CCNA portable command guide

CCNA Portable Command Guide Second Edition All the CCNA 640-802 commands in one compact, portable resource Preparing for the CCNA® exam? Here are all the CCNA-level commands you need in one condensed, portable resource. The CCNA Portable Command Guide , Second Edition, is filled with valuable, easy-...

Descripción completa

Detalles Bibliográficos
Otros Autores: Empson, Scott Author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] Cisco Press 2008
Edición:2nd ed
Colección:Certification self-study product family
Self-Study Guide
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627075606719
Tabla de Contenidos:
  • Cover
  • Contents
  • Introduction
  • Part I: TCP/IP Version 4
  • Chapter 1 How to Subnet
  • Class A-E Addresses
  • Converting Between Decimal Numbers and Binary
  • Subnetting a Class C Network Using Binary
  • Subnetting a Class B Network Using Binary
  • Binary ANDing
  • The Enhanced Bob Maneuver for Subnetting
  • Chapter 2 VLSM
  • IP Subnet Zero
  • VLSM Example
  • Chapter 3 Route Summarization
  • Example for Understanding Route Summarization
  • Route Summarization and Route Flapping
  • Requirements for Route Summarization
  • Part II: Introduction to Cisco Devices
  • Chapter 4 Cables and Connections
  • Connecting a Rollover Cable to Your Router or Switch
  • Terminal Settings
  • LAN Connections
  • Serial Cable Types
  • Which Cable to Use?
  • 568A Versus 568B Cables
  • Chapter 5 The Command-Line Interface
  • Shortcuts for Entering Commands
  • Using the Tab Key to Complete Commands
  • Using the Question Mark for Help
  • enable Command
  • exit Command
  • disable Command
  • logout Command
  • Setup Mode
  • Keyboard Help
  • History Commands
  • show Commands
  • Part III: Configuring a Router
  • Chapter 6 Configuring a Single Cisco Router
  • Router Modes
  • Entering Global Configuration Mode
  • Configuring a Router Name
  • Configuring Passwords
  • Password Encryption
  • Interface Names
  • Moving Between Interfaces
  • Configuring a Serial Interface
  • Configuring a Fast Ethernet Interface
  • Creating a Message-of-the-Day Banner
  • Creating a Login Banner
  • Setting the Clock Time Zone
  • Assigning a Local Host Name to an IP Address
  • The no ip domain-lookup Command
  • The logging synchronous Command
  • The exec-timeout Command
  • Saving Configurations
  • Erasing Configurations
  • show Commands
  • EXEC Commands in Configuration Mode: The do Command
  • Configuration Example: Basic Router Configuration
  • Part IV: Routing
  • Chapter 7 Static Routing.
  • Configuring a Static Route on a Router
  • The permanent Keyword (Optional)
  • Static Routes and Administrative Distance (Optional)
  • Configuring a Default Route on a Router
  • Verifying Static Routes
  • Configuration Example: Static Routes
  • Chapter 8 RIP
  • The ip classless Command
  • RIP Routing: Mandatory Commands
  • RIP Routing: Optional Commands
  • Troubleshooting RIP Issues
  • Configuration Example: RIPv2 Routing
  • Chapter 9 EIGRP
  • Configuring Enhanced Interior Gateway Routing Protocol (EIGRP)
  • EIGRP Auto-Summarization
  • Load Balancing: variance
  • Bandwidth Use
  • Authentication
  • Verifying EIGRP
  • Troubleshooting EIGRP
  • Configuration Example: EIGRP
  • Chapter 10 Single Area OSPF
  • Configuring OSPF: Mandatory Commands
  • Using Wildcard Masks with OSPF Areas
  • Configuring OSPF: Optional Commands
  • Verifying OSPF Configuration
  • Troubleshooting OSPF
  • Configuration Example: Single Area OSPF
  • Part V: Switching
  • Chapter 11 Configuring a Switch
  • Help Commands
  • Command Modes
  • Verifying Commands
  • Resetting Switch Configuration
  • Setting Host Names
  • Setting Passwords
  • Setting IP Addresses and Default Gateways
  • Setting Interface Descriptions
  • Setting Duplex Operation
  • Setting Operation Speed
  • Managing the MAC Address Table
  • Configuring Static MAC Addresses
  • Switch Port Security
  • Verifying Switch Port Security
  • Sticky MAC Addresses
  • Configuration Example
  • Chapter 12 VLANs
  • Creating Static VLANs
  • Assigning Ports to VLANs
  • Using the range Command
  • Verifying VLAN Information
  • Saving VLAN Configurations
  • Erasing VLAN Configurations
  • Configuration Example: VLANs
  • Chapter 13 VLAN Trunking Protocol and Inter-VLAN Routing
  • Dynamic Trunking Protocol (DTP)
  • Setting the Encapsulation Type
  • VLAN Trunking Protocol (VTP)
  • Verifying VTP.
  • Inter-VLAN Communication Using an External Router: Router-on-a-Stick
  • Inter-VLAN Communication Tips
  • Configuration Example: Inter-VLAN Communication
  • Chapter 14 STP and EtherChannel
  • Spanning Tree Protocol
  • EtherChannel
  • Part VI: Extending the LAN
  • Chapter 15 Implementing a Wireless LAN
  • Wireless Access Point Configuration: Linksys 300N Access Point
  • Wireless Client Configuration: Linksys Wireless-N Notebook Adapter
  • Part VII: Network Administration and Troubleshooting
  • Chapter 16 Backing Up and Restoring Cisco IOS Software and Configurations
  • Boot System Commands
  • The Cisco IOS File System
  • Backing Up Configurations to a TFTP Server
  • Restoring Configurations from a TFTP Server
  • Backing Up the Cisco IOS Software to a TFTP Server
  • Restoring/Upgrading the Cisco IOS Software from a TFTP Server
  • Restoring the Cisco IOS Software from ROM Monitor Mode Using Xmodem
  • Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command
  • Chapter 17 Password-Recovery Procedures and the Configuration Register
  • The Configuration Register
  • Password-Recovery Procedures for Cisco Routers
  • Password Recovery for 2960 Series Switches
  • Chapter 18 Cisco Discovery Protocol (CDP)
  • Cisco Discovery Protocol
  • Chapter 19 Telnet and SSH
  • Using Telnet to Remotely Connect to Other Devices
  • Configuring the Secure Shell Protocol (SSH)
  • Chapter 20 The ping and traceroute Commands
  • ICMP Redirect Messages
  • The ping Command
  • Examples of Using the ping and the Extended ping Commands
  • The traceroute Command
  • Chapter 21 SNMP and Syslog
  • Configuring SNMP
  • Configuring Syslog
  • Chapter 22 Basic Troubleshooting
  • Viewing the Routing Table
  • Determining the Gateway of Last Resort
  • Determining the Last Routing Update
  • OSI Layer 3 Testing
  • OSI Layer 7 Testing.
  • Interpreting the show interface Command
  • Clearing Interface Counters
  • Using CDP to Troubleshoot
  • The traceroute Command
  • The show controllers Command
  • debug Commands
  • Using Time Stamps
  • Operating System IP Verification Commands
  • The ip http server Command
  • The netstat Command
  • Part VIII: Managing IP Services
  • Chapter 23 Network Address Translation
  • Private IP Addresses: RFC 1918
  • Configuring Dynamic NAT: One Private to One Public Address Translation
  • Configuring PAT: Many Private to One Public Address Translation
  • Configuring Static NAT: One Private to One Permanent Public Address Translation
  • Verifying NAT and PAT Configurations
  • Troubleshooting NAT and PAT Configurations
  • Configuration Example: PAT
  • Chapter 24 DHCP
  • Configuring DHCP
  • Verifying and Troubleshooting DHCP Configuration
  • Configuring a DHCP Helper Address
  • DHCP Client on a Cisco IOS Software Ethernet Interface
  • Configuration Example: DHCP
  • Chapter 25 IPv6
  • Assigning IPv6 Addresses to Interfaces
  • IPv6 and RIPng
  • Configuration Example: IPv6 RIP
  • IPv6 Tunnels: Manual Overlay Tunnel
  • Static Routes in IPv6
  • Floating Static Routes in IPv6
  • Verifying and Troubleshooting IPv6
  • IPv6 Ping
  • Part IX: WANs
  • Chapter 26 HDLC and PPP
  • Configuring HDLC Encapsulation on a Serial Line
  • Configuring PPP on a Serial Line (Mandatory Commands)
  • Configuring PPP on a Serial Line (Optional Commands): Compression
  • Configuring PPP on a Serial Line (Optional Commands): Link Quality
  • Configuring PPP on a Serial Line (Optional Commands): Multilink
  • Configuring PPP on a Serial Line (Optional Commands): Authentication
  • Verifying or Troubleshooting a Serial Link/PPP Encapsulation
  • Configuration Example: PPP
  • Chapter 27 Frame Relay
  • Configuring Frame Relay
  • Verifying Frame Relay
  • Troubleshooting Frame Relay.
  • Configuration Examples: Frame Relay
  • Part X: Network Security
  • Chapter 28 IP Access Control List Security
  • Access List Numbers
  • Using Wildcard Masks
  • ACL Keywords
  • Creating Standard ACLs
  • Applying Standard ACLs to an Interface
  • Verifying ACLs
  • Removing ACLs
  • Creating Extended ACLs
  • Applying Extended ACLs to an Interface
  • The established Keyword (Optional)
  • Creating Named ACLs
  • Using Sequence Numbers in Named ACLs
  • Removing Specific Lines in Named ACLs Using Sequence Numbers
  • Sequence Number Tips
  • Including Comments About Entries in ACLs
  • Restricting Virtual Terminal Access
  • Configuration Examples: ACLs
  • Chapter 29 Security Device Manager
  • Security Device Manager: Connecting with CLI
  • Security Device Manager: Connecting with GUI
  • SDM Express Wizard with No CLI Preconfiguration
  • Resetting the Router to Factory Defaults Using SDM
  • SDM User Interfaces
  • SDM Monitor Mode
  • Using SDM to Configure a Router to Act as a DHCP Server
  • Using SDM to Configure an Interface as a DHCP Client
  • Using SDM to Configure NAT/PAT
  • What to Do If You Lose SDM Connectivity Because of an erase startup-config Command
  • Part XI: Appendixes
  • Appendix A: Binary/Hex/Decimal Conversion Chart
  • Appendix B: Create Your Own Journal Here.