You are previewing CCNP ISCW Quick Reference Sheets.
O'Reilly logo
CCNP ISCW Quick Reference Sheets

Book Description

CCNP Quick Reference Sheets Bundle (Digital Short Cut)

Brent Stewart, Denise Donohue, Jay Swan

ISBN: 1-58705-327-6

As a final exam preparation tool, the four CCNP Quick Reference Sheets included in this value-priced bundle provide a concise review of all objectives on all four of the new CCNP exams (BSCI 642-901, BCMSN 642-812, ISCW 642-825, and ONT 642-845). These digital Short Cuts provide you with detailed, graphical-based information, highlighting only the key topics in cram-style format.

With these documents as your guide, you will review key concepts required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network. These fact-filled Quick Reference Sheets allow you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of essential exam concepts.

Table of Contents:

1.      CCNP BSCI Quick Reference Sheets

2.      CCNP BCMSN Quick Reference Sheets

3.      CCNP ONT Quick Reference Sheets

4.      CCNP ISCW Quick Reference Sheets

Brent Stewart, CCNP, CCDP, MCSE, is a network administrator for CommScope and a certified Cisco Systems instructor. He participated in the development of BSCI and has seperately developed trainingmaterial for ICND, BSCI, BCMSN, BCRAN, and CIT. Brent lives in Hickory, NC, with his wife, Karen and children, Benjamin, Kaitlyn, Madelyn, and William.

Denise Donohue, CCIE No. 9566, is manager of solutions engineering for ePlus Technology in Maryland. She is responsible for designing and implementing data and VoIP networks, supporting companies based in the National Capital region. Prior to this role, she was a systems engineer for the data consulting arm of SBC/AT&T. Denise was a Cisco instructor and course director for Global Knowledge and did network consulting for many years. Her CCIE is in Routing and Switching.  

Jay Swan is a senior network engineer for the Southern Ute Indian Tribe Growth Fund in Ignacio, CO. Prior to this position, he was a Cisco instructor and course director for Global Knowledge. Jay has also worked in IT in the higher education and service provider fields. He holds CCNP® and CCSP® certifications.

Table of Contents

  1. Copyright
  2. About the Authors
  3. About the Technical Review
  4. 1. Network Conceptual Models
    1. Intelligent Information Network
    2. Service-Oriented Network Architecture
    3. Cisco Enterprise Architecture
  5. 2. Providing SOHO/Teleworker Connectivity
    1. Broadband Cable
      1. Cable Components
      2. Cable Standards
      3. Provisioning the Cable Modem
    2. Digital Subscriber Line
      1. Types of DSL
      2. ADSL
        1. Carrierless Amplitude and Phase Line Coding
        2. Discrete Multi-Tone Line Coding
      3. Layer 2 over DSL
        1. PPPoE
        2. PPPoA
    3. Configuring DSL CPE
      1. Configuring PPPoE CPE
      2. Configuring PPPoA CPE
      3. Troubleshooting ADSL
        1. Troubleshooting ADSL at Layer 1
        2. Troubleshooting ADSL at Layer 2
  6. 3. Frame Mode MPLS
    1. Cisco Express Forwarding
    2. MPLS Routers
    3. MPLS Labels
      1. Label Distribution and Label Tables
      2. Penultimate Hop Popping
    4. Configuring Frame Mode MPLS
      1. Enabling CEF
      2. Enabling MPLS
      3. Increasing the MTU Size
    5. MPLS VPNs
      1. Handling Customer Routes
      2. Route Distinguishers
      3. Route Targets
  7. 4. IPsec
    1. IPsec Headers
      1. Authentication Header
      2. Encapsulating Security Payload
        1. IPsec Modes
    2. Authentication Methods
    3. Encryption Methods
      1. Symmetric Key Algorithms
      2. Asymmetric Key Algorithm
      3. Diffie-Hellman Key Exchange
    4. Key Management
    5. Establishing an IPsec VPN
    6. Configuring a Site-to-Site VPN Using Cisco IOS Commands
      1. Configuring an ISAKMP Policy
    7. Configuring an IPsec Transform Set
      1. Configuring a Crypto ACL
      2. Configuring a Crypto Map
      3. Applying the Crypto Map to an Interface
      4. Configuring an Optional Interface Access List
    8. Configuring a Site-to-Site VPN Using SDM
    9. Monitoring and Troubleshooting IPsec VPNs
    10. Using GRE with IPsec
    11. Configuring a GRE Tunnel Using Cisco IOS Commands
      1. Configuring a GRE over IPsec Tunnel Using the SDM
    12. High-Availability VPNs
      1. Detecting a Failure Using DPD
      2. Detecting a Failure Using HSRP
      3. Using IPsec Stateful Failover
      4. Using an IPsec Tunnel as a Backup WAN Link
    13. Cisco Easy VPN
      1. Establishing an Easy VPN IPsec Session
      2. Using SDM to Configure the Easy VPN Server
    14. Configuring the Cisco VPN Client
  8. 5. Cisco Device Hardening
    1. Mitigating Network Attacks
      1. Cisco Self-Defending Network
      2. Types of Network Attacks
      3. Mitigating Reconnaissance Attacks
      4. Mitigating Access Attacks
      5. Mitigating Denial-of-Service Attacks
    2. Disabling Unused Cisco Router Network Services and Interfaces
      1. Unused Router Interfaces
      2. Vulnerable Router Services
      3. Hardening with AutoSecure
      4. Configuring AutoSecure
      5. Security Device Manager
    3. Securing Cisco Router Installations and Administrative Access
      1. Password-Creation Rules
      2. Types of Router Passwords
      3. Password-Length Enforcement
      4. Password Encryption
      5. Enhanced Username Password Security
      6. Password Example
      7. Securing ROMMON
      8. Rate-Limiting Authentication Attempts
      9. Setting Timeouts
    4. Privilege Levels
    5. Configuring Banner Messages
    6. Role-Based CLI
    7. Cisco IOS Resilient Configuration
    8. Mitigating Threats and Attacks with Access Lists
      1. ACL Review
      2. Mitigating Spoofed Addresses (Inbound)
      3. Mitigating Spoofed Addresses (Outbound)
      4. Mitigating SYN Attacks
        1. Using the established Keyword in ACLs
        2. Using TCP Intercept
        3. ACL Caveats
    9. Securing Management and Reporting Features
      1. Types of Management Traffic
      2. Configuring Secure Shell
      3. Configuring Syslog
      4. Simple Network Management Protocol
      5. Network Time Protocol
    10. Configuring AAA on Cisco Routers
      1. AAA Services
      2. Router Access Modes
      3. Configuring AAA
      4. Configuring CLI Authentication on a Cisco Router
      5. Configuring Authorization
      6. Configuring Accounting
      7. Troubleshooting AAA
  9. 6. Cisco IOS Threat Defenses
    1. DMZ Design Review
    2. Firewall Technologies
    3. Cisco IOS Firewall
      1. TCP Handling in the Cisco IOS Firewall
      2. UDP Handling in the Cisco IOS Firewall
      3. Alerts and Audit Trails
      4. Cisco IOS Authentication Proxy
    4. Configuring Cisco IOS Firewalls
      1. Defining External and Internal Interfaces
      2. Configuring Access Lists on the Interfaces
      3. Defining Inspection Rules
      4. Applying Inspection Rules to Interfaces
      5. Verifying Inspection
    5. Introducing Cisco IOS IPS
      1. Defining IDS/IPS Terms
      2. Cisco IOS IPS Signatures
      3. Cisco IOS IPS Alarms
      4. Configuring Cisco IOS IPS