Log in Sign up
Trang chủeBookCCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource, 1st edition
CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource, 1st edition

CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing Portable Command Guide: All ENCOR (350-401) and ENARSI (300-410) Commands in One Compact, Portable Resource, 1st edition

BRAND: PEARSON
Publisher:
PEARSON
Author:
Patrick Gargano; Scott Empson
Edition:
(March 26, 2020) © 2020
eBook ISBN:
9780135768273
Print ISBN:
9780135768167
Type:
1 Year Subscription. Dành cho Cá nhân
eBook edition. 1 Year Subscription. Dành cho Cá nhân | Trường ĐH, Nhóm, Thư Viện: Gọi 0915920514 để báo giá Pearson, Vital Source eBook hoặc mua Sách In

Tổng quan sách

Sử dụng tài nguyên tham khảo nhanh được cập nhật đầy đủ này để giúp ghi nhớ các lệnh và khái niệm khi bạn đạt được chứng chỉ CCNP hoặc CCIE. Chứa đầy thông tin có giá trị, dễ truy cập, nó đủ di động để sử dụng ở mọi nơi. Hướng dẫn này tóm tắt tất cả các lệnh, từ khóa, đối số lệnh và lời nhắc liên quan của phần mềm Cisco IOS liên quan đến các kỳ thi chứng chỉ CCNP và CCIE Enterprise Core (ENCOR 350-401) và CCNP Enterprise Advanced Routing and Services (ENARSI 300-410). Các mẹo và ví dụ giúp bạn áp dụng các lệnh vào các tình huống trong thế giới thực và các mẫu cấu hình cho thấy cách sử dụng chúng trong thiết kế mạng.Bảo hiểm bao gồm:Lớp 2: Vlan, STP, Định tuyến giữa các VlanLớp 3: EIGRP, OSPF, Phân phối lại, Kiểm soát đường dẫn, BGPDịch vụ và quản lý cơ sở hạ tầngAn ninh cơ sở hạ tầngBảo đảm mạngBảo mật và khắc phục sự cố không dâyLớp phủ và ảo hóaHướng dẫn lệnh di động này cung cấp: Các nhóm chủ đề hướng dẫn hợp lý cho nguồn tài nguyên tổng hợpTuyệt vời để ôn tập trước kỳ thi chứng chỉ ENCOR 350-401 và ENARSI 300-410 của bạnKích thước nhỏ gọn giúp bạn dễ dàng mang theo bên mình mọi lúc mọi nơiPhần “Tạo nhật ký của riêng bạn” với các trang trống, có dòng kẻ cho phép bạn cá nhân hóa cuốn sách theo nhu cầu của mình
  1. Introduction xixPART I: LAYER 2 INFRASTRUCTURE
  2. Chapter 1 VLANs 1Virtual LANs 1 Creating Static VLANs Using VLAN Configuration Mode 2 Assigning Ports to Data and Voice VLANs 2 Using the range Command 3 Dynamic Trunking Protocol (DTP) 3 Setting the Trunk Encapsulation and Allowed VLANs 4 VLAN Trunking Protocol (VTP) 5 Verifying VTP 6 Verifying VLAN Information 7 Saving VLAN Configurations 7 Erasing VLAN Configurations 7 Configuration Example: VLANs 8Layer 2 Link Aggregation 11 Interface Modes in EtherChannel 12 Default EtherChannel Configuration 12 Guidelines for Configuring EtherChannel 12 Configuring Layer 2 EtherChannel 14 Configuring Layer 3 EtherChannel 14 Configuring EtherChannel Load Balancing 15 Configuring LACP Hot-Standby Ports 16 Monitoring and Verifying EtherChannel 17 Configuration Example: EtherChannel 18
  3. Chapter 2 Spanning Tree Protocol 23Spanning Tree Protocol Definition 24Enabling Spanning Tree Protocol 24Changing the Spanning-Tree Mode 25Configuring the Root Switch 25Configuring a Secondary Root Switch 26Configuring Port Priority 26Configuring the Path Cost 27Configuring the Switch Priority of a VLAN 27Configuring STP Timers 27Configuring Optional Spanning-Tree Features 28 PortFast 28 BPDU Guard (2xxx/older 3xxx Series) 29 BPDU Guard (3650/9xxx Series) 29 BPDU Filter 30 UplinkFast 30 BackboneFast 31 Root Guard 31 Loop Guard 32 Unidirectional Link Detection 33Configuring and Verifying Port Error Conditions 33Enabling Rapid Spanning Tree 36Rapid Spanning Tree Link Types 36Enabling Multiple Spanning Tree 37Verifying the Extended System ID 39Verifying STP 39Troubleshooting Spanning Tree Protocol 40Configuration Example: PVST+ 40Spanning-Tree Migration Example: PVST+ to Rapid-PVST+ 43
  4. Chapter 3 Implementing Inter-VLAN Routing 45Inter-VLAN Communication Using an External Router: Router-on-a-Stick 45Inter-VLAN Communication Tips 46Inter-VLAN Communication on a Multilayer Switch Through a Switch Virtual Interface 46 Configuring Inter-VLAN Communication on an L3 Switch 47 Removing L2 Switchport Capability of an Interface on an L3 Switch 47Configuration Example: Inter-VLAN Communication 47Configuration Example: IPv6 Inter-VLAN Communication 55PART II: LAYER 3 INFRASTRUCTURE
  5. Chapter 4 EIGRP 61Enhanced Interior Gateway Routing Protocol (EIGRP) 62Enabling EIGRP for IPv4 Using Classic Mode Configuration 62Enabling EIGRP for IPv6 Using Classic Mode Configuration 63EIGRP Using Named Mode Configuration 64EIGRP Named Mode Subconfiguration Modes 66Upgrading Classic Mode to Named Mode Configuration 66EIGRP Router ID 67Authentication for EIGRP 67 Configuring Authentication in Classic Mode 67 Configuring Authentication in Named Mode 68 Verifying and Troubleshooting EIGRP Authentication 70Auto-Summarization for EIGRP 70IPv4 Manual Summarization for EIGRP 70IPv6 Manual Summarization for EIGRP 71Timers for EIGRP 71Passive Interfaces for EIGRP 72“Pseudo” Passive EIGRP Interfaces 72Injecting a Default Route into EIGRP: Redistribution of a Static Route 73Injecting a Default Route into EIGRP: ip default-network 74Injecting a Default Route into EIGRP: Summarize to 0.0.0.0/0 74Accepting Exterior Routing Information: default-information 75Equal-cost Load Balancing: maximum-paths 75Unequal-cost Load Balancing: variance 76EIGRP Traffic Sharing 76Bandwidth Use for EIGRP 77Stub Routing for EIGRP 77EIGRP Unicast Neighbors 79EIGRP Wide Metrics 79Adjusting the EIGRP Metric Weights 80Verifying EIGRP 80Troubleshooting EIGRP 82Configuration Example: EIGRP for IPv4 and IPv6 Using Named Mode 83
  6. Chapter 5 OSPF 87Comparing OSPFv2 and OSPFv3 88Configuring OSPF 89Configuring Multiarea OSPF 89Using Wildcard Masks with OSPF Areas 90Configuring Traditional OSPFv3 91 Enabling OSPF for IPv6 on an Interface 91 OSPFv3 and Stub/NSSA Areas 92 Interarea OSPFv3 Route Summarization 92 Enabling an IPv4 Router ID for OSPFv3 93 Forcing an SPF Calculation 93OSPFv3 Address Families 93 Configuring the IPv6 Address Family in OSPFv3 94 Configuring the IPv4 Address Family in OSPFv3 94 Applying Parameters in Address Family Configuration Mode 94Authentication for OSPF 95 Configuring OSPFv2 Authentication: Simple Password 95 Configuring OSPFv2 Cryptographic Authentication: SHA-256 96 Configuring OSPFv3 Authentication and Encryption 97 Verifying OSPFv2 and OSPFv3 Authentication 98Optimizing OSPF Parameters 98 Loopback Interfaces 98 Router ID 99 DR/BDR Elections 99 Passive Interfaces 100 Modifying Cost Metrics 100 OSPF Reference Bandwidth 101 OSPF LSDB Overload Protection 101 Timers 101 IP MTU 102Propagating a Default Route 102Route Summarization 103 Interarea Route Summarization 103 External Route Summarization 103OSPF Route Filtering 104 Using the filter-list Command 104 Using the area range not-advertise Command 104 Using the distribute-list in Command 104 Using the summary-address not-advertise Command 105OSPF Special Area Types 105 Stub Areas 105 Totally Stubby Areas 106 Not-So-Stubby Areas (NSSA) 106 Totally NSSA 107Virtual Links 108 Configuration Example: Virtual Links 108Verifying OSPF Configuration 109Troubleshooting OSPF 111Configuration Example: Single-Area OSPF 111Configuration Example: Multiarea OSPF 114Configuration Example: Traditional OSPFv3 117Configuration Example: OSPFv3 with Address Families 120
  7. Chapter 6 Redistribution and Path Control 127Defining Seed and Default Metrics 128Redistributing Connected Networks 129Redistributing Static Routes 129Redistributing Subnets into OSPF 130Assigning E1 or E2 Routes in OSPF 130Redistributing OSPF Internal and External Routes 131Configuration Example: Route Redistribution for IPv4 131Configuration Example: Route Redistribution for IPv6 132Verifying Route Redistribution 134Route Filtering Using the distribute-list Command 134 Configuration Example: Inbound and Outbound Distribute List Route Filters 134 Configuration Example: Controlling Redistribution with Outbound Distribute Lists 135 Verifying Route Filters 136Route Filtering Using Prefix Lists 137 Configuration Example: Using a Distribute List That References a Prefix List to Control Redistribution 139 Verifying Prefix Lists 140Using Route Maps with Route Redistribution 140 Configuration Example: Route Maps 141Manipulating Redistribution Using Route Tagging 142Changing Administrative Distance 143Path Control with Policy-Based Routing 144Verifying Policy-Based Routing 145Configuration Example: PBR with Route Maps 146Cisco IOS IP SLA 147 Configuring Authentication for IP SLA 149 Monitoring IP SLA Operations 150PBR with Cisco IOS IP SLA 150 Step 1: Define Probe(s) 151 Step 2: Define Tracking Object(s) 152 Step 3a: Define the Action on the Tracking Object(s) 152 Step 3b: Define Policy Routing Using the Tracking Object(s) 152 Step 4: Verify IP SLA Operations 152
  8. Chapter 7 BGP 155Configuring BGP: Classic Configuration 156Configuring Multiprotocol BGP (MP-BGP) 157Configuring BGP: Address Families 158Configuration Example: Using MP-BGP Address Families to Exchange IPv4 and IPv6 Routes 159BGP Support for 4-Byte AS Numbers 160BGP Timers 161BGP and update-source 161IBGP Next-Hop Behavior 162EBGP Multihop 162Attributes 164 Route Selection Decision Process–The BGP Best Path Algorithm 164 Weight Attribute 164 Using AS Path Access Lists to Manipulate the Weight Attribute 166 Using Prefix Lists and Route Maps to Manipulate the Weight Attribute 166 Local Preference Attribute 167 Using AS Path Access Lists with Route Maps to Manipulate the Local Preference Attribute 167 AS Path Attribute Prepending 169 AS Path: Removing Private Autonomous Systems 171 Multi-Exit Discriminator (MED) Attribute 171Verifying BGP 174Troubleshooting BGP 175Default Routes 177Route Aggregation 177Route Reflectors 177Regular Expressions 178Regular Expressions: Examples 179BGP Route Filtering Using Access Lists and Distribute Lists 180Configuration Example: Using Prefix Lists and AS Path Access Lists 181BGP Peer Groups 182Authentication for BGP 184 Configuring Authentication Between BGP Peers 184 Verifying BGP Authentication 184PART III: INFRASTRUCTURE SERVICES
  9. Chapter 8 IP Services 185Network Address Translation (NAT) 186 Private IP Addresses: RFC 1918 186 Configuring Static NAT 187 Configuring Dynamic NAT 188 Configuring Port Address Translation (PAT) 189 Configuring a NAT Virtual Interface 190 Verifying NAT and PAT Configurations 190 Troubleshooting NAT and PAT Configurations 191 Configuration Example: PAT 191 Configuration Example: NAT Virtual Interfaces and Static NAT 193First-Hop Redundancy Protocols 194 Hot Standby Router Protocol 194 Virtual Router Redundancy Protocol 201 IPv4 Configuration Example: HSRP on L3 Switch 204 IPv4 Configuration Example: VRRPv2 on Router and L3 Switch with IP SLA Tracking 209 IPv6 Configuration Example: HSRPv2 on Router and L3 Switch 212Dynamic Host Control Protocol (DHCP) 217 Implementing DHCP for IPv4 217 Implementing DHCP for IPv6 221 Configuration Example: DHCP for IPv4 224 Configuration Example: DHCP for IPv6 226
  10. Chapter 9 Device Management 231Configuring Passwords 231 Cleartext Password Encryption 232Password Encryption Algorithm Types 233 Configuring SSH 234 Verifying SSH 235Boot System Commands 235The Cisco IOS File System 236Viewing the Cisco IOS File System 236Commonly Used URL Prefixes for Cisco Network Devices 236Deciphering IOS Image Filenames 237Backing Up Configurations to a TFTP Server 238Restoring Configurations from a TFTP Server 238Backing Up the Cisco IOS Software to a TFTP Server 239Restoring/Upgrading the Cisco IOS Software from a TFTP Server 239Restoring the Cisco IOS Software Using the ROM Monitor Environmental Variables and tftpdnld Command 240Secure Copy Protocol (SCP) 241 Configuring an SCP Server 241 Verifying and Troubleshooting SCP 241 Configuration Example: SCP 241Disabling Unneeded Services 242Useful Device Management Options 243PART IV: INFRASTRUCTURE SECURITY
  11. Chapter 10 Infrastructure Security 245IPv4 Access Control Lists (ACLs) 246 Configuring and Applying Standard IPv4 ACLs 246Configuring and Applying Extended IPv4 ACLs 247 Configuring and Applying Time-based ACLs 248 Configuring and Applying VTY ACLs 249IPv6 ACLs 250 Configuring and Applying IPv6 ACLs 250 Verifying IPv4 and IPv6 ACLs 251Implementing Authentication Methods 251 Simple Local Database Authentication 252 AAA-based Local Database Authentication 252 RADIUS Authentication 253 TACACS+ Authentication 255 Configuring Authorization and Accounting 256 Troubleshooting AAA 257Control Plane Policing (CoPP) 257 Step 1: Define ACLs to Identify Permitted CoPP Traffic Flows 258 Step 2: Define Class Maps for Matched Traffic 258 Step 3: Define a Policy Map to Police Matched Traffic 259 Step 4: Assign a Policy Map to the Control Plane 259 Verifying CoPP 260Unicast Reverse Path Forwarding (uRPF) 260 Configuring uRPF 260 Verifying and Troubleshooting uRPF 260PART V: NETWORK ASSURANCE
  12. Chapter 11 Network Assurance 261Internet Control Message Protocol Redirect Messages 262The ping Command 262Examples of Using the ping and the Extended ping Commands 263The traceroute Command 265The debug Command 265Conditionally Triggered Debugs 266Configuring Secure SNMP 267 Securing SNMPv1 or SNMPv2c 267 Securing SNMPv3 268 Verifying SNMP 269Implementing Logging 269 Configuring Syslog 269 Syslog Message Format 269 Syslog Severity Levels 270 Syslog Message Example 270Configuring NetFlow 271Configuring Flexible NetFlow 272 Step 1: Configure a Flow Record 272 Step 2: Configure a Flow Exporter 272 Step 3: Configure a Flow Monitor 272 Step 4: Apply the Flow Monitor to an Interface 273Verifying NetFlow 273Implementing Port Mirroring 273 Default SPAN and RSPAN Configuration 273 Configuring Local SPAN 274 Local SPAN Guidelines for Configuration 274 Configuration Example: Local SPAN 274 Configuring Remote SPAN 277 Remote SPAN Guidelines for Configuration 278 Configuration Example: Remote SPAN 278 Configuring Encapsulated RSPAN (ERSPAN) 280 Verifying and Troubleshooting Local and Remote SPAN 281Configuring Network Time Protocol 281 NTP Configuration 281 NTP Design 282 Securing NTP 284 Verifying and Troubleshooting NTP 286 Setting the Clock on a Router 286 Using Time Stamps 290 Configuration Example: NTP 290Tool Command Language (Tcl) 294Embedded Event Manager (EEM) 295 EEM Configuration Examples 296 EEM and Tcl Scripts 298 Verifying EEM 298PART VI: WIRELESS
  13. Chapter 12 Wireless Security and Troubleshooting 299Authenticating Wireless Clients 299 Open Authentication 300 Authenticating with a Pre-shared Key 302 Authenticating with EAP 304 Authenticating with WebAuth 310Troubleshooting from the Wireless LAN Controller 312Troubleshooting Wireless Client Connectivity 318 Cisco AireOS Monitoring Dashboard GUI 318 Cisco IOS XE GUI 322PART VII: OVERLAYS AND VIRTUALIZATION
  14. Chapter 13 Overlay Tunnels and VRF 325Generic Routing Encapsulation (GRE) 325 Configuring an IPv4 GRE Tunnel 326 Configuring an IPv6 GRE Tunnel 326 Verifying IPv4 and IPv6 GRE Tunnels 327 Configuration Example: IPv4 and IPv6 GRE Tunnels with OSPFv3 327Site-to-Site GRE over IPsec 331 GRE/IPsec Using Crypto Maps 332 GRE/IPsec Using IPsec Profiles 333 Verifying GRE/IPsec 335Site-to-Site Virtual Tunnel Interface (VTI) over IPsec 335Cisco Dynamic Multipoint VPN (DMVPN) 336 Configuration Example: Cisco DMVPN for IPv4 337 Verifying Cisco DMVPN 342VRF-Lite 343 Configuring VRF-Lite 343 Verifying VRF-Lite 345Appendix A: Create Your Own Journal Here 347Index 361
Chat Zalo