Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
 Search:   
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
 
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
I.T
 .NET
 Windows 8
 Adobe CS6
 Cisco
 CCNA 2012
 CCNP 2012
 Java
 VB
 ASP
 Web Design
 E-Commerce
 Project Management
 ITIL
 Macintosh
 Mobile Devices
 Linux
 Windows Server 2012
 SQL Server 2012
 SAP
Certification
 MCITP
 MCTS
Economics and Business
 Accounting
 Business Information Systems
 Economics
 Finance
 Management
 Marketing
 TAX
 Human Resources
Academic
 Law
 Nursing
 Medical
 Psychology
 Engineering

Interconnecting Cisco Network Devices, Part 2 (ICND2): (CCNA Exam 640-802 and ICND exam 640-816), 3rd Edition

by: Stephen McQuerry

Notify me when in stock

On-line Price: $51.95 (includes GST)

Hardcover package 408

20%Off Retail Price

You save: $13.00

Usually ships within 4 - 6 weeks. Price/availability/options for all orders placed will be confirmed by reply email before processing.

Retail Price: $64.95

Publisher: CISCO PRESS,05.05.08

Category: CCNA 2012 Level:

ISBN: 1587054639
ISBN13: 9781587054631

Add to Shopping Cart

Description

Learn the concepts on the new CCNA 640-802 and ICND2 640-816 exams with the only Cisco authorized self-study guide


  * Learn ICND2 640-816 and CCNA 640-802 exam concepts with the only Cisco authorized self-study guide


  * Master ICND2 materials with the Third Edition of the best-selling self-study guide for CCNA


  * Complement classroom learning with materials developed in conjunction with Cisco


  * Understand concepts taught via a variety of new and proven learning features

With the introduction in June 2007 of the new CCNA 640-802 exams, Cisco also introduced the newest versions of the InterconnectingCisco Network Devices courses (ICND1 and ICND2) course. Interconnecting Cisco Network Devices, Part 2 (ICND2), Third Edition is a Cisco authorized self-paced learning tool that helps CCNA candidates prepare for the second of these ICND courses, as well as for both the ICND2 640-816 exam as well as the new CCNA 640-802 exam. This book is the third edition of the best-selling title for early-stage CCNA preparation. It is designed in exclusive cooperation with Cisco. Coverage includes a review of the OSI model, routers and switches, Cisco IOS software, command line interface, WAN, and ISND and Frame Relay. The CCNA program certifies that a professional can install, configure, and operate LAN, WAN, and dial access services for small networks (100 nodes or fewer). It is considered one of the most valuable IT certifications, and it has been growing in popularity over the last several years.



Features and Benefits

Learn the concepts on the new CCNA 640-802 and ICND2 640-816 exams with the only Cisco authorized self-study guide


  * Learn ICND2 640-816 and CCNA 640-802 exam concepts with the only Cisco authorized self-study guide


  * Master ICND2 materials with the Third Edition of the best-selling self-study guide for CCNA


  * Complement classroom learning with materials developed in conjunction with Cisco


  * Understand concepts taught via a variety of new and proven learning features



Table of Contents

Foreword

Introduction

Chapter 1 Review of Cisco IOS for Routers and Switches

Chapter Objectives 3

Cisco IOS CLI Functions 4


  Configuration Modes of Cisco IOS Software 4


  Help Facilities of the Cisco IOS CLI 6


  Commands Review 7


  Summary of Cisco IOS CLI Commands 8

Chapter Summary 8

Review Questions 8

Chapter 2 Medium-Sized Switched Network Construction

Chapter Objectives

Implementing VLANs and Trunks


  Understanding VLANs


  VLAN Overview


          Grouping Business Functions into VLANs


          Applying IP Address Space in the Enterprise Network


          Example: Network Design


          Considering Traffic Source to Destination Paths


          Voice VLAN Essentials


  VLAN Operation


  Understanding Trunking with 802.1Q


          802.1Q Frame


          802.1Q Native VLAN


  Understanding VLAN Trunking Protocol


          VTP Modes


          VTP Operation


          VTP Pruning


  Configuring VLANs and Trunks


          VTP Configuration


          Example: VTP Configuration


          802.1Q Trunking Configuration


          VLAN Creation


          VLAN Port Assignment


          Adds, Moves, and Changes for VLANs


          Adding VLANs and Port Membership


          Changing VLANs and Port Membership


          Deleting VLANs and Port Membership


  Summary of Implementing VLANs and Trunks

Improving Performance with Spanning Tree


  Building a Redundant Switched Topology


          Choosing Interconnection Technologies


          Determining Equipment and Cabling Needs


          EtherChannel Overview


  Redundant Topology


  Recognizing Issues of a Redundant Switched Topology


          Switch Behavior with Broadcast Frames


          Broadcast Storms


          Example: Broadcast Storms


          Multiple Frame Transmissions


          Example: Multiple Transmissions


          MAC Database Instability


  Resolving Issues with STP


          Spanning-Tree Operation


          Example: Selecting the Root Bridge


          Example: Spanning-Tree Operation


          Example: Spanning-Tree Path Cost


          Example: Spanning-Tree Recalculation


          STP Convergence


          Per VLAN Spanning Tree+


          PVST+ Operation


          Rapid Spanning Tree Protocol


          Per VLAN RSTP


          Multiple Spanning Tree Protocol


          RSTP Port Roles


  Configuring RSTP


  Summary of Improving Performance with Spanning Tree

Routing Between VLANs


  Understanding Inter-VLAN Routing


          Example: Router on a Stick


          Example: Subinterfaces


  Configuring Inter-VLAN Routing


  Summary of Routing Between VLANs

Securing the Expanded Network


  Overview of Switch Security Concerns


  Securing Switch Devices


          Securing Switch Protocols


          Mitigating Compromises Launched Through a Switch


          Describing Port Security


          802.X Port-Based Authentication


  Summary of Securing the Expanded Network

Troubleshooting Switched Networks


  Troubleshooting Switches


  Troubleshooting Port Connectivity


          Hardware Issues


          Configuration Issues


  Troubleshooting VLANs and Trunking


          Native VLAN Mismatches


          Trunk Mode Mismatches


          VLANs and IP Subnets


          Inter-VLAN Connectivity


  Troubleshooting VTP


          Unable to See VLAN Details in the show run Command Output


          Cisco Catalyst Switches Do Not Exchange VTP Information


          Recently Installed Switch Causes Network Problems


          All Ports Inactive After Power Cycle


  Troubleshooting Spanning Tree


          Use the Diagram of the Network


          Identify a Bridging Loop


          Log STP Events


          Temporarily Disable Unnecessary Features


          Designate the Root Bridge


          Verify the Configuration of RSTP


  Summary of Troubleshooting Switched Networks

Chapter Summary

Review Questions

Chapter 3 Medium-Sized Routed Network Construction

Chapter Objectives

Reviewing Dynamic Routing


  Understanding Distance Vector Routing Protocols


          Route Discovery, Selection, and Maintenance


          Routing Loops


          Route Maintenance Using Hold-Down Timers


          Route Maintenance Using Triggered Updates


          Route Maintenance Using Hold-Down Timers with Triggered Updates


  Link-State and Advanced Distance Vector Protocols


          Link-State Routing Protocol Algorithms


          Advanced Distance Vector Protocol Algorithm


  Summary of Reviewing Routing Operations

Implementing Variable-Length Subnet Masks


  Reviewing Subnets


          Computing Usable Subnetworks and Hosts


  Introducing VLSMs


  Route Summarization with VLSM


  Summary of Implementing Variable-Length Subnet Masks

Chapter Summary

Review Questions

Chapter 4 Single-Area OSPF Implementation

Chapter Objectives

Introducing OSPF


  Establishing OSPF Neighbor Adjacencies


  SPF Algorithm


  Configuring and Verifying OSPF


  Loopback Interfaces


  Verifying the OSPF Configuration


  Using OSPF debug Commands


  Load Balancing with OSPF


  OSPF Authentication


          Types of Authentication


          Configuring Plaintext Password Authentication


          Example: Plaintext Password Authentication Configuration


          Verifying Plaintext Password Authentication


  Summary of OSPF Introduction

Troubleshooting OSPF


          Components of Troubleshooting OSPF


          Troubleshooting OSPF Neighbor Adjacencies


          Troubleshooting OSPF Routing Tables


          Troubleshooting Plaintext Password Authentication


          Summary of Troubleshooting OSPF

Chapter Summary

Review Questions

Chapter 5 Implementing EIGRP

Chapter Objectives

Implementing EIGRP


  Introducing EIGRP


  Configuring and Verifying EIGRP


  Load Balancing with EIGRP


          EIGRP Metric


          Load Balancing Across Equal Paths


          Configuring Load Balancing Across Unequal-Cost Paths


          Example: Variance


  EIGRP Authentication


          Creating a Key Chain


          Configuring MD5 Authentication for EIGRP


          Example: MD5 Authentication Configuration


          Verifying MD5 Authentication


  Summary of Implementing EIGRP

Troubleshooting EIGRP


  Components of Troubleshooting EIGRP


  Troubleshooting EIGRP Neighbor Relationships


  Troubleshooting EIGRP Routing Tables


  Troubleshooting EIGRP Authentication


          Example: Successful MD5 Authentication


          Example: Troubleshooting MD5 Authentication Problems


  Summary of Troubleshooting EIGRP

Chapter Summary

Review Questions

Chapter 6 Managing Traffic with Access Control Lists

Chapter Objectives

Access Control List Operation


  Understanding ACLs


  ACL Operation


  Types of ACLs


  ACL Identification


  Additional Types of ACLs


          Dynamic ACLs


          Reflexive ACLs


          Time-Based ACLs


  ACL Wildcard Masking


  Summary of ACL Operations

Configuring ACLs


  Configuring Numbered Standard IPv4 ACLs


          Example: Numbered Standard IPv4 ACL-Permit My Network Only


          Example: Numbered Standard IPv4 ACL-Deny a Specific Host


          Example: Numbered Standard IPv4 ACL-Deny a Specific Subnet


  Controlling Access to the Router Using ACLs


  Configuring Numbered Extended IPv4 ACLs


          Extended ACL with the established Parameter


          Numbered Extended IP ACL: Deny FTP from Subnets


          Numbered Extended ACL: Deny Only Telnet from Subnet


  Configuring Named ACLs


          Creating Named Standard IP ACLs


          Creating Named Extended IP ACLs


          Named Extended ACL: Deny a Single Host from a Given Subnet


          Named Extended ACL-Deny a Telnet from a Subnet


  Adding Comments to Named or Numbered ACLs


  Summary of Configuring ACLs

Troubleshooting ACLs


  Problem: Host Connectivity


  Summary of Troubleshooting ACLs

Chapter Summary

Review Questions

Chapter 7 Managing Address Spaces with NAT and IPv6

Chapter Objectives

Scaling the Network with NAT and PAT


  Introducing NAT and PAT


  Translating Inside Source Addresses


          Static NAT Address Mapping


          Dynamic Address Translation


  Overloading an Inside Global Address


  Resolving Translation Table Issues


  Resolving Issues with Using the Correct Translation Entry


  Summary of Scaling the Network with NAT and PAT

Transitioning to IPv6


  Reasons for Using IPv6


  Understanding IPv6 Addresses


          Global Addresses


          Reserved Addresses


          Private Addresses


          Loopback Address


          Unspecified Address


          IPv6 over Data Link Layers


  Assigning IPv6 Addresses


          Manual Interface ID Assignment


          EUI-64 Interface ID Assignment


          Stateless Autoconfiguration


          DHCPv6 (Stateful)


          Use of EUI-64 Format in IPv6 Addresses


  Routing Considerations with IPv6


  Strategies for Implementing IPv6


  Configuring IPv6


          Configuring and Verifying RIPng for IPv6


          Example: RIPng for IPv6 Configuration


  Summary of Transitioning to IPv6

Chapter Summary

Review Questions

Chapter 8 Extending the Network into the WAN

Chapter Objectives

Introducing VPN Solutions


  VPNs and Their Benefits


  Types of VPNs


          Benefits


          Restrictions


  IPsec SSL VPN (WebVPN)


          Benefits


          Restrictions


  Components of VPNs


  Introducing IPsec


  IPsec Protocol Framework


  Summary of Introducing VPN Solutions

Establishing a Point-to-Point WAN Connection with PPP


  Understanding WAN Encapsulations


  Overview of PPP


  Configuring and Verifying PPP


          Example: PPP and CHAP Configuration


          Example: Verifying PPP Encapsulation Configuration


          Example: Verifying PPP Authentication


  Summary of Establishing a Point-to-Point WAN Connection with PPP

Establishing a WAN Connection with Frame Relay


  Understanding Frame Relay


          Example: Frame Relay Terminology-DLCI


          Example: Frame Relay Address Mapping


  Configuring Frame Relay


          Example: Configuring Frame Relay Point-to-Point Subinterfaces


          Example: Configuring Frame Relay Multipoint Subinterfaces


  Verifying Frame Relay


  Summary of Establishing a WAN Connection with Frame Relay

Troubleshooting Frame Relay WANs


  Components of Troubleshooting Frame Relay


  Troubleshooting Frame Relay Connectivity Issues


  Summary of Troubleshooting Frame Relay WANs

Chapter Summary

Review Questions

Appendix Answers to Chapter Review Questions

Index



About the Authors

Steve McQuerry, CCIE No. 6108, is a consulting systems engineer with Cisco focused on data center architecture. Steve works with enterprise customers in the Midwestern United States to help them plan their data center architectures. Steve has been an active member of the internetworking community since 1991 and has held multiple certifications from Novell, Microsoft, and Cisco. Before joining Cisco, Steve worked as an independent contractor with Global Knowledge, where he taught and developed coursework around Cisco technologies and certifications.