Scaling Networks Companion Guide
16%
off

Scaling Networks Companion Guide

4.5 (6 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco (R) CCNA (R) Academy (R) This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: Chapter objectives-Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms-Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary-Consult the comprehensive Glossary with over 180 terms. Summary of Activities and Labs-Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding-Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. Related Title: Scaling Networks Lab Manual ISBN-13: 978-1-58713-325-1 ISBN-10: 1-58713-325-3 Interactive Activities-Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon. Videos-Watch the videos embedded within the online course. Packet Tracer Activities-Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on Labs-Work through allthe course labs and Class Activities that are included in the course and published in the separate Lab Manual.show more

Product details

  • Hardback | 768 pages
  • 210 x 232 x 32mm | 1,259.98g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • illustrations (black and white)
  • 1587133288
  • 9781587133282
  • 430,013

About Cisco Networking Academy

Allan Johnson entered the academic world in 1999 after ten years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed. in Occupational Training and Development. He is an information technology instructor at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full-time for Cisco Networking Academy as a learning systems developer.show more

Table of contents

Introduction xx Chapter 1 Introduction to Scaling Networks 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 3 Implementing a Network Design (1.1) 3 Hierarchical Network Design (1.1.1) 3 The Need to Scale the Network (1.1.1.1) 3 Enterprise Business Devices (1.1.1.2) 5 Hierarchical Network Design (1.1.1.3) 6 Cisco Enterprise Architecture (1.1.1.4) 7 Failure Domains (1.1.1.5) 9 Expanding the Network (1.1.2) 11 Design for Scalability (1.1.2.1) 11 Planning for Redundancy (1.1.2.2) 12 Increasing Bandwidth (1.1.2.3) 13 Expanding the Access Layer (1.1.2.4) 14 Fine-tuning Routing Protocols (1.1.2.5) 15 Selecting Network Devices (1.2) 18 Switch Hardware (1.2.1) 18 Switch Platforms (1.2.1.1) 18 Port Density (1.2.1.2) 21 Forwarding Rates (1.2.1.3) 22 Power over Ethernet (1.2.1.4) 23 Multilayer Switching (1.2.1.5) 25 Router Hardware (1.2.2) 26 Router Requirements (1.2.2.1) 26 Cisco Routers (1.2.2.2) 28 Router Hardware (1.2.2.3) 29 Managing Devices (1.2.3) 30 Managing IOS Files and Licensing (1.2.3.1) 30 In-Band Versus Out-of-Band Management (1.2.3.2) 30 Basic Router CLI Commands (1.2.3.3) 31 Basic Router show Commands (1.2.3.4) 34 Basic Switch CLI Commands (1.2.3.5) 39 Basic Switch show Commands (1.2.3.6) 40 Summary (1.3) 44 Practice 45 Class Activities 45 Labs 45 Packet Tracer Activities 45 Check Your Understanding Questions 46 Chapter 2 LAN Redundancy 49 Objectives 49 Key Terms 49 Introduction (2.0.1.1) 51 Spanning Tree Concepts (2.1) 52 Purpose of Spanning Tree (2.1.1) 52 Redundancy at OSI Layers 1 and 2 (2.1.1.1) 52 Issues with Layer 1 Redundancy: MAC Database Instability (2.1.1.2) 54 Issues with Layer 1 Redundancy: Broadcast Storms (2.1.1.3) 56 Issues with Layer 1 Redundancy: Duplicate Unicast Frames (2.1.1.4) 57 STP Operation (2.1.2) 59 Spanning Tree Algorithm: Introduction (2.1.2.1) 59 Spanning Tree Algorithm: Port Roles (2.1.2.2) 61 Spanning Tree Algorithm: Root Bridge (2.1.2.3) 63 Spanning Tree Algorithm: Path Cost (2.1.2.4) 64 802.1D BPDU Frame Format (2.1.2.5) 67 BPDU Propagation and Process (2.1.2.6) 68 Extended System ID (2.1.2.7) 74 Varieties of Spanning Tree Protocols (2.2) 77 Overview (2.2.1) 77 List of Spanning Tree Protocols (2.2.1.1) 78 Characteristics of the Spanning Tree Protocols (2.2.1.2) 79 PVST+ (2.2.2) 80 Overview of PVST+ (2.2.2.1) 80 Port States and PVST+ Operation (2.2.2.2) 82 Extended System ID and PVST+ Operation (2.2.2.3) 83 Rapid PVST+ (2.2.3) 84 Overview of Rapid PVST+ (2.2.3.1) 84 RSTP BPDU (2.2.3.2) 86 Edge Ports (2.2.3.3) 87 Link Types (2.2.3.4) 88 Spanning Tree Configuration (2.3) 90 PVST+ Configuration (2.3.1) 90 Catalyst 2960 Default Configuration (2.3.1.1) 90 Configuring and Verifying the Bridge ID (2.3.1.2) 91 PortFast and BPDU Guard (2.3.1.3) 93 PVST+ Load Balancing (2.3.1.4) 95 Rapid PVST+ Configuration (2.3.2) 98 Spanning Tree Mode (2.3.2.1) 98 STP Configuration Issues (2.3.3) 101 Analyzing the STP Topology (2.3.3.1) 101 Expected Topology Versus Actual Topology (2.3.3.2) 102 Overview of Spanning Tree Status (2.3.3.3) 102 Spanning Tree Failure Consequences (2.3.3.4) 103 Repairing a Spanning Tree Problem (2.3.3.5) 105 First Hop Redundancy Protocols (2.4) 105 Concept of First Hop Redundancy Protocols (2.4.1) 106 Default Gateway Limitations (2.4.1.1) 106 Router Redundancy (2.4.1.2) 107 Steps for Router Failover (2.4.1.3) 108 Varieties of First Hop Redundancy Protocols (2.4.2) 109 First Hop Redundancy Protocols (2.4.2.1) 109 FHRP Verification (2.4.3) 110 HSRP Verification (2.4.3.1) 110 GLBP Verification (2.4.3.2) 112 Syntax Checker - HSRP and GLBP (2.4.3.3) 114 Summary (2.5) 115 Practice 116 Class Activities 116 Labs 116 Packet Tracer Activities 116 Check Your Understanding Questions 117 Chapter 3 LAN Aggregation 121 Objectives 121 Key Terms 121 Introduction (3.0.1.1) 122 Link Aggregation Concepts (3.1) 122 Link Aggregation (3.1.1) 123 Introduction to Link Aggregation (3.1.1.1) 123 Advantages of EtherChannel (3.1.1.2) 124 EtherChannel Operation (3.1.2) 125 Implementation Restrictions (3.1.2.1) 125 Port Aggregation Protocol (3.1.2.2) 126 Link Aggregation Control Protocol (3.1.2.3) 128 Link Aggregation Configuration (3.2) 130 Configuring EtherChannel (3.2.1) 130 Configuration Guidelines (3.2.1.1) 130 Configuring Interfaces (3.2.1.2) 131 Verifying and Troubleshooting EtherChannel (3.2.2) 133 Verifying EtherChannel (3.2.2.1) 133 Troubleshooting EtherChannel (3.2.2.2) 135 Summary (3.3) 139 Practice 140 Class Activities 140 Labs 140 Packet Tracer Activities 140 Check Your Understanding Questions 141 Chapter 4 Wireless LANs 145 Objectives 145 Key Terms 145 Introduction (4.0.1.1) 147 Wireless Concepts (4.1) 147 Introduction to Wireless (4.1.1) 147 Supporting Mobility (4.1.1.1) 148 Benefits of Wireless (4.1.1.2) 148 Wireless Technologies (4.1.1.3) 149 Radio Frequencies (4.1.1.4) 150 802.11 Standards (4.1.1.5) 151 Wi-Fi Certification (4.1.1.6) 153 Comparing WLANs to a LAN (4.1.1.7) 154 Components of WLANs (4.1.2) 156 Wireless NICs (4.1.2.1) 156 Wireless Home Router (4.1.2.2) 157 Business Wireless Solutions (4.1.2.3) 159 Wireless Access Points (4.1.2.4) 160 Small Wireless Deployment Solutions (4.1.2.5) 162 Large Wireless Deployment Solutions (4.1.2.6, 4.1.2.7) 165 Wireless Antennas (4.1.2.8) 168 802.11 WLAN Topologies (4.1.3) 170 802.11 Wireless Topology Modes (4.1.3.1) 170 Ad Hoc Mode (4.1.3.2) 170 Infrastructure Mode (4.1.3.3) 171 Wireless LAN Operations (4.2) 173 802.11 Frame Structure (4.2.1) 173 Wireless 802.11 Frame (4.2.1.1) 173 Frame Control Field (4.2.1.2) 175 Wireless Frame Type (4.2.1.3) 177 Management Frames (4.2.1.4) 177 Control Frames (4.2.1.5) 180 Wireless Operation (4.2.2) 181 Carrier Sense Multiple Access with Collision Avoidance (4.2.2.1) 181 Wireless Clients and Access Point Association (4.2.2.2) 183 Association Parameters (4.2.2.3) 183 Discovering APs (4.2.2.4) 187 Authentication (4.2.2.5) 189 Channel Management (4.2.3) 191 Frequency Channel Saturation (4.2.3.1) 191 Selecting Channels (4.2.3.2) 193 Planning a WLAN Deployment (4.2.3.3) 196 Wireless LAN Security (4.3) 198 WLAN Threats (4.3.1) 198 Securing Wireless (4.3.1.1) 198 DoS Attack (4.3.1.2) 199 Management Frame DoS Attacks (4.3.1.3) 200 Rogue Access Points (4.3.1.4) 202 Man-in-the-Middle Attack (4.3.1.5) 203 Securing WLANs (4.3.2) 205 Wireless Security Overview (4.3.2.1) 205 Shared Key Authentication Methods (4.3.2.2) 206 Encryption Methods (4.3.2.3) 208 Authenticating a Home User (4.3.2.4) 208 Authentication in the Enterprise (4.3.2.5) 210 Wireless LAN Configuration (4.4) 211 Configure a Wireless Router (4.4.1) 211 Configuring a Wireless Router (4.4.1.1) 211 Setting Up and Installing Initial Linksys EA6500 (4.4.1.2) 213 Configuring the Linksys Smart Wi-Fi Home Page (4.4.1.3) 217 Smart Wi-Fi Settings (4.4.1.4) 218 Smart Wi-Fi Tools (4.4.1.5) 220 Backing Up a Configuration (4.4.1.6) 224 Configuring Wireless Clients (4.4.2) 225 Connecting Wireless Clients (4.4.2.1) 225 Troubleshoot WLAN Issues (4.4.3) 226 Troubleshooting Approaches (4.4.3.1) 226 Wireless Client Not Connecting (4.4.3.2) 227 Troubleshooting When the Network Is Slow (4.4.3.3) 229 Updating Firmware (4.4.3.4) 230 Summary (4.5) 232 Practice 233 Class Activities 233 Labs 233 Packet Tracer Activities 234 Check Your Understanding Questions 234 Chapter 5 Adjust and Troubleshoot Single-Area OSPF 237 Objectives 237 Key Terms 237 Introduction (5.0.1.1) 238 Advanced Single-Area OSPF Configurations (5.1) 238 Routing in the Distribution and Core Layers (5.1.1) 238 Routing Versus Switching (5.1.1.1) 238 Static Routing (5.1.1.2) 239 Dynamic Routing Protocols (5.1.1.3) 240 Open Shortest Path First (5.1.1.4) 241 Configuring Single-Area OSPF (5.1.1.5) 242 Verifying Single-Area OSPF (5.1.1.6) 244 Configuring Single-Area OSPFv3 (5.1.1.7) 247 Verifying Single-Area OSPFv3 (5.1.1.8) 249 OSPF in Multiaccess Networks (5.1.2) 251 OSPF Network Types (5.1.2.1) 251 Challenges in Multiaccess Networks (5.1.2.2) 253 OSPF Designated Router (5.1.2.3) 255 Verifying DR/BDR Roles (5.1.2.4) 256 Verifying DR/BDR Adjacencies (5.1.2.5) 259 Default DR/BDR Election Process (5.1.2.6) 261 DR/BDR Election Process (5.1.2.7) 262 The OSPF Priority (5.1.2.8) 265 Changing the OSPF Priority (5.1.2.9) 265 Default Route Propagation (5.1.3) 268 Propagating a Default Static Route in OSPFv2 (5.1.3.1) 268 Verifying the Propagated Default Route (5.1.3.2) 269 Propagating a Default Static Route in OSPFv3 (5.1.3.3) 271 Verifying the Propagated IPv6 Default Route (5.1.3.4) 272 Fine-Tuning OSPF Interfaces (5.1.4) 273 OSPF Hello and Dead Intervals (5.1.4.1) 273 Modifying OSPFv2 Intervals (5.1.4.2) 275 Modifying OSPFv3 Intervals (5.1.4.3) 277 Secure OSPF (5.1.5) 279 Routers Are Targets (5.1.5.1) 279 Secure Routing Updates (5.1.5.2) 280 MD5 Authentication (5.1.5.3) 281 Configuring OSPF MD5 Authentication (5.1.5.4) 282 OSPF MD5 Authentication Example (5.1.5.5) 283 Verifying OSPF MD5 Authentication (5.1.5.6) 284 Troubleshooting Single-Area OSPF Implementations (5.2) 286 Components of Troubleshooting Single-Area OSPF (5.2.1) 286 Overview (5.2.1.1) 286 OSPF States (5.2.1.2) 287 OSPF Troubleshooting Commands (5.2.1.3) 288 Components of Troubleshooting OSPF (5.2.1.4) 292 Troubleshoot Single-Area OSPFv2 Routing Issues (5.2.2) 293 Troubleshooting Neighbor Issues (5.2.2.1) 293 Troubleshooting OSPF Routing Table Issues (5.2.2.2) 297 Troubleshoot Single-Area OSPFv3 Routing Issues (5.2.3) 299 OSPFv3 Troubleshooting Commands (5.2.3.1) 299 Troubleshooting OSPFv3 (5.2.3.2) 302 Summary (5.3) 306 Practice 308 Class Activities 308 Labs 308 Packet Tracer Activities 308 Check Your Understanding Questions 309 Chapter 6 Multiarea OSPF 315 Objectives 315 Key Terms 315 Introduction (6.0.1.1) 316 Multiarea OSPF Operation (6.1) 316 Why Multiarea OSPF? (6.1.1) 316 Single-Area OSPF (6.1.1.1) 316 Multiarea OSPF (6.1.1.2) 317 OSPF Two-Layer Area Hierarchy (6.1.1.3) 319 Types of OSPF Routers (6.1.1.4) 320 Multiarea OSPF LSA Operation (6.1.2) 321 OSPF LSA Types (6.1.2.1) 321 OSPF LSA Type 1 (6.1.2.2) 322 OSPF LSA Type 2 (6.1.2.3) 323 OSPF LSA Type 3 (6.1.2.4) 324 OSPF LSA Type 4 (6.1.2.5) 325 OSPF LSA Type 5 (6.1.2.6) 326 OSPF Routing Table and Types of Routes (6.1.3) 326 OSPF Routing Table Entries (6.1.3.1) 327 OSPF Route Calculation (6.1.3.2) 328 Configuring Multiarea OSPF (6.2) 329 Configuring Multiarea OSPFv2 and OSPFv3 (6.2.1) 329 Implementing Multiarea OSPF (6.2.1.1) 329 Configuring Multiarea OSPF (6.2.1.2) 330 Configuring Multiarea OSPFv3 (6.2.1.3) 332 OSPF Route Summarization (6.2.2) 334 OSPF Route Summarization (6.2.2.1) 334 Interarea and External Route Summarization (6.2.2.2) 336 Interarea Route Summarization (6.2.2.3) 338 Calculating the Summary Route (6.2.2.4) 339 Configuring Interarea Route Summarization (6.2.2.5) 340 Verifying Multiarea OSPF (6.2.3) 342 Verifying Multiarea OSPF (6.2.3.1) 342 Verify General Multiarea OSPF Settings (6.2.3.2) 343 Verify the OSPF Routes (6.2.3.3) 345 Verify the Multiarea OSPF LSDB (6.2.3.4) 346 Verify Multiarea OSPFv3 (6.2.3.5) 349 Summary (6.3) 354 Practice 356 Class Activities 356 Labs 356 Packet Tracer Activities 356 Check Your Understanding Questions 356 Chapter 7 EIGRP 361 Objectives 361 Key Terms 361 Introduction (7.0.1.1) 363 Characteristics of EIGRP (7.1) 363 Basic Features of EIGRP (7.1.1) 363 Features of EIGRP (7.1.1.1) 364 Protocol-Dependent Modules (7.1.1.2) 365 Reliable Transport Protocol (7.1.1.3) 367 Authentication (7.1.1.4) 368 Types of EIGRP Packets (7.1.2) 368 EIGRP Packet Types (7.1.2.1) 368 EIGRP Hello Packets (7.1.2.2) 370 EIGRP Update and Acknowledgment Packets (7.1.2.3) 370 EIGRP Query and Reply Packets (7.1.2.4) 372 EIGRP Messages (7.1.3) 373 Encapsulating EIGRP Messages (7.1.3.1) 373 EIGRP Packet Header and TLV (7.1.3.2) 374 Configuring EIGRP for IPv4 (7.2) 377 Configuring EIGRP with IPv4 (7.2.1) 377 EIGRP Network Topology (7.2.1.1) 377 Autonomous System Numbers (7.2.1.2) 379 The Router EIGRP Command (7.2.1.3) 381 EIGRP Router ID (7.2.1.4) 382 Configuring the EIGRP Router ID (7.2.1.5) 384 The network Command (7.2.1.6) 385 The network Command and Wildcard Mask (7.2.1.7) 387 Passive Interface (7.2.1.8) 389 Verifying EIGRP with IPv4 (7.2.2) 392 Verifying EIGRP: Examining Neighbors (7.2.2.1) 392 Verifying EIGRP: show ip protocols Command (7.2.2.2) 393 Verifying EIGRP: Examine the IPv4 Routing Table (7.2.2.3) 396 Operation of EIGRP (7.3) 399 EIGRP Initial Route Discovery (7.3.1) 399 EIGRP Neighbor Adjacency (7.3.1.1) 399 EIGRP Topology Table (7.3.1.2) 400 EIGRP Convergence (7.3.1.3) 401 Metrics (7.3.2) 402 EIGRP Composite Metric (7.3.2.1) 402 Examining Interface Values (7.3.2.2) 405 Bandwidth Metric (7.3.2.3) 406 Delay Metric (7.3.2.4) 408 How to Calculate the EIGRP Metric (7.3.2.5) 409 Calculating the EIGRP Metric (7.3.2.6) 410 DUAL and the Topology Table (7.3.3) 413 DUAL Concepts (7.3.3.1) 413 Introduction to DUAL (7.3.3.2) 413 Successor and Feasible Distance (7.3.3.3) 414 Feasible Successors, Feasibility Condition, and Reported Distance (7.3.3.4) 415 Topology Table: show ip eigrp topology Command (7.3.3.5) 417 Topology Table: show ip eigrp topology Command (Cont.) (7.3.3.6) 418 Topology Table: No Feasible Successor (7.3.3.7) 420 DUAL and Convergence (7.3.4) 422 DUAL Finite State Machine (FSM) (7.3.4.1) 423 DUAL: Feasible Successor (7.3.4.2) 424 DUAL: No Feasible Successor (7.3.4.3) 426 Configuring EIGRP for IPv6 (7.4) 429 EIGRP for IPv4 Versus IPv6 (7.4.1) 429 EIGRP for IPv6 (7.4.1.1) 429 Comparing EIGRP for IPv4 and IPv6 (7.4.1.2) 430 IPv6 Link-Local Addresses (7.4.1.3) 432 Configuring EIGRP for IPv6 (7.4.2) 432 EIGRP for IPv6 Network Topology (7.4.2.1) 432 Configuring IPv6 Link-Local Addresses (7.4.2.2) 434 Configuring the EIGRP for IPv6 Routing Process (7.4.2.3) 436 The ipv6 eigrp Interface Command (7.4.2.4) 437 Verifying EIGRP for IPv6 (7.4.3) 440 Verifying EIGRP for IPv6: Examining Neighbors (7.4.3.1) 440 Verifying EIGRP for IPv6: show ipv6 protocols Command (7.4.3.2) 441 Verifying EIGRP for IPv6: Examine the IPv6 Routing Table (7.4.3.3) 442 Summary (7.5) 445 Practice 446 Class Activities 446 Labs 447 Packet Tracer Activities 447 Check Your Understanding Questions 447 Chapter 8 EIGRP Advanced Configurations and Troubleshooting 453 Objectives 453 Key Terms 453 Introduction (8.0.1.1) 454 Advanced EIGRP Configurations (8.1) 454 Automatic Summarization (8.1.1) 455 Network Topology (8.1.1.1) 455 EIGRP Automatic Summarization (8.1.1.2) 457 Configuring EIGRP Automatic Summarization (8.1.1.3) 459 Verifying Auto-Summary: show ip protocols (8.1.1.4) 460 Verifying Auto-Summary: Topology Table (8.1.1.5) 462 Verifying Auto-Summary: Routing Table (8.1.1.6) 464 Summary Route (8.1.1.7) 465 Summary Route (Cont.) (8.1.1.8) 466 Manual Summarization (8.1.2) 468 Manual Summary Routes (8.1.2.1) 468 Configuring EIGRP Manual Summary Routes (8.1.2.2) 470 Verifying Manual Summary Routes (8.1.2.3) 471 EIGRP for IPv6: Manual Summary Routes (8.1.2.4) 472 Default Route Propagation (8.1.3) 474 Propagating a Default Static Route (8.1.3.1) 474 Verifying the Propagated Default Route (8.1.3.2) 476 EIGRP for IPv6: Default Route (8.1.3.3) 477 Fine-Tuning EIGRP Interfaces (8.1.4) 478 EIGRP Bandwidth Utilization (8.1.4.1) 479 Hello and Hold Timers (8.1.4.2) 480 Load-Balancing IPv4 (8.1.4.3) 482 Load-Balancing IPv6 (8.1.4.4) 484 Secure EIGRP (8.1.5) 486 Routing Protocol Authentication Overview (8.1.5.1) 486 Configuring EIGRP with MD5 Authentication (8.1.5.2) 488 EIGRP Authentication Example (8.1.5.3) 489 Verify Authentication (8.1.5.4) 491 Troubleshoot EIGRP (8.2) 493 Components of Troubleshooting EIGRP (8.2.1) 493 Basic EIGRP Troubleshooting Commands (8.2.1.1) 493 Components (8.2.1.2) 495 Troubleshoot EIGRP Neighbor Issues (8.2.2) 496 Layer 3 Connectivity (8.2.2.1) 496 EIGRP Parameters (8.2.2.2) 497 EIGRP Interfaces (8.2.2.3) 498 Troubleshoot EIGRP Routing Table Issues (8.2.3) 500 Passive Interface (8.2.3.1) 500 Missing Network Statement (8.2.3.2) 502 Automatic Summarization (8.2.3.3) 504 Summary (8.3) 509 Practice 511 Class Activities 511 Labs 511 Packet Tracer Activities 511 Check Your Understanding Questions 512 Chapter 9 IOS Images and Licensing 517 Objectives 517 Key Terms 517 Introduction (9.0.1.1) 518 Managing IOS System Files (9.1) 518 Naming Conventions (9.1.1) 519 Cisco IOS Software Release Families and Trains (9.1.1.1) 519 Cisco IOS Release 12.4 Mainline and T Trains (9.1.1.2) 519 Cisco IOS Release 12.4 Mainline and T Numbering (9.1.1.3) 521 Cisco IOS Release 12.4 System Image Packaging (9.1.1.4) 522 Cisco IOS Release 15.0 M and T Trains (9.1.1.5) 523 Cisco IOS Release 15 Train Numbering (9.1.1.6) 525 IOS Release 15 System Image Packaging (9.1.1.7) 526 IOS Image Filenames (9.1.1.8) 528 Managing Cisco IOS Images (9.1.2) 531 TFTP Servers as a Backup Location (9.1.2.1) 531 Creating a Cisco IOS Image Backup (9.1.2.2) 531 Copying a Cisco IOS Image (9.1.2.3) 533 Boot System (9.1.2.4) 534 IOS Licensing (9.2) 536 Software Licensing (9.2.1) 536 Licensing Overview (9.2.1.1) 536 Licensing Process (9.2.1.2) 538 Step 1. Purchase the Software Package or Feature to Install (9.2.1.3) 539 Step 2. Obtain a License (9.2.1.4) 539 Step 3. Install the License (9.2.1.5) 541 License Verification and Management (9.2.2) 542 License Verification (9.2.2.1) 542 Activate an Evaluation Right-To-Use License (9.2.2.2) 544 Back Up the License (9.2.2.3) 545 Uninstall the License (9.2.2.4) 546 Summary (9.3) 548 Practice 551 Class Activities 551 Packet Tracer Activities 551 Check Your Understanding Questions 551 Appendix A Answers to the "Check Your Understanding" Questions 555 Glossary 569 TOC, 9781587133282, 2/28/2014show more

Rating details

6 ratings
4.5 out of 5 stars
5 50% (3)
4 50% (3)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X