Home>Store

Routing and Switching Essentials v6 Companion Guide

Register your productto gain access to bonus material or receive a coupon.

Routing and Switching Essentials v6 Companion Guide

eBook (Watermarked)

  • Your Price: $49.87
  • List Price: $58.67
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Description

  • Copyright 2017
  • Dimensions: 8" x 9-1/8"
  • Pages: 640
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-466965-7
  • ISBN-13: 978-0-13-466965-6

Routing and Switching Essentials v6 Companion Guide


Routing and Switching Essentials v6 Companion Guideis the official supplemental textbook for the Routing and Switching Essentials course in the Cisco Networking Academy CCNA Routing and Switching curriculum.


This course describes the architecture, components, and operations of routers and switches in a small network.


TheCompanion Guideis designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.


The book’s features help you focus on important concepts to succeed in this course:


·Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.

·Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.

·Glossary–Consult the comprehensive Glossary with more than 250 terms.

·Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.

·Check Your Understanding–Evaluate your readiness with the end-ofchapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.


·How To–Look for this icon to study the steps you need to learn to perform certain tasks.

·Interactive Activities–Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.

·Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.

·Videos–Watch the videos embedded within the online course.

·Hands-on Labs–Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide.


This book is part of theCisco Networking Academy Seriesfrom Cisco Press. Books in this series support and complement the Cisco Networking Academy curriculum.

Sample Content

Table of Contents

Introduction xxi

Chapter 1Routing Concepts 1

Objectives 1

Key Terms 1

Introduction (1.0.1.1) 3

Router Initial Configuration (1.1) 4

Router Functions (1.1.1) 4

Characteristics of a Network (1.1.1.1) 4

Why Routing? (1.1.1.2) 6

Routers Are Computers (1.1.1.3) 7

Routers Interconnect Networks (1.1.1.4) 9

Routers Choose Best Paths (1.1.1.5) 10

Packet-Forwarding Mechanisms (1.1.1.6) 11

Connect Devices (1.1.2) 14

Connect to a Network (1.1.2.1) 14

Default Gateways (1.1.2.2) 16

Document Network Addressing (1.1.2.3) 17

Enable IP on a Host (1.1.2.4) 18

Device LEDs (1.1.2.5) 19

Console Access (1.1.2.6) 21

Enable IP on a Switch (1.1.2.7) 22

Router Basic Settings (1.1.3) 23

配置ure Basic Router Settings (1.1.3.1) 23

配置ure an IPv4 Router Interface (1.1.3.2) 24

配置ure an IPv6 Router Interface (1.1.3.3) 26

配置ure an IPv4 Loopback Interface (1.1.3.4) 29

Verify Connectivity of Directly Connected Networks (1.1.4) 30

Verify Interface Settings (1.1.4.1) 30

Verify IPv6 Interface Settings (1.1.4.2) 32

Filter Show Command Output (1.1.4.3) 35

Command History Feature (1.1.4.4) 36

Routing Decisions (1.2) 37

Switching Packets Between Networks (1.2.1) 37

Router Switching Function (1.2.1.1) 38

Send a Packet (1.2.1.2) 39

Forward to the Next Hop (1.2.1.3) 40

Packet Routing (1.2.1.4) 42

Reach the Destination (1.2.1.5) 43

Path Determination (1.2.2) 44

Routing Decisions (1.2.2.1) 44

Best Path (1.2.2.2) 45

Load Balancing (1.2.2.3) 46

Administrative Distance (1.2.2.4) 47

Router Operation (1.3) 48

Analyze the Routing Table (1.3.1) 49

The Routing Table (1.3.1.1) 49

Routing Table Sources (1.3.1.2) 49

Remote Network Routing Entries (1.3.1.3) 51

Directly Connected Routes (1.3.2) 52

Directly Connected Interfaces (1.3.2.1) 52

Directly Connected Routing Table Entries (1.3.2.2) 53

Directly Connected Examples (1.3.2.3) 54

Directly Connected IPv6 Example (1.3.2.4) 55

Statically Learned Routes (1.3.3) 58

Static Routes (1.3.3.1) 58

Static Route Examples (1.3.3.2) 59

Static IPv6 Route Examples (1.3.3.3) 61

Dynamic Routing Protocols (1.3.4) 62

Dynamic Routing (1.3.4.1) 62

IPv4 Routing Protocols (1.3.4.2) 63

IPv4 Dynamic Routing Examples (1.3.4.3) 64

IPv6 Routing Protocols (1.3.4.4) 65

IPv6 Dynamic Routing Examples (1.3.4.5) 66

Summary (1.4) 67

Practice 68

Class Activities 68

Labs 68

Packet Tracer Activities 69

Check Your Understanding Questions 69

Chapter 2Static Routing 75

Objectives 75

Key Terms 75

Introduction (2.0.1.1) 76

Implement Static Routes (2.1) 76

Static Routing (2.1.1) 77

Reach Remote Networks (2.1.1.1) 77

Why Use Static Routing? (2.1.1.2) 78

当使用静态路由(2.1.1.3)79

Types of Static Routes (2.1.2) 80

Static Route Applications (2.1.2.1) 80

Standard Static Route (2.1.2.2) 81

Default Static Route (2.1.2.3) 81

Summary Static Route (2.1.2.4) 82

Floating Static Route (2.1.2.5) 83

配置ure Static and Default Routes (2.2) 84

配置ure IPv4 Static Routes (2.2.1) 84

The ip route Command (2.2.1.1) 84

Next-Hop Options (2.2.1.2) 85

配置ure a Next-Hop Static Route (2.2.1.3) 87

配置ure a Directly Connected Static Route (2.2.1.4) 88

配置ure a Fully Specified Static Route (2.2.1.5) 90

Verify a Static Route (2.2.1.6) 92

配置ure IPv4 Default Routes (2.2.2) 93

Default Static Route (2.2.2.1) 93

配置ure a Default Static Route (2.2.2.2) 93

Verify a Default Static Route (2.2.2.3) 94

配置ure IPv6 Static Routes (2.2.3) 95

The ipv6 route Command (2.2.3.1) 95

Next-Hop Options (2.2.3.2) 96

配置ure a Next-Hop Static IPv6 Route (2.2.3.3) 99

配置ure a Directly Connected Static IPv6 Route (2.2.3.4) 100

配置ure a Fully Specified Static IPv6 Route (2.2.3.5) 102

Verify IPv6 Static Routes (2.2.3.6) 103

配置ure IPv6 Default Routes (2.2.4) 104

Default Static IPv6 Route (2.2.4.1) 104

配置ure a Default Static IPv6 Route (2.2.4.2) 105

Verify a Default Static Route (2.2.4.3) 105

配置ure Floating Static Routes (2.2.5) 106

Floating Static Routes (2.2.5.1) 106

配置ure an IPv4 Floating Static Route (2.2.5.2) 107

Test the IPv4 Floating Static Route (2.2.5.3) 108

配置ure an IPv6 Floating Static Route (2.2.5.4) 110

配置ure Static Host Routes (2.2.6) 111

Automatically Installed Host Routes (2.2.6.1) 111

配置ure IPv4 and IPv6 Static Host Routes (2.2.6.2) 113

Troubleshoot Static and Default Route (2.3) 115

Packet Processing with Static Routes (2.3.1) 115

Static Routes and Packet Forwarding (2.3.1.1) 115

Troubleshoot IPv4 Static and Default Route Configuration (2.3.2) 116

Troubleshoot a Missing Route (2.3.2.1) 116

Solve a Connectivity Problem (2.3.2.2) 118

Summary (2.4) 122

Practice 123

Class Activities 123

Labs 123

Packet Tracer Activities 123

Check Your Understanding Questions 124

Chapter 3Dynamic Routing 127

Objectives 127

Key Terms 127

Introduction (3.0.1.1) 129

Dynamic Routing Protocols (3.1) 130

Dynamic Routing Protocol Overview (3.1.1) 130

Dynamic Routing Protocol Evolution (3.1.1.1) 130

Dynamic Routing Protocol Components (3.1.1.2) 132

Dynamic Versus Static Routing (3.1.2) 133

Static Routing Uses (3.1.2.1) 133

静态路由的优点和缺点(3.1。2.2) 134

Dynamic Routing Protocols Uses (3.1.2.3) 134

Dynamic Routing Advantages and Disadvantages (3.1.2.4) 135

RIPv2 (3.2) 136

配置uring the RIP Protocol (3.2.1) 136

Router RIP Configuration Mode (3.2.1.1) 136

Advertise Networks (3.2.1.2) 138

Verify RIP Routing (3.2.1.3) 139

Enable and Verify RIPv2 (3.2.1.4) 140

Disable Auto Summarization (3.2.1.5) 142

配置ure Passive Interfaces (3.2.1.6) 143

Propagate a Default Route (3.2.1.7) 145

The Routing Table (3.3) 147

Parts of an IPv4 Route Entry (3.3.1) 147

Routing Table Entries (3.3.1.1) 148

Directly Connected Entries (3.3.1.2) 149

Remote Network Entries (3.3.1.3) 150

Dynamically Learned IPv4 Routes (3.3.2) 151

Routing Table Terms (3.3.2.1) 151

Ultimate Route (3.3.2.2) 152

Level 1 Route (3.3.2.3) 153

Level 1 Parent Route (3.3.2.4) 154

Level 2 Child Route (3.3.2.5) 155

The IPv4 Route Lookup Process (3.3.3) 156

Route Lookup Process (3.3.3.1) 156

Best Route = Longest Match (3.3.3.2) 158

Analyze an IPv6 Routing Table (3.3.4) 159

IPv6 Routing Table Entries (3.3.4.1) 159

Directly Connected Entries (3.3.4.2) 160

Remote IPv6 Network Entries (3.3.4.3) 162

Summary (3.4) 165

Practice 166

Class Activities 166

Labs 166

Packet Tracer Activities 166

Check Your Understanding Questions 166

Chapter 4Switched Networks 171

Objectives 171

Key Terms 171

Introduction (4.0.1.1) 173

LAN Design (4.1) 173

Converged Networks (4.1.1) 174

Growing Complexity of Networks (4.1.1.1) 174

Elements of a Converged Network (4.1.1.2) 175

Cisco Borderless Networks (4.1.1.3) 176

Hierarchy in the Borderless Switched Network (4.1.1.4) 177

Access, Distribution, and Core Layers (4.1.1.5) 179

Switched Networks (4.1.2) 181

Role of Switched Networks (4.1.2.1) 181

Form Factors (4.1.2.2) 183

The Switched Environment (4.2) 185

Frame Forwarding (4.2.1) 186

Switching as a General Concept in Networking and Telecommunications (4.2.1.1) 186

Dynamically Populating a Switch MAC Address Table (4.2.1.2) 188

Switch Forwarding Methods (4.2.1.3) 189

Store-and-Forward Switching (4.2.1.4) 190

Cut-Through Switching (4.2.1.5) 191

Switching Domains (4.2.2) 193

Collision Domains (4.2.2.1) 193

Broadcast Domains (4.2.2.2) 194

Alleviating Network Congestion (4.2.2.3) 195

Summary (4.3) 197

Practice 198

Class Activities 198

Check Your Understanding Questions 199

Chapter 5Switch Configuration 203

Objectives 203

Key Terms 203

Introduction (5.0.1.1) 204

Basic Switch Configuration (5.1) 205

配置ure a Switch with Initial Settings (5.1.1) 205

Switch Boot Sequence (5.1.1.1) 205

Recovering from a System Crash (5.1.1.2) 206

Switch LED Indicators (5.1.1.3) 207

Preparing for Basic Switch Management (5.1.1.4) 209

配置基本的开关管理与IP访问v4 (5.1.1.5) 210

配置ure Switch Ports (5.1.2) 213

Duplex Communication (5.1.2.1) 213

配置ure Switch Ports at the Physical Layer (5.1.2.2) 214

Auto-MDIX (5.1.2.3) 215

Verifying Switch Port Configuration (5.1.2.4) 216

Network Access Layer Issues (5.1.2.5) 218

Troubleshooting Network Access Layer Issues (5.1.2.6) 221

Switch Security (5.2) 222

Secure Remote Access (5.2.1) 222

SSH Operation (5.2.1.1) 222

配置uring SSH (5.2.1.2) 225

Verifying SSH (5.2.1.3) 227

Switch Port Security (5.2.2) 229

Secure Unused Ports (5.2.2.1) 229

Port Security: Operation (5.2.2.2) 230

Port Security: Violation Modes (5.2.2.3) 232

Port Security: Configuring (5.2.2.4) 233

Port Security: Verifying (5.2.2.5) 234

Ports in Error-Disabled State (5.2.2.6) 236

Summary (5.3) 239

Practice 240

Class Activities 240

Labs 241

Packet Tracer Activities 241

Check Your Understanding Questions 241

Chapter 6vlan 245

Objectives 245

Key Terms 245

Introduction (6.0.1.1) 247

VLAN Segmentation (6.1) 248

Overview of VLANs (6.1.1) 248

VLAN Definitions (6.1.1.1) 248

Benefits of VLANs (6.1.1.2) 249

Types of VLANs (6.1.1.3) 250

Voice VLANs (6.1.1.4) 252

VLANs in a Multiswitched Environment (6.1.2) 253

VLAN Trunks (6.1.2.1) 253

Controlling Broadcast Domains with VLANs (6.1.2.2) 254

Tagging Ethernet Frames for VLAN Identification (6.1.2.3) 256

Native VLANs and 802.1Q Tagging (6.1.2.4) 257

Voice VLAN Tagging (6.1.2.5) 258

VLAN Implementations (6.2) 260

VLAN Assignment (6.2.1) 260

VLAN Ranges on Catalyst Switches (6.2.1.1) 260

Creating a VLAN (6.2.1.2) 262

Assigning Ports to VLANs (6.2.1.3) 263

Changing VLAN Port Membership (6.2.1.4) 264

Deleting VLANs (6.2.1.5) 266

Verifying VLAN Information (6.2.1.6) 267

VLAN Trunks (6.2.2) 270

配置uring IEEE 802.1Q Trunk Links (6.2.2.1) 270

Resetting the Trunk to Default State (6.2.2.2) 272

Verifying Trunk Configuration (6.2.2.3) 273

Troubleshoot VLANs and Trunks (6.2.3) 275

IP Addressing Issues with VLAN (6.2.3.1) 275

Missing VLANs (6.2.3.2) 276

Introduction to Troubleshooting Trunks (6.2.3.3) 278

Common Problems with Trunks (6.2.3.4) 279

Incorrect Port Mode (6.2.3.5) 281

Incorrect VLAN List (6.2.3.6) 284

Inter-VLAN Routing Using Routers (6.3) 287

Inter-VLAN Routing Operation (6.3.1) 287

What Is Inter-VLAN Routing? (6.3.1.1) 287

Legacy Inter-VLAN Routing (6.3.1.2) 288

Router-on-a-Stick Inter-VLAN Routing (6.3.1.3) 290

配置ure Legacy Inter-VLAN Routing (6.3.2) 292

配置ure Legacy Inter-VLAN Routing: Preparation (6.3.2.1) 292

配置ure Legacy Inter-VLAN Routing: Switch Configuration (6.3.2.2) 293

配置ure Legacy Inter-VLAN Routing: Router Interface Configuration (6.3.2.3) 294

配置ure Router-on-a-Stick Inter-VLAN Routing (6.3.3) 296

配置ure Router-on-a-Stick: Preparation (6.3.3.1) 296

配置ure Router-on-a-Stick: Switch Configuration (6.3.3.2) 297

配置ure Router-on-a-Stick: Router Subinterface Configuration (6.3.3.3) 298

配置ure Router-on-a-Stick: Verifying Subinterfaces (6.3.3.4) 299

配置ure Router-on-a-Stick: Verifying Routing (6.3.3.5) 300

Summary (6.4) 303

Practice 304

Class Activities 305

Labs 305

Packet Tracer Activities 305

Check Your Understanding Questions 305

Chapter 7Access Control Lists 309

Objectives 309

Key Terms 309

Introduction (7.0.1.1) 310

ACL Operation (7.1) 310

Purpose of ACLs (7.1.1) 311

ACL是什么?(7.1.1.1) 311

Packet Filtering (7.1.1.2) 312

ACL Operation (7.1.1.3) 313

Wildcard Masks in ACLs (7.1.2) 314

Introducing ACL Wildcard Masking (7.1.2.1) 314

Wildcard Mask Examples (7.1.2.2) 316

Calculating the Wildcard Mask (7.1.2.3) 317

Wildcard Mask Keywords (7.1.2.4) 319

Wildcard Mask Keyword Examples (7.1.2.5) 320

Guidelines for ACL Creation (7.1.3) 321

General Guidelines for Creating ACLs (7.1.3.1) 321

ACL Best Practices (7.1.3.2) 322

Guidelines for ACL Placement (7.1.4) 322

Where to Place ACLs (7.1.4.1) 322

Standard ACL Placement (7.1.4.2) 324

Standard IPv4 ACLs (7.2) 325

配置ure Standard IPv4 ACLs (7.2.1) 325

Numbered Standard IPv4 ACL Syntax (7.2.1.1) 325

Applying Standard IPv4 ACLs to Interfaces (7.2.1.2) 328

Numbered Standard IPv4 ACL Examples (7.2.1.3) 329

Named Standard IPv4 ACL Syntax (7.2.1.4) 330

Modify IPv4 ACLs (7.2.2) 332

Method 1: Use a Text Editor (7.2.2.1) 333

Method 2: Use Sequence Numbers (7.2.2.2) 334

Editing Standard Named ACLs (7.2.2.3) 335

Verifying ACLs (7.2.2.4) 336

ACL Statistics (7.2.2.5) 338

Securing VTY Ports with a Standard IPv4 ACL (7.2.3) 339

The access-class Command (7.2.3.1) 339

Verifying the VTY Port Is Secured (7.2.3.2) 341

Troubleshoot ACLs (7.3) 342

Processing Packets with ACLs (7.3.1) 342

The Implicit Deny Any (7.3.1.1) 343

The Order of ACEs in an ACL (7.3.1.2) 343

Cisco IOS Reorders Standard ACLs (7.3.1.3) 344

Routing Processes and ACLs (7.3.1.4) 347

Common IPv4 Standard ACL Errors (7.3.2) 349

Troubleshooting Standard IPv4 ACLs–Example 1 (7.3.2.1) 349

Troubleshooting Standard IPv4 ACLs–Example 2 (7.3.2.2) 351

Troubleshooting Standard IPv4 ACLs–Example 3 (7.3.2.3) 352

Summary (7.4) 355

Practice 356

Class Activities 357

Labs 357

Packet Tracer Activities 357

Check Your Understanding Questions 357

Chapter 8DHCP 361

Objectives 361

Key Terms 361

Introduction (8.0.1.1) 363

DHCPv4 (8.1) 363

DHCPv4 Operation (8.1.1) 363

Introducing DHCPv4 (8.1.1.1) 364

DHCPv4 Operation (8.1.1.2) 364

DHCPv4 Message Format (8.1.1.3) 367

DHCPv4 Discover and Offer Messages (8.1.1.4) 369

配置uring a Basic DHCPv4 Server (8.1.2) 370

配置uring a Basic DHCPv4 Server (8.1.2.1) 370

Verifying DHCPv4 (8.1.2.2) 373

DHCPv4 Relay (8.1.2.3) 377

配置ure DHCPv4 Client (8.1.3) 380

配置uring a Router as a DHCPv4 Client (8.1.3.1) 380

配置uring a Wireless Router as a DHCPv4 Client (8.1.3.2) 381

Troubleshoot DHCPv4 (8.1.4) 382

Troubleshooting Tasks (8.1.4.1) 382

Verify Router DHCPv4 Configuration (8.1.4.2) 384

Debugging DHCPv4 (8.1.4.3) 385

DHCPv6 (8.2) 387

SLAAC and DHCPv6 (8.2.1) 387

Stateless Address Autoconfiguration (SLAAC) (8.2.1.1) 387

SLAAC Operation (8.2.1.2) 389

SLAAC and DHCPv6 (8.2.1.3) 390

SLAAC Option (8.2.1.4) 391

Stateless DHCPv6 Option (8.2.1.5) 392

Stateful DHCPv6 Option (8.2.1.6) 393

DHCPv6 Operations (8.2.1.7) 394

Stateless DHCPv6 (8.2.2) 395

配置uring a Router as a Stateless DHCPv6 Server (8.2.2.1) 395

配置uring a Router as a Stateless DHCPv6 Client (8.2.2.2) 396

Verifying Stateless DHCPv6 (8.2.2.3) 397

Stateful DHCPv6 Server (8.2.3) 399

配置uring a Router as a Stateful DHCPv6 Server (8.2.3.1) 399

配置uring a Router as a Stateful DHCPv6 Client (8.2.3.2) 401

Verifying Stateful DHCPv6 (8.2.3.3) 401

配置uring a Router as a DHCPv6 Relay Agent (8.2.3.4) 402

Troubleshoot DHCPv6 (8.2.4) 404

Troubleshooting Tasks (8.2.4.1) 404

Verify Router DHCPv6 Configuration (8.2.4.2) 405

Debugging DHCPv6 (8.2.4.3) 407

Summary (8.3) 409

Practice 410

Class Activities 410

Labs 411

Packet Tracer Activities 411

Check Your Understanding Questions 411

Chapter 9NAT for IPv4 415

Objectives 415

Key Terms 415

Introduction (9.0.1.1) 417

NAT Operation (9.1) 418

NAT Characteristics (9.1.1) 418

IPv4 Private Address Space (9.1.1.1) 418

What Is NAT? (9.1.1.2) 419

NAT Terminology (9.1.1.3 & 9.1.1.4) 420

How NAT Works (9.1.1.5) 423

Types of NAT (9.1.2) 424

Static NAT (9.1.2.1) 424

Dynamic NAT (9.1.2.2) 425

Port Address Translation (PAT) (9.1.2.3) 426

Next Available Port (9.1.2.4) 427

Comparing NAT and PAT (9.1.2.5) 428

NAT Advantages (9.1.3) 430

Advantages of NAT (9.1.3.1) 430

Disadvantages of NAT (9.1.3.2) 430

配置ure NAT (9.2) 431

配置uring Static NAT (9.2.1) 432

配置ure Static NAT (9.2.1.1) 432

Analyzing Static NAT (9.2.1.2) 433

Verifying Static NAT (9.2.1.3) 434

配置ure Dynamic NAT (9.2.2) 436

Dynamic NAT Operation (9.2.2.1) 436

配置uring Dynamic NAT (9.2.2.2) 437

Analyzing Dynamic NAT (9.2.2.3) 438

Verifying Dynamic NAT (9.2.2.4) 440

配置ure PAT (9.2.3) 443

配置uring PAT: Address Pool (9.2.3.1) 443

配置uring PAT: Single Address (9.2.3.2) 445

Analyzing PAT (9.2.3.3) 446

Verifying PAT (9.2.3.4) 449

配置ure Port Forwarding (9.2.4) 451

Port Forwarding (9.2.4.1) 451

Wireless Router Example (9.2.4.2) 452

配置uring Port Forwarding with IOS (9.2.4.3) 453

NAT and IPv6 (9.2.5) 456

NAT for IPv6? (9.2.5.1) 456

IPv6 Unique Local Addresses (9.2.5.2) 457

NAT for IPv6 (9.2.5.3) 458

Troubleshoot NAT (9.3) 459

NAT Troubleshooting Commands (9.3.1) 460

The show ip nat Commands (9.3.1.1) 460

The debug ip nat Command (9.3.1.2) 462

NAT Troubleshooting Scenario (9.3.1.3) 464

Summary (9.4) 468

Practice 469

Class Activities 469

Labs 469

Packet Tracer Activities 469

Check Your Understanding Questions 470

Chapter 10Device Discovery, Management, and Maintenance 475

Objectives 475

Key Terms 475

Introduction (10.0.0.1) 477

Device Discovery (10.1) 477

Device Discovery with CDP (10.1.1) 477

CDP Overview (10.1.1.1) 477

配置ure and Verify CDP (10.1.1.2) 478

Discover Devices Using CDP (10.1.1.3) 480

Device Discovery with LLDP (10.1.2) 483

LLDP Overview (10.1.2.1) 483

配置ure and Verify LLDP (10.1.2.2) 484

Discover Devices Using LLDP (10.1.2.3) 484

Device Management (10.2) 486

NTP (10.2.1) 487

Setting the System Clock (10.2.1.1) 487

NTP Operation (10.2.1.2) 488

配置ure and Verify NTP (10.2.1.3) 489

Syslog Operation (10.2.2) 491

Introduction to Syslog (10.2.2.1) 491

Syslog Operation (10.2.2.2) 492

Syslog Message Format (10.2.2.3) 493

Service Timestamp (10.2.2.4) 496

Syslog Configuration (10.2.3) 497

Syslog服务公司er (10.2.3.1) 497

Default Logging (10.2.3.2) 497

Router and Switch Commands for Syslog Clients (10.2.3.3) 499

Verifying Syslog (10.2.3.4) 500

Device Maintenance (10.3) 502

Router and Switch File Maintenance (10.3.1) 502

Router File Systems (10.3.1.1) 502

Switch File Systems (10.3.1.2) 505

Backing Up and Restoring Using Text Files (10.3.1.3) 505

Backing Up and Restoring TFTP (10.3.1.4) 507

Using USB Ports on a Cisco Router (10.3.1.5) 508

Backing Up and Restoring Using a USB (10.3.1.6) 508

Password Recovery (10.3.1.7) 511

IOS System Files (10.3.2) 514

IOS 15 System Image Packaging (10.3.2.1) 514

IOS Image Filenames (10.3.2.2) 515

IOS Image Management (10.3.3) 517

TFTP Servers as a Backup Location (10.3.3.1) 517

Steps to Back Up IOS Image to TFTP Server (10.3.3.2) 518

Steps to Copy an IOS Image to a Device (10.3.3.3) 519

The boot system Command (10.3.3.4) 521

Software Licensing (10.3.4) 522

Licensing Overview (10.3.4.1) 522

Licensing Process (10.3.4.2) 524

Step 1. Purchase the Software Package or Feature to Install (10.3.4.3) 524

Step 2. Obtain a License (10.3.4.4) 525

Step 3. Install the License (10.3.4.5) 526

License Verification and Management (10.3.5) 527

License Verification (10.3.5.1) 527

Activate an Evaluation Right-to-Use License (10.3.5.2) 529

许可(10.3.5.3)531

Uninstall the License (10.3.5.4) 532

Summary (10.4) 534

Practice 534

Labs 534

Packet Tracer Activities 535

Check Your Understanding Questions 535

Appendix AAnswers to the “Check Your Understanding” Questions

Glossary

9781587134289 TOC 11/8/2016

Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

在极少数情况下有必要发出rictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020