Our website is currently undergoing technical upgrades to serve you better. We’ll be back online shortly.
Home > Computing and Information Technology > Computer certification > Computer certification: Cisco > Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section. Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to do the labs, interactive activities, packet tracer activities, watch videos, and take the chapter quizzes. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy Enterprise Networking, Security, and Automation v7.0 (ENSA) online course. This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements. Related titles:  CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 Enterprise Networking, Security, and Automation Companion Guide CCNAv7 Book: 9780136634324 eBook: 9780136634249 Enterprise Networking, Security, and Automation Labs & Study Guide CCNAv7 Book: 9780136634690

Table of Contents:
Introduction xxx Chapter 1 Single-Area OSPFv2 Concepts 1 Introduction - 1.0 1     Why should I take this module? - 1.0.1 1     What will I learn to do in this module? - 1.0.2 1 OSPF Features and Characteristics - 1.1 1     Introduction to OSPF - 1.1.1 1     Components of OSPF - 1.1.2 2     Link-State Operation - 1.1.3 3     Single-Area and Multiarea OSPF - 1.1.4 4     Multiarea OSPF - 1.1.5 4     OSPFv3 - 1.1.6 5     Check Your Understanding - OSPF Features and Characteristics - 1.1.7 6 OSPF Packets - 1.2 6     Video - OSPF Packets - 1.2.1 6     Types of OSPF Packets - 1.2.2 6     Link-State Updates - 1.2.3 7     Hello Packet - 1.2.4 7     Check Your Understanding - OSPF Packets - 1.2.5 7 OSPF Operation - 1.3 7     Video - OSPF Operation - 1.3.1 7     OSPF Operational States - 1.3.2 7     Establish Neighbor Adjacencies - 1.3.3 8     Synchronizing OSPF Databases - 1.3.4 9     The Need for a DR - 1.3.5 10     LSA Flooding With a DR - 1.3.6 11     Check Your Understanding - OPSF Operation - 1.3.7 11 Module Practice and Quiz - 1.4 11     What did I learn in this module? - 1.4.1 11 Chapter Quiz - Single-Area OSPFv2 Concepts 14 Your Chapter Notes 14 Chapter 2 Single-Area OSPFv2 Configuration 15 Introduction - 2.0 15     Why should I take this module? - 2.0.1 15     What will I learn to do in this module? - 2.0.2 15 OSPF Router ID - 2.1 15     OSPF Reference Topology - 2.1.1 15     Router Configuration Mode for OSPF - 2.1.2 16     Router IDs - 2.1.3 16     Router ID Order of Precedence - 2.1.4 17     Configure a Loopback Interface as the Router ID - 2.1.5 17     Explicitly Configure a Router ID - 2.1.6 18     Modify a Router ID - 2.1.7 18     Syntax Checker - Configure R2 and R3 Router IDs - 2.1.8 19     Check Your Understanding - OSPF Router ID - 2.1.9 19 Point-to-Point OSPF Networks - 2.2 20     The network Command Syntax - 2.2.1 20     The Wildcard Mask - 2.2.2 20     Check Your Understanding - The Wildcard Masks - 2.2.3 20     Configure OSPF Using the network Command - 2.2.4 20     Syntax Checker - Configure R2 and R3 Using the network Command - 2.2.5 21     Configure OSPF Using the ip ospf Command - 2.2.6 21     Syntax Checker - Configure R2 and R3 Using the ip ospf Command - 2.2.7 22     Passive Interface - 2.2.8 22     Configure Passive Interfaces - 2.2.9 23     Syntax Checker - Configure R2 and R3 Passive Interfaces - 2.2.10 24     OSPF Point-to-Point Networks - 2.2.11 24     Loopbacks and Point-to-Point Networks - 2.2.12 26     Packet Tracer - Point-to-Point Single-Area OSPFv2 Configuration - 2.2.13 26 Multiaccess OSPF Networks - 2.3 27     OSPF Network Types - 2.3.1 27     OSPF Designated Router - 2.3.2 27     OSPF Multiaccess Reference Topology - 2.3.3 27     Verify OSPF Router Roles - 2.3.4 28     Verify DR/BDR Adjacencies - 2.3.5 30     Default DR/BDR Election Process - 2.3.6 32     DR Failure and Recovery - 2.3.7 33     The ip ospf priority Command - 2.3.8 33     Configure OSPF Priority - 2.3.9 34     Syntax Checker - Configure OSPF Priority - 2.3.10 35     Packet Tracer - Determine the DR and BDR - 2.3.11 35 Modify Single-Area OSPFv2 - 2.4 36     Cisco OSPF Cost Metric - 2.4.1 36     Adjust the Reference Bandwidth - 2.4.2 36     OSPF Accumulates Costs - 2.4.3 38     Manually Set OSPF Cost Value - 2.4.4 38     Test Failover to Backup Route - 2.4.5 39     Syntax Checker - Modify the Cost Values for R2 and R3 - 2.4.6 40     Hello Packet Intervals - 2.4.7 40     Verify Hello and Dead Intervals - 2.4.8 40     Modify OSPFv2 Intervals - 2.4.9 42     Syntax Checker - Modifying Hello and Dead Intervals on R3 - 2.4.10 43     Packet Tracer - Modify Single-Area OSPFv2 - 2.4.11 43 Default Route Propagation - 2.5 43     Propagate a Default Static Route in OSPFv2 - 2.5.1 43     Verify the Propagated Default Route - 2.5.2 44     Packet Tracer - Propagate a Default Route in OSPFv2 - 2.5.3 46 Verify Single-Area OSPFv2 - 2.6 46     Verify OSPF Neighbors - 2.6.1 46     Verify OSPF Protocol Settings - 2.6.2 48     Verify OSPF Process Information - 2.6.3 48     Verify OSPF Interface Settings - 2.6.4 50     Syntax Checker - Verify Single-Area OSPFv2 - 2.6.5 51     Packet Tracer - Verify Single-Area OSPFv2 - 2.6.6 51 Module Practice and Quiz - 2.7 51     Packet Tracer - Single-Area OSPFv2 Configuration - 2.7.1 51     Lab - Single-Area OSPFv2 Configuration - 2.7.2 51     What did I learn in this module? - 2.7.3 52 Chapter Quiz - Single-Area OSPFv2 Configuration 56 Your Chapter Notes 56 Chapter 3 Network Security Concepts 57 Introduction - 3.0 57     Why should I take this module? - 3.0.1 57     What will I learn in this module? - 3.0.2 57     Ethical Hacking Statement - 3.0.3 57 Current State of Cybersecurity - 3.1 58     Current State of Affairs - 3.1.1 58     Vectors of Network Attacks - 3.1.2 58     Data Loss - 3.1.3 59     Check Your Understanding - Current State of Cybersecurity - 3.1.4 60 Threat Actors - 3.2 60     The Hacker - 3.2.1 60     Evolution of Hackers - 3.2.2 61     Cyber Criminals - 3.2.3 61     Hacktivists - 3.2.4 61     State-Sponsored Hackers - 3.2.5 61     Check Your Understanding - Threat Actors - 3.2.6 62 Threat Actor Tools - 3.3 62     Video - Threat Actor Tools - 3.3.1 62     Introduction to Attack Tools - 3.3.2 62     Evolution of Security Tools - 3.3.3 62     Attack Types - 3.3.4 63     Check Your Understanding - Threat Actor Tools - 3.3.5 64 Malware - 3.4 64     Overview of Malware - 3.4.1 64     Viruses and Trojan Horses - 3.4.2 64     Other Types of Malware - 3.4.3 65     Check Your Understanding - Malware - 3.4.4 66 Common Network Attacks - 3.5 66     Overview of Network Attacks - 3.5.1 66     Video - Reconnaissance Attacks - 3.5.2 67     Reconnaissance Attacks - 3.5.3 67     Video - Access and Social Engineering Attacks - 3.5.4 68     Access Attacks - 3.5.5 68     Social Engineering Attacks - 3.5.6 69     Lab - Social Engineering - 3.5.7 70     Video - Denial of Service Attacks - 3.5.8 70     DoS and DDoS Attacks - 3.5.9 70     Check Your Understanding - Common Network Attacks - 3.5.10 71 IP Vulnerabilities and Threats - 3.6 71     Video - Common IP and ICMP Attacks - 3.6.1 71     IPv4 and IPv6 - 3.6.2 71     ICMP Attacks - 3.6.3 71     Video - Amplification, Reflection, and Spoofing Attacks - 3.6.4 72     Amplification and Reflection Attacks - 3.6.5 72     Address Spoofing Attacks - 3.6.6 72     Check Your Understanding - IP Vulnerabilities and Threats - 3.6.7 73 TCP and UDP Vulnerabilities - 3.7 73     TCP Segment Header - 3.7.1 73     TCP Services - 3.7.2 73     TCP Attacks - 3.7.3 74     UDP Segment Header and Operation - 3.7.4 74     UDP Attacks - 3.7.5 75     Check Your Understanding - TCP and UDP Vulnerabilities - 3.7.6 75 IP Services - 3.8 75     ARP Vulnerabilities - 3.8.1 75     ARP Cache Poisoning - 3.8.2 76     Video - ARP Spoofing - 3.8.3 76     DNS Attacks - 3.8.4 76     DNS Tunneling - 3.8.5 78     DHCP - 3.8.6 78     DHCP Attacks - 3.8.7 78     Lab - Explore DNS Traffic - 3.8.8 79 Network Security Best Practices - 3.9 80     Confidentiality, Integrity, and Availability - 3.9.1 80     The Defense-in-Depth Approach - 3.9.2 80     Firewalls - 3.9.3 80     IPS - 3.9.4 81     Content Security Appliances - 3.9.5 81     Check Your Understanding - Network Security Best Practices - 3.9.6 82 Cryptography - 3.10 82     Video - Cryptography - 3.10.1 82     Securing Communications - 3.10.2 82     Data Integrity - 3.10.3 83     Hash Functions - 3.10.4 83     Origin Authentication - 3.10.5 84     Data Confidentiality - 3.10.6 85     Symmetric Encryption - 3.10.7 85     Asymmetric Encryption - 3.10.8 86     Diffie-Hellman - 3.10.9 87     Check Your Understanding - Cryptography - 3.10.10 88 Module Practice and Quiz - 3.11 88     What did I learn in this module? - 3.11.1 88 Chapter Quiz - Network Security Concepts 91 Your Chapter Notes 91 Chapter 4 ACL Concepts 93 Introduction - 4.0 93     Why should I take this module? - 4.0.1 93     What will I learn to do in this module? - 4.0.2 93 Purpose of ACLs - 4.1 93     What is an ACL? - 4.1.1 93     Packet Filtering - 4.1.2 95     ACL Operation - 4.1.3 95     Packet Tracer - ACL Demonstration - 4.1.4 96     Check Your Understanding - Purpose of ACLs - 4.1.5 96 Wildcard Masks in ACLs - 4.2 96     Wildcard Mask Overview - 4.2.1 96     Wildcard Mask Types - 4.2.2 97     Wildcard Mask Calculation - 4.2.3 97     Wildcard Mask Keywords - 4.2.4 98     Check Your Understanding - Wildcard Masks in ACLs - 4.2.5 99 Guidelines for ACL Creation - 4.3 99     Limited Number of ACLs per Interface - 4.3.1 99     ACL Best Practices - 4.3.2 99     Check Your Understanding - Guidelines for ACL Creation - 4.3.3 100 Types of IPv4 ACLs - 4.4 100     Standard and Extended ACLs - 4.4.1 100     Numbered and Named ACLs - 4.4.2 101     Where to Place ACLs - 4.4.3 102     Standard ACL Placement Example - 4.4.4 102     Extended ACL Placement Example - 4.4.5 103     Check Your Understanding - Guidelines for ACL Placement - 4.4.6 103 Module Practice and Quiz - 4.5 103     What did I learn in this module? - 4.5.1 103 Chapter Quiz - ACL Concepts 106 Your Chapter Notes 106 Chapter 5 ACLs for IPv4 Configuration 107 Introduction - 5.0 107     Why should I take this module? - 5.0.1 107     What will I learn to do in this module? - 5.0.2 107 Configure Standard IPv4 ACLs - 5.1 107     Create an ACL - 5.1.1 107     Numbered Standard IPv4 ACL Syntax - 5.1.2 108     Named Standard IPv4 ACL Syntax - 5.1.3 109     Apply a Standard IPv4 ACL - 5.1.4 109     Numbered Standard IPv4 ACL Example - 5.1.5 110     Named Standard IPv4 ACL Example - 5.1.6 111     Syntax Check - Configure Standard IPv4 ACLs - 5.1.7 112     Packet Tracer - Configure Numbered Standard IPv4 ACLs - 5.1.8 113     Packet Tracer - Configure Named Standard IPv4 ACLs - 5.1.9 113 Modify IPv4 ACLs - 5.2 113     Two Methods to Modify an ACL - 5.2.1 113     Text Editor Method - 5.2.2 113     Sequence Numbers Method - 5.2.3 114     Modify a Named ACL Example - 5.2.4 115     ACL Statistics - 5.2.5 116     Syntax Checker - Modify IPv4 ACLs - 5.2.6 116     Packet Tracer - Configure and Modify Standard IPv4 ACLs - 5.2.7 116 Secure VTY Ports with a Standard IPv4 ACL - 5.3 116     The access-class Command - 5.3.1 116     Secure VTY Access Example - 5.3.2 117     Verify the VTY Port is Secured - 5.3.3 118     Syntax Checker - Secure the VTY Ports - 5.3.4 118 Configure Extended IPv4 ACLs - 5.4 119     Extended ACLs - 5.4.1 119     Numbered Extended IPv4 ACL Syntax - 5.4.2 119     Protocols and Ports - 5.4.3 120     Protocols and Port Numbers Configuration Examples - 5.4.4 123     Apply a Numbered Extended IPv4 ACL - 5.4.5 123     TCP Established Extended ACL - 5.4.6 123     Named Extended IPv4 ACL Syntax - 5.4.7 124     Named Extended IPv4 ACL Example - 5.4.8 125     Edit Extended ACLs - 5.4.9 126     Another Named Extended IPv4 ACL Example - 5.4.10 127     Verify Extended ACLs - 5.4.11 128     Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - 5.4.12 130     Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - 5.4.13 130 Module Practice and Quiz - 5.5 130     Packet Tracer - IPv4 ACL Implementation Challenge - 5.5.1 130     Lab - Configure and Verify Extended IPv4 ACLs - 5.5.2 131     What did I learn in this module? - 5.5.3 131 Chapter Quiz - ACLs for IPv4 Implementation 133 Your Chapter Notes 133 Chapter 6 NAT for IPv4 135 Introduction - 6.0 135     Why should I take this module? - 6.0.1 135     What will I learn to do in this module? - 6.0.2 135 NAT Characteristics - 6.1 135     IPv4 Private Address Space - 6.1.1 135     What is NAT - 6.1.2 136     How NAT Works - 6.1.3 137     NAT Terminology - 6.1.4 137     Check Your Understanding - NAT Characteristics - 6.1.5 138 Types of NAT - 6.2 139     Static NAT - 6.2.1 139     Dynamic NAT - 6.2.2 139     Port Address Translation - 6.2.3 139     Next Available Port - 6.2.4 140     NAT and PAT Comparison - 6.2.5 140     Packets without a Layer 4 Segment - 6.2.6 141     Packet Tracer - Investigate NAT Operations - 6.2.7 141 NAT Advantages and Disadvantages - 6.3 142     Advantages of NAT - 6.3.1 142     Disadvantages of NAT - 6.3.2 142     Check Your Understanding - NAT Advantages and Disadvantages - 6.3.3 143 Static NAT - 6.4 143     Static NAT Scenario - 6.4.1 143     Configure Static NAT - 6.4.2 143     Analyze Static NAT - 6.4.3 144     Verify Static NAT - 6.4.4 144     Packet Tracer - Configure Static NAT - 6.4.5 145 Dynamic NAT - 6.5 146     Dynamic NAT Scenario - 6.5.1 146     Configure Dynamic NAT - 6.5.2 146     Analyze Dynamic NAT - Inside to Outside - 6.5.3 147     Analyze Dynamic NAT - Outside to Inside - 6.5.4 147     Verify Dynamic NAT - 6.5.5 148     Packet Tracer - Configure Dynamic NAT - 6.5.6 150 PAT - 6.6 150     PAT Scenario - 6.6.1 150     Configure PAT to Use a Single IPv4 Address - 6.6.2 150     Configure PAT to Use an Address Pool - 6.6.3 151     Analyze PAT - PC to Server - 6.6.4 151     Analyze PAT - Server to PC - 6.6.5 151     Verify PAT - 6.6.6 151     Packet Tracer - Configure PAT - 6.6.7 152 NAT64 - 6.7 153     NAT for IPv6? - 6.7.1 153     NAT64 - 6.7.2 153 Module Practice and Quiz - 6.8 153     Packet Tracer - Configure NAT for IPv4 - 6.8.1 153     Lab - Configure NAT for IPv4 - 6.8.2 154     What did I learn in this module? - 6.8.3 154 Chapter Quiz - NAT for IPv4 158 Your Chapter Notes 158 Chapter 7 WAN Concepts 159 Introduction - 7.0 159     Why should I take this module? - 7.0.1 159     What will I learn to do in this module? - 7.0.2 159 Purpose of WANs - 7.1 159     LANs and WANs - 7.1.1 159     Private and Public WANs - 7.1.2 160     WAN Topologies - 7.1.3 160     Carrier Connections - 7.1.4 162     Evolving Networks - 7.1.5 162     Check Your Understanding - Purpose of WANs - 7.1.6 164 WAN Operations - 7.2 164     WAN Standards - 7.2.1 164     WANs in the OSI Model - 7.2.2 164     Common WAN Terminology - 7.2.3 165     WAN Devices - 7.2.4 166     Serial Communication - 7.2.5 167     Circuit-Switched Communication - 7.2.6 168     Packet-Switched Communications - 7.2.7 168     SDH, SONET, and DWDM - 7.2.8 169     Check Your Understanding - WAN Operations - 7.2.9 169 Traditional WAN Connectivity - 7.3 169     Traditional WAN Connectivity Options - 7.3.1 169     Common WAN Terminology - 7.3.2 169     Circuit-Switched Options - 7.3.3 170     Packet-Switched Options - 7.3.4 171     Check Your Understanding - Traditional WAN Connectivity - 7.3.5 172 Modern WAN Connectivity - 7.4 172     Modern WANs - 7.4.1 172     Modern WAN Connectivity Options - 7.4.2 172     Ethernet WAN - 7.4.3 173     MPLS - 7.4.4 174     Check Your Understanding - Modern WAN Connectivity - 7.4.5 174 Internet-Based Connectivity - 7.5 174     Internet-Based Connectivity Options - 7.5.1 174     DSL Technology - 7.5.2 175     DSL Connections - 7.5.3 175     DSL and PPP - 7.5.4 176     Cable Technology - 7.5.5 176     Optical Fiber - 7.5.6 177     Wireless Internet-Based Broadband - 7.5.7 177     VPN Technology - 7.5.8 179     ISP Connectivity Options - 7.5.9 179     Broadband Solution Comparison - 7.5.10 180     Lab - Research Broadband Internet Access Options - 7.5.11 181 Module Practice and Quiz - 7.6 181     Packet Tracer - WAN Concepts - 7.6.1 181     What did I learn in this module? - 7.6.2 181 Chapter Quiz - WAN Concepts 184 Your Chapter Notes 184 Chapter 8 VPN and IPsec Concepts 185 Introduction - 8.0 185     Why should I take this module? - 8.0.1 185     What will I learn in this module? - 8.0.2 185 VPN Technology - 8.1 185     Virtual Private Networks - 8.1.1 185     VPN Benefits - 8.1.2 186     Site-to-Site and Remote-Access VPNs - 8.1.3 186     Enterprise and Service Provider VPNs - 8.1.4 186     Check Your Understanding - VPN Technology - 8.1.5 187 Types of VPNs - 8.2 187     Remote-Access VPNs - 8.2.1 187     SSL VPNs - 8.2.2 187     Site-to-Site IPsec VPNs - 8.2.3 188     GRE over IPsec - 8.2.4 188     Dynamic Multipoint VPNs - 8.2.5 189     IPsec Virtual Tunnel Interface - 8.2.6 189     Service Provider MPLS VPNs - 8.2.7 190     Check Your Understanding - Types of VPNs - 8.2.8 190 IPsec - 8.3 190     Video - IPsec Concepts - 8.3.1 190     IPsec Technologies - 8.3.2 190     IPsec Protocol Encapsulation - 8.3.3 191     Confidentiality - 8.3.4 192     Integrity - 8.3.5 192     Authentication - 8.3.6 192     Secure Key Exchange with Diffie-Hellman - 8.3.7 193     Video - IPsec Transport and Tunnel Mode - 8.3.8 193     Check Your Understanding - IPsec - 8.3.9 193 Module Practice and Quiz - 8.4 193     What did I learn in this module? - 8.4.1 193 Chapter Quiz - VPN and IPsec Concepts 195 Your Chapter Notes 195 Chapter 9 QoS Concepts 197 Introduction - 9.0 197     Why should I take this module? - 9.0.1 197     What will I learn to do in this module? - 9.0.2 197 Network Transmission Quality - 9.1 197     Video Tutorial - The Purpose of QoS - 9.1.1 197     Prioritizing Traffic - 9.1.2 197     Bandwidth, Congestion, Delay, and Jitter - 9.1.3 198     Packet Loss - 9.1.4 199     Check Your Understanding - Network Transmission Quality - 9.1.5 199 Traffic Characteristics - 9.2 199     Video Tutorial - Traffic Characteristics - 9.2.1 199     Network Traffic Trends - 9.2.2 199     Voice - 9.2.3 200     Video - 9.2.4 200     Data - 9.2.5 201     Check Your Understanding - Traffic Characteristics - 9.2.6 202 Queuing Algorithms - 9.3 202     Video Tutorial - QoS Algorithms - 9.3.1 202     Queuing Overview - 9.3.2 202     First In First Out - 9.3.3 202     Weighted Fair Queuing (WFQ) - 9.3.4 203     Class-Based Weighted Fair Queuing (CBWFQ) - 9.3.5 203     Low Latency Queuing (LLQ) - 9.3.6 204     Check Your Understanding - Queuing Algorithms - 9.3.7 204 QoS Models - 9.4 204     Video Tutorial - QoS Models - 9.4.1 204     Selecting an Appropriate QoS Policy Model - 9.4.2 204     Best Effort - 9.4.3 205     Integrated Services - 9.4.4 206     Differentiated Services - 9.4.5 206     Check Your Understanding - QoS Models - 9.4.6 208 QoS Implementation Techniques - 9.5 208     Video Tutorial - QoS Implementation Techniques - 9.5.1 208     Avoiding Packet Loss - 9.5.2 208     QoS Tools - 9.5.3 208     Classification and Marking - 9.5.4 209     Marking at Layer 2 - 9.5.5 210     Marking at Layer 3 - 9.5.6 210     Type of Service and Traffic Class Field - 9.5.7 211     DSCP Values - 9.5.8 211     Class Selector Bits - 9.5.9 211     Trust Boundaries - 9.5.10 211     Congestion Avoidance - 9.5.11 212     Shaping and Policing - 9.5.12 212     QoS Policy Guidelines - 9.5.13 213     Check Your Understanding - QoS Implementation Techniques - 9.5.14 213 Module Practice and Quiz - 9.6 213     What did I learn in this module? - 9.6.1 213 Chapter Quiz - QoS Concepts 216 Your Chapter Notes 216 Chapter 10 Network Management 217 Introduction - 10.0 217     Why should I take this module? - 10.0.1 217     What will I learn to do in this module? - 10.0.2 217 Device Discovery with CDP - 10.1 217     CDP Overview - 10.1.1 217     Configure and Verify CDP - 10.1.2 218     Discover Devices by Using CDP - 10.1.3 220     Syntax Checker - Configure and Verify CDP - 10.1.4 222     Packet Tracer - Use CDP to Map a Network - 10.1.5 222 Device Discovery with LLDP - 10.2 222     LLDP Overview - 10.2.1 222     Configure and Verify LLDP - 10.2.2 222     Discover Devices by Using LLDP - 10.2.3 223     Syntax Checker - Configure and Verify LLDP - 10.2.4 225     Check Your Understanding - Compare CDP and LLDP - 10.2.5 225     Packet Tracer - Use LLDP to Map a Network - 10.2.6 225 NTP - 10.3 225     Time and Calendar Services - 10.3.1 225     NTP Operation - 10.3.2 226     Configure and Verify NTP - 10.3.3 227     Packet Tracer - Configure and Verify NTP - 10.3.4 229 SNMP - 10.4 229     Introduction to SNMP - 10.4.1 229     SNMP Operation - 10.4.2 230     SNMP Agent Traps - 10.4.3 230     SNMP Versions - 10.4.4 231     Check Your Understanding - SNMP Versions - 10.4.5 232     Community Strings - 10.4.6 232     MIB Object ID - 10.4.7 233     SNMP Polling Scenario - 10.4.8 233     SNMP Object Navigator - 10.4.9 233     Lab - Research Network Monitoring Software - 10.4.10 234 Syslog - 10.5 234     Introduction to Syslog - 10.5.1 234     Syslog Operation - 10.5.2 234     Syslog Message Format - 10.5.3 235     Syslog Facilities - 10.5.4 236     Configure Syslog Timestamp - 10.5.5 236     Check Your Understanding - Syslog Operation - 10.5.6 237 Router and Switch File Maintenance - 10.6 237     Router File Systems - 10.6.1 237     Switch File Systems - 10.6.2 240     Use a Text File to Back Up a Configuration - 10.6.3 241     Use a Text File to Restore a Configuration - 10.6.4 241     Use TFTP to Back Up and Restore a Configuration - 10.6.5 242     USB Ports on a Cisco Router - 10.6.6 242     Use USB to Back Up and Restore a Configuration - 10.6.7 243     Password Recovery Procedures - 10.6.8 245     Password Recovery Example - 10.6.9 245     Packet Tracer - Back Up Configuration Files - 10.6.10 247     Lab - Use Tera Term to Manage Router Configuration Files - 10.6.11 248     Lab - Use TFTP, Flash, and USB to Manage Configuration Files - 10.6.12 248     Lab - Research Password Recovery Procedures - 10.6.13 248 IOS Image Management - 10.7 248     Video - Managing Cisco IOS Images - 10.7.1 248     TFTP Servers as a Backup Location - 10.7.2 248     Backup IOS Image to TFTP Server Example - 10.7.3 249     Copy an IOS Image to a Device Example - 10.7.4 250     The boot system Command - 10.7.5 251     Packet Tracer - Use a TFTP Server to Upgrade a Cisco IOS Image - 10.7.6 252 Module Practice and Quiz - 10.8 253     Packet Tracer - Configure CDP, LLDP, and NTP - 10.8.1 253     Lab - Configure CDP, LLDP, and NTP - 10.8.2 253     What did I learn in this module? - 10.8.3 253 Chapter Quiz - Network Management 257 Your Chapter Notes 257 Chapter 11 Network Design 259 Introduction - 11.0 259     Why should I take this module? - 11.0.1 259     What will I learn to do in this module? - 11.0.2 259 Hierarchical Networks - 11.1 259     Video - Three-Layer Network Design - 11.1.1 259     The Need to Scale the Network - 11.1.2 259     Borderless Switched Networks - 11.1.3 260     Hierarchy in the Borderless Switched Network - 11.1.4 261     Access, Distribution, and Core Layer Functions - 11.1.5 262     Three-Tier and Two-Tier Examples - 11.1.6 262     Role of Switched Networks - 11.1.7 263     Check Your Understanding - Hierarchical Networks - 11.1.8 263 Scalable Networks - 11.2 263     Design for Scalability - 11.2.1 263     Plan for Redundancy - 11.2.2 264     Reduce Failure Domain Size - 11.2.3 265     Increase Bandwidth - 11.2.4 265     Expand the Access Layer - 11.2.5 266     Tune Routing Protocols - 11.2.6 266     Check Your Understanding - Scalable Networks - 11.2.7 266 Switch Hardware - 11.3 266     Switch Platforms - 11.3.1 266     Switch Form Factors - 11.3.2 267     Port Density - 11.3.3 268     Forwarding Rates - 11.3.4 268     Power over Ethernet - 11.3.5 269     Multilayer Switching - 11.3.6 269     Business Considerations for Switch Selection - 11.3.7 270     Check Your Understanding - Switch Hardware - 11.3.8 270 Router Hardware - 11.4 270     Router Requirements - 11.4.1 270     Cisco Routers - 11.4.2 271     Router Form Factors - 11.4.3 271     Check Your Understanding - Router Hardware - 11.4.4 272 Module Practice and Quiz - 11.5 272     Packet Tracer - Compare Layer 2 and Layer 3 Devices - 11.5.1 272     What did I learn in this module? - 11.5.2 273 Chapter Quiz - Network Design 275 Your Chapter Notes 275 Chapter 12 Network Troubleshooting 277 Introduction - 12.0 277     Why should I take this module? - 12.0.1 277     What will I learn to do in this module? - 12.0.2 277 Network Documentation - 12.1 277     Documentation Overview - 12.1.1 277     Network Topology Diagrams - 12.1.2 278     Network Device Documentation - 12.1.3 279     Establish a Network Baseline - 12.1.4 279     Step 1 - Determine What Types of Data to Collect - 12.1.5 280     Step 2 - Identify Devices and Ports of Interest - 12.1.6 280     Step 3 - Determine the Baseline Duration - 12.1.7 280     Data Measurement - 12.1.8 281     Check Your Understanding - Network Documentation - 12.1.9 282 Troubleshooting Process - 12.2 282     General Troubleshooting Procedures - 12.2.1 282     Seven-Step Troubleshooting Process - 12.2.2 282     Question End Users - 12.2.3 284     Gather Information - 12.2.4 285     Troubleshooting with Layered Models - 12.2.5 286     Structured Troubleshooting Methods - 12.2.6 286     Guidelines for Selecting a Troubleshooting Method - 12.2.7 288     Check Your Understanding - Troubleshooting Process - 12.2.8 288 Troubleshooting Tools - 12.3 288     Software Troubleshooting Tools - 12.3.1 288     Protocol Analyzers - 12.3.2 289     Hardware Troubleshooting Tools - 12.3.3 289     Syslog Server as a Troubleshooting Tool - 12.3.4 290     Check Your Understanding - Troubleshooting Tools - 12.3.5 292 Symptoms and Causes of Network Problems - 12.4 292     Physical Layer Troubleshooting - 12.4.1 292     Data Link Layer Troubleshooting - 12.4.2 294     Network Layer Troubleshooting - 12.4.3 295     Transport Layer Troubleshooting - ACLs - 12.4.4 297     Transport Layer Troubleshooting - NAT for IPv4 - 12.4.5 298     Application Layer Troubleshooting - 12.4.6 299     Check Your Understanding - Symptoms and Causes of Network Problems - 12.4.7 300 Troubleshooting IP Connectivity - 12.5 300     Components of Troubleshooting End-to-End Connectivity - 12.5.1 300     End-to-End Connectivity Problem Initiates Troubleshooting - 12.5.2 301     Step 1 - Verify the Physical Layer - 12.5.3 303     Step 2 - Check for Duplex Mismatches - 12.5.4 304     Step 3 - Verify Addressing on the Local Network - 12.5.5 306     Step 4 - Verify Default Gateway - 12.5.7 310     Troubleshoot IPv6 Default Gateway Example - 12.5.8 311     Step 5 - Verify Correct Path - 12.5.9 314     Step 6 - Verify the Transport Layer - 12.5.10 315     Step 7 - Verify ACLs - 12.5.11 317     Step 8 - Verify DNS - 12.5.12 318     Packet Tracer - Troubleshoot Enterprise Networks - 12.5.13 319 Module Practice and Quiz - 12.6 319     Packet Tracer - Troubleshooting Challenge - Document the Network - 12.6.1 319     Packet Tracer - Troubleshooting Challenge - Use Documentation to Solve Issues - 12.6.2 319     What did I learn in this module? - 12.6.3 320 Chapter Quiz - Network Troubleshooting 324 Your Chapter Notes 324 Chapter 13 Network Virtualization 325 Introduction - 13.0 325     Why should I take this module? - 13.0.1 325     What will I learn to do in this module? - 13.0.2 325 Cloud Computing - 13.1 325     Video - Cloud and Virtualization - 13.1.1 325     Cloud Overview - 13.1.2 325     Cloud Services - 13.1.3 326     Cloud Models - 13.1.4 326     Cloud Computing versus Data Center - 13.1.5 327     Check Your Understanding - Cloud Computing - 13.1.6 327 Virtualization - 13.2 327     Cloud Computing and Virtualization - 13.2.1 327     Dedicated Servers - 13.2.2 328     Server Virtualization - 13.2.3 328     Advantages of Virtualization - 13.2.4 328     Abstraction Layers - 13.2.5 329     Type 2 Hypervisors - 13.2.6 330     Check Your Understanding - Virtualization - 13.2.7 330 Virtual Network Infrastructure - 13.3 330     Type 1 Hypervisors - 13.3.1 330     Installing a VM on a Hypervisor - 13.3.2 330     The Complexity of Network Virtualization - 13.3.3 331     Check Your Understanding - Virtual Network Infrastructure - 13.3.4 332 Software-Defined Networking - 13.4 332     Video - Software-Defined Networking - 13.4.1 332     Control Plane and Data Plane - 13.4.2 332     Network Virtualization Technologies - 13.4.3 333     Traditional and SDN Architectures - 13.4.4 334     Check Your Understanding - Software-Defined Networking - 13.4.5 334 Controllers - 13.5 334     SDN Controller and Operations - 13.5.1 334     Video - Cisco ACI - 13.5.2 335     Core Components of ACI - 13.5.3 335     Spine-Leaf Topology - 13.5.4 335     SDN Types - 13.5.5 336     APIC-EM Features - 13.5.6 336     APIC-EM Path Trace - 13.5.7 336     Check Your Understanding - Controllers - 13.5.8 337 Module Practice and Quiz - 13.6 337     Lab - Install Linux in a Virtual Machine and Explore the GUI - 13.6.1 337     What did I learn in this module? - 13.6.2 337 Chapter Quiz - Network Virtualization 341 Your Chapter Notes 341 Chapter 14 Network Automation 343 Introduction - 14.0 343     Why should I take this module? - 14.0.1 343     What will I learn in this module? - 14.0.2 343 Automation Overview - 14.1 343     Video - Automation Everywhere - 14.1.1 343     The Increase in Automation - 14.1.2 344     Thinking Devices - 14.1.3 344     Check Your Understanding - Benefits of Automation - 14.1.4 344 Data Formats - 14.2 344     Video - Data Formats - 14.2.1 344     The Data Formats Concept - 14.2.2 345     Data Format Rules - 14.2.3 345     Compare Data Formats - 14.2.4 346     JSON Data Format - 14.2.5 347     JSON Syntax Rules - 14.2.6 348     YAML Data Format - 14.2.7 349     XML Data Format - 14.2.8 350     Check Your Understanding - Data Formats - 14.2.9 351 APIs - 14.3 351     Video - APIs - 14.3.1 351     The API Concept - 14.3.2 352     An API Example - 14.3.3 352     Open, Internal, and Partner APIs - 14.3.4 352     Types of Web Service APIs - 14.3.5 353     Check Your Understanding - APIs - 14.3.6 354 REST - 14.4 354     Video - REST - 14.4.1 354     REST and RESTful API - 14.4.2 354     RESTful Implementation - 14.4.3 354     URI, URN, and URL - 14.4.4 355     Anatomy of a RESTful Request - 14.4.5 355     RESTful API Applications - 14.4.6 356     Check Your Understanding - REST - 14.4.7 357 Configuration Management Tools - 14.5 357     Video - Configuration Management Tools - 14.5.1 357     Traditional Network Configuration - 14.5.2 358     Network Automation - 14.5.3 358     Configuration Management Tools - 14.5.4 358     Compare Ansible, Chef, Puppet, and SaltStack - 14.5.5 359     Check Your Understanding - Configuration Management - 14.5.6 360 IBN and Cisco DNA Center - 14.6 360     Video - Intent-Based Networking - 14.6.1 360     Intent-Based Networking Overview - 14.6.2 360     Network Infrastructure as Fabric - 14.6.3 360     Cisco Digital Network Architecture (DNA) - 14.6.4 361     Cisco DNA Center - 14.6.5 362     Video - DNA Center Overview and Platform APIs - 14.6.6 362     Video - DNA Center Design and Provision - 14.6.7 363     Video - DNA Center Policy and Assurance - 14.6.8 363     Video - DNA Center Troubleshooting User Connectivity - 14.6.9 363     Check Your Understanding - IBN and Cisco DNA Center - 14.6.10 363 Module Practice and Quiz - 14.7 363     What did I learn in this module? - 14.7.1 363 Chapter Quiz - Network Automation 365 Your Chapter Notes 365 9780136634737   TOC   6/18/2020


Best Sellers


Product Details
  • ISBN-13: 9780136634737
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 100 mm
  • No of Pages: 416
  • Series Title: Course Booklets
  • Weight: 862 gr
  • ISBN-10: 0136634737
  • Publisher Date: 25 Sep 2020
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Spine Width: 100 mm
  • Width: 100 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)
Pearson Education (US) -
Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Enterprise Networking, Security, and Automation Course Booklet (CCNAv7): (Course Booklets)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA