
CCNA 200-301 Official Cert Guide, Volume 2, 1st edition
BRAND: PEARSON
eBook edition. Monthly Subscription. Dành cho Cá nhân | Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In
Tổng quan sách
Hướng dẫn cấp chứng chỉ chính thức CCNA 200-301 giúp học viên đạt được thành công trong kỳ thi ngay lần đầu tiên và là tài nguyên tự học duy nhất được Cisco phê duyệt.Tác giả sách bán chạy nhất và chuyên gia hướng dẫn Wendell Odom chia sẻ những gợi ý chuẩn bị và mẹo làm bài kiểm tra, giúp học sinh xác định những điểm yếu và cải thiện cả kiến thức khái niệm lẫn kỹ năng thực hành.Được đánh giá cao về mức độ chi tiết, kế hoạch học tập, tính năng đánh giá, câu hỏi và bài tập ôn tập đầy thử thách, hướng dẫn bằng video và phòng thí nghiệm thực hành, hướng dẫn học tập chính thức này giúp sinh viên nắm vững các khái niệm và kỹ thuật đảm bảo thành công trong kỳ thi.
- Introduction xxviiPart I IP Access Control Lists 3
- Chapter 1Introduction to TCP/IP Transport and Applications 4“Do I Know This Already?” Quiz 4Foundation Topics 6TCP/IP Layer 4 Protocols: TCP and UDP 6Transmission Control Protocol 7Multiplexing Using TCP Port Numbers 7Popular TCP/IP Applications 10Connection Establishment and Termination 12Error Recovery and Reliability 13Flow Control Using Windowing 15User Datagram Protocol 16TCP/IP Applications 16Uniform Resource Identifiers 17Finding the Web Server Using DNS 18Transferring Files with HTTP 20How the Receiving Host Identifies the Correct Receiving Application 21Chapter Review 22
- Chapter 2Basic IPv4 Access Control Lists 24“Do I Know This Already?” Quiz 24Foundation Topics 26IPv4 Access Control List Basics 26ACL Location and Direction 26Matching Packets 27Taking Action When a Match Occurs 28Types of IP ACLs 28Standard Numbered IPv4 ACLs 29List Logic with IP ACLs 29Matching Logic and Command Syntax 31Matching the Exact IP Address 31Matching a Subset of the Address with Wildcards 31Binary Wildcard Masks 33Finding the Right Wildcard Mask to Match a Subnet 33Matching Any/All Addresses 34Implementing Standard IP ACLs 34Standard Numbered ACL Example 1 35Standard Numbered ACL Example 2 36Troubleshooting and Verification Tips 38Practice Applying Standard IP ACLs 39Practice Building access-list Commands 39Reverse Engineering from ACL to Address Range 40Chapter Review 41
- Chapter 3Advanced IPv4 Access Control Lists 44“Do I Know This Already?” Quiz 44Foundation Topics 46Extended Numbered IP Access Control Lists 46Matching the Protocol, Source IP, and Destination IP 46Matching TCP and UDP Port Numbers 48Extended IP ACL Configuration 51Extended IP Access Lists: Example 1 51Extended IP Access Lists: Example 2 53Practice Building access-list Commands 54Named ACLs and ACL Editing 54Named IP Access Lists 54Editing ACLs Using Sequence Numbers 56Numbered ACL Configuration Versus Named ACL Configuration 58ACL Implementation Considerations 59Additional Reading on ACLs 60Chapter Review 61Part I Review 64Part II Security Services 67
- Chapter 4Security Architectures 68“Do I Know This Already?” Quiz 68Foundation Topics 70Security Terminology 70Common Security Threats 72Attacks That Spoof Addresses 72Denial-of-Service Attacks 73Reflection and Amplification Attacks 75Man-in-the-Middle Attacks 76Address Spoofing Attack Summary 77Reconnaissance Attacks 77Buffer Overflow Attacks 78Malware 78Human Vulnerabilities 79Password Vulnerabilities 80Password Alternatives 80Controlling and Monitoring User Access 82Developing a Security Program to Educate Users 83Chapter Review 84
- Chapter 5Securing Network Devices 86“Do I Know This Already?” Quiz 86Foundation Topics 88Securing IOS Passwords 88Encrypting Older IOS Passwords with service password-encryption 89Encoding the Enable Passwords with Hashes 90Interactions Between Enable Password and Enable Secret 90Making the Enable Secret Truly Secret with a Hash 91Improved Hashes for Cisco's Enable Secret 92Encoding the Passwords for Local Usernames 94Controlling Password Attacks with ACLs 95Firewalls and Intrusion Prevention Systems 95Traditional Firewalls 96Security Zones 97Intrusion Prevention Systems (IPS) 99Cisco Next-Generation Firewalls 100Cisco Next-Generation IPS 102Chapter Review 103
- Chapter 6Implementing Switch Port Security 106“Do I Know This Already?” Quiz 106Foundation Topics 108Port Security Concepts and Configuration 108Configuring Port Security 109Verifying Port Security 112Port Security MAC Addresses 113Port Security Violation Modes 114Port Security Shutdown Mode 115Port Security Protect and Restrict Modes 117Chapter Review 119
- Chapter 7Implementing DHCP 122“Do I Know This Already?” Quiz 122Foundation Topics 124Dynamic Host Configuration Protocol 124DHCP Concepts 125Supporting DHCP for Remote Subnets with DHCP Relay 126Information Stored at the DHCP Server 128Configuring DHCP Features on Routers and Switches 129Configuring DHCP Relay 130Configuring a Switch as DHCP Client 130Configuring a Router as DHCP Client 132Identifying Host IPv4 Settings 133Host Settings for IPv4 133Host IP Settings on Windows 134Host IP Settings on macOS 136Host IP Settings on Linux 138Chapter Review 140
- Chapter 8DHCP Snooping and ARP Inspection 144“Do I Know This Already?” Quiz 144Foundation Topics 146DHCP Snooping 146DHCP Snooping Concepts 146A Sample Attack: A Spurious DHCP Server 147DHCP Snooping Logic 148Filtering DISCOVER Messages Based on MAC Address 150Filtering Messages that Release IP Addresses 150DHCP Snooping Configuration 152Configuring DHCP Snooping on a Layer 2 Switch 152Limiting DHCP Message Rates 154DHCP Snooping Configuration Summary 155Dynamic ARP Inspection 156DAI Concepts 156Review of Normal IP ARP 156Gratuitous ARP as an Attack Vector 157Dynamic ARP Inspection Logic 158Dynamic ARP Inspection Configuration 160Configuring ARP Inspection on a Layer 2 Switch 160Limiting DAI Message Rates 163Configuring Optional DAI Message Checks 164IP ARP Inspection Configuration Summary 165Chapter Review 166Part II Review 168Part III IP Services 171
- Chapter 9Device Management Protocols 172“Do I Know This Already?” Quiz 172Foundation Topics 174System Message Logging (Syslog) 174Sending Messages in Real Time to Current Users 174Storing Log Messages for Later Review 175Log Message Format 176Log Message Severity Levels 177Configuring and Verifying System Logging 178The debug Command and Log Messages 180Network Time Protocol (NTP) 181Setting the Time and Timezone 182Basic NTP Configuration 183NTP Reference Clock and Stratum 185Redundant NTP Configuration 186NTP Using a Loopback Interface for Better Availability 188Analyzing Topology Using CDP and LLDP 190Examining Information Learned by CDP 190Configuring and Verifying CDP 193Examining Information Learned by LLDP 194Configuring and Verifying LLDP 197Chapter Review 199
- Chapter 10Network Address Translation 202“Do I Know This Already?” Quiz 202Foundation Topics 204Perspectives on IPv4 Address Scalability 204CIDR 205Private Addressing 206Network Address Translation Concepts 207Static NAT 208Dynamic NAT 210Overloading NAT with Port Address Translation 211NAT Configuration and Troubleshooting 213Static NAT Configuration 213Dynamic NAT Configuration 215Dynamic NAT Verification 217NAT Overload (PAT) Configuration 219NAT Troubleshooting 222Chapter Review 223
- Chapter 11Quality of Service (QoS) 226“Do I Know This Already?” Quiz 226Foundation Topics 228Introduction to QoS 228QoS: Managing Bandwidth, Delay, Jitter, and Loss 228Types of Traffic 229Data Applications 229Voice and Video Applications 230QoS as Mentioned in This Book 232QoS on Switches and Routers 233Classification and Marking 233Classification Basics 233Matching (Classification) Basics 234Classification on Routers with ACLs and NBAR 235Marking IP DSCP and Ethernet CoS 236Marking the IP Header 237Marking the Ethernet 802.1Q Header 237Other Marking Fields 238Defining Trust Boundaries 238DiffServ Suggested Marking Values 239Expedited Forwarding (EF) 240Assured Forwarding (AF) 240Class Selector (CS) 241Guidelines for DSCP Marking Values 241Queuing 242Round-Robin Scheduling (Prioritization) 243Low Latency Queuing 243A Prioritization Strategy for Data, Voice, and Video 245Shaping and Policing 245Policing 246Where to Use Policing 246Shaping 248Setting a Good Shaping Time Interval for Voice and Video 249Congestion Avoidance 250TCP Windowing Basics 250Congestion Avoidance Tools 251Chapter Review 252
- Chapter 12Miscellaneous IP Services 254“Do I Know This Already?” Quiz 254Foundation Topics 256First Hop Redundancy Protocol 256The Need for Redundancy in Networks 257The Need for a First Hop Redundancy Protocol 259The Three Solutions for First-Hop Redundancy 260HSRP Concepts 261HSRP Failover 261HSRP Load Balancing 262Simple Network Management Protocol 263SNMP Variable Reading and Writing: SNMP Get and Set 264SNMP Notifications: Traps and Informs 265The Management Information Base 266Securing SNMP 267FTP and TFTP 268Managing Cisco IOS Images with FTP/TFTP 268The IOS File System 268Upgrading IOS Images 270Copying a New IOS Image to a Local IOS File System Using TFTP 271Verifying IOS Code Integrity with MD5 273Copying Images with FTP 273The FTP and TFTP Protocols 275FTP Protocol Basics 275FTP Active and Passive Modes 276FTP over TLS (FTP Secure) 278TFTP Protocol Basics 279Chapter Review 280Part III Review 284Part IV Network Architecture 287
- Chapter 13LAN Architecture 288“Do I Know This Already?” Quiz 288Foundation Topics 290Analyzing Campus LAN Topologies 290Two-Tier Campus Design (Collapsed Core) 290The Two-Tier Campus Design 290Topology Terminology Seen Within a Two-Tier Design 291Three-Tier Campus Design (Core) 293Topology Design Terminology 295Small Office/Home Office 295Power over Ethernet (PoE) 297PoE Basics 297PoE Operation 298PoE and LAN Design 299Chapter Review 300
- Chapter 14WAN Architecture 302“Do I Know This Already?” Quiz 302Foundation Topics 304Metro Ethernet 304Metro Ethernet Physical Design and Topology 305Ethernet WAN Services and Topologies 306Ethernet Line Service (Point-to-Point) 307Ethernet LAN Service (Full Mesh) 308Ethernet Tree Service (Hub and Spoke) 309Layer 3 Design Using Metro Ethernet 309Layer 3 Design with E-Line Service 309Layer 3 Design with E-LAN Service 311Multiprotocol Label Switching (MPLS) 311MPLS VPN Physical Design and Topology 313MPLS and Quality of Service 314Layer 3 with MPLS VPN 315Internet VPNs 317Internet Access 317Digital Subscriber Line 318Cable Internet 319Wireless WAN (3G, 4G, LTE, 5G) 320Fiber (Ethernet) Internet Access 321Internet VPN Fundamentals 321Site-to-Site VPNs with IPsec 322Remote Access VPNs with TLS 324VPN Comparisons 326Chapter Review 326
- Chapter 15Cloud Architecture 328“Do I Know This Already?” Quiz 328Foundation Topics 330Server Virtualization 330Cisco Server Hardware 330Server Virtualization Basics 331Networking with Virtual Switches on a Virtualized Host 333The Physical Data Center Network 334Workflow with a Virtualized Data Center 335Cloud Computing Services 336Private Cloud (On-Premise) 337Public Cloud 338Cloud and the “As a Service” Model 339Infrastructure as a Service 339Software as a Service 341(Development) Platform as a Service 341WAN Traffic Paths to Reach Cloud Services 342Enterprise WAN Connections to Public Cloud 342Accessing Public Cloud Services Using the Internet 342Pros and Cons with Connecting to Public Cloud with Internet 343Private WAN and Internet VPN Access to Public Cloud 344Pros and Cons of Connecting to Cloud with Private WANs 345Intercloud Exchanges 346Summarizing the Pros and Cons of Public Cloud WAN Options 346A Scenario: Branch Offices and the Public Cloud 347Migrating Traffic Flows When Migrating to Email SaaS 347Branch Offices with Internet and Private WAN 349Chapter Review 350Part IV Review 352Part V Network Automation 355
- Chapter 16Introduction to Controller-Based Networking 356“Do I Know This Already?” Quiz 357Foundation Topics 358SDN and Controller-Based Networks 358The Data, Control, and Management Planes 358The Data Plane 359The Control Plane 360The Management Plane 361Cisco Switch Data Plane Internals 361Controllers and Software-Defined Architecture 362Controllers and Centralized Control 363The Southbound Interface 364The Northbound Interface 365Software Defined Architecture Summary 367Examples of Network Programmability and SDN 367OpenDaylight and OpenFlow 367The OpenDaylight Controller 368The Cisco Open SDN Controller (OSC) 369Cisco Application Centric Infrastructure (ACI) 369ACI Physical Design: Spine and Leaf 370ACI Operating Model with Intent-Based Networking 371Cisco APIC Enterprise Module 373APIC-EM Basics 373APIC-EM Replacement 374Summary of the SDN Examples 375Comparing Traditional Versus Controller-Based Networks 375How Automation Impacts Network Management 376Comparing Traditional Networks with Controller-Based Networks 378Chapter Review 379
- Chapter 17Cisco Software-Defined Access (SDA) 382“Do I Know This Already?” Quiz 383Foundation Topics 384SDA Fabric, Underlay, and Overlay 384The SDA Underlay 386Using Existing Gear for the SDA Underlay 386Using New Gear for the SDA Underlay 387The SDA Overlay 390VXLAN Tunnels in the Overlay (Data Plane) 390LISP for Overlay Discovery and Location (Control Plane) 392DNA Center and SDA Operation 395Cisco DNA Center 395Cisco DNA Center and Scalable Groups 396Issues with Traditional IP-Based Security 397SDA Security Based on User Groups 398DNA Center as a Network Management Platform 400DNA Center Similarities to Traditional Management 401DNA Center Differences with Traditional Management 402Chapter Review 403
- Chapter 18Understanding REST and JSON 406“Do I Know This Already?” Quiz 406Foundation Topics 408REST-Based APIs 408REST-Based (RESTful) APIs 408Client/Server Architecture 409Stateless Operation 410Cacheable (or Not) 410Background: Data and Variables 410Simple Variables 410List and Dictionary Variables 411REST APIs and HTTP 413Software CRUD Actions and HTTP Verbs 413Using URIs with HTTP to Specify the Resource 414Example of REST API Call to DNA Center 417Data Serialization and JSON 418The Need for a Data Model with APIs 419Data Serialization Languages 421JSON 421XML 421YAML 422S