Lesson Plans CCNA. (Exam 640-802) Version 6.0



Similar documents
Lab Organizing CCENT Objectives by OSI Layer

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Networking Professional-6Months Project Based Training

SSVP SIP School VoIP Professional Certification

Welcome to Todd Lammle s CCNA Bootcamp

"Charting the Course...

Cisco 12 CCNA Certification

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

CURSO DE PREPARACION PARA LA CERTIFICACION CCNA (Cisco Certified Network Associate)

How To Learn Cisco Cisco Ios And Cisco Vlan

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

50 Cragwood Rd, Suite 350 South Plainfield, NJ Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

CCT vs. CCENT Skill Set Comparison

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Network Devices 1 Course, Class Outline

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

SSVVP SIP School VVoIP Professional Certification

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Networking 4 Voice and Video over IP (VVoIP)

Skills Assessment Student Training Exam

ISOM3380 Advanced Network Management. Spring Course Description

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Working knowledge of TCP/IP protocol Suite IPX/SPX protocols Suite, MCSE or CNE or experienced in supporting a LAN environment.

Applicazioni Telematiche

: Interconnecting Cisco Networking Devices Part 2 v1.1

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Networking Technology Online Course Outline

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

COMPUTER NETWORK TECHNOLOGY (300)

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 1 Personal Computer Hardware hours

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Network Simulator Lab Study Plan

Lab 2 - Basic Router Configuration

CompTIA Network+ (Exam N10-005)

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Router and Routing Basics

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0

3.1 Connecting to a Router and Basic Configuration

Lab Developing ACLs to Implement Firewall Rule Sets

CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding

Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Table 1: Stage 1, Semester 1

Lesson Plans Network+

Transport and Network Layer

CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

Cisco Certified Network Expert (CCNE)

- Basic Router Security -

DSL-2600U. User Manual V 1.0

Networking Devices. Lesson 6

Lab Diagramming Intranet Traffic Flows

WANs connect remote sites. Connection requirements vary depending on user requirements, cost, and availability.

Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...

Lesson Plans Managing a Windows 2003 Network Infrastructure

Chapter 4 Customizing Your Network Settings

Course Contents CCNP (CISco certified network professional)

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

Lab Creating a Logical Network Diagram

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Lab Diagramming External Traffic Flows

Computer Network Engineering

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Convergence Technologies Professional (CTP) Course 1: Data Networking

Cisco Interconnecting Cisco Networking Devices Part 1. Q&A with explanations. Version 6.0

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Internetworking and IP Address

COMPUTER NETWORK TECHNOLOGY (40)

Specialized Programme on Internetworking Design and LAN WAN Administration

Exam: Cisco Title: Interconnecting Cisco Networking Devices Part 1 Version: Demo. Actualtests.com - The Power of Knowing

Upon completion of this chapter, you should be able to answer the following questions:

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Cisco Data Centre: Introducing Cisco Data Center Networking

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Brocade to Cisco Comparisons

INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)

Access Point Configuration

Associate in Science Degree in Computer Network Systems Engineering

Troubleshooting an Enterprise Network

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Transcription:

Lesson Plans CCNA (Exam 640-802) Version 6.0

Table of Contents Course Overview... 3 Section 0.1: Introduction... 6 Section 1.1: The OSI Model... 7 Section 1.2: TCP/IP... 9 Section 1.3: Device Communication... 11 Section 1.4: Ethernet... 12 Section 1.5: Bridging and Switching... 14 Section 1.6: Routing... 16 Section 2.1: Connecting Cisco Devices... 18 Section 2.2: System Startup... 20 Section 2.3: Command Line Interface (CLI)... 22 Section 2.4: Managing System Files... 24 Section 2.5: Using Show Commands... 26 Section 2.6: Hostname and Descriptions... 27 Section 2.7: System Passwords... 29 Section 2.8: Banners... 31 Section 2.9: Cisco Discovery Protocol (CDP)... 32 Section 3.1: Connecting Devices... 34 Section 3.2: Switch Configuration... 35 Section 3.3: TCP/IP Configuration... 37 Section 3.4: DHCP... 39 Section 3.5: DNS... 41 Section 3.6: Routing... 42 Section 3.7: Verifying TCP/IP Configuration... 44 Section 3.8: LAN Segmentation... 46 Section 4.1: Wireless Standards... 48 Section 4.2: Wireless Infrastructure... 50 Section 4.3: Wireless Security... 52 Section 4.4: Wireless Configuration... 54 Section 5.1: Subnet Operations... 56 Section 5.2: Subnet Design... 58 Section 5.3: Route Summarization... 59 Section 6.1: Wide Area Networks... 60 Section 6.2: WAN Connections... 62 Section 6.3: PPP... 64 Section 6.4: Network Address Translation (NAT)... 66 Section 6.5: WAN Troubleshooting... 67 Section 7.1: Virtual LANs (VLANs)... 69 Section 7.2: Trunking... 70 Section 7.3: VLAN Trunking Protocol (VTP)... 72 Section 7.4: Spanning Tree... 74 1

Section 7.5: Spanning Tree Configuration... 75 Section 7.6: EtherChannel... 76 Section 7.7: Inter-VLAN Routing... 77 Section 8.1: Access List Concepts... 78 Section 8.2: Configuring Access Lists... 79 Section 8.3: Access List Implementation... 80 Section 9.1: Routing Protocols... 81 Section 9.2: RIP... 82 Section 9.3: OSPF... 83 Section 9.4: EIGRP... 85 Section 9.5: Routing Protocol Comparison... 87 Section 10.1: Troubleshooting Routing... 88 Section 10.2: Troubleshooting RIP... 89 Section 10.3: Troubleshooting OSPF... 90 Section 10.4: Troubleshooting EIGRP... 91 Section 11.1: Frame Relay Concepts... 92 Section 11.2: Enabling Frame Relay... 94 Section 11.3: Address Mapping... 95 Section 11.4: Subinterfaces... 96 Section 11.5: Troubleshooting Frame Relay... 97 Section 12.1: IPv6 Concepts... 98 Section 12.2: IPv6 Implementation... 100 Section 12.3: DHCP and NAT... 101 Section 13.1: Network Security... 103 Section 13.2: Network Hardening... 105 Section 13.3: Switch Port Security... 107 Section 13.4: Virtual Private Networks (VPNs)... 109 Practice Exams... 111 Appendix A: Approximate for the Course... 112 2

Course Overview This course prepares students for the Cisco Certified Network Associate (CCNA) certification exam 640-802 by Cisco. It focuses on implementing, managing, protecting, and troubleshooting small to medium size enterprise branch networks. Module 0 Introduction This module introduces the prerequisites to this course and discusses the two paths students can take to obtain CCNA certification. Students will become familiar with how to use the Cisco Simulator as a learning tool to complete the simulations throughout the course. Module 1 Networking Concepts This module discusses the basics of networking, starting with how the OSI Model and TCP/IP protocols relate to data flow in a network. Students will learn the steps to data encapsulation and the fundamentals of Ethernet architecture. They will learn how bridging, switching, and routing function in the network environment. Module 2 Cisco Devices In this module students will learn about accessing, starting up, configuring, and managing Cisco devices. They will learn how to use show commands to find information about the status of a Cisco switched network and how to change the device host name and configure descriptions on device interfaces. They will also learn how to apply router security through system passwords and banners and how to use Cisco Discovery Protocol (CDP) to learn and share information about neighboring Cisco devices. Module 3 LAN Implementation This module covers LAN implementation; devices to connect switches and routers to network devices and hosts, configuring switch port parameters, configuring and verifying settings for a TCP/IP network, configuring DHCP and DNS operations on a router, configuring Static and RIP routing, and using LAN segmentation to increase network performance and reduce congestion. Module 4 Wireless Networks In Module 4 students will learn the basics of using radio waves for data transmissions. They will learn wireless standards, infrastructure, security, and how to implement a wireless configuration. 3

Module 5 Subnetting Module 5 teaches the students how to calculate an addressing scheme for a network, configure subnet addresses, masks, and host addresses, and select the appropriate subnet addresses and masks for summarization. Module 6 WAN Implementation Module 6 discusses implementing Wide Area Networks (WANs). Students will become familiar with WAN types, components, transmission carriers, connectors, and how to configure a basic WAN connection. Students will learn how to configure PPP encapsulation on serial links, and the basics of Network Address Translation (NAT). They will also learn how to troubleshoot WANs with the commands used to verify device and network connectivity. Module 7 Advanced Switching In Module 7 students will learn advanced switching concepts that can be implemented depending upon the needs and configuration of the system; Virtual LANs (VLANs), Trunking, VLAN Trunking Protocol (VTP), Spanning Tree, EtherChannel, and Inter-VLAN routing. Module 8 Access Lists This module discusses the basics of access lists and configuring and applying access lists to allow or deny the flow of packets between networks. Module 9 IP Routing In this module students will learn basic routing concepts. They will learn to compare and configure Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced IGRP (EIGRP). Module 10 Troubleshooting Routing This section covers troubleshooting of routers. Troubleshooting tips and commands used to verify RIP, OSPF, and EIGRP configurations are presented. Module 11 Frame Relay In Module 11 students will learn the fundamentals of Frame Relay. They will learn how to configure Frame Relay on Cisco routers, configure address mappings, configure subinterfaces, and troubleshoot a Frame Relay configuration. Module 12 Advanced TCP/IP Configuration Module 12 teaches the students how to implement an IPv6 configuration, configure DHCP from the command line, and configure Dynamic and Static NAT. 4

Module 13 Network Security Module 13 discusses a variety of network security threats and solutions. Students will learn how to harden a network to tighten security controls and use switch port security to control communication through a switch port. They will also learn the basics of protecting IP traffic on a TCP/IP network using Virtual Private Network (VPN) security technologies. Practice Exams In Practice Exams students will have the opportunity to test themselves and verify that they understand the concepts and are ready to take the CCNA certification test. 5

Section 0.1: Introduction This section introduces the prerequisite knowledge a student should have before attempting this course. They include knowledge of: CompTIA s Network+ Or equivalent networking experience There are two paths available for obtaining the CCNA certification: 1. Pass Exam 640-802 or 2. Pass Exam 640-822 and Exam 640-816 In this section students will learn how to use the Cisco Simulator. They should be familiar with launching the lab, completing the instructions in the scenario and reviewing the lab report. They will also need to identify the Cisco Device Icons used to represent network devices and connections in this course. Experiment with the router simulations so you will be able to demonstrate them in class. The first router simulation in the course is in 2.5.3: Find Device Information. About 10 minutes 6

Section 1.1: The OSI Model This section discusses the OSI model and explains how it relates to network communication. The following concepts are covered: The role of the OSI model Advantages of the OSI model Limitations of the OSI model The 7 layers of the OSI Model: o Layer 7 Application o Layer 6 Presentation o Layer 5 Session o Layer 4 Transport o Layer 3 Network o Layer 2 Data Link o Layer 1 Physical Basic characteristics of the lower OSI model layers: o Physical o Data Link Media Access Control (MAC) Logical Link Control (LLC) o Network o Transport Basic characteristics of the upper OSI model layers: o Application o Presentation o Session Comparing the functions performed at each OSI model layer 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach 7

Lecture Focus Questions: What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? Video/Demo 1.1.1 OSI Model Introduction 1:12 1.1.3 Lower OSI Layers 8:55 1.1.5 Upper OSI Layers 9:10 Total 19:17 Number of Exam Questions 7 questions About 40 minutes 8

Section 1.2: TCP/IP This section examines the basic operation of the protocols in the TCP/IP Protocol Suite. The layers of the TCP/IP (also known as Department of Defense (DoD) Model) are compared to the OSI Model Layers. Students will become familiar with: Protocols in the TCP/IP suite: o File Transfer Protocol (FTP) o Trivial File Transfer Protocol (TFTP) o Hypertext Transfer Protocol (HTTP) o Simple Mail Transfer Protocol (SMTP) o Simple Network Management Protocol (SNMP) o Telnet o Network File System (NFS) o Voice Over Internet Protocol (VoIP) o Domain Name System (DNS) o Transmission Control Protocol (TCP) o User Datagram Protocol (UDP) o Internet Protocol (IP) o Internet Control Message Protocol (ICMP) o Internet Group Membership Protocol (IGMP) o Address Resolution Protocol (ARP) o Reverse Address Resolution Protocol (RARP) o Bootstrap Protocol (BOOTP) o Dynamic Host Configuration Protocol (DHCP) o Open Shortest Path First (OSPF) o Routing Information Protocol (RIP) The role of IP addresses Each of the following classes of IP addresses have an address range, first octet range, and default subnet mask: o A o B o C o D o E Special addresses: o Network o Host o Broadcast o Local host o Private use 9

103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 104. Describe common networked applications including web applications 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network 301. Describe the operation and benefits of using private and public IP addressing Lecture Focus Questions: How does the DOD model correspond to the OSI model? Which TCP/IP protocols allow for copying and moving files? What does the Telnet protocol allow you to do? Which protocol includes a set of messages that controls how data moves through a network? What is the role of the subnet mask? What is the default address class of the IP address 132.11.166.5? What three address ranges are used for private IP addresses? What is the broadcast address of network 132.11.0.0? Video/Demo 1.2.1 The TCP/IP Protocol Suite 2:01 1.2.3 IP Addresses 5:07 Total 7:08 Number of Exam Questions 8 questions About 25 minutes 10

Section 1.3: Device Communication This section explains data encapsulation. Students will need to know the five steps to the process of data encapsulation when transmitting a message from one device to another: 1. Data 2. Segment 3. Packet 4. Frame 5. Bits 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Lecture Focus Questions: Which OSI model layer uses service data units called frames? When moving from top to bottom through the OSI model layers, which comes first, packets or segments? What gets added to the service data unit at the Network layer? At the Data Link layer? Video/Demo 1.3.1 Data Encapsulation 7:09 1.3.2 Data Encapsulation Process 0:51 Total 8:00 Number of Exam Questions 1 question About 10 minutes 11

Section 1.4: Ethernet In this section the students will learn the essentials of the following Ethernet architectural concepts: Ethernet architecture: o Topology o Media access o Transmission media o Frame type o Physical address Characteristics of various Ethernet implementations: o Ethernet o Fast Ethernet o Gigabit Ethernet Devices with collision detection turned on operate in half-duplex mode Devices with collision detection turned off operate in full-duplex mode 109. Describe the components required for network and Internet communications 201. Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts 202. Explain the technology and media access control method for Ethernet networks 403. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Lecture Focus Questions: What is the purpose of the jam signal and the back off in Ethernet communications? What is the maximum cable length allowed for 100BaseTX? What is the physical device address used on Ethernet networks? Two devices are using full-duplex communications with the 1000BaseT standards. What is the amount of bandwidth available? Under what conditions can you disable collision detection on an Ethernet network? 12

Video/Demo 1.4.1 Ethernet Architecture 5:22 1.4.2 Collision Detection and Recovery 0:39 Total 6:01 Number of Exam Questions 12 questions About 25 minutes 13

Section 1.5: Bridging and Switching This section discusses the basics of how bridges and switches work. A bridge is a data forwarding device that provides data transfer. A switch is a multiport bridge that can perform switching tasks much faster than a bridge. Switches have replaced bridges in most network applications. Students will learn how bridges and switches use MAC addresses and ports to build a forwarding database. They will also learn the different methods the switch uses to forward packets: Store-and-forward Cut-through Fragment-free 101. Describe the purpose and functions of various network devices 102. Select the components required to meet a network specification 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 108. Determine the path between two hosts across a network 109. Describe the components required for network and Internet communications 204. Explain basic switching concepts and the operation of Cisco switches Lecture Focus Questions: What is the difference between a bridge and a switch? What is the 80/20 rule of network segmentation with bridges? How do bridges and switches learn MAC addresses? What is the difference between the store-and-forward and the fragmentfree switching methods? Which switching method is the fastest? 14

Video/Demo 1.5.1 Bridges and Switches 4:29 1.5.2 How a Bridge Works 0:35 1.5.3 How a Bridge Learns 1:14 1.5.4 How a Switch Works 0:36 Total 6:54 Number of Exam Questions 14 questions About 25 minutes 15

Section 1.6: Routing This section discusses routing. A router is a device that sends packets from one network to another network. Routers use routing tables to maintain information about destination networks. Students will learn what type of information is stored in the routing table and how routers build and maintain the routing database. 101. Describe the purpose and functions of various network devices 103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 108. Determine the path between two hosts across a network 109. Describe the components required for network and Internet communications 401. Describe basic routing concepts (including: packet forwarding, router lookup process) Lecture Focus Questions: What type of information is stored in the routing table? What is convergence? What is the function of a routing protocol? A computer needs to send a message to another computer on the same network. What MAC address would go into the destination portion of the frame? A computer needs to send a message to another computer on a different network. What MAC address would go into the destination portion of the frame? As a packet moves from device to device through an internetwork, do the Network layer addresses change or remain the same? Video/Demo 1.6.1 Routers and Routing Tables 4:43 1.6.3 Internetwork Message Routing 2:23 Total 7:06 16

Number of Exam Questions 10 questions About 20 minutes 17

Section 2.1: Connecting Cisco Devices In this section students will become familiar with the following concepts about connection Cisco devices: Options to manage a Cisco device: o Console o Virtual Terminal (VTY) o Security Device Manager (SDM) Cable types to make the initial connection to the switch or the router for device management: o Rollover Cable o Straight-through Ethernet Cable o Crossover Ethernet Cable Students will learn how to: Use HyperTerminal to connect to a Cisco device console. Use Telnet to create a virtual terminal connection to a Cisco device. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters Lecture Focus Questions: What HyperTerminal settings should you use to connect to the router console for the first time? What are the requirements for using a VTY (virtual terminal) connection to a Cisco device? What type of cable do you use to connect a PC to a router console port? 18

Video/Demo 2.1.1 Cisco Devices 6:07 2.1.2 Console Connections 2:37 2.1.3 Making a Console Connection 2:14 Total 10:58 Number of Exam Questions 4 questions About 15 minutes 19

Section 2.2: System Startup Students will learn basics about the system startup. Details include: The basic startup sequence of Cisco devices: o The Power-On Self Test (POST) checks the router s hardware. o The router checks the configuration register to identify where to load the IOS image from o The router loads the configuration file into RAM (which configures the router). Setup mode: o Methods to enter setup mode o Exiting setup mode Defaults of Cisco routers and switches Express setup details Students will learn how to: Use setup mode to complete an initial configuration of a Cisco device. Use the Express setup to configure a Cisco device 205. Perform and verify initial switch configuration tasks including remote access management 402. Describe the operation of Cisco routers (including: router bootup process, POST, router components) Lecture Focus Questions: If the router can't find an IOS image in flash, where will it look next? What happens if the router can't find a configuration file at startup? What is the role of the configuration register? What configuration register value tells the router to skip the startup-config file? 20

Video/Demo 2.2.1 Startup Sequence 1:18 2.2.3 Using Setup Mode 6:12 2.2.4 Using Express Setup 5:29 Total 12:59 Number of Exam Questions 4 questions About 20 minutes 21

Section 2.3: Command Line Interface (CLI) This section examines the Command Line Interface (CLI). Details include: Basic command mode prompts and commands: o User EXEC o Privileged EXEC o Global Configuration o Line o Interface o Subinterface o Router o Setup o ROM Monitor o RXBoot Using help no matter what mode they are in to identify possible commands, keywords, and parameters. Using advanced editing features of the CLI o Ctrl + A o Ctrl + E o Ctrl + B o Ctrl + F o Esc, then B o Esc, then F o Ctrl + Z o Terminal editing o Terminal no editing Controlling screen output access commands in the history buffer and control response messages that are displayed on the screen Students will learn how to: Use help to identify possible commands, keywords, and parameters. Use advanced editing features to efficiently enter commands at the console. Turn on and access commands in the history buffer. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 22

Lecture Focus Questions: What router mode is indicated by the # prompt? How can you get a list of allowed keywords for a command? You use help to get a list of keywords for a command. In the list of options you see: A.B.C.D. What should you type to complete the command? How can you move the cursor backwards one word? How do you turn off console configuration messages? Video/Demo 2.3.1 Cisco IOS 1:40 2.3.2 Understanding CLI Prompts 5:58 2.3.3 Using CLI Utilities 13:14 Total 20:52 Lab/Activity Use Command Help Number of Exam Questions 3 questions About 30 minutes 23

Section 2.4: Managing System Files In this section students will learn how to manage system files. Details covered include: Comparison of types of router storage: o ROM (Read-Only Memory) o Flash o RAM (Random Access Memory) o NVRAM (Non-Volatile RAM) Using the copy command in privileged EXEC mode Using the erase command to delete the configuration files Commands to manage system files Using the copy command to archive, upgrade or replace an IOS image Students will learn how to: Save your configuration changes. Load an IOS image from an alternate location. Upgrade the IOS image. 405. Access and utilize the router to set basic parameters 409. Manage IOS configuration files (including: save, edit, upgrade, restore) 410. Manage Cisco IOS Lecture Focus Questions: Where is the startup-config file stored? Where is the running-config file stored? What is stored in ROM? What is the generic syntax for loading a configuration file into RAM? What does the boot system command do? 24

Video/Demo 2.4.1 Managing Startup Files and IOS Images 6:07 2.4.3 Manipulating Configuration Files 7:39 2.4.5 Booting From Alternative Locations 4:20 2.4.6 Backing Up IOS Images 5:35 Total 23:41 Number of Exam Questions 12 questions About 35 minutes 25

Section 2.5: Using Show Commands This section discusses using common show commands to verify the status of devices. Students will learn how to: Use show commands to find information about the device configuration. 215. Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network 416. Verify router hardware and software operation using SHOW & DEBUG commands Video/Demo 2.5.1 Using Show Commands 7:14 Lab/Activity Find Device Information About 10 minutes 26

Section 2.6: Hostname and Descriptions In this section students will learn the following information about hostname and descriptions: Switch interface number scheme: o Bank number o Port number Router interface numbering includes the following types of schemes: o Fixed ports o Slot/Port numbering o Slot/Sub-slot/Port numbering Adding a description to the configuration file to identify the interface Students will learn how to: Change the device host name. Configure descriptions on device interfaces. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 406. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: When is the Slot/Sub-slot/Port numbering used? How do fixed ports and WIC slots affect the numbering scheme for a device? What changes in the prompt after you set a hostname? 27

Video/Demo 2.6.1 Interface Designations 6:39 2.6.3 Setting Hostname and Interface Descriptions 2:48 Total 9:27 Lab/Activity Configure Hostnames and Descriptions About 20 minutes 28

Section 2.7: System Passwords This section examines using system password to secure devices. Details include: Password types o Console o VTY o EXEC mode Recommendation for configuring router passwords Basic password commands Conditions for accessing the console through a Telnet session Password recovery for: o 2960 switch o Routers Students will learn how to: Configure router passwords including: enable, console, and VTY. Restrict console and VTY access to a Cisco device. Recover device passwords. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 417. Implement basic router security Lecture Focus Questions: What is the difference between the enable and the enable secret passwords? Which one is more secure? How would you require a password when logging on through the console? You have configured the VTY lines on a router with a password but you did not use the login command. Will VTY login be allowed? Will a password be required? What must you do to disable VTY login? 29

Video/Demo 2.7.1 Setting Device Passwords 9:42 2.7.6 Recovering Switch Passwords 7:51 2.7.7 Recovering Router Passwords 6:04 Total 23:37 Lab/Activity Exploring Enable Passwords Set Console and VTY Passwords Modify System Passwords Number of Exam Questions 9 questions About 50 minutes 30

Section 2.8: Banners In this section students will learn how to use banners to display message for users logging into the device. Four types of banners can be displayed at various times during the login or startup sequence. Students will learn how to: Configure, modify, and delete router banners. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 417. Implement basic router security Lecture Focus Questions: When do each of the banners display? What banner do you configure if you use the banner command without specifying the banner type? What is the role of the delimiting character? You type the following command at the router: banner exec this is it. What will show following a successful login? Video/Demo 2.8.1 Setting Device Passwords 4:57 Lab/Activity Configure Banners Modify Banners Number of Exam Questions 3 questions About 15 minutes 31

Section 2.9: Cisco Discovery Protocol (CDP) This section discusses how Cisco devices use the Cisco Discovery Protocol (CDP) to learn and share information about neighboring Cisco devices. Students will learn how to: Use CDP to view information about neighboring devices. Enable and disable CDP on devices and specific interfaces. Configure CDP timers. 205. Perform and verify initial switch configuration tasks including remote access management 405. Access and utilize the router to set basic parameters 406. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: What are the requirements for using CDP? You have not yet configured an IP address on a Cisco router, but the interface is up. Will the router be able to use CDP to discover neighboring device information? You want to view information about a router that is two hops away? How can you view this information? How do you turn off CDP advertisements for a single interface? How do you disable CDP on a router? Video/Demo 2.9.1 Cisco Discovery Protocol (CDP) 1:54 2.9.2 Configuring CDP 8:15 Total 10:09 32

Lab/Activity Exploring CDP Configure CDP Modify the CDP Configuration Find CDP Information Number of Exam Questions 4 questions About 40 minutes 33

Section 3.1: Connecting Devices This section examines different types of Ethernet cables used for LAN connections. Students will learn the uses for a straight-through Ethernet cable and a crossover Ethernet cable and the pin positions for each. 201. Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts 403. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts Lecture Focus Questions: When would you use a crossover cable when connecting to a Cisco device? What type of cable do you use to connect two switches? What is the SFP slot on a switch used for? How does Auto-MDI/MDIX affect cable selection when connecting devices? Video/Demo 3.1.1 LAN Connections 8:14 Number of Exam Questions 6 questions About 15 minutes 34

Section 3.2: Switch Configuration In this section students will learn how to configure the Catalyst 2960 series switch. They will learn how to recognize the switch s activity by the various colored status lights. Students will learn how to: Configure basic switch port parameters. View port statuses. 205. Perform and verify initial switch configuration tasks including remote access management 207. Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures 215. Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network. Lecture Focus Questions: What configuration modes are unique to switches? How do you identify ports which are administratively shut down? What information does the SYST LED provide? Video/Demo 3.2.1 Viewing Switch Status Lights 2:56 3.2.3 Configuring Switch Interfaces 8:25 3.2.7 Viewing Port Statuses 3:20 Total 14:41 35

Lab/Activity Configure Switch Ports Exploring Switch Port Status Number of Exam Questions 7 questions About 40 minutes 36

Section 3.3: TCP/IP Configuration This section examines the configuration settings for a TCP/IP network. Concepts covered include: Configuration settings for a TCP/IP network: o IP address o Subnet mask o Default gateway o Host name o DNS server o MAC address Methods to assign TCP/IP configuration settings: o Dynamic Host Configuration Protocol (DHCP) o Automatic Private IP Addressing (APIPA) o Static (manual) assignment Configuring IP addresses on switches Students will learn how to: Configure workstation TCP/IP settings. Configure an IP address and default gateway on a switch. Configure a router interface with an IP address. 205. Perform and verify initial switch configuration tasks including remote access management 304. Implement static and dynamic addressing services for hosts in a LAN environment 405. Connect, configure, and verify operation status of a device interface Lecture Focus Questions: What is the minimum amount of information a workstation needs to communicate on a single subnet? What additional configuration values are required for inter-network communications? What address range indicates an APIPA address assignment? What are the drawbacks to using manual IP address assignments? Why does a switch have an IP address? Which interface is assigned the IP address? 37

Video/Demo 3.3.1 TCP/IP Configuration Parameters 4:04 3.3.3 Configuring TCP/IP Settings 0:52 3.3.5 Setting the Switch IP Address 3:58 Total 8:54 Lab/Activity Configure Workstation Settings Configure Switch IP Settings Configure Device IP Settings Number of Exam Questions 10 questions About 40 minutes 38

Section 3.4: DHCP In this section students will learn how the Dynamic Host Configuration Protocol (DHCP) is used to obtain parameters that are needed for the clients to operate in a network. Details include: Protocols that perform address resolution: o Address Resolution Protocol (ARP) o Reverse Address Resolution Protocol (RARP) o Bootstrap Protocol (BootP) o Dynamic Host Configuration Protocol (DHCP) DHCP configuration parameters: o Address pool o Lease o DHCP options: Domain Name Server (DNS) server addresses Default router (or default gateway) address WINS server addresses Additional TCP/IP configuration parameters o Binding o Interface Process for a DHCP client to obtain an IP address: o Lease Request o Lease Offer o Lease Selection o IP Lease Acknowledgement Enabling DHCP across subnets Students will learn how to: Use the SDM interface to configure the DHCP service on a router. 302. Explain the operation and benefits of using DHCP and DNS 303. Configure, verify and troubleshoot DHCP and DNS operation on a router Lecture Focus Questions: What is the difference between the ARP and RARP protocols? What is the difference between the BootP and DHCP protocols? 39

What type of information is delivered by DHCP options? How can you make sure a specific host gets the same IP address from the DHCP server each time it boots? How does the router determine which interfaces will respond to DHCP requests? How can you enable DHCP messages to work across subnets? Video/Demo 3.4.1 Address Resolution 7:19 3.4.3 DHCP Functionality 0:43 3.4.4 Configuring DHCP 5:27 Total 13:37 Number of Exam Questions 7 questions About 20 minutes 40

Section 3.5: DNS This section discusses the basics of the Domain Name System (DNS) database. Students will learn the commands to configure DNS services on a router. Students will learn how to: Disable name resolution on a Cisco device. Create static DNS entries on a router. 302. Explain the operation and benefits of using DHCP and DNS 303. Configure, verify and troubleshoot DHCP and DNS operation on a router Video/Demo 3.5.1 Configuring DNS Services 4:43 Number of Exam Questions 8 questions About 15 minutes 41

Section 3.6: Routing This section provides an overview of routing protocols used to automatically share and learn routes. Both default routes and static routes are presented. The steps to configuring a routing protocol are discussed as well as the commands for configuring the Routing Information Protocol (RIP). Student will learn the function of the routing table and how to view the routing table. Students will learn how to: Configure static routes. Configure RIPv2 routing. 401. Describe basic routing concepts (including: packet forwarding, router lookup process) 404. Configure, verify, and troubleshoot RIPv2 408. Perform and verify routing configuration tasks for a static or default route given specific routing requirements Lecture Focus Questions: What is the difference between a static and a default route? In what cases would you use a static route rather than a routing protocol? What does a route to network 0.0.0.0 identify? What happens to a packet that does not match any of the routes in a routing table? What does an asterisk ( * ) on a route indicate? How does a router choose between two routes to the same destination network? 42

Video/Demo 3.6.1 Routing 5:48 3.6.2 Static Routes 7:37 3.6.3 Configuring Static Routes 8:02 3.6.6 Configuring RIP 8:07 Total 29:34 Lab/Activity Configure Static Routes Enable RIP Configure RIP Routing Find Routing Table Information Number of Exam Questions 13 questions About 60 minutes 43

Section 3.7: Verifying TCP/IP Configuration In this section students will learn how to verify TCP/IP configurations. Concepts covered include: The role of the Internet Control Message Protocol (ICMP) Types of Internet Control Message Protocol (ICMP) messages: o Echo o Destination unreachable o exceeded o Redirect o Source quench o Router discovery Utilities used to test network connectivity between devices: o Ping o Traceroute o Telnet Utilities to verify the configuration of the workstation: o Ipconfig o Arp o Nslookup Common symptoms and suggested remedies for communication problems Students will learn how to: Use ping and traceroute to verify connectivity between devices. 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach 206. Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands 309. Identify and correct common problems associated with IP addressing and host configurations 407. Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities 44

414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH) Lecture Focus Questions: What are the differences and similarities between ping and traceroute? You can ping a device but can't open a Telnet session with that device. What is the problem? Which utility can you use to test upper-layer protocols as well as lowerlayer connectivity? Which utility would you use on a workstation to view the IP address received from the DHCP server? Video/Demo 3.7.1 Troubleshooting IP 6:27 3.7.2 Traceroute and TTL 1:28 3.7.4 Verifying Connectivity 7:26 Total 15:21 Lab/Activity Exploring TCP/IP Communications Number of Exam Questions 12 questions About 40 minutes 45

Section 3.8: LAN Segmentation This section covers the basics of using LAN segmentation to increase network performance and reduce congestion. Concepts include: Collision domain Broadcast domain Membership within collision vs. broadcast domains depending on the connection device used Range of services o Router o Switch o Bridges Guidelines for deciding the appropriate connectivity device Challenges to adequately support VoIP Considerations to adequately support VoIP: o Delay o Jitter o Packet loss o Echo 106. Describe the impact of applications (Voice Over IP and Video Over IP) on a network 203. Explain network segmentation and basic traffic management concepts Lecture Focus Questions: What is the difference between a collision domain and a broadcast domain? Your network uses only hubs as connection devices. What happens to the number of collisions on the network as you add devices? Your network uses only switches as connection devices. All devices have a dedicated switch port. What happens to the number of collisions on the network as you add devices? What happens to the collision and broadcast domains as you segment the network with routers? Which device provides guaranteed bandwidth between devices? Which device can you use to filter broadcast traffic? 46

What is the relationship between delay and jitter with VoIP? What special features might you need on a switch to support VoIP? Video/Demo 3.8.1 LAN Segmentation 6:23 Number of Exam Questions 16 questions About 25 minutes 47

Section 4.1: Wireless Standards This section discusses using radio waves for data transmission. Details include: Organizations that influence the standards used for wireless communication: o Federal Communication Commission (FCC) o International Telecommunication Union Radiocommunications Sector (ITU-R) o Wi-Fi Alliance o Institute of Electrical Electronics Engineers (IEEE) Characteristics of radio waves: o Frequency range or band o Channel o Modulation technique Wireless standards: o 802.11a o 802.11b o 802.11g o 802.11n Implementing a wireless network 501. Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC) Lecture Focus Questions: How are the FCC and ITU-R similar? How are FHSS and DSSS different? What are the differences between 802.11a and 802.11g specifications? What is the difference between channel bonding and dual band? When should you implement a dual band access point? What improvements are included with 802.11n standards that improve speed and distance? Video/Demo 4.1.1 Wireless Standards 4:32 48

Number of Exam Questions 6 questions About 15 minutes 49

Section 4.2: Wireless Infrastructure This section provides an overview of wireless networking methods: Wireless Networking o Ad Hoc o Infrastructure Components of a wireless network: o Station (STA) o Access Point (AP) o Basic Service Set (BSS) o Independent Basic Service Set (IBSS) o Extended Service Set (ESS) o Distribution System (DS) Identifiers of wireless networks: o Service Set Identifier (SSID) o Basic Service Set Identifier (BSSID) Carrier Sense, Multiple Access/Collision Avoidance (CSMA/CA) 502. Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS) 503. Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point Lecture Focus Questions: Under which circumstances might you choose an ad hoc wireless network? What is an SSID? How does the BSSID differ from the SSID? How many access points are in a BSS and an ESS? What media access method do wireless networks use? How does this differ from the media access used on Ethernet? Video/Demo 4.2.1 Wireless Infrastructure 6:31 50

Number of Exam Questions 5 questions About 15 minutes 51

Section 4.3: Wireless Security This section explores security on a wireless network. Attacks that wireless networks are vulnerable to: o War driving o Hacker o Rogue access point o Spoofed access point Countermeasures to these vulnerabilities: o Authentication o Encryption o Intrusion Detection System (IDS) o Cisco Structured Wireless-Aware Network (SWAN) Standards that provide security for wireless networking: o Wired Equivalent Privacy o Cisco interim solution o Wi-Fi Protected Access (WPA) o Wi-Fi Protected Access 2 (WPA2) or 802.11i Security practices that kee0p curious people from trying to access the wireless network: o Change the administrator account name and password o Update the firmware o Enable the firewall on the access point o Change SSID from defaults o Disable DHCP o Enable MAC address filtering 504. Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2) Lecture Focus Questions: What is the difference between a rogue access point and a spoofed access point? What does open authentication use to authenticate a device? How does 802.1x authentication differ from shared key authentication? What improvements did WPA make to overcome the weaknesses of WEP? 52

You have an older wireless access point that supports WEP. You would like to use WPA instead. What action would you typically take to do this? What would you need to do to use WPA2? Which wireless security standards use Temporal Key Integrity Protocol (TKIP) encryption? What are three actions you should take to increase the security of a wireless access point? How does MAC address filtering improve security of a wireless access point? Why is this action by itself insufficient to prevent unauthorized access? Video/Demo 4.3.1 Security Issues 3:27 4.3.3 Security Standards 5:20 Total 8:47 Number of Exam Questions 10 questions About 25 minutes 53

Section 4.4: Wireless Configuration This section discusses implementing a wireless configuration. Details include: Wireless implementation checklist: o Plan access point placement and configuration o Connect the wireless access point to the wired network o Configure basic access point settings o Configure a client o Configure security on the access point o Configure client security settings o Conduct a site survey Considerations when troubleshooting wireless connections: o Incorrect configuration o Range and obstructions o Channel interference o Atmospheric and EMI conditions o Antennae orientation o Client and access point incompatibility Students will learn how to: Configure basic options and security on a wireless access point. Configure a wireless client connection. 503. Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point 505. Identify common issues with implementing wireless networks. (Including: Interface, misconfiguration) Lecture Focus Questions: You have a network with two wireless access points. Should the SSID be the same or different? Should the channel on each be the same or different? Where is the best place to locate your wireless access point? What type of objects might obstruct radio frequency wireless transmissions? How does range and antenna placement affect wireless networks? When should you use open authentication on your wireless network? 54

What authentication type should you not use when using WEP for encryption? What is required in order to implement 802.1x authentication? Video/Demo 4.4.1 Wireless Configuration 2:21 4.4.2 Configuring Wireless Network Settings 2:04 Total 4:35 Lab/Activity Configure a Wireless Client Number of Exam Questions 10 questions About 30 minutes 55

Section 5.1: Subnet Operations In this section students will learn how to perform the following subnet operations: The role of subnetting Definitions needed when working with subnets: o Classful addresses o Classless addresses o Variable Length Subnet Mask (VLSM) o Classless Interdomain Routing (CIDR) o CIDR routers o Route aggregation (also called route summarization) Comparison of binary value to decimal value Finding the decimal value of a binary number Finding the exponential values of 2 Solutions to common subnetting tasks Students will learn how to: Given a subnet mask and an IP address, find the network address. Given a network address and a number of desired subnets and hosts, select the subnet mask. From a network address and subnet mask, identify valid subnet addresses. From a subnet address and mask, identify the range of valid host addresses. 305. Calculate and apply an addressing scheme including VLSM IP addressing design to a network Lecture Focus Questions: When should you use the 2n-2 formula to determine the amount of available subnets? What is the magic number and how can it help while subnetting a network? What is the difference between a classful and classless subnet mask? 56

Video/Demo 5.1.1 Subnetting 13:37 5.1.3 Binary Math 19:11 5.1.5 Identifying Configuration Information 23:11 5.1.7 Identifying Valid Subnets 8:53 5.1.9 Identifying the Number of Subnets and Hosts 14:32 5.1.11 Selecting a Subnet Mask 9:04 Total 88:28 Number of Exam Questions 5.1.6 Identify Addresses -11 questions 5.1.8 Identify Valid Subnets 4 questions 5.1.10 Identify the Number of Subnets and Hosts 6 questions 5.1.12 Select a Subnet Mask 10 questions About 125 minutes 57

Section 5.2: Subnet Design This section discusses the process to subnet design. Students will learn how to select and configure subnet addresses, masks, and host addresses. Students will learn how to: Given a scenario, select and configure subnet addresses, masks, and host addresses. 305. Calculate and apply an addressing scheme including VLSM IP addressing design to a network Video/Demo 5.2.1 Subnet Design 8:42 Lab/Activity Configure Subnet Masks 1 Configure Subnet Masks 2 Number of Exam Questions 17 questions About 40 minutes 58

Section 5.3: Route Summarization In this section students will become familiar with route summarization. Students will learn how to select the appropriate subnet addresses and masks for summarization. They will also learn how to identify the summarized route. Students will learn how to: Given a scenario, select the appropriate subnet addresses and masks to prepare for summarization. Given a scenario, identify the summarized route. 306. Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment Lecture Focus Questions: What are the advantages of route summarization? If automatic route summarization is used, how does the router determine which routes to summarize? What route becomes the summarized network? Which routing protocol does not support automatic route summarization? Why do discontiguous networks pose a problem for route summarization? Video/Demo 5.3.1 Route Summarization 7:58 Lab/Activity Exploring Auto-Summarization Number of Exam Questions 6 questions About 30 minutes 59

Section 6.1: Wide Area Networks In this section the students will learn how Wide Area Networks (WANs) are used to connect sites. WAN types: o Point-to-point o Circuit switching o Packet switching Components of a WAN structure: o Consumer Premises Equipment (CPE) o Data Terminal Equipment (DTE) o Channel Service Unit/Data Service Unit (CSU/DSU) o Demarcation point (demark) o Local loop o Central Office (CO) o Data Communication Equipment (DCE) o WAN cloud o Packet-Switching Exchange (PSE) Common WAN transmission carriers: o Plain Old Telephone Service (POTS) o T1 o T3 o E1 o E3 o J1 o J3 Service options for WAN connectivity: o Public Switched Telephone Network (PSTN) o Leased lines o X.25 o Frame Relay o Asynchronous Transfer Mode (ATM) o Integrated Services Digital Network (ISDN) o DSL 111. Differentiate between LAN/WAN operation and features 801. Describe different methods for connecting to a WAN 60

Lecture Focus Questions: How does a packet switched WAN service differ from a circuit switched WAN service? Who is responsible for the local loop, the customer or the service provider? What is the significance of the demarc? What is the difference between the Data Terminal Equipment (DTE) and Data Communication Equipment (DCE)? Which WAN services use already-installed telephone lines? What media type is used by ATM? Video/Demo 6.1.1 WAN Communication 2:26 6.1.3 WAN Structure 2:29 Total 4:55 Number of Exam Questions 10 questions About 15 minutes 61

Section 6.2: WAN Connections This section discusses the details to consider when selecting WAN connections. Several connector types and ports are presented. The encapsulation method that is selected depends upon the WAN service and connection method. Students will learn the commands to configure the router. Considerations when choosing the correct cable: o Interface operating mode Data Communications Equipment (DCE) Data Terminal Equipment (DTE) o Service: X.25 Frame Relay Asynchronous Transfer Mode (ATM) Integrated Services Digital Network (ISDN) DSL Connector types: o DB-60 o Smart Serial o RJ-48 o RJ-11 Encapsulation methods: o Cisco HDLC for synchronous, point-to-point connections with other Cisco routers o LAPB for X.25 networks o LAPD in combination with another protocol for the B channels in ISDN networks o PPP for dial-up LAN access, circuit-switched WAN networks, and ISDN networks o Cisco/IETF for Frame Relay networks Students will learn how to: Configure a serial interface for a basic WAN connection. Configure a serial connection between back-to-back routers. 403. Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts 406. Connect, configure, and verify operation status of a device interface 62

801. Describe different methods for connecting to a WAN 802. Configure and verify a basic WAN serial connection Lecture Focus Questions: Which interface provides clocking in the WAN connection? How is a DB-60 connector different from a Smart Serial connector? When would you use an RJ-48 connector? What is the default encapsulation protocol on Cisco routers? When should you use PPP as the encapsulation protocol? Video/Demo 6.2.1 WAN Connections 3:03 6.2.4 WAN Encapsulation 2:32 6.2.6 Configuring Serial Interfaces 10:27 Total 16:02 Lab/Activity Exploring Serial Interface Status Configure Back-to-back Routers Number of Exam Questions 9 questions About 40 minutes 63

Section 6.3: PPP In this section students will learn how to configure Point-to-Point (PPP). Concepts include: Key features of PPP Protocols that PPP uses to establish and maintain the link: o Link Control Protocol (LCP) o Network Control Protocol (NCP) PPP establishes communication in three phases: o LCP phase o Authenticate phase (optional) o NCP phase Tasks to configure PPP on a router Commands to configure PPP Students will learn how to: Configure PPP encapsulation on serial links. Configure PPP authentication including username and password combinations. 801. Describe different methods for connecting to a WAN 802. Configure and verify a basic WAN serial connection 806. Configure and verify a PPP connection between Cisco routers Lecture Focus Questions: What is the purpose of LCPs in PPP communications? Which authentication method is more secure, PAP or CHAP? How do you configure the password used with PPP authentication? 64

Video/Demo 6.3.1 PPP Concepts 6:14 6.3.2 Establishing a PPP Session 1:17 6.3.4 Configuring PPP 9:50 Total 17:21 Lab/Activity Configure PPP Number of Exam Questions 8 questions About 35 minutes 65

Section 6.4: Network Address Translation (NAT) Students will learn the basics of Network Address Translation (NAT). NAT is used to connect a private network to the Internet by translating the public address of the NAT router. 706. Explain the basic operation of NAT 707. Configure NAT for given network requirements Lecture Focus Questions: What are the IP address ranges for private networks? Which network devices are most likely to be assigned a public IP address? What benefits come from using NAT? What is the difference between an inside global address and an outside global address? What is overloading, and why is it important in a NAT configuration? How is PAT different than NAT? Video/Demo 6.4.1 Network Address Translation (NAT) 3:48 Number of Exam Questions 14 questions About 20 minutes 66

Section 6.5: WAN Troubleshooting This section explores tips for troubleshooting WAN communications. Students will become familiar with commands used to view the status of the interface. They will practice troubleshooting serial connections. 407. Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities 414. Verify network connectivity (including: using ping, traceroute, and telnet or SSH) 804. Troubleshoot WAN implementation issues Lecture Focus Questions: What are possible causes of Layer 1 problems on a serial connection? Which interface status indicates a Layer 2 connection problem? What steps can you take to correct a Layer 2 problem? How does having an incorrect interface IP address affect a WAN connection? A ping test to a remote router succeeds, but the Telnet connection fails. What can you assume about the router configuration? Can the router route packets? You have Layer 2 connectivity to a remote device but full connectivity does not exist. What steps can you take to identify the problem? Video/Demo 6.5.1 Troubleshooting Communications 5:49 6.5.2 Viewing Router Interface Statuses 3:45 Total 9:34 Lab/Activity View Serial Interface Status Troubleshoot a Serial Connection 1 Troubleshoot a Serial Connection 2 Troubleshoot a Serial Connection 3 Troubleshoot a Serial Connection 4 67

Number of Exam Questions 14 questions About 50 minutes 68

Section 7.1: Virtual LANs (VLANs) This section examines using Virtual LANs (VLANs) to configure ports on the switch to provide segmentation, flexibility, and security. Common VLAN configuration commands are discussed. Students will learn how to: Create VLANs and assign switch ports to a VLAN. 208. Describe enhanced switching technologies 209. Describe how VLANs create logically separate networks and the need for routing between them 210. Configure, verify, and troubleshoot VLANs Lecture Focus Questions: What are two advantages to creating VLANs on your network? You have two VLANs configured on a single switch. How many broadcast domains are there? How many collision domains are there? What happens if two devices on the same switch are assigned to different VLANs? Video/Demo 7.1.1 Virtual LANs (VLANs) 8:10 7.1.3 Configuring VLANs 6:19 Total 14:29 Lab/Activity Create VLANs Number of Exam Questions 9 questions About 30 minutes 69

Section 7.2: Trunking In this section students will learn about trunking, which is used when you connect two switches together. It is used to configure VLANs that span multiple switches. Students will become familiar with commands for configuring and monitoring trunking on a switch. Students will learn how to: Configure a switch port as an access port or a trunk port. Configure dynamic trunking modes. 208. Describe enhanced switching technologies 211. Configure, verify, and troubleshoot trunking on Cisco switches Lecture Focus Questions: Why is trunking important to VLAN configuration? Which trunking protocols are supported on a Cisco 2960 switch? Which protocol is an industry standard? What protocol does a Cisco switch use to automatically detect trunk ports? By default, traffic from which VLANs are allowed on trunk ports? A trunk port is set to dynamic desirable. What configurations on other switches are allowed so the port enters a trunking state? Video/Demo 7.2.1 Trunking 4:24 7.2.3 Configuring Trunking 5:53 Total 10:17 70

Lab/Activity Configure Trunking Number of Exam Questions 11 questions About 40 minutes 71

Section 7.3: VLAN Trunking Protocol (VTP) This section discusses how the VLAN Trunking Protocol (VTP) is used to manage VLANs in a multi-switch network by maintaining a consistent database of configuration changes and propagating changes to other switches in the network. Switches are placed in one of three configuration modes o Server o Client o Transparent Facts about VTP Common VTP commands Troubleshooting the VTP configuration Students will learn how to: Configure the VTP mode on a switch. Set VTP domain and password parameters. 208. Describe enhanced switching technologies 213. Configure, verify, and troubleshoot VTP Lecture Focus Questions: What is the function of the VTP protocol? A switch in transparent mode. Will the switch learn VLAN information from other switches? Will the switch propagate information to other switches? Where does a switch in client mode save VLAN information? When would a switch in client mode update VLAN information on a switch in server mode? Why is the default VTP mode of a switch important? What conditions must be met before two switches will share VLAN information using VTP? 72

Video/Demo 7.3.1 VLAN Trunking Protocol (VTP) 7:00 7.3.3 Configuring VTP 9:59 Total 16:59 Lab/Activity Configure VTP Settings Number of Exam Questions 15 questions About 40 minutes 73

Section 7.4: Spanning Tree In this section students will learn how Spanning Tree is used to provide a loopfree path through a network. Rapid Spanning Tree will converge much faster than Spanning Tree. Per-VLAN Spanning allows for multiple pathways with control along the VLAN boundaries by configuring which ports will be active for which VLANs and which ports will be blocking. 208. Describe enhanced switching technologies 214. Configure, verify, and troubleshoot RSTP operation Lecture Focus Questions: What is the purpose of the spanning tree protocol? What is the role of designated bridges? What are BPDUs and when are they exchanged? A switch port is in the blocking state. Will it learn MAC addresses? Will it send and receive frames? A switch port is in the learning state. Will it learn MAC addresses? Will it send and receive frames? A switch port is identified as a backup port. What state is it in? What advantages are added to spanning tree with the edge port type definition? How does this improve performance? How does PVST+ differ from Rapid PVST+? Video/Demo 7.4.1 Spanning Tree 29:40 7.4.4 Rapid Spanning Tree 6:34 7.4.6 Per-VLAN Spanning Tree 7:20 Total 43:34 Number of Exam Questions 10 questions About 70 minutes 74

Section 7.5: Spanning Tree Configuration This section discusses commands that can be used to configure spanning tree. Students will learn how to configure the spanning tree mode and configure UplinkFast on access ports. Students will learn how to: Configure the spanning tree mode. Configure UplinkFast on access ports. 208. Describe enhanced switching technologies 214. Configure, verify, and troubleshoot RSTP operation Video/Demo 7.5.1 Configuring Spanning Tree 14:20 7.5.2 Configuring Per-VLAN Spanning Tree Protocol (PVST) 5:48 Total 20:08 Number of Exam Questions 12 questions About 35 minutes 75

Section 7.6: EtherChannel In this section students will learn how EtherChannel uses multiple links to increase bandwidth and provide redundant links. They will learn how to enable EtherChannel by using the channel-group command. 208. Describe enhanced switching technologies Lecture Focus Questions: What advantages does the EtherChannel feature provide? Why must EtherChannel be used to create multiple links between switches that can be used at the same time? How does EtherChannel interact with spanning tree? Video/Demo 7.6.1 EtherChannel 2:24 About 5 minutes 76

Section 7.7: Inter-VLAN Routing In this section students will learn the basics of configuring subinterfaces and ISL encapsulation to enable inter-vlan routing on a router. Students will learn how to: Configure subinterfaces and ISL encapsulation to enable inter-vlan routing on a router. 208. Describe enhanced switching technologies 209. Describe how VLANs create logically separate networks and the need for routing between them 212. Configure, verify, and troubleshoot intervlan routing Lecture Focus Questions: What is required before members of two VLANs can communicate with each other? Why doesn't trunking enable inter-vlan communication? What method is used to allow a single router to perform inter-vlan routing using a single physical interface? What protocol do you configure on a router to enable inter-vlan routing? Video/Demo 7.7.1 Configuring Inter-VLAN Routing 7:48 Number of Exam Questions 6 questions About 15 minutes 77

Section 8.1: Access List Concepts This section discusses how routers use access lists to control traffic. Students will learn how to calculate the wildcard mask value to use in an access list statement. Students will learn how to: Given a subnet address and mask, calculate the wildcard mask value to use in an access list statement. 701. Describe the purpose and types of ACLs Lecture Focus Questions: You want to create an access list that restricts traffic from host 12.0.15.166. What type of access list can you use? You want to create an access list that restricts ICMP traffic. What type of access list would you choose? How many access lists can be applied to a single interface? What is the last statement in every access list? How is a wildcard mask related to the subnet mask? What does a 0 in a wildcard mask indicate? Video/Demo 8.1.1 Access Lists 6:54 8.1.3 Wildcard Masks 5:34 Total 12:28 Number of Exam Questions 6 questions About 25 minutes 78

Section 8.2: Configuring Access Lists This section provides the details of how to configure access lists. Information on how to configure both standard IP and extended IP access lists is provided. Students will learn how to: Based on filtering requirements, construct access list statements. Create an access list and apply it to an interface. 702. Configure and apply ACLs based on network filtering requirements 703. Configure and apply an ACLs to limit telnet and SSH access to the router 704. Verify and monitor ACLs in a network environment 705. Troubleshoot ACL issues Video/Demo 8.2.2 Configuring Standard IP Access Lists 8:05 8.2.6 Configuring Extended IP Access Lists 16:31 Total 24:36 Lab/Activity Restrict Telnet and SSH Access Permit Traffic Block Source Hosts Configure Allowed Networks Create Access Lists Statements Number of Exam Questions 15 questions About 75 minutes 79

Section 8.3: Access List Implementation This section explores using access list implementation to allow or deny the flow of packets between networks. Students will learn how to: Create an access list given customer requirements. Apply an existing access list to the appropriate router and interface. 702. Configure and apply ACLs based on network filtering requirements 703. Configure and apply an ACLs to limit telnet and SSH access to the router 704. Verify and monitor ACLs in a network environment 705. Troubleshoot ACL issues Lecture Focus Questions: How do you identify where to place an access list (on a specific router, a specific interface, and a specific direction)? Why should each access list contain at least one allow statement? Lab/Activity Block Invalid Addresses Allow Only Specific Services About 15 minutes 80

Section 9.1: Routing Protocols This section discusses how routers use routing protocols to dynamically discover routes, build routing tables, and make decisions about how to send packets through the internetwork. Students will become familiar with both vector routing and link state routing. 401. Describe basic routing concepts 411. Compare and contrast methods of routing and routing protocols Lecture Focus Questions: What is the difference between a routing protocol and a routed protocol? What is the difference between distance vector routing and link state routing? What is a flash update? What is poison reverse? Why don't link state protocols use hold down timers, split horizon, or poison reverse? What is in an LSP? What is a designated router? Video/Demo 9.1.1 Routing Protocols 7:37 9.1.3 Distance Vector Routing 9:20 9.1.5 Link State Routing 5:32 9.1.6 Link State Route Discovery 1:11 Total 23:40 Number of Exam Questions 12 questions About 30 minutes 81

Section 9.2: RIP This section provides an overview of using the Routing Information Protocol (RIP) to reduce the amount of administration required for maintaining routes between small to medium sized networks. The steps to configuring a routing protocol are presented as well as the commands for configuring RIP. Students will learn how to: Enable IP routing. Configure RIP networks. 404. Configure, verify, and troubleshoot RIPv2 Lecture Focus Questions: What are the differences between RIP version 1 and RIP version 2? What is the metric used with RIP? What is the maximum metric value? Can RIP v2 do load balancing across multiple paths? If so, what are the limitations? How does RIP v2 perform auto-summarization? Video/Demo 9.2.1 RIP 1:35 9.2.3 Configuring RIP 8:07 Total 9:42 Lab/Activity Configure RIP Routing Number of Exam Questions 3 questions About 20 minutes 82

Section 9.3: OSPF This section explores the popular Open Shortest Path First (OSPF) routing protocol commonly used on larger networks. Discussed is how to configure OSPF routing by using the OSPF commands. Students will learn how to: Configure OSPF routing. 412. Configure, verify, and troubleshoot OSPF Lecture Focus Questions: Must the process ID number used on different OSPF routers match? What is Area 0 in an OSPF implementation? How many areas can a single subnet be in? How does the DR and BDR reduce network traffic? When is the DR not used? How is the DR elected? How can you ensure that a specific device becomes the DR? What conditions must be met before two routers running OSPF will share information? Video/Demo 9.3.1 OSPF 9:43 9.3.3 Configuring RIP 15:38 Total 25:21 Lab/Activity Enable OSPF Exploring OSPF Configure OSPF Routing 83

Number of Exam Questions 13 questions About 60 minutes 84

Section 9.4: EIGRP This section discusses configuring Enhanced IGRP (EIGRP). Students will learn the commands to configure EIGRP routing and how to use show commands to monitor EIGRP routing. Students will learn how to: Configure EIGRP routing. Use show commands to monitor EIGRP routing. 413. Configure, verify, and troubleshoot EIGRP Lecture Focus Questions: What type of routing protocol is EIGRP? What is the metric used with EIGRP? How does the router calculate the feasible distance? What condition must be met for a route to become a feasible successor route? What is the difference between a feasible successor and a successor? How does EIGRP determine how many paths to keep in its topology database? What conditions must be met before two routers running OSPF will share information? Video/Demo 9.4.1 EIGRP 4:22 9.4.3 Configuring EIGRP 8:15 Total 12:37 85

Lab/Activity Enable EIGRP Number of Exam Questions 5 questions About 20 minutes 86

Section 9.5: Routing Protocol Comparison In this section students will compare the characteristics of three routing protocols; RIP, OSPF, and EIGRP. They will also learn that when multiple routes exist to a destination the administrative distance is used to determine which route will be taken. 411. Compare and contrast methods of routing and routing protocols Lecture Focus Questions: Which routing protocols support route summarization and variable length subnet masks (VLSM)? Which routing protocols are public-standard protocols? Which routing protocol uses areas for configuration? Which routing protocol uses wildcard masks for configuration? If a router learns of a route to network B through both EIGRP and OSPF, which route will it prefer? Number of Exam Questions 9 questions About 10 minutes 87

Section 10.1: Troubleshooting Routing In this section students will learn tips for troubleshooting routing, verifying routing protocol configuration, and handling route summarization issues. 415. Troubleshoot routing issues Lecture Focus Questions: The show ip route command on a router does not show two directlyconnected networks. What conditions might be causing this problem? When might static routes configured on a router not show in the routing table? What does an asterisks ( * ) next to a route in the routing table indicate? How can you tell how many paths a routing protocol can use for load balancing? For the show ip protocols command, what does the Routing for Networks section indicate? Why might subnetted routes be missing from the routing table? Which settings control this behavior? Number of Exam Questions 6 questions About 15 minutes 88

Section 10.2: Troubleshooting RIP This section covers troubleshooting RIP. Students will learn how to: Interpret the output of the debug ip rip command to troubleshoot RIP routing. Verify the RIP configuration of a network and correct any problems to restore full connectivity. 404. Configure, verify, and troubleshoot RIPv2 415. Troubleshoot routing issues Video/Demo 10.2.1 Troubleshooting RIP 8:46 Lab/Activity Troubleshoot RIP 1 Troubleshoot RIP 2 Troubleshoot RIP 3 Number of Exam Questions 6 questions About 35 minutes 89

Section 10.3: Troubleshooting OSPF In this section students will become familiar with troubleshooting OSPF routers. Students will learn how to: Use show commands to verify the OSPF operation. Verify the OSPF configuration of a network and correct any problems to restore full connectivity. 412. Configure, verify, and troubleshoot OSPF 415. Troubleshoot routing issues Video/Demo 10.3.1 Troubleshooting OSPF 8:26 Lab/Activity Troubleshoot OSPF 1 Troubleshoot OSPF 2 Number of Exam Questions 7 questions About 30 minutes 90

Section 10.4: Troubleshooting EIGRP This section examines troubleshooting EIGRP. Students will learn how to: Use show commands to verify the EIGRP operation. Interpret the output of the show ip eigrp topology all-links command. Verify the EIGRP configuration of a network and correct any problems to restore full connectivity. 413. Configure, verify, and troubleshoot EIGRP 415. Troubleshoot routing issues Lab/Activity Troubleshoot EIGRP 1 Troubleshoot EIGRP 2 Video/Demo 10.4.1 Troubleshooting EIGRP 10:18 Number of Exam Questions 10 questions About 35 minutes 91

Section 11.1: Frame Relay Concepts In this section the students will learn about Frame Relay, one of the most common WAN protocols. Students will learn how Frame Relay networks send data and over what connection lines they operate. Frame relay addressing and configuration methods are also presented. This section contains a multitude of acronyms. Make sure that the students understand the following acronyms, what they stand for, and their function: DTE (Data Terminal Equipment) routers are the DTE component that receives the clocking speed sent from the Frame Relay Cloud. DCE (Data Communications Equipment) generates and sends clock speeds from the Frame Relay providers switches. CIR (Committed Information Rate) provider guaranteed minimum access rate. VC (Virtual Circuit) connection between your router and the destination. PVC (Permanent Virtual Circuit) most common Virtual Circuit. SVC (Switched Virtual Circuit) not commonly available from providers. DLCI (Data Link Connection Identifier) is a number that represents the connection between two frame relay devices. LMI (Local Management Interface) - router communicates via Frame Relay to provider s switch FECN (Forward Explicit Congestion Notification) notifies forward devices that the rate will slow BECN (Backward Explicit Congestion Notification) notifies the backwards device to slow down DE (Discard Eligible) packets with the discard eligible bit set are the first to be dropped in case of congestion. 801. Describe different methods for connecting to a WAN 803. Configure and verify Frame Relay on Cisco routers Lecture Focus Questions: What is the CIR? What does locally significant mean in relation to the DLCI number? What functions are performed by LMI? What is the difference between a point-to-point and a multipoint link? When are the FECN and BECN bits set? What do each mean? 92

How does inverse ARP simplify Frame Relay configuration? What is a subinterface? Video/Demo 11.1.1 Frame Relay 7:33 11.1.3 Frame Relay Addressing 5:44 11.1.5 Frame Relay Configuration 5:27 Total 18:44 Number of Exam Questions 5 questions About 30 minutes 93

Section 11.2: Enabling Frame Relay In this section students will learn the commands to configure Frame Relay on Cisco routers by setting the encapsulation type and letting the router discover the LMI type and DLCI values automatically. Students will learn how to: Set frame relay encapsulation on a serial interface. Configure frame relay to use inverse ARP for address discovery. 803. Configure and verify Frame Relay on Cisco routers Video/Demo 11.2.1 Configuring Frame Relay 7:31 Lab/Activity Configure Frame Relay Number of Exam Questions 3 questions About 20 minutes 94

Section 11.3: Address Mapping In this section students will learn about address mapping. Students will learn how to: Disable inverse ARP. Configure static Frame Relay mappings. 803. Configure and verify Frame Relay on Cisco routers Video/Demo 11.3.1 Configuring Static Mappings 2:46 Lab/Activity Configure Static Mappings Number of Exam Questions 2 questions About 10 minutes 95

Section 11.4: Subinterfaces Students will learn how subinterfaces are used to overcome the limitations of split horizon when sending updates out the same interface. Students will learn how to: Configure a multipoint subinterface. Configure a point-to-point subinterface. 803. Configure and verify Frame Relay on Cisco routers Video/Demo 11.4.1 Subinterfaces 4:02 11.4.2 Configuring Subinterfaces 6:54 Total 10:56 Lab/Activity Configure Point-to-Point Frame Relay Configure Multipoint Frame Relay Number of Exam Questions 2 questions About 25 minutes 96

Section 11.5: Troubleshooting Frame Relay This section explores the show commands used to troubleshoot a Frame Relay configuration by viewing Frame Relay information on the router. Students will learn how to: Use show commands to monitor Frame Relay on a router. Troubleshoot a Frame Relay configuration. 803. Configure and verify Frame Relay on Cisco routers Lecture Focus Questions: Which command would you use to view the DLCI numbers for each interface? Why wouldn't you use the DLCI number included in the show interfaces command to identify assigned DLCIs? Which commands can you use to view the LMI type used on your router? Which Frame Relay encapsulation type should you use when connecting to routers from different vendors? Video/Demo 11.5.1 Troubleshooting Frame Relay 5:12 Number of Exam Questions 6 questions About 15 minutes 97

Section 12.1: IPv6 Concepts This section examines the advantages of the new IP addressing version IPv6 which will replace the IPv4. IPv6 features: o Geographic assignment of addresses o Efficient route summarization o No need for Network Address Translation (NAT) or Port Address Translation (PAT) o Native Internet Protocol Security (IPSec) o Header improvements o Built-in Quality of Service (QoS) o Flow label IPv6 address format: o 128-bit number o 64-bit prefix o 64-bit interface ID Global routing information is identified within the 64-bit prefix by subdividing the prefix using varying prefix lengths: o Regional Internet Registry (RIR) o Internet Service Provider (ISP) o Site o Subnet ID IPv6 identifies the following types of addresses: o Unicast Link-local Unique local Global unicast o Multicast o Anycast o Loopback o Unspecified 308. Describe IPv6 addresses 98

Lecture Focus Questions: How does IPv6 help route summarization on the Internet? How many hexadecimal numbers are in an IPv6 address? Which of the following can be left out of an IPv6 address: leading zeros or trailing zeros? How many bits do most organizations have for creating subnets with IPv6 addresses? How do you transform a MAC address into an IPv6 interface ID? What does IPv6 use instead of a broadcast address? How can you easily identify IPv6 multicast addresses? What does the special address FF02::2 mean? When is address ::1 used? Video/Demo 12.1.1 IPv6 Features 4:23 12.1.3 IPv6 Addresses 11:44 Total 16:07 Number of Exam Questions 6 questions About 35 minutes 99

Section 12.2: IPv6 Implementation In this section students will learn the methods used to configure an IPv6 address. Various implementation methods are presented for deploying IPv6. Students will learn how to configure an IP6 address and enable IPv6 support on a Cisco router. 307. Describe the technological requirements for running IPv6 in conjunction with IPv4 Lecture Focus Questions: How does a host get its IPv6 address when using stateless autoconfiguration? What information does the DHCP server provide when using stateless DHCPv6? What address does a host use to request an address from a DHCP server? What limitations does ISATAP have for IPv6 implementation? Which IPv6 tunneling methods work through NAT? What is the only method possible to enable an IPv6-only host to communicate with an IPv4-only host? Video/Demo 12.2.1 IPv6 Configuration 4:18 12.2.3 IPv6 Implementation 3:39 12.2.4 Configuring IPv6 9:23 Total 17:20 Number of Exam Questions 6 questions About 30 minutes 100

Section 12.3: DHCP and NAT This section discusses configuring DHCP from the command line. Details include: DHCP terms: o Pool o DHCP options o Exclusion o Binding Configuring DHCP through the command line Commands for completing the DHCP configuration Options for configuring Network Address Translation (NAT): o Static o Overloaded with PAT o Dynamic Commands to monitor NAT Students will learn how to: Create DHCP address pools. Configure NAT inside and outside interfaces. Configure static NAT and NAT pools. 303. Configure, verify and troubleshoot DHCP and DNS operation on a router 707. Configure NAT for given network requirements 708. Troubleshoot NAT issues Lecture Focus Questions: How does the DHCP service determine on which interfaces to listen for DHCP requests? How is an access list used in NAT configuration? How do you link a NAT address pool to an access list and an interface? What parameter must you use in your NAT configuration if you have more private hosts than public IP addresses? Which NAT configuration method do you use to associate a specific outside IP address with an inside host? 101

Video/Demo 12.3.2 Configuring NAT 9:02 Lab/Activity Configure Overloaded PAT Configure Dynamic NAT Configure Static NAT Number of Exam Questions 14 questions About 45 minutes 102

Section 13.1: Network Security This section discusses different types of network security threats and the solutions to implement to protect the network from the various threats. Details include: Security threats to consider: o Internal o External o Structured o Unstructured Types of security threats: o Reconnaissance Passive reconnaissance Active scanning o Social engineering o Denial of Service (DoS) and Distributed Denial of Service (DDoS) Ping flood SYN flood Spam Buffer overflow o Malware Virus Worm Trojan horse Spyware Adware o Access attacks: Spoofing Man-in-the-middle Password cracking Brute force Dictionary attack Hybrid attack General measures to improve security Network security methods and devices: o Firewall o Demilitarized zone (DMZ) o Adaptive Security Appliance (ASA) o Network Admission Control (NAC) o Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) 103

o Virtual Private Network (VPN) o Network Operation Center (NOC) o Centralized Authentication 601. Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats 602. Explain general methods to mitigate common security threats to network devices, hosts, and applications 603. Describe the functions of common security appliances and applications Lecture Focus Questions: What is social engineering? What is the best defense against social engineering? How does a worm differ from a boot sector virus? A Trojan horse? How are Denial of Service (DoS) attacks a security threat? In addition to implementing virus scanning software, what must you do to ensure that you are protected from the latest virus variations? Which types of attacks are directed against passwords? How does a firewall protect a network? What is an IPS and how does it differ from an IDS? What are the benefits of using centralized authentication? Video/Demo 13.1.1 Security Threats 9:18 13.1.3 Security Solutions 7:29 Total 16:47 Number of Exam Questions 15 questions About 30 minutes 104

Section 13.2: Network Hardening This section provides an overview of general actions to harden a network by securing devices and software to reduce the security exposure and tighten security controls. Details include: General action to secure devices and a network: o Physical security o Secure passwords o Control remote access o Access lists o Banner o CDP How to secure a network by configuring a Cisco device to accept SSH remote connections Students will learn how to: Configure a Cisco device to accept SSH remote connections. 602. Explain general methods to mitigate common security threats to network devices, hosts, and applications 604. Describe security recommended practices including initial steps to secure network devices Lecture Focus Questions: What is the most important method of protecting network devices? What measures should you take to increase the security of remote connections to your router? What benefits come from disabling the broadcast of CDP information? How do banners add to the security of a device? Why is SSH more secure than Telnet? 105

Video/Demo 13.2.1 Hardening 3:45 13.2.3 Configuring SSH 8:18 Total 12:03 Number of Exam Questions 11 questions About 25 minutes 106

Section 13.3: Switch Port Security This section explores using switch port security to control which devices are allowed to communicate through a given switch port. Types of MAC addresses used by port security: o SecureConfigured o SecureDynamic o SecureSticky Port violation Configuring port security Managing switch port security Types of actions when a violation occurs: o Protect o Restrict o Shutdown Commands to verify port security operations Components of the output from the show port-security interface command: o Port Security o Port Status o Violation Mode o Maximum MAC Addresses o Total MAC Addresses o Configured MAC Addresses o Sticky MAC Addresses o Security Violation Count Students will learn how to: Configure switch port security. 216. Implement basic switch security 604. Describe security recommended practices including initial steps to secure network devices 107

Lecture Focus Questions: How does switch port security increase the security of your network? What does the sticky keyword do when used with the switchport portsecurity command? What can you do to save sticky addresses? How does switchport security differ from an access list? How does using VoIP effect switchport security settings? What is the difference between the protect and restrict violation actions? How does a switch identify which MAC addresses to allow if you do not manually configure the allowed addresses? Video/Demo 13.3.1 Switch Port Security 3:14 13.3.3 Configuring Port Security 21:16 Total 24:30 Number of Exam Questions 14 questions About 45 minutes 108

Section 13.4: Virtual Private Networks (VPNs) In this section students will learn the basics of using a Virtual Private Network (VPN) to protect IP traffic on a TCP/IP network through the use of encryption. Concepts covered include: Benefits provided by VPNs Common VPN security technologies: o Internet Protocol Security (IPSec) o Secure Sockets Layer (SSL) o Transport Layer Security (TLS) o Point-to-Point Tunneling Protocol (PPTP) o Layer 2 Forwarding (L2F) o Layer Two Tunneling Protocol (L2TP) Basic types of Cisco VPNs: o Site-to-site o Remote access Devices used in a VPN connection: o Adaptive Security Appliance o Routers o PIX Firewalls o VPN accelerator cards o VPN concentrators o VPN client-side software o VPN client-side hardware IPSec includes the following three protocols for authentication, data encryption, and connection negotiation: o Authentication Header (AH) o Encapsulating Security Payload (ESP) o Internet Key Exchange (IKE) IPSec modes of operations: o Tunnel mode o Transport mode 805. Describe VPN technology 109

Lecture Focus Questions: What is the difference between confidentiality and integrity? Which VPN technology is commonly used on Web servers? What is the main difference between a site-to-site VPN and a remote access VPN? Which IPSec protocol provides data confidentiality? Which IPSec mode is used for host-to-host communications? What are the client requirements for operating in full tunnel mode with the AnyConnect VPN Client? What advantages does full tunnel mode provide over the other modes? Which Cisco SSL VPN mode would you choose for a public computer? Why? Video/Demo 13.4.1 VPN Overview 5:26 13.4.4 IPSec VPNs 7:32 13.4.6 SSL VPN 2:10 Total 15:08 Number of Exam Questions 9 questions About 40 minutes 110

Practice Exams This section provides information to help prepare students to take the exam and to register for the exam. Students will also have the opportunity of testing their mastery of the concepts presented in this course to reaffirm that they are ready for the certification exam. For example all questions that apply to objective 100. Networking Concepts are grouped together and presented in practice exam 100. Networking Concepts, All Questions. Students will typically take about 60-90 minutes to complete each of the following practice exams. 100. Networking Concepts, All Questions (59 questions) 200. Switching, All Questions (135 questions) 300. IP Addressing, All Questions (73 questions) 400. Routing All Questions (155 questions) 500. Wireless, All Questions (28 questions) 600. Security, All Questions (42 questions) 700. ACLs and NAT, All Questions (48 questions) 800. WANs, All Questions (52 questions) The Certification Practice Exam consists of 60 questions that are randomly selected from the above practice exams. Each time the Certification Practice Exam is accessed different questions may be presented. The Certification Practice Exam has a time limit of 90 minutes -- just like the real certification exam. A passing score of 95% should verify that the student has mastered the concepts and is ready to take the real certification test. 111

Appendix A: Approximate for the Course The total time for this course is approximately 44 hours and 52 minutes. The time is calculated by adding the approximate time for each section which is calculated using the following elements: Video/demo times Approximate time to read the text lessons (the length of each text lesson is taken into consider) Simulations (5 minutes assigned per simulation) Questions (1 minute per question) The breakdown for this course is as follows: Module Sections Minute HR:MM 0.0 Introduction 0.1 Introduction 10 10 :10 1.0 Networking Concepts 1.1 The OSI Model 40 1.2 TCP/IP 25 1.3 Device Communication 10 1.4 Ethernet 25 1.5 Bridging and Switching 25 1.6 Routing 20 145 2:25 2.0 Cisco Devices 2.1 Connecting Cisco Devices 15 2.2 System Startup 20 2.3 Command Line Interface (CLI) 30 2.4 Managing System Files 35 2.5 Using Show Commands 10 2.6 Hostname and Descriptions 20 2.7 System Passwords 50 2.8 Banners 15 2.9 Cisco Discovery Protocol (CDP) 40 235 3:55 3.0 LAN Implementation 3.1 Connecting Devices 15 3.2 Switch Configuration 40 3.3 TCP/IP Configuration 40 112

3.4 DHCP 20 3.5 DNS 15 3.6 Routing 60 3.7 Verifying TCP/IP Configuration 40 3.8 LAN Segmentation 25 255 4:15 4.0 Wireless Networks 4.1 Wireless Standards 15 4.2 Wireless Infrastructure 15 4.3 Wireless Security 25 4.4 Wireless Configuration 30 85 1:25 5.0 Subnetting 5.1 Subnet Operations 125 5.2 Subnet Design 40 5.3 Route Summarization 30 195 3:15 6.0 WAN Implementation 6.1 Wide Area Networks 15 6.2 WAN Connections 40 6.3 PPP 35 6.4 Network Address Translation (NAT) 20 6.5 WAN Troubleshooting 50 160 2:40 7.0 Advanced Switching 7.1 Virtual LANs (VLANs) 30 7.2 Trunking 40 7.3 VLAN Trunking Protocol (VTP) 40 7.4 Spanning Tree 70 7.5 Spanning Tree Configuration 35 7.6 EtherChannel 5 7.7 Inter VLAN Routing 15 235 3:55 8.0 Access Lists 8.1 Access List Concepts 25 8.2 Configuring Access Lists 75 8.3 Access List Implementation 15 115 1:55 9.0 Routing 9.1 Routing Protocols 30 9.2 RIP 20 9.3 OSPF 60 113

9.4 EIGRP 20 9.5 Routing Protocol Comparison 10 140 2:20 10.0 Troubleshooting Routing 10.1 Troubleshooting Routing 15 10.2 Troubleshooting RIP 35 10.3 Troubleshooting OSPF 30 10.4 Troubleshooting Frame Relay 35 115 1:55 11.0 Frame Relay 11.1 Frame Relay Concepts 30 11.2 Enabling Frame Relay 20 11.3 Address Mapping 10 11.4 Subinterfaces 25 11.5 Troubleshooting Frame Relay 15 100 1:40 12.0 Advanced TCP/IP Configuration 12.1 IPv6 Concepts 35 12.2 IPv6 Implementation 30 12.3 DHCP and NAT 45 110 1:50 13.0 Network Security 13.1 Network Security 30 13.2 Network Hardening 25 13.3 Switch Port Security 45 13.4 Virtual Private Networks (VPNs) 40 140 2:20 Practice Exams 100. Networking Concepts (59 questions) 59 200. Switching (135 questions) 135 300. IP Addressing, (73 questions) 73 400. Routing (155 questions) 155 500. Wireless (28 questions) 28 600. Security (42 questions) 42 700. ACLs and NAT (48 questions) 48 800. WANs (52 questions) 52 Certification Practice Exam (60 questions) 60 652 10:52 Total 2692 44:52 114

115