Home > Store

CCNA 200-301 Portable Command Guide, 5th Edition

CCNA 200-301 Portable Command Guide, 5th Edition

eBook (Watermarked)

  • Your Price: $25.59
  • List Price: $31.99
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2020
  • Edition: 5th
  • eBook (Watermarked)
  • ISBN-10: 0-13-593770-1
  • ISBN-13: 978-0-13-593770-9

CCNA 200-301 Portable Command Guide is filled with valuable, easy-to-access information–and it’s portable enough to use whether you’re in the server room or the equipment closet.



The guide summarizes all CCNA certification-level Cisco IOS Software commands, keywords, command arguments, and associated prompts, providing you with tips and examples of how to apply the commands to real-world scenarios. Throughout, configuration examples give you a better understanding of how these commands are used in simple network designs.



This book has been completely updated to cover topics in the new 200-301 exam. Use this quick reference resource to help you memorize commands and concepts as you work to pass the CCNA certification exam. Coverage includes


·         Network Fundamentals: IPv4 addressing, subnetting, VLSM, route summarization, IPv6 addressing, cables/connections, CLI

·         LAN Switching Technologies: Switch configuration, VLANs, VLAN trunking protocol, inter-VLAN communication, STP, EtherChannel, CDP, LLDP

·         Routing Technologies: Router configuration, static routing, OSPF

·         IP Services: DHCP, NAT, NTP

·         Security Fundamentals: Layer 2 security, ACL traffic management, device monitoring and hardening

·         Wireless Technologies: Configuring and securing a WLAN AP


·         Quick, offline access to all CCNA commands for research and solutions

·         Logical how-to topic groupings for a one-stop resource

·         Great for review before CCNA certification exams

·         Compact size makes it easy to carry with you wherever you go

·         “Create Your Own Journal” section with blank, lined pages enables you to personalize the book for your needs



This book is part of the Cisco Press Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Sample Content

Sample Pages

Download the sample pages (includes Chapter 4)

Table of Contents

Introduction xix

Part I: Network Fundamentals

CHAPTER 1 IPv4 Addressing–How It Works 1

What Are IPv4 Addresses Used For? 1

What Does an IPv4 Address Look Like? 2

Network and Subnetwork Masks 2

Ways to Write a Network or Subnet Mask 3

Network, Node, and Broadcast Addresses 3

Classes of IPv4 Addresses 4

    Network vs. Node (Host) Bits 5

    RFC (Private) 1918 Addresses 6

    Local vs. Remote Addresses 7

Classless Addressing 7

Lessons Learned 9

CHAPTER 2 How to Subnet IPv4 Addresses 11

Subnetting a Class C Network Using Binary 12

Subnetting a Class B Network Using Binary 15

Binary ANDing 17

    So Why AND? 19

    Shortcuts in Binary ANDing 20

CHAPTER 3 Variable Length Subnet Masking (VLSM) 23

IP Subnet Zero 23

VLSM Example 24

    Step 1: Determine How Many H Bits Will Be Needed to Satisfy the Largest Network 25

    Step 2: Pick a Subnet for the Largest Network to Use 25

    Step 3: Pick the Next Largest Network to Work With 26

    Step 4: Pick the Third Largest Network to Work With 28

    Step 5: Determine Network Numbers for Serial Links 30

CHAPTER 4 Route Summarization 33

Example for Understanding Route Summarization 33

    Step 1: Summarize Winnipeg’s Routes 34

    Step 2: Summarize Calgary’s Routes 35

    Step 3: Summarize Edmonton’s Routes 35

    Step 4: Summarize Vancouver’s Routes 36

Route Summarization and Route Flapping 38

Requirements for Route Summarization 38

CHAPTER 5 IPv6 Addressing–How It Works 39

IPv6: A Very Brief Introduction 39

What Does an IPv6 Address Look Like? 40

Reducing the Notation of an IPv6 Address 41

    Rule 1: Omit Leading 0s 41

    Rule 2: Omit All-0s Hextet 42

    Combining Rule 1 and Rule 2 42

Prefix Length Notation 43

IPv6 Address Types 44

    Unicast Addresses 45

    Multicast Addresses 48

    Anycast Addresses 50

CHAPTER 6 Cables and Connections 51

Connecting a Rollover Cable to Your Router or Switch 51

Using a USB Cable to Connect to Your Router or Switch 51

Terminal Settings 52

LAN Connections 53

Serial Cable Types 53

Which Cable to Use? 55

ANSI/TIA Cabling Standards 56

    T568A Versus T568B Cables 57

CHAPTER 7 The Command-Line Interface 59

Shortcuts for Entering Commands 59

Using the Tab Key to Complete Commands 60

Console Error Messages 60

Using the Question Mark for Help 60

enable Command 61

exit Command 61

end Command 61

disable Command 61

logout Command 62

Setup Mode 62

Keyboard Help 62

History Commands 63

terminal Commands 64

show Commands 64

Using the Pipe Parameter ( | ) with the show or more Commands 64

Using the no and default Forms of Commands 66

Part II: LAN Switching Technologies

CHAPTER 8 Configuring a Switch 67

Help Commands 68

Command Modes 68

Verifying Commands 68

Resetting Switch Configuration 69

Setting Host Names 69

Setting Passwords 69

Setting IP Addresses and Default Gateways 70

Setting Interface Descriptions 70

The mdix auto Command 70

Setting Duplex Operation 71

Setting Operation Speed 71

Managing the MAC Address Table 72

Configuration Example 72

CHAPTER 9 VLANs 75

Creating Static VLANs 75

    Creating Static VLANs Using VLAN Configuration Mode 75

Assigning Ports to VLANs 76

Using the range Command 76

Configuring a Voice VLAN 76

    Configuring Voice and Data with Trust 77

    Configuring Voice and Data Without Trust 78

Verifying VLAN Information 78

Saving VLAN Configurations 79

Erasing VLAN Configurations 79

Configuration Example: VLANs 80

    2960 Switch 80

CHAPTER 10 VLAN Trunking Protocol and Inter-VLAN Communication 83

Dynamic Trunking Protocol (DTP) 83

Setting the VLAN Encapsulation Type 84

VLAN Trunking Protocol (VTP) 84

Verifying VTP 86

Inter-VLAN Communication Using an External Router: Router-on-a-Stick 87

Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface 88

    Removing L2 Switchport Capability of an Interface on an L3 Switch 88

    Configuring Inter-VLAN Communication on an L3 Switch 88

Inter-VLAN Communication Tips 88

Configuration Example: Inter-VLAN Communication 89

    ISP Router 89

    CORP Router 90

    L2Switch2 (Catalyst 2960) 92

    L3Switch1 (Catalyst 3560/3650/3750) 94

    L2Switch1 (Catalyst 2960) 95

CHAPTER 11 Spanning Tree Protocol 97

Spanning Tree Protocol Definition 97

Enabling Spanning Tree Protocol 98

Changing the Spanning-Tree Mode 99

    BPDU Guard (3650/9xxx Series) 99

Configuring the Root Switch 100

Configuring a Secondary Root Switch 100

Configuring Port Priority 100

Configuring the Path Cost 101

Configuring the Switch Priority of a VLAN 101

Configuring STP Timers 102

Configuring Optional Spanning-Tree Features 102

    PortFast 102

    BPDU Guard (2xxx/Older 3xxx Series) 103

Enabling the Extended System ID 103

Verifying STP 104

Troubleshooting Spanning Tree Protocol 104

Configuration Example: PVST+ 104

    Core Switch (3650) 105

    Distribution 1 Switch (3650) 106

    Distribution 2 Switch (3650) 106

    Access 1 Switch (2960) 107

    Access 2 Switch (2960) 107

Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ 108

    Access 1 Switch (2960) 108

    Access 2 Switch (2960) 108

    Distribution 1 Switch (3650) 109

    Distribution 2 Switch (3650) 109

    Core Switch (3650) 109

CHAPTER 12 EtherChannel 111

EtherChannel 111

    Interface Modes in EtherChannel 111

    Default EtherChannel Configuration 112

    Guidelines for Configuring EtherChannel 112

    Configuring Layer 2 EtherChannel 113

    Configuring Layer 3 EtherChannel 114

    Configuring EtherChannel Load Balancing 114

    Configuring LACP Hot-Standby Ports 115

    Monitoring and Verifying EtherChannel 116

Configuration Example: EtherChannel 117

    DLSwitch (3560 or 9300) 117

    ALSwitch1 (2960 or 9200) 118

    ALSwitch2 (2960 or 9200) 119

CHAPTER 13 Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP) 121

Cisco Discovery Protocol 121

Configuring CDP 121

Verifying and Troubleshooting CDP 122

CDP Design Tips 122

Link Layer Discovery Protocol (802.1AB) 123

Configuring LLDP (802.1AB) 123

Verifying and Troubleshooting LLDP 124

Part III: Routing Technologies

CHAPTER 14 Configuring a Cisco Router 125

Router Modes 126

Entering Global Configuration Mode 126

Configuring a Router Name 126

Configuring Passwords 126

Password Encryption 127

Interface Names 127

Moving Between Interfaces 131

Configuring a Serial Interface 132

Assigning an IPv4 Address to a Fast Ethernet Interface 132

Assigning an IPv4 Address to a Gigabit Ethernet Interface 132

Assigning IPv6 Addresses to Interfaces 133

Creating a Message-of-the-Day Banner 133

Creating a Login Banner 134

Mapping a Local Host Name to a Remote IP Address 134

The no ip domain-lookup Command 134

    Working with DNS on a Router 134

The logging synchronous Command 135

The exec-timeout Command 136

Saving Configurations 136

Erasing Configurations 136

The write Command 137

Verifying Your Configurations Using show Commands 137

EXEC Commands in Configuration Mode: The do Command 138

Configuration Example: Basic Router Configuration 138

    Boston Router 138

CHAPTER 15 Static Routing 141

Configuring an IPv4 Static Route 141

Static Routes and Recursive Lookups 142

The permanent Keyword 142

Floating Static Routes in IPv4 and Administrative Distance 143

Configuring an IPv4 Default Route 144

Verifying IPv4 Static Routes 144

Configuration Example: IPv4 Static Routes 144

    Ketchikan Router 145

    Juneau Router 145

    Sitka Router 146

Configuring an IPv6 Static Route 146

Floating Static Routes in IPv6 147

Configuring an IPv6 Default Route 147

Verifying IPv6 Static Routes 147

CHAPTER 16 Open Shortest Path First (OSPF) 149

OSPFv2 Versus OSPFv3 149

Configuring OSPF 150

Using Wildcard Masks with OSPF Areas 150

Loopback Interfaces 152

Router ID 152

DR/BDR Elections 153

Timers 153

Verifying OSPFv2 Configurations 153

Troubleshooting OSPFv2 154

Configuration Example: Single-Area OSPF 154

    Austin Router 155

    Houston Router 156

    Galveston Router 157

Part IV: IP Services

CHAPTER 17 DHCP 159

Configuring a DHCP Server on an IOS Router 159

Using Cisco IP Phones with a DHCP Server 160

Verifying and Troubleshooting DHCP Configuration 160

Configuring a DHCP Helper Address 161

Configuring a DHCP Client on a Cisco IOS Software Ethernet Interface 162

Configuration Example: DHCP 162

    Edmonton Router 162

    Gibbons Router 164

CHAPTER 18 Network Address Translation (NAT) 165

Private IP Addresses: RFC 1918 165

Configuring Dynamic NAT: One Private to One Public Address Translation 165

Configuring PAT: Many Private to One Public Address Translation 167

Configuring Static NAT: One Private to One Permanent Public Address Translation 169

Verifying NAT and PAT Configurations 170

Troubleshooting NAT and PAT Configurations 171

Configuration Example: PAT 171

    ISP Router 171

    Company Router 172

CHAPTER 19 Configuring Network Time Protocol (NTP) 175

NTP Configuration 175

NTP Design 176

Securing NTP 177

    Enabling NTP Authentication 177

    Limiting NTP Access with Access Lists 178

Verifying and Troubleshooting NTP 178

Setting the Clock on a Router 179

Using Time Stamps 182

Configuration Example: NTP 182

    Core1 Router 183

    Core2 Router 184

    DLSwitch1 185

    DLSwitch2 185

    ALSwitch1 186

    ALSwitch2 186

Part V: Security Fundamentals

CHAPTER 20 Layer Two Security Features 187

Setting Passwords on a Switch 187

Configuring Static MAC Addresses 188

Configuring Switch Port Security 188

Configuring Sticky MAC Addresses 189

Verifying Switch Port Security 189

Recovering Automatically from Error-Disabled Ports 190

Verifying Autorecovery of Error-Disabled Ports 190

Configuring DHCP Snooping 191

    Verifying DHCP Snooping 192

Configuring Dynamic ARP Inspection (DAI) 193

    Verifying Dynamic ARP Inspection 193

Configuration Example: Switch Security 194

CHAPTER 21 Managing Traffic Using Access Control Lists (ACLs) 197

Access List Numbers 197

Using Wildcard Masks 198

ACL Keywords 198

Creating Standard ACLs 198

Applying Standard ACLs to an Interface 199

Verifying ACLs 200

Removing ACLs 200

Creating Extended ACLs 200

Applying Extended ACLs to an Interface 201

The established Keyword 201

The log Keyword 202

Creating Named ACLs 203

Using Sequence Numbers in Named ACLs 203

Removing Specific Lines in Named ACLs Using Sequence Numbers 204

Sequence Number Tips 204

Including Comments About Entries in ACLs 205

Restricting Virtual Terminal Access 206

Tips for Configuring ACLs 206

IPv6 ACLs 207

Verifying IPv6 ACLs 207

Configuration Examples: IPv4 ACLs 208

Configuration Examples: IPv6 ACLs 210

CHAPTER 22 Device Monitoring and Hardening 213

Device Monitoring 213

Configuration Backups 213

Implementing Logging 214

    Configuring Syslog 215

    Syslog Message Format 215

    Syslog Severity Levels 216

    Syslog Message Example 216

Device Hardening 217

    Configuring Passwords 217

    Password Encryption 218

    Password Encryption Algorithm Types 218

    Configuring SSH 219

    Verifying SSH 220

    Restricting Virtual Terminal Access 220

    Disabling Unneeded Services 221

Part VI: Wireless Technologies

CHAPTER 23 Configuring and Securing a WLAN AP 223

Initial Setup of a Wireless LAN Controller (WLC) 223

Monitoring the WLC 229

Configuring a VLAN (Dynamic) Interface 230

Configuring a DHCP Scope 234

Configuring a WLAN 237

Defining a RADIUS Server 239

Exploring Management Options 242

Configuring a WLAN Using WPA2 PSK 246

Part VII: Appendices

APPENDIX A How to Count in Decimal, Binary, and Hexadecimal 251

How to Count in Decimal 251

How to Count in Binary 253

How to Count in Hexadecimal 254

Representing Decimal, Binary, and Hexadecimal Numbers 256

APPENDIX B How to Convert Between Number Systems 259

How to Convert from Decimal to Binary 259

How to Convert from Binary to Decimal 260

How to Convert from Decimal IP Addresses to Binary and from Binary IP Addresses to Decimal 261

    A Bit of Perspective 262

How to Convert from Hexadecimal to Binary 262

How to Convert from Binary to Hexadecimal 263

How to Convert from Decimal to Hexadecimal 264

How to Convert from Hexadecimal to Decimal 265

APPENDIX C Binary/Hex/Decimal Conversion Chart 267

APPENDIX D Create Your Own Journal Here 275

9780135937822    TOC   10/31/2019

Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (45 KB .doc)

Submit Errata

More Information

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020