ICND 1 :
Chapter 2 The TCP/IP and OSI Networking Models
Comparing OSI and TCP/IP
Chapter 6 Fundamentals of TCP/IP Transport, Applications, and Security
Foundation Topics
TCP/IP Layer 4 Protocols: TCP and UDP
Transmission Control Protocol
Multiplexing Using TCP Port Numbers
Popular TCP/IP Applications
Error Recovery (Reliability)
Flow Control Using Windowing
Connection Establishment and Termination
Data Segmentation and Ordered Data Transfer
User Datagram Protocol
TCP/IP Applications
QoS Needs and the Impact of TCP/IP Applications
The World Wide Web, HTTP, and SSL
Universal Resource Locators
Finding the Web Server Using DNS
Transferring Files with HTTP
Network Security
Perspectives on the Sources and Types of Threats
Firewalls and the Cisco Adaptive Security Appliance (ASA)
Anti-x
Intrusion Detection and Prevention
Virtual Private Networks (VPN)
Part II LAN Switching
Chapter 7 Ethernet LAN Switching Concepts
Foundation Topics
LAN Switching Concepts
Historical Progression: Hubs, Bridges, and Switches
Switching Logic
The Forward Versus Filter Decision
How Switches Learn MAC Addresses
Flooding Frames
Avoiding Loops Using Spanning Tree Protocol
Internal Processing on Cisco Switches
LAN Switching Summary
LAN Design Considerations
Collision Domains and Broadcast Domains
Collision Domains
Broadcast Domains
The Impact of Collision and Broadcast Domains on LAN Design
Virtual LANs (VLAN)
Campus LAN Design Terminology
Ethernet LAN Media and Cable Lengths
Chapter 8 Operating Cisco LAN Switches
Foundation Topics
Accessing the Cisco Catalyst 2960 Switch CLI
Cisco Catalyst Switches and the 2960 Switch
Switch Status from LEDs
Accessing the Cisco IOS CLI
CLI Access from the Console
Accessing the CLI with Telnet and SSH
Password Security for CLI Access
User and Enable (Privileged) Modes
CLI Help Features
The debug and show Commands
Configuring Cisco IOS Software
Configuration Submodes and Contexts
Storing Switch Configuration Files
Copying and Erasing Configuration Files
Initial Configuration (Setup Mode)
Chapter 9 Ethernet Switch Configuration
Foundation Topics
Configuration of Features in Common with Routers
Securing the Switch CLI
Configuring Simple Password Security
Configuring Usernames and Secure Shell (SSH)
Password Encryption
The Two Enable Mode Passwords
Console and vty Settings
Banners
History Buffer Commands
The logging synchronous and exec-timeout Commands
LAN Switch Configuration and Operation
Configuring the Switch IP Address
Configuring Switch Interfaces
Port Security
VLAN Configuration
Securing Unused Switch Interfaces
Chapter 10 Ethernet Switch Troubleshooting
Interface Speed and Duplex Issues
Common Layer 1 Problems on Working Interfaces
Analyzing the Layer 2 Forwarding Path with the MAC Address Table
Analyzing the Forwarding Path
Port Security and Filtering
Chapter 11 Wireless LANs
Wireless LAN Standards
Modes of 802.11 Wireless LANs
Wireless Encoding and Nonoverlapping DSSS Channels
Wireless Interference
Coverage Area, Speed, and Capacity
Media Access (Layer 2)
Deploying WLANs
Wireless LAN Security
WLAN Security Issues
The Progression of WLAN Security Standards
Wired Equivalent Privacy (WEP)
SSID Cloaking and MAC Filtering
The Cisco Interim Solution Between WEP and 802.11i
Wi-Fi Protected Access (WPA)
Chapter 13 Operating Cisco Routers
“Foundation Topics
Installing Cisco Routers
Installing Enterprise Routers
Cisco Integrated Services Routers
Physical Installation
Installing Internet Access Routers
A SOHO Installation with a Separate Switch, Router, and
Cable Modem
A SOHO Installation with an Integrated Switch, Router, and
DSL Modem
Regarding the SOHO Devices Used in This Book
Cisco Router IOS CLI
Comparisons Between the Switch CLI and Router CLI
Router Interfaces
Interface Status Codes
Router Interface IP Addresses
Bandwidth and Clock Rate on Serial Interfaces
Router Auxiliary (Aux) Port
Initial Configuration (Setup Mode)
Upgrading Cisco IOS Software and the Cisco IOS Software Boot Process
Upgrading a Cisco IOS Software Image into Flash Memory
The Cisco IOS Software Boot Sequence
The Three Router Operating Systems
The Configuration Register
How a Router Chooses Which OS to Load
The show version Command and Seeing the Configuration Register’sValue
Chapter 14 Routing Protocol Concepts and Configuration
Foundation Topics
Connected and Static Routes
Connected Routes
Static Routes
Extended ping Command
Default Routes
Routing Protocol Overview
RIP-2 Basic Concepts
Comparing and Contrasting IP Routing Protocols
Interior and Exterior Routing Protocols
Routing Protocol Types/Algorithms
Metrics
Auto summarization and Manual Summarization
Classless and Classful Routing Protocols
Convergence
Miscellaneous Comparison Points
Summary of Interior Routing Protocols
Configuring and Verifying RIP-2
RIP-2 Configuration
Sample RIP Configuration
RIP-2 Verification
Interpreting the Output of the show ip route Command
Administrative Distance
The show ip protocols Command
Examining RIP Messages with debug
Chapter 17 WAN Configuration
Foundation Topics
Configuring Point-to-Point WANs
Configuring HDLC
Configuring PPP
Configuring and Troubleshooting Internet Access Routers
Internet Access Router: Configuration Steps
ICND 2
Chapter 1 Spanning Tree Protocol Concepts
Foundation Topics
LAN Switching Review
LAN Switch Forwarding Logic
Switch Verification
Viewing the MAC Address Table
Determining the VLAN of a Frame
Verifying Trunks
Spanning Tree Protocol (IEEE 802.1D)
The Need for Spanning Tree
What IEEE 802.1D Spanning Tree Does
How Spanning Tree Works
The STP Bridge ID and Hello BPDU
Electing the Root Switch
Choosing Each Switch’s Root Port
Choosing the Designated Port on Each LAN Segment
Influencing and Changing the STP Topology
Making Configuration Changes to Influence the STP Topology
Reacting to State Changes That Affect the STP Topology
How Switches React to Changes with STP
Changing Interface States with STP
Optional STP Features
EtherChannel
PortFast
BPDU Guard
Rapid STP (IEEE 802.1w)
Chapter 2 Spanning Tree Protocol Implementation
Foundation Topics
STP Configuration and Verification
Setting the STP Mode
Connecting STP Concepts to STP Configuration Options
Per-VLAN Configuration Settings
The Bridge ID and System ID Extension
Per-VLAN Port Costs
STP Configuration Option Summary
Verifying STP Operation
Configuring STP Port Costs
Configuring Priority to Influence the Root Election
Configuring PortFast and BPDU Guard
Configuring EtherChannel
Configuring a Manual EtherChannel
Configuring Dynamic EtherChannels
STP Troubleshooting
Determining the Root Switch
Determining the Root Port on Nonroot Switches
STP Tiebreakers When Choosing the Root Port
Suggestions for Attacking Root Port Problems on the Exam
Determining the Designated Port on Each LAN Segment
Suggestions for Attacking Designated Port Problems on the Exam
STP Convergence
Troubleshooting EtherChannel
Incorrect Options on the channel-group Command
Configuration Checks Before Adding Interfaces to EtherChannels
Chapter 6 Creating Redundant First-Hop Routers
Foundation Topics
FHRP Concepts
The Need for Redundancy in Networks
The Need for a First Hop Redundancy Protocol
The Three Solutions for First-Hop Redundancy
HSRP Concepts
HSRP Failover
HSRP Load Balancing
GLBP Concepts
FHRP Configuration and Verification
Configuring and Verifying HSRP
Configuring and Verifying GLBP
Chapter 7 Virtual Private Networks
Foundation Topics
VPN Fundamentals
IPsec VPNs
SSL VPNs
GRE Tunnels
GRE Tunnel Concepts
Routing over GRE Tunnels
GRE Tunnels over the Unsecured Network
Configuring GRE Tunnels
Verifying a GRE Tunnel
Part III: IP Version 4 Routing Protocols
Chapter 8 Implementing OSPF for IPv4
Foundation Topics
OSPF Protocols and Operation
OSPF Overview
Becoming Neighbors and Exchanging the LSDB
Agreeing to Become Neighbors
Fully Exchanging LSAs with Neighbors
Maintaining Neighbors and the LSDB
Using Designated Routers on Ethernet Links
Scaling OSPF Using Areas
OSPF Areas
How Areas Reduce SPF Calculation Time
OSPF Area Design Advantages
Link-State Advertisements
Router LSAs Build Most of the Intra-Area Topology
Network LSAs Complete the Intra-Area Topology
LSAs in a Multi-Area Design
Calculating the Best Routes with SPF
Administrative Distance
OSPF Configuration and Verification
OSPFv2 Configuration Overview
Multi-Area OSPFv2 Configuration Example
Single-Area Configurations
Multi-Area Configuration
Verifying the Multi-Area Configuration
Verifying the Correct Areas on Each Interface on an ABR
Verifying Which Router Is DR and BDR
Verifying the Number and Type of LSAs
Verifying OSPF Routes
OSPF Metrics (Cost)
Setting the Cost Based on Interface Bandwidth
The Need for a Higher Reference Bandwidth
OSPF Load Balancing
Chapter 9 Understanding EIGRP Concepts
Foundation Topics
EIGRP and Distance Vector Routing Protocols
Introduction to EIGRP
Basic Distance Vector Routing Protocol Features
The Concept of a Distance and a Vector
Full Update Messages and Split Horizon
Route Poisoning
EIGRP as an Advanced DV Protocol
EIGRP Sends Partial Update Messages, As Needed
EIGRP Maintains Neighbor Status Using Hello
Summary of Interior Routing Protocol Features
EIGRP Concepts and Operation
EIGRP Neighbors
Exchanging EIGRP Topology Information
Calculating the Best Routes for the Routing Table
The EIGRP Metric Calculation
An Example of Calculated EIGRP Metrics
Caveats with Bandwidth on Serial Links
EIGRP Convergence
Feasible Distance and Reported Distance
EIGRP Successors and Feasible Successors
The Query and Reply Process
Chapter 10 Implementing EIGRP for IPv4
Foundation Topics
Core EIGRP Configuration and Verification
EIGRP Configuration
Configuring EIGRP Using a Wildcard Mask
Verifying EIGRP Core Features
Finding the Interfaces on Which EIGRP is Enabled
Displaying EIGRP Neighbor Status
Displaying the IPv4 Routing Table
EIGRP Metrics, Successors, and Feasible Successors
Viewing the EIGRP Topology Table
Finding Successor Routes
Finding Feasible Successor Routes
Convergence Using the Feasible Successor Route
Examining the Metric Components
Other EIGRP Configuration Settings
Load Balancing Across Multiple EIGRP Routes
Tuning the EIGRP Metric Calculation
Autosummarization and DiscontiguousClassful Networks
Automatic Summarization at the Boundary of a Classful Network
DiscontiguousClassful Networks
Chapter 12 Implementing Point-to-Point WANs
Foundation Topics
Leased Line WANs with HDLC
Layer 1 Leased Lines
The Physical Components of a Leased Line
Leased Lines and the T-Carrier System
The Role of the CSU/DSU
Building a WAN Link in a Lab
Layer 2 Leased Lines with HDLC
Configuring HDLC
Leased-Line WANs with PPP
PPP Concepts
PPP Framing
PPP Control Protocols
PPP Authentication
Configuring PPP
CHAP Configuration and Verification
Troubleshooting Serial Links
Troubleshooting Layer 1 Problems
Troubleshooting Layer 2 Problems
Keepalive Failure
PAP and CHAP Authentication Failure
Troubleshooting Layer 3 Problems
Chapter 14 Implementing Frame Relay
Foundation Topics
Frame Relay Configuration and Verification
Planning a Frame Relay Configuration
Configuring Using Physical Interfaces and One IP Subnet
Configuring the Encapsulation and LMI
Frame Relay Address Mapping
Configuring Point-to-Point Subinterfaces
Configuring with Multipoint Subinterfaces
OSPF Issues on Frame Relay Multipoint and Physical Interfaces
Frame Relay Troubleshooting
A Suggested Frame Relay Troubleshooting Process
Layer 1 Issues on the Access Link (Step 1)
Layer 2 Issues on the Access Link (Step 2)
PVC Problems and Status (Step 3)
Frame Relay Mapping Issues (Step 4)
End-to-End Encapsulation (Step 5)
Mismatched Subnet Numbers (Step 6)
Chapter 15 Identifying Other Types of WANs
Foundation Topics
Private WANs to Connect Enterprises
Leased Lines
Frame Relay
Ethernet WANs
MPLS
VSAT
Public WANs and Internet Access
Internet Access (WAN) Links
Dial Access with Modems and ISDN
Digital Subscriber Line
Cable Internet
Mobile Phone Access with 3G/4G
PPP over Ethernet
Part V: IP Version 6
Chapter 17 Implementing OSPF for IPv6
Foundation Topics
OSPFv3 Configuration
OSPFv3 ICND1 Configuration Review
Example Multi-Area OSPFv3 Configuration
Single Area Configuration on the Three Internal Routers
Adding Multi-Area Configuration on the Area Border Router
Other OSPFv3 Configuration Settings
Setting OSPFv3 Interface Cost to Influence Route Selection
OSPF Load Balancing
Injecting Default Routes
OSPF Concepts, Verification, and Troubleshooting
OSPFv3 Interfaces
Verifying OSPFv3 Interfaces
Troubleshooting OSPFv3 Interfaces
OSPFv3 Neighbors
Verifying OSPFv3 Neighbors
Troubleshooting OSPFv3 Neighbors
OSPFv3 LSDB and LSAs
Verifying OSPFv3 LSAs
Troubleshooting OSPFv3 LSAs
OSPFv3 Metrics and IPv6 Routes
Verifying OSPFv3 Interface Cost and Metrics
Troubleshooting IPv6 Routes Added by OSPFv3
Chapter 18 Implementing EIGRP for IPv6
Foundation Topics
EIGRPv6 Configuration
EIGRPv6 Configuration Basics
EIGRPv6 Configuration Example
Other EIGRPv6 Configuration Settings
Setting Bandwidth and Delay to Influence EIGRPv6 Route Selection
EIGRP Load Balancing
EIGRP Timers
EIGRPv6 Concepts, Verification, and Troubleshooting
EIGRPv6 Interfaces
EIGRPv6 Neighbors
EIGRPv6 Topology Database
EIGRPv6 IPv6 Routes
Part VI: Network Management
Chapter 19 Managing Network Devices
Foundation Topics
Simple Network Management Protocol
Describing SNMP
The Management Information Base
Configuring SNMP Version 2c
SNMP Version 3
System Message Logging (Syslog)
An Overview of System Message Logging
System Message Format
System Message Severity Levels
Configuring and Verifying Syslog
Using a Syslog Server
NetFlow
An Overview of NetFlow
Network Flows
Configuring NetFlow
Verifying and Using NetFlow
The NetFlow Collector
Chapter 20 Managing IOS Files
Foundation Topics
Managing Cisco IOS Files
Upgrading a Cisco IOS Software Image into Flash Memory
The Cisco IOS Software Boot Sequence
The Three Router Operating Systems
The Configuration Register
How a Router Chooses Which OS to Load
Recovering If the IOS Does Not Load
Verifying the IOS Image Using the show version Command
Password Recovery
The General Ideas Behind Cisco Password Recovery/Reset
A Specific Password Reset Example
Managing Configuration Files
Configuration File Basics
Copying and Erasing Configuration Files
Initial Configuration (Setup Mode)