boot Sequence (2.1.1.1) 36

Recovering from a System Crash (2.1.1.2) 37

年代witch LED Indicators (2.1.1.3) 38

Preparing for Basic Switch Management (2.1.1.4) 40

Configuring Basic Switch Management Access with IPv4 (2.1.1.5) 41

Configure Switch Ports (2.1.2) 44

Duplex Communication (2.1.2.1) 44

Configure Switch Ports at the Physical Layer (2.1.2.2) 45

Duplex and Speed 45

Auto-MDIX (2.1.2.3) 46

Verifying Switch Port Configuration (2.1.2.4) 48

Network Access Layer Issues (2.1.2.5) 50

Troubleshooting Network Access Layer Issues (2.1.2.6) 53

年代witch Security: Management and Implementation (2.2) 54

年代ecure Remote Access (2.2.1) 54

年代年代H Operation (2.2.1.1) 55

Configuring SSH (2.2.1.2) 56

Verifying SSH (2.2.1.3) 57

年代ecurity Concerns in LANs (2.2.2) 59

Common Security Attacks: MAC Address Flooding (2.2.2.1) 59

Common Security Attacks: DHCP Spoofing (2.2.2.2) 63

Common Security Attacks: Leveraging CDP (2.2.2.3) 64

年代ecurity Best Practices (2.2.3) 66

Best Practices (2.2.3.1) 66

Network Security Tools and Testing (2.2.3.2) 66

Network Security Audits (2.2.3.3) 67

年代witch Port Security (2.2.4) 68

年代ecure Unused Ports (2.2.4.1) 68

DHCP Snooping (2.2.4.2) 69

Port Security: Operation (2.2.4.3) 71

Port Security: Violation Modes (2.2.4.4) 73

Port Security: Configuring (2.2.4.5) 74

Port Security: Verifying (2.2.4.6) 75

Ports in Error Disabled State (2.2.4.7) 77

Network Time Protocol (NTP) (2.2.4.8) 78

总结ry (2.3) 81

Practice 83

Class Activities 83

Labs 83

Packet Tracer Activities 84

Check Your Understanding Questions 84

Chapter 3 VLANs 89

Objectives 89

Key Terms 89

Introduction (3.0.1.1) 90

VLAN Segmentation (3.1) 91

VLAN Definitions (3.1.1.1) 91

Benefits of VLANs (3.1.1.2) 92

Types of VLANs (3.1.1.3) 93

Data VLAN 93

Default VLAN 93

Native VLAN 94

Management VLAN 95

Voice VLANs (3.1.1.4) 96

VLANs in a Multiswitched Environment (3.1.2) 97

VLAN Trunks (3.1.2.1) 97

Controlling Broadcast Domains with VLANs (3.1.2.2) 98

Network Without VLANs 98

Network with VLANs 99

Tagging Ethernet Frames for VLAN Identification (3.1.2.3) 101

Native VLANs and 802.1Q Tagging (3.1.2.4) 102

Tagged Frames on the Native VLAN 102

Untagged Frames on the Native VLAN 102

Voice VLAN Tagging (3.1.2.5) 103

年代ample Configuration 104

VLAN Implementations (3.2) 105

VLAN Ranges on Catalyst Switches (3.2.1.1) 105

Creating a VLAN (3.2.1.2) 106

Assigning Ports to VLANs (3.2.1.3) 108

Changing VLAN Port Membership (3.2.1.4) 109

Deleting VLANs (3.2.1.5) 111

Verifying VLAN Information (3.2.1.6) 112

VLAN Trunks (3.2.2) 114

Configuring IEEE 802.1Q Trunk Links (3.2.2.1) 114

Resetting the Trunk to Default State (3.2.2.2) 116

Verifying Trunk Configuration (3.2.2.3) 118

Dynamic Trunking Protocol (3.2.3) 120

Introduction to DTP (3.2.3.1) 120

Negotiated Interface Modes (3.2.3.2) 121

Troubleshoot VLANs and Trunks (3.2.4) 123

IP Addressing Issues with VLAN (3.2.4.1) 123

Missing VLANs (3.2.4.2) 125

Introduction to Troubleshooting Trunks (3.2.4.3) 127

Common Problems with Trunks (3.2.4.4) 128

Trunk Mode Mismatches (3.2.4.5) 129

Incorrect VLAN List (3.2.4.6) 131

VLAN Security and Design (3.3) 134

年代witch Spoofing Attack (3.3.1.1) 134

Double-Tagging Attack (3.3.1.2) 135

PVLAN Edge (3.3.1.3) 136

Design Best Practices for VLANs (3.3.2) 138

VLAN Design Guidelines (3.3.2.1) 138

总结ry (3.4) 140

Practice 142

Class Activities 142

Labs 142

Packet Tracer Activities 143

Check Your Understanding Questions 143

Chapter 4 Routing Concepts 149

Objectives 149

Key Terms 149

Introduction (4.0.1.1) 151

Functions of a Router (4.1.1) 152

Characteristics of a Network (4.1.1.1) 152

Why Routing? (4.1.1.2) 153

Routers Are Computers (4.1.1.3) 154

Routers Interconnect Networks (4.1.1.4) 156

Routers Choose Best Paths (4.1.1.5) 158

Packet-Forwarding Mechanisms (4.1.1.6) 158

Connect Devices (4.1.2) 162

Connect to a Network (4.1.2.1) 162

Default Gateways (4.1.2.2) 164

Document Network Addressing (4.1.2.3) 165

Enable IP on a Host (4.1.2.4) 166

Device LEDs (4.1.2.5) 167

Console Access (4.1.2.6) 169

Enable IP on a Switch (4.1.2.7) 171

Basic Settings on a Router (4.1.3) 172

Configure Basic Router Settings (4.1.3.1) 172

Configure an IPv4 Router Interface (4.1.3.2) 175

Configure an IPv6 Router Interface (4.1.3.3) 177

Configure an IPv4 Loopback Interface (4.1.3.4) 181

Verify Connectivity of Directly Connected Networks (4.1.4) 183

Verify Interface Settings (4.1.4.1) 183

Verify IPv6 Interface Settings (4.1.4.2) 186

Filter Show Command Output (4.1.4.3) 189

Command History Feature (4.1.4.4) 191

年代witching Packets Between Networks (4.2.1) 193

Router Switching Function (4.2.1.1) 193

年代end a Packet (4.2.1.2) 194

Forward to the Next Hop (4.2.1.3) 195

Packet Routing (4.2.1.4) 196

Reach the Destination (4.2.1.5) 197

Path Determination (4.2.2) 198

Routing Decisions (4.2.2.1) 198

Best Path (4.2.2.2) 199

Load Balancing (4.2.2.3) 200

Administrative Distance (4.2.2.4) 200

Analyze the Routing Table (4.3.1) 202

The Routing Table (4.3.1.1) 202

Routing Table Sources (4.3.1.2) 203

Remote Network Routing Entries (4.3.1.3) 204

Directly Connected Routes (4.3.2) 205

Directly Connected Interfaces (4.3.2.1) 205

Directly Connected Routing Table Entries (4.3.2.2) 206

Directly Connected Examples (4.3.2.3) 207

Directly Connected IPv6 Example (4.3.2.4) 210

年代tatically Learned Routes (4.3.3) 214

年代tatic Routes (4.3.3.1) 214

年代tatic Route Examples (4.3.3.2) 214

年代tatic IPv6 Route Examples (4.3.3.3) 216

Dynamic Routing Protocols (4.3.4) 219

Dynamic Routing (4.3.4.1) 219

IPv4路由协议(4.3.4.2)220

IPv4 Dynamic Routing Examples (4.3.4.3) 221

IPv6 Routing Protocols (4.3.4.4) 222

IPv6 Dynamic Routing Examples (4.3.4.5) 223

总结ry (4.4) 224

Practice 225

Class Activities 225

Labs 226

Packet Tracer Activities 226

Check Your Understanding Questions 226

Chapter 5 Inter-VLAN Routing 231

Objectives 231

Key Terms 231

Introduction (5.0.1.1) 232

Inter-VLAN Routing Configuration (5.1) 232

What Is Inter-VLAN Routing? (5.1.1.1) 233

Legacy Inter-VLAN Routing (5.1.1.2) 233

Router-on-a-Stick Inter-VLAN Routing (5.1.1.3) 235

Multilayer Switch Inter-VLAN Routing (5.1.1.4) 237

Configure Legacy Inter-VLAN Routing (5.1.2) 239

Configure Legacy Inter-VLAN Routing: Preparation (5.1.2.1) 239

Configure Legacy Inter-VLAN Routing: Switch Configuration (5.1.2.2) 240

Configure Legacy Inter-VLAN Routing: Router Interface Configuration (5.1.2.3) 241

Configure Router-on-a-Stick Inter-VLAN Routing (5.1.3) 244

Configure Router-on-a-Stick: Preparation (5.1.3.1) 244

Configure Router-on-a-Stick: Switch Configuration (5.1.3.2) 245

Configure Router-on-a-Stick: Router Subinterface Configuration (5.1.3.3) 246

Configure Router-on-a-Stick: Verifying Subinterfaces (5.1.3.4) 248

Configure Router-on-a-Stick: Verifying Routing (5.1.3.5) 250

Ping Test 251

Tracert Test 251

Troubleshoot Inter-VLAN Routing (5.2) 252

Inter-VLAN Configuration Issues (5.2.1) 252

年代witch Port Issues (5.2.1.1) 252

Verify Switch Configuration (5.2.1.2) 254

Interface Issues (5.2.1.3) 255

Verify Router Configuration (5.2.1.4) 256

IP Addressing Issues (5.2.2) 258

Errors with IP Addresses and Subnet Masks (5.2.2.1) 258

Verifying IP Address and Subnet Mask Configuration Issues (5.2.2.2) 260

Layer 3 Switching (5.3) 261

Introduction to Layer 3 Switching (5.3.1.1) 261

Inter-VLAN Routing with Switch Virtual Interfaces (5.3.1.2, 5.3.1.3) 263

Inter-VLAN Routing with Routed Ports (5.3.1.4) 265

Routed Ports and Access Ports on a Switch 265

Configuring Static Routes on a Catalyst 2960 (5.3.1.5) 266

Troubleshoot Layer 3 Switching (5.3.2) 274

Layer 3 Switch Configuration Issues (5.3.2.1) 274

Example: Troubleshooting Layer 3 Switching (5.3.2.2) 275

总结ry (5.4) 278

Practice 279

Class Activities 279

Labs 279

Packet Tracer Activities 279

Check Your Understanding Questions 280

Chapter 6 Static Routing 283

Objectives 283

Key Terms 283

Introduction (6.0.1.1) 285

年代tatic Routing (6.1.1) 286

Reach Remote Networks (6.1.1.1) 286

Why Use Static Routing? (6.1.1.2) 286

When to Use Static Routes (6.1.1.3) 288

Types of Static Routes 289

年代tatic Route Applications (6.1.2.1) 289

年代tandard Static Route (6.1.2.2) 289

Default Static Route (6.1.2.3) 290

总结ry Static Route (6.1.2.4) 290

Floating Static Route (6.1.2.5) 291

Configure IPv4 Static Routes (6.2.1) 292

ip route Command (6.2.1.1) 292

Next-Hop Options (6.2.1.2) 293

Configure a Next-Hop Static Route (6.2.1.3) 297

Configure a Directly Connected Static Route (6.2.1.4) 299

Configure a Fully Specified Static Route (6.2.1.5) 301

Verify a Static Route (6.2.1.6) 304

Configure IPv4 Default Routes (6.2.2) 306

Default Static Route (6.2.2.1) 306

Configure a Default Static Route (6.2.2.2) 307

Verify a Default Static Route (6.2.2.3) 308

Configure IPv6 Static Routes (6.2.3) 310

The ipv6 route Command (6.2.3.1) 310

Next-Hop Options (6.2.3.2) 311

Configure a Next-Hop Static IPv6 Route (6.2.3.3) 315

Configure a Directly Connected Static IPv6 Route (6.2.3.4) 317

Configure a Fully Specified Static IPv6 Route (6.2.3.5) 319

Verify IPv6 Static Routes (6.2.3.6) 320

Configure IPv6 Default Routes (6.2.4) 322

Default Static IPv6 Route (6.2.4.1) 322

Configure a Default Static IPv6 Route (6.2.4.2) 323

Verify a Default Static Route (6.2.4.3) 323

Review of CIDR and VLSM (6.3) 325

Classful Network Addressing (6.3.1.1) 326

Classful Subnet Masks (6.3.1.2) 327

Classful Routing Protocol Example (6.3.1.3) 328

Classful Addressing Waste (6.3.1.4) 329

CIDR (6.3.2) 331

Classless Inter-Domain Routing (6.3.2.1) 331

CIDR and Route Summarization (6.3.2.2) 332

年代tatic Routing CIDR Example (6.3.2.3) 333

无类路由协议的例子(6.3.2.4)335

VLSM (6.3.3) 335

Fixed-Length Subnet Masking (6.3.3.1) 336

Variable-Length Subnet Masking (6.3.3.2) 337

VLSM in Action (6.3.3.3) 338

年代ubnetting Subnets (6.3.3.4) 339

VLSM Example (6.3.3.5) 341

Configure IPv4 Summary Routes (6.4.1) 346

Route Summarization (6.4.1.1) 346

Calculate a Summary Route (6.4.1.2) 346

总结ry Static Route Example (6.4.1.3) 348

Configure IPv6 Summary Routes (6.4.2) 352

总结rize IPv6 Network Addresses (6.4.2.1) 352

Calculate IPv6 Summary Addresses (6.4.2.2) 354

Configure an IPv6 Summary Address (6.4.2.3) 356

Configure Floating Static Routes (6.4.3) 358

Floating Static Routes (6.4.3.1) 358

Configure a Floating Static Route (6.4.3.2) 359

Test the Floating Static Route (6.4.3.3) 360

Troubleshoot Static and Default Route Issues (6.5) 363

年代tatic Routes and Packet Forwarding (6.5.1.1) 364

Troubleshoot a Missing Route (6.5.2.1) 364

年代olve a Connectivity Problem (6.5.2.2) 368

总结ry (6.6) 373

Practice 374

Class Activities 375

Labs 375

Packet Tracer Activities 375

Check Your Understanding Questions 376

Chapter 7 Routing Dynamically 379

Objectives 379

Key Terms 379

Introduction (7.0.1.1) 381

Dynamic Routing Protocol Operation (7.1.1) 382

The Evolution of Dynamic Routing Protocols (7.1.1.1) 382

Purpose of Dynamic Routing Protocols (7.1.1.2) 383

The Role of Dynamic Routing Protocols (7.1.1.3) 384

Dynamic Versus Static Routing (7.1.2) 385

Using Static Routing (7.1.2.1) 386

年代tatic Routing Scorecard (7.1.2.2) 386

Using Dynamic Routing Protocols (7.1.2.3) 387

Dynamic Routing Scorecard (7.1.2.4) 388

Routing Protocol Operating Fundamentals (7.1.3) 389

Dynamic Routing Protocol Operation (7.1.3.1) 389

Cold Start (7.1.3.2) 390

Network Discovery (7.1.3.3) 391

Exchanging the Routing Information (7.1.3.4) 392

Achieving Convergence (7.1.3.5) 394

Types of Routing Protocols (7.1.4) 396

Classifying Routing Protocols (7.1.4.1) 396

IGP and EGP Routing Protocols (7.1.4.2) 399

Distance Vector Routing Protocols (7.1.4.3) 401

Link-State Routing Protocols (7.1.4.4) 402

Classful Routing Protocols (7.1.4.5) 402

Classless Routing Protocols (7.1.4.6) 406

Routing Protocol Characteristics (7.1.4.7) 409

Routing Protocol Metrics (7.1.4.8) 410

Distance Vector Routing Protocol Operation (7.2.1) 411

Distance Vector Technologies (7.2.1.1) 411

Distance Vector Algorithm (7.2.1.2) 412

Types of Distance Vector Routing Protocols (7.2.2) 413

Routing Information Protocol (7.2.2.1) 413

Enhanced Interior-Gateway Routing Protocol (7.2.2.2) 415

RIP and RIPng Routing (7.3) 416

Router RIP Configuration Mode (7.3.1.1) 416

Advertising Networks (7.3.1.2) 418

Examining Default RIP Settings (7.3.1.3) 419

Enabling RIPv2 (7.3.1.4) 421

Disabling Auto Summarization (7.3.1.5) 423

Configuring Passive Interfaces (7.3.1.6) 425

Propagating a Default Route (7.3.1.7) 427

Configuring the RIPng Protocol (7.3.2) 429

Advertising IPv6 Networks (7.3.2.1) 429

Examining the RIPng Configuration (7.3.2.2) 430

Link-State Dynamic Routing (7.4) 433

年代hortest Path First Protocols (7.4.1.1) 433

Dijkstra’s Algorithm (7.4.1.2) 434

年代PF Example (7.4.1.3) 435

Link-State Updates (7.4.2) 438

Link-State Routing Process (7.4.2.1) 438

Link and Link-State (7.4.2.2) 438

年代ay Hello (7.4.2.3) 442

Building the Link-State Packet (7.4.2.4) 442

Flooding the LSP (7.4.2.5) 443

Building the Link-State Database (7.4.2.6) 443

Building the SPF Tree (7.4.2.7) 445

Adding OSPF Routes to the Routing Table (7.4.2.8) 446

Why Use Link-State Routing Protocols (7.4.3) 447

Why Use Link-State Protocols? (7.4.3.1) 447

Disadvantages of Link-State Protocols (7.4.3.2) 448

Protocols That Use Link-State (7.4.3.3) 449

Parts of an IPv4 Route Entry (7.5.1) 449

Routing Table Entries (7.5.1.1) 449

Directly Connected Entries (7.5.1.2) 451

Remote Network Entries (7.5.1.3) 453

Dynamically Learned IPv4 Routes (7.5.2) 454

Routing Table Terms (7.5.2.1) 454

Ultimate Route (7.5.2.2) 455

Level 1 Route (7.5.2.3) 455

Level 1 Parent Route (7.5.2.4) 456

Level 2 Child Route (7.5.2.5) 458

The IPv4 Route Lookup Process (7.5.3) 460

Route Lookup Process (7.5.3.1) 460

Best Route = Longest Match (7.5.3.2) 462

Analyze an IPv6 Routing Table (7.5.4) 463

IPv6 Routing Table Entries (7.5.4.1) 463

Directly Connected Entries (7.5.4.2) 464

Remote IPv6 Network Entries (7.5.4.3) 466

总结ry (7.6) 469

Practice 470

Class Activities 470

Labs 471

Packet Tracer Activities 471

Check Your Understanding Questions 471

Chapter 8 Single-Area OSPF 475

Objectives 475

Key Terms 475

Introduction (8.0.1.1) 477

Characteristics of OSPF (8.1) 477

Evolution of OSPF (8.1.1.1) 477

Features of OSPF (8.1.1.2) 479

Components of OSPF (8.1.1.3) 479

Data Structures 479

Routing Protocol Messages 480

Algorithm 481

Link-State Operation (8.1.1.4) 481

年代ingle-Area and Multiarea OSPF (8.1.1.5) 484

OSPF Messages (8.1.2) 487

Encapsulating OSPF Messages (8.1.2.1) 487

Types of OSPF Packets (8.1.2.2) 489

Hello Packet (8.1.2.3) 489

Hello Packet Intervals (8.1.2.4) 491

Link-State Updates (8.1.2.5) 492

OSPF Operation (8.1.3) 493

OSPF Operational States (8.1.3.1) 493

494年建立邻居邻接(8.1.3.2)

OSPF DR and BDR (8.1.3.3) 496

年代ynchronizing OSPF Databases (8.1.3.4) 497

Configuring Single-Area OSPFv2 (8.2.1) 500

OSPF Network Topology (8.2.1.1) 500

Router OSPF Configuration Mode (8.2.1.2) 501

路由器id (8.2.1.3) 502

Configuring an OSPF Router ID (8.2.1.4) 503

Modifying a Router ID (8.2.1.5) 505

Using a Loopback Interface as the Router ID (8.2.1.6) 507

配置单独的区域OSPFv2 (8.2.2) 507

Enabling OSPF on Interfaces (8.2.2.1) 507

Wildcard Mask (8.2.2.2) 508

The network Command (8.2.2.3) 509

Passive Interface (8.2.2.4) 510

Configuring Passive Interfaces (8.2.2.5) 511

OSPF Cost (8.2.3) 512

OSPF Metric = Cost (8.2.3.1) 513

OSPF Accumulates Costs (8.2.3.2) 514

Adjusting the Reference Bandwidth (8.2.3.3) 515

Adjusting the Reference Bandwidth 515

Default Interface Bandwidths (8.2.3.4) 519

Adjusting the Interface Bandwidths (8.2.3.5) 521

Manually Setting the OSPF Cost (8.2.3.6) 522

Verify OSPF (8.2.4) 523

Verify OSPF Neighbors (8.2.4.1) 523

Verify OSPF Protocol Settings (8.2.4.2) 525

Verify OSPF Process Information (8.2.4.3) 526

Verify OSPF Interface Settings (8.2.4.4) 526

OSPFv2 vs. OSPFv3 (8.3.1) 527

OSPFv3 (8.3.1.1) 528

年代imilarities Between OSPFv2 to OSPFv3 (8.3.1.2) 529

Differences Between OSPFv2 and OSPFv3 (8.3.1.3) 529

Link-Local Addresses (8.3.1.4) 530

Configuring OSPFv3 (8.3.2) 531

OSPFv3网络拓扑结构(8.3.2.1) 531

Link-Local Addresses (8.3.2.2) 533

Assigning Link-Local Addresses (8.3.2.3) 534

Configuring the OSPFv3 Router ID (8.3.2.4) 535

Modifying an OSPFv3 Router ID (8.3.2.5) 538

Enabling OSPFv3 on Interfaces (8.3.2.6) 539

Verify OSPFv3 (8.3.3) 540

Verify OSPFv3 Neighbors (8.3.3.1) 540

Verify OSPFv3 Protocol Settings (8.3.3.2) 541

Verify OSPFv3 Interfaces (8.3.3.3) 542

Verify the IPv6 Routing Table (8.3.3.4) 543

总结ry (8.4) 544

Practice 545

Class Activities 545

Labs 545

Packet Tracer Activities 546

Check Your Understanding Questions 546

Chapter 9 Access Control Lists 549

Objectives 549

Key Terms 549

Introduction (9.0.1.1) 550

IP ACL Operation (9.1) 551

What Is an ACL? (9.1.1.1) 551

A TCP Conversation (9.1.1.2) 552

TCP Communication 552

Packet Filtering (9.1.1.3, 9.1.1.4) 555

ACL Operation (9.1.1.5) 557

年代tandard Versus Extended IPv4 ACLS (9.1.2) 558

Types of Cisco IPv4 ACLs (9.1.2.1) 558

年代tandard ACLs 558

Extended ACLs 559

Numbering and Naming ACLs (9.1.2.2) 559

Wildcard Masks in ACLs (9.1.3) 560

Introducing ACL Wildcard Masking (9.1.3.1) 560

Wildcard Masking 560

Using a Wildcard Mask 562

Wildcard Mask Examples (9.1.3.2) 562

Wildcard Masks to Match IPv4 Subnets 562

Wildcard Masks to Match Ranges 563

Calculating the Wildcard Mask (9.1.3.3) 564

Wildcard Mask Keywords (9.1.3.4) 565

Wildcard Bit Mask Keywords 566

Examples Wildcard Mask Keywords (9.1.3.5) 567

The any and host Keywords 567

Guidelines for ACL Creation (9.1.4) 568

General Guidelines for Creating ACLs (9.1.4.1) 568

ACL Best Practices (9.1.4.2) 569

Guidelines for ACL Placement (9.1.5) 570

Where to Place ACLs (9.1.5.1) 570

年代tandard ACL Placement (9.1.5.2) 571

Extended ACL Placement (9.1.5.3) 573

年代tandard IPv4 ACLs (9.2) 574

Entering Criteria Statements (9.2.1.1) 574

Configuring a Standard ACL – Standard ACL Logic (9.2.1.2) 575

Configuring a Standard ACL – Configuring Standard ACLs (9.2.1.3) 576

Internal Logic (9.2.1.4) 578

Applying Standard ACLs to Interfaces – Standard ACL

Configuration Procedures (9.2.1.5, 9.2.1.6) 579

Creating Named Standard ACLs (9.2.1.7) 582

Commenting ACLs (9.2.1.8) 584

Modify IPv4 ACLs (9.2.2) 586

Editing Standard Numbered ACLs (9.2.2.1, 9.2.2.2) 586

Method 1: Using a Text Editor 586

Method 2: Using the Sequence Number 587

Editing Standard Named ACLs (9.2.2.3) 589

Verifying ACLs (9.2.2.4) 590

ACL Statistics (9.2.2.5) 591

年代tandard ACL Sequence Numbers (9.2.2.6) 592

年代ecuring VTY Ports with a Standard IPv4 ACL (9.2.3) 595

Configuring a Standard ACL to Secure a VTY Port (9.2.3.1) 595

Verifying a Standard ACL Used to Secure a VTY Port (9.2.3.2) 596

年代tructure of an Extended IPv4 ACL (9.3.1) 598

Extended ACLs – Testing Packets with Extended ACLs (9.3.1.1) 598

Extended ACLs – Testing for Ports and Services (9.3.1.2) 599

Configure Extended IPv4 ACLs (9.3.2) 601

Configuring Extended ACLs (9.3.2.1) 601

Applying Extended ACLs to Interfaces (9.3.2.2) 603

Filtering Traffic with Extended ACLs (9.3.2.3) 605

Creating Named Extended ACLs (9.3.2.4) 606

Verifying Extended ACLs (9.3.2.5) 607

Editing Extended ACLs (9.3.2.6) 608

Troubleshoot ACLs (9.4) 611

Inbound and Outbound ACL Logic (9.4.1.1) 611

ACL Logic Operations (9.4.1.2) 613

年代tandard ACL Decision Process (9.4.1.3) 614

Extended ACL Decision Process (9.4.1.4) 615

Common ACL Errors (9.4.2) 616

Troubleshooting Common ACL Errors - Example 1 (9.4.2.1) 616

Troubleshooting Common ACL Errors - Example 2 (9.4.2.2) 617

Troubleshooting Common ACL Errors - Example 3 (9.4.2.3) 618

Troubleshooting Common ACL Errors - Example 4 (9.4.2.4) 619

Troubleshooting Common ACL Errors - Example 5 (9.4.2.5) 619

IPv6 ACLs (9.5) 621

Type of IPv6 ACLs (9.5.1.1) 621

Comparing IPv4 and IPv6 ACLs (9.5.1.2) 621

Configuring IPv6 Topology (9.5.2.1) 623

Configuring IPv6 ACLs (9.5.2.2) 625

Applying an IPv6 ACL to an Interface (9.5.2.3) 627

IPv6 ACL Examples (9.5.2.4) 628

Deny FTP 629

Restricted Access 629

Verifying IPv6 ACLs (9.5.2.5) 630

总结ry (9.6) 633

Practice 635

Class Activities 635

Labs 635

Packet Tracer Activities 635

Check Your Understanding Questions 636

Chapter 10 DHCP 639

Objectives 639

Key Terms 639

Introduction (10.0.1.1) 640

Dynamic Host Configuration Protocol v4 (10.1) 641

Introducing DHCPv4 (10.1.1.1) 641

DHCPv4 Operation (10.1.1.2) 642

Lease Origination 642

Lease Renewal 644

DHCPv4 Message Format (10.1.1.3) 645

DHCPv4 Discover and Offer Messages (10.1.1.4) 646

Configuring a Basic DHCPv4 Server (10.1.2) 648

Configuring a Basic DHCPv4 Server (10.1.2.1) 648

DHCPv4 Example 651

Disabling DHCPv4 651

Verifying DHCPv4 (10.1.2.2) 651

DHCPv4 Relay (10.1.2.3) 655

What Is DHCP Relay? 655

Configure DHCPv4 Client (10.1.3) 659

Configuring a Router as DHCPv4 Client (10.1.3.1) 659

Configuring a SOHO Router as a DHCPv4 Client (10.1.3.2) 660

Troubleshoot DHCPv4 (10.1.4) 661

Troubleshooting Tasks (10.1.4.1) 661

Troubleshooting Task 1: Resolve IPv4 Address Conflicts 662

Troubleshooting Task 2: Verify Physical Connectivity 662

Troubleshooting Task 3: Test Connectivity Using a Static IP Address 662

Troubleshooting Task 4: Verify Switch Port Configuration 662

Troubleshooting Task 5: Test DHCPv4 Operation on the Same Subnet or VLAN 663

Verify Router DHCPv4 Configuration (10.1.4.2) 663

Debugging DHCPv4 (10.1.4.3) 664

Dynamic Host Configuration Protocol v6 (10.2) 665

年代tateless Address Autoconfiguration (SLAAC) (10.2.1.1) 665

年代LAAC Operation (10.2.1.2) 666

年代LAAC and DHCPv6 (10.2.1.3) 668

年代LAAC Option (10.2.1.4) 669

年代LAAC Option (Router Advertisement Only) 669

年代tateless DHCPv6 Option (10.2.1.5) 670

年代tateless DHCPv6 Option (Router Advertisement and DHCPv6) 670

年代tateful DHCPv6 Option (10.2.1.6) 671

年代tateful DHCPv6 (DHCPv6 Only) 671

DHCPv6 Operations (10.2.1.7) 671

DHCPv6 Communications 672

年代tateless DHCPv6 (10.2.2) 673

Configuring a Router as a Stateless DHCPv6 Server (10.2.2.1) 673

DHCPv6 Stateless Server Example 674

Configuring a Router as a Stateless DHCPv6 Client (10.2.2.2) 675

Verifying Stateless DHCPv6 (10.2.2.3) 675

Verifying the Stateless DHCPv6 Server 675

Verifying the Stateless DHCPv6 Client 676

年代tateful DHCPv6 Server (10.2.3) 678

Configuring a Router as a Stateful DHCPv6 Server (10.2.3.1) 678

DHCPv6 Stateful Server Example 679

Configuring a Router as a Stateful DHCPv6 Client (10.2.3.2) 679

Verifying Stateful DHCPv6 (10.2.3.3) 680

Verifying the Stateful DHCPv6 Client 681

Configuring a Router as a DHCPv6 Relay Agent (10.2.3.4) 682

Configuring the DHCPv6 Relay Agent 683

Troubleshoot DHCPv6 (10.2.4) 683

Troubleshooting Tasks (10.2.4.1) 683

Troubleshooting Task 1. Resolve Conflicts 684

Troubleshooting Task 2. Verify Allocation Method 684

Troubleshooting Task 3. Test with a Static IPv6 Address 684

Troubleshooting Task 4. Verify Switch Port Configuration 684

Troubleshooting Task 5. Test DHCPv6 Operation on the Same Subnet or VLAN 684

Verify Router DHCPv6 Configuration (10.2.4.2) 685

年代tateful DHCPv6 685

年代tateless DHCPv6 685

Debugging DHCPv6 (10.2.4.3) 686

总结ry (10.3) 688

Practice 690

Class Activities 690

Packet Tracer Activities 690

Check Your Understanding Questions 691

Chapter 11 Network Address Translation for IPv4 695

Objectives 695

Key Terms 695

Introduction (11.0.1.1) 696

NAT Operation (11.1) 697

IPv4 Private Address Space (11.1.1.1) 697

What Is NAT? (11.1.1.2) 698

NAT Terminology (11.1.1.3, 11.1.1.4) 699

How NAT Works (11.1.1.5) 702

Types of NAT (11.1.2) 703

年代tatic NAT (11.1.2.1) 703

Dynamic NAT (11.1.2.2) 704

Port Address Translation (PAT) (11.1.2.3) 705

Next Available Port (11.1.2.4) 706

Comparing NAT and PAT (11.1.2.5) 707

Packets Without a Layer 4 Segment 708

Benefits of NAT (11.1.3) 709

Benefits of NAT (11.1.3.1) 709

Disadvantages of NAT (11.1.3.2) 710

Configuring NAT (11.2) 710

Configuring Static NAT (11.2.1.1) 711

Analyzing Static NAT (11.2.1.2) 713

Verifying Static NAT (11.2.1.3) 714

Configuring Dynamic NAT (11.2.2) 716

Dynamic NAT Operation (11.2.2.1) 716

Configuring Dynamic NAT (11.2.2.2) 717

Analyzing Dynamic NAT (11.2.2.3) 719

Verifying Dynamic NAT (11.2.2.4) 721

Configuring Port Address Translation (PAT) (11.2.3) 724

Configuring PAT: Address Pool (11.2.3.1) 724

Configuring PAT for a Pool of Public IP Addresses 724

Configuring PAT: Single Address (11.2.3.2) 726

Analyzing PAT (11.2.3.3) 727

PC to Server Process 728

年代erver to PC Process 729

Verifying PAT (11.2.3.4) 730

Port Forwarding (11.2.4) 731

年代OHO Example (11.2.4.2) 733

Configuring Port Forwarding with IOS (11.2.4.3) 734

Configuring NAT and IPv6 (11.2.5) 736

NAT for IPv6? (11.2.5.1) 737

IPv6独特的本地地址(11.2.5.2)738

NAT for IPv6 (11.2.5.3) 739

Troubleshooting NAT (11.3) 740

Troubleshooting NAT: show Commands (11.3.1.1) 740

Troubleshooting NAT: debug Command (11.3.1.2) 742

Case Study (11.3.1.3) 744

Case Study 1 744

总结ry (11.4) 747

Practice 748

Class Activities 748

Labs 748

Packet Tracer Activities 749

Check Your Understanding Questions 749

附录A Answers to the “Check Your Understanding” Questions 755

Glossary 771

TOC, 9781587133183, 1/21/2014

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

年代urveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

年代ervice Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

我们定期与用户沟通公关ovide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

年代ecurity


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • 年代uch marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

选择/ Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

年代ale of Personal Information


皮尔森并不出租或出售个人信息in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

年代upplemental Privacy Statement for California Residents


California residents should read our年代upplemental privacy statement for California residentsin conjunction with this Privacy Notice. The年代upplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

年代haring and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020