Lesson Plans CCNA. (Exam ) Version 6.0
|
|
|
- Nickolas Ward
- 10 years ago
- Views:
Transcription
1 Lesson Plans CCNA (Exam ) Version 6.0
2 Table of Contents Course Overview... 3 Section 0.1: Introduction... 6 Section 1.1: The OSI Model... 7 Section 1.2: TCP/IP... 9 Section 1.3: Device Communication Section 1.4: Ethernet Section 1.5: Bridging and Switching Section 1.6: Routing Section 2.1: Connecting Cisco Devices Section 2.2: System Startup Section 2.3: Command Line Interface (CLI) Section 2.4: Managing System Files Section 2.5: Using Show Commands Section 2.6: Hostname and Descriptions Section 2.7: System Passwords Section 2.8: Banners Section 2.9: Cisco Discovery Protocol (CDP) Section 3.1: Connecting Devices Section 3.2: Switch Configuration Section 3.3: TCP/IP Configuration Section 3.4: DHCP Section 3.5: DNS Section 3.6: Routing Section 3.7: Verifying TCP/IP Configuration Section 3.8: LAN Segmentation Section 4.1: Wireless Standards Section 4.2: Wireless Infrastructure Section 4.3: Wireless Security Section 4.4: Wireless Configuration Section 5.1: Subnet Operations Section 5.2: Subnet Design Section 5.3: Route Summarization Section 6.1: Wide Area Networks Section 6.2: WAN Connections Section 6.3: PPP Section 6.4: Network Address Translation (NAT) Section 6.5: WAN Troubleshooting Section 7.1: Virtual LANs (VLANs) Section 7.2: Trunking Section 7.3: VLAN Trunking Protocol (VTP) Section 7.4: Spanning Tree
3 Section 7.5: Spanning Tree Configuration Section 7.6: EtherChannel Section 7.7: Inter-VLAN Routing Section 8.1: Access List Concepts Section 8.2: Configuring Access Lists Section 8.3: Access List Implementation Section 9.1: Routing Protocols Section 9.2: RIP Section 9.3: OSPF Section 9.4: EIGRP Section 9.5: Routing Protocol Comparison Section 10.1: Troubleshooting Routing Section 10.2: Troubleshooting RIP Section 10.3: Troubleshooting OSPF Section 10.4: Troubleshooting EIGRP Section 11.1: Frame Relay Concepts Section 11.2: Enabling Frame Relay Section 11.3: Address Mapping Section 11.4: Subinterfaces Section 11.5: Troubleshooting Frame Relay Section 12.1: IPv6 Concepts Section 12.2: IPv6 Implementation Section 12.3: DHCP and NAT Section 13.1: Network Security Section 13.2: Network Hardening Section 13.3: Switch Port Security Section 13.4: Virtual Private Networks (VPNs) Practice Exams Appendix A: Approximate for the Course
4 Course Overview This course prepares students for the Cisco Certified Network Associate (CCNA) certification exam by Cisco. It focuses on implementing, managing, protecting, and troubleshooting small to medium size enterprise branch networks. Module 0 Introduction This module introduces the prerequisites to this course and discusses the two paths students can take to obtain CCNA certification. Students will become familiar with how to use the Cisco Simulator as a learning tool to complete the simulations throughout the course. Module 1 Networking Concepts This module discusses the basics of networking, starting with how the OSI Model and TCP/IP protocols relate to data flow in a network. Students will learn the steps to data encapsulation and the fundamentals of Ethernet architecture. They will learn how bridging, switching, and routing function in the network environment. Module 2 Cisco Devices In this module students will learn about accessing, starting up, configuring, and managing Cisco devices. They will learn how to use show commands to find information about the status of a Cisco switched network and how to change the device host name and configure descriptions on device interfaces. They will also learn how to apply router security through system passwords and banners and how to use Cisco Discovery Protocol (CDP) to learn and share information about neighboring Cisco devices. Module 3 LAN Implementation This module covers LAN implementation; devices to connect switches and routers to network devices and hosts, configuring switch port parameters, configuring and verifying settings for a TCP/IP network, configuring DHCP and DNS operations on a router, configuring Static and RIP routing, and using LAN segmentation to increase network performance and reduce congestion. Module 4 Wireless Networks In Module 4 students will learn the basics of using radio waves for data transmissions. They will learn wireless standards, infrastructure, security, and how to implement a wireless configuration. 3
5 Module 5 Subnetting Module 5 teaches the students how to calculate an addressing scheme for a network, configure subnet addresses, masks, and host addresses, and select the appropriate subnet addresses and masks for summarization. Module 6 WAN Implementation Module 6 discusses implementing Wide Area Networks (WANs). Students will become familiar with WAN types, components, transmission carriers, connectors, and how to configure a basic WAN connection. Students will learn how to configure PPP encapsulation on serial links, and the basics of Network Address Translation (NAT). They will also learn how to troubleshoot WANs with the commands used to verify device and network connectivity. Module 7 Advanced Switching In Module 7 students will learn advanced switching concepts that can be implemented depending upon the needs and configuration of the system; Virtual LANs (VLANs), Trunking, VLAN Trunking Protocol (VTP), Spanning Tree, EtherChannel, and Inter-VLAN routing. Module 8 Access Lists This module discusses the basics of access lists and configuring and applying access lists to allow or deny the flow of packets between networks. Module 9 IP Routing In this module students will learn basic routing concepts. They will learn to compare and configure Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced IGRP (EIGRP). Module 10 Troubleshooting Routing This section covers troubleshooting of routers. Troubleshooting tips and commands used to verify RIP, OSPF, and EIGRP configurations are presented. Module 11 Frame Relay In Module 11 students will learn the fundamentals of Frame Relay. They will learn how to configure Frame Relay on Cisco routers, configure address mappings, configure subinterfaces, and troubleshoot a Frame Relay configuration. Module 12 Advanced TCP/IP Configuration Module 12 teaches the students how to implement an IPv6 configuration, configure DHCP from the command line, and configure Dynamic and Static NAT. 4
6 Module 13 Network Security Module 13 discusses a variety of network security threats and solutions. Students will learn how to harden a network to tighten security controls and use switch port security to control communication through a switch port. They will also learn the basics of protecting IP traffic on a TCP/IP network using Virtual Private Network (VPN) security technologies. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the CCNA certification test. 5
7 Section 0.1: Introduction This section introduces the prerequisite knowledge a student should have before attempting this course. They include knowledge of: CompTIA s Network+ Or equivalent networking experience There are two paths available for obtaining the CCNA certification: 1. Pass Exam or 2. Pass Exam and Exam In this section students will learn how to use the Cisco Simulator. They should be familiar with launching the lab, completing the instructions in the scenario and reviewing the lab report. They will also need to identify the Cisco Device Icons used to represent network devices and connections in this course. Experiment with the router simulations so you will be able to demonstrate them in class. The first router simulation in the course is in 2.5.3: Find Device Information. About 10 minutes 6
8 Section 1.1: The OSI Model This section discusses the OSI model and explains how it relates to network communication. The following concepts are covered: The role of the OSI model Advantages of the OSI model Limitations of the OSI model The 7 layers of the OSI Model: o Layer 7 Application o Layer 6 Presentation o Layer 5 Session o Layer 4 Transport o Layer 3 Network o Layer 2 Data Link o Layer 1 Physical Basic characteristics of the lower OSI model layers: o Physical o Data Link Media Access Control (MAC) Logical Link Control (LLC) o Network o Transport Basic characteristics of the upper OSI model layers: o Application o Presentation o Session Comparing the functions performed at each OSI model layer 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach 7
9 Lecture Focus Questions: What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? Video/Demo OSI Model Introduction 1: Lower OSI Layers 8: Upper OSI Layers 9:10 Total 19:17 Number of Exam Questions 7 questions About 40 minutes 8
10 Section 1.2: TCP/IP This section examines the basic operation of the protocols in the TCP/IP Protocol Suite. The layers of the TCP/IP (also known as Department of Defense (DoD) Model) are compared to the OSI Model Layers. Students will become familiar with: Protocols in the TCP/IP suite: o File Transfer Protocol (FTP) o Trivial File Transfer Protocol (TFTP) o Hypertext Transfer Protocol (HTTP) o Simple Mail Transfer Protocol (SMTP) o Simple Network Management Protocol (SNMP) o Telnet o Network File System (NFS) o Voice Over Internet Protocol (VoIP) o Domain Name System (DNS) o Transmission Control Protocol (TCP) o User Datagram Protocol (UDP) o Internet Protocol (IP) o Internet Control Message Protocol (ICMP) o Internet Group Membership Protocol (IGMP) o Address Resolution Protocol (ARP) o Reverse Address Resolution Protocol (RARP) o Bootstrap Protocol (BOOTP) o Dynamic Host Configuration Protocol (DHCP) o Open Shortest Path First (OSPF) o Routing Information Protocol (RIP) The role of IP addresses Each of the following classes of IP addresses have an address range, first octet range, and default subnet mask: o A o B o C o D o E Special addresses: o Network o Host o Broadcast o Local host o Private use 9
11 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 104. Describe common networked applications including web applications 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network 301. Describe the operation and benefits of using private and public IP addressing Lecture Focus Questions: How does the DOD model correspond to the OSI model? Which TCP/IP protocols allow for copying and moving files? What does the Telnet protocol allow you to do? Which protocol includes a set of messages that controls how data moves through a network? What is the role of the subnet mask? What is the default address class of the IP address ? What three address ranges are used for private IP addresses? What is the broadcast address of network ? Video/Demo The TCP/IP Protocol Suite 2: IP Addresses 5:07 Total 7:08 Number of Exam Questions 8 questions About 25 minutes 10
12 Section 1.3: Device Communication This section explains data encapsulation. Students will need to know the five steps to the process of data encapsulation when transmitting a message from one device to another: 1. Data 2. Segment 3. Packet 4. Frame 5. Bits 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Lecture Focus Questions: Which OSI model layer uses service data units called frames? When moving from top to bottom through the OSI model layers, which comes first, packets or segments? What gets added to the service data unit at the Network layer? At the Data Link layer? Video/Demo Data Encapsulation 7: Data Encapsulation Process 0:51 Total 8:00 Number of Exam Questions 1 question About 10 minutes 11
13 Section 1.4: Ethernet In this section the students will learn the essentials of the following Ethernet architectural concepts: Ethernet architecture: o Topology o Media access o Transmission media o Frame type o Physical address Characteristics of various Ethernet implementations: o Ethernet o Fast Ethernet o Gigabit Ethernet Devices with collision detection turned on operate in half-duplex mode Devices with collision detection turned off operate in full-duplex mode 109. Describe the components required for network and Internet communications 201. Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts 202. Explain the technology and media access control method for Ethernet networks 403. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Lecture Focus Questions: What is the purpose of the jam signal and the back off in Ethernet communications? What is the maximum cable length allowed for 100BaseTX? What is the physical device address used on Ethernet networks? Two devices are using full-duplex communications with the 1000BaseT standards. What is the amount of bandwidth available? Under what conditions can you disable collision detection on an Ethernet network? 12
14 Video/Demo Ethernet Architecture 5: Collision Detection and Recovery 0:39 Total 6:01 Number of Exam Questions 12 questions About 25 minutes 13
15 Section 1.5: Bridging and Switching This section discusses the basics of how bridges and switches work. A bridge is a data forwarding device that provides data transfer. A switch is a multiport bridge that can perform switching tasks much faster than a bridge. Switches have replaced bridges in most network applications. Students will learn how bridges and switches use MAC addresses and ports to build a forwarding database. They will also learn the different methods the switch uses to forward packets: Store-and-forward Cut-through Fragment-free 101. Describe the purpose and functions of various network devices 102. Select the components required to meet a network specification 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 108. Determine the path between two hosts across a network 109. Describe the components required for network and Internet communications 204. Explain basic switching concepts and the operation of Cisco switches Lecture Focus Questions: What is the difference between a bridge and a switch? What is the 80/20 rule of network segmentation with bridges? How do bridges and switches learn MAC addresses? What is the difference between the store-and-forward and the fragmentfree switching methods? Which switching method is the fastest? 14
16 Video/Demo Bridges and Switches 4: How a Bridge Works 0: How a Bridge Learns 1: How a Switch Works 0:36 Total 6:54 Number of Exam Questions 14 questions About 25 minutes 15
17 Section 1.6: Routing This section discusses routing. A router is a device that sends packets from one network to another network. Routers use routing tables to maintain information about destination networks. Students will learn what type of information is stored in the routing table and how routers build and maintain the routing database Describe the purpose and functions of various network devices 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 108. Determine the path between two hosts across a network 109. Describe the components required for network and Internet communications 401. Describe basic routing concepts (including: packet forwarding, router lookup process) Lecture Focus Questions: What type of information is stored in the routing table? What is convergence? What is the function of a routing protocol? A computer needs to send a message to another computer on the same network. What MAC address would go into the destination portion of the frame? A computer needs to send a message to another computer on a different network. What MAC address would go into the destination portion of the frame? As a packet moves from device to device through an internetwork, do the Network layer addresses change or remain the same? Video/Demo Routers and Routing Tables 4: Internetwork Message Routing 2:23 Total 7:06 16
18 Number of Exam Questions 10 questions About 20 minutes 17
19 Section 2.1: Connecting Cisco Devices In this section students will become familiar with the following concepts about connection Cisco devices: Options to manage a Cisco device: o Console o Virtual Terminal (VTY) o Security Device Manager (SDM) Cable types to make the initial connection to the switch or the router for device management: o Rollover Cable o Straight-through Ethernet Cable o Crossover Ethernet Cable Students will learn how to: Use HyperTerminal to connect to a Cisco device console. Use Telnet to create a virtual terminal connection to a Cisco device Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters Lecture Focus Questions: What HyperTerminal settings should you use to connect to the router console for the first time? What are the requirements for using a VTY (virtual terminal) connection to a Cisco device? What type of cable do you use to connect a PC to a router console port? 18
20 Video/Demo Cisco Devices 6: Console Connections 2: Making a Console Connection 2:14 Total 10:58 Number of Exam Questions 4 questions About 15 minutes 19
21 Section 2.2: System Startup Students will learn basics about the system startup. Details include: The basic startup sequence of Cisco devices: o The Power-On Self Test (POST) checks the router s hardware. o The router checks the configuration register to identify where to load the IOS image from o The router loads the configuration file into RAM (which configures the router). Setup mode: o Methods to enter setup mode o Exiting setup mode Defaults of Cisco routers and switches Express setup details Students will learn how to: Use setup mode to complete an initial configuration of a Cisco device. Use the Express setup to configure a Cisco device 205. Perform and verify initial switch configuration tasks including remote access management 402. Describe the operation of Cisco routers (including: router bootup process, POST, router components) Lecture Focus Questions: If the router can't find an IOS image in flash, where will it look next? What happens if the router can't find a configuration file at startup? What is the role of the configuration register? What configuration register value tells the router to skip the startup-config file? 20
22 Video/Demo Startup Sequence 1: Using Setup Mode 6: Using Express Setup 5:29 Total 12:59 Number of Exam Questions 4 questions About 20 minutes 21
23 Section 2.3: Command Line Interface (CLI) This section examines the Command Line Interface (CLI). Details include: Basic command mode prompts and commands: o User EXEC o Privileged EXEC o Global Configuration o Line o Interface o Subinterface o Router o Setup o ROM Monitor o RXBoot Using help no matter what mode they are in to identify possible commands, keywords, and parameters. Using advanced editing features of the CLI o Ctrl + A o Ctrl + E o Ctrl + B o Ctrl + F o Esc, then B o Esc, then F o Ctrl + Z o Terminal editing o Terminal no editing Controlling screen output access commands in the history buffer and control response messages that are displayed on the screen Students will learn how to: Use help to identify possible commands, keywords, and parameters. Use advanced editing features to efficiently enter commands at the console. Turn on and access commands in the history buffer Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 22
24 Lecture Focus Questions: What router mode is indicated by the # prompt? How can you get a list of allowed keywords for a command? You use help to get a list of keywords for a command. In the list of options you see: A.B.C.D. What should you type to complete the command? How can you move the cursor backwards one word? How do you turn off console configuration messages? Video/Demo Cisco IOS 1: Understanding CLI Prompts 5: Using CLI Utilities 13:14 Total 20:52 Lab/Activity Use Command Help Number of Exam Questions 3 questions About 30 minutes 23
25 Section 2.4: Managing System Files In this section students will learn how to manage system files. Details covered include: Comparison of types of router storage: o ROM (Read-Only Memory) o Flash o RAM (Random Access Memory) o NVRAM (Non-Volatile RAM) Using the copy command in privileged EXEC mode Using the erase command to delete the configuration files Commands to manage system files Using the copy command to archive, upgrade or replace an IOS image Students will learn how to: Save your configuration changes. Load an IOS image from an alternate location. Upgrade the IOS image Access and utilize the router to set basic parameters 409. Manage IOS configuration files (including: save, edit, upgrade, restore) 410. Manage Cisco IOS Lecture Focus Questions: Where is the startup-config file stored? Where is the running-config file stored? What is stored in ROM? What is the generic syntax for loading a configuration file into RAM? What does the boot system command do? 24
26 Video/Demo Managing Startup Files and IOS Images 6: Manipulating Configuration Files 7: Booting From Alternative Locations 4: Backing Up IOS Images 5:35 Total 23:41 Number of Exam Questions 12 questions About 35 minutes 25
27 Section 2.5: Using Show Commands This section discusses using common show commands to verify the status of devices. Students will learn how to: Use show commands to find information about the device configuration Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network 416. Verify router hardware and software operation using SHOW & DEBUG commands Video/Demo Using Show Commands 7:14 Lab/Activity Find Device Information About 10 minutes 26
28 Section 2.6: Hostname and Descriptions In this section students will learn the following information about hostname and descriptions: Switch interface number scheme: o Bank number o Port number Router interface numbering includes the following types of schemes: o Fixed ports o Slot/Port numbering o Slot/Sub-slot/Port numbering Adding a description to the configuration file to identify the interface Students will learn how to: Change the device host name. Configure descriptions on device interfaces Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 406. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: When is the Slot/Sub-slot/Port numbering used? How do fixed ports and WIC slots affect the numbering scheme for a device? What changes in the prompt after you set a hostname? 27
29 Video/Demo Interface Designations 6: Setting Hostname and Interface Descriptions 2:48 Total 9:27 Lab/Activity Configure Hostnames and Descriptions About 20 minutes 28
30 Section 2.7: System Passwords This section examines using system password to secure devices. Details include: Password types o Console o VTY o EXEC mode Recommendation for configuring router passwords Basic password commands Conditions for accessing the console through a Telnet session Password recovery for: o 2960 switch o Routers Students will learn how to: Configure router passwords including: enable, console, and VTY. Restrict console and VTY access to a Cisco device. Recover device passwords Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 417. Implement basic router security Lecture Focus Questions: What is the difference between the enable and the enable secret passwords? Which one is more secure? How would you require a password when logging on through the console? You have configured the VTY lines on a router with a password but you did not use the login command. Will VTY login be allowed? Will a password be required? What must you do to disable VTY login? 29
31 Video/Demo Setting Device Passwords 9: Recovering Switch Passwords 7: Recovering Router Passwords 6:04 Total 23:37 Lab/Activity Exploring Enable Passwords Set Console and VTY Passwords Modify System Passwords Number of Exam Questions 9 questions About 50 minutes 30
32 Section 2.8: Banners In this section students will learn how to use banners to display message for users logging into the device. Four types of banners can be displayed at various times during the login or startup sequence. Students will learn how to: Configure, modify, and delete router banners Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 417. Implement basic router security Lecture Focus Questions: When do each of the banners display? What banner do you configure if you use the banner command without specifying the banner type? What is the role of the delimiting character? You type the following command at the router: banner exec this is it. What will show following a successful login? Video/Demo Setting Device Passwords 4:57 Lab/Activity Configure Banners Modify Banners Number of Exam Questions 3 questions About 15 minutes 31
33 Section 2.9: Cisco Discovery Protocol (CDP) This section discusses how Cisco devices use the Cisco Discovery Protocol (CDP) to learn and share information about neighboring Cisco devices. Students will learn how to: Use CDP to view information about neighboring devices. Enable and disable CDP on devices and specific interfaces. Configure CDP timers Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 406. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: What are the requirements for using CDP? You have not yet configured an IP address on a Cisco router, but the interface is up. Will the router be able to use CDP to discover neighboring device information? You want to view information about a router that is two hops away? How can you view this information? How do you turn off CDP advertisements for a single interface? How do you disable CDP on a router? Video/Demo Cisco Discovery Protocol (CDP) 1: Configuring CDP 8:15 Total 10:09 32
34 Lab/Activity Exploring CDP Configure CDP Modify the CDP Configuration Find CDP Information Number of Exam Questions 4 questions About 40 minutes 33
35 Section 3.1: Connecting Devices This section examines different types of Ethernet cables used for LAN connections. Students will learn the uses for a straight-through Ethernet cable and a crossover Ethernet cable and the pin positions for each Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts 403. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Lecture Focus Questions: When would you use a crossover cable when connecting to a Cisco device? What type of cable do you use to connect two switches? What is the SFP slot on a switch used for? How does Auto-MDI/MDIX affect cable selection when connecting devices? Video/Demo LAN Connections 8:14 Number of Exam Questions 6 questions About 15 minutes 34
36 Section 3.2: Switch Configuration In this section students will learn how to configure the Catalyst 2960 series switch. They will learn how to recognize the switch s activity by the various colored status lights. Students will learn how to: Configure basic switch port parameters. View port statuses Perform and verify initial switch configuration tasks including remote access management 207. Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures 215. Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network. Lecture Focus Questions: What configuration modes are unique to switches? How do you identify ports which are administratively shut down? What information does the SYST LED provide? Video/Demo Viewing Switch Status Lights 2: Configuring Switch Interfaces 8: Viewing Port Statuses 3:20 Total 14:41 35
37 Lab/Activity Configure Switch Ports Exploring Switch Port Status Number of Exam Questions 7 questions About 40 minutes 36
38 Section 3.3: TCP/IP Configuration This section examines the configuration settings for a TCP/IP network. Concepts covered include: Configuration settings for a TCP/IP network: o IP address o Subnet mask o Default gateway o Host name o DNS server o MAC address Methods to assign TCP/IP configuration settings: o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA) o Static (manual) assignment Configuring IP addresses on switches Students will learn how to: Configure workstation TCP/IP settings. Configure an IP address and default gateway on a switch. Configure a router interface with an IP address Perform and verify initial switch configuration tasks including remote access management 304. Implement static and dynamic addressing services for hosts in a LAN environment 405. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: What is the minimum amount of information a workstation needs to communicate on a single subnet? What additional configuration values are required for inter-network communications? What address range indicates an APIPA address assignment? What are the drawbacks to using manual IP address assignments? Why does a switch have an IP address? Which interface is assigned the IP address? 37
39 Video/Demo TCP/IP Configuration Parameters 4: Configuring TCP/IP Settings 0: Setting the Switch IP Address 3:58 Total 8:54 Lab/Activity Configure Workstation Settings Configure Switch IP Settings Configure Device IP Settings Number of Exam Questions 10 questions About 40 minutes 38
40 Section 3.4: DHCP In this section students will learn how the Dynamic Host Configuration Protocol (DHCP) is used to obtain parameters that are needed for the clients to operate in a network. Details include: Protocols that perform address resolution: o Address Resolution Protocol (ARP) o Reverse Address Resolution Protocol (RARP) o Bootstrap Protocol (BootP) o Dynamic Host Configuration Protocol (DHCP) DHCP configuration parameters: o Address pool o Lease o DHCP options: Domain Name Server (DNS) server addresses Default router (or default gateway) address WINS server addresses Additional TCP/IP configuration parameters o Binding o Interface Process for a DHCP client to obtain an IP address: o Lease Request o Lease Offer o Lease Selection o IP Lease Acknowledgement Enabling DHCP across subnets Students will learn how to: Use the SDM interface to configure the DHCP service on a router Explain the operation and benefits of using DHCP and DNS 303. Configure, verify and troubleshoot DHCP and DNS operation on a router Lecture Focus Questions: What is the difference between the ARP and RARP protocols? What is the difference between the BootP and DHCP protocols? 39
41 What type of information is delivered by DHCP options? How can you make sure a specific host gets the same IP address from the DHCP server each time it boots? How does the router determine which interfaces will respond to DHCP requests? How can you enable DHCP messages to work across subnets? Video/Demo Address Resolution 7: DHCP Functionality 0: Configuring DHCP 5:27 Total 13:37 Number of Exam Questions 7 questions About 20 minutes 40
42 Section 3.5: DNS This section discusses the basics of the Domain Name System (DNS) database. Students will learn the commands to configure DNS services on a router. Students will learn how to: Disable name resolution on a Cisco device. Create static DNS entries on a router Explain the operation and benefits of using DHCP and DNS 303. Configure, verify and troubleshoot DHCP and DNS operation on a router Video/Demo Configuring DNS Services 4:43 Number of Exam Questions 8 questions About 15 minutes 41
43 Section 3.6: Routing This section provides an overview of routing protocols used to automatically share and learn routes. Both default routes and static routes are presented. The steps to configuring a routing protocol are discussed as well as the commands for configuring the Routing Information Protocol (RIP). Student will learn the function of the routing table and how to view the routing table. Students will learn how to: Configure static routes. Configure RIPv2 routing Describe basic routing concepts (including: packet forwarding, router lookup process) 404. Configure, verify, and troubleshoot RIPv Perform and verify routing configuration tasks for a static or default route given specific routing requirements Lecture Focus Questions: What is the difference between a static and a default route? In what cases would you use a static route rather than a routing protocol? What does a route to network identify? What happens to a packet that does not match any of the routes in a routing table? What does an asterisk ( * ) on a route indicate? How does a router choose between two routes to the same destination network? 42
44 Video/Demo Routing 5: Static Routes 7: Configuring Static Routes 8: Configuring RIP 8:07 Total 29:34 Lab/Activity Configure Static Routes Enable RIP Configure RIP Routing Find Routing Table Information Number of Exam Questions 13 questions About 60 minutes 43
45 Section 3.7: Verifying TCP/IP Configuration In this section students will learn how to verify TCP/IP configurations. Concepts covered include: The role of the Internet Control Message Protocol (ICMP) Types of Internet Control Message Protocol (ICMP) messages: o Echo o Destination unreachable o exceeded o Redirect o Source quench o Router discovery Utilities used to test network connectivity between devices: o Ping o Traceroute o Telnet Utilities to verify the configuration of the workstation: o Ipconfig o Arp o Nslookup Common symptoms and suggested remedies for communication problems Students will learn how to: Use ping and traceroute to verify connectivity between devices Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach 206. Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands 309. Identify and correct common problems associated with IP addressing and host configurations 407. Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities 44
46 414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH) Lecture Focus Questions: What are the differences and similarities between ping and traceroute? You can ping a device but can't open a Telnet session with that device. What is the problem? Which utility can you use to test upper-layer protocols as well as lowerlayer connectivity? Which utility would you use on a workstation to view the IP address received from the DHCP server? Video/Demo Troubleshooting IP 6: Traceroute and TTL 1: Verifying Connectivity 7:26 Total 15:21 Lab/Activity Exploring TCP/IP Communications Number of Exam Questions 12 questions About 40 minutes 45
47 Section 3.8: LAN Segmentation This section covers the basics of using LAN segmentation to increase network performance and reduce congestion. Concepts include: Collision domain Broadcast domain Membership within collision vs. broadcast domains depending on the connection device used Range of services o Router o Switch o Bridges Guidelines for deciding the appropriate connectivity device Challenges to adequately support VoIP Considerations to adequately support VoIP: o Delay o Jitter o Packet loss o Echo 106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network 203. Explain network segmentation and basic traffic management concepts Lecture Focus Questions: What is the difference between a collision domain and a broadcast domain? Your network uses only hubs as connection devices. What happens to the number of collisions on the network as you add devices? Your network uses only switches as connection devices. All devices have a dedicated switch port. What happens to the number of collisions on the network as you add devices? What happens to the collision and broadcast domains as you segment the network with routers? Which device provides guaranteed bandwidth between devices? Which device can you use to filter broadcast traffic? 46
48 What is the relationship between delay and jitter with VoIP? What special features might you need on a switch to support VoIP? Video/Demo LAN Segmentation 6:23 Number of Exam Questions 16 questions About 25 minutes 47
49 Section 4.1: Wireless Standards This section discusses using radio waves for data transmission. Details include: Organizations that influence the standards used for wireless communication: o Federal Communication Commission (FCC) o International Telecommunication Union Radiocommunications Sector (ITU-R) o Wi-Fi Alliance o Institute of Electrical Electronics Engineers (IEEE) Characteristics of radio waves: o Frequency range or band o Channel o Modulation technique Wireless standards: o a o b o g o n Implementing a wireless network 501. Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC) Lecture Focus Questions: How are the FCC and ITU-R similar? How are FHSS and DSSS different? What are the differences between a and g specifications? What is the difference between channel bonding and dual band? When should you implement a dual band access point? What improvements are included with n standards that improve speed and distance? Video/Demo Wireless Standards 4:32 48
50 Number of Exam Questions 6 questions About 15 minutes 49
51 Section 4.2: Wireless Infrastructure This section provides an overview of wireless networking methods: Wireless Networking o Ad Hoc o Infrastructure Components of a wireless network: o Station (STA) o Access Point (AP) o Basic Service Set (BSS) o Independent Basic Service Set (IBSS) o Extended Service Set (ESS) o Distribution System (DS) Identifiers of wireless networks: o Service Set Identifier (SSID) o Basic Service Set Identifier (BSSID) Carrier Sense, Multiple Access/Collision Avoidance (CSMA/CA) 502. Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS) 503. Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point Lecture Focus Questions: Under which circumstances might you choose an ad hoc wireless network? What is an SSID? How does the BSSID differ from the SSID? How many access points are in a BSS and an ESS? What media access method do wireless networks use? How does this differ from the media access used on Ethernet? Video/Demo Wireless Infrastructure 6:31 50
52 Number of Exam Questions 5 questions About 15 minutes 51
53 Section 4.3: Wireless Security This section explores security on a wireless network. Attacks that wireless networks are vulnerable to: o War driving o Hacker o Rogue access point o Spoofed access point Countermeasures to these vulnerabilities: o Authentication o Encryption o Intrusion Detection System (IDS) o Cisco Structured Wireless-Aware Network (SWAN) Standards that provide security for wireless networking: o Wired Equivalent Privacy o Cisco interim solution o Wi-Fi Protected Access (WPA) o Wi-Fi Protected Access 2 (WPA2) or i Security practices that kee0p curious people from trying to access the wireless network: o Change the administrator account name and password o Update the firmware o Enable the firewall on the access point o Change SSID from defaults o Disable DHCP o Enable MAC address filtering 504. Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2) Lecture Focus Questions: What is the difference between a rogue access point and a spoofed access point? What does open authentication use to authenticate a device? How does 802.1x authentication differ from shared key authentication? What improvements did WPA make to overcome the weaknesses of WEP? 52
54 You have an older wireless access point that supports WEP. You would like to use WPA instead. What action would you typically take to do this? What would you need to do to use WPA2? Which wireless security standards use Temporal Key Integrity Protocol (TKIP) encryption? What are three actions you should take to increase the security of a wireless access point? How does MAC address filtering improve security of a wireless access point? Why is this action by itself insufficient to prevent unauthorized access? Video/Demo Security Issues 3: Security Standards 5:20 Total 8:47 Number of Exam Questions 10 questions About 25 minutes 53
55 Section 4.4: Wireless Configuration This section discusses implementing a wireless configuration. Details include: Wireless implementation checklist: o Plan access point placement and configuration o Connect the wireless access point to the wired network o Configure basic access point settings o Configure a client o Configure security on the access point o Configure client security settings o Conduct a site survey Considerations when troubleshooting wireless connections: o Incorrect configuration o Range and obstructions o Channel interference o Atmospheric and EMI conditions o Antennae orientation o Client and access point incompatibility Students will learn how to: Configure basic options and security on a wireless access point. Configure a wireless client connection Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point 505. Identify common issues with implementing wireless networks. (Including: Interface, misconfiguration) Lecture Focus Questions: You have a network with two wireless access points. Should the SSID be the same or different? Should the channel on each be the same or different? Where is the best place to locate your wireless access point? What type of objects might obstruct radio frequency wireless transmissions? How does range and antenna placement affect wireless networks? When should you use open authentication on your wireless network? 54
56 What authentication type should you not use when using WEP for encryption? What is required in order to implement 802.1x authentication? Video/Demo Wireless Configuration 2: Configuring Wireless Network Settings 2:04 Total 4:35 Lab/Activity Configure a Wireless Client Number of Exam Questions 10 questions About 30 minutes 55
57 Section 5.1: Subnet Operations In this section students will learn how to perform the following subnet operations: The role of subnetting Definitions needed when working with subnets: o Classful addresses o Classless addresses o Variable Length Subnet Mask (VLSM) o Classless Interdomain Routing (CIDR) o CIDR routers o Route aggregation (also called route summarization) Comparison of binary value to decimal value Finding the decimal value of a binary number Finding the exponential values of 2 Solutions to common subnetting tasks Students will learn how to: Given a subnet mask and an IP address, find the network address. Given a network address and a number of desired subnets and hosts, select the subnet mask. From a network address and subnet mask, identify valid subnet addresses. From a subnet address and mask, identify the range of valid host addresses Calculate and apply an addressing scheme including VLSM IP addressing design to a network Lecture Focus Questions: When should you use the 2n-2 formula to determine the amount of available subnets? What is the magic number and how can it help while subnetting a network? What is the difference between a classful and classless subnet mask? 56
58 Video/Demo Subnetting 13: Binary Math 19: Identifying Configuration Information 23: Identifying Valid Subnets 8: Identifying the Number of Subnets and Hosts 14: Selecting a Subnet Mask 9:04 Total 88:28 Number of Exam Questions Identify Addresses -11 questions Identify Valid Subnets 4 questions Identify the Number of Subnets and Hosts 6 questions Select a Subnet Mask 10 questions About 125 minutes 57
59 Section 5.2: Subnet Design This section discusses the process to subnet design. Students will learn how to select and configure subnet addresses, masks, and host addresses. Students will learn how to: Given a scenario, select and configure subnet addresses, masks, and host addresses Calculate and apply an addressing scheme including VLSM IP addressing design to a network Video/Demo Subnet Design 8:42 Lab/Activity Configure Subnet Masks 1 Configure Subnet Masks 2 Number of Exam Questions 17 questions About 40 minutes 58
60 Section 5.3: Route Summarization In this section students will become familiar with route summarization. Students will learn how to select the appropriate subnet addresses and masks for summarization. They will also learn how to identify the summarized route. Students will learn how to: Given a scenario, select the appropriate subnet addresses and masks to prepare for summarization. Given a scenario, identify the summarized route Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment Lecture Focus Questions: What are the advantages of route summarization? If automatic route summarization is used, how does the router determine which routes to summarize? What route becomes the summarized network? Which routing protocol does not support automatic route summarization? Why do discontiguous networks pose a problem for route summarization? Video/Demo Route Summarization 7:58 Lab/Activity Exploring Auto-Summarization Number of Exam Questions 6 questions About 30 minutes 59
61 Section 6.1: Wide Area Networks In this section the students will learn how Wide Area Networks (WANs) are used to connect sites. WAN types: o Point-to-point o Circuit switching o Packet switching Components of a WAN structure: o Consumer Premises Equipment (CPE) o Data Terminal Equipment (DTE) o Channel Service Unit/Data Service Unit (CSU/DSU) o Demarcation point (demark) o Local loop o Central Office (CO) o Data Communication Equipment (DCE) o WAN cloud o Packet-Switching Exchange (PSE) Common WAN transmission carriers: o Plain Old Telephone Service (POTS) o T1 o T3 o E1 o E3 o J1 o J3 Service options for WAN connectivity: o Public Switched Telephone Network (PSTN) o Leased lines o X.25 o Frame Relay o Asynchronous Transfer Mode (ATM) o Integrated Services Digital Network (ISDN) o DSL 111. Differentiate between LAN/WAN operation and features 801. Describe different methods for connecting to a WAN 60
62 Lecture Focus Questions: How does a packet switched WAN service differ from a circuit switched WAN service? Who is responsible for the local loop, the customer or the service provider? What is the significance of the demarc? What is the difference between the Data Terminal Equipment (DTE) and Data Communication Equipment (DCE)? Which WAN services use already-installed telephone lines? What media type is used by ATM? Video/Demo WAN Communication 2: WAN Structure 2:29 Total 4:55 Number of Exam Questions 10 questions About 15 minutes 61
63 Section 6.2: WAN Connections This section discusses the details to consider when selecting WAN connections. Several connector types and ports are presented. The encapsulation method that is selected depends upon the WAN service and connection method. Students will learn the commands to configure the router. Considerations when choosing the correct cable: o Interface operating mode Data Communications Equipment (DCE) Data Terminal Equipment (DTE) o Service: X.25 Frame Relay Asynchronous Transfer Mode (ATM) Integrated Services Digital Network (ISDN) DSL Connector types: o DB-60 o Smart Serial o RJ-48 o RJ-11 Encapsulation methods: o Cisco HDLC for synchronous, point-to-point connections with other Cisco routers o LAPB for X.25 networks o LAPD in combination with another protocol for the B channels in ISDN networks o PPP for dial-up LAN access, circuit-switched WAN networks, and ISDN networks o Cisco/IETF for Frame Relay networks Students will learn how to: Configure a serial interface for a basic WAN connection. Configure a serial connection between back-to-back routers Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts 406. Connect, configure, and verify operation status of a device interface 62
64 801. Describe different methods for connecting to a WAN 802. Configure and verify a basic WAN serial connection Lecture Focus Questions: Which interface provides clocking in the WAN connection? How is a DB-60 connector different from a Smart Serial connector? When would you use an RJ-48 connector? What is the default encapsulation protocol on Cisco routers? When should you use PPP as the encapsulation protocol? Video/Demo WAN Connections 3: WAN Encapsulation 2: Configuring Serial Interfaces 10:27 Total 16:02 Lab/Activity Exploring Serial Interface Status Configure Back-to-back Routers Number of Exam Questions 9 questions About 40 minutes 63
65 Section 6.3: PPP In this section students will learn how to configure Point-to-Point (PPP). Concepts include: Key features of PPP Protocols that PPP uses to establish and maintain the link: o Link Control Protocol (LCP) o Network Control Protocol (NCP) PPP establishes communication in three phases: o LCP phase o Authenticate phase (optional) o NCP phase Tasks to configure PPP on a router Commands to configure PPP Students will learn how to: Configure PPP encapsulation on serial links. Configure PPP authentication including username and password combinations Describe different methods for connecting to a WAN 802. Configure and verify a basic WAN serial connection 806. Configure and verify a PPP connection between Cisco routers Lecture Focus Questions: What is the purpose of LCPs in PPP communications? Which authentication method is more secure, PAP or CHAP? How do you configure the password used with PPP authentication? 64
66 Video/Demo PPP Concepts 6: Establishing a PPP Session 1: Configuring PPP 9:50 Total 17:21 Lab/Activity Configure PPP Number of Exam Questions 8 questions About 35 minutes 65
67 Section 6.4: Network Address Translation (NAT) Students will learn the basics of Network Address Translation (NAT). NAT is used to connect a private network to the Internet by translating the public address of the NAT router Explain the basic operation of NAT 707. Configure NAT for given network requirements Lecture Focus Questions: What are the IP address ranges for private networks? Which network devices are most likely to be assigned a public IP address? What benefits come from using NAT? What is the difference between an inside global address and an outside global address? What is overloading, and why is it important in a NAT configuration? How is PAT different than NAT? Video/Demo Network Address Translation (NAT) 3:48 Number of Exam Questions 14 questions About 20 minutes 66
68 Section 6.5: WAN Troubleshooting This section explores tips for troubleshooting WAN communications. Students will become familiar with commands used to view the status of the interface. They will practice troubleshooting serial connections Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities 414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH) 804. Troubleshoot WAN implementation issues Lecture Focus Questions: What are possible causes of Layer 1 problems on a serial connection? Which interface status indicates a Layer 2 connection problem? What steps can you take to correct a Layer 2 problem? How does having an incorrect interface IP address affect a WAN connection? A ping test to a remote router succeeds, but the Telnet connection fails. What can you assume about the router configuration? Can the router route packets? You have Layer 2 connectivity to a remote device but full connectivity does not exist. What steps can you take to identify the problem? Video/Demo Troubleshooting Communications 5: Viewing Router Interface Statuses 3:45 Total 9:34 Lab/Activity View Serial Interface Status Troubleshoot a Serial Connection 1 Troubleshoot a Serial Connection 2 Troubleshoot a Serial Connection 3 Troubleshoot a Serial Connection 4 67
69 Number of Exam Questions 14 questions About 50 minutes 68
70 Section 7.1: Virtual LANs (VLANs) This section examines using Virtual LANs (VLANs) to configure ports on the switch to provide segmentation, flexibility, and security. Common VLAN configuration commands are discussed. Students will learn how to: Create VLANs and assign switch ports to a VLAN Describe enhanced switching technologies 209. Describe how VLANs create logically separate networks and the need for routing between them 210. Configure, verify, and troubleshoot VLANs Lecture Focus Questions: What are two advantages to creating VLANs on your network? You have two VLANs configured on a single switch. How many broadcast domains are there? How many collision domains are there? What happens if two devices on the same switch are assigned to different VLANs? Video/Demo Virtual LANs (VLANs) 8: Configuring VLANs 6:19 Total 14:29 Lab/Activity Create VLANs Number of Exam Questions 9 questions About 30 minutes 69
71 Section 7.2: Trunking In this section students will learn about trunking, which is used when you connect two switches together. It is used to configure VLANs that span multiple switches. Students will become familiar with commands for configuring and monitoring trunking on a switch. Students will learn how to: Configure a switch port as an access port or a trunk port. Configure dynamic trunking modes Describe enhanced switching technologies 211. Configure, verify, and troubleshoot trunking on Cisco switches Lecture Focus Questions: Why is trunking important to VLAN configuration? Which trunking protocols are supported on a Cisco 2960 switch? Which protocol is an industry standard? What protocol does a Cisco switch use to automatically detect trunk ports? By default, traffic from which VLANs are allowed on trunk ports? A trunk port is set to dynamic desirable. What configurations on other switches are allowed so the port enters a trunking state? Video/Demo Trunking 4: Configuring Trunking 5:53 Total 10:17 70
72 Lab/Activity Configure Trunking Number of Exam Questions 11 questions About 40 minutes 71
73 Section 7.3: VLAN Trunking Protocol (VTP) This section discusses how the VLAN Trunking Protocol (VTP) is used to manage VLANs in a multi-switch network by maintaining a consistent database of configuration changes and propagating changes to other switches in the network. Switches are placed in one of three configuration modes o Server o Client o Transparent Facts about VTP Common VTP commands Troubleshooting the VTP configuration Students will learn how to: Configure the VTP mode on a switch. Set VTP domain and password parameters Describe enhanced switching technologies 213. Configure, verify, and troubleshoot VTP Lecture Focus Questions: What is the function of the VTP protocol? A switch in transparent mode. Will the switch learn VLAN information from other switches? Will the switch propagate information to other switches? Where does a switch in client mode save VLAN information? When would a switch in client mode update VLAN information on a switch in server mode? Why is the default VTP mode of a switch important? What conditions must be met before two switches will share VLAN information using VTP? 72
74 Video/Demo VLAN Trunking Protocol (VTP) 7: Configuring VTP 9:59 Total 16:59 Lab/Activity Configure VTP Settings Number of Exam Questions 15 questions About 40 minutes 73
75 Section 7.4: Spanning Tree In this section students will learn how Spanning Tree is used to provide a loopfree path through a network. Rapid Spanning Tree will converge much faster than Spanning Tree. Per-VLAN Spanning allows for multiple pathways with control along the VLAN boundaries by configuring which ports will be active for which VLANs and which ports will be blocking Describe enhanced switching technologies 214. Configure, verify, and troubleshoot RSTP operation Lecture Focus Questions: What is the purpose of the spanning tree protocol? What is the role of designated bridges? What are BPDUs and when are they exchanged? A switch port is in the blocking state. Will it learn MAC addresses? Will it send and receive frames? A switch port is in the learning state. Will it learn MAC addresses? Will it send and receive frames? A switch port is identified as a backup port. What state is it in? What advantages are added to spanning tree with the edge port type definition? How does this improve performance? How does PVST+ differ from Rapid PVST+? Video/Demo Spanning Tree 29: Rapid Spanning Tree 6: Per-VLAN Spanning Tree 7:20 Total 43:34 Number of Exam Questions 10 questions About 70 minutes 74
76 Section 7.5: Spanning Tree Configuration This section discusses commands that can be used to configure spanning tree. Students will learn how to configure the spanning tree mode and configure UplinkFast on access ports. Students will learn how to: Configure the spanning tree mode. Configure UplinkFast on access ports Describe enhanced switching technologies 214. Configure, verify, and troubleshoot RSTP operation Video/Demo Configuring Spanning Tree 14: Configuring Per-VLAN Spanning Tree Protocol (PVST) 5:48 Total 20:08 Number of Exam Questions 12 questions About 35 minutes 75
77 Section 7.6: EtherChannel In this section students will learn how EtherChannel uses multiple links to increase bandwidth and provide redundant links. They will learn how to enable EtherChannel by using the channel-group command Describe enhanced switching technologies Lecture Focus Questions: What advantages does the EtherChannel feature provide? Why must EtherChannel be used to create multiple links between switches that can be used at the same time? How does EtherChannel interact with spanning tree? Video/Demo EtherChannel 2:24 About 5 minutes 76
78 Section 7.7: Inter-VLAN Routing In this section students will learn the basics of configuring subinterfaces and ISL encapsulation to enable inter-vlan routing on a router. Students will learn how to: Configure subinterfaces and ISL encapsulation to enable inter-vlan routing on a router Describe enhanced switching technologies 209. Describe how VLANs create logically separate networks and the need for routing between them 212. Configure, verify, and troubleshoot intervlan routing Lecture Focus Questions: What is required before members of two VLANs can communicate with each other? Why doesn't trunking enable inter-vlan communication? What method is used to allow a single router to perform inter-vlan routing using a single physical interface? What protocol do you configure on a router to enable inter-vlan routing? Video/Demo Configuring Inter-VLAN Routing 7:48 Number of Exam Questions 6 questions About 15 minutes 77
79 Section 8.1: Access List Concepts This section discusses how routers use access lists to control traffic. Students will learn how to calculate the wildcard mask value to use in an access list statement. Students will learn how to: Given a subnet address and mask, calculate the wildcard mask value to use in an access list statement Describe the purpose and types of ACLs Lecture Focus Questions: You want to create an access list that restricts traffic from host What type of access list can you use? You want to create an access list that restricts ICMP traffic. What type of access list would you choose? How many access lists can be applied to a single interface? What is the last statement in every access list? How is a wildcard mask related to the subnet mask? What does a 0 in a wildcard mask indicate? Video/Demo Access Lists 6: Wildcard Masks 5:34 Total 12:28 Number of Exam Questions 6 questions About 25 minutes 78
80 Section 8.2: Configuring Access Lists This section provides the details of how to configure access lists. Information on how to configure both standard IP and extended IP access lists is provided. Students will learn how to: Based on filtering requirements, construct access list statements. Create an access list and apply it to an interface Configure and apply ACLs based on network filtering requirements 703. Configure and apply an ACLs to limit telnet and SSH access to the router 704. Verify and monitor ACLs in a network environment 705. Troubleshoot ACL issues Video/Demo Configuring Standard IP Access Lists 8: Configuring Extended IP Access Lists 16:31 Total 24:36 Lab/Activity Restrict Telnet and SSH Access Permit Traffic Block Source Hosts Configure Allowed Networks Create Access Lists Statements Number of Exam Questions 15 questions About 75 minutes 79
81 Section 8.3: Access List Implementation This section explores using access list implementation to allow or deny the flow of packets between networks. Students will learn how to: Create an access list given customer requirements. Apply an existing access list to the appropriate router and interface Configure and apply ACLs based on network filtering requirements 703. Configure and apply an ACLs to limit telnet and SSH access to the router 704. Verify and monitor ACLs in a network environment 705. Troubleshoot ACL issues Lecture Focus Questions: How do you identify where to place an access list (on a specific router, a specific interface, and a specific direction)? Why should each access list contain at least one allow statement? Lab/Activity Block Invalid Addresses Allow Only Specific Services About 15 minutes 80
82 Section 9.1: Routing Protocols This section discusses how routers use routing protocols to dynamically discover routes, build routing tables, and make decisions about how to send packets through the internetwork. Students will become familiar with both vector routing and link state routing Describe basic routing concepts 411. Compare and contrast methods of routing and routing protocols Lecture Focus Questions: What is the difference between a routing protocol and a routed protocol? What is the difference between distance vector routing and link state routing? What is a flash update? What is poison reverse? Why don't link state protocols use hold down timers, split horizon, or poison reverse? What is in an LSP? What is a designated router? Video/Demo Routing Protocols 7: Distance Vector Routing 9: Link State Routing 5: Link State Route Discovery 1:11 Total 23:40 Number of Exam Questions 12 questions About 30 minutes 81
83 Section 9.2: RIP This section provides an overview of using the Routing Information Protocol (RIP) to reduce the amount of administration required for maintaining routes between small to medium sized networks. The steps to configuring a routing protocol are presented as well as the commands for configuring RIP. Students will learn how to: Enable IP routing. Configure RIP networks Configure, verify, and troubleshoot RIPv2 Lecture Focus Questions: What are the differences between RIP version 1 and RIP version 2? What is the metric used with RIP? What is the maximum metric value? Can RIP v2 do load balancing across multiple paths? If so, what are the limitations? How does RIP v2 perform auto-summarization? Video/Demo RIP 1: Configuring RIP 8:07 Total 9:42 Lab/Activity Configure RIP Routing Number of Exam Questions 3 questions About 20 minutes 82
84 Section 9.3: OSPF This section explores the popular Open Shortest Path First (OSPF) routing protocol commonly used on larger networks. Discussed is how to configure OSPF routing by using the OSPF commands. Students will learn how to: Configure OSPF routing Configure, verify, and troubleshoot OSPF Lecture Focus Questions: Must the process ID number used on different OSPF routers match? What is Area 0 in an OSPF implementation? How many areas can a single subnet be in? How does the DR and BDR reduce network traffic? When is the DR not used? How is the DR elected? How can you ensure that a specific device becomes the DR? What conditions must be met before two routers running OSPF will share information? Video/Demo OSPF 9: Configuring RIP 15:38 Total 25:21 Lab/Activity Enable OSPF Exploring OSPF Configure OSPF Routing 83
85 Number of Exam Questions 13 questions About 60 minutes 84
86 Section 9.4: EIGRP This section discusses configuring Enhanced IGRP (EIGRP). Students will learn the commands to configure EIGRP routing and how to use show commands to monitor EIGRP routing. Students will learn how to: Configure EIGRP routing. Use show commands to monitor EIGRP routing Configure, verify, and troubleshoot EIGRP Lecture Focus Questions: What type of routing protocol is EIGRP? What is the metric used with EIGRP? How does the router calculate the feasible distance? What condition must be met for a route to become a feasible successor route? What is the difference between a feasible successor and a successor? How does EIGRP determine how many paths to keep in its topology database? What conditions must be met before two routers running OSPF will share information? Video/Demo EIGRP 4: Configuring EIGRP 8:15 Total 12:37 85
87 Lab/Activity Enable EIGRP Number of Exam Questions 5 questions About 20 minutes 86
88 Section 9.5: Routing Protocol Comparison In this section students will compare the characteristics of three routing protocols; RIP, OSPF, and EIGRP. They will also learn that when multiple routes exist to a destination the administrative distance is used to determine which route will be taken Compare and contrast methods of routing and routing protocols Lecture Focus Questions: Which routing protocols support route summarization and variable length subnet masks (VLSM)? Which routing protocols are public-standard protocols? Which routing protocol uses areas for configuration? Which routing protocol uses wildcard masks for configuration? If a router learns of a route to network B through both EIGRP and OSPF, which route will it prefer? Number of Exam Questions 9 questions About 10 minutes 87
89 Section 10.1: Troubleshooting Routing In this section students will learn tips for troubleshooting routing, verifying routing protocol configuration, and handling route summarization issues Troubleshoot routing issues Lecture Focus Questions: The show ip route command on a router does not show two directlyconnected networks. What conditions might be causing this problem? When might static routes configured on a router not show in the routing table? What does an asterisks ( * ) next to a route in the routing table indicate? How can you tell how many paths a routing protocol can use for load balancing? For the show ip protocols command, what does the Routing for Networks section indicate? Why might subnetted routes be missing from the routing table? Which settings control this behavior? Number of Exam Questions 6 questions About 15 minutes 88
90 Section 10.2: Troubleshooting RIP This section covers troubleshooting RIP. Students will learn how to: Interpret the output of the debug ip rip command to troubleshoot RIP routing. Verify the RIP configuration of a network and correct any problems to restore full connectivity Configure, verify, and troubleshoot RIPv Troubleshoot routing issues Video/Demo Troubleshooting RIP 8:46 Lab/Activity Troubleshoot RIP 1 Troubleshoot RIP 2 Troubleshoot RIP 3 Number of Exam Questions 6 questions About 35 minutes 89
91 Section 10.3: Troubleshooting OSPF In this section students will become familiar with troubleshooting OSPF routers. Students will learn how to: Use show commands to verify the OSPF operation. Verify the OSPF configuration of a network and correct any problems to restore full connectivity Configure, verify, and troubleshoot OSPF 415. Troubleshoot routing issues Video/Demo Troubleshooting OSPF 8:26 Lab/Activity Troubleshoot OSPF 1 Troubleshoot OSPF 2 Number of Exam Questions 7 questions About 30 minutes 90
92 Section 10.4: Troubleshooting EIGRP This section examines troubleshooting EIGRP. Students will learn how to: Use show commands to verify the EIGRP operation. Interpret the output of the show ip eigrp topology all-links command. Verify the EIGRP configuration of a network and correct any problems to restore full connectivity Configure, verify, and troubleshoot EIGRP 415. Troubleshoot routing issues Lab/Activity Troubleshoot EIGRP 1 Troubleshoot EIGRP 2 Video/Demo Troubleshooting EIGRP 10:18 Number of Exam Questions 10 questions About 35 minutes 91
93 Section 11.1: Frame Relay Concepts In this section the students will learn about Frame Relay, one of the most common WAN protocols. Students will learn how Frame Relay networks send data and over what connection lines they operate. Frame relay addressing and configuration methods are also presented. This section contains a multitude of acronyms. Make sure that the students understand the following acronyms, what they stand for, and their function: DTE (Data Terminal Equipment) routers are the DTE component that receives the clocking speed sent from the Frame Relay Cloud. DCE (Data Communications Equipment) generates and sends clock speeds from the Frame Relay providers switches. CIR (Committed Information Rate) provider guaranteed minimum access rate. VC (Virtual Circuit) connection between your router and the destination. PVC (Permanent Virtual Circuit) most common Virtual Circuit. SVC (Switched Virtual Circuit) not commonly available from providers. DLCI (Data Link Connection Identifier) is a number that represents the connection between two frame relay devices. LMI (Local Management Interface) - router communicates via Frame Relay to provider s switch FECN (Forward Explicit Congestion Notification) notifies forward devices that the rate will slow BECN (Backward Explicit Congestion Notification) notifies the backwards device to slow down DE (Discard Eligible) packets with the discard eligible bit set are the first to be dropped in case of congestion Describe different methods for connecting to a WAN 803. Configure and verify Frame Relay on Cisco routers Lecture Focus Questions: What is the CIR? What does locally significant mean in relation to the DLCI number? What functions are performed by LMI? What is the difference between a point-to-point and a multipoint link? When are the FECN and BECN bits set? What do each mean? 92
94 How does inverse ARP simplify Frame Relay configuration? What is a subinterface? Video/Demo Frame Relay 7: Frame Relay Addressing 5: Frame Relay Configuration 5:27 Total 18:44 Number of Exam Questions 5 questions About 30 minutes 93
95 Section 11.2: Enabling Frame Relay In this section students will learn the commands to configure Frame Relay on Cisco routers by setting the encapsulation type and letting the router discover the LMI type and DLCI values automatically. Students will learn how to: Set frame relay encapsulation on a serial interface. Configure frame relay to use inverse ARP for address discovery Configure and verify Frame Relay on Cisco routers Video/Demo Configuring Frame Relay 7:31 Lab/Activity Configure Frame Relay Number of Exam Questions 3 questions About 20 minutes 94
96 Section 11.3: Address Mapping In this section students will learn about address mapping. Students will learn how to: Disable inverse ARP. Configure static Frame Relay mappings Configure and verify Frame Relay on Cisco routers Video/Demo Configuring Static Mappings 2:46 Lab/Activity Configure Static Mappings Number of Exam Questions 2 questions About 10 minutes 95
97 Section 11.4: Subinterfaces Students will learn how subinterfaces are used to overcome the limitations of split horizon when sending updates out the same interface. Students will learn how to: Configure a multipoint subinterface. Configure a point-to-point subinterface Configure and verify Frame Relay on Cisco routers Video/Demo Subinterfaces 4: Configuring Subinterfaces 6:54 Total 10:56 Lab/Activity Configure Point-to-Point Frame Relay Configure Multipoint Frame Relay Number of Exam Questions 2 questions About 25 minutes 96
98 Section 11.5: Troubleshooting Frame Relay This section explores the show commands used to troubleshoot a Frame Relay configuration by viewing Frame Relay information on the router. Students will learn how to: Use show commands to monitor Frame Relay on a router. Troubleshoot a Frame Relay configuration Configure and verify Frame Relay on Cisco routers Lecture Focus Questions: Which command would you use to view the DLCI numbers for each interface? Why wouldn't you use the DLCI number included in the show interfaces command to identify assigned DLCIs? Which commands can you use to view the LMI type used on your router? Which Frame Relay encapsulation type should you use when connecting to routers from different vendors? Video/Demo Troubleshooting Frame Relay 5:12 Number of Exam Questions 6 questions About 15 minutes 97
99 Section 12.1: IPv6 Concepts This section examines the advantages of the new IP addressing version IPv6 which will replace the IPv4. IPv6 features: o Geographic assignment of addresses o Efficient route summarization o No need for Network Address Translation (NAT) or Port Address Translation (PAT) o Native Internet Protocol Security (IPSec) o Header improvements o Built-in Quality of Service (QoS) o Flow label IPv6 address format: o 128-bit number o 64-bit prefix o 64-bit interface ID Global routing information is identified within the 64-bit prefix by subdividing the prefix using varying prefix lengths: o Regional Internet Registry (RIR) o Internet Service Provider (ISP) o Site o Subnet ID IPv6 identifies the following types of addresses: o Unicast Link-local Unique local Global unicast o Multicast o Anycast o Loopback o Unspecified 308. Describe IPv6 addresses 98
100 Lecture Focus Questions: How does IPv6 help route summarization on the Internet? How many hexadecimal numbers are in an IPv6 address? Which of the following can be left out of an IPv6 address: leading zeros or trailing zeros? How many bits do most organizations have for creating subnets with IPv6 addresses? How do you transform a MAC address into an IPv6 interface ID? What does IPv6 use instead of a broadcast address? How can you easily identify IPv6 multicast addresses? What does the special address FF02::2 mean? When is address ::1 used? Video/Demo IPv6 Features 4: IPv6 Addresses 11:44 Total 16:07 Number of Exam Questions 6 questions About 35 minutes 99
101 Section 12.2: IPv6 Implementation In this section students will learn the methods used to configure an IPv6 address. Various implementation methods are presented for deploying IPv6. Students will learn how to configure an IP6 address and enable IPv6 support on a Cisco router Describe the technological requirements for running IPv6 in conjunction with IPv4 Lecture Focus Questions: How does a host get its IPv6 address when using stateless autoconfiguration? What information does the DHCP server provide when using stateless DHCPv6? What address does a host use to request an address from a DHCP server? What limitations does ISATAP have for IPv6 implementation? Which IPv6 tunneling methods work through NAT? What is the only method possible to enable an IPv6-only host to communicate with an IPv4-only host? Video/Demo IPv6 Configuration 4: IPv6 Implementation 3: Configuring IPv6 9:23 Total 17:20 Number of Exam Questions 6 questions About 30 minutes 100
102 Section 12.3: DHCP and NAT This section discusses configuring DHCP from the command line. Details include: DHCP terms: o Pool o DHCP options o Exclusion o Binding Configuring DHCP through the command line Commands for completing the DHCP configuration Options for configuring Network Address Translation (NAT): o Static o Overloaded with PAT o Dynamic Commands to monitor NAT Students will learn how to: Create DHCP address pools. Configure NAT inside and outside interfaces. Configure static NAT and NAT pools Configure, verify and troubleshoot DHCP and DNS operation on a router 707. Configure NAT for given network requirements 708. Troubleshoot NAT issues Lecture Focus Questions: How does the DHCP service determine on which interfaces to listen for DHCP requests? How is an access list used in NAT configuration? How do you link a NAT address pool to an access list and an interface? What parameter must you use in your NAT configuration if you have more private hosts than public IP addresses? Which NAT configuration method do you use to associate a specific outside IP address with an inside host? 101
103 Video/Demo Configuring NAT 9:02 Lab/Activity Configure Overloaded PAT Configure Dynamic NAT Configure Static NAT Number of Exam Questions 14 questions About 45 minutes 102
104 Section 13.1: Network Security This section discusses different types of network security threats and the solutions to implement to protect the network from the various threats. Details include: Security threats to consider: o Internal o External o Structured o Unstructured Types of security threats: o Reconnaissance Passive reconnaissance Active scanning o Social engineering o Denial of Service (DoS) and Distributed Denial of Service (DDoS) Ping flood SYN flood Spam Buffer overflow o Malware Virus Worm Trojan horse Spyware Adware o Access attacks: Spoofing Man-in-the-middle Password cracking Brute force Dictionary attack Hybrid attack General measures to improve security Network security methods and devices: o Firewall o Demilitarized zone (DMZ) o Adaptive Security Appliance (ASA) o Network Admission Control (NAC) o Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) 103
105 o Virtual Private Network (VPN) o Network Operation Center (NOC) o Centralized Authentication 601. Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats 602. Explain general methods to mitigate common security threats to network devices, hosts, and applications 603. Describe the functions of common security appliances and applications Lecture Focus Questions: What is social engineering? What is the best defense against social engineering? How does a worm differ from a boot sector virus? A Trojan horse? How are Denial of Service (DoS) attacks a security threat? In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations? Which types of attacks are directed against passwords? How does a firewall protect a network? What is an IPS and how does it differ from an IDS? What are the benefits of using centralized authentication? Video/Demo Security Threats 9: Security Solutions 7:29 Total 16:47 Number of Exam Questions 15 questions About 30 minutes 104
106 Section 13.2: Network Hardening This section provides an overview of general actions to harden a network by securing devices and software to reduce the security exposure and tighten security controls. Details include: General action to secure devices and a network: o Physical security o Secure passwords o Control remote access o Access lists o Banner o CDP How to secure a network by configuring a Cisco device to accept SSH remote connections Students will learn how to: Configure a Cisco device to accept SSH remote connections Explain general methods to mitigate common security threats to network devices, hosts, and applications 604. Describe security recommended practices including initial steps to secure network devices Lecture Focus Questions: What is the most important method of protecting network devices? What measures should you take to increase the security of remote connections to your router? What benefits come from disabling the broadcast of CDP information? How do banners add to the security of a device? Why is SSH more secure than Telnet? 105
107 Video/Demo Hardening 3: Configuring SSH 8:18 Total 12:03 Number of Exam Questions 11 questions About 25 minutes 106
108 Section 13.3: Switch Port Security This section explores using switch port security to control which devices are allowed to communicate through a given switch port. Types of MAC addresses used by port security: o SecureConfigured o SecureDynamic o SecureSticky Port violation Configuring port security Managing switch port security Types of actions when a violation occurs: o Protect o Restrict o Shutdown Commands to verify port security operations Components of the output from the show port-security interface command: o Port Security o Port Status o Violation Mode o Maximum MAC Addresses o Total MAC Addresses o Configured MAC Addresses o Sticky MAC Addresses o Security Violation Count Students will learn how to: Configure switch port security Implement basic switch security 604. Describe security recommended practices including initial steps to secure network devices 107
109 Lecture Focus Questions: How does switch port security increase the security of your network? What does the sticky keyword do when used with the switchport portsecurity command? What can you do to save sticky addresses? How does switchport security differ from an access list? How does using VoIP effect switchport security settings? What is the difference between the protect and restrict violation actions? How does a switch identify which MAC addresses to allow if you do not manually configure the allowed addresses? Video/Demo Switch Port Security 3: Configuring Port Security 21:16 Total 24:30 Number of Exam Questions 14 questions About 45 minutes 108
110 Section 13.4: Virtual Private Networks (VPNs) In this section students will learn the basics of using a Virtual Private Network (VPN) to protect IP traffic on a TCP/IP network through the use of encryption. Concepts covered include: Benefits provided by VPNs Common VPN security technologies: o Internet Protocol Security (IPSec) o Secure Sockets Layer (SSL) o Transport Layer Security (TLS) o Point-to-Point Tunneling Protocol (PPTP) o Layer 2 Forwarding (L2F) o Layer Two Tunneling Protocol (L2TP) Basic types of Cisco VPNs: o Site-to-site o Remote access Devices used in a VPN connection: o Adaptive Security Appliance o Routers o PIX Firewalls o VPN accelerator cards o VPN concentrators o VPN client-side software o VPN client-side hardware IPSec includes the following three protocols for authentication, data encryption, and connection negotiation: o Authentication Header (AH) o Encapsulating Security Payload (ESP) o Internet Key Exchange (IKE) IPSec modes of operations: o Tunnel mode o Transport mode 805. Describe VPN technology 109
111 Lecture Focus Questions: What is the difference between confidentiality and integrity? Which VPN technology is commonly used on Web servers? What is the main difference between a site-to-site VPN and a remote access VPN? Which IPSec protocol provides data confidentiality? Which IPSec mode is used for host-to-host communications? What are the client requirements for operating in full tunnel mode with the AnyConnect VPN Client? What advantages does full tunnel mode provide over the other modes? Which Cisco SSL VPN mode would you choose for a public computer? Why? Video/Demo VPN Overview 5: IPSec VPNs 7: SSL VPN 2:10 Total 15:08 Number of Exam Questions 9 questions About 40 minutes 110
112 Practice Exams This section provides information to help prepare students to take the exam and to register for the exam. Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. For example all questions that apply to objective 100. Networking Concepts are grouped together and presented in practice exam 100. Networking Concepts, All Questions. Students will typically take about minutes to complete each of the following practice exams Networking Concepts, All Questions (59 questions) 200. Switching, All Questions (135 questions) 300. IP Addressing, All Questions (73 questions) 400. Routing All Questions (155 questions) 500. Wireless, All Questions (28 questions) 600. Security, All Questions (42 questions) 700. ACLs and NAT, All Questions (48 questions) 800. WANs, All Questions (52 questions) The Certification Practice Exam consists of 60 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a time limit of 90 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification test. 111
113 Appendix A: Approximate for the Course The total time for this course is approximately 44 hours and 52 minutes. The time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lessons (the length of each text lesson is taken into consider) Simulations (5 minutes assigned per simulation) Questions (1 minute per question) The breakdown for this course is as follows: Module Sections Minute HR:MM 0.0 Introduction 0.1 Introduction : Networking Concepts 1.1 The OSI Model TCP/IP Device Communication Ethernet Bridging and Switching Routing : Cisco Devices 2.1 Connecting Cisco Devices System Startup Command Line Interface (CLI) Managing System Files Using Show Commands Hostname and Descriptions System Passwords Banners Cisco Discovery Protocol (CDP) : LAN Implementation 3.1 Connecting Devices Switch Configuration TCP/IP Configuration
114 3.4 DHCP DNS Routing Verifying TCP/IP Configuration LAN Segmentation : Wireless Networks 4.1 Wireless Standards Wireless Infrastructure Wireless Security Wireless Configuration : Subnetting 5.1 Subnet Operations Subnet Design Route Summarization : WAN Implementation 6.1 Wide Area Networks WAN Connections PPP Network Address Translation (NAT) WAN Troubleshooting : Advanced Switching 7.1 Virtual LANs (VLANs) Trunking VLAN Trunking Protocol (VTP) Spanning Tree Spanning Tree Configuration EtherChannel Inter VLAN Routing : Access Lists 8.1 Access List Concepts Configuring Access Lists Access List Implementation : Routing 9.1 Routing Protocols RIP OSPF
115 9.4 EIGRP Routing Protocol Comparison : Troubleshooting Routing 10.1 Troubleshooting Routing Troubleshooting RIP Troubleshooting OSPF Troubleshooting Frame Relay : Frame Relay 11.1 Frame Relay Concepts Enabling Frame Relay Address Mapping Subinterfaces Troubleshooting Frame Relay : Advanced TCP/IP Configuration 12.1 IPv6 Concepts IPv6 Implementation DHCP and NAT : Network Security 13.1 Network Security Network Hardening Switch Port Security Virtual Private Networks (VPNs) :20 Practice Exams 100. Networking Concepts (59 questions) Switching (135 questions) IP Addressing, (73 questions) Routing (155 questions) Wireless (28 questions) Security (42 questions) ACLs and NAT (48 questions) WANs (52 questions) 52 Certification Practice Exam (60 questions) :52 Total :52 114
116 115
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Welcome to Todd Lammle s CCNA Bootcamp
Welcome to Todd Lammle s CCNA Bootcamp Todd Lammle Cisco Authorized CCNA Bootcamps are now available, delivered by CCSI instructor, and popular Sybex author Todd Lammle. Todd Lammle CCNA Training Boot
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Cisco 12 CCNA Certification
Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
CURSO DE PREPARACION PARA LA CERTIFICACION CCNA (Cisco Certified Network Associate)
CURSO DE PREPARACION PARA LA CERTIFICACION CCNA (Cisco Certified Network Associate) Curso orientado para la preparación de profesionistas de las carreras de informática, sistemas y electrónica involucrados
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080. Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724
COURSE SYLLABUS Cisco Certified Network Associate CCNA (Exam 640-802) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080 Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724 130 Clinton Rd,
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Interconnecting Cisco Network Devices 1 Course, Class Outline
www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
ISOM3380 Advanced Network Management. Spring 2014 15. Course Description
ISOM3380 Advanced Network Management Spring 2014 15 Course Description In an interconnected economy, management of network applications becomes increasingly important. This course helps students develop
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION
IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION Objective of the course: This course is designed to impart professional training to the students of computer Science, computer applications,
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
Working knowledge of TCP/IP protocol Suite IPX/SPX protocols Suite, MCSE or CNE or experienced in supporting a LAN environment.
Cisco Certified Network Associate (640-802) Overview & Objectives This course will lead to a CISCO Certification (CCNA). This is the CISCO: Fundamental of Internetworking and WAN Configuration but with
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0
CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days
CCNA The Cisco Certified Network Associate (CCNA) course consists of days 1 to 5 of the Cisco Networking Academy Programme. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included)
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
Network Simulator Lab Study Plan
The CCNA 640-802 Network Simulator has 300 lab exercises, organized both by type (Skill Builder, Configuration Scenario, Troubleshooting Scenario, and Subnetting Exercise) and by major topic within each
Lab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Router and Routing Basics
Router and Routing Basics Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Routing Protocols and Concepts CCNA2 Routing and packet forwarding Static routing Dynamic
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]
s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding
Http://elmaestrodelared.blogspot.com CCNA Exploration 4.0: (II) Routing Protocols and Concepts Chapter 1: Introduction to Routing and Packet Forwarding 1. If a router cannot find a valid configuration
Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)
CNAP @ VCC 1 of 8 LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes) Objectives: Understand the function of a T1 Service Unit (TSU) in network telecommunications Connect routers
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
Table 1: Stage 1, Semester 1
Module List Tables 1 to 4 list the modules of the programme Table 1: Stage 1, Semester 1 ELEK1101 Physical Computing 1 COMP1201 COMP1101 PC Hardware & Security 11 DTEC1101 Digital Age Technology 1 PROJ1101
Lesson Plans Network+
Lesson Plans Network+ (Exam N10-004) Version 3.0 Table of Contents Course Overview... 3 Section 0.1: Course Introduction... 5 Section 0.2: Using the Simulator... 6 Section 1.1: Networking Overview... 7
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions
CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions Interconnecting Cisco Networking Devices Part 2 (ICND2) Cisco Exam 640-816 A Unique Study Guide format that compresses important need-to-knowinformation
WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska
WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.
Cisco Certified Network Expert (CCNE)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
Networking Devices. Lesson 6
Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.
WAN Review A WAN makes data connections across a broad geographic area so that information can be exchanged between distant sites. This topic defines the characteristics of a WAN. WAN Overview WANs connect
Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...
Cisco Inter-network Operating System (IOS) A short guide for the NetAdmin Angelos Stavrou Let's start out at the very beginning with the question: "What is a Command?" The most important thing to understand
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker
Microsoft CompTIA Network+ Rapid Review (Exam N10-005) Craig Zacker Introduction xix Preparing for the exam xxiii Chapter 1 Network Concepts 1 Objective 1.1: Compare the layers of the OSI and TCP/IP models
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
Lab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
Convergence Technologies Professional (CTP) Course 1: Data Networking
Convergence Technologies Professional (CTP) Course 1: Data Networking The Data Networking course teaches you the fundamentals of networking. Through hands-on training, you will learn the vendor-independent
Cisco 640-822 Interconnecting Cisco Networking Devices Part 1. Q&A with explanations. Version 6.0
Cisco 640-822 Interconnecting Cisco Networking Devices Part 1 Q&A with explanations Version 6.0 Important Note, Please Read Carefully Other TestKing products A) Offline Testing engine Use the offline Testing
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led
Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led Course Description The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
Specialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN
640-822. Exam: Cisco 640-822 Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo. Actualtests.com - The Power of Knowing
Exam: Cisco 640-822 Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo QUESTION NO: 1 After the router interfaces shown in the diagram have been configured, it is discovered that hosts
Upon completion of this chapter, you should be able to answer the following questions:
CHAPTER 1 WANs and Routers Objectives Upon completion of this chapter, you should be able to answer the following questions: Which four groups of industry professionals create the rules and standards that
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
Cisco Data Centre: Introducing Cisco Data Center Networking
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Brocade to Cisco Comparisons
1 2 3 Console cables - The console cables are not interchangeable between Brocade and Cisco. Each vendor provides their console cable with each manageable unit it sells. Passwords - Neither Cisco or Brocade
INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)
INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2) COURSE OVERVIEW: The Interconnecting Cisco Networking Devices, Part 2 (ICND2) v2.0 course provides entry-level network administrators, network
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
Troubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement
Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files
