Вы находитесь на странице: 1из 14

1.01.

1 Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP


1.01.2 Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP
1.01.3. Frame Relay Multipoint Link on a Subinterface Using Inverse ARP
1.01.4. Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP
1.01.5. Frame Relay Point-to-Point Subinterfaces
1.01.6. PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side
1.01.7. Authentication on a Frame Relay Link Using PPP
1.2 Catalyst Configuration
1.2.01. Trunks Using an Industry-Standard Encapsulation
1.2.02. Trunks Using a Cisco Proprietary Encapsulation
1.2.03. Creating, Deleting, and Editing VLANs
1.2.04. VTP in Client/Server Mode
1.2.05. VTP in Transparent Mode
1.2.06. VTP Authentication
1.2.07. VTP Pruning
1.2.08. Controlling VLANs That Cross a Trunk
1.2.09. Optimizing STP by STP Timers
1.2.10. PortFast
1.2.11. Loop Guard
1.2.12. BPDU Guard
1.2.13. BPDU Filters
1.2.14. UplinkFast
1.2.15. BackboneFast
1.2.16. MSTP
1.2.17. Selecting the Root Bridge for VLANs in a PVST Environment
1.2.18. Selecting the Root Bridge for an MST Instance in an MST Environment
1.2.19. Setting the Port Priority to Designate the Forwarding Ports
1.2.20. EtherChannel Using an Industry-Standard Protocol
1.2.21. EtherChannel Using a Cisco Proprietary Protocol
1.2.22. Disabling Protocols on the EtherChannel
1.2.23. Load-Balancing Type on the EtherChannel
1.2.24. SNMP Management on the Switch
1.2.25. Telnet and SSH Management on the Switch
1.2.26. Controlling Inbound and Outbound Telnet on the Switch
1.2.27. Regular and Smart Macros
1.2.28. Switch Banners
1.2.29. UDLD
1.2.30. Switch Virtual Interfaces (SVIs) for IP Routing
1.2.31. Router on a Stick
1.2.32. SPAN
1.2.33. RSPAN
1.2.34. IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP
1.2.35. IP Phones to Connect to the Catalyst Switch
1.2.36. Dot1q Tunneling
1.3 Other Layer 2 Technologies
1.3.1. HDLC
1.3.2. PPP
1.3.3. PPP over Ethernet
2.0 Implementing IPv4 - Configuring and Troubleshooting IPv4
2.1. IPv4 Addressing
2.1.1. IPv4 Addressing
2.1.2. IPv4 Subnetting
2.1.3. IPv4 VLSM
2.2. OSPFv2
2.2.01. OSPF on a Broadcast Multicast Access Network (Ethernet)
2.2.02. OSPF over a Frame Relay Multipoint Network by Changing Network Types
2.2.03. OSPF over a Frame Relay Multipoint Network by Using the neighbor Command
2.2.04. OSPF over a Frame Relay Point-to-Point Network
2.2.05. Virtual Links
2.2.06. Stub Areas
2.2.07. Totally Stubby Areas
2.2.08. NSSA Areas
2.2.09. NSSA and Stub Areas
2.2.10. NSSA and Totally Stubby Areas
2.3. EIGRP
2.3.1. Basic EIGRP
2.3.2. Passive Interfaces
2.3.3. EIGRP Stub on Routers and Switches
2.3.4. EIGRP Update—Bandwidth Control
2.3.5. Changing the Administrative Distance of EIGRP
2.3.6. Unequal-Cost Load Balancing for EIGRP
2.4. Filtering, Redistribution, and Summarization
2.4.01. Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix
2.4.02. Route Filtering for OSPF Between Areas
2.4.03. Summarization of OSPF Routes Between Areas
2.4.04. Summarization of External Routers Within OSPF
2.4.05. Filtering with a Distribute List Using an ACL and Prefix Lists
2.4.06. Using Advanced ACLs and a Prefix List for Filtering Routes
2.4.07. Summarizing Routes with EIGRP
2.4.08. Route Summarization for RIP
2.4.09. Redistribution Between OSPF and EIGRP
2.4.10. Redistribution Between RIP and EIGRP
2.4.11. Redistribution Between RIP and OSPF
2.4.12. Redistribution of Directly Connected Routes
2.4.13. Redistribution of Static Routes
2.4.14. Redistribution with Filtering Using ACLs and Prefix Lists
2.4.15 Redistribution with Filtering Using Route Tagging
2.5. IBGP
2.5.1. IBGP Peering
2.5.2. Advertising Routes in BGP
2.5.3. Next-Hop Attribute
2.5.4. Route Reflectors
2.5.5. Redundancy by Neighbor Relationships Based on Loopbacks
2.6. EBGP
2.6.1. EBGP Peering
2.6.2. EBGP Peering Based on Loopbacks
2.7. BGP Advanced Features
2.7.01. Filtering Using ACLs
2.7.02. Filtering Using Prefix Lists
2.7.03. Filtering Using AS Path Filters
2.7.04. Redistributing Connected Routes into BGP
2.7.05. Redistributing Dynamic Routing Protocols into BGP
2.7.06. BGP Aggregation
2.7.07. BGP Aggregation with the Summary Only Parameter
2.7.08. BGP Aggregation with Suppress Maps
2.7.09. BGP Aggregation with Unsuppress Maps
2.7.10. BGP Best-Path Selection – Weight
2.7.11. BGP Best-Path Selection – Local Preference
2.7.12. BGP Best-Path Selection – MED
2.7.13. BGP Communities – No-Export
2.7.14. BGP Communities – No-Advertise
2.7.15. BGP Confederation
2.7.16. BGP Local AS
2.7.17. Working with Private AS Numbers
2.7.18. Route Dampening
2.7.19. Conditional Advertising
2.7.20. Peer Groups
2.8 Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
3.0 Implementing IPv6 - Configuring and Troubleshooting IPv6
3.1. IPv6
3.1.1. IPv6 Addresses
3.1.2 RIPng
3.1.3 OSPFv3
3.1.4 EIGRPv6
3.1.5 IPv6 Tunneling
3.1.6 IPv6 on a Frame Relay Network – Multipoint
3.1.7. IPv6 on a Frame Relay Network – Point-to-Point
3.1.8 Route Filtering with a Distribute List Using an ACL and Prefix Lists
3.1.9 Route Redistribution Between OSPFv3 and EIGRPv6
4.0 Implementing MPLS - Configuring and Troubleshooting MPLS
4.1. MPLS Unicast Routing
4.1.1. MPLS Unicast Routing Using LDP
4.1.2. Controlling Label Distribution
4.2. MPLS VPN
4.2.1. MPLS VPN Using Static Routing Between PE-CE
4.2.2. MPLS VPN Using EIGRP as the PE-CE Routing Protocol
4.2.3. MPLS VPN Using OSPF as the PE-CE Routing Protocol
4.2.4. MPLS VPN Using EBGP as the PE-CE Routing Protocol
4.2.5. Controlling Route Propagation Using the Route Target with Import and Export Maps
4.3. VRF-Lite
4.3.1. VRFs at the Customer Sites Using VRF-Lite
5.0 Implementing IP Multicast - Configuring and Troubleshooting IP Multicast
5.1. PIM and Bidirectional PIM
5.1.1. PIM Dense Mode
5.1.2. PIM on an NMBA Network
5.1.3. PIM Sparse Mode – Static Rendezvous Point
5.1.4. PIM Sparse Mode – Multiple Static Rendezvous Points
5.1.5. PIM Sparse Mode – Auto Rendezvous Point
5.1.6. PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point
5.1.7. Bidirectional PIM
5.2. MSDP
5.2.1. MSDP
5.2.2. MSDP to an Anycast Rendezvous Point
5.3. Multicast Tools
5.3.1. Multicast Rate Limiting
5.3.2. IGMP Filtering on the Switch
5.3.3. Use of the Switch to Block Multicast Traffic
5.3.4. Multicasting Through a GRE Tunnel
5.3.5. Multicast Helper Address
5.4. IPv6 Multicast
5.4.1. IPv6 Multicast Routing Using PIM
5.4.2. IPv6 Multicast Listener Discovery (MLD) Protocol
6.0 Implementing Network Security - Configuring and Troubleshooting Network Security
6.1. AAA and Security Server Protocols
6.1.1. Use of a Router to Authenticate Against a AAA Server Using TACACS+
6.1.2. Use of a Router to Authenticate Against a AAA Server Using RADIUS
6.1.3. Local Privilege Authorization
6.1.4. Accounting to a AAA Server Using TACACS+
6.1.5. Accounting to a AAA Server Using RADIUS
6.2. Access Lists
6.2.1. Standard Access Lists
6.2.2. Extended Access Lists
6.2.3. Time-Based Access Lists
6.2.4. Reflexive Access Lists
6.3. Routing Protocol Security
6.3.1. Routing Protocol Authentication for EIGRP
6.3.2. Routing Protocol Authentication for OSPF – Area-Wide
6.3.3. Routing Protocol Authentication for OSPF – Interface-Specific
6.3.4. Routing Protocol Authentication for OSPF Virtual Links
6.3.5. Routing Protocol Authentication for BGP
6.4. Catalyst Security
6.4.1. Storm Control
6.4.2. Switch Port Security
6.4.3. Dot1x Authentication
6.4.4. Dot1x Authentication for VLAN Assignment
6.4.5. VLAN Access Maps
6.4.6. DHCP Snooping
6.4.7. DAI
6.4.8. IP Source Guard
6.4.9. Private VLANs
6.5. Cisco IOS and Zone-Based Firewalls
6.5.1. Basic Cisco IOS Firewall
6.5.2. DoS Protection on a Cisco IOS Firewall
6.5.3. Basic Zone-Based Firewall
6.5.4. Zone-Based Firewall with Deep Packet Inspection
6.6. NAT
6.6.1. Dynamic NAT
6.6.2. PAT
6.6.3. Static NAT
6.6.4. Static PAT
6.6.5. Policy-Based NAT
6.7. Other Security Features
6.7.1. Configuring the TCP Intercept Feature
6.7.2. Configuring Blocking of Fragment Attacks
6.7.3. Configuring Switch Security Features
6.7.4. Configuring Antispoofing Using an ACL
6.7.5. Configuring Antispoofing Using uRPF
6.7.6. SSH on Routers and Switches
6.7.7. Cisco IOS IPS
6.7.8. Controlling Telnet and SSH Access to the Router and Switch
7.0 Implementing Network Services - Configuring and Troubleshooting Network Services
7.1. DHCP
7.1.1. Configuring DHCP on a Cisco IOS Router
7.1.2. Configuring DHCP on a Switch
7.1.3. Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address)
7.2. HSRP
7.2.1. HSRP Between Two Routers
7.2.2. Pre-empt for HSRP
7.2.3. Authentication for HSRP
7.2.4. VRRP
7.2.5. GLBP
7.3. IP Services
7.3.1. Use of the Router for WCCP
7.3.2. Use of the Router to Generate an Exception Dump Using TFTP
7.3.3. Use of the Router to Generate an Exception Dump Using FTP
7.3.4. Use of the Router to Generate an Exception Dump Using RCP
7.3.5. Broadcast Forwarding for Protocols
7.4. System Management
7.4.1. Telnet Management on the Router and Switch
7.4.2. SSH Management on the Router and Switch
7.4.3. Disabling Telnet and the SSH Client on the Switch
7.4.4. HTTP Management on the Router and Switch
7.4.5. Controlling HTTP Management on the Router and Switch
7.5. NTP
7.5.1. NTP Using the NTP Master and NTP Server Commands
7.5.2. NTP Without Using the NTP Server
7.5.3. NTP Using NTP Broadcast Commands
8.0 Implementing QoS - Configuring and Troubleshooting QoS
8.1. Classification
8.1.1. Marking Using DSCP
8.1.2. Marking Using IP Precedence
8.1.3. Marking Using CoS
8.2. Congestion Management and Congestion Avoidance
8.2.1. Priority Queuing
8.2.2. Custom Queuing
8.2.3. Weighted Fair Queuing
8.2.4. WRED
8.2.5. RSVP
8.3. Policing and Shaping
8.3.1. CAR Using Rate Limiting Under the Interface
8.3.2. Frame Relay Traffic Shaping Using Map Classes
8.3.3. Discard Eligible List
8.4. Link Efficiency Mechanisms
8.4.1. Compression
8.4.2. Link Fragmentation and Interleaving (LFI) for Frame Relay
8.5. Modular QoS CLI
8.5.1. Policing
8.5.2. Class-Based Weighted Fair Queuing (CB-WFQ)
8.5.3. Low Latency Queuing (LLQ)
8.5.4. Shaping Using MQC
8.5.5. Random Early Detection Using MQC
8.5.6. WRED Using MQC
8.5.7. Using NBAR for QoS
8.5.8. Discard Eligible Marking Using MQC
8.6. Catalyst QoS
8.6.1. SRR on the Catalyst Switch
9.0 Troubleshooting a Network - Troubleshooting Network-Wide Connectivity Issues
9.1. Troubleshooting Layer 2 Problems
9.1.1. Troubleshooting Catalyst Switch Network Issues
9.1.2. Troubleshooting Frame Relay Network Issues
9.2. Troubleshooting Layer 3 Problems
9.2.1. Troubleshooting IP Addressing Network Issues
9.2.2. Troubleshooting Routing Protocol Network Issues
9.2.3. Troubleshooting Routing Protocol Loop Issues
9.3. Troubleshooting Application Problems
9.3.1. Determining Which Aspects of the Network to Troubleshoot to Determine Network
9.4. Troubleshooting Network Services
9.4.1. Troubleshooting Misconfigured NTP Setup
9.4.2. Troubleshooting Misconfigured DHCP Setup
9.4.3. Troubleshooting Misconfigured Telnet and SSH Setup
9.4.4. Troubleshooting Misconfigured SNMP Setup
9.5. Troubleshooting Security Services
9.5.1. Troubleshooting Misconfigured ACLs
9.5.2. Troubleshooting Misconfigured NAT
9.5.3. Troubleshooting Misconfigured AAA Services
10.0 Optimizing a Network - Configuring and Troubleshooting Optimization of a Network
10.1. Logging In
10.1.1. Logging into a Remote Syslog Server
10.1.2. Logging into the Internal Buffer
10.2. SNMP
10.2.1. Use of a Router to Communicate to an SNMP Management Station
10.2.2. Use of a Router to Generate SNMP Traps
10.3. RMON
10.3.1. Use of a Router to Generate SNMP Traps Using RMON
10.4. Accounting
10.4.1. IP Accounting
10.5. SLA
10.5.1. IP SLA
10.6. Implementing Network Services on the Routers
10.6.1. Use of a Router as an FTP Server
10.6.2. Use of a Router as a TFTP Server
10.6.3. Cisco IOS Embedded Event Manager
10.6.4. NetFlow
10.6.5. HTTP and HTTPS on a Router
10.6.6. Telnet on a Router
10.6.7. Implementing Secure Copy Protocol (SCP) on a Router
S. No. Topic Description Status
1 1.01 Frame Relay
2 1.01.1 Frame Relay Multipoint Links on a Physical Interface Using Inverse ARP
3 1.01.2 Frame Relay Multipoint Links on a Physical Interface Without Using Inverse ARP
4 1.01.3. Frame Relay Multipoint Link on a Subinterface Using Inverse ARP
5 1.01.4. Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP
6 1.01.5. Frame Relay Point-to-Point Subinterfaces
7 1.01.6. PVC with a Multipoint Interface on One Side and a Subinterface on the Other Side
8 1.01.7. Authentication on a Frame Relay Link Using PPP
9 1.2 Catalyst Configuration
10 1.2.01. Trunks Using an Industry-Standard Encapsulation
11 1.2.02. Trunks Using a Cisco Proprietary Encapsulation
12 1.2.03. Creating, Deleting, and Editing VLANs
13 1.2.04. VTP in Client/Server Mode
14 1.2.05. VTP in Transparent Mode
15 1.2.06. VTP Authentication
16 1.2.07. VTP Pruning
17 1.2.08. Controlling VLANs That Cross a Trunk
18 1.2.09. Optimizing STP by STP Timers
19 1.2.10. PortFast
20 1.2.11. Loop Guard
21 1.2.12. BPDU Guard
22 1.2.13. BPDU Filters
23 1.2.14. UplinkFast
24 1.2.15. BackboneFast
25 1.2.16. MSTP
26 1.2.17. Selecting the Root Bridge for VLANs in a PVST Environment
27 1.2.18. Selecting the Root Bridge for an MST Instance in an MST Environment
28 1.2.19. Setting the Port Priority to Designate the Forwarding Ports
29 1.2.20. EtherChannel Using an Industry-Standard Protocol
30 1.2.21. EtherChannel Using a Cisco Proprietary Protocol
31 1.2.22. Disabling Protocols on the EtherChannel
32 1.2.23. Load-Balancing Type on the EtherChannel
33 1.2.24. SNMP Management on the Switch
34 1.2.25. Telnet and SSH Management on the Switch
35 1.2.26. Controlling Inbound and Outbound Telnet on the Switch
36 1.2.27. Regular and Smart Macros
37 1.2.28. Switch Banners
38 1.2.29. UDLD
39 1.2.30. Switch Virtual Interfaces (SVIs) for IP Routing
40 1.2.31. Router on a Stick
41 1.2.32. SPAN
42 1.2.33. RSPAN
43 1.2.34. IP Routing on the Switch Using RIPv2, EIGRP, OSPF, and BGP
44 1.2.35. IP Phones to Connect to the Catalyst Switch
45 1.2.36. Dot1q Tunneling
46 1.3 Other Layer 2 Technologies
47 1.3.1. HDLC
48 1.3.2. PPP
49 1.3.3. PPP over Ethernet
1 2.1. IPv4 Addressing
2 2.1.1. IPv4 Addressing
1.0 Implementing Layer 2 Technologies - Configuring and Troubleshooting Layer 2 Technologies
2.0 Implementing IPv4 - Configuring and Troubleshooting IPv4
3 2.1.2. IPv4 Subnetting
4 2.1.3. IPv4 VLSM
5 2.2. OSPFv2
6 2.2.01. OSPF on a Broadcast Multicast Access Network (Ethernet)
7 2.2.02. OSPF over a Frame Relay Multipoint Network by Changing Network Types
8 2.2.03. OSPF over a Frame Relay Multipoint Network by Using the neighbor Command
9 2.2.04. OSPF over a Frame Relay Point-to-Point Network
10 2.2.05. Virtual Links
11 2.2.06. Stub Areas
12 2.2.07. Totally Stubby Areas
13 2.2.08. NSSA Areas
14 2.2.09. NSSA and Stub Areas
15 2.2.10. NSSA and Totally Stubby Areas
16 2.3. EIGRP
17 2.3.1. Basic EIGRP
18 2.3.2. Passive Interfaces
19 2.3.3. EIGRP Stub on Routers and Switches
20 2.3.4. EIGRP Update—Bandwidth Control
21 2.3.5. Changing the Administrative Distance of EIGRP
22 2.3.6. Unequal-Cost Load Balancing for EIGRP
23 2.4. Filtering, Redistribution, and Summarization
24 2.4.01. Route Filtering for OSPF Within the Area Using a Distribute List with an ACL and Prefix Lists
25 2.4.02. Route Filtering for OSPF Between Areas
26 2.4.03. Summarization of OSPF Routes Between Areas
27 2.4.04. Summarization of External Routers Within OSPF
28 2.4.05. Filtering with a Distribute List Using an ACL and Prefix Lists
29 2.4.06. Using Advanced ACLs and a Prefix List for Filtering Routes
30 2.4.07. Summarizing Routes with EIGRP
31 2.4.08. Route Summarization for RIP
32 2.4.09. Redistribution Between OSPF and EIGRP
33 2.4.10. Redistribution Between RIP and EIGRP
34 2.4.11. Redistribution Between RIP and OSPF
35 2.4.12. Redistribution of Directly Connected Routes
36 2.4.13. Redistribution of Static Routes
37 2.4.14. Redistribution with Filtering Using ACLs and Prefix Lists
38 2.4.15 Redistribution with Filtering Using Route Tagging
39 2.5. IBGP
40 2.5.1. IBGP Peering
41 2.5.2. Advertising Routes in BGP
42 2.5.3. Next-Hop Attribute
43 2.5.4. Route Reflectors
44 2.5.5. Redundancy by Neighbor Relationships Based on Loopbacks
45 2.6. EBGP
46 2.6.1. EBGP Peering
47 2.6.2. EBGP Peering Based on Loopbacks
48 2.7. BGP Advanced Features
49 2.7.01. Filtering Using ACLs
50 2.7.02. Filtering Using Prefix Lists
51 2.7.03. Filtering Using AS Path Filters
52 2.7.04. Redistributing Connected Routes into BGP
53 2.7.05. Redistributing Dynamic Routing Protocols into BGP
54 2.7.06. BGP Aggregation
55 2.7.07. BGP Aggregation with the Summary Only Parameter
56 2.7.08. BGP Aggregation with Suppress Maps
57 2.7.09. BGP Aggregation with Unsuppress Maps
58 2.7.10. BGP Best-Path Selection – Weight
59 2.7.11. BGP Best-Path Selection – Local Preference
60 2.7.12. BGP Best-Path Selection – MED
61 2.7.13. BGP Communities – No-Export
62 2.7.14. BGP Communities – No-Advertise
63 2.7.15. BGP Confederation
64 2.7.16. BGP Local AS
65 2.7.17. Working with Private AS Numbers
66 2.7.18. Route Dampening
67 2.7.19. Conditional Advertising
68 2.7.20. Peer Groups
69 2.8 Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
1 3.1. IPv6
2 3.1.1. IPv6 Addresses
3 3.1.2 RIPng
4 3.1.2. OSPFv3
5 3.1.3. EIGRPv6
6 3.1.4. IPv6 Tunneling
7 3.1.5. IPv6 on a Frame Relay Network – Multipoint
8 3.1.6. IPv6 on a Frame Relay Network – Point-to-Point
9 3.1.7. Route Filtering with a Distribute List Using an ACL and Prefix Lists
10 3.1.8. Route Redistribution Between OSPFv3 and EIGRPv6
1 4.1. MPLS Unicast Routing
2 4.1.1. MPLS Unicast Routing Using LDP
3 4.1.2. Controlling Label Distribution
4 4.2. MPLS VPN
5 4.2.1. MPLS VPN Using Static Routing Between PE-CE
6 4.2.2. MPLS VPN Using EIGRP as the PE-CE Routing Protocol
7 4.2.3. MPLS VPN Using OSPF as the PE-CE Routing Protocol
8 4.2.4. MPLS VPN Using EBGP as the PE-CE Routing Protocol
9 4.2.5. Controlling Route Propagation Using the Route Target with Import and Export Maps
10 4.3. VRF-Lite
11 4.3.1. VRFs at the Customer Sites Using VRF-Lite
1 5.1. PIM and Bidirectional PIM
2 5.1.1. PIM Dense Mode
3 5.1.2. PIM on an NMBA Network
4 5.1.3. PIM Sparse Mode – Static Rendezvous Point
5 5.1.4. PIM Sparse Mode – Multiple Static Rendezvous Points
6 5.1.5. PIM Sparse Mode – Auto Rendezvous Point
7 5.1.6. PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point
8 5.1.7. Bidirectional PIM
9 5.2. MSDP
10 5.2.1. MSDP
11 5.2.2. MSDP to an Anycast Rendezvous Point
12 5.3. Multicast Tools
13 5.3.1. Multicast Rate Limiting
14 5.3.2. IGMP Filtering on the Switch
15 5.3.3. Use of the Switch to Block Multicast Traffic
16 5.3.4. Multicasting Through a GRE Tunnel
17 5.3.5. Multicast Helper Address
18 5.4. IPv6 Multicast
19 5.4.1. IPv6 Multicast Routing Using PIM
20 5.4.2. IPv6 Multicast Listener Discovery (MLD) Protocol
3.0 Implementing IPv6 - Configuring and Troubleshooting IPv6
4.0 Implementing MPLS - Configuring and Troubleshooting MPLS
5.0 Implementing IP Multicast - Configuring and Troubleshooting IP Multicast
1 6.1. AAA and Security Server Protocols
2 6.1.1. Use of a Router to Authenticate Against a AAA Server Using TACACS+
3 6.1.2. Use of a Router to Authenticate Against a AAA Server Using RADIUS
4 6.1.3. Local Privilege Authorization
5 6.1.4. Accounting to a AAA Server Using TACACS+
6 6.1.5. Accounting to a AAA Server Using RADIUS
7 6.2. Access Lists
8 6.2.1. Standard Access Lists
9 6.2.2. Extended Access Lists
10 6.2.3. Time-Based Access Lists
11 6.2.4. Reflexive Access Lists
12 6.3. Routing Protocol Security
13 6.3.1. Routing Protocol Authentication for EIGRP
14 6.3.2. Routing Protocol Authentication for OSPF – Area-Wide
15 6.3.3. Routing Protocol Authentication for OSPF – Interface-Specific
16 6.3.4. Routing Protocol Authentication for OSPF Virtual Links
17 6.3.5. Routing Protocol Authentication for BGP
18 6.4. Catalyst Security
19 6.4.1. Storm Control
20 6.4.2. Switch Port Security
21 6.4.3. Dot1x Authentication
22 6.4.4. Dot1x Authentication for VLAN Assignment
23 6.4.5. VLAN Access Maps
24 6.4.6. DHCP Snooping
25 6.4.7. DAI
26 6.4.8. IP Source Guard
27 6.4.9. Private VLANs
28 6.5. Cisco IOS and Zone-Based Firewalls
29 6.5.1. Basic Cisco IOS Firewall
30 6.5.2. DoS Protection on a Cisco IOS Firewall
31 6.5.3. Basic Zone-Based Firewall
32 6.5.4. Zone-Based Firewall with Deep Packet Inspection
33 6.6. NAT
34 6.6.1. Dynamic NAT
35 6.6.2. PAT
36 6.6.3. Static NAT
37 6.6.4. Static PAT
38 6.6.5. Policy-Based NAT
39 6.7. Other Security Features
40 6.7.1. Configuring the TCP Intercept Feature
41 6.7.2. Configuring Blocking of Fragment Attacks
42 6.7.3. Configuring Switch Security Features
43 6.7.4. Configuring Antispoofing Using an ACL
44 6.7.5. Configuring Antispoofing Using uRPF
45 6.7.6. SSH on Routers and Switches
46 6.7.7. Cisco IOS IPS
47 6.7.8. Controlling Telnet and SSH Access to the Router and Switch
1 7.1. DHCP
2 7.1.1. Configuring DHCP on a Cisco IOS Router
3 7.1.2. Configuring DHCP on a Switch
4 7.1.3. Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address)
5 7.2. HSRP
6 7.2.1. HSRP Between Two Routers
7 7.2.2. Pre-empt for HSRP
6.0 Implementing Network Security - Configuring and Troubleshooting Network Security
7.0 Implementing Network Services - Configuring and Troubleshooting Network Services
8 7.2.3. Authentication for HSRP
9 7.2.4. VRRP
10 7.2.5. GLBP
11 7.3. IP Services
12 7.3.1. Use of the Router for WCCP
13 7.3.2. Use of the Router to Generate an Exception Dump Using TFTP
14 7.3.3. Use of the Router to Generate an Exception Dump Using FTP
15 7.3.4. Use of the Router to Generate an Exception Dump Using RCP
16 7.3.5. Broadcast Forwarding for Protocols
17 7.4. System Management
18 7.4.1. Telnet Management on the Router and Switch
19 7.4.2. SSH Management on the Router and Switch
20 7.4.3. Disabling Telnet and the SSH Client on the Switch
21 7.4.4. HTTP Management on the Router and Switch
22 7.4.5. Controlling HTTP Management on the Router and Switch
23 7.5. NTP
24 7.5.1. NTP Using the NTP Master and NTP Server Commands
25 7.5.2. NTP Without Using the NTP Server
26 7.5.3. NTP Using NTP Broadcast Commands
1 8.1. Classification
2 8.1.1. Marking Using DSCP
3 8.1.2. Marking Using IP Precedence
4 8.1.3. Marking Using CoS
5 8.2. Congestion Management and Congestion Avoidance
6 8.2.1. Priority Queuing
7 8.2.2. Custom Queuing
8 8.2.3. Weighted Fair Queuing
9 8.2.4. WRED
10 8.2.5. RSVP
11 8.3. Policing and Shaping
12 8.3.1. CAR Using Rate Limiting Under the Interface
13 8.3.2. Frame Relay Traffic Shaping Using Map Classes
14 8.3.3. Discard Eligible List
15 8.4. Link Efficiency Mechanisms
16 8.4.1. Compression
17 8.4.2. Link Fragmentation and Interleaving (LFI) for Frame Relay
18 8.5. Modular QoS CLI
19 8.5.1. Policing
20 8.5.2. Class-Based Weighted Fair Queuing (CB-WFQ)
21 8.5.3. Low Latency Queuing (LLQ)
22 8.5.4. Shaping Using MQC
23 8.5.5. Random Early Detection Using MQC
24 8.5.6. WRED Using MQC
25 8.5.7. Using NBAR for QoS
26 8.5.8. Discard Eligible Marking Using MQC
27 8.6. Catalyst QoS
28 8.6.1. SRR on the Catalyst Switch
1 9.1. Troubleshooting Layer 2 Problems
2 9.1.1. Troubleshooting Catalyst Switch Network Issues
3 9.1.2. Troubleshooting Frame Relay Network Issues
4 9.2. Troubleshooting Layer 3 Problems
5 9.2.1. Troubleshooting IP Addressing Network Issues
6 9.2.2. Troubleshooting Routing Protocol Network Issues
8.0 Implementing QoS - Configuring and Troubleshooting QoS
9.0 Troubleshooting a Network - Troubleshooting Network-Wide Connectivity Issues
7 9.2.3. Troubleshooting Routing Protocol Loop Issues
8 9.3. Troubleshooting Application Problems

9.3.1. Determining Which Aspects of the Network to Troubleshoot to Determine Network Functionality (Given a
Set of Symptoms)
10 9.4. Troubleshooting Network Services
11 9.4.1. Troubleshooting Misconfigured NTP Setup
12 9.4.2. Troubleshooting Misconfigured DHCP Setup
13 9.4.3. Troubleshooting Misconfigured Telnet and SSH Setup
14 9.4.4. Troubleshooting Misconfigured SNMP Setup
15 9.5. Troubleshooting Security Services
16 9.5.1. Troubleshooting Misconfigured ACLs
17 9.5.2. Troubleshooting Misconfigured NAT
18 9.5.3. Troubleshooting Misconfigured AAA Services
1 10.1. Logging In
2 10.1.1. Logging into a Remote Syslog Server
3 10.1.2. Logging into the Internal Buffer
4 10.2. SNMP
5 10.2.1. Use of a Router to Communicate to an SNMP Management Station
6 10.2.2. Use of a Router to Generate SNMP Traps
7 10.3. RMON
8 10.3.1. Use of a Router to Generate SNMP Traps Using RMON
9 10.4. Accounting
10 10.4.1. IP Accounting
11 10.5. SLA
12 10.5.1. IP SLA
13 10.6. Implementing Network Services on the Routers
14 10.6.1. Use of a Router as an FTP Server
15 10.6.2. Use of a Router as a TFTP Server
16 10.6.3. Cisco IOS Embedded Event Manager
17 10.6.4. NetFlow
18 10.6.5. HTTP and HTTPS on a Router
19 10.6.6. Telnet on a Router
20 10.6.7. Implementing Secure Copy Protocol (SCP) on a Router
10.0 Optimizing a Network - Configuring and Troubleshooting Optimization of a Network

Вам также может понравиться