Cisco Training Description:
This five-day course will help you better understand how networking is defined, implemented, and supported in the real world. It provides a Cisco-specific network perspective so that you are able to understand and prepare for the Cisco 640-802 exam as well as the ICND1 640-822 and ICND2 640-816 exams.
Cisco Training Audience:
Students who are working toward CCNA certification.
Cisco Training Prerequisites:
A basic understanding of network architecture and protocols is required.
Cisco Training Course duration:
5 Days
Cisco Training Course outline:
The Cisco Router and Switch Interface Security
- Router Power-On/Bootup Sequence
- Router Interfaces
- Cisco IOS Software EXEC
- Logging into the Router
- Router Context-Sensitive Help
- Using Enhanced Editing
- Router Command History
- Break Sequences
- Router Components
- show version Command
- Configuration-Register
- Viewing the Configuration
- Setup Mode
- Configuring the Router
- Router Modes
- Saving Configurations
- Restoring Configurations
- Administrative Functions
- Configuring Router Identification
- Configuring Interface Description
- Do the “do”
- Console/Aux Password Configuration
- Other Console Line Commands
- Telnet VTY Password
- Telnet versus SSH Access
- Secure Shell
- Verifying SSH
- Enable Passwords
- Encrypting your Passwords
- Configuring an Interface
- Adding IP Addresses
- Serial Interface Clocking
- Configuring a Serial Interface
- Disabling or Enabling an Interface
- Verifying Your Changes
- Interpreting Interface Status
- Show ip interface brief
- Erasing NVRAM on a Router
- Catalyst Switches
- Hubs (Physical)
- Switches/Bridges (Layer 2)
- Switches Supersede Bridges
- LAN Switch Features
- Three Switch Functions
- Learning Host Locations
- How Switches Filter Frames
- Broadcast and Multicast Frames
- show mac-address-table
- Connecting Switches Together
- Do switches need an IP Address?
- What is the Default Gateway Address for the Hosts?
- Configuring the Switch IP Address
- show running-config
Advanced IOS Management
- Router as a Computer
- Router Boot Cycle
- Finding the Cisco IOS Image
- Loading the Cisco IOS Image from Flash Memory
- show flash command
- Determining the Current Configuration Register Value (show version command)
- Backing up/Restoring the Cisco IOS and Configuration
- Copy IOS to TFTP Server
- Copy TFTP Flash
- Cisco IOS copy Command
- Loading the Configuration
- show and debug Commands
- Considerations When Using debug Commands
- Commands Related to debug
- Backing up the Configuration
- Fallback
- ROM Monitor Mode
- Auto-Install
- Making Your Router a TFTP Server
- Making Your Router a DHCP Server
- Cisco Discovery Protocol
- show cdp neighbors
- Telnet
- Resolving Host Names
- Basic Testing
- Show/ping/traceroute
- Troubleshooting LAN Connectivity Problems
- IP Troubleshooting
IP Addressing & Subnetting
- IPv4 Addressing
- Binary to Decimal Conversion
- Math to Memorize!
- Powers of 3
- IP Addressing
- IP Address Classes
- IP Address Ranges
- Addressing without Subnets
- Addressing with Subnets
- Subnet Masks
- How do you Determine the Mask to Use?
- After you Choose a Possible Subnet Mask…
- Once you Find your Mask…
- CIDR
- IP Subnet-Zero
- Easy Subnetting
- Very Easy Subnetting
- What can the Host Address be?
- What is the Host IP and Default Gateway Address?
- What Class C Mask can you use to Achieve the Maximum Amount of Hosts per Network?
IP Routing
- What is Routing?
- Basic Path Selection
- Longest Match Rule
- Simple IP Routing
- show ip arp
- Static and Dynamic Routes
- Static Routes
- Static Route Configuration
- Default Routes
- Routing Loops
- What is Routing Protocol?
- Dynamic Routing Protocols
- Routing Protocols
- Classful Routing Overview
- Classless Routing Overview
- Classes of Routing Protocols
- Administrative Distance (AD)
- Distance Vector Metrics
- Distance Vector
- Discovering Routes
- Routing Loops
- Symptom: Counting to Infinity
- Solution: Defining a Maximum
- Solution: Split Horizon
- Solution: Route Poisoning
- Solution: Poison Reverse
- Holddown Timers
- RIP Overview
- RIP Routing Configuration
- RIP Version 2
- RIPv1 vs. RIPv2
- Discontiguous Addressing
- Passive Interface
- Verifying RIP
- Verifying the RIP Configuration
- Displaying the IP Routing Table
- debug ip rip Command
- What is Enhanced IGRP (EIGRP)?
- Balanced Hybrid Routing
- EIGRP for IP
- EIGRP Terminology
- EIGRP Tables
- Successor Routes
- EIGRP Convergence
- Choosing Routes
- Configuring EIGRP for IP
- EIGRP Load Balancing
- Route Path
- Verifying Enhanced IGRP Operation
- Verifying EIGRP
- Show IP Route
- show ip eigrp topology
- show ip protocols
- Introducing OSPF
- OSPF Overview
- OSPF Hierarchical Routing
- OSPF in a Hierarchical Design
- Neighbor Adjacencies: The Hello Packet
- Link State vs. Distance Vector
- SPF Algorithm
- Types of OSPF Routers
- OSPF Concepts
- Configuring Single Area OSPF
- Verifying the OSPF Configuration
- Load Balancing with OSPF
- OSPF debug Commands
- OSPF Neighbors
- Router ID (RID)
- Electing the DR and BDR
- show ip ospf neighbors
- OSPF Network Types
- Configuring Loopback Interfaces
- Interface Priorities
- Ensuring your DR
- OSPF Link Costs
- Configuring Wildcards
- Wildcard
- Troubleshooting OSPF
Advanced TCP/IP
- Class B Subnetting
- Private Address Space
- Broadcasts
- VLSM
- Variable Length Subnet Masks
- Discontiguous Addressing
- What is Route Summarization?
- Route Summarization
- Over Summarization
- Implementing Summarization
- To Find a Summary Address…
- Cisco Summarization Commands
- Common Threats to Physical Installations
- Common Attacks
- Security Appliances
- Why Use ACLs?
- ACL Applications: Filtering
- Types of IP ACLs
- How to Identify ACLs
- IP Access List Entry Sequence Numbering
- ACL Configuration Guidelines
- Dynamic ACLs
- Reflexive ACLs
- Time-Based ACLs
- Access List Applications
- Wildcards Review
- Wildcard Masks
- Access List Command Overview
- Applying Access Lists to a VTY Line
- Standard versus Extended Access List
- Access List Configuration Guidelines
- Named Access Lists
- Commenting ACL Statements
- Monitoring ACL Statements
- Verifying Access Lists
- Monitoring Access List Statements
Network Address Translation
- Why use NAT?
- NAT Considerations
- NAT Address Terms
- NAT Overview
- Translating Inside Local Addresses
- Overloading Inside Global Addresses
- Static NAT Configuration
- Dynamic NAT Configuration
- Inside Global Address Overloading
- Configuring NAT to Translate Overlapping Addresses
- Verify NAT
- Troubleshoot NAT
- Clearing NAT Entries
- NAT Design
VLANs and STP
- Segmenting with Switches
- Three Switch Functions
- Learning Host locations
- How Switches Filters Frames
- Broadcast and Multicast Frames
- Before VLANs
- After VLANs
- Benefits of VLANs
- VLAN Operations
- ISL/802.1q Frame Tagging
- Dividing a Physical Interface into Subinterfaces
- ISL Trunks
- Creating VLANs
- Create Trunk Ports
- show interface trunk
- Which are Trunk Ports, Which are Access Ports?
- Securing Unused Switch Ports
- Configuring Port Security
- Port Security
- Virtual Trunk Protocol (VTP)
- VTP Modes
- VTP Client Mode
- VTP Revisions
- To Communicate VLAN Information Between Switches…
- Gathering Information and Configuring a Switch
- Redundant Topology
- Solution: Spanning-Tree Protocol
- Spanning-Tree Operations
- STP Root Bridge Selection
- BPDUs
- STP Port States
- Spanning-Tree
- Spanning-Tree Port States
- Port Security
- 802.1X Port-Based Authentication
- PortFast
- Show spanning-tree
Introduction to Wireless LANs
- Differences Between WLAN and LAN
- Radio Frequency Transmission
- Organizations that Define WLAN
- ITU-R with FCC Wireless
- IEEE 802.11 Standards Comparison
- Wi-Fi Certification
- 802.11 Topology Building Blocks
- BSA Wireless Topology – Basic Coverage
- ESA Wireless Topology – Extended Cover
- Wireless Topology Data Rates – 802.11b
- Access Point Configuration
- Steps to Implement a Wireless Network
- Common Wireless Network Issues
- Wireless Troubleshooting
- Wireless LAN Security Threats
- Mitigating the Threats
- Evolution of Wireless LAN Security
- Wireless Client Association
- How 802.1X Works on the WLAN
- WPA and WPA2 Modes
Internet Protocol Version 6
- IPv4 and IPv6
- Why Do We Need a Larger Address Space?
- IPv6 Advanced Features
- IPv6 Address Representation
- IPv6 Address Types
- IPv6 Unicast Addressing
- IPv6 Global Unicast (and Anycast) Addresses
- Link-Local Addresses
- Larger Address Space Enables Address Aggregation
- Assigning IPv6 Global Unicast Addresses
- IPv6 EUI-64 Interface Identifier
- Stateless Autoconfiguration
- DHCPv6 (Stateful)
- DHCPv6 Operation
- IPv6 Routing Protocols
- RIPng (RFC 2080)
- IPv4-to-IPv6 Transition
- Cisco IOS Dual Stack
- IPv6 Tunneling
- Manually Configured IPv6 Tunnel
- Enabling IPv6 on Cisco Routers
- Cisco IOS IPv6 Name Resolution
- Configuring and Verifying RIPng for IPv6
WANS
- WAN Terms
- Typical WAN Encapsulation Protocols
- What is a VPN?
- Benefits of VPN
- Synchronous vs. Asynchronous
- Typical WAN Protocols
- HDLC
- HDLC Frame Format
- HDLC Command
- An Overview of PPP
- PPP Architecture
- PPP LCP Options
- PPP Session Establishment
- Network Control Protocol (NCP)
- PPP Encapsulation
- Three Steps to PPP Authentication
- Step Three: Add PPP Authentication to the Interface
- Frame Relay Overview
- Frame Relay Stack
- Frame Relay PVC (DLCI)
- DLCIs are Locally Significant
- Frame Relay Mapping
- LMI
- LMI Standards
- LMI and Encapsulation
- Frame Relay Inverse ARP and LMI Operation
- Configuring Basic Frame Relay
- Configuring a Static Frame Relay Map
- Configuring Address Mapping
- Frame Relay Topology
- Routing Update Problems
- Resolving Split-Horizon Issues
- Configuring Subinterfaces
- Point-to-Point Subinterfaces
- Subinterfaces
- Verifying Frame Relay Operation
- show interfaces
- show frame-relay pvc
- show frame-relay map
- Troubleshooting Basic Frame Relay Operations
- Committed Information Rate
- Congestion Notification
|