CCNP Routing and Switching Quick Reference Library: ROUTE 300-101, SWITCH 300-115, and TSHOOT 300-135 Quick References

Book description

None

Table of contents

  1. About This eBook
  2. Title Page
  3. Copyright Page
  4. About the Author(s)
  5. About the Technical Reviewer
  6. Acknowledgments
  7. Contents at a Glance
  8. Contents
  9. Command Syntax Conventions
  10. Introduction
    1. Who Should Read This Book?
    2. How This Book Is Organized
      1. Part I: ROUTE
      2. Part II: SWITCH
      3. Part III: TSHOOT
  11. Part I: Route
    1. Chapter 1. Networking Overview
      1. IP, TCP, and UDP Operations
        1. IP Operations
        2. TCP Operations
        3. UDP Operations
      2. Routing Fundamentals
        1. The Routing Table
        2. Administrative Distance
        3. Choosing a Routing Protocol
          1. Distance Vector Protocols
          2. Link State Protocols
          3. Path Vector Protocols
      3. Packet Forwarding
        1. Configuring and Troubleshooting CEF
      4. Loop Prevention Mechanisms
        1. Split Horizon
        2. Route Poisoning
    2. Chapter 2. IPv6 Overview
      1. IPv6 Addressing
        1. Simplifying an IPv6 Address
        2. Special Addresses
        3. IPv6 Host Addressing
          1. Neighbor Discovery Protocol
          2. Manual IP Address Assignment
          3. Manual Network Assignment
          4. Stateless Address Autoconfiguration
          5. Securing NDP
          6. DHCPv6
          7. Renumbering
      2. IPv6 Routing
        1. Static Routing
        2. IPv6 Route Summarization
      3. Integrating IPv4 and IPv6
        1. Tunneling IPv6 over IPv4
          1. Manual Tunnels
          2. GRE Tunnels
          3. 6to4 Tunnels
          4. ISATAP Tunnels
        2. IPv6 Link Types
          1. Point-to-Point Links
          2. Point-to-Multipoint Links
          3. Multiaccess Links
    3. Chapter 3. RIP
      1. RIP Version 2
        1. RIPv2 Configuration
      2. RIPng for IPv6
        1. RIPng Configuration
    4. Chapter 4. EIGRP
      1. EIGRP Overview
      2. EIGRP Neighbor Establishment
        1. Packet Types
        2. Neighbor Discovery and Route Exchange
          1. Unicast Neighbors
          2. Troubleshooting and Verifying EIGRP Neighbors
      3. EIGRP Route Selection
        1. EIGRP Metric
          1. Wide Metrics
        2. Diffusing Update Algorithm
      4. EIGRP for IPv4
        1. Basic Configuration
        2. Optimizing the EIGRP Configuration
          1. Passive Interface
          2. Advertising a Default Route
          3. Summarization
          4. Load Balancing
          5. EIGRP Authentication
        3. EIGRP Stub Routing
      5. EIGRP for IPv6
      6. Verifying and Troubleshooting EIGRP
      7. EIGRP Named Mode
      8. EIGRP Over WAN Links
        1. Layer 3 MPLS WAN
        2. Layer 2 WAN
        3. Frame Relay
        4. EIGRP Over the Top
    5. Chapter 5. OSPF
      1. OSPF Overview
        1. OSPF Network Structure
        2. OSPF Metric
      2. Link-State Advertisements
        1. LSA Operation
        2. LSA Types
      3. OSPF Operation
        1. OSPF Packets
        2. OSPF Neighbor Relationships
      4. Basic OSPFv2 Configuration
        1. Router ID
        2. Verifying and Troubleshooting OSPF
      5. OSPF Network Types
        1. Designated Routers
        2. Nonbroadcast Multiaccess Networks
        3. OSPF over Layer 2 and Layer 3 MPLS
      6. Advanced OSPF Configuration
        1. OSPF Summarization
        2. Passive Interface
        3. OSPF Default Routes
        4. Stub and Not-So-Stubby Areas
        5. Virtual Links
        6. OSPF Authentication
      7. OSPF for IPv6
        1. OSPFv3 LSAs
        2. Traditional OSPFv3 Configuration
        3. New OSPFv3 Configuration
    6. Chapter 6. Advanced Routing Techniques
      1. Controlling Routing Updates
        1. Route Maps
          1. Route Map Syntax
          2. Route Map Match and Set Conditions
        2. Controlling Route Redistribution Using Route Maps
        3. Tagging Routes Using a Route Map
        4. Prefix Lists
        5. Distribute Lists
        6. Passive Interfaces
      2. Using Multiple Routing Protocols
        1. Configuring Route Redistribution
          1. Seed Metric
          2. Administrative Distance
        2. Planning Route Redistribution
        3. Redistribution Techniques
      3. Path Control
        1. Policy-Based Routing
        2. Using IOS IP SLA
        3. VRF-Lite
    7. Chapter 7. BGP and Internet Connectivity
      1. Planning an Internet Connection
        1. Types of ISP Connections
        2. IP Addressing and AS Numbering
        3. BGP Route Options
      2. BGP Overview
        1. BGP Databases
        2. BGP Message Types
        3. BGP Next-Hop Selection
        4. BGP Next Hop on a Multiaccess Network
        5. BGP Synchronization Rule
      3. Configuring Basic BGP
        1. BGP Network Command
        2. BGP Peering
          1. BGP Peering States
          2. Troubleshooting BGP
      4. BGP Path Selection
        1. BGP Attributes
        2. BGP Path Selection Criteria
        3. Influencing BGP Path Selection
      5. Filtering BGP Routes
        1. Prefix Lists
        2. AS Path Access List
        3. Order of Operations
      6. BGP Authentication
      7. Verifying BGP
      8. Multiprotocol BGP
    8. Chapter 8. Infrastructure Security
      1. Device Access Control
      2. Router Security Features
        1. Access Control Lists
          1. Configuring IPv4 ACLs
          2. Configuring an IPv6 Access List
        2. Unicast Reverse Path Forwarding
      3. Tunneling Technologies
        1. GRE Tunnels
          1. Configuring a GRE Tunnel
        2. DMVPN
        3. Easy VPN
      4. PPPoE
    9. Chapter 9. Infrastructure Services
      1. Simple Network Management Protocol
        1. SNMPv2c Configuration
        2. SNMPv3 Configuration
      2. Logging
        1. Debug
        2. Syslog
          1. Configuring Syslog
      3. Network Time Protocol
      4. DHCP
        1. DHCP for IPv4
          1. Configuring DHCP for IPv4
          2. IPv4 DHCP Relay Agent
        2. DHCP for IPv6
          1. DHCPv6 Process
          2. Configuring Stateful DHCPv6
          3. Configuring Stateless DHCPv6
          4. IPv6 DHCP Relay Agent
      5. NetFlow
      6. Network Address Translation
        1. Configuring Traditional NAT for IPv4
          1. Static NAT
          2. Dynamic NAT
          3. PAT
        2. Configuring NAT Virtual Interface
        3. NAT64
  12. Part II: Switch
    1. Chapter 1. LAN Switching Basics
      1. MAC Address Operation
        1. MAC Address Learning
        2. Frame Forwarding
      2. Neighbor Discovery Protocols
        1. Cisco Discovery Protocol
        2. LLDP
      3. Switch Traffic Monitoring
        1. SPAN
        2. RSPAN
    2. Chapter 2. VLANs
      1. VLAN Overview
        1. VLAN Planning
        2. Creating a VLAN and Assigning Ports
        3. Verifying VLAN Configuration
      2. VLAN Trunking
        1. Configuring a Trunk Link
          1. Pruning VLANs on a Trunk
          2. Verifying a Trunk Link
        2. Best Practices for Trunking
      3. VLAN Trunking Protocol
        1. VTP Switch Roles
        2. Configuring VTP
        3. Verifying and Monitoring VTP
        4. Adding a New Switch to a VTP Domain
      4. Troubleshooting VLAN Issues
        1. Troubleshooting User Connectivity
        2. Troubleshooting Trunking
        3. Troubleshooting VTP
    3. Chapter 3. EtherChannels
      1. EtherChannel Overview
      2. Configuring an EtherChannel
        1. Channel Negotiation Protocols
        2. Verifying EtherChannel Configuration
      3. EtherChannel Load Balancing
      4. EtherChannel Guard
      5. MEC and vPC
    4. Chapter 4. Spanning Tree Protocol
      1. Understanding Basic Spanning Tree Protocol
        1. Spanning Tree Election Criteria
        2. STP Election
          1. Root Bridge Election
          2. Root Port Election
          3. Designated Port Election
        3. Bridge Protocol Data Units
        4. Spanning Tree Port States
        5. Configuring and Verifying Spanning Tree
      2. Per-VLAN Spanning Tree
      3. Rapid Spanning Tree
        1. RSTP Port Roles
        2. BPDU Differences in RSTP
        3. RSTP Fast Convergence
      4. Multiple Spanning Tree
      5. Spanning Tree Improvements
        1. PortFast
        2. UplinkFast
        3. BackboneFast
        4. BPDU Guard
        5. BPDU Filter
        6. Root Guard
        7. Unidirectional Link Detection
        8. Loop Guard
        9. Using Spanning Tree Improvements
      6. Troubleshooting STP
      7. Spanning-Tree Best Practices
    5. Chapter 5. First Hop Redundancy Protocols
      1. Hot Standby Router Protocol
        1. HSRP States
        2. Configuring HSRP
        3. HSRP with Tracking
        4. HSRP for IPv6
      2. Virtual Router Redundancy Protocol
        1. Configuring VRRPv2
        2. Configuring VRRPv3
      3. GLBP
        1. GLBP for IPv6
      4. Planning Router Redundancy Implementation
    6. Chapter 6. InterVLAN Routing
      1. InterVLAN Routing Using an External Router
      2. InterVLAN Routing Using Multilayer Switches
        1. Multilayer Switch Interfaces
          1. SVI Configuration
          2. Routed Switch Port Configuration
        2. The Layer 2 and Layer 3 Forwarding Process
          1. Layer 2 Forwarding
          2. Layer 3 Forwarding
        3. Understanding the Switching Table
        4. Understanding Switch Forwarding Architectures
          1. CEF Switching
    7. Chapter 7. Switch Security Features
      1. MAC Address-Based Attacks
        1. MAC Address Flooding
        2. Port Security
          1. Configuring Port Security
          2. Error-Disabled Ports
        3. Port Access Lists
      2. VLAN-Based Attacks
        1. Storm Control
        2. Switch Spoofing
        3. 802.1Q Double-Tagging
        4. VLAN Access Control Lists
        5. Private VLANs
        6. Protected Ports
      3. Spoof Attacks
        1. DHCP Spoofing
        2. IP Source Guard
        3. ARP Spoofing and DAI
      4. Securing Your Switch
      5. Using AAA
        1. RADIUS
        2. TACACS+
        3. Configuring AAA
          1. Local Authentication
          2. RADIUS Authentication
          3. TACACS+ Authentication
          4. Configuring Authorization
          5. Configuring Accounting
          6. Verifying AAA Operation
        4. Port-Based Authentication
    8. Chapter 8. Campus Network Design
      1. The Hierarchical Design Model
        1. Core Layer
          1. Small Network Design
          2. Campus Network Design
        2. Network Traffic Flow
      2. Planning a Network Implementation
      3. Resiliency and High Availability
        1. Fast Failover and Convergence
        2. Redundancy
        3. Layer 2 versus Layer 3 Access Design
        4. SSO, NSF, and ISSU
        5. Virtual Switching System
        6. Using Standalone Access Switches
  13. Part III: TSHOOT
    1. Chapter 1. Tools and Methodologies of Troubleshooting
      1. Troubleshooting Methodology
      2. Structured Troubleshooting
        1. What to Do When Nothing Works!
      3. Best Practices for Routine Maintenance
        1. Methodology
        2. Common Tasks
      4. Troubleshooting Tools
        1. Configurations
        2. Other Tools
      5. Working with External Tools
        1. Packet Sniffing
        2. NetFlow
        3. SNMP and EEM
      6. Hardware Diagnostics
      7. Discovery
        1. Self-Documenting Networks
    2. Chapter 2. Troubleshooting Switching Technologies
      1. Hardware
        1. Troubleshooting Scenario
      2. VLANs
        1. DHCP Troubleshooting Example
      3. Spanning Tree Protocol
        1. BPDU Guard Example
      4. SVIs
      5. Troubleshoot SVIs
      6. Trunking and EtherChannel
      7. Port Security
    3. Chapter 3. Troubleshooting IP Networking
      1. IP Address Assignment
      2. NTP, Syslog, and SNMP
        1. NTP
        2. Syslog
        3. SNMP
      3. Gateway Redundancy
      4. Filtering
      5. NAT
        1. Steps to Troubleshooting NAT
        2. Rule Out NAT
        3. Understand the Objective of NAT
        4. Verify the Translation
        5. Verify the Translation Is Being Used
      6. Authentication
    4. Chapter 4. Troubleshooting Routing Technologies
      1. Network Layer Connectivity
      2. Routing Protocols
      3. Router Performance
      4. EIGRP
        1. Is the Correct Route Advertised?
        2. Is the Correct Route Communicated?
        3. Is There a More Desirable Path?
      5. OSPF
        1. Is the Correct Route Advertised?
        2. Is the Correct Route Communicated?
        3. Is There a More Desirable Path?
      6. BGP
        1. Is the Correct Route Advertised?
        2. Is the Correct Route Communicated?
        3. Is There a More Desirable Path?
      7. Route Redistribution
  14. Index
  15. Code Snippets

Product information

  • Title: CCNP Routing and Switching Quick Reference Library: ROUTE 300-101, SWITCH 300-115, and TSHOOT 300-135 Quick References
  • Author(s):
  • Release date:
  • Publisher(s): Cisco Press
  • ISBN: None