CCNP Routing and Switching Quick Reference (642-902, 642-813, 642-832)
46%
off

CCNP Routing and Switching Quick Reference (642-902, 642-813, 642-832)

3.85 (14 ratings by Goodreads)
By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

As a final preparation tool providing a review of CCNP exam topics, the CCNP Quick Reference 2/e complements official Cisco curriculum, other books, or other exam preparatory material in a candidates preparation for the four CCNP exams. This concise guide provides you with detailed, graphical-based information, highlighting only the key topics on the latest CCNP exams in a review-style format. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of important concepts. This book provides a comprehensive final review for candidates taking any of the CCNP exams. It steps through exam objectives one-by-one, providing concise and accurate review for all topics. Using this book, you will be able to easily and effectively review test objectives without having to wade through numerous books and documents for relevant content for final review.
show more

Product details

  • Mixed media product | 312 pages
  • 152.4 x 226.06 x 17.78mm | 408.23g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 2nd ed.
  • 1587202840
  • 9781587202841
  • 619,557

Back cover copy

As a final preparation tool providing a review of CCNP exam topics, the CCNP Quick Reference 2/e complements official Cisco curriculum, other books, or other exam preparatory material in a candidates preparation for the four CCNP exams. This concise guide provides you with detailed, graphical-based information, highlighting only the key topics on the latest CCNP exams in a review-style format. This fact-filled Quick Reference allows you to get all-important information at a glance, helping you to focus your study on areas of weakness and to enhance memory retention of important concepts. This book provides a comprehensive final review for candidates taking any of the CCNP exams. It steps through exam objectives one-by-one, providing concise and accurate review for all topics. Using this book, you will be able to easily and effectively review test objectives without having to wade through numerous books and documents for relevant content for final review.
show more

About Brent Stewart

Denise Donohue, CCIE No. 9566, is a senior solutions architect for ePlus Technology, a Cisco Gold partner. She works as a consulting engineer, designing networks for ePlus' customers. Prior to this role, she was a systems engineer for the data consulting arm of SBC/AT&T. She has co-authored several Cisco Press books in the areas of route/switch and voice. Denise has worked as a Cisco instructor and course director for Global Knowledge and was a network consultant for many years. Her areas of specialization include route/switch, voice, and data center. Brent Stewart, CCNP (R), CCDP (R), CCSI, MCSE, is the manager of Connectivity Services at CommScope. He is responsible for designing and managing a largescale worldwide voice, video, and data network. Previously he was a course director for Global Knowledge and participated in the development of BSCI with Cisco and has written and taught extensively on CCNA (R) and CCNP. Brent lives in Hickory, NC, with his beautiful wife, Karen, and their mischievous children Benjamin, Kaitlyn, Madelyn, and William.
show more

Table of contents

ROUTEChapter 1 Planning for Complex Networks 1Network Design Models 1Hierarchical Design Model 1Enterprise Composite Model 2Cisco Enterprise Architecture 7SONA and IIN 7Understanding Routing Protocols 9Administrative Distance 9Routing Protocol Characteristics 10Building the Routing Table 11Choosing a Route 11Planning a Routing Implementation 12Creating an Implementation Plan 12Creating Implementation Documentation 13Chapter 2 EIGRP 14EIGRP Overview 14EIGRP Messages 15Packet Types 15Neighbor Discovery and Route Exchange 15EIGRP Route Selection 16EIGRP Metric 16Diffusing Update Algorithm (DUAL) 17Route Selection Example 18Planning an EIGRP Implementation 19Basic EIGRP Configuration 20Creating an EIGRP Default Route 20Verify and Troubleshoot EIGRP 21EIGRP Across a WAN 21EIGRP over EoMPLS 21EIGRP over MPLS 22EIGRP over Frame Relay 23WAN Bandwidth 24Customizing the EIGRP Configuration 25Passive Interface 25Unicast Neighbors 25Summarization 26Load Balancing 26EIGRP Authentication 27EIGRP Scalability 29EIGRP Stub 29Active Process Enhancement 30Graceful Shutdown 30Chapter 3 OSPF 31OSPF Overview 31OSPF Network Structure 31OSPF Metric 33Link State Advertisements (LSA) 34LSA Operation 34LSDB Overload Protection 34LSA Types 35OSPF Operation 35OSPF Packets 36OSPF Neighbor Relationships 36Establishing Neighbors and Exchanging Routes 37Planning for OSPF 37Basic OSPF Configuration 38Router ID 39Verify and Troubleshoot OSPF 39OSPF Network Types 40Designated Routers 41Nonbroadcast Multiaccess (NBMA) Networks 42OSPF over Layer 2 and Layer 3 MPLS 42Advanced OSPF Configuration 42OSPF Summarization 43Passive Interface 43OSPF Default Routes 44Stub and Not-So-Stubby Areas 44Virtual Links 45OSPF Authentication 46Chapter 4 Optimizing Routing 48Controlling Routing Updates 48Route Maps 48Prefix Lists 52Distribute Lists 54Passive Interfaces 54Using Multiple Routing Protocols 54Configuring Route Redistribution 55Seed Metric 55Administrative Distance 56Planning Route Redistribution 58Redistribution Techniques 59Redistribution Notes 59Chapter 5 Path Control 61Using Offset-lists 61Using IOS IP SLA 62Policy-Based Routing 64OER and VRF 66Chapter 6 BGP and Internet Connectivity 67Planning an Internet Connection 67To Route or Not to Route? 67BGP Route Options 68Types of ISP Connections 68BGP Overview 69BGP Databases 70BGP Message Types 71Internal and External BGP 71BGP Next-Hop Selection 72BGP Next Hop on a Multiaccess Network 73BGP Synchronization Rule 73Configuring BGP 74BGP Network Command 74BGP Peering 75BGP Peering States 75BGP Path Selection 76BGP Attributes 76BGP Path Selection Criteria 77Influencing BGP Path Selection 78Filtering BGP Routes 78BGP Authentication 79Verifying BGP 80Chapter 7 Branch Office Connectivity 83Branch Office Design Considerations 83Small Branch Office Design 83Medium Branch Office Design 84Large Branch Office Design 84Implementing Branch Offices 84Verifying Existing Services 85Configuring a Backup DSL Connection 85Configuring an IPsec VPN 89Configuring a Floating Static Route 90Configuring Dynamic Routing over a GRE Tunnel 90Load Sharing with EIGRP 92Chapter 8 Mobile Worker Connectivity 93Components of a Mobile Worker Solution 94Implementing a Mobile Worker Solution 95Chapter 9 IPv6 Introduction 99IPv6 Addressing 99Simplifying an IPv6 Address 100Special Addresses 101IPv6 Host Addressing 101IPv6 Routing 104Static Routing 105RIPng for IPv6 105EIGRP for IPv6 106OSPFv3 107MP-BGP for IPv6 109RIPng Redistribution 109Integrating IPv4 and IPv6 110Tunneling IPv6 over IPv4 111Using Address Translation 113Static NAT-PT 113Dynamic NAT-PT 113IPv6 Link Types 114Point-to-Point Links 114Point-to-Multipoint Links 115Multiaccess Links 115Appendix A Understanding IPsec 117IPsec Headers 117Authentication Header 117Encapsulating Security Payload 118IPsec Modes 118Authentication Methods 119Encryption Methods 119Symmetric Key Algorithms 119Asymmetric Key Algorithm 120Diffie-Hellman Key Exchange 120Key Management 120Establishing an IPsec VPN 121Configuring a Site-to-Site VPN Using IOS 121Configuring an ISAKMP Policy 122Configuring an IPsec Transform Set 123Configuring a Crypto ACL 123Configuring a Crypto Map 124Applying the Crypto Map to an Interface 124Configuring an Optional Interface Access List 124Monitoring and Troubleshooting IPsec VPNs 125Using GRE with IPsec 125Configuring a GRE Tunnel Using IOS 126Appendix B IPv6 Header Format 127SWITCHChapter 1 Campus Network Design 129The Hierarchical Design Model 129Core Layer 130Small Campus Design 131Medium Campus Design 131Data Center Design 131Network Traffic Flow 133Service-Oriented Network Architecture 134Planning a Network Implementation 135Chapter 2 VLAN Implementation 137VLAN Overview 137VLAN Planning 139Creating a VLAN and Assigning Ports 139Verifying VLAN Configuration 139VLAN Trunking 141Configuring a Trunk Link 142VLANs Allowed on the Trunk 143Best Practices for Trunking 143VLAN Trunking Protocol 143VTP Switch Roles 144Configuring VTP 145Verifying and Monitoring VTP 145Adding a New Switch to a VTP Domain 146EtherChannels 146Configuring an EtherChannel 147Verifying an EtherChannel 148Troubleshooting VLAN Issues 148Troubleshooting User Connectivity 148Troubleshooting Trunking 149Troubleshooting VTP 149Chapter 3 Spanning Tree 150Understanding the Spanning Tree Protocol 150Spanning Tree Election Criteria 151STP Election 152Bridge Protocol Data Units 154Spanning Tree Port States 155Per-VLAN Spanning-Tree 155Configuring Spanning Tree 156Portfast 156Rapid Spanning Tree 157RSTP Port Roles 157BPDU Differences in RSTP 157RSTP Fast Convergence 158Multiple Spanning Tree 159Spanning Tree Stability Mechanisms 159UplinkFast 159BackboneFast 160BPDU Guard 160BPDU Filtering 161Root Guard 161Unidirectional Link Detection 161Loop Guard 162Troubleshooting STP 163Identifying a Bridging Loop 163Spanning-Tree Best Practices 164Chapter 4 InterVLAN Routing 166InterVLAN Routing Using an External Router 166InterVLAN Routing Using Multilayer Switches 167The Layer 2 and Layer 3 Forwarding Process 167Understanding the Switching Table 168MLS Interfaces 168Understanding Switch Forwarding Architectures 170CEF Switching 170Configuring and Troubleshooting CEF 171Chapter 5 Implementing High Availability 173Components of High Availability 173Redundancy 173Technology 173People 174Processes 175Tools 175Resiliency and High Availability 176Network Level Resiliency 176Fast Failover 176Optimizing Redundancy 177NSF with SSO 177Designing for Redundancy 178Layer 2 Versus Layer 3 Access Design 178Using Nonchassis Based Access Switches 181Network Management for High Availability 181Syslog 182SNMP 182IP SLA 183Chapter 6 First Hop Redundancy 185Hot Standby Router Protocol 185HSRP States 186Configuring HSRP 186Virtual Router Redundancy Protocol 188GLBP 189Planning Router Redundancy Implementation 190Chapter 7 Campus Network Security 191MAC Address-Based Attacks 191MAC Address Flooding 192Port Security 192Port-Based Authentication 193VLAN-Based Attacks 194Switch Spoofing 194802.1Q Double-Tagging 195VACLs 195Private VLANs 196Protected Ports 197Spoof Attacks 197DHCP Spoofing 198IP Source Guard 198ARP Spoofing 198Securing Your Switch 199Chapter 8 Voice and Video in a Campus Network 200VoIP in a Campus Network 201Preparing the Network for VoIP 202Voice VLANs 203QoS for VoIP 204Configuring VoIP Support on a Switch 206Video over IP 208QoS Requirements for Video 208Chapter 9 Wireless LANs in a Campus Network 210Cisco Unified Wireless Network 210Characteristics of Wireless LANs 211Service Set Identifiers (SSID) 211WLAN Topologies 211Client Connectivity 212Cisco Wireless Network Components 213Autonomous (Stand-alone) APs 213Lightweight Access Points 214Wireless LAN Controllers 215Hybrid Remote Edge Access Point (H-REAP) 216Integrating Wireless into the LAN 216Switch Configuration 217Planning for a Wireless Implementation 217TSHOOTChapter 1 Maintenance 219Methodology 219Common Tasks 220Tools 223Configurations 223Other Tools 228Chapter 2 Troubleshooting Methodology 230Principles 230Structured Troubleshooting 231The Troubleshooting Method 232Integrating Troubleshooting into Maintenance 233Chapter 3 Troubleshooting Tools 235IOS Filtering Tools 235Output Redirection 242IOS Troubleshooting Tools 242Hardware Diagnostics 246Working with External Tools 249Packet Sniffing 249Netflow 250SNMP and EEM 250Chapter 4 Troubleshooting Switches 252Spanning Tree 254VLANs 257Switched Virtual Interfaces and InterVLAN routing 258First-Hop Redundancy 258Chapter 5 Troubleshooting Routing 261Network Layer Connectivity 261Routing Protocols 261EIGRP 262Is the Correct Route Advertised? 262Is the Correct Route Communicated? 263Is There a More Desirable Path? 264OSPF 264Is the Correct Route Advertised? 264Is the Correct Route Communicated? 264Is There a More Desirable Path? 265BGP 265Is the Correct Route Advertised? 265Is the Correct Route Communicated? 266Is There a More Desirable Path? 266Route Redistribution 267Router Performance 268Chapter 6 Troubleshooting Security Features 270Troubleshooting Security Features 271Index 273
show more

Rating details

14 ratings
3.85 out of 5 stars
5 43% (6)
4 7% (1)
3 43% (6)
2 7% (1)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X