Scaling Networks Course BookletYour Cisco® Networking Academy® Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:• The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section.• Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.• An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, chapter quizzes, and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course. Related Titles:Scaling Networks Lab ManualBook: 978-1-58713-325-1 Scaling Networks Companion GuideBook: 978-1-58713-328-2eBook: 978-0-13-347640-8 CCNA Routing and Switching Practice and Study Guide Book: 978-1-58713-344-2eBook: 978-0-13-351761-3 CCNA Routing and Switching Portable Command Guide Book: 978-1-58720-430-2eBook: 978-0-13-338136-8
Produktinformation
- Utgivningsdatum2013-12-31
- Mått208 x 270 x 14 mm
- Vikt602 g
- FormatHäftad
- SpråkEngelska
- SerieCourse Booklets
- FörlagPearson Education (US)
- ISBN9781587133244
Tillhör följande kategorier
- Chapter 0 Course Introduction 10.0 Scaling Networks 10.0.1 Message to the Student 10.0.1.1 Welcome 10.0.1.2 A Global Community 10.0.1.3 More Than Just Information 10.0.1.4 How We Teach 20.0.1.5 Practice Leads to Mastery 20.0.1.6 Mind Wide Open 20.0.1.7 Engineering Journals 20.0.1.8 Explore the World of Networking 20.0.1.9 Create Your Own Worlds 30.0.1.10 How Packet Tracer Helps Master Concepts 30.0.1.11 Course Overview 30.1.1.1 Course GUI Tutorial 4Your Chapter Notes 5 Chapter 1 Introduction to Scaling Networks 71.0 Introduction to Scaling Networks 71.0.1.1 Introduction 71.0.1.2 Class Activity - Network by Design 71.1 Implementing a Network Design 71.1.1 Hierarchical Network Design 71.1.1.1 The Need to Scale the Network 71.1.1.2 Enterprise Business Devices 81.1.1.3 Hierarchical Network Design 81.1.1.4 Cisco Enterprise Architecture 91.1.1.5 Failure Domains 101.1.1.6 Activity – Identify Cisco Enterprise Architecture Modules 101.1.2 Expanding the Network 101.1.2.1 Design for Scalability 101.1.2.2 Planning for Redundancy 111.1.2.3 Increasing Bandwidth 121.1.2.4 Expanding the Access Layer 121.1.2.5 Fine-tuning Routing Protocols 121.1.2.6 Activity: Identify Scalability Terminology 131.2 Selecting Network Devices 131.2.1 Switch Hardware 131.2.1.1 Switch Platforms 131.2.1.2 Port Density 141.2.1.3 Forwarding Rates 151.2.1.4 Power over Ethernet 151.2.1.5 Multilayer Switching 151.2.1.6 Activity - Selecting Switch Hardware 161.2.1.7 Packet Tracer - Comparing 2960 and 3560 Switches 161.2.1.8 Lab - Selecting Switching Hardware 161.2.2 Router Hardware 161.2.2.1 Router Requirements 161.2.2.2 Cisco Routers 171.2.2.3 Router Hardware 171.2.2.4 Activity – Identify the Router Category 171.2.3 Managing Devices 171.2.3.1 Managing IOS Files and Licensing 171.2.3.2 In-Band versus Out-of-Band Management 181.2.3.3 Basic Router CLI Commands 181.2.3.4 Basic Router Show Commands 181.2.3.5 Basic Switch CLI commands 191.2.3.6 Basic Switch Show Commands 201.3 Summary 201.3.1.1 Class Activity - Layered Network Design Simulation 201.3.1.2 Basic Switch Configurations 211.3.1.3 Packet Tracer - Skills Integration Challenge 211.3.1.4 Summary 21Your Chapter Notes 22 Chapter 2 LAN Redundancy 232.0 LAN Redundancy 232.0.1.1 Introduction 232.0.1.2 Class Activity - Stormy Traffic 232.1 Spanning Tree Concepts 242.1.1 Purpose of Spanning Tree 242.1.1.1 Redundancy at OSI Layers 1 and 2 242.1.1.2 Issues with Layer 1 Redundancy: MAC Database Instability 252.1.1.3 Issues with Layer 1 Redundancy: Broadcast Storms 262.1.1.4 Issues with Layer 1 Redundancy: Duplicate Unicast Frames 262.1.1.5 Packet Tracer - Examining a Redundant Design 272.1.2 STP Operation 272.1.2.1 Spanning Tree Algorithm: Introduction 272.1.2.2 Spanning Tree Algorithm: Port Roles 292.1.2.3 Spanning Tree Algorithm: Root Bridge 302.1.2.4 Spanning Tree Algorithm: Path Cost 302.1.2.5 802.1D BPDU Frame Format 312.1.2.6 BPDU Propagation and Process 322.1.2.7 Extended System ID 332.1.2.8 Activity - Identify 802.1D Port Roles 342.1.2.9 Video Demonstration - Observing Spanning Tree Protocol Operation 342.1.2.10 Lab – Building a Switched Network with Redundant Links 342.2 Varieties of Spanning Tree Protocols 352.2.1 Overview 352.2.1.1 List of Spanning Tree Protocols 352.2.1.2 Characteristics of the Spanning Tree Protocols 352.2.1.3 Activity - Identify Types of Spanning Tree Protocols 372.2.2 PVST+ 372.2.2.1 Overview of PVST+ 372.2.2.2 Port States and PVST+ Operation 372.2.2.3 Extended System ID and PVST+ Operation 382.2.2.4 Activity - Identifying PVST+ Operation 392.2.3 Rapid PVST+ 392.2.3.1 Overview of Rapid PVST+ 392.2.3.2 RSTP BPDU 402.2.3.3 Edge Ports 402.2.3.4 Link Types 412.2.3.5 Activity - Identify Port Roles in Rapid PVST+ 412.2.3.6 Activity - Compare PVST+ and Rapid PVST+ 41 2.3 Spanning Tree Configuration 412.3.1 PVST+ Configuration 412.3.1.1 Catalyst 2960 Default Configuration 412.3.1.2 Configuring and Verifying the Bridge ID 422.3.1.3 PortFast and BPDU Guard 422.3.1.4 PVST+ Load Balancing 432.3.1.5 Packet Tracer - Configuring PVST+ 442.3.2 Rapid PVST+ Configuration 442.3.2.1 Spanning Tree Mode 442.3.2.2 Packet Tracer - Configuring Rapid PVST+ 452.3.2.3 Lab - Configuring Rapid PVST+, PortFast and BPDU Guard 452.3.3 STP Configuration Issues 462.3.3.1 Analyzing the STP Topology 462.3.3.2 Expected Topology versus Actual Topology 462.3.3.3 Overview of Spanning Tree Status 462.3.3.4 Spanning Tree Failure Consequences 472.3.3.5 Repairing a Spanning Tree Problem 482.3.3.6 Activity - Troubleshoot STP Configuration Issues 482.4 First Hop Redundancy Protocols 482.4.1 Concept of First Hop Redundancy Protocols 482.4.1.1 Default Gateway Limitations 482.4.1.2 Router Redundancy 492.4.1.3 Steps for Router Failover 492.4.1.4 Activity - Identify FHRP Terminology 492.4.2 Varieties of First Hop Redundancy Protocols 492.4.2.1 First Hop Redundancy Protocols 492.4.2.2 Activity - Identify the Type of FHRP 502.4.3 FHRP Verification 502.4.3.1 HSRP Verification 502.4.3.2 GLBP Verification 512.4.3.3 Syntax Checker - HSRP and GLBP 512.4.3.4 Lab - Configuring HSRP and GLBP 522.5 Summary 522.5.1.1 Class Activity - Documentation Tree 522.5.1.2 Summary 52Your Chapter Notes 54 Chapter 3 Link Aggregation 553.0 Introduction 553.0.1.1 Introduction 553.0.1.2 Class Activity - Imagine This 553.1 Link Aggregation Concepts 563.1.1 Link Aggregation 563.1.1.1 Introduction to Link Aggregation 563.1.1.2 Advantages of EtherChannel 563.1.2 EtherChannel Operation 573.1.2.1 Implementation Restrictions 573.1.2.2 Port Aggregation Protocol 573.1.2.3 Link Aggregation Control Protocol 583.1.2.4 Activity - Identify the PAgP and LACP Modes 593.2 Link Aggregation Configuration 593.2.1 Configuring EtherChannel 593.2.1.1 Configuration Guidelines 593.2.1.2 Configuring Interfaces 603.2.1.3 Packet Tracer - Configuring EtherChannel 603.2.1.4 Lab - Configuring EtherChannel 613.2.2 Verifying and Troubleshooting EtherChannel 613.2.2.1 Verifying EtherChannel 613.2.2.2 Troubleshooting EtherChannel 613.2.2.3 Packet Tracer - Troubleshooting EtherChannel 623.2.2.4 Lab - Troubleshooting EtherChannel 623.3 Summary 633.3.1.1 Class Activity - Linking Up 633.3.1.2 Packet Tracer - Skills Integration Challenge 633.3.1.3 Summary 63Your Chapter Notes 64 Chapter 4 Wireless LANs 654.0 Introduction 654.0.1.1 Introduction 654.0.1.2 Class Activity - Make Mine Wireless 654.1 Wireless Concepts 654.1.1 Introduction to Wireless 654.1.1.1 Supporting Mobility 654.1.1.2 Benefits of Wireless 664.1.1.3 Wireless Technologies 674.1.1.4 Radio Frequencies 674.1.1.5 802.11 Standards 684.1.1.6 Wi-Fi Certification 694.1.1.7 Comparing WLANs to a LAN 704.1.1.8 Activity - Identify the Wireless Technology 714.1.1.9 Activity - Compare Wireless Standards 714.1.1.10 Activity - Compare WLANs and LANs 714.1.2 Components of WLANs 714.1.2.1 Wireless NICs 714.1.2.2 Wireless Home Router 714.1.2.3 Business Wireless Solutions 724.1.2.4 Wireless Access Points 724.1.2.5 Small Wireless Deployment Solutions 734.1.2.6 Large Wireless Deployment Solutions 744.1.2.7 Large Wireless Deployment Solutions, Cont. 754.1.2.8 Wireless Antennas 754.1.2.9 Activity - Identify WLAN Component Terminology 764.1.2.10 Lab - Investigating Wireless Implementations 764.1.3 802.11 WLAN Topologies 764.1.3.1 802.11 Wireless Topology Modes 764.1.3.2 Ad Hoc Mode 774.1.3.3 Infrastructure Mode 774.1.3.4 Activity - Identify WLAN Topology Terminology 784.2 Wireless LAN Operations 784.2.1 802.11 Frame Structure 784.2.1.1 Wireless 802.11 Frame 784.2.1.2 Frame Control Field 794.2.1.3 Wireless Frame Type 794.2.1.4 Management Frames 804.2.1.5 Control Frames 814.2.1.6 Activity - Identify the 802.11 Frame Control Fields 814.2.2 Wireless Operation 814.2.2.1 Carrier Sense Multiple Access with Collision Avoidance 814.2.2.2 Wireless Clients and Access Point Association 824.2.2.3 Association Parameters 824.2.2.4 Discovering APs 834.2.2.5 Authentication 844.2.2.6 Activity - Order the Steps in the Client and AP Association Process 844.2.3 Channel Management 854.2.3.1 Frequency Channel Saturation 854.2.3.2 Selecting Channels 854.2.3.3 Planning a WLAN Deployment 864.2.3.4 Activity - Identify Channel Management Terminology 874.2.3.5 Activity - Cisco Wireless Explorer Game 874.3 Wireless LAN Security 874.3.1 WLAN Threats 874.3.1.1 Securing Wireless 874.3.1.2 DoS Attack 884.3.1.3 Management Frame DoS Attacks 884.3.1.4 Rogue Access Points 894.3.1.5 Man-in-the-Middle Attack 904.3.2 Securing WLANs 914.3.2.1 Wireless Security Overview 914.3.2.2 Shared Key Authentication Methods 914.3.2.3 Encryption Methods 924.3.2.4 Authenticating a Home User 924.3.2.5 Authentication in the Enterprise 934.3.2.6 Activity - Identify the WLAN Authentication Characteristics 934.4 Wireless LAN Configuration 944.4.1 Configure a Wireless Router 944.4.1.1 Configuring a Wireless Router 944.4.1.2 Setting Up and Installed Initial Linksys EAS6500 944.4.1.3 Configuring the Linksys Smart Wi-Fi Homepage 954.4.1.4 Smart Wi-Fi Settings 964.4.1.5 Smart Wi-Fi Tools 964.4.1.6 Backing Up a Configuration 974.4.2 Configuring Wireless Clients 974.4.2.1 Connecting Wireless Clients 974.4.2.2 Packet Tracer - Configuring Wireless LAN Access 974.4.2.3 Lab - Configuring a Wireless Router and Client 974.4.3 Troubleshoot WLAN Issues 984.4.3.1 Troubleshooting Approaches 984.4.3.2 Wireless Client Not Connecting 984.4.3.3 Troubleshooting When the Network Is Slow 994.4.3.4 Updating Firmware 1004.4.3.5 Activity - Identify the Troubleshooting Solution 1004.5 Summary 1004.5.1.1 Class Activity - Inside and Outside Control 1004.5.1.2 Packet Tracer - Skills Integration Challenge 1014.5.1.3 Summary 101Your Chapter Notes 102 Chapter 5 Adjust and Troubleshoot Single-Area OSPF 1035.0 Adjust and Troubleshoot Single-Area OSPF 1035.0.1.1 Introduction 1035.0.1.2 Class Activity - DR and BDR Election 1035.1 Advanced Single-Area OSPF Configurations 1035.1.1 Routing in the Distribution and Core Layers 1035.1.1.1 Routing versus Switching 1035.1.1.2 Static Routing 1045.1.1.3 Dynamic Routing Protocols 1045.1.1.4 Open Shortest Path First 1055.1.1.5 Configuring Single-Area OSPF 1055.1.1.6 Verifying Single-Area OSPF 1065.1.1.7 Configuring Single-Area OSPFv3 1065.1.1.8 Verifying Single-Area OSPFv3 1075.1.1.9 Lab - Configuring Basic Single-Area OSPFv2 1075.1.2 OSPF in Multiaccess Networks 1075.1.2.1 OSPF Network Types 1075.1.2.2 Challenges in Multiaccess Networks 1085.1.2.3 OSPF Designated Router 1085.1.2.4 Verifying DR/BDR Roles 1095.1.2.5 Verifying DR/BDR Adjacencies 1105.1.2.6 Default DR/BDR Election Process 1115.1.2.7 DR/BDR Election Process 1125.1.2.8 The OSPF Priority 1125.1.2.9 Changing the OSPF Priority 1135.1.2.10 Activity - Identify OSPF Network Type Terminology 1135.1.2.11 Activity - Select the Designated Router 1135.1.2.12 Packet Tracer - Determining the DR and BDR 1135.1.2.13 Lab - Configuring OSPFv2 on a Multiaccess Network 1145.1.3 Default Route Propagation 1145.1.3.1 Propagating a Default Static Route in OSPFv2 1145.1.3.2 Verifying the Propagated Default Route 1145.1.3.3 Propagating a Default Static Route in OSPFv3 1155.1.3.4 Verifying the Propagated IPv6 Default Route 1155.1.3.5 Packet Tracer - Propagating a Default Route in OSPFv2 1155.1.4 Fine-tuning OSPF Interfaces 1165.1.4.1 OSPF Hello and Dead Intervals 1165.1.4.2 Modifying OSPFv2 Intervals 1165.1.4.3 Modifying OSPFv3 Intervals 1175.1.5 Secure OSPF 1185.1.5.1 Routers are Targets 1185.1.5.2 Secure Routing Updates 1185.1.5.3 MD5 Authentication 1195.1.5.4 Configuring OSPF MD5 Authentication 1195.1.5.5 OSPF MD5 Authentication Example 1205.1.5.6 Verifying OSPF MD5 Authentication 1205.1.5.7 Packet Tracer - Configuring OSPFv2 Advance Features 1205.1.5.8 Lab - Configuring OSPFv2 Advance Features 1215.2 Troubleshooting Single-Area OSPF Implementations 1215.2.1 Components of Troubleshooting Single-Area OSPF 1215.2.1.1 Overview 1215.2.1.2 OSPF States 1215.2.1.3 OSPF Troubleshooting Commands 1215.2.1.4 Components of Troubleshooting OSPF 1225.2.1.5 Activity - Identify the Troubleshooting Command 1235.2.2 Troubleshoot Single-Area OSPFv2 Routing Issues 1235.2.2.1 Troubleshooting Neighbor Issues 1235.2.2.2 Troubleshooting OSPF Routing Table Issues 1245.2.2.3 Packet Tracer - Troubleshooting Single-Area OSPFv2 1245.2.3 Troubleshoot Single-Area OSPFv3 Routing Issues 1245.2.3.1 OSPFv3 Troubleshooting Commands 1245.2.3.2 Troubleshooting OSPFv3 1255.2.3.3 Lab - Troubleshooting Basic Single-Area OSPFv2 and OSPFv3 1255.2.3.4 Lab - Troubleshooting Advanced Single-Area OSPFv2 1265.3 Summary 1265.3.1.1 Class Activity - OSPF Troubleshooting Mastery 1265.3.1.2 Packet Tracer - Skills Integration Challenge 1265.3.1.3 Summary 126Your Chapter Notes 128 Chapter 6 Multiarea OSPF 1296.0 Multiarea OSPF 1296.0.1.1 Introduction 1296.0.1.2 Class Activity - Leaving on a Jet Plane 1296.1 Multiarea OSPF Operation 1296.1.1 Why Multiarea OSPF? 1296.1.1.1 Single-Area OSPF 1296.1.1.2 Multiarea OSPF 1306.1.1.3 OSPF Two-Layer Area Hierarchy 1316.1.1.4 Types of OSPF Routers 1316.1.1.5 Activity - Identify the Multiarea OSPF Terminology 1326.1.2 Multiarea OSPF LSA Operation 1326.1.2.1 OSPF LSA Types 1326.1.2.2 OSPF LSA Type 1 1326.1.2.3 OSPF LSA Type 2 1326.1.2.4 OSPF LSA Type 3 1336.1.2.5 OSPF LSA Type 4 1336.1.2.6 OSPF LSA Type 5 1346.1.2.7 Activity - Identify the OSPF LSA Type 1346.1.3 OSPF Routing Table and Types of Routes 1346.1.3.1 OSPF Routing Table Entries 1346.1.3.2 OSPF Route Calculation 1346.1.3.3 Activity - Order the Steps for OSPF Best Path Calculations 1356.2 Configuring Multiarea OSPF 1356.2.1 Configuring Multiarea OSPF 1356.2.1.1 Implementing Multiarea OSPF 1356.2.1.2 Configuring Multiarea OSPF 1366.2.1.3 Configuring Multiarea OSPFv3 1366.2.2 OSPF Route Summarization 1376.2.2.1 OSPF Route Summarization 1376.2.2.2 Interarea and External Route Summarization 1376.2.2.3 Interarea Route Summarization 1386.2.2.4 Calculating the Summary Route 1386.2.2.5 Configuring Interarea Route Summarization 1386.2.3 Verifying Multiarea OSPF 1396.2.3.1 Verifying Multiarea OSPF 1396.2.3.2 Verify General Multiarea OSPF Settings 1406.2.3.3 Verify the OSPF Routes 1406.2.3.4 Verify the Multiarea OSPF LSDB 1406.2.3.5 Verify Multiarea OSPFv3 1416.2.3.6 Packet Tracer - Configuring Multiarea OSPFv2 1416.2.3.7 Packet Tracer - Configuring Multiarea OSPFv3 1416.2.3.8 Lab - Configuring Multiarea OSPFv2 1416.2.3.9 Lab - Configuring Multiarea OSPFv3 1416.2.3.10 Lab - Troubleshooting Multiarea OSPFv2 and OSPFv3 1426.3 Summary 1426.3.1.1 Class Activity - Digital Trolleys 1426.3.1.2 Summary 142Your Chapter Notes 144 Chapter 7 EIGRP 1457.0 EIGRP 1457.0.1.1 Introduction 1457.0.1.2 Class Activity - Classless EIGRP 1457.1 Characteristics of EIGRP 1457.1.1 Basic Features of EIGRP 1457.1.1.1 Features of EIGRP 1457.1.1.2 Protocol Dependent Modules 1467.1.1.3 Reliable Transport Protocol 1477.1.1.4 Authentication 1477.1.2 Types of EIGRP Packets 1487.1.2.1 EIGRP Packet Types 1487.1.2.2 EIGRP Hello Packets 1497.1.2.3 EIGRP Update and Acknowledgment Packets 1497.1.2.4 EIGRP Query and Reply Packets 1507.1.2.5 Activity - Identify the EIGRP Packet Type 1507.1.2.6 Video Demonstration - Observing EIGRP Protocol Communications 1507.1.3 EIGRP Messages 1507.1.3.1 Encapsulating EIGRP Messages 1507.1.3.2 EIGRP Packet Header and TLV 1517.2 Configuring EIGRP for IPv4 1527.2.1 Configuring EIGRP with IPv4 1527.2.1.1 EIGRP Network Topology 1527.2.1.2 Autonomous System Numbers 1527.2.1.3 The Router EIGRP Command 1537.2.1.4 EIGRP Router ID 1547.2.1.5 Configuring the EIGRP Router ID 1557.2.1.6 The Network Command 1557.2.1.7 The Network Command and Wildcard Mask 1567.2.1.8 Passive Interface 1577.2.2 Verifying EIGRP with IPv4 1587.2.2.1 Verifying EIGRP: Examining Neighbors 1587.2.2.2 Verifying EIGRP: show ip protocols Command 1597.2.2.3 Verifying EIGRP: Examine the IPv4 routing table 1597.2.2.4 Packet Tracer - Configuring Basic EIGRP with IPv4 1607.2.2.5 Lab - Configuring Basic EIGRP with IPv4 1617.3 Operation of EIGRP 1617.3.1 EIGRP Initial Route Discovery 1617.3.1.1 EIGRP Neighbor Adjacency 1617.3.1.2 EIGRP Topology Table 1617.3.1.3 EIGRP Convergence 1627.3.1.4 Activity - Identify the Steps in Establishing EIGRP Neighbor Adjacencies 1627.3.2 Metrics 1627.3.2.1 EIGRP Composite Metric 1627.3.2.2 Examining Interface Values 1637.3.2.3 Bandwidth Metric 1647.3.2.4 Delay Metric 1657.3.2.5 How to Calculate the EIGRP Metric 1657.3.2.6 Calculating the EIGRP Metric 1657.3.2.7 Activity - Calculate the EIGRP Metric 1667.3.3 DUAL and the Topology Table 1667.3.3.1 DUAL Concepts 1667.3.3.2 Introduction to DUAL 1667.3.3.3 Successor and Feasible Distance 1677.3.3.4 Feasible Successors, Feasibility Condition, and Reported Distance 1677.3.3.5 Topology Table: show ip eigrp topology Command 1687.3.3.6 Topology Table: show ip eigrp topology Command (Cont.) 1687.3.3.7 Topology Table: No Feasible Successor 1697.3.3.8 Activity - Determine the Feasible Successor 1707.3.4 DUAL and Convergence 1707.3.4.1 DUAL Finite State Machine (FSM) 1707.3.4.2 DUAL: Feasible Successor 1707.3.4.3 DUAL: No Feasible Successor 1717.3.4.4 Packet Tracer - Investigating DUAL FSM 1717.4 Configuring EIGRP for IPv6 1727.4.1 EIGRP for IPv4 vs. IPv6 1727.4.1.1 EIGRP for IPv6 1727.4.1.2 Comparing EIGRP for IPv4 and IPv6 1727.4.1.3 IPv6 Link-local Addresses 1737.4.1.4 Activity - Compare EIGRPv4 and EIGRPv6 1747.4.2 Configuring EIGRP for IPv6 1747.4.2.1 EIGRP for IPv6 Network Topology 1747.4.2.2 Configuring IPv6 Link-local Addresses 1747.4.2.3 Configuring the EIGRP for IPv6 Routing Process 1757.4.2.4 ipv6 eigrp Interface Command 1767.4.3 Verifying EIGRP for IPv6 1767.4.3.1 Verifying EIGRP for IPv6: Examining Neighbors 1767.4.3.2 Verifying EIGRP for IPv6: show ip protocols Command 1777.4.3.3 Verifying EIGRP for IPv6: Examine the IPv6 Routing Table 1787.4.3.4 Packet Tracer - Configuring Basic EIGRP with IPv6 1787.4.3.5 Lab - Configuring Basic EIGRP for IPv6 1797.5 Summary 1797.5.1.1 Class Activity - Portfolio RIP and EIGRP 1797.5.1.2 Summary 179Your Chapter Notes 181 Chapter 8 EIGRP Advanced Configurations and Troubleshooting 1838.0 EIGRP Advanced Configurations and Troubleshooting 1838.0.1.1 Introduction 1838.0.1.2 Class Activity - EIGRP - Back to the Future 1838.1 Advanced EIGRP Configurations 1848.1.1 Automatic summarization 1848.1.1.1 Network Topology 1848.1.1.2 EIGRP Automatic summarization 1848.1.1.3 Configuring EIGRP Automatic summarization 1858.1.1.4 Verifying Auto-Summary: show ip protocols 1858.1.1.5 Verifying Auto-Summary: Topology Table 1868.1.1.6 Verifying Auto-Summary: Routing Table 1868.1.1.7 Summary Route 1878.1.1.8 Summary Route (Cont.) 1878.1.1.9 Activity - Determine the Classful Summarization 1888.1.1.10 Activity - Determine the Exit Interface for a Given Packet 1888.1.2 Manual Summarization 1888.1.2.1 Manual Summary Routes 1888.1.2.2 Configuring EIGRP Manual Summary Routes 1898.1.2.3 Verifying Manual Summary Routes 1898.1.2.4 EIGRP for IPv6: Manual Summary Routes 1898.1.2.5 Packet Tracer - Configuring EIGRP Manual Summary Routes for IPv4 and IPv6 1908.1.3 Default Route Propagation 1908.1.3.1 Propagating a Default Static Route 1908.1.3.2 Verifying the Propagated Default Route 1918.1.3.3 EIGRP for IPv6: Default Route 1918.1.3.4 Packet Tracer - Propagating a Default Route in EIGRP for IPv4 and IPv6 1918.1.4 Fine-tuning EIGRP Interfaces 1928.1.4.1 EIGRP Bandwidth Utilization 1928.1.4.2 Hello and Hold Timers 1928.1.4.3 Load Balancing IPv4 1938.1.4.4 Load Balancing IPv6 1948.1.4.5 Activity - Determine the EIGRP Fine Tuning Commands 1948.1.5 Secure EIGRP 1948.1.5.1 Routing Protocol Authentication Overview 1948.1.5.2 Configuring EIGRP with MD5 Authentication 1958.1.5.3 EIGRP Authentication Example 1968.1.5.4 Verify Authentication 1978.1.5.5 Lab - Configuring Advanced EIGRP for IPv4 Features 1978.2 Troubleshoot EIGRP 1988.2.1 Components of Troubleshooting EIGRP 1988.2.1.1 Basic EIGRP Troubleshooting Commands 1988.2.1.2 Components 1988.2.1.3 Activity - Identify the Troubleshooting Command 1998.2.2 Troubleshoot EIGRP Neighbor Issues 1998.2.2.1 Layer 3 Connectivity 1998.2.2.2 EIGRP Parameters 1998.2.2.3 EIGRP Interfaces 2008.2.2.4 Activity - Troubleshoot EIGRP Neighbor Issues 2018.2.3 Troubleshoot EIGRP Routing Table Issues 2018.2.3.1 Passive Interface 2018.2.3.2 Missing Network Statement 2018.2.3.3 Automatic summarization 2028.2.3.4 Activity - Troubleshoot EIGRP Routing Table Issues 2038.2.3.5 Packet Tracer - Troubleshooting EIGRP for IPv4 2038.2.3.6 Lab - Troubleshooting Basic EIGRP for IPv4 and IPv6 2038.2.3.7 Lab - Troubleshooting Advanced EIGRP 2038.3 Summary 2048.3.1.1 Class Activity - Tweaking EIGRP 2048.3.1.2 Packet Tracer - Skills Integration Challenge 2048.3.1.3 Summary 204Your Chapter Notes 206 Chapter 9 IOS Images and Licensing 2079.0 IOS Images and Licensing 2079.0.1.1 Introduction 2079.0.1.2 Class Activity - IOS Detection 2079.1 Managing IOS System Files 2079.1.1 Naming Conventions 2079.1.1.1 Cisco IOS Software Release Families and Trains 2079.1.1.2 Cisco IOS 12.4 Mainline and T Trains 2089.1.1.3 Cisco IOS 12.4 Mainline and T Numbering 2099.1.1.4 Cisco IOS 12.4 System Image Packaging 2099.1.1.5 Cisco IOS 15.0 M and T Trains 2109.1.1.6 Cisco IOS 15 Train Numbering 2119.1.1.7 IOS 15 System Image Packaging 2119.1.1.8 IOS Image Filenames 2129.1.1.9 Packet Tracer - Decode IOS Image Names 2149.1.2 Managing Cisco IOS Images 2149.1.2.1 TFTP Servers as a Backup Location 2149.1.2.2 Creating Cisco IOS Image Backup 2149.1.2.3 Copying a Cisco IOS Image 2159.1.2.4 Boot System 2159.1.2.5 Packet Tracer - Using a TFTP Server to Upgrade a Cisco IOS Image 2169.1.2.6 Video Demonstration - Managing Cisco IOS Images 2169.2 IOS Licensing 2169.2.1 Software Licensing 2169.2.1.1 Licensing Overview 2169.2.1.2 Licensing Process 2179.2.1.3 Step 1. Purchase the Software Package or Feature to Install 2179.2.1.4 Step 2. Obtain a License 2189.2.1.5 Step 3. Install the License 2189.2.2 License Verification and Management 2199.2.2.1 License Verification 2199.2.2.2 Activate an Evaluation Right-To-Use License 2209.2.2.3 Back up the License 2209.2.2.4 Uninstall the License 2219.2.2.5 Video Demonstration - Working with IOS 15 Image Licenses 2219.3 Summary 2219.3.1.1 Class Activity - Powerful Protocols 2219.3.1.2 EIGRP Capstone Project 2229.3.1.3 OSPF Capstone Project 2229.3.1.4 Packet Tracer - Skills Integration Challenge 2229.3.1.5 Summary 222Your Chapter Notes 225