Networking Essentials Companion Guide

Specificaties
E-book, blz. | Engels
Pearson Education | e druk, 2022
ISBN13: 9780137660469
Rubricering
Pearson Education e druk, 2022 9780137660469
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.

Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it.

This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course:

* Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.
* Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary: Consult the comprehensive Glossary with more than 250 terms.
* Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Specificaties

ISBN13:9780137660469
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

Introduction xxvii <br> Chapter 1 Communications in a Connected World 1 <br>Objectives 1 <br>Key Terms 1 <br>Introduction (1.0) 2 <br>Network Types (1.1) 3 <br>&nbsp;&nbsp;&nbsp; Everything Is Online (1.1.1) 3 <br>&nbsp;&nbsp;&nbsp; Who Owns "The Internet"? (1.1.2) 3 <br>&nbsp;&nbsp;&nbsp; Local Networks (1.1.3) 3 <br>&nbsp;&nbsp;&nbsp; Mobile Devices (1.1.5) 7 <br>&nbsp;&nbsp;&nbsp; Connected Home Devices (1.1.6) 10 <br>&nbsp;&nbsp;&nbsp; Other Connected Devices (1.1.7) 12 <br>Data Transmission (1.2) 15 <br>&nbsp;&nbsp;&nbsp; Types of Personal Data (1.2.2) 15 <br>&nbsp;&nbsp;&nbsp; Common Methods of Data Transmission (1.2.4) 16 <br>Bandwidth and Throughput (1.3) 17 <br>&nbsp;&nbsp;&nbsp; Bandwidth (1.3.1) 17 <br>&nbsp;&nbsp;&nbsp; Throughput (1.3.3) 18 <br>Clients and Servers (1.4) 19 <br>&nbsp;&nbsp;&nbsp; Client and Server Roles (1.4.1) 19 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer Networks (1.4.2) 20 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer Applications (1.4.3) 21 <br>&nbsp;&nbsp;&nbsp; Multiple Roles in the Network (1.4.4) 22 <br>Network Components (1.5) 23 <br>&nbsp;&nbsp;&nbsp; Network Infrastructure (1.5.2) 23 <br>&nbsp;&nbsp;&nbsp; End Devices (1.5.3) 25 <br>Summary (1.6) 26 <br>Practice 27 <br>Check Your Understanding 27 <br> Chapter 2 Online Communications 31 <br>Objectives 31 <br>Key Terms 31 <br>Introduction (2.0) 32 <br>Wireless Networks (2.1) 32 <br>&nbsp;&nbsp;&nbsp; Mobile Telephones (2.1.2) 32 <br>&nbsp;&nbsp;&nbsp; Cell Phone Network (2.1.3) 32 <br>&nbsp;&nbsp;&nbsp; Other Wireless Networks (2.1.5) 33 <br>Local Network Connections (2.2) 34 <br>&nbsp;&nbsp;&nbsp; LAN Components (2.2.2) 34 <br>&nbsp;&nbsp;&nbsp; End Device Addressing (2.2.4) 39 <br>&nbsp;&nbsp;&nbsp; Manual and Automatic Address Assignment (2.2.6) 40 <br>Network Documentation (2.3) 41 <br>&nbsp;&nbsp;&nbsp; Device Names and Address Planning (2.3.1) 41 <br>&nbsp;&nbsp;&nbsp; Network Topologies and Representations (2.3.2) 42 <br>&nbsp;&nbsp;&nbsp; Logical Network Information (2.3.4) 43 <br>Summary (2.4) 45 <br>Practice 46 <br>Check Your Understanding Questions 46 <br> Chapter 3 Explore Networks with Packet Tracer 49 <br>Objectives 49 <br>Key Terms 49 <br>Introduction (3.0) 50 <br>Packet Tracer Network Simulator (3.1) 50 <br>Packet Tracer Installation (3.2) 50 <br>The Packet Tracer User Interface (3.3) 51 <br>&nbsp;&nbsp;&nbsp; Locate and Deploy Devices (3.3.2) 52 <br>Packet Tracer Network Configuration (3.4) 53 <br>&nbsp;&nbsp;&nbsp; GUI and CLI Configuration in Packet Tracer (3.4.2) 54 <br>Summary (3.5) 59 <br>Practice 61 <br>Check Your Understanding Questions 61 <br> Chapter 4 Build a Simple Network 67 <br>Objectives 67 <br>Key Terms 67 <br>Introduction (4.0.1) 68 <br>Network Media Types (4.1) 68 <br>&nbsp;&nbsp;&nbsp; Three Media Types (4.1.2) 68 <br>&nbsp;&nbsp;&nbsp; Common Network Cables (4.1.3) 69 <br>Ethernet Cabling (4.2) 71 <br>&nbsp;&nbsp;&nbsp; Twisted-Pair Cables (4.2.1) 71 <br>&nbsp;&nbsp;&nbsp; Types of Twisted-Pair Cables (4.2.2) 72 <br>Coaxial and Fiber-Optic Cabling (4.3) 75 <br>&nbsp;&nbsp;&nbsp; Cable TV and Satellite Cables (4.3.1) 75 <br>&nbsp;&nbsp;&nbsp; Fiber-Optic Cables (4.3.2) 76 <br>Twisted-Pair Operation (4.4) 78 <br>&nbsp;&nbsp;&nbsp; Twisted-Pair Wiring Schemes (4.4.1) 78 <br>&nbsp;&nbsp;&nbsp; Twisted-Pair Transmit and Receive Pairs (4.4.2) 79 <br>Verify Connectivity (4.5) 79 <br>&nbsp;&nbsp;&nbsp; Using the ping Command (4.5.2) 80 <br>&nbsp;&nbsp;&nbsp; The traceroute Command (4.5.3) 81 <br>Summary (4.6) 83 <br>Practice 85 <br>Check Your Understanding Questions 85 <br> Chapter 5 Communication Principles 89 <br>Objectives 89 <br>Key Terms 89 <br>Introduction (5.0.1) 90 <br>The Rules (5.1) 90 <br>&nbsp;&nbsp;&nbsp; The Three Elements (5.1.1) 90 <br>&nbsp;&nbsp;&nbsp; Communication Protocols (5.1.2) 91 <br>&nbsp;&nbsp;&nbsp; Why Protocols Matter (5.1.3) 93 <br>Communication Standards (5.2) 95 <br>&nbsp;&nbsp;&nbsp; The Internet and Standards (5.2.2) 95 <br>&nbsp;&nbsp;&nbsp; Network Standards Organizations (5.2.3) 95 <br>Network Communication Models (5.3) 96 <br>&nbsp;&nbsp;&nbsp; The Protocol Stack (5.3.3) 97 <br>&nbsp;&nbsp;&nbsp; The TCP/IP Model (5.3.4) 98 <br>&nbsp;&nbsp;&nbsp; The OSI Reference Model (5.3.5) 99 <br>&nbsp;&nbsp;&nbsp; Upper and Lower Layers of the OSI Model (5.3.6) 100 <br>&nbsp;&nbsp;&nbsp; OSI Model and TCP/IP Model Comparison (5.3.7) 101 <br>Ethernet (5.4) 103 <br>&nbsp;&nbsp;&nbsp; The Rise of Ethernet (5.4.1) 103 <br>&nbsp;&nbsp;&nbsp; Ethernet Evolution (5.4.2) 104 <br>&nbsp;&nbsp;&nbsp; The Ethernet MAC Address (5.4.4) 105 <br>Summary (5.5) 107 <br>Practice 108 <br>Check Your Understanding Questions 108 <br> Chapter 6 Network Design and the Access Layer 111 <br>Objectives 111 <br>Key Terms 111 <br>Introduction (6.0.1) 112 <br>Encapsulation and the Ethernet Frame (6.1) 112 <br>&nbsp;&nbsp;&nbsp; Encapsulation (6.1.2) 112 <br>&nbsp;&nbsp;&nbsp; Ethernet Frame (6.1.3) 114 <br>Hierarchical Network Design (6.2) 115 <br>&nbsp;&nbsp;&nbsp; Physical and Logical Addresses (6.2.2) 115 <br>&nbsp;&nbsp;&nbsp; Hierarchical Analogy (6.2.5) 117 <br>&nbsp;&nbsp;&nbsp; Benefits of a Hierarchical Design (6.2.7) 117 <br>&nbsp;&nbsp;&nbsp; Access, Distribution, and Core (6.2.8) 119 <br>The Access Layer (6.3) 120 <br>&nbsp;&nbsp;&nbsp; Access Layer Devices (6.3.1) 121 <br>&nbsp;&nbsp;&nbsp; Ethernet Hubs (6.3.2) 121 <br>&nbsp;&nbsp;&nbsp; Ethernet Switches (6.3.4) 123 <br>&nbsp;&nbsp;&nbsp; The MAC Address Table (6.3.6) 124 <br>Broadcast Containment (6.4) 126 <br>&nbsp;&nbsp;&nbsp; Ethernet Broadcasts in the Local Network (6.4.2) 126 <br>&nbsp;&nbsp;&nbsp; Broadcast Domains (6.4.3) 127 <br>&nbsp;&nbsp;&nbsp; Access Layer Communication (6.4.4) 128 <br>&nbsp;&nbsp;&nbsp; ARP (6.4.6) 129 <br>Summary (6.5) 131 <br>Practice 133 <br>Check Your Understanding Questions 133 <br> Chapter 7 Routing Between Networks 137 <br>Objectives 137 <br>Key Terms 137 <br>Introduction (7.0.1) 138 <br>The Need for Routing (7.1) 138 <br>&nbsp;&nbsp;&nbsp; Criteria for Dividing the Local Network (7.1.2) 138 <br>&nbsp;&nbsp;&nbsp; When Routing Is Needed (7.1.3) 141 <br>The Routing Table (7.2) 142 <br>&nbsp;&nbsp;&nbsp; Path Selection (7.2.2) 142 <br>&nbsp;&nbsp;&nbsp; Packet Forwarding (7.2.5) 143 <br>&nbsp;&nbsp;&nbsp; Routing Table Entries (7.2.7) 145 <br>&nbsp;&nbsp;&nbsp; The Default Gateway (7.2.8) 146 <br>Create a LAN (7.3) 147 <br>&nbsp;&nbsp;&nbsp; Local-Area Networks (7.3.1) 147 <br>&nbsp;&nbsp;&nbsp; Local and Remote Network Segments (7.3.2) 148 <br>Summary (7.4) 152 <br>Practice 153 <br>Check Your Understanding Questions 153 <br> Chapter 8 The Internet Protocol 157 <br>Objectives 157 <br>Key Terms 157 <br>Introduction (8.0.1) 158 <br>Purpose of the IPv4 Address (8.1) 158 <br>&nbsp;&nbsp;&nbsp; The IPv4 Address (8.1.1) 158 <br>Binary Conversion of an IPv4 Address (8.2) 159 <br>&nbsp;&nbsp;&nbsp; IPv4 Addressing (8.2.1) 159 <br>&nbsp;&nbsp;&nbsp; Binary to Decimal (8.2.3) 160 <br>The IPv4 Address Structure (8.3) 162 <br>&nbsp;&nbsp;&nbsp; Networks and Hosts (8.3.2) 162 <br>&nbsp;&nbsp;&nbsp; Logical AND (8.3.5) 163 <br>&nbsp;&nbsp;&nbsp; Calculate Whether the Destination Is Local or Remote (8.3.6) 164 <br>&nbsp;&nbsp;&nbsp; Calculate the Number of Hosts (8.3.7) 165 <br>Classful IPv4 Addressing (8.4) 166 <br>&nbsp;&nbsp;&nbsp; Classful and Classless Addressing (8.4.1) 166 <br>Public and Private IPv4 Addresses (8.5) 168 <br>&nbsp;&nbsp;&nbsp; Private IPv4 Addressing (8.5.1) 168 <br>&nbsp;&nbsp;&nbsp; Assignment of IPv4 Addresses (8.5.2) 169 <br>Unicast, Broadcast, and Multicast Addresses (8.6) 171 <br>&nbsp;&nbsp;&nbsp; Unicast Transmission (8.6.2) 171 <br>&nbsp;&nbsp;&nbsp; Broadcast Transmission (8.6.4) 172 <br>&nbsp;&nbsp;&nbsp; Multicast Transmission (8.6.6) 173 <br>Summary (8.7) 175 <br>Practice 177 <br>Check Your Understanding Questions 177 <br> Chapter 9 Dynamic Addressing with DHCP 181 <br>Objectives 181 <br>Key Terms 181 <br>Introduction (9.0.1) 182 <br>Static and Dynamic Addressing (9.1) 182 <br>&nbsp;&nbsp;&nbsp; Static IPv4 Address Assignment (9.1.1) 182 <br>&nbsp;&nbsp;&nbsp; Dynamic IPv4 Address Assignment (9.1.2) 183 <br>&nbsp;&nbsp;&nbsp; DHCP Servers (9.1.3) 184 <br>DHCPv4 Configuration (9.2) 185 <br>&nbsp;&nbsp;&nbsp; DHCPv4 Operation (9.2.2) 185 <br>&nbsp;&nbsp;&nbsp; DHCP Service Configuration (9.2.4) 186 <br>Summary (9.3) 188 <br>Practice 189 <br>Check Your Understanding Questions 189 <br> Chapter 10 IPv4 and IPv6 Address Management 193 <br>Objectives 193 <br>Key Terms 193 <br>Introduction (10.0.1) 194 <br>Network Boundaries (10.1) 194 <br>&nbsp;&nbsp;&nbsp; Routers as Gateways (10.1.2) 194 <br>&nbsp;&nbsp;&nbsp; Routers as Boundaries Between Networks (10.1.3) 195 <br>Network Address Translation (10.2) 196 <br>&nbsp;&nbsp;&nbsp; NAT Operation (10.2.2) 196 <br>IPv4 Issues (10.3) 198 <br>&nbsp;&nbsp;&nbsp; Need for IPv6 (10.3.1) 198 <br>&nbsp;&nbsp;&nbsp; IPv6 Address Size (10.3.2) 200 <br>&nbsp;&nbsp;&nbsp; IPv4 and IPv6 Coexistence (10.3.4) 201 <br>IPv6 Features (10.4) 203 <br>&nbsp;&nbsp;&nbsp; IPv6 Autoconfiguration and Link-Local Addresses (10.4.3) 203 <br>&nbsp;&nbsp;&nbsp; IPv6 Address Representation (10.4.5) 204 <br>Summary (10.5) 206 <br>Practice 207 <br>Check Your Understanding Questions 208 <br> Chapter 11 Transport Layer Services 211 <br>Objectives 211 <br>Key Terms 211 <br>Introduction (11.0.1) 212 <br>The Client/Server Relationship (11.1) 212 <br>&nbsp;&nbsp;&nbsp; Client and Server Interaction (11.1.1) 212 <br>&nbsp;&nbsp;&nbsp; Client Requests a Web Page (11.1.3) 213 <br>&nbsp;&nbsp;&nbsp; URI, URN, and URL (11.1.4) 214 <br>TCP and UDP (11.2) 215 <br>&nbsp;&nbsp;&nbsp; Protocol Operations (11.2.1) 215 <br>&nbsp;&nbsp;&nbsp; TCP and UDP (11.2.3) 216 <br>&nbsp;&nbsp;&nbsp; TCP Reliability (11.2.4) 216 <br>&nbsp;&nbsp;&nbsp; UDP Best Effort Delivery (11.2.5) 217 <br>Port Numbers (11.3) 218 <br>&nbsp;&nbsp;&nbsp; TCP and UDP Port Numbers (11.3.2) 218 <br>&nbsp;&nbsp;&nbsp; Destination and Source Port Numbers (11.3.3) 220 <br>&nbsp;&nbsp;&nbsp; Socket Pairs (11.3.4) 221 <br>&nbsp;&nbsp;&nbsp; The netstat Command (11.3.5) 223 <br>Summary (11.4) 224 <br>Practice 225 <br>Check Your Understanding Questions 225 <br> Chapter 12 Application Layer Services 229 <br>Objectives 229 <br>Key Terms 229 <br>Introduction (12.0.1) 230 <br>Network Application Services (12.1) 230 <br>&nbsp;&nbsp;&nbsp; Common Network Application Services (12.1.1) 230 <br>Domain Name System (12.2) 231 <br>&nbsp;&nbsp;&nbsp; Domain Name Translation (12.2.1) 231 <br>&nbsp;&nbsp;&nbsp; DNS Servers (12.2.3) 232 <br>Web Clients and Servers (12.3) 233 <br>&nbsp;&nbsp;&nbsp; HTTP and HTML (12.3.2) 233 <br>FTP Clients and Servers (12.4) 234 <br>&nbsp;&nbsp;&nbsp; File Transfer Protocol (12.4.1) 235 <br>&nbsp;&nbsp;&nbsp; FTP Client Software (12.4.3) 236 <br>Virtual Terminals (12.5) 237 <br>&nbsp;&nbsp;&nbsp; Telnet (12.5.2) 237 <br>&nbsp;&nbsp;&nbsp; Security Issues with Telnet (12.5.3) 238 <br>Email and Messaging (12.6) 239 <br>&nbsp;&nbsp;&nbsp; Email Clients and Servers (12.6.1) 239 <br>&nbsp;&nbsp;&nbsp; Email Protocols (12.6.2) 240 <br>&nbsp;&nbsp;&nbsp; Text Messaging (12.6.3) 242 <br>&nbsp;&nbsp;&nbsp; Internet Phone Calls (12.6.4) 243 <br>Summary (12.7) 244 <br>Practice 246 <br>Check Your Understanding Questions 246 <br> Chapter 13 Build a Home Network 249 <br>Objectives 249 <br>Key Terms 249 <br>Introduction (13.0.1) 250 <br>Home Network Basics (13.1) 250 <br>&nbsp;&nbsp;&nbsp; Connecting Home Devices (13.1.1) 250 <br>&nbsp;&nbsp;&nbsp; Components of a Home Network (13.1.2) 251 <br>&nbsp;&nbsp;&nbsp; Typical Home Network Routers (13.1.3) 252 <br>Network Technologies in the Home (13.2) 253 <br>&nbsp;&nbsp;&nbsp; The Electromagnetic Spectrum (13.2.1) 253 <br>&nbsp;&nbsp;&nbsp; LAN Wireless Frequencies (13.2.2) 254 <br>&nbsp;&nbsp;&nbsp; Wired Network Technologies (13.2.3) 255 <br>Wireless Standards (13.3) 257 <br>&nbsp;&nbsp;&nbsp; Wi-Fi Networks (13.3.1) 257 <br>&nbsp;&nbsp;&nbsp; Wireless Settings (13.3.2) 257 <br>Wireless Traffic Controls (13.4) 259 <br>&nbsp;&nbsp;&nbsp; Wireless Channels (13.4.1) 259 <br>&nbsp;&nbsp;&nbsp; Wireless as a Shared Media (13.4.2) 260 <br>Set Up a Home Router (13.5) 261 <br>&nbsp;&nbsp;&nbsp; First Time Setup (13.5.1) 261 <br>&nbsp;&nbsp;&nbsp; Design Considerations (13.5.2) 261 <br>&nbsp;&nbsp;&nbsp; MAC Address Filtering (13.5.3) 263 <br>Summary (13.6) 265 <br>Practice 267 <br>Check Your Understanding Questions 267 <br> Chapter 14 Connect to the Internet 271 <br>Objectives 271 <br>Key Terms 271 <br>Introduction (14.0.1) 272 <br>ISP Connectivity Options (14.1) 272 <br>&nbsp;&nbsp;&nbsp; ISP Services (14.1.1) 272 <br>&nbsp;&nbsp;&nbsp; ISP Connections (14.1.2) 273 <br>&nbsp;&nbsp;&nbsp; Cable and DSL Connections (14.1.3) 274 <br>&nbsp;&nbsp;&nbsp; Additional Connectivity Options (14.1.4) 275 <br>Network Virtualization (14.2) 276 <br>&nbsp;&nbsp;&nbsp; Cloud Computing (14.2.2) 276 <br>&nbsp;&nbsp;&nbsp; Types of Clouds (14.2.3) 276 <br>&nbsp;&nbsp;&nbsp; Cloud Services (14.2.4) 277 <br>&nbsp;&nbsp;&nbsp; Cloud Computing and Virtualization (14.2.5) 277 <br>&nbsp;&nbsp;&nbsp; Advantages of Virtualization (14.2.6) 279 <br>&nbsp;&nbsp;&nbsp; Hypervisors (14.2.7) 279 <br>&nbsp;&nbsp;&nbsp; Network Virtualization (14.2.9) 281 <br>&nbsp;&nbsp;&nbsp; Control Plane and Data Plane (14.2.10) 282 <br>&nbsp;&nbsp;&nbsp; Network Virtualization and SDN (14.2.11) 283 <br>&nbsp;&nbsp;&nbsp; SDN Architecture (14.2.12) 283 <br>Mobile Device Connectivity (14.3) 284 <br>&nbsp;&nbsp;&nbsp; Mobile Devices and Wi-Fi (14.3.1) 284 <br>&nbsp;&nbsp;&nbsp; Wi-Fi Settings (14.3.2) 285 <br>&nbsp;&nbsp;&nbsp; Configure Mobile Wi-Fi Connectivity (14.3.3) 286 <br>&nbsp;&nbsp;&nbsp; Configure Cellular Data Settings (14.3.4) 288 <br>&nbsp;&nbsp;&nbsp; Simple Connectivity with Bluetooth (14.3.6) 290 <br>&nbsp;&nbsp;&nbsp; Bluetooth Pairing (14.3.7) 290 <br>Summary (14.4) 293 <br>Practice 295 <br>Check Your Understanding Questions 295 <br> Chapter 15 Security Considerations 299 <br>Objectives 299 <br>Key Terms 299 <br>Introduction (15.0.1) 300 <br>Security Threats (15.1) 300 <br>&nbsp;&nbsp;&nbsp; Types of Threats (15.1.1) 300 <br>&nbsp;&nbsp;&nbsp; Internal and External Threats (15.1.2) 301 <br>Social Engineering Attacks (15.2) 302 <br>&nbsp;&nbsp;&nbsp; Overview of Social Engineering (15.2.1) 302 <br>&nbsp;&nbsp;&nbsp; Types of Social Engineering Attacks (15.2.2) 303 <br>Malware (15.3) 304 <br>&nbsp;&nbsp;&nbsp; Malicious Software (15.3.1) 305 <br>&nbsp;&nbsp;&nbsp; Types of Malware (15.3.2) 305 <br>&nbsp;&nbsp;&nbsp; Spyware (15.3.3) 306 <br>&nbsp;&nbsp;&nbsp; Adware and Popups (15.3.4) 306 <br>&nbsp;&nbsp;&nbsp; Botnets and Zombies (15.3.5) 307 <br>Denial-of-Service Attacks (15.4) 308 <br>&nbsp;&nbsp;&nbsp; Denial of Service (15.4.1) 308 <br>&nbsp;&nbsp;&nbsp; Distributed Denial of Service (15.4.2) 309 <br>&nbsp;&nbsp;&nbsp; Brute Force (15.4.3) 310 <br>Security Tools (15.5) 310 <br>&nbsp;&nbsp;&nbsp; Security Practices and Procedures (15.5.1) 310 <br>&nbsp;&nbsp;&nbsp; Security Tools and Applications (15.5.2) 312 <br>&nbsp;&nbsp;&nbsp; Patches and Updates (15.5.3) 313 <br>Antimalware Software (15.6) 314 <br>&nbsp;&nbsp;&nbsp; Signs of Infections (15.6.1) 314 <br>&nbsp;&nbsp;&nbsp; Antivirus Software (15.6.2) 315 <br>&nbsp;&nbsp;&nbsp; Antispam Software (15.6.3) 316 <br>&nbsp;&nbsp;&nbsp; Antispyware Software (15.6.4) 316 <br>&nbsp;&nbsp;&nbsp; Additional Safeguards (15.6.5) 317 <br>Summary (15.7) 318 <br>Practice 321 <br>Check Your Understanding Questions 321 <br> Chapter 16 Configure Network and Device Security 325 <br>Objectives 325 <br>Key Terms 325 <br>Introduction (16.0.1) 326 <br>Wireless Security Measures (16.1) 326 <br>&nbsp;&nbsp;&nbsp; Wireless Vulnerabilities (16.1.1) 326 <br>&nbsp;&nbsp;&nbsp; A Comprehensive Security Plan (16.1.2) 327 <br>&nbsp;&nbsp;&nbsp; SSID Broadcasts (16.1.4) 333 <br>&nbsp;&nbsp;&nbsp; Changing Default Settings (16.1.5) 334 <br>&nbsp;&nbsp;&nbsp; MAC Address Filtering (16.1.6) 335 <br>Implement Wireless Security (16.2) 336 <br>&nbsp;&nbsp;&nbsp; Open Authentication (16.2.1) 336 <br>&nbsp;&nbsp;&nbsp; Authentication and Association (16.2.2) 336 <br>&nbsp;&nbsp;&nbsp; Authentication Protocols (16.2.3) 337 <br>Configure a Firewall (16.3) 338 <br>&nbsp;&nbsp;&nbsp; Firewall Overview (16.3.1) 338 <br>&nbsp;&nbsp;&nbsp; Firewall Operation (16.3.2) 338 <br>&nbsp;&nbsp;&nbsp; The DMZ (16.3.3) 339 <br>&nbsp;&nbsp;&nbsp; Port Forwarding (16.3.4) 340 <br>&nbsp;&nbsp;&nbsp; Port Triggering (16.3.5) 341 <br>Summary (16.4) 344 <br>Practice 345 <br>Check Your Understanding Questions 346 <br> Chapter 17 Cisco Switches and Routers 349 <br>Objectives 349 <br>Key Terms 349 <br>Introduction (17.0.1) 350 <br>Cisco Switches (17.1) 350 <br>&nbsp;&nbsp;&nbsp; Connect More Devices (17.1.1) 350 <br>&nbsp;&nbsp;&nbsp; Cisco LAN Switches (17.1.2) 351 <br>&nbsp;&nbsp;&nbsp; LAN Switch Components (17.1.5) 354 <br>Switch Boot Process (17.2) 355 <br>&nbsp;&nbsp;&nbsp; Power Up the Switch (17.2.1) 355 <br>&nbsp;&nbsp;&nbsp; In-Band and Out-of-Band Management (17.2.3) 358 <br>&nbsp;&nbsp;&nbsp; IOS Startup Files (17.2.4) 358 <br>Cisco Routers (17.3) 359 <br>&nbsp;&nbsp;&nbsp; Router Components (17.3.2) 360 <br>&nbsp;&nbsp;&nbsp; Router Interface Ports (17.3.3) 360 <br>Router Boot Process (17.4) 361 <br>&nbsp;&nbsp;&nbsp; Power Up the Router (17.4.1) 361 <br>&nbsp;&nbsp;&nbsp; Management Ports (17.4.2) 365 <br>Summary (17.5) 367 <br>Practice 368 <br>Check Your Understanding Questions 368 <br> Chapter 18 The Cisco IOS Command Line 373 <br>Objectives 373 <br>Key Terms 373 <br>Introduction (18.0.1) 374 <br>Navigate the IOS (18.1) 374 <br>&nbsp;&nbsp;&nbsp; The Cisco IOS Command-Line Interface (18.1.1) 374 <br>&nbsp;&nbsp;&nbsp; Primary Command Modes (18.1.2) 375 <br>&nbsp;&nbsp;&nbsp; A Note About Syntax Checker Activities (18.1.5) 376 <br>The Command Structure (18.2) 376 <br>&nbsp;&nbsp;&nbsp; Basic IOS Command Structure (18.2.1) 376 <br>&nbsp;&nbsp;&nbsp; IOS Command Syntax (18.2.2) 377 <br>&nbsp;&nbsp;&nbsp; Hotkeys and Shortcuts (18.2.4) 378 <br>View Device Information (18.3) 380 <br>&nbsp;&nbsp;&nbsp; Show Commands (18.3.2) 381 <br>Summary (18.4) 387 <br>Practice 388 <br>Check Your Understanding Questions 388 <br> Chapter 19 Build a Small Cisco Network 391 <br>Objectives 391 <br>Key Terms 391 <br>Introduction (19.0.1) 392 <br>Basic Switch Configuration (19.1) 392 <br>&nbsp;&nbsp;&nbsp; Basic Switch Configuration Steps (19.1.1) 392 <br>&nbsp;&nbsp;&nbsp; Switch Virtual Interface Configuration (19.1.2) 394 <br>Configure Initial Router Settings (19.2) 395 <br>&nbsp;&nbsp;&nbsp; Basic Router Configuration Steps (19.2.1) 395 <br>&nbsp;&nbsp;&nbsp; Basic Router Configuration Example (19.2.2) 396 <br>Secure the Devices (19.3) 398 <br>&nbsp;&nbsp;&nbsp; Password Recommendations (19.3.1) 398 <br>&nbsp;&nbsp;&nbsp; Secure Remote Access (19.3.2) 399 <br>&nbsp;&nbsp;&nbsp; Configure SSH (19.3.3) 400 <br>&nbsp;&nbsp;&nbsp; Verify SSH (19.3.5) 402 <br>Connecting the Switch to the Router (19.4) 404 <br>&nbsp;&nbsp;&nbsp; Default Gateway for a Host (19.4.1) 404 <br>&nbsp;&nbsp;&nbsp; Default Gateway on a Switch (19.4.2) 406 <br>Summary (19.5) 409 <br>Practice 411 <br>Check Your Understanding Questions 412 <br> Chapter 20 Troubleshoot Common Network Problems 415 <br>Objectives 415 <br>Key Terms 415 <br>Introduction (20.0.1) 416 <br>The Troubleshooting Process (20.1) 416 <br>&nbsp;&nbsp;&nbsp; Network Troubleshooting Overview (20.1.1) 416 <br>&nbsp;&nbsp;&nbsp; Gather Information (20.1.2) 416 <br>&nbsp;&nbsp;&nbsp; Structured Troubleshooting Methods (20.1.3) 418 <br>&nbsp;&nbsp;&nbsp; Guidelines for Selecting a Troubleshooting Method (20.1.4) 422 <br>Physical Layer Problems (20.2) 423 <br>&nbsp;&nbsp;&nbsp; Common Layer 1 Problems (20.2.1) 423 <br>&nbsp;&nbsp;&nbsp; Wireless Router LEDs (20.2.2) 424 <br>&nbsp;&nbsp;&nbsp; Cabling Problems (20.2.3) 426 <br>Troubleshooting Commands (20.3) 426 <br>&nbsp;&nbsp;&nbsp; Overview of Troubleshooting Commands (20.3.1) 426 <br>&nbsp;&nbsp;&nbsp; The ipconfig Command (20.3.2) 427 <br>&nbsp;&nbsp;&nbsp; The ping Command (20.3.4) 430 <br>&nbsp;&nbsp;&nbsp; Ping Results (20.3.5) 431 <br>&nbsp;&nbsp;&nbsp; Divide and Conquer with ping (20.3.7) 432 <br>&nbsp;&nbsp;&nbsp; The tracert Command (20.3.8) 433 <br>&nbsp;&nbsp;&nbsp; The netstat Command (20.3.9) 434 <br>&nbsp;&nbsp;&nbsp; The nslookup Command (20.3.10) 436 <br>Troubleshoot Wireless Issues (20.4) 438 <br>&nbsp;&nbsp;&nbsp; Causes of Wireless Issues (20.4.1) 438 <br>&nbsp;&nbsp;&nbsp; Authentication and Association Errors (20.4.2) 439 <br>Common Internet Connectivity Issues (20.5) 441 <br>&nbsp;&nbsp;&nbsp; DHCP Server Configuration Errors (20.5.1) 441 <br>&nbsp;&nbsp;&nbsp; Check Internet Configuration (20.5.2) 442 <br>&nbsp;&nbsp;&nbsp; Check Firewall Settings (20.5.3) 444 <br>Customer Support (20.6) 444 <br>&nbsp;&nbsp;&nbsp; Sources of Help (20.6.1) 445 <br>&nbsp;&nbsp;&nbsp; When to Call for Help (20.6.2) 445 <br>&nbsp;&nbsp;&nbsp; Support Desk Interaction (20.6.3) 446 <br>&nbsp;&nbsp;&nbsp; Issue Resolution (20.6.4) 447 <br>&nbsp;&nbsp;&nbsp; Support Desk Tickets and Work Orders (20.6.5) 448 <br>Summary (20.7) 450 <br>Practice 453 <br>Check Your Understanding Questions 454 <br> Appendix A Answers to the "Check Your Understanding" Questions 459 <br> Glossary 471 <br> <br> <br>9780137660483&nbsp;&nbsp;&nbsp; TOC&nbsp;&nbsp;&nbsp; 1/25/2022 <br> <br> <br>

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Networking Essentials Companion Guide