Chapter
1: Review: The OSI Reference Model and Routing
|
|
| 1.1 |
The OSI
Reference Model and the Problems It Solves
|
|
| 1.2 |
The Physical
Layer of the OSI Reference Model
|
|
| 1.3 |
The Data Link
Layer of the OSI Reference Model
|
|
| 1.4 |
Network Layer
Functions
| 1.4.1 |
Layer
3 protocols of the TCP/IP stack
Internet
Protocols
TCP/IP |
| 1.4.2 |
Network
and subnetwork addresses in the IP
Subnetting |
| 1.4.3 |
Path
determination in the contexts of packets and routers |
| 1.4.4 |
Why
Layer 3 addresses must contain both path and host
information |
| 1.4.5 |
Types
of ICMP messages |
| 1.4.6 |
ping
command |
| 1.4.7 |
ARP |
|
|
| 1.5 |
Routing and the
Different Classes of Routing Protocols
| 1.5.1 |
Routing
in a mixed LAN-media environment |
| 1.5.2 |
Two
basic operations a router performs
Routing
Basics |
| 1.5.3 |
Static
and dynamic routes |
| 1.5.4 |
Default
route |
| 1.5.5 |
Routed
and routing protocols |
| 1.5.6 |
Information
that routers use to perform their basic functions
IP
Routing
Protocols |
| 1.5.7 |
IP
routing protocols |
| 1.5.8 |
Network
convergence |
| 1.5.9 |
Distance
vector routing |
| 1.5.10 |
Link-state
routing |
| 1.5.11 |
Distance
vector and link state routing |
| 1.5.12 |
Enabling
an IP routing process |
| 1.5.13 |
Configuring
RIP
RIP |
|
|
| 1.6 |
The Transport
Layer of the OSI Reference Model
| 1.6.1 |
Routing
in a mixed LAN-media environment |
| 1.6.2 |
Layer
4 segmentation |
| 1.6.3 |
The
three-way handshake |
| 1.6.4 |
Why
is a buffer used in data communications |
| 1.6.5 |
Windowing |
| 1.6.6 |
Explain
reliability via acknowledgment |
|
|
| 1.7 |
Summary
|
|
| Chapter
2 LAN Switching |
|
| 2.1 |
Various LAN Communication
Problems
|
|
| 2.2 |
Full-Duplex Transmitting,
Fast Ethernet Standard and LAN Segmentation
|
|
| 2.3 |
Switching and VLANs
| 2.3.1 |
Describe the
two basic operations of a switch |
| 2.3.2 |
LAN switch latency |
| 2.3.3 |
Layer 2 and
Layer 3 switching |
| 2.3.4 |
Microsegmentation |
| 2.3.5 |
How a switch
learns addresses |
| 2.3.6 |
Benefits of LAN switching |
| 2.3.7 |
Symmetric and asymmetric switching |
| 2.3.8 |
Memory buffering |
| 2.3.9 |
Two switching methods
Tag
Switching |
| 2.3.10 |
How to set up VLANs |
|
|
| 2.4 |
The Spanning-Tree Protocol
|
|
| 2.5 |
Summary
|
|
| Chapter
3: VLANs |
|
| 3.1 |
VLANs
|
|
| 3.2 |
Segmentation with switching
architectures
| 3.2.1 |
Grouping
geographically separate users into network-wide virtual topologies
LAN
Switching |
| 3.2.2 |
Differences
between traditional switched LAN and VLANs
Guide
to VLANs |
| 3.2.3 |
The transport
of VLANs across backbones |
| 3.2.4 |
The role of
routers in VLANs |
| 3.2.5 |
How frames
are used in VLANs |
|
|
| 3.3 |
VLAN Implementation
| 3.3.1 |
The
relationship between ports, VLANs, and broadcasts |
| 3.3.2 |
Why
port-centric VLANs make an administrator's job easier |
| 3.3.3 |
Static VLANs |
| 3.3.4 |
Dynamic VLANs |
|
|
| 3.4 |
Benefits of VLANs
|
|
| 3.5 |
Summary
|
|
| Chapter
4: LAN Design |
|
| 4.1 |
LAN Design Goals and
Components
|
|
| 4.2 |
Network Design Methodology
|
|
| 4.3 |
Layer 1 Design
|
|
| 4.4 |
Layer 2 Design
| 4.4.1 |
Common Layer
2 devices and their impact on network domains
Designing
Switched LAN Internetworks
Broadcasts
in Switched LAN Internetworks |
| 4.4.2 |
Asymmetric
switching |
| 4.4.3 |
The effect microsegmentation can have on
a network |
| 4.4.4 |
Determining the number of cable runs and
drops |
| 4.4.5 |
Determining the size of collision domains
in hubbed and switched networks |
| 4.4.6 |
Diagramming hub placement in a
standards-based extended star topology |
| 4.4.7 |
Migrating a network from 10 Mbps to 100
Mbps |
|
|
| 4.5 |
Layer 3 Design
| 4.5.1 |
Using routers
as the basis for Layer 3 network design |
| 4.5.2 |
How VLANs can
create smaller broadcast domains |
| 4.5.3 |
Explain how a router provides structure
to a network |
| 4.5.4 |
Why large, scalable LANs need to
incorporate routers |
| 4.5.5 |
Diagramming a standards-based LAN that
uses routers |
| 4.5.6 |
Logical and physical network maps
IP
Address Planning |
|
|
| 4.6 |
Summary
|
|
| Chapter
Routing Protocols: IGRP |
|
| 5.1 |
The Network Layer Basics
|
|
| 5.2 |
Routed and Routing Protocols
|
|
| 5.3 |
IP Routing Protocols
| 5.3.1 |
Differentiating
one routing protocol from another |
| 5.3.2 |
The goals of
routing protocols |
| 5.3.3 |
Routing loops |
| 5.3.4 |
Static and
dynamic routing |
| 5.3.5 |
Classifications
of routing protocols |
| 5.3.6 |
IP Routing
Configuration: Choosing a routing protocol |
|
|
| 5.4 |
IGRP Operation
| 5.4.1 |
IGRP's
Metrics
IGRP
Basics |
| 5.4.2 |
Differentiating
from interior, system, and exterior routes |
| 5.4.3 |
Write out a
correct command sequence for enabling IGRP on arouter |
| 5.4.4 |
Describe
three features of IGRP which enhance its stability |
| 5.4.5 |
IGRP metrics
and routing updates |
| 5.4.6 |
The maximum
hop count of IGRP |
|
|
| 5.5 |
Summary
|
|
| Chapter
6: ACLs |
|
| 6.1 |
Access Control Lists (ACLs)
|
|
| 6.2 |
ACL Configuration Tasks
| 6.2.1 |
Creating ACLs |
| 6.2.2 |
The purpose
and function of wildcard mask bits |
| 6.2.3 |
The any
command |
| 6.2.4 |
The host
command |
|
|
| 6.3 |
Standard ACLs
| 6.3.1 |
What are
standard ACLs |
| 6.3.2 |
Writing a
valid standard ACL command using all available parameters |
| 6.3.3 |
How to verify
access lists |
| 6.3.4 |
Writing a
standard ACL to permit traffic from a source network |
| 6.3.5 |
Writing a
standard ACL to deny a specific host |
| 6.3.6 |
Writing a
standard ACL to deny a specific subnet |
|
|
| 6.4 |
Extended
ACLs
| 6.4.1 |
What are
extended ACLs
Server
Access Lists |
| 6.4.2 |
Extended ACL
parameters |
| 6.4.3 |
UDP and TCP
port numbers |
| 6.4.4 |
Writing an
ACL for denying FTP on an Ethernet interface |
| 6.4.5 |
Writing an
ACL that denies Telnet out of an Ethernet port and permits all other
traffic |
|
|
| 6.5 |
Named ACLs
| 6.5.1 |
Configuring
named ACLs |
| 6.5.2 |
The deny
command |
| 6.5.3 |
The permit
command |
|
|
| 6.6 |
Using
ACLs with protocols
| 6.6.1 |
Protocols for
which ACLs can be created |
|
|
| 6.7 |
Placing ACLs
| 6.7.1 |
Rule:
"Putting the extended ACL as close as possible to the source of
traffic denied" |
| 6.7.2 |
Using ACLs in
firewall routers |
| 6.7.3 |
A firewall
architecture to protect you from intruders |
|
|
| 6.8 |
Verifying
ACLs
| 6.8.1 |
How to verify
ACLs and interpret the output |
|
|
| 6.9 |
Summary
|
|
| Chapter
7: Novell IPX |
|
| 7.1 |
Cisco
Routers in Netware Networks
|
|
| 7.2 |
Novell
Encapsulation
| 7.2.1 |
Netware
Ethernet encapsulation terms |
| 7.2.2 |
The
IOS encapsulation names for Ethernet, FDDI, and
Token Ring |
| 7.2.3 |
The
IPX packet format |
|
|
| 7.3 |
Novell
Routing
| 7.3.1 |
Novell
RIP
Novell
RIP |
| 7.3.2 |
Service
advertising protocol |
| 7.3.3 |
Get
nearest server protocol |
|
|
| 7.4 |
Novell IPX
Configuration
| 7.4.1 |
Novell
IPX configuration tasks
Routing
and Filtering Novell IPX |
| 7.4.2 |
Writing
a valid IOS command sequence to assign IPX
network numbers to interface |
| 7.4.3 |
Writing
a valid IOS commands for monitoring and
troubleshooting IPX |
|
|
| 7.5 |
Monitoring
and Managing an IPX Network
| 7.5.1 |
Writing
a valid IOS commands for monitoring the status of
an IPX interface |
| 7.5.2 |
Writing
a valid IOS command sequence to monitor IPX
routing tables |
| 7.5.3 |
Writing
a valid IOS command sequence for monitoring Novell
IPX servers |
| 7.5.4 |
Writing
a valid IOS command to monitor IPX traffic, and
describe some of the field options for that
command |
| 7.5.5 |
Writing
a valid IOS command for troubleshooting IPX
routing
Troubleshooting
Novell IPX |
| 7.5.6 |
Writing
a valid IOS command for troubleshooting IPX SAP |
| 7.5.7 |
Using
the privileged IPX ping command |
| 7.5.8 |
Using
the user IPX ping command |
|
|
| 7.6 |
Summary
|
|
| Chapter
8: Network Management
|
|
| 8.1 |
Network
Documentation
|
|
| 8.2 |
Network Security
|
|
| 8.3 |
Planning Structured Cabling:
Identifying Potential Wiring Closets
|
|
| 8.4 |
Network Performance
|
|
| 8.5 |
Server Administration
|
|
| 8.6 |
Network troubleshooting
|
|
| 8.7 |
Summary
|
|
|
|