Home > Store

CCENT ICND1 100-105 Official Cert Guide and Pearson uCertify Network Simulator Academic Edition Bundle

Register your product to gain access to bonus material or receive a coupon.

CCENT ICND1 100-105 Official Cert Guide and Pearson uCertify Network Simulator Academic Edition Bundle

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Book content is fully updated to align to the new CCENT/CCNA ICND1 exam objectives
  • Books and CDs are packed with features to help students master more difficult testing methods on the actual exams
  • Practice tests contain scenario-based questions that closely mimic the difficulty of the actual exam
  • Includes 60 minutes of video covering the complex topic of subnetting
  • In-depth expert explanations of all protocols, commands, and technologies on the ICND1 exam

  • Super roster for course and student management
  • Master course and instantaneous cloning for multiple sections
  • Powerful analytics to track student engagement and progress
  • Customizable assignment dates and skill mastery levels
  • Pre and Post assessments for benchmarking
  • Maps to certification exam domains (when applicable)
  • Grade book export feature
  • LTI compliant for integration
  • Mapped directly to Pearson Texts
  • Description

    • Copyright 2017
    • Edition: 1st
    • Book
    • ISBN-10: 1-58720-675-7
    • ISBN-13: 978-1-58720-675-7

    CCENT CCNA ICND1 100-105 Official Cert Guide, Academic Edition


    Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.

    CCENT/CCNA ICND1 100-105 Official Cert Guide, Academic Edition is a comprehensive textbook and study package that provides you with an introduction to foundational networking concepts and hands-on application. Best-selling author and expert instructor Wendell Odom shares study hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.


    CCENT CCNA ICND1 100-105 Pearson uCertify Labs

    CCENT ICND1 100-105 Network Simulator, Academic Edition Pearson uCertify Labs is an online, hands-on skills enhancement tool that helps students gain the real-world configuration and troubleshooting skills they need to succeed on the Cisco CCENT ICND1 exam and to land a job as a network engineer. The 290+ labs in this product cover the full range of Cisco CCENT ICND1 100-105 exam configuration and troubleshooting topics.

    These best-selling labs help bridge the gap between conceptual knowledge and real-world application by providing competency-based, interactive, online, 24x7 training. The labs simulate real-world networking hardware that you configure and troubleshoot using the Cisco Command Line Interface (CLI). Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCENT ICND1 exam. The open command environment allows you to explore configurations beyond the lab steps.

    uCertify Labs build upon the same great platform benefits and flexibility that have become synonymous with the uCertify Courses. Students can feel safe working in this virtual environment resolving real-world networking problems. You can plan your studies using Study Planner and view detailed performance reports to verify your work.

    Sample Content

    Table of Contents

    Introduction xxxvi

    Your Study Plan 2

    Part I Networking Fundamentals 13

    Chapter 1 Introduction to TCP/IP Networking 14

    Foundation Topics 15

    Perspectives on Networking 15

    TCP/IP Networking Model 16

        History Leading to TCP/IP 17

        Overview of the TCP/IP Networking Model 18

        TCP/IP Application Layer 19

        TCP/IP Transport Layer 20

        TCP/IP Network Layer 22

        TCP/IP Link Layer (Data Link Plus Physical) 25

        TCP/IP Model and Terminology 26

    OSI Networking Model 28

        Comparing OSI and TCP/IP 29

        Describing Protocols by Referencing the OSI Layers 29

        OSI Layers and Their Functions 30

        OSI Layering Concepts and Benefits 31

        OSI Encapsulation Terminology 31

    Chapter Summary 33

    Chapter 2 Fundamentals of Ethernet LANs 38

    Foundation Topics 39

    An Overview of LANs 39

        Typical SOHO LANs 39

        Typical Enterprise LANs 40

        The Variety of Ethernet Physical Layer Standards 41

        Consistent Behavior over All Links Using the Ethernet Data Link Layer 41

    Building Physical Ethernet Networks with UTP 42

        Transmitting Data Using Twisted Pairs 42

        Breaking Down a UTP Ethernet Link 43

        UTP Cabling Pinouts for 10BASE-T and 100BASE-T 45

        UTP Cabling Pinouts for 1000BASE-T 48

    Sending Data in Ethernet Networks 48

        Ethernet Data-Link Protocols 49

        Sending Ethernet Frames with Switches and Hubs 52

    Chapter Summary 55

    Chapter 3 Fundamentals of WANs 60

    Foundation Topics 61

    Leased-Line WANs 61

        Positioning Leased Lines with LANs and Routers 61

        Physical Details of Leased Lines 62

        Data-Link Details of Leased Lines 64

    Ethernet as a WAN Technology 67

        Ethernet WANs that Create a Layer 2 Service 68

        How Routers Route IP Packets Using Ethernet Emulation 68

    Accessing the Internet 69

        The Internet as a Large WAN 69

        Internet Access (WAN) Links 71

        Digital Subscriber Line 72

        Cable Internet 73

    Chapter Summary 75

    Chapter 4 Fundamentals of IPv4 Addressing and Routing 78

    Foundation Topics 79

    Overview of Network Layer Functions 79

        Network Layer Routing (Forwarding) Logic 79

        How Network Layer Routing Uses LANs and WANs 81

        IP Addressing and How Addressing Helps IP Routing 82

        Routing Protocols 83

    IPv4 Addressing 84

        Rules for IP Addresses 84

        Rules for Grouping IP Addresses 84

        IP Subnetting 89

    IPv4 Routing 90

        IPv4 Host Routing 90

        Router Forwarding Decisions and the IP Routing Table 91

    IPv4 Routing Protocols 93

    Other Network Layer Features 94

        Using Names and the Domain Name System 95

        The Address Resolution Protocol 96

        ICMP Echo and the ping Command 97

    Chapter Summary 98

    Chapter 5 Fundamentals of TCP/IP Transport and Applications 102

    Foundation Topics 103

    TCP/IP Layer 4 Protocols: TCP and UDP 103

        Transmission Control Protocol 103

        User Datagram Protocol 111

    TCP/IP Applications 112

        Uniform Resource Identifiers 112

        Finding the Web Server Using DNS 113

        Transferring Files with HTTP 114

        How the Receiving Host Identifies the Correct Receiving Application 115

    Chapter Summary 117

    Part I Review 120

    Part II Implementing Basic Ethernet LANs 123

    Chapter 6 Using the Command-Line Interface 124

    Foundation Topics 125

    Accessing the Cisco Catalyst Switch CLI 125

        Cisco Catalyst Switches 125

        Accessing the Cisco IOS CLI 126

        CLI Help Features 132

        The debug and show Commands 134

    Configuring Cisco IOS Software 134

        Configuration Submodes and Contexts 135

        Storing Switch Configuration Files 137

        Copying and Erasing Configuration Files 139

    Chapter Summary 140

    Chapter 7 Analyzing Ethernet LAN Switching 146

    Foundation Topics 147

    LAN Switching Concepts 147

        Overview of Switching Logic 147

        Forwarding Known Unicast Frames 148

        Learning MAC Addresses 151

        Flooding Unknown Unicast and Broadcast Frames 151

        Avoiding Loops Using Spanning Tree Protocol 152

        LAN Switching Summary 153

    Verifying and Analyzing Ethernet Switching 154

        Demonstrating MAC Learning 154

        Switch Interfaces 155

        Finding Entries in the MAC Address Table 157

        Managing the MAC Address Table (Aging, Clearing) 158

        MAC Address Tables with Multiple Switches 159

    Chapter Summary 161

    Chapter 8 Configuring Basic Switch Management 166

    Foundation Topics 167

    Securing the Switch CLI 167

        Securing User Mode and Privileged Mode with Simple Passwords 167

        Securing User Mode Access with Local Usernames and Passwords 171

        Securing User Mode Access with External Authentication Servers 173

        Securing Remote Access with Secure Shell 174

    Enabling IPv4 for Remote Access 177

        Host and Switch IP Settings 177

        Configuring IPv4 on a Switch 179

        Configuring a Switch to Learn Its IP Address with DHCP 180

        Verifying IPv4 on a Switch 180

    Miscellaneous Settings Useful in Lab 181

        History Buffer Commands 181

        The logging synchronous, exec-timeout, and no ip domain-lookup Commands 182

    Chapter Summary 183

    Chapter 9 Configuring Switch Interfaces 188

    Foundation Topics 189

    Configuring Switch Interfaces 189

        Configuring Speed, Duplex, and Description 189

        Configuring Multiple Interfaces with the interface range Command 191

        Administratively Controlling Interface State with shutdown 191

        Removing Configuration with the no Command 193

        Autonegotiation 194

    Port Security 197

        Configuring Port Security 198

        Verifying Port Security 200

        Port Security Violation Actions 201

        Port Security MAC Addresses as Static and Secure but Not Dynamic 202

    Chapter Summary 203

    Part II Review 210

    Part III Ethernet LANs: Design, VLANs, and Troubleshooting 215

    Chapter 10 Analyzing Ethernet LAN Designs 216

    Foundation Topics 217

    Analyzing Collision Domains and Broadcast Domains 217

        Ethernet Collision Domains 217

        Ethernet Broadcast Domains 220

    Analyzing Campus LAN Topologies 223

        Two-Tier Campus Design (Collapsed Core) 223

        Three-Tier Campus Design (Core) 226

        Topology Design Terminology 227

    Analyzing LAN Physical Standard Choices 228

        Ethernet Standards 229

        Choosing the Right Ethernet Standard for Each Link 229

        Wireless LANs Combined with Wired Ethernet 231

    Chapter Summary 235

    Chapter 11 Implementing Ethernet Virtual LANs 240

    Foundation Topics 241

    Virtual LAN Concepts 241

        Creating Multiswitch VLANs Using Trunking 242

        Forwarding Data Between VLANs 245

    VLAN and VLAN Trunking Configuration and Verification 248

        Creating VLANs and Assigning Access VLANs to an Interface 248

        VLAN Trunking Protocol 252

        VLAN Trunking Configuration 253

        Implementing Interfaces Connected to Phones 257

    Chapter Summary 262

    Chapter 12 Troubleshooting Ethernet LANs 268

    Foundation Topics 270

    Perspectives on Applying Troubleshooting Methodologies 270

        Troubleshooting on the Exams 270

        A Deeper Look at Problem Isolation 271

        Troubleshooting as Covered in This Book 273

    Analyzing Switch Interface Status and Statistics 273

        Interface Status Codes and Reasons for Nonworking States 274

        Interface Speed and Duplex Issues 275

        Common Layer 1 Problems on Working Interfaces 277

    Predicting Where Switches Will Forward Frames 279

        Predicting the Contents of the MAC Address Table 279

        Analyzing the Forwarding Path 281

    Analyzing Port Security Operations on an Interface 282

        Troubleshooting Shutdown Mode and Err-disabled Recovery 283

        Troubleshooting Restrict and Protect Modes 284

    Analyzing VLANs and VLAN Trunks 286

        Ensuring That the Right Access Interfaces Are in the Right VLANs 287

        Access VLANs Not Being Defined 287

        Access VLANs Being Disabled 288

        Mismatched Trunking Operational States 288

    Chapter Summary 290

    Part III Review 296

    Part IV IP Version 4 Addressing and Subnetting 299

    Chapter 13 Perspectives on IPv4 Subnetting 300

    Foundation Topics 301

    Introduction to Subnetting 301

        Subnetting Defined Through a Simple Example 301

        Operational View Versus Design View of Subnetting 302

    Analyze Subnetting and Addressing Needs 303

        Rules About Which Hosts Are in Which Subnet 303

        Determining the Number of Subnets 304

        Determining the Number of Hosts per Subnet 305

        One Size Subnet Fits All–Or Not 306

    Make Design Choices 308

        Choose a Classful Network 309

        Choose the Mask 311

    Build a List of All Subnets 315

    Plan the Implementation 316

        Assigning Subnets to Different Locations 316

        Choose Static and Dynamic Ranges per Subnet 318

    Chapter Summary 319

    Chapter 14 Analyzing Classful IPv4 Networks 322

    Foundation Topics 323

    Classful Network Concepts 323

        IPv4 Network Classes and Related Facts 323

        Number of Hosts per Network 326

        Deriving the Network ID and Related Numbers 326

        Unusual Network IDs and Network Broadcast Addresses 328

    Practice with Classful Networks 329

        Practice Deriving Key Facts Based on an IP Address 329

        Practice Remembering the Details of Address Classes 329

    Chapter Summary 331

    Chapter 15 Analyzing Subnet Masks 336

    Foundation Topics 337

    Subnet Mask Conversion 337

        Three Mask Formats 337

        Converting Between Binary and Prefix Masks 338

        Converting Between Binary and DDN Masks 338

        Converting Between Prefix and DDN Masks 340

        Practice Converting Subnet Masks 341

    Identifying Subnet Design Choices Using Masks 341

        Masks Divide the Subnet’s Addresses into Two Parts 342

        Masks and Class Divide Addresses into Three Parts 343

        Classless and Classful Addressing 344

        Calculations Based on the IPv4 Address Format 344

        Practice Analyzing Subnet Masks 346

    Chapter Summary 347

    Chapter 16 Analyzing Existing Subnets 352

    Foundation Topics 353

    Defining a Subnet 353

        An Example with Network 172.16.0.0 and Four Subnets 353

        Subnet ID Concepts 354

        Subnet Broadcast Address 355

        Range of Usable Addresses 356

    Analyzing Existing Subnets: Binary 356

        Finding the Subnet ID: Binary 356

        Finding the Subnet Broadcast Address: Binary 358

        Binary Practice Problems 359

        Shortcut for the Binary Process 360

        Brief Note About Boolean Math 361

        Finding the Range of Addresses 361

    Analyzing Existing Subnets: Decimal 362

        Analysis with Easy Masks 362

        Predictability in the Interesting Octet 363

        Finding the Subnet ID: Difficult Masks 364

        Finding the Subnet Broadcast Address: Difficult Masks 366

    Practice Analyzing Existing Subnets 368

        A Choice: Memorize or Calculate 368

    Chapter Summary 369

    Part IV Review 374

    Part V Implementing IPv4 377

    Chapter 17 Operating Cisco Routers 378

    Foundation Topics 379

    Installing Cisco Routers 379

        Installing Enterprise Routers 379

        Installing Internet Access Routers 381

    Enabling IPv4 Support on Cisco Router Interfaces 383

        Accessing the Router CLI 383

        Router Interfaces 384

        Router Auxiliary Port 390

    Chapter Summary 391

    Chapter 18 Configuring IPv4 Addresses and Static Routes 396

    Foundation Topics 398

    IP Routing 398

        IPv4 Routing Process Reference 398

        An Example of IP Routing 400

    Configuring IP Addresses and Connected Routes 404

        Connected Routes and the ip address Command 404

        The ARP Table on a Cisco Router 406

        Routing Between Subnets on VLANs 407

    Configuring Static Routes 412

        Static Route Configuration 413

        Static Host Routes 414

        Static Routes with No Competing Routes 415

        Static Routes with Competing Routes 415

        Static Default Routes 417

        Troubleshooting Static Routes 418

    Chapter Summary 420

    Chapter 19 Learning IPv4 Routes with RIPv2 426

    Foundation Topics 427

    RIP and Routing Protocol Concepts 427

        History of Interior Gateway Protocols 427

        Comparing IGPs 427

        Distance Vector Basics 429

        Summarizing RIPv2 Features 432

    Core RIPv2 Configuration and Verification 433

        Configuring Core RIPv2 Features 433

        RIPv2 Verification 436

    Optional RIPv2 Configuration and Verification 440

        Controlling RIP Updates with the passive-interface Command 441

        Supporting Multiple Equal-Cost Routes with Maximum Paths 441

        Understanding Autosummarization and Discontiguous Classful Networks 442

        Verifying Optional RIP Features 444

        RIPv2 Default Routes 446

    Troubleshooting RIPv2 449

        Symptoms with Missing and Incorrect network Commands 450

        Issues Related to Passive Interfaces 452

        Issues Related to auto-summary 452

        RIP Issues Caused by Other Router Features 453

    Summary of RIP Troubleshooting Issues 453

    Chapter Summary 454

    Chapter 20 DHCP and IP Networking on Hosts 460

    Foundation Topics 461

    Implementing and Troubleshooting DHCP 461

        DHCP Concepts 461

        DHCP Server Configuration on Routers 465

        IOS DHCP Server Verification 467

        Troubleshooting DHCP Services 468

    Verifying Host IPv4 Settings 473

        IP Address and Mask Configuration 473

        Name Resolution with DNS 475

        Default Routers 475

    IPv4 Address Types 477

        Review of Unicast (Class A, B, and C) IP Addresses 477

        IP Broadcast Addresses 478

        IPv4 Multicast Addresses (Class D Addresses) 479

        Comparing and Contrasting IP Address Types 481

    Chapter Summary 482

    Part V Review 488

    Part VI IPv4 Design and Troubleshooting 493

    Chapter 21 Subnet Design 494

    Foundation Topics 495

    Choosing the Mask(s) to Meet Requirements 495

        Review: Choosing the Minimum Number of Subnet and Host Bits 495

        No Masks Meet Requirements 496

        One Mask Meets Requirements 497

        Multiple Masks Meet Requirements 497

        The Formal Process 500

        Practice Choosing Subnet Masks 500

    Finding All Subnet IDs 501

        First Subnet ID: The Zero Subnet 501

        Finding the Pattern Using the Magic Number 502

        A Formal Process with Less Than 8 Subnet Bits 503

        Finding All Subnets with Exactly 8 Subnet Bits 506

        Finding All Subnets with More Than 8 Subnet Bits 507

        Practice Finding All Subnet IDs 509

    Chapter Summary 511

    Chapter 22 Variable-Length Subnet Masks 518

    Foundation Topics 519

    VLSM Concepts and Configuration 519

        Classless and Classful Routing Protocols 519

        VLSM Configuration and Verification 520

    Finding VLSM Overlaps 521

        Designing Subnetting Plans with VLSM 521

        An Example of Finding a VLSM Overlap 523

        Practice Finding VLSM Overlaps 524

    Adding a New Subnet to an Existing VLSM Design 524

        An Example of Adding a New VLSM Subnet 525

    Chapter Summary 527

    Chapter 23 IPv4 Troubleshooting Tools 532

    Foundation Topics 533

    Problem Isolation Using the ping Command 533

        Ping Command Basics 533

        Strategies and Results When Testing with the ping Command 534

        Using Ping with Names and with IP Addresses 541

    Problem Isolation Using the traceroute Command 542

        traceroute Basics 542

        Using traceroute to Isolate the Problem to Two Routers 545

    Telnet and SSH 547

        Common Reasons to Use the IOS Telnet and SSH Client 547

        IOS Telnet and SSH Examples 548

    Chapter Summary 550

    Chapter 24 Troubleshooting IPv4 Routing 552

    Foundation Topics 553

    Problems Between the Host and the Default Router 553

        Root Causes Based on a Host’s IPv4 Settings 553

        Root Causes Based on the Default Router’s Configuration 558

    Problems with Routing Packets Between Routers 561

        IP Forwarding by Matching the Most Specific Route 562

        Routing Problems Caused by Incorrect Addressing Plans 565

        Pointers to Related Troubleshooting Topics 569

    Chapter Summary 571

    Part VI Review 574

    Part VII IPv4 Services: ACLs and NAT 579

    Chapter 25 Basic IPv4 Access Control Lists 580

    Foundation Topics 581

    IPv4 Access Control List Basics 581

        ACL Location and Direction 581

        Matching Packets 582

        Taking Action When a Match Occurs 583

        Types of IP ACLs 583

    Standard Numbered IPv4 ACLs 583

        List Logic with IP ACLs 584

        Matching Logic and Command Syntax 585

        Implementing Standard IP ACLs 588

        Troubleshooting and Verification Tips 592

    Practice Applying Standard IP ACLs 593

        Practice Building access-list Commands 593

        Reverse Engineering from ACL to Address Range 594

    Chapter Summary 596

    Chapter 26 Advanced IPv4 Access Control Lists 602

    Foundation Topics 603

    Extended Numbered IP Access Control Lists 603

        Matching the Protocol, Source IP, and Destination IP 603

        Matching TCP and UDP Port Numbers 604

        Extended IP ACL Configuration 607

        Practice Building access-list Commands 610

    Named ACLs and ACL Editing 610

        Named IP Access Lists 611

        Editing ACLs Using Sequence Numbers 612

        Numbered ACL Configuration Versus Named ACL Configuration 614

        ACL Implementation Considerations 615

    Troubleshooting with IPv4 ACLs 616

        Analyzing ACL Behavior in a Network 616

        ACL Interactions with Router-Generated Packets 621

    Chapter Summary 624

    Chapter 27 Network Address Translation 630

    Foundation Topics 631

    Perspectives on IPv4 Address Scalability 631

        CIDR 631

        Private Addressing 632

    Network Address Translation Concepts 633

        Static NAT 633

        Dynamic NAT 636

        Overloading NAT with Port Address Translation 637

        NAT Configuration and Troubleshooting 638

        Static NAT Configuration 638

        Dynamic NAT Configuration 640

        Dynamic NAT Verification 642

        NAT Overload (PAT) Configuration 644

        NAT Troubleshooting 646

    Chapter Summary 648

    Part VII Review 654

    Part VIII IP Version 6 659

    Chapter 28 Fundamentals of IP Version 6 660

    Foundation Topics 661

        Introduction to IPv6 661

        IPv6 Addressing Formats and Conventions 666

    Chapter Summary 672

    Chapter 29 IPv6 Addressing and Subnetting 678

    Foundation Topics 679

    Global Unicast Addressing Concepts 679

        A Brief Review of Public and Private IPv4 Addresses 679

        The IPv6 Global Routing Prefix 682

        Address Ranges for Global Unicast Addresses 683

        IPv6 Subnetting Using Global Unicast Addresses 684

        Assigning Addresses to Hosts in a Subnet 688

    Unique Local Unicast Addresses 689

        Subnetting with Unique Local IPv6 Addresses 689

        The Need for Globally Unique Local Addresses 690

    Chapter Summary 691

    Chapter 30 Implementing IPv6 Addressing on Routers 694

    Foundation Topics 695

    Implementing Unicast IPv6 Addresses on Routers 695

        Static Unicast Address Configuration 696

        Dynamic Unicast Address Configuration 702

    Special Addresses Used by Routers 703

        Link-Local Addresses 703

        IPv6 Multicast Addresses 706

        Miscellaneous IPv6 Addresses 710

        IPv6 Addressing Configuration Summary 710

    Chapter Summary 712

    Chapter 31 Implementing IPv6 Addressing on Hosts 718

    Foundation Topics 719

    The Neighbor Discovery Protocol 719

        Discovering Routers with NDP RS and RA 719

        Discovering Addressing Info for SLAAC with NDP RS and RA 720

        Discovering Neighbor Link Addresses with NDP NS and NA 721

        Discovering Duplicate Addresses Using NDP NS and NA 722

        NDP Summary 723

    Dynamic Configuration of Host IPv6 Settings 724

        Dynamic Configuration Using Stateful DHCP and NDP 724

        Using Stateless Address Auto Configuration 727

    Troubleshooting IPv6 Addressing 729

        Verifying Host IPv6 Connectivity from Hosts 729

        Verifying Host Connectivity from Nearby Routers 731

    Chapter Summary 734

    Chapter 32 Implementing IPv6 Routing 740

    Foundation Topics 741

    Connected and Local IPv6 Routes 741

        Rules for Connected and Local Routes 741

        Example of Connected IPv6 Routes 742

        Examples of Local IPv6 Routes 743

    Static IPv6 Routes 744

        Static Routes Using the Outgoing Interface 744

        Static Routes Using Next-Hop IPv6 Address 746

        Static Default Routes 748

        Static IPv6 Host Routes 749

        Floating Static IPv6 Routes 749

        Default Routes with SLAAC on Router Interfaces 751

        Troubleshooting Static IPv6 Routes 752

    Chapter Summary 756

    Part VIII Review 760

    Part IX Network Device Management 763

    Chapter 33 Device Management Protocols 764

    Foundation Topics 765

    System Message Logging (Syslog) 765

        Sending Messages in Real Time to Current Users 765

        Storing Log Messages for Later Review 766

        Log Message Format 766

        Log Message Severity Levels 767

        Configuring and Verifying System Logging 768

        The debug Command and Log Messages 770

    Network Time Protocol (NTP) 771

        Setting the Time and Timezone 772

        Implementing NTP Clients, Servers, and Client/Server Mode 773

        NTP Using a Loopback Interface for Better Availability 775

    Analyzing Topology Using CDP and LLDP 776

        Examining Information Learned by CDP 776

        Configuring and Verifying CDP Itself 779

        Implementing Link Layer Discovery Protocol 780

    Chapter Summary 782

    Chapter 34 Device Security Features 788

    Foundation Topics 789

    Securing IOS Passwords 789

        Encrypting Older IOS Passwords with service password-encryption 789

        Encoding the Enable Passwords with Hashes 790

        Hiding the Passwords for Local Usernames 794

    Cisco Device Hardening 794

        Configuring Login Banners 794

        Securing Unused Switch Interfaces 796

        Controlling Telnet and SSH Access with ACLs 797

        Firewalls 797

    Chapter Summary 801

    Chapter 35 Managing IOS Files 806

    Foundation Topics 807

    Managing Cisco IOS Images and Upgrades 807

        The IOS File System 807

        Upgrading IOS Images 808

        The Cisco IOS Software Boot Sequence 813

    Password Recovery 818

        The General Ideas Behind Cisco Password Recovery/Reset 819

        A Specific Password Reset Example 820

    Managing Configuration Files 821

        Copying and Erasing Configuration Files 822

        Initial Configuration (Setup Mode) 825

    Chapter Summary 827

    Chapter 36 IOS License Management 832

    Foundation Topics 833

    IOS Packaging 833

        IOS Images per Model, Series, and per Software Version/Release 833

        Original Packaging: One IOS Image per Feature Set Combination 834

        New IOS Packaging: One Universal Image with All Feature Sets 834

    IOS Software Activation with Universal Images 835

        The Future: Cisco ONE Licensing 836

    Managing Software Activation with Cisco License Manager 837

        Manually Activating Software Using Licenses 838

        Example of Manually Activating a License 839

        Right-to-Use Licenses 843

    Chapter Summary 845

    Part IX Review 848

    Part X Final Review 851

    Chapter 37 Final Review 852

    Advice About the Exam Event 852

        Learn the Question Types Using the Cisco Certification Exam Tutorial 852

        Think About Your Time Budget Versus Number of Questions 853

        A Suggested Time-Check Method 854

        Miscellaneous Pre-Exam Suggestions 854

        Exam-Day Advice 854

        Reserve the Hour After the Exam in Case You Fail 855

    Exam Review 856

        Practice Subnetting and Other Math-Related Skills 856

        Take Practice Exams 858

        Find Knowledge Gaps Through Question Review 860

        Practice Hands-On CLI Skills 862

        Assess Whether You Are Ready to Pass (and the Fallacy of Exam Scores) 864

        Study Suggestions After Failing to Pass 865

        Other Study Tasks 866

        Final Thoughts 866

    Part XI Appendixes 869

    Appendix A Numeric Reference Tables 870

    Appendix B CCENT/CCNA ICND1 100-105 Exam Updates 876

    Glossary 878

    DVD Appendixes

    Appendix C Answers to the Review Questions

    Appendix D Practice for Chapter 14: Analyzing Classful IPv4 Networks

    Appendix E Practice for Chapter 15: Analyzing Subnet Masks

    Appendix F Practice for Chapter 16: Analyzing Existing Subnets

    Appendix G Practice for Chapter 21: Subnet Design

    Appendix H Practice for Chapter 22: Variable-Length Subnet Masks

    Appendix I Practice for Chapter 25: Basic IPv4 Access Control Lists

    Appendix J Practice for Chapter 28: Fundamentals of IP Version 6

    Appendix K Practice for Chapter 30: Implementing IPv6 Addressing on Routers

    Appendix L Mind Map Solutions

    Appendix M Study Planner

    Appendix N Classless Inter-domain Routing

    Appendix O Route Summarization

    Appendix P Implementing Point-to-Point WANs

    Appendix Q Topics from Previous Editions

    Appendix R Exam Topics Cross Reference

    9781587205972   TOC   5/17/2016

    Updates

    Submit Errata

    More Information

    Pearson IT Certification Promotional Mailings & Special Offers

    I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

    Overview


    Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

    This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

    Collection and Use of Information


    To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

    Questions and Inquiries

    For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

    Online Store

    For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

    Surveys

    Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

    Contests and Drawings

    Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

    Newsletters

    If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

    Service Announcements

    On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

    Customer Service

    We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

    Other Collection and Use of Information


    Application and System Logs

    Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

    Web Analytics

    Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

    Cookies and Related Technologies

    This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

    Do Not Track

    This site currently does not respond to Do Not Track signals.

    Security


    Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

    Children


    This site is not directed to children under the age of 13.

    Marketing


    Pearson may send or direct marketing communications to users, provided that

    • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
    • Such marketing is consistent with applicable law and Pearson's legal obligations.
    • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
    • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

    Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

    Correcting/Updating Personal Information


    If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

    Choice/Opt-out


    Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

    Sale of Personal Information


    Pearson does not rent or sell personal information in exchange for any payment of money.

    While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

    Supplemental Privacy Statement for California Residents


    California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

    Sharing and Disclosure


    Pearson may disclose personal information, as follows:

    • As required by law.
    • With the consent of the individual (or their parent, if the individual is a minor)
    • In response to a subpoena, court order or legal process, to the extent permitted or required by law
    • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
    • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
    • To investigate or address actual or suspected fraud or other illegal activities
    • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
    • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
    • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

    Links


    This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

    Requests and Contact


    Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

    Changes to this Privacy Notice


    We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

    Last Update: November 17, 2020